Skip to main content

Governing IT Services for Quantifying Business Impact

  • Conference paper
  • First Online:
Perspectives in Business Informatics Research (BIR 2015)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 229))

Included in the following conference series:

Abstract

This paper presents a method that comprises a metamodel and two processes created for quantifying the business impact associated with the behaviour of IT services. These artifacts define impact analysis models for evaluating the risks, service agreements, quality attributes and criticality associated with IT services. The defined models are integrated with traditional enterprise models to assess how an IT service affectation impacts the business in terms of its objectives, its performance indicators, and financial issues generating costs, penalties or the loss of income due to non-provision of business services. Once IT critical services are identified and governed, strategies can be defined to prevent IT service affectations in order to improve IT-business interoperability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Luftman, J., Zadeh, H.S., Derksen, B., Santana, M., Rigoni, E.H., Huang, Z.D.: Key information technology and management issues 2011–2012: an international study. J. Inf. Technol. 27(3), 198–212 (2012)

    Article  Google Scholar 

  2. Maizlish, B., Handler, R.: IT (Information Technology) Portfolio Management Step-by-Step: Unlocking the Business Value of Technology. Wiley, Chichester (2010)

    Google Scholar 

  3. Gustafsson, P., Franke, U., Höök, D., Johnson, P.: Quantifying IT impacts on organizational structure and business value with extended influence diagrams. In: Stirna, J., Persson, A. (eds.) Practice of Enterprise Modeling. LNBIP, vol. 15, pp. 138–152. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Winkler, M., Springer, T., Trigos, E.D., Schill, A.: Analysing dependencies in service compositions. In: Dan, A., Gittler, F., Toumani, F. (eds.) ICSOC/ServiceWave 2009. LNCS, vol. 6275, pp. 123–133. Springer, Heidelberg (2010)

    Google Scholar 

  5. Moura, A., Sauve, J., Bartolini, C.: Business-driven IT management - upping the ante of IT : exploring the linkage between it and business to improve both IT and business results. IEEE Commun. Mag. 46(10), 148–153 (2008)

    Article  Google Scholar 

  6. Sauvé, J., Marques, F., Moura, A., Sampaio, M., Jornada, J., Radziuk, E.: SLA design from a business perspective. In: Schönwälder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol. 3775, pp. 72–83. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Bartolini, C., Salle, M., Trastour, D.: IT service management driven by business objectives: an application to incident management. In: 10th IEEE/IFIP Network Operations and Management Symposium, pp. 45–55. IEEE, Vancouver (2006)

    Google Scholar 

  8. Group, I. A. W.: IEEE Std 1471–2000. Recommended practice for architectural description of software-intensive systems. Technical report, IEEE (2000)

    Google Scholar 

  9. Aier, S., Winter, R.: Virtual decoupling for it/business alignment-conceptual foundations, architecture design and implementation example. Bus. Inf. Syst. Eng. 1(2), 150–163 (2008)

    Article  Google Scholar 

  10. Wei, X., Zhiqiang, Z.: Service portfolio selection driven by multiple business objectives. In: International Conference on Information Management, Innovation Management and Industrial Engineering, pp. 146–149. IEEE Computer Society, Washington (2011)

    Google Scholar 

  11. Kuchta, D.: Use of fuzzy numbers in project risk (criticality) assessment. Int. J. Project Manage. 19(5), 305–310 (2001)

    Article  Google Scholar 

  12. Markowski, A.S., Mannan, M.S.: Fuzzy risk matrix. J. Hazard. Mater. 159(1), 152–157 (2008)

    Article  Google Scholar 

  13. Ni, H., Chen, A., Chen, N.: Some extensions on risk matrix approach. Saf. Sci. 48(10), 1269–1278 (2010)

    Article  Google Scholar 

  14. McNaughton, B., Ray, P., Lewis, L.: Designing an evaluation framework for IT service management. Inf. Manage. 47(4), 219–225 (2010)

    Article  Google Scholar 

  15. Tohidi, H.: The role of risk management in IT systems of organizations. Procedia Comput. Sci. 3, 881–887 (2011)

    Article  Google Scholar 

  16. Bojanc, R., Jerman-Blai, B.: An economic modelling approach to information security risk management. Int. J. Inf. Manage. 28(5), 413–422 (2008)

    Article  Google Scholar 

Download references

Acknowledgments

The author would like to thank Giovanny Torres and Guillermo Beltrán who collaborated in the validation of this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oscar González Rojas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

González Rojas, O. (2015). Governing IT Services for Quantifying Business Impact. In: Matulevičius, R., Dumas, M. (eds) Perspectives in Business Informatics Research. BIR 2015. Lecture Notes in Business Information Processing, vol 229. Springer, Cham. https://doi.org/10.1007/978-3-319-21915-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21915-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21914-1

  • Online ISBN: 978-3-319-21915-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics