LINKING ITIL WITH OUTSOURCE SERVICES ROKHSAREH MOBARHAN UNIVERSITI TEKNOLOGI MALAYSIA

advertisement
LINKING ITIL WITH OUTSOURCE SERVICES
ROKHSAREH MOBARHAN
UNIVERSITI TEKNOLOGI MALAYSIA
LINKING ITIL WITH OUTSOURCE SERVICES
CASE STUDY: CENTER OF INFORMATION COMMUNICATION
TECHNOLOGY IN UTM
ROKHSAREH MOBARHAN
A project report submitted in partial fulfillment of the
requirements for the award of the degree of
Master of Science (Information Technology – Management)
Faculty of Computer Science and Information Systems
Universiti Teknologi Malaysia
NOVEMBER 2009
iii
To my beloved husband and family
for their encouragement, support and pray
iv
ACKNOWLEDGEMENT
In the name of Allah, Most Gracious, Most Merciful.
First and foremost I am grateful to ALLAH on His blessing in completing
this thesis.
I wish to express my sincere appreciation to my supervisor, Assoc. Prof. Dr.
Azizah Abdul Rahman for encouragement, precious guidance and critics. Without
her continued support and interest, this thesis would not have been the same as
presented here, and also to the staffs of CICT, for their valuable feedback.
I would also like to thank to all my family members for their prayers and all
their supports and encouragements.
My gratitude also goes to my beloved and wonderful husband, thank you for
the encouragement, for being my inspiration, for the understanding you have given to
me and most importantly, for your endless love.
I thank you all.
v
ABSTRACT
The arrival of the Internet and the rush to e-commerce has seen many
companies look to outside vendors to supply necessary skills and competencies, as
these are often not available in-house. Many large organizations are increasingly
outsourcing their IT functions. Factors like lower costs, improved productivity,
higher quality, higher customer satisfaction, and ability to focus on core areas are
some of the benefits of outsourcing. However, there are many challenges and
problems associated with IT outsourcing. As a strategic resource, outsourcing must
be governed accordingly to mitigating the problems. In this project, I identify the
main problems and challenges related to IT outsourcing. In addition, we delve into
some important issues on IT outsourcing, particularly the challenges along with
benefits. IT Infrastructure Library (ITIL®) delivers framework by providing best
practices that provide governance on delivering quality, cost effective, and efficient
IT services. So ITIL V3 will be used as a solution in this project. ITIL can be served
as a framework for managing the relationship with an outsourcing service provider.
This study will help the management to identify the problems and take the necessary
remedial steps. In this project, a framework will be suggested that is arisen from the
ITIL V3 framework for managing the outsourcing projects and there are some
activities and suggestion to implementing each process.
vi
ABSTRAK
Kemunculan internet dan e-dagang telah menyebabkan kebanyakan syarikat
mencari pembekal luar untuk membekal kemahiran dan kompetensi yang diperlukan,
Hal ini demikian kerana ia tidak didapati di rumah. Banyak organisasi besar semakin
mengembangkan fungsi IT mereka kepada subkontraktor IT. Faktor-faktor seperti
kos yang lebih rendah, produktiviti yang semakin meningkat, kualiti yang lebih
tinggi, kepuasan pelanggan yang semakin tinggi, dan kemampuan untuk fokus pada
bidang utama adalah beberapa manfaat kepada subkontraktor IT. Namun, terdapat
banyak cabaran dan masalah yang berkaitan dengan subkontraktor IT. Sebagai
sumber strategi, subkontraktor harus diatur dengan bijak untuk mengurangkan
masalah. Dalam projek ini, saya telah mengenalpasti masalah dan cabaran utama
yang berkaitan dengan subkontraktor IT. Selain itu, saya juga telah mengkaji
beberapa isu penting khususnya cabaran dan faedah subkontraktor IT. IT
Infrastructure Library (ITIL ®) menyampaikan rangka kerja dengan menyediakan
amalan-amalan terbaik yang memberi kerajaan penyampaian terbaik, kos yang
efektif dan perkhidmatan IT yang berkesan. ITIL V3 digunakan sebagai penyelesaian
dalam projek ini. ITIL boleh dijadikan sebagai rangka kerja untuk menguruskan
hubungan dengan pembekal perkhidmatan subkontraktor. Kajian ini akan membantu
bahagian pengurusan untuk mengenalpasti masalah dan mengambil langkah-langkah
pembaikan yang diperlukan. Dalam projek ini, sebuah rangka kerja dihasilkan
dengan menggunakan ITIL V3 untuk menguruskan projek-projek subkontraktor dan
beberapa saranan untuk aktiviti dan cadangan pelaksanaan masing-masing.
vii
TABLE OF CONTENT
CHAPTER
1
TITLE
PAGE
TITLE
i
DECLARATION
ii
DEDICATION
iii
ACKNOWLEDGEMENT
iv
ABSTRACT
v
ABSTRAK
vi
TABLE OF CONTENTS
vii
LIST OF TABLES
xi
LIST OF FIGURES
xii
LIST OF ABBREVIATIONS
xiv
LIST OF APPENDICES
xv
PROJECT OVERVIEW
1
1.1 Introduction
1
1.2 Background of the problem
3
1.3 Statement of the problem
4
1.4 Project Objectives
5
1.5 Scope of the project
5
1.6 Importance of the project
6
1.7 Chapter Summary
7
viii
2
LITERATURE REVIEW
8
2.1 Introduction
8
2.2 Outsourcing
10
2.2.1 Definition of Outsourcing
11
2.2.2 Types of Outsourcing
12
2.2.3 Software Development
14
2.2.3.1 Software development life cycle (SDLC)
2.2.3.1.1 Planning Stage
15
2.2.3.1.2 Requirements definition Stage
16
2.2.3.1.3 Design Stage
17
2.2.3.1.4 Development Stage
19
2.2.3.1.5 Integration and test Stage
20
2.2.3.1.6 Installation and Acceptance Stage
21
2.2.3.2 Software development Outsourcing (SDO)
23
2.2.4 Steps of Outsourcing
24
2.2.5 Advantages of Outsourcing
32
2.2.6 Disadvantages of Outsourcing
35
2.2.7 Case study
37
2.2.7.1 Duct layout industry
37
2.2.7.2 Contact Advocate
40
2.2.8 Outsourcing Governance
42
2.3 IT Governance
14
45
2.3.1 Definition of IT Governance
47
2.3.2 IT Governance Focus Areas
51
2.3.3 IT Governance Frameworks
53
2.4 IT Infrastructure Library
56 2.4.1 ITIL Benefits
58
2.4.2 ITIL Evolution
60
2.4.2.1 ITIL V2 vs. V3
61
2.4.2.2 ITIL V3 books
62
2.4.2.2.1 Service Strategy
65
2.4.2.2.2 Service Design
67
2.4.2.2.3 Service Transition
71
2.4.2.2.4 Service Operation
74
ix
2.4.2.2.5 Continual Service Improvement
3
4
5
77
2.5 Chapter Summary
82
METHODOLOGY
83
3.1 Introduction
83
3.2 Project Methodology
84
3.2.1 Initial Planning Phase
86
3.2.2 Analysis
86
3.2.2.1 Literature Review
86
3.2.2.2 Identifying CICT problems
87
3.2.3 Develop a Proposed Framework
89
3.3 Chapter Summary
89
INITIAL FINDINGS
90
4.1 Introduction
90
4.2 Organizational Analysis
91
4.2.1 CICT Mission, Vision and Objectives
92
4.2.2 CICT Organizational Structure
93
4.3 Questionnaire and Interview Analysis
94
4.4 suitable component of ITIL for outsourcing
99
4.5 general proposed framework
102
4.6 Chapter summary
103
FRAMEWORK REFINEMENT
104
5.1 Introduction
104
5.2 Proposed framework design
105
5.2.1 ITIL Implementation Framework
105
5.2.1.1 Phase 1
106
5.2.1.2 Phase 2
107
5.2.1.3 Phase 3
109
x
5.2.1.4 Phase 4
5.2.2 Framework implementation roadmap
111
5.2.2.1 Incident Management Process
114
5.2.2.2 Problem Management Process
117
5.2.2.3 Financial Management Process
118
5.2.2.4 Service level management
120
5.2.2.5 Change management
122
5.2.2.6 Supplier management
125
5.2.2.7 Information Security Management
127
5.2.2.8 Service Evaluation
129
5.3 OMF Implementation Project Organizational Structure
5.3.1 Implementation team and groups
132
132
5.3.1.1 Steering Group
132
5.3.1.2 ITIL Implementation Project Manager
133
5.3.1.3 Implementation Teams
134
5.3.2 Framework Applying Steps
134
5.4 Framework verification
136
5.5 Framework Finalization
136
5.5.1 Risk Management
6
111
137
5.6 Chapter Summary
141
DISCUSSION AND CONCLUSION
142
6.1 Achievements
142
6.2 Constraints and Challenges
143
6.3 Recommendations
144
6.4 Chapter Summary
145
REFERENCES
APPENDICES A-E
146
151-167
xi
LIST OF TABLES
TABLE NO.
