2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management最新文献

筛选
英文 中文
From e-business strategy to IT resource management: A strategy-centric approach to timely scheduling web requests in B2C environments 从电子商务战略到IT资源管理:B2C环境中及时调度web请求的以战略为中心的方法
2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management Pub Date : 2008-04-07 DOI: 10.1109/BDIM.2008.4540078
A. Beal, D. Mossé
{"title":"From e-business strategy to IT resource management: A strategy-centric approach to timely scheduling web requests in B2C environments","authors":"A. Beal, D. Mossé","doi":"10.1109/BDIM.2008.4540078","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540078","url":null,"abstract":"For a B2C enterprise, resource management plays a crucial role in the achievement of business objectives. When a Web server becomes busy, and there is no control over which user requests to attend to first, negative business outcomes may result, such as a customer in the final steps of making a purchase being kept waiting and deciding to abandon the site for lack of a timely response, while less critical or urgent requests are being handled. On the other hand, if the relative value of executing different types of user requests is known, resource management mechanisms can be used to optimize the allocation of the sparsely available resources. In this paper, we introduce a methodology for estimating the value of end-user requests on a business-to-consumer (B2C) environment based on business strategy. The proposed value-estimating methodology can be used as a base for improving the allocation of e-commerce resources during peak traffic situations by maximizing the aspects of the service with more return to offer in terms of the achievement of business goals and objectives.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparative study on business models of municipal wireless cities in US and Sweden 美国和瑞典市政无线城市商业模式的比较研究
2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management Pub Date : 2008-04-07 DOI: 10.1109/BDIM.2008.4540085
Zhe Yang, Saltant Khamit, A. Mohammed, Peter Larson
{"title":"A comparative study on business models of municipal wireless cities in US and Sweden","authors":"Zhe Yang, Saltant Khamit, A. Mohammed, Peter Larson","doi":"10.1109/BDIM.2008.4540085","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540085","url":null,"abstract":"In this paper, we will explore the existing operational \"business models\" for municipal wireless networks in US and Sweden. Based on the current paradigms of the North-American public wireless networks, we will investigate an emerging wireless city concept in Sweden to analysis this new business concept in the existing field. We will look into the relationship of different actors in various business models of the wireless cities in our selected case studies. This paper will aim to demonstrate a number of key considerations when designing and managing the business model of Municipal wireless networks as business-driven and public utility-driven services.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115525463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A methodological framework for business-IT alignment 用于业务- it对齐的方法学框架
2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management Pub Date : 2008-04-07 DOI: 10.1109/BDIM.2008.4540069
C. Ralha, Rafael Gostinski
{"title":"A methodological framework for business-IT alignment","authors":"C. Ralha, Rafael Gostinski","doi":"10.1109/BDIM.2008.4540069","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540069","url":null,"abstract":"Organizations are characterized by the usage of multiple applications and heterogeneous technological environments. Although business and IT processes are defined quite good, the processes themselves are quite different and locked in the specific application areas. As a result the language of those areas are also specific what helps to maintain the distance of the processes and make hard the mutual understanding between business and IT units. Conscious that the frequent interaction among business and IT units in any organization turned out to be the single most important factor of IT usage, this article presents a methodological framework for business-IT alignment, based on process modeling and ontology theory. The aim of the proposed methodological framework is to combine different domain ontologies - specifically business and IT, with organization processes, to achieve better organization productivity through the use of a common language.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121458415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Mining semantic relations using NetFlow 使用NetFlow挖掘语义关系
2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management Pub Date : 2008-04-07 DOI: 10.1109/BDIM.2008.4540082
A. Caracas, A. Kind, D. Gantenbein, Stefan Fussenegger, Dimitrios Dechouniotis
{"title":"Mining semantic relations using NetFlow","authors":"A. Caracas, A. Kind, D. Gantenbein, Stefan Fussenegger, Dimitrios Dechouniotis","doi":"10.1109/BDIM.2008.4540082","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540082","url":null,"abstract":"Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in support of a business-driven IT management. In general, the results of a dependency analysis can be used for infrastructure reengineering, show evidence of policy and process compliance, and support assessments of business resilience. Current passive discovery approaches using network monitoring analyze only direct communication between assets and provide just a single- link mesh view. This work introduces a new algorithm based on NetFlow data preprocessed by the Aurora system developed at IBM Research to create a dependency model of the network. The algorithm uses time-based event correlation and the data mining concept of association rules to detect and classify dependencies that span two or more components. The advantages of the algorithm is that no access credentials are required and no packet payload inspection is performed. The suggested algorithm populates and maintains a dependency model of an observed network that describes dependencies among computer systems, software components, and services. The model combines the mined association rules that express relations between flows into dependencies, which are given intuitive semantics. Tests with simulated and authentic data prove the accuracy of the dependency mining algorithm.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Adoption of business continuity planning processes in IT service management 在IT服务管理中采用业务连续性计划流程
2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management Pub Date : 2008-04-07 DOI: 10.1109/BDIM.2008.4540071
Stewart H. C. Wan, Y. Chan
{"title":"Adoption of business continuity planning processes in IT service management","authors":"Stewart H. C. Wan, Y. Chan","doi":"10.1109/BDIM.2008.4540071","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540071","url":null,"abstract":"For any fault of the same severity level, traditional fault discovery and notification tools provide equal weighting from business points of view. To improve the fault correlation from business perspectives, we proposed a framework to automate network and system alerts with respect to its business service impact for proactive notification to IT operations management. This paper outlines the value of business continuity planning (BCP) during the course of service impact analysis, placing particular emphasis on the business perspective in the processes of IT service management. The framework explicitly employs BCP relevant processes in order to identify the relationships between business services and IT resources A practical case in IT operations to illustrate the concept was then conducted.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Dynamic management of outsourced service processes’ QoS in a service provider - service supplier environment 服务提供者-服务提供者环境下外包服务过程QoS的动态管理
2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management Pub Date : 2008-04-07 DOI: 10.1109/BDIM.2008.4540077
G. Grabarnik, Heiko Ludwig, L. Shwartz
{"title":"Dynamic management of outsourced service processes’ QoS in a service provider - service supplier environment","authors":"G. Grabarnik, Heiko Ludwig, L. Shwartz","doi":"10.1109/BDIM.2008.4540077","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540077","url":null,"abstract":"IT service providers typically must comply with service level agreements that are part of their usage contracts with customers. Not only IT infrastructure is subject to service level guarantees such as availability or response time but also service management processes as defined by the IT Infrastructure Library (ITIL) such as change and incident processes and the fulfillment of service requests. SLAs relating to service management processes typically address metrics such as initial response time and fulfillment time. Large service providers have the choice of which internal service delivery team or external service provider they assign to parts of a service process, each provider having different costs or prices associated with it for different turn-around times at different risk. This choice in QoS and cost of different service providers can be used to manage the trade-off between penalty costs and fulfillment cost. This paper proposes a model as a basis for service provider choice at process runtime, taking into account the progress of a process so far and the availability of service capacity at service suppliers. This model can be used to reduce total service costs of IT service providers deciding on alternative delivery teams and external service providers when needed and based on current process performance.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On tool support for Service Level Management: From requirements to system specifications 关于服务水平管理的工具支持:从需求到系统规范
2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management Pub Date : 2008-04-07 DOI: 10.1109/BDIM.2008.4540076
T. Schaaf, M. Brenner
{"title":"On tool support for Service Level Management: From requirements to system specifications","authors":"T. Schaaf, M. Brenner","doi":"10.1109/BDIM.2008.4540076","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540076","url":null,"abstract":"Service level management (SLM) is a vital discipline in customer-oriented IT service management. Covering technical as well as organizational and economic aspects, this multi-dimensional management area has become even more important against the background of the business-driven IT management (BDIM) paradigm. Today, tools and management solutions available for SLM face three major challenges: First, the lack of an established platform-independent model (PIM) for SLM entails the existence of hard- to-integrate \"islands\" of support tools and makes an integrated approach to SLM tool support all but impossible. Secondly, the current solutions are mostly focused on SLA-speciflc issues, neglecting significant SLM responsibilities such as the deployment of service catalogs. Lastly, the limited perspective of many existing SLM solutions disregards the important links between SLM-related management tasks and those of other management disciplines such as fault or performance management. This paper presents first results of ongoing research aiming at developing a practicable, integrated solution for SLM, addressing above mentioned challenges. To this end, essential requirements are pointed out, and four common modules of a management architecture for SLM are outlined.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
IT confidentiality risk assessment for an architecture-based approach 基于体系结构方法的IT机密性风险评估
2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management Pub Date : 2008-01-25 DOI: 10.1109/BDIM.2008.4540072
Ayse Morali, E. Zambon, S. Etalle, Paul L. O. Re
{"title":"IT confidentiality risk assessment for an architecture-based approach","authors":"Ayse Morali, E. Zambon, S. Etalle, Paul L. O. Re","doi":"10.1109/BDIM.2008.4540072","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540072","url":null,"abstract":"Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The approach is based on a model integrating information assets and the IT infrastructure that they rely on for distributed systems. IT infrastructures enable one to analyse risk propagation possibilities and calculate the impact of confidentiality incidents. Furthermore, our approach is a mean to bridge the technical and business- oriented views of information systems, since the importance of information assets, which is leading the technical decisions, is set by the business.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131369007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信