By Topic

2006 IEEE/IFIP Business Driven IT Management

3-7 April 2006

Filter Results

Displaying Results 1 - 15 of 15
  • Copyright page

    Publication Year: 2006, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2006, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (898 KB)
    Freely Available from IEEE
  • An Introductory Overview and Survey of Business-Driven IT Management

    Publication Year: 2006, Page(s):1 - 10
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Business-driven IT management (BDIM) is a new, evolutionary and comprehensive IT management approach that aims to improve IT infrastructure, service quality and business results at the same time. To that end, it needs to model and numerically estimate IT-business linkage. BDIM concepts are finding ways into ITIL-based management processes as well as into new IT infrastructure product offerings suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 5 C Challenges of Business-Driven IT Management and the 5 A Approaches to Addressing Them

    Publication Year: 2006, Page(s):11 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    To summarize to business people the main challenges of business-driven information and communication technology (ICT) systems management, we suggest "the 5 C challenges of ICT systems management": 1) cost-benefit relationship, 2) complexity, 3) conformance to higher-level objectives, 4) circumstances and their diversity, and 5) change. We also advocate the slogan "To address the 5 C challenges you... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classifying ITIL Processes; A Taxonomy under Tool Support Aspects

    Publication Year: 2006, Page(s):19 - 28
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Providing IT services to customers with better, guaranteed quality has been the aim of many diverse efforts, undertaken under the common denominaor "IT Service Management". Lately, more organizational approaches to this issue have been gaining popularity, especially the guidelines of the IT Infrastructure Library (ITIL) for IT Service Management business processes. But just like with most other bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process-Oriented Integration of Applications for a Service-Oriented IT Management; Integrated IT Management Architecture

    Publication Year: 2006, Page(s):29 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    During the last years a shift from technology-oriented management to user-centered and service-oriented management of information technologies could be observed. Today the aim of service providers is not only to run necessary technologies but also to recognize user needs on service functionality and quality. In order to fulfill service levels agreed with customers, providers have to define and imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Competitive Intelligence and IT, towards a Knowledge-based approach

    Publication Year: 2006, Page(s):37 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Although the new Information and Communication Technologies and especially the Internet have provided new, revolutionary tools for the external information gathering, empirical research papers in literature do not report on major improvement in the use of Internet for Competitive Intelligence. This paper tests three aspects of Internet use for CI: Web-sites of competitors, external databases and o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalisms for IT Management Process Representation

    Publication Year: 2006, Page(s):45 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    With recent years accelerated convergence to process oriented service management frameworks, IT management is adopting business methods. As organisations model and document their management processes, they apply suggestions and best practices found in document collections like the eTOM or the ITIL. Formal representation of the emerging management process definitions can be accomplished by means of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business aware Policy-based Management

    Publication Year: 2006, Page(s):55 - 62
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    In this paper, we introduce a business aware framework for the policy-based management of IT Systems and its application to utility computing environments. The framework couples two main subsystems on top of an IETF-like policy-based resource control layer. They are MBO (Management by Business Objectives) where the decision ability supported by analysis of business objectives resides, and GSLA (Ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relationship Discovery with NetFlow to Enable Business-Driven IT Management

    Publication Year: 2006, Page(s):63 - 70
    Cited by:  Papers (13)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    The understanding of relationships and dependencies between business processes and the underlying IT infrastructure is important for enabling business-driven IT management. This work uses the widespread NetFlow feature to derive direct and indirect traffic relationships in IT infrastructures. We define an algorithm for relationship discovery with NetFlow and describe the application of the discove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Security Governance; A practical guide to implement and control Information Security Governance (ISG)

    Publication Year: 2006, Page(s):71 - 80
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    Following the advances of Information Technology (IT) Management and Information Security, organizations have felt the need to standardize their activities and, principally, to integrate any technological action with short and long-term business objectives and administrative strategies. Through the interrelationship of corporative and technological governance, with Information Security Governance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing Business Rules and Information Security Policies through Compliance Audits; XISSF - A Compliance Specification Mechanism

    Publication Year: 2006, Page(s):81 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Corporate enterprises are facing increased requirements to fulfill different regulations. Requirements such as routine compliance with security standards can provide risk mitigation and process performance benefits. However, compliance management is a manual and labor-intensive process and creates additional overheads to any businesses. To make matter worse, the growing number and constant changes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.