TITLE
PAGE
2.1
Definitions of IT governance
49
2.2
ITIL V3 processes and sub processes
80
4.1
Summary of interview analyzing
98
4.2
ITIL V3 processes regarding outsourcing
100
5.1
benefits of the framework processes for CICT
130
xii
LIST OF FIGURES
FIGURE NO.
TITLE
PAGE
2.1
Literature Review Framework
9
2.2
Outsourcing
12
2.3
SDLC Stages
15
2.4
Input and output of planning stage
16
2.5
Input and output of requirements definition stage
17
2.6
Input and output of Design stage
18
2.7
Input and output of Development stage
19
2.8
Input and output of Integration and Test stage
21
2.9
Input and output of installation and acceptance stage
22
2.10
Steps of Outsourcing
26
2.11
Outsourcing challenges
43
2.12
Key Aspects of Outsourcing Governance
44
2.13
Evolution of the IT Function within organizations
45
2.14
IT Governance objectives
50
2.15
Focus areas of IT Governance
51
2.16
The service lifecycle
62
2.17
Key links, inputs & outputs of the service lifecycle
64
2.18
Service Design
68
2.19
Service Transition
72
2.20
Service Operation
75
xiii
2.21
Continual Service Improvements
78
3.1
Project Methodology Framework
85
4.1
CICT Organizational Chart
94
4.2
general proposed framework
102
5.1
Outsourcing Management Framework
106
5.2
Framework implementation roadmap
112
5.3
suggested Incident/Problem Report Form
116
5.4
Framework implementation Steps
135
5.5
Finalized OM Framework for CICT
139
5.6
OMF for software Development Projects
140
xiv
LIST OF ABBREVIATIONS
CCTA
–
Central Computer and Telecommunications Agency
CMM
–
Capability Maturity Model
COBIT
–
Control Objectives for Information and Related Technology
CSI
–
Continual Service Improvement
DSL
–
Definitive Software Library
EDA
–
Exploratory Data Analysis
IACEP
–
Informational and Analytical Centre of Environmental
Protection
ITGI
–
Information Technology Governance Institute
ITIL
–
IT Infrastructure Library
ITSCM
–
Information Technology Service Continuity Management
OGC
–
Office of Government Commerce
OLA
–
Operating Level Agreement
RFC
–
Request for Change
ROI
–
Return on Investment
SDO
–
Software Development Outsourcing
SLA
–
Service Level Agreement
SLM
–
Service Level Management
SQP
–
Service Quality Plan
OMF
_
Outsourcing Management Framework
xv
LIST OF APPENDICES
APPENDIX
TITLE
PAGE
A
Interview Questions
151
B
Questionnaire
152
C
UTM Suggested List
155
D
Suggested SLA Template
156
E
Acceptance Test for OM Framework
162
CHAPTER 1
PROJECT OVERVIEW
1.1 Introduction
In recent years Information Technology has become an inseparable part of
every organizations and the existence of an organization crucially depends on the
effective application of IT. With the emergence of e-commerce, the use of
technology is becoming just an accepted, indeed expected way of conducting
business and also a way of creating new opportunities that provide them with a
source of competitive advantage [1].
The arrival of the Internet and the rush to e-commerce has seen many
companies look to outside vendors to supply necessary skills and competencies, as
these are often not available in-house. Because developing e-commerce applications
can place great demands on companies, and managers often conclude that the only
2
way to meet short deadlines for new technology projects is to contract for specialist
services [1].
However, the challenges for IT managers are to co-ordinate and work in
partnership with the business to deliver high quality IT services [43]. Due to
enhanced focus on the customer in the planning, development and delivery of
information services, IT service management (ITSM) has become increasingly
important. ITSM strives to the better alignment of IT efforts to business needs and to
manage the efficient providing of IT services with guaranteed quality [54].
There are some mechanisms for implementing Information Technology
Governance like COBIT, ITIL, Six Sigma, and CMM, CMMI.
In this trend towards embracing principles of organizational IT Service
Management, the IT Infrastructure Library (ITIL) has become the worldwide de
facto standard in Service Management. It is a set of books describing IT management
processes and practices [45].
Globally, most of the IT organizations are currently focused on using ITIL
to implement and improving IT Support and Delivery processes.
3
1.2 Background of the problem
In today’s global economy, outsourcing has become a very common
phenomenon. Many large organizations have outsourced some or all of their IT
functions. Factors like lower costs, improved productivity, higher quality, higher
customer satisfaction, time to market, and ability to focus on core areas are some of
the benefits of outsourcing [2].
However, there are many challenges and risks associated with outsourcing
like Management challenges, Cultural/language communication risks, Security risks,
Knowledge transfer challenges, loss of flexibility in reacting to changing business
conditions, lack of customer focus, contractual misunderstandings, Hidden costs, and
maintaining outsourcing relationships[2].
The Centre for Information and Communication Technology (CICT) in UTM
is responsible for ensuring that staffs and students have access to teaching, learning
and research resources by providing the University's IT infrastructure, acquiring,
developing and supporting new and emerging technologies and systems, and
providing access to millions of digital resources across the University's campuses.
The vision of CICT is to become the source of quality and innovative ICT services
towards achieving the University's aspirations.
It had and has many programs for achieving these goals and objectives, such
as Human Resource System, Finance System, Document Management, Enterprise
Portal, Smart Card System, Business Intelligent and others. CICT uses outsourcing
for some of these projects. In spite of many advantages that outsourcing brought for
them, they are facing some problems like misunderstanding, quality, cost problems.
4
According to the cited problems, it is so important to have a well managed
plan for outsourcing actions. Furthermore ITIL is not only an effective tool for managing internal IT processes. It can also serve as a framework for managing the relationship with an outsourcing service provider. 1.3 Statement of the Problem
This research attempts to find the answers to some problems related to:
i. What is CICT situation and its problem when conducting with the
software development outsourcing projects?
ii. What are the elements in ITIL v3 framework that are suitable for this
case study?
iii. How to best manage software development outsourcing projects?
iv. How ITIL can be used to manage CICT outsourcing projects?
In this research is intended to use a relevant research methodology to analyze
the data that will be gathered and arrive with the suggestions for the improvement
that can benefit the organization, which would enhance outsourcing management
performance.
5
1.4 Project Objectives
This project will focus on the following five objectives:
i.
To identify challenges and problems those arise during outsourcing
project.
ii.
To understand the CICT situation and its problem when conducting
with the outsourcing, especially software development outsourcing
projects.
iii.
To analyze of how a manager can manage and supervise outsourcing
projects and give some suggestions which arise from ITIL
methodology.
iv.
To determine elements in ITIL v3 those are suitable for adapting to
CICT to manage the outsourcing projects.
v. To propose a framework towards the adoption or adaptation of ITIL
for the Software Development Outsourcing Projects.
1.5 Scope of the project
This study will concentrate on the Outsourcing projects, especially software
development outsourcing, it’s conducting problems and challenges, and as a case
study CICT will be analyzed. In this project, Information Technology Infrastructure
Library (ITIL) will be used for solving the problems associated with outsourcing, so
it will cover an overall view of ITIL V3 Framework and it component.
6
1.6 Importance of the project
When someone decided to use outsourcing services, it is imperative to:
•
Select the right partner
•
Identify issues related to outsourced project management.
•
Improve outsourcing management issues
Furthermore, it is important to understand the:
•
Security during outsourcing
•
Relationship with the outsourcer
•
Relevant risks
•
Process used for development a contract
To ensure the success of outsourcing, the client and provider are required to
confront some critical challenges. The outsourcings should be govern to control and
mitigate the risks and to ensure that the outsourcing deliver value to the organization
[63].
So, this research project will significantly focus on find the problems of
outsourcing and try to give some solutions using ITIL framework. In other words, it
will try to implement the ITIL framework for managing the software development
outsourcing projects. The main aim of this project is to propose a framework for
governing the Software Development Outsourcing.
7
1.7 Chapter Summary
Introduction of the research project, background of the problem, statement of
the problem, problem objectives, and scope of the project was identified in this
chapter.
CHAPTER 2
LITRITURE REVIEW
2.1 Introduction
The Literature Review covers all the areas that are of interest to the research
study. The purpose of this chapter is to aid the author in having deeper knowledge
and understanding on the research areas. Some concepts such as definitions,
technologies, best practices and case studies of the current system will be analyzed.
For readers, this chapter provides a general view of subject background, problems
and some useful solutions.
The study areas that shall be discussed are divided into five main themes that
are the Outsourcing, IT Governance, ITIL, ITIL V2 overview, ITIL V3 and also
CICT problems. Figure 2-1 shows the Literature Review framework of the project.
