Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Service operation classification for risk management

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

7 Author(s)

We propose an empirical service-operation risk-classification model to provide managerial insights to service providers in terms of risk management. The model is developed through an investigation of the dependencies between the characteristics of service operations in consumer services and the broad classes of provider risk to which they are exposed. A survey of professional managers has been conducted in which respondents were asked to assess 30 service operations across six service dimensions and five factors representing provider risk. The data have been analyzed using statistical methods, in particular Bayesian network analysis and hierarchical clustering. The results indicate relationships between service operations, service dimensions, and risk factors. Due to the limited sample size, our findings should be regarded as preliminary. The proposed model should help determine the most relevant types of service risks based on the specific characteristics of the service provided and therefore help to develop risk mitigation strategies.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Journal of Research and Development  (Volume:54 ,  Issue: 3 )