9
Literature
Review 2.2 Outsourcing
2.2.1 Definition of outsourcing
2.2.2 Types of Outsourcing
2.2.3 Software Development
2.2.4 Outsourcing advantages
2.2.5 Outsourcing disadvantages
2.2.6 Steps of Outsourcing
2.2.7 Case Study
2.2.8 Outsourcing Governance
2.3 IT Governance
2.3.1 IT Governance Definition
2.3.2 IT Governance focus Areas
2.3.3 IT Governance Frameworks
2.4 ITIL
2.4.1.1 Benefits
2.4.2 ITIL Evolution
2.4.2.1 ITIL v2 vs. V3
2.4.2.2 ITIL V3 Books
2.4.2.2.1 Service
strategy
2.4.2.2.2 Service design
2.4.2.2.3 Service
transition
2.4.2.2.4 Service
operation
2.4.2.2.5 Continual
2.5 Conclusion
Figure 2.1 Literature Review Framework
Service Improvements
10
2.2 Outsourcing
Due to rapidly Advances in technology, increasingly demand for IT
applications and the inadequate supply of IT personnel [1], Managers and senior
executives are becoming increasingly aware of challenges and opportunities in order
to be more efficient and effective in delivering products and services to customers
While the changing nature of competition has placed firms under heavy pressure to
rapidly develop and commercialize new innovations to ensure their survival, the
successful release of new products undoubtedly brings firms plenty of profits and
revenue growth. To remain competitive, firms must also pursue product innovation
through both internal and external services [6]. Generally, the term “outsourcing” is
used to describe external providing of services.
The outsourcing of IT can be traced back to the 1960s when computers were
expensive and physically large. During that period, computers required considerable
space and controlled environmental conditions so as to operate them successfully.
This situation demanded that companies had to make substantial capital investments
in order to have their own computing facilities. In order to avoid such expenditure,
many organizations contracted out their routine data processing, particularly payroll
and accounting, to large data-processing service bureau [1].
In today’s global economy, outsourcing has become a very common
phenomenon. Many large organizations have outsourced some or all of their IT
functions. Factors like lower costs, improved productivity, higher quality, higher
customer satisfaction, time to market, and ability to focus on core areas are some of
the benefits of outsourcing. However, there are many challenges and risks associated
with IT outsourcing [2].
11
2.2.1 Definition of Outsourcing
In broad terms Outsourcing refers to a company that contracts with another
company to provide services that might otherwise be performed by in-house
employees [3]. Outsourcing is usually used when a company takes a part of its
business and gives that part to another company [4]. In other word, Outsourcing is an
approach to task management that involves utilizing resources that are outside the
direct control of the company to handle tasks that are relevant to the operation and
success of the business [14]. The outside firms that are providing the outsourcing
services are third-party providers, or as they are more commonly called, service
providers.
But as a complete definition, Outsourcing is as an act of delegating or
transferring some or all of the IT related decision making rights, business processes,
internal activities, and services to external providers, who develop, manage, and
administer these activities in accordance with agreed upon deliverables, performance
standards and outputs, as set forth in the contractual agreement. Typically, the
function being outsourced is considered non-core to the business [24].
Generally, this involves contracting with a service provider to handle the
specific function for a specific period of time and with guidelines that are agreeable
to both parties. In some cases, the service may be granted limited power to act in the
stead of the client, if that is necessary to perform the contracted tasks [14].
The recipients for outsourced activities are generally in the same country.
When a company on another country is involved e.g. India, the correct term to use is
“offshore outsourcing”. “Nearshore outsourcing” refers to outsourced projects that
are outside the country, but on the same continent e.g. a US company outsourcing.
12
In recent times, the Outsourcing has been most commonly used for
technology related initiatives such as handing over the IT help-desk to a third-party.
But it can also refer to non-technical services such as handing over the telephonebased customer service department [4].
Deliver determined product
Client
Vendor
Payment
Figure 2.2 Outsourcing
2.2.2 Types of Outsourcing
Whereas Outsourcing has become an increasingly important issue for many
organizations, it categorized in different types. this categorization is based on the
nature of work being outsourced.
•
Business Process Outsourcing (BPO): The first type, BPO, is the contracting
of a specific business task to a third-party service provider. Originally, this was
associated with manufacturing firms, such as Coca Cola that outsourced large
segments of its supply chain. In the contemporary context, it is primarily used to
refer to the outsourcing of services. It includes call center outsourcing, human
13
resources outsourcing (HRO), finance and accounting outsourcing and payroll
and claims processing outsourcing [9, 8]. Many of these BPO efforts
involve offshoring -- hiring a company based in another country -- to do the
work. India is a popular location for BPO activities [8].
•
Information Technology Outsourcing (ITO): The second is Information
Technology Outsourcing. It is a company's outsourcing of computer or Internet
related work, such as programming, to other companies. It is used in reference
to Business Process Outsourcing or BPO, which is the outsourcing of the work
that does not require much of technical skills. ITO includes IT services,
technical support, software testing, and website management outsourcing [9].
•
Software development outsourcing (SDO): The third type is Software R&D or
also known as software development outsourcing. It is provision of software
development services by an external supplier [7]. I will go details of this part,
because my focus is on the SDO projects.
•
Knowledge Process Outsourcing (KPO): The forth one, KPO, is a form
of outsourcing, in which knowledge-related and information-related work is
carried out by workers in a different company or by a subsidiary of the same
organization. Unlike the outsourcing of manufacturing, this typically involves
high-value work carried out by highly skilled staff. KPO firms, in addition to
providing expertise in the processes themselves, often make many low level
business decisions—typically those that are easily undone if they conflict with
higher-level business plans [10].
•
Legal process outsourcing (LPO): Finally, LPO is an activity or practice to get
legal support services from legal services' firms or corporations. In the
14
beginning, LPO covered mostly low-end transcription work (Data management,
Word Processing, Litigation support, Book-keeping and reconciliations etc.) but
now it includes a huge range of legal processes, such as patent application
drafting, legal research, pre-litigation documentation, advising clients, writing
software licensing agreements and drafting distribution agreements[11].
2.2.3 Software development
A software development process is a structure imposed on the development
of a software product. Synonyms include software life cycle and software process.
2.2.3.1 Software development life cycle (SDLC)
SDLC is a process of logical stages taken to develop a software product. The
six stages of the SDLC are designed to build on one another, taking the outputs from
the previous stage, adding additional effort, and producing results that leverage the
previous effort and are directly traceable to the previous stages. This top-down
approach is intended to result in a quality product that satisfies the original intentions
of the customer [64]. Figure 2.4 illustrates SDLC stages.
15
Project
Planning
Requirements
Definition
Design
Development
Integration &
Test
Installation
&Acceptance
Figure 2.3 SDLC Stages
2.2.3.1.1 Planning Stage
The planning stage establishes a bird's eye view of the intended software
product, and uses this to establish the basic project structure, evaluate feasibility and
risks associated with the project, and describe appropriate management and technical
approaches.
16
Figure 2.4 Input and output of planning stage [64]
The outputs of the project planning stage are the configuration management
plan, the quality assurance plan, and the project plan and schedule, with a detailed
listing of scheduled activities for the upcoming Requirements stage, and high-level
estimates of effort for the out stages.
2.2.3.1.2 Requirements definition Stage
The requirements gathering process takes as its input the goals identified in
the high-level requirements section of the project plan. Each goal will be refined into
a set of one or more requirements.
These requirements define the major functions of the intended application,
define operational data areas and reference data areas, and define the initial data
entities. Major functions include critical processes to be managed, as well as mission
17
critical inputs, outputs and reports. A user class hierarchy is developed and
associated with these major functions, data areas, and data entities.
Figure 2.5 Input and output of requirements definition stage [64]
The outputs of the requirements definition stage include the requirements
document, the RTM, and an updated project plan.
2.2.3.1.3 Design Stage
The design stage takes as its initial input the requirements identified in the
approved requirements document. For each requirement, a set of one or more design
elements will be produced as a result of interviews, workshops, and/or prototype
efforts.
18
Design elements describe the desired software features in detail, and
generally include functional hierarchy diagrams, screen layout diagrams, tables of
business rules, business process diagrams, pseudo code, and a complete entityrelationship diagram with a full data dictionary. These design elements are intended
to describe the software in sufficient detail that skilled programmers may develop the
software with minimal additional input.
Figure 2.6 Input and output of Design stage [64]
When the design document is finalized and accepted, the RTM is updated to
show that each design element is formally associated with a specific requirement.
The outputs of the design stage are the design document, an updated RTM, and an
updated project plan.
19
2.2.3.1.4 Development Stage
The development stage takes as its primary input the design elements
described in the approved design document. For each design element, a set of one or
more software artifacts will be produced. Software artifacts include but are not
limited to menus, dialogs, data management forms, data reporting formats, and
specialized procedures and functions. Appropriate test cases will be developed for
each set of functionally related software artifacts, and an online help system will be
developed to guide users in their interactions with the software.
Figure 2.7 Input and output of Development stage [64]
The outputs of the development stage include a fully functional set of
software that satisfies the requirements and design elements previously documented,
an online help system that describes the operation of the software, an implementation
map that identifies the primary code entry points for all major system functions, a
20
test plan that describes the test cases to be used to validate the correctness and
completeness of the software, an updated RTM, and an updated project plan.
2.2.3.1.5 Integration and test Stage
During the integration and test stage, the software artifacts, online help, and
test data are migrated from the development environment to a separate test
environment. At this point, all test cases are run to verify the correctness and
completeness of the software. Successful execution of the test suite confirms a robust
and complete migration capability.
During this stage, reference data is finalized for production use and
production users are identified and linked to their appropriate roles. The final
reference data (or links to reference data source files) and production user list are
compiled into the Production Initiation Plan.
21
Figure 2.8 Input and output of Integration and Test stage [64]
The outputs of the integration and test stage include an integrated set of
software, an online help system, an implementation map, a production initiation plan
that describes reference data and production users, an acceptance plan which
contains the final suite of test cases, and an updated project plan.
2.2.3.1.6 Installation and Acceptance Stage
During the installation and acceptance stage, the software artifacts, online
help, and initial production data are loaded onto the production server. At this point,
all test cases are run to verify the correctness and completeness of the software.
Successful execution of the test suite is a prerequisite to acceptance of the software
by the customer.
22
After customer personnel have verified that the initial production data load is
correct and the test suite has been executed with satisfactory results, the customer
formally accepts the delivery of the software.
Figure 2.9 Input and output of installation and acceptance stage [64]
The primary outputs of the installation and acceptance stage include a
production application, a completed acceptance test suite, and a memorandum of
customer acceptance of the software. Finally, the PDR enters the last of the actual
labor data into the project schedule and locks the project as a permanent project
record. At this point the PDR "locks" the project by archiving all software items, the
implementation map, the source code, and the documentation for future reference.
23
2.2.3.2 Software development Outsourcing (SDO)
Outsourced product development has become the most feasible solution in
the IT world for the development of software products. This is because not only is it
cost effective but it’s the sure shot means for producing top-quality products. There
are very many outsourced product development firms that are ready to undertake this
task at a reasonable cost without compromising on quality. Not only that, they also
bring in new and innovative ideas in product development.
The term software outsourcing has been described as a situation where in a
customer contacts a software development company for the part or complete
development of a software product or delivering an IT enabled service. The software
outsourcing with an external organization can be for development of complete or
partial software products, the purchase of packaged or customized software products
or involving the vendor in the full software development cycle & also contract with
him for maintenance after delivery [65].
Most companies take up the option of outsourcing the development phase of
software due to several factors such as to minimize costs, bring in additional
resources or channelize their time and resources for core activities. Whatever be the
reason, outsourced product development is now making quite a stir in the IT world.
The different types of software outsourcing can be broadly described as below:
I. In-house software development (no outsourcing): Many organizations
have their own IT departments catering to their software needs. These
24
organizations develop the required software and information systems
within their own capacity and productivity limits.
II. Product Component outsourcing: In product component outsourcing, the
developer is contracted to develop one or several parts of a software
system. In case of complex systems when the organization does not have
the capacity or required skill to develop a particular component such
component is outsourced.
III. Process Component Outsourcing: In outsourcing parts of software
development cycle, the customer organization contracts for an external
group to perform all or certain functions of one or more of their process
steps or components.
IV. Software Acquisition (Total outsourcing): In this type, the organization
outsource each and every activity associated with the software which
includes design, development, programming, testing and maintenance .The
main reason for such type of outsourcing is to focus on the organizations
core values.
2.2.4 Steps of Outsourcing
With the development of the complex and strategic of outsourcing, IT
outsourcing decision becomes more complex [14]. The decision to outsource IT is
25
not an easy one to make. Experience highlights that it demands considerable
managerial attention and should not be made without rigorous analysis and
discussion [1]. Figuring out whether or not the company should pack up some part of
production and ship it to outsourcers can be a difficult choice to make [12].
Each business will have different priorities and concerns, which will drive the
outsourcing decision. The selection process needs to be rigorous [15].
Outsourcing needs to be undertaken systematically and handled like any other
major business project. Outsourcing is still too often driven by gut feel, promises of
short-term gains and response to the smart sales staff of the outsourcing service
providers [15]. It can offer definite advantages, but only if it’s done right. To do the
job properly a number of steps need to be considered by the business in its
considerations of outsourcing strategies and plans.
26
1
Understand Company’s
objective, business
strategy, mission and vision 2
Plan the RFI
3
4
5
6
Prepare the RFP
Vender Selection
Contracts and negotiation
Ongoing supplier
management
Figure 2.10 Steps of Outsourcing
Step1: Understand Company’s objective, business strategy, mission and vision.
The client company needs to understand its mission, vision and business
strategy to decide if outsourcing and partnering are viable strategic options. The
mission and objectives of the business must be understood together with the critical
success factors, in particular in terms of customer and shareholder demands.
Outsourcing of complete processes should be the aim, but before that decision is
made, the core competencies must be identified and understood [15].
27
Also company needs to describe the process, service or product that they
want outsourced clearly. They should indicate what their goals are through
outsourcing [18].
Step2: Find out all you need to know about the vendor (Plan the RFI)
This stage of the process begins testing of the market for vendor resources
which have the skills, interest, capability and equally as important, the corporate
culture and flexibility to become the company’s outsourcing partner. This stage
anticipates the preparation and issuance of a Request for Information (RFI) to the
specific market sector [19]. The RFI provides material for the first rounds of vendor
evaluations. It also spells out the business requirements defined by the core team, so
the vendor understands what the company is trying to accomplish [18].
Frequently, candidate vendors are already known by the company through
past or existing supplier/vendor relationships. Care should be taken during this Step
to test the management philosophy of the vendor with regard to customer care and
protection, degree of service level commitment, and overall business philosophy.
Other areas for investigation include historical performance as measured by client
reference, vendor outsourcing market share & experience, and overall approach to be
a partner in the outsourcing program. The RFI provides the outsourcing vendor the
opportunity to describe his skills, to show his wares and to reveal his philosophical
viewpoints on the conduct of business [19].
28
Contents of RFI
•
The type of information usually sought by RFI’s includes things such as:
™ The availability of equipment or needed services.
™ The approximate one time and recurring costs.
™ The differentiating factors between the goods or services proposed
and similar offerings from other vendors.
•
The latter is very useful in providing information to help determine
mandatory and desirable characteristics to be included in an RFP.
After vendors return the questionnaire, the issuing company matches the
vendors’ responses to the company’s requirements and weights the criteria based on
importance. Providers that don’t meet stated needs or haven’t responded to the
specific questions are eliminated.
Eventually, the RFI process helps companies make the "go or no go"
decision—that is, the choice to proceed with or walk away from a project. The data
solicited identifies the availability and viability of outsourcing, cost estimate ranges,
and risks. It also provides detail useful for developing project requirements [18].
Step 3: Prepare the RFP
The third step is to develop the RFP; send it to short-listed suppliers; evaluate
them; and, finally, select the best ones.
29
The RFI and RFP are complementary. Information collected during the RFI
process can prepare the solution requirements section of the related RFP. Leveraging
the information-gathering focus of the RFI will lead to a concise RFP that articulates
the business needs [18]. But Unlike a Request for Information (RFI), an RFP is
designed to get suppliers to provide a creative solution to a business problem or
issue. RFPs should be used carefully since they can take a lot of time for both the
organization and its suppliers. However, for more complex projects, an RFP may be
the most effective way to source the goods or services required [20, 21].
The RFP outlines the engagement’s requirements—relevant skill sets,
language skills, intellectual property protection, infrastructure, and quality
certifications—and gives prospective vendors the information necessary to prepare a
bid. The responsibility of developing the RFP rests with the project’s sourcing
leader, but various aspects of the document will require input from other domain
experts [18].
A good RFP includes one section that states what the company seeks
(business requirements) and four sections that ask about the vendor and what it will
be able to provide [18]:
•
Business requirements. In brief, this section details the company’s project
goal, deliverables, performance and fulfillment requirements, and liquidity
damages.
•
Vendor profile. External service providers differ greatly in performance,
style, and experience. This part of the RFP details the vendor’s stability,
services, and reputation.
•
Vendor employee information. This section addresses the resources
assigned at the project management, middle management, team leader, and
task levels, along with the quality of people, their skills, training,
30
compensation, and retention. If the company ranks technical skills highest
should look at technical expertise before examining costs.
•
Vendor
methodology.
The
methodology
segment
details
project
management, quality, regulatory compliance and security.
•
Infrastructure. This part outlines the vendor’s infrastructure stability and
disaster-recovery abilities.
Step4: Vender Selection
After vendors have sent their RFP responses, the evaluation is begun. When
vendors respond to an RFP, if the proposal meets the stated requirements, each
vendor must then undergo a due diligence review [18].
In depth due diligence takes place s to ensure that the vendors are financially
sound and likely to be able to deliver as promised. Activity levels, the impact of
changes in activity levels, the performance KPIs and the measurement processes are
just some of the factors agreed together with service level agreements (SLAs), all
specified in clear, unambiguous, measurable form [15].
The length and formality of the due diligence process varies according to
companies’ experience with outsourcing, the timeline for implementing outsourcing,
the risk, and familiarity with the vendor [18].
31
Step5: Contracts and negotiation
Negotiations and contracts with an outsource provider are a complex area
requiring procurement and negotiation skills as well as legal skills and in-depth
knowledge of the subject matter under consideration, i.e. experts who understand the
current processes and their scope, strengths and weaknesses [15, 21].
Contracts are about identifying costs and deliverables, sharing of risk, service
levels agreements and control processes. Negotiations are a prime opportunity for the
outsourcing partner to add income without increasing effort and for the client
company to add value without adding cost. This is not a trivial activity and requires
much skill and tenacity [15].
Step6: Ongoing supplier management
Once the Outsourced programme is implemented, there is an ongoing need
for supplier relationship management to ensure that the outsourced process is fully
integrated with the business and the process performance is monitored to meet
contractual as well as business needs is safeguarded. If critical business processes are
outsourced it is paramount that the supplier is integrated into the client's management
processes and communications [15].
32
2.2.5 Advantages of Outsourcing
Organizations who are interested in outsourcing are often curious to know
more about advantages and disadvantages of outsourcing. By gaining insight about
both the good and bad of outsourcing, organizations can decide if outsourcing is right
for them. Most organization jump headlong into outsourcing, without actually
finding out if outsourcing is good for their business. The advantages and
disadvantages of outsourcing can help the organization decide if outsourcing is right
for their business [15]. There are several good reasons to consider outsourcing,
including:
I.
Cost Reduction: One of the most common benefits is cost reduction. What this
means is that an organization delegates a job to a vendor who can perform the
same job at a much lower cost. The comparative cost advantage that a vendor
offers forms the basis for outsourcing [1, 2, 13, 15, 22, and 23]. Depending on
the function, there is a good chance that choosing to outsource the task will be
cheaper than buying necessary equipment, hiring and training personnel, and
actually doing the work necessary to successfully complete the task [13].
II.
Focus on core business: Another advantage of outsourcing is that it allows
company to focus on core business processes and activities [2, 13, 15, 21, and
22] and to improve its competitive advantage to enable organization’s strategic
goals, quality and reliability, professional services, and higher customer
satisfaction [2]. In other words, the operating principle is to retain the activities
that deliver customer value and shareholder value and outsource the rest.
On the other hand, Outsourcing system allows companies to contract for services
that are not within the scope of their expertise, so that they can focus their time,
33
money and energy on their core competencies instead of wasting valuable
resources trying to gain Understanding of areas that are somebody else's
expertise [22].
III.
Reduce capitalization and their fixed cost base: Some organizations outsource
to reduce capitalization and their fixed cost base. In order to flex business
volumes and product mix in a business dealing with heavily fluctuating demand,
the asset base needs to be kept low. Business assets include all assets of the
business such as fixed assets, inventories and human assets (i.e. permanently
employed staff). Outsourcing some or all of the asset intensive activities such as
manufacturing may be a good way of achieving that [1, 15].
IV.
Access to specialist resources: It is sometimes possible to gain access to
specialist resources by outsourcing. By outsourcing company can get expert and
skilled services Service levels can be increased by appreciating that a company
is unlikely to be good at everything and that specialist suppliers can add
significant value by applying their specialist skills - and possibly economies of
scale - on behalf of their customers [15, 1].
V.
Increase productivity: Productivity means getting more accomplished starts
outsourcing; it must break down duties into smaller tasks. These tasks become
part of an organized process, where each person involved becomes an efficient
specialist, as opposed to a generalist who tries to do everything.
When workers are able to focus on a limited number of tasks, they will become
more efficient in performing their duties. They know what is expected from
them and they are not distracted by having new demands put on them. When
34
someone is trying to juggle too many conflicting tasks at once, the person won’t
be able to do all of them well [25].
VI.
Access better technology at a lower cost: Technology is changing rapidly and
it is expensive for companies to keep up with the latest advances. Instead of
investing the considerable financial resources necessary to continuously upgrade
equipment and train staff, it may make more sense to “borrow” the technology
from a company that has already made this investment.
When a company enters into an agreement with another company to provide
some services involving new technology, both parties benefit. One of them reaps
the benefit of the other company’s investment and the company that already
bought the equipment gains needed capital [25].
VII.
Make faster deliveries to customers: Another benefit of outsourcing is that
company can make quicker deliveries to customers. Third-party contractors will
be able to provide faster deliverables because the existence of a contract puts
pressure on the supplier, compared with internal development, to deliver a
quality product on time and within budget, and the company in turn will be able
to make quick deliveries to its customer. Faster deliveries can also help them
save on time [1].
VIII.
Improved customer satisfaction: With timely deliveries and high-quality
services you can impress your customers. Outsourcing can help you benefit from
increased customer satisfaction and your customers will remain loyal to your
organization [26].
35
IX.
Share Risk: Investing in new technology can be a risky proposition for
businesses today. Rather than putting up its own funds, it may make more sense
for a business to use outsourcing to ensure that the technology available to them
is always up to date and relevant to their needs [26].
Apart from the above factors there are other reasons as to why a company
would want to outsource. These include:
9 Improving technical expertise.
9 Gaining access to technical talent and technical expertise not available inhouse.
9 Gaining access to new technologies.
9 Improve efficiency
9 Save on manpower and training costs
9 Increase flexibility
2.2.6 Disadvantages of outsourcing
While the benefits of outsourcing can be obvious and immediate, there are
still a few potential disadvantages to keep in mind. Often, these are minor, and may
not even be issues at all in some situations. However, every organization can and
should consider them before choosing to outsource any company function.
Disadvantages of outsourcing are:
36
I.
Loss of real-time control: When any given business function is conducted inhouse, it is a simple task to step in and order some type of a change if necessary.
For example, when billing is done in-house, it is very easy to apply a credit to a
customer invoice when the product or service did not live up to the promises
made to the client. If the billing process is outsourced, there may be several steps
to go through in order to submit a credit. Even then, if the invoice is already
generated, there may be no way to apply the credit in real time, or there may be
an extra charge for the service [13].
II.
Threat to Security and Confidentiality: It is possible that since data is moved
around, leakages or even misuse of information can happen especially in
sensitive industries such as those in the technology sectors. Also the knowledge
obtained by the supplier from the company may be transferred to competitors
[54].
III.
Hidden Costs: Anything not covered in the contract will be the basis for the
company to pay additional charges. Additionally, it will experience legal fees to
retain a lawyer to review the contacts will be signed. This is the outsourcing
company's business. They have done this before and they are the ones that write
the contract. Therefore, you will be at a disadvantage when negotiations start
[55]. IV.
Communication is very crucial: Working miles away, may lead to loss of data
or inappropriate data if not handled wisely which may lead to misunderstanding
[56].
37
V.
Loss of internally generated talent: It may hamper the growth of an employee
by depriving him from the experience he would have gained by handling the
business issue himself [56].
Also it has some other disadvantages like:
9 Possible loss of flexibility in reacting to changing business conditions.
9 Maybe some Quality problems
2.2.7 Case study
2.2.7.1 Duct layout industry
The client is a leading US-based player in the global duct layout industry
space. They needed a partner who could handle their outsourcing services that
included duct design and drafting, duct Layout, financial, software development
and website analytics services. In the Ducting design arena, the partner would need
to understand the ducting industry, interact with both the development team at the
customer’s engineering department and the customer’s dealers, and design duct
layouts for specific industries all over USA. Down the line, the partner would need to
generate invoices from drawings produced, handle online updating of the customer’s
product lines, and expand services to the customer’s overseas offices in UK.
38
The Challenge
The number of drawings that the customer needed to provide its dealers was
growing at an enormous rate, and they needed drawings with a quick turnaround
time. Outsource2india was approached by the company with the task of learning
about their line of products, and using both commercial software as well as software
developed by them to design duct layouts.
The challenge lay in the fact that drawings had to be professionally drawn
with a high degree of accuracy, and should easily be modifiable. The bigger
challenge was that the turnaround time would need to steeply increase with time to
meet the high demands from growing demands from the customer’s side. Demands
have since grown by a factor of 10.
The Solution
Outsource2india quickly started the process at a small size and quickly
ramped up the quality and turnaround time by which the drawings were delivered. A
team was set up to manage key CTQs (Critical To Quality parameters).
In three months, their ability to deliver drawings had increased threefold.
Given the volume of the drawings, they shifted to the FTE model and had engineers
from Outsource2india serving as part of the customer’s team in the US.
39
Within another month, orders had grown almost 10- fold. Maintaining the
highest level of quality, the output was matching demand. The illustration shows
how the demand for drawings grew over 7 months, all the demand being met by
engineers at Outsource2india.
The Results
Quality: Accuracy of the drawings produced at O2I was so high that
inventory planning and invoicing started to be carried out based on these drawings.
Value: Use of automation through programming is delivering not only
productivity but also increasing accuracy of work carried out every day..
So far, Outsource2india has crossed over 330 projects in 10 months. A highly
satisfied client has decided to extend his requirements to other services. Soon, they
started developing software, providing Data management solutions, financial
40
services, and Website optimization services. So it brings them cost saving and high
quality product.
2.2.7.2 Contact Advocate Contact Advocate is into offering event planning and management services to
various industries. Business meetings, conferences of companies is handled
efficiently may it be at a national or local level.
The Challenges
With a ever growing business, Contact Advocate wanted a secure event
planning system that would help the company meet its requirements on a real time
basis. Company could not have offered a big sum to any service provider. So what
Contact Advocate wanted was a cost effective, innovative and a user-friendly system.
Solution
MachroTech had utmost faith in what CA was doing, hence decided to
partner with it. Machrotech decided to develop the system in coordination with its
outsourcing development center in India, knowing that budget was a constraint for
Contact Advocate. Contact Advocate provides tools for organizations through which
they can manage their events like meetings, easily and effectively. MachroTech’s
outsourcing development team developed some really exclusive features within the
system. This system provides proprietary event matching engine, which would match
41
the events, to the users profile given in the database. The system also has a unique
system of automatically sending mails to users, which would match their interests.
Another feature is the InfiNet Network. This system intelligently finds the common
link in the users address book and determines the best path through which the desired
individual would be contacted. Everything was done securely. The users had total
freedom and control over whom they wanted to help make business connections.
Results
MachroTech's Global Software Delivery model enabled CA to take the software to
market in less than 10 weeks. One event that CA promoted recently,in Stamford,
Connecticut drew over 200 attendees and 30 walk-ups despite a snowstorm! That is
because the event leveraged online registration and email marketing to promote and
manage the event. Ultimately, the cancellation rates were extremely low and the
satisfaction rates high because of the user-friendliness of the system and its tools.
Some interesting statistics gathered from management personnel:
•
Attendance expectations were surpassed by 100% using the Contact
Advocate tools
•
Actual revenue surpassed expected revenue by 75%
•
The cancellation rate was less than 2%
•
Walk-up represented an additional 30%
•
Overall satisfaction of the online registration process was high
42
2.2.8 Outsourcing Governance
Outsourcing is the mechanism that allows organizations to transfer the
delivery of services to third parties. Fundamental to outsourcing is accepting that,
while service delivery is transferred, accountability remains firmly with the remit of
the client organization, which must ensure that the risks are managed and there is
continued delivery of value from the service provider. Transparency and ownership
of the decision-making process must reside within the purview of the client [58].
In outsourcing relationships there is an emerging interest in IT governance [1,
59, and 60]. IT governance is specifying the decision rights and accountability
framework to encourage desirable behavior in using IT [61].
As a strategic resource, outsourcing must be governed accordingly. This is
not just about purchasing but about effective management and ensuring that both
parties benefit. Governance of outsourcing is the set of responsibilities, roles,
objectives, interfaces and controls required to anticipate change and manage the
introduction, maintenance, performance, costs and control of third-party provided
services. It is an active process that the client and service provider must adopt to
provide a common, consistent and effective approach that identifies the necessary
information, relationships, controls and exchanges among many stakeholders across
both parties [58].
To ensure the success of outsourcing, the client and provider are required to
confront some critical challenges, which are illustrated in Figure 2.11. When the
client transfers an internal capability to an outside party, they lose some control over
that capability [62].
43
Figure 2.11 outsourcing challenges [62]
The organizational and technical challenges brought by outsourcing force the
client and the provider to establish or redesign corresponding governance
mechanisms such as processes to deal with the changes. All of these should be
governed in a consistent and effective way. The issues addressed by governance are
mainly in two categories [63]:
(1) To ensure that outsourcing delivers value to organization. Pursuit for
long–term business needs and competitive advantage has driven the need of strategic
outsourcing, which has become an important consideration in the strategy making
process in every business. Two issues should be explored to reach the ideal state: Is
the company getting the outsourced done well? Is the company getting benefits from
outsourcing? They are related to outsourcing performance and benefits.
(2) To control and minimize the risks. The risks of outsourcing highlight
the need both to outsource the right things and to outsource them in the right way.
They are related to outsourcing decision and processes. Mitigation of risks is also
44
driven by embedding accountability into the business. Therefore, the ownership and
accountability for outsourcing decisions should be assigned appropriately.
Therefore, the five aspects of outsourcing including outsourcing decisions,
processes, benefits, performance, and accountability should be governed effectively.
The loop of outsourcing governance is illustrated in Figure 2.12.
Outsourcing
Decisions
Do right things
Outsourcing
Processes
Outsourcing
Accountability
Do things right
Clear accountability
Outsourcing
Benefits
Get benefits from things
Outsourcing
Performance
Do things well Figure 2.12 Key Aspects of Outsourcing Governance
45
2.3 IT Governance
Information Technology (IT) plays a vital role in managing transactions,
information & knowledge that is necessary to initiate and support economic and
social activities. In many organizations, IT is essential and an integral part of the
business to support, sustain and grow the business [27, 28].
Over the years, IT has become the backbone of businesses to the point where
it would be impossible for many to function (never mind succeed) without it. IT is no
longer separate from but is an essential element of the enterprise [32]. As a result of
its increasing role in the enterprise, the IT function is changing.
Figure 2.13 Evolution of the IT Function within organizations [33]
When evolving from technology providers into strategic partners, IT
organizations typically follow a three-stage approach as depicted in Figure 2.13.
Each evolutionary stage builds upon the others beginning with IT infrastructure
46
management (ITIM). During this stage, the IT organizations focus on improving the
management of the enterprise infrastructure. Effective infrastructure management
means maximizing return on computing assets and taking control of the
infrastructure, the devices it contains and the data it generates. The next stage, IT
service management (ITSM), sees the IT organizations actively identifying the
services its customers need and focusing on planning and delivering those services to
meet availability, performance, and security requirements. In addition, IT is
managing service-level agreements, both internally and externally, to meet agreedupon quality and cost targets. Ultimately, when IT organizations evolve to IT
business value management (IT Governance), they are transformed into true business
partners enabling new business opportunities. In that stage, IT processes are fully
integrated with the complete lifecycle of business processes improving service
quality and business agility [33].
IT without governance is reactive, unable to plan, acquire or develop the
correct skills or understand priorities. For instance, without a structured process, all
projects are number-one priorities. With budgets being flat or minimally increasing,
it is difficult to know where to focus. IT governance processes allow IT to
understand and manage IT-enabled business change. The business determines
priorities and defines investments, allowing IT to identify their staffing requirements
and make investments in the correct skill sets or training at the correct time, ensuring
value to the organization [28].
Boards and executive management need to extend governance to IT and
provide the leadership, organizational structures and processes that ensure that the
enterprise’s IT sustains and extends the enterprise’s strategies and objectives. IT
governance is not an isolated discipline. It is an integral part of overall enterprise
governance. The need to integrate IT governance with overall governance is similar
to the need for IT to be an integral part of the enterprise rather than something
practiced in remote corners or ivory towers [27].
47
With the huge growth of IT spending in organizations and the strong evidence
toward better IT decision making, it is time to make IT governance more
professional[30].Every organization, large and small, public and private, needs a way
to ensure that the IT function sustains the organization’s strategies and objectives.
The level of sophistication that the company applies to IT governance, however, may
vary according to size, industry or applicable regulations. In general, the larger and
more regulated the organization, the more detailed the IT governance structure
should be [29].
2.3.1 Definition of IT Governance
At its basic definition, “IT governance is the process by which decisions are
made around IT investments. How decisions are made, who makes the decisions,
who is held accountable, and how the results of decisions are measured and
monitored are all parts of IT governance” [34].
Gembergene [35] defines IT governance as “the organizational capacity
exercised by the board, executive management and IT management to control the
formulation and implementation of IT strategy and in this way ensure the fusion of
business and IT”.
In 2001, the IT Governance Institute (ITGI) suggested that the “IT
Governance is the responsibility of the Board of Directors and executive
management. It is an integral part of enterprise governance and consists of the
leadership and organizational structures and processes that ensure that the
48
organization’s IT sustains and extends the organization’s strategy and objectives”.
Key to this definition is the notion of alignment of the IT with the Business also
referred to as Strategic Alignment [27, 32].
IT governance also defined as the strategic alignment of IT with the business
such that maximum business value is achieved though the development and
maintenance of effective IT control and accountability, performance management,
and risk management [36].
Governance is used to describe many different aspects of IT change. At the
low level, it is sometimes used to describe project management and control. More
often it is used to describe the management and controls of a portfolio of projects. It
is used to make sure that IT change processes comply to regulatory requirements.
Sometimes it covers the deployment of IT staff. Governance aligns IT change and
expenditure to business change and expenditure [31].
Governance is also used to describe the management and control of IT
services. Service Level Agreements (SLAs) are used to define levels of service that
are acceptable to business, and then used as a basis for monitoring services.
Governance makes sure that day-to-day problem fixing and support are aligned to
business needs [31]. Table 2.1 shows different definitions of IT Governance.
49
Table 2.1 Definitions of IT governance
Researchers
IT governance definitions
Brown and Magill
(1994)
IT governance describes the locus of responsibility for IT
functions.
Luftman
(1996)
IT governance is the degree to which the authority for making
IT decisions is defined and shared among management, and the
processes managers in both IT and business organizations
apply in setting IT priorities and the allocation of IT resources.
Sambamurthy
and Zmud (1999)
IT governance refers to the patterns of authority for key IT
activities.
Van Grembergen
(2002)
IT governance is the organizational capacity by the board,
executive management and IT management to control the
formulation and implementation of IT strategy and in this way
ensure the fusion of business and IT.
Weill and Vitale
(2002)
IT governance describes a firm’s overall process for sharing
decision rights about IT and monitoring the performance of IT
investments.
Schwarz and
Hirschheim
(2003)
IT governance consists of IT-related structures or architectures
(and associated authority patterns), implemented to
successfully accomplish (IT-imperative) activities in response
to an enterprise’s environment and strategic imperatives.
IT Governance
Institute
(2004)
IT governance is the responsibility of the board of directors
and executive management. It is an integral part of enterprise
governance and consists of the leadership and organizational
structures and processes that ensure that the organization’s IT
sustains and extends the organization’s strategies and
objectives.
Weill and Ross
(2004)
IT governance is specifying the decision rights and
accountability framework to encourage desirable behavior in
using IT.
50
Besides three major components of IT Governance (structure, process and
communication) there are four objectives that drive IT governance (Figure 2.5) and
must be covered in IT Governance processes: IT value and alignment, accountability,
performance measurement, and risk management [34]:
•
IT value and alignment. One of the primary goals of IT governance to
ensure alignment between the business units and IT and delivering value for
them.
•
Risk management. Managing IT risk is important and includes security
risks, privacy risks, recovery, resiliency systems and the risks associated to
project failures.
•
Accountability. IT governance insures IT management for the return on its
investment in IT.
•
Performance measurement. IT governance requires some metrics and
measurement for evaluating and controlling three other dimensions (IT value
and alignment, Risk management and Accountability).
Figure2.14 IT Governance objectives [34]
51
2.3.2 IT Governance Focus Areas
Fundamentally, IT governance is concerned about two things: IT’s delivery of
value to the business and mitigation of IT risks. The first is driven by strategic
alignment of IT with the business. The second is driven by embedding accountability
into the enterprise. Both need to be supported by adequate resources and measured to
ensure that the results are obtained.
This leads to the five main focus areas for IT governance, all driven by
stakeholder value. Two of them are outcomes: value delivery and risk management.
Three of them are drivers: strategic alignment, resource management (which overlays
them all) and performance measurement [27].
Figure2.15 Focus areas of IT Governance [27]
I.
Strategic alignment: Linking business and IT so they work well together.
Typically, the lightning rod is the planning process, and true alignment can
occur only when the corporate side of the business communicates effectively
52
with line-of-business leaders and IT leaders about costs, reporting and
impacts.
II.
Value delivery: Making sure that the IT department does what’s necessary to
deliver the benefits promised at the beginning of a project or investment. The
best way to get a handle on everything is by developing a process to ensure
that certain functions are accelerated when the value proposition is growing,
and eliminating functions when the value decreases.
III.
Resource management: One way to manage resources more effectively is to
organize your staff more efficiently—for example, by skills instead of by
line of business. This allows organizations to deploy employees to various
lines of business on a demand basis.
IV.
Risk management: Instituting a formal risk framework that puts some rigor
around how IT measures, accepts and manages risk, as well as reporting on
what IT is managing in terms of risk.
V.
Performance measures: Putting structure around measuring business
performance. One popular method involves instituting an IT Balanced
Scorecard, which examines where IT makes a contribution in terms of
achieving business goals, being a responsible user of resources and
developing people. It uses both qualitative and quantitative measures to get
those answers [27, 29].
53
2.3.3 IT Governance Frameworks
Implementing good IT governance requires a framework based on three
major elements [34]:
• Structure. The framework must answer this questions: ”Who makes the
decisions? What structural organizations will be created, who will take part in these
organizations, and what responsibilities will they assume? “
• Process. In the process aspect, these questions must be answered: “How are
IT investment decisions made? What are the decision-making processes for
proposing investments, reviewing investments, approving investments, and
prioritizing investments? “
• Communication. Communication deals with of how the results of these
processes and decisions will be monitored, measured, and communicated. Also it
needs some mechanisms to communicate IT investment decisions to the board of
directors,
executive
management,
business
management,
IT
management,
employees, and shareholders.
Over the years, a number of frameworks have emerged, each with their own
strengths and weaknesses, but also, each with their own focus and purpose. Some of
the major frameworks are currently as below:
54
•
IT Infrastructure Library (ITIL): is a customizable framework of best
practices that promote quality computing services in the information
technology (IT) sector. ITIL addresses the organizational structure and skill
requirements for an IT organization by presenting a comprehensive set of
management procedures with which an organization can manage its IT
operations.
•
Control Objectives for Information and Related Technology (COBIT): is
a set of best practices (framework) for information technology management
created by the Information Systems Audit and Control Association (ISACA),
and the It is a framework for information security that provides managers,
auditors, and IT users with a set of generally accepted measures, indicators,
processes and best practices to assist them in maximizing the benefits derived
through the use of information technology and developing appropriate IT
governance and control in a company [37]. It is comprised of 34 high-level
control objectives and 318 detailed control objectives that have been designed
to help businesses maintain effective control over IT [38].
•
Six Sigma: is a data-driven quality control standard that was originated by
the Motorola Company in the 1980s and was designed to help eliminate the
rate of defects perceived to be caused by manufacturing variation. An
organization that achieves Six Sigma is required to have, at the most, 3.4
defects for every one million customer requirements. Sigma is a term used in
statistics to represent standard deviation, an indicator of the degree of
variation in a set of measurements or a process [39].
•
The Capability Maturity Model (CMM): is a method for evaluating and
measuring the maturity of the software development process in organizations
on a scale of 0 to 5. Its rating scale was developed by the Software
Engineering Institute at Carnegie Mellon University. A revised version, the
55
Capability Maturity Model Integration (CMMI), provides guidance for
improving an organization’s processes and a way to manage the development,
acquisition and maintenance of products or services [40].
If your goal is improving the quality and measurability of IT governance
across the entire networked application implementation life cycle or implementing a
control system for improved regulatory compliance, COBIT probably would be a
more effective choice [41].
If your organization is ready for a company-wide, team-focused approach to
quality, also it has a serious commitment to employee education and on the other
hand it wants to develop and maintain structured business improvement skills, Six
Sigma is the best choice [42].
If the objective is to continuously improve IT operations efficiency and IT
customer service quality, ITIL would probably be the better bet [41].
All of these Frameworks provide methodologies that can be used to improve
the processes that company has in place. However, these methodologies provide little
or no guidance about which processes are required for IT to function well. The ITIL
framework is a source of good practice in service management. ITIL provides a
guide to the framework of processes required to run IT as a Business for the Business
and the relationship between those processes [48].
56
2.4 IT Infrastructure Library
The Information Technology Infrastructure Library (ITIL) is a English
language set of documents consisting of several volumes of IT management
concepts, processes and methods. The guidance, documented in a set of books,
describe an integrated, process based, best practice framework for managing IT
services [44].
ITIL has been published in Great Britain by the Central Computer and
Telecommunications Agency (CCTA) under the IT Infrastructure Library label since
the late 1980’s. The CCTA has now become a part of the Office of Government
Commerce (OGC), which took over ownership of ITIL. For the further development
of ITIL, the OGC is cooperating with the BSI, the itSMF (IT Service Management
Forum), an increasingly influential association of ITIL users, and also with the two
IT Service Management examination institutes, the Dutch EXIN (Exameninstitut
voor Informatica) and the British ISEB (Information Systems Examination Board).
The OGC is still coordinating office [45].
ITIL is a public framework that describes Best Practice in IT service
management. It provides a framework for the governance of IT, the ‘service wrap’,
and focuses on the continual measurement and improvement of the quality of IT
service delivered, from both a business and a customer perspective. This focus is a
major factor in ITIL’s worldwide success and has contributed to its prolific usage
and to the key benefits obtained by those organizations deploying the techniques and
processes throughout their organizations.
57
ITIL provides “best practice” guidelines and architectures to ensure that IT
processes are closely aligned to business processes and that IT delivers the correct
and appropriate business solutions [43].
ITIL is intended to assist organizations in optimizing their own IT service
management practices. Worldwide, ITIL is the most widely used best practice for IT
Service Management. ITIL is a top-down, business driven approach to the
management of IT Services that specifically addresses the strategic business value
generated by the IT organization and the delivery of high quality IT services. ITIL is
designed to focus on the people, processes and technology issues that IT
organizations face.
ITIL is aimed at:
•
IT service providers
•
IT directors and managers
•
Chief Information officers
It will also inform:
•
Business managers
•
Customers and end-users involved in building good relationships with their
IT service providers plus any organization that depends on IT Services.
ITIL provides the foundation for quality IT service management. The
widespread adoption of ITIL guidance has encouraged organizations worldwide,
both commercial and non-profit, to develop supporting products as part of a shared
'ITIL philosophy'. The Information Technology Service Management Forum (itSMF)
is a global consortium of more than 400 international corporations and 4,000
individual members responsible for advancing IT best practices through the
58
utilization of the IT Infrastructure Library (ITIL), which provides a structured
framework consisting of systematic and professional road maps for managing
complex IT environments [47].
2.4.1 ITIL Benefits
One of the main objectives of ITIL is to assist IT service provider
organizations “to improve IT efficiency and effectiveness whilst improving the
overall quality of service to the business within imposed cost constraints” [49].
ITIL offers a systematic, professional approach to the management of IT
service provision. Benefits realized by many IT organizations through implementing
ITIL and processes based on “best practice” guidelines are [43, 44, and 49]:
•
Increasing customer satisfaction with IT services
•
Better communication and information flows between IT staff and customers
•
Continuous improvement in the delivery of quality IT services
•
Reduced long term costs through improved ROI or reduced TCO through
process improvement
•
Greater productivity and better use of skills and experience
•
Demonstrable VFM to the business, the board and stakeholders, through
greater efficiency Standards and guidance for IT staff
•
Reduced risk of not meeting business objectives, through the delivery of
rapidly recoverable, consistent services
59
•
Improved communication and better working relationships between IT and
the business
•
The ability to absorb a higher rate of Change with an improved, measurable
rate of success
•
Processes and procedures that can be audited for compliance to “best
practice” guidelines
•
Improved ability to counter take-over, mergers and outsourcing.
There are also benefits to the customer of IT services, such as:
•
Reassurance that IT services are provided in accordance with documented
procedures that can be audited
•
The ability to depend upon IT services, enabling the customer to meet
business objectives
•
The identification of contact points for enquiries or discussions about
changing requirements
•
The knowledge that information is produced to justify charges for IT services
and to provide feedback from monitoring of service level agreements
ITIL emphasizes the importance of providing IT services to satisfy business
needs in a cost effective manner. Many IT organizations are attempting to become
more customer oriented to demonstrate their contribution to the business. The library
can help IT organizations achieve this.
Organizations are encouraged to adapt the guidance to suit their needs. They
are however, cautioned against omitting activities without due consideration, since
IT Service Management is a set of integrated and coordinated functions.
60
Organizations are likely to gain most benefit – in the longer term– from
implementing all of the functions rather than some discrete functions.
ITIL provides a consistent and comprehensive approach to service
management ranging from software products to consultancy, training and
qualifications. The common approach brings with it a common language of ITIL
terms, which permits better communication between IT and suppliers [44].
2.4.2 ITIL Evolution
The first version of ITIL was initially developed in the 1980’s by the
forerunner to the OGC (CCTA) and was used mainly by government agencies. It
consisted of a variety of booklets based on work done by the UK Government
Information Infrastructure Management Forum [46]. It consisted of a library of 31
associated books covering all aspects of IT service provision [43].
This initial version was then revised and replaced by seven, more closely
connected and consistent books (ITIL V2) consolidated within an overall framework.
The two most widely read focused on service delivery and service support. These
two books present the foundation for IT service management (ITSM), which is a set
of 10 management processes that provide guidance and best practices on managing
assets, bugs, changes, disasters, efficiency, and finances. The model shows the goals,
general activities, inputs, and outputs of the various processes and facilitates
communication and cooperation among various functions in IT [43, 46].
61
In 2007, ITIL V2 was superseded by an enhanced and consolidated third
version of ITIL, consisting of five core books covering the service lifecycle, together
with the Official Introduction [43]. The newest version, is fundamentally different
from previous versions. ITIL v3 focuses on the entire service life cycle, taking the
ultimate consumer of the services — the business — into consideration [46].
2.4.2.1 ITIL V2 vs. V3
There is a greater focus on the strategy of IT within an organization and on
continual improvement. The emphasis in the new books is that processes alone are
not enough to guarantee business success. Processes have to form part of the overall
strategy of the business, and have to be directly linked to business outcomes, to be
effective. The lifecycle in the new books shows how this can be achieved In addition,
there are some significant differences in the format. The previous eight books are
being replaced with 5 new books covering an ITSM Lifecycle [67].
However any changes to the basic processes are not very radical. Problem
Management has been streamlined, Request Fulfillment has been pulled out from
Incident Management and given more prominence and more has been added on
Event Management. Most of the best practices from previous versions of ITIL
remain intact and still valid [67].
Overall V3 will provide generic guidance for any type of Service Provider,
increase the scope of Service Management and provide more depth over V2.
62
2.4.2.2 ITIL V3 books
ITIL version 3 is a set of five new books, the ITIL Service Lifecycle, replaced the
previous Service Support and Service Delivery books, and other related volumes. The
main development is that V3 takes a lifecycle approach to guidance, as opposed to
organizing according to IT delivery sectors [43].
Figure2.16 The service lifecycle [43]
The five core books cover each stage of the service lifecycle (Figure 2.18), from
the initial definition and analysis of business requirements in Service Strategy and
63
Service Design, through migration into the live environment within Service Transition,
to live operation and improvement in Service Operation and Continual Service
Improvement.
The core books are the starting point for ITIL V3. It is intended that the content of
these core books will be enhanced by additional complementary publications and by a
set of supporting web services [43].
The ITIL V3 books are as below:
I. Service Strategy: focusing on providing guidance on how to leverage service
management capabilities that effectively deliver value to customers.
II.
III.
Service Design: translates plans and objectives into action items.
Service Transition—looks at how the design delivers the intended strategy, and
whether it can be effectively executed. Change management is an important
component.
IV. Service Operation: this is the day-to-day service management guidance.
V. Continual Service Improvement: performance measurement and improvement
through the life of the service.
The figure 2.17, illustrates how the service lifecycle is initiated from a change
in requirements in the business.
64
Figure2.17 Key links, inputs & outputs of the service lifecycle stages [43]
These requirements are identified and agreed within the Service Strategy
stage within a Service Level Package (SLP) and a defined set of business outcomes.
This passes to the Service Design stage where a service solution is produced
together with a Service Design Package (SDP) containing everything necessary to
take this service through the remaining stages of the lifecycle.
The SDP passes to the Service Transition stage, where the service is
evaluated, tested and validated, the Service Knowledge Management System
(SKMS) is updated, and the service is transitioned into the live environment, where it
enters the Service Operation stage.
65
Wherever possible, Continual Service Improvement identifies opportunities
for the improvement of weaknesses or failures anywhere within any of the lifecycle
stages [43].
2.4.2.2.1 Service Strategy
The IT Infrastructure Library (ITIL) version 3 Service Strategies book sits at
the core of the ITIL V3 lifecycle and provides senior leadership with guidance on
how to leverage service management capabilities to effectively deliver value to
customers and capture value for service providers. Achieving a deep understanding
of customer needs, in terms of what these needs are, and when and why they occur,
also requires a clear understanding of exactly who is an existing or potential
customer of that service provider. This, in turn, requires the service provider to
understand the wider context of the current and potential market places that the
service provider operates in, or may wish to operate in [43].
“The Service Strategy volume provides guidance on how to design, develop,
and implement service management not only as an organizational capability but also
as a strategic asset. Guidance is provided on the principles underpinning the practice
of service management that are useful for developing service management policies,
guidelines and processes across the ITIL Service Lifecycle”[50].
There are many topics covered in Service Strategy volume. The development
of markets, internal and external, service assets, Service Catalogue, and
implementation of strategy through the Service Lifecycle, Financial Management,
Service Portfolio Management, Organizational Development, and Strategic Risks are
major topics which included in Service Strategy [50].
66
Organizations can use the guidance to set objectives and expectations of
performance, also to identify, select, and prioritize opportunities. Service Strategy
help organizations to handle the costs and risks associated with their Service
Portfolios. [50]
It sets out guidance to all IT service providers and their customers, to help
them operate and thrive in the long term by building a clear service strategy. Some
questions that can be answered with this guidance are of the following kind [43]:
•
What services should we offer and to whom?
•
How do we truly create value for our customers?
•
How do we capture value for our stakeholders?
•
How can we make a case for strategic investments?
•
How can Financial Management provide visibility and control over value
creation?
•
How should we define service quality?
There are three sub processes including:
I.
Financial Management: Financial Management covers the function and
processes responsible for managing an IT service provider’s budgeting,
accounting and charging requirements. It provides the business and IT with
the quantification, in financial terms, of the value of IT services, the value of
the assets underlying the provisioning of those services, and the qualification
of operational forecasting.
67
II.
Service
Portfolio
Management
(SPM):
SPM
involves
proactive
management of the investment across the service lifecycle, including those
services in the concept, design and transition pipeline, as well as live services
defined in the various service catalogues and retired services.
III.
Demand Management (DM): Demand management is a critical aspect of
service management. The purpose of Demand Management is to understand
and influence customer demand for services and the provision of capacity to
meet these demands. At a strategic level this can involve analysis of patterns
of business activity and user profiles. At a tactical level it can involve use of
differential charging to encourage customers to use IT services at less busy
times.
2.4.2.2.2 Service Design
Service Design is a stage within the overall service lifecycle and an important
element within the business change process. The role of Service Design within the
business change process can be defined as [43, 55]:
“The design of appropriate and innovative IT services, including their
architectures, processes, policies and documentation, to meet current and future
agreed business requirements.”
68
Service Catalogue
Management
Supplier
Management
Service Level
Management
Capacity
Management
Availability
Management
IT Service Continuity
Management
Information Security
Management
Figure 2.18 Service Design
The main goals and objectives of Service Design are to [43, 50]:
•
Design services to meet agreed business outcomes
•
Design processes to support the service lifecycle
•
Identify and manage risks
69
•
Design secure and resilient IT infrastructures, environments, applications and
data/information resources and capability
•
Design measurement methods and metrics
•
Produce and maintain plans, processes, policies, standards, architectures,
frameworks and documents to support the design of quality IT solutions
•
Develop skills and capability within IT
•
Contribute to the overall improvement in IT service quality.
There are some processes and activities associated with Service Design [50]:
I.
Service Catalogue Management (SCM): provides a central source of
information on the IT services delivered to the business by the service provider
organization, ensuring that business areas can view an accurate, consistent
picture of the IT services available, their details and status. The purpose of
Service Catalogue Management (SCM) is to provide a single, consistent source
of information on all of the agreed services, and ensure that it is widely available
to those who are approved to access it.
II.
Service Level Management (SLM): negotiates, agrees and documents
appropriate IT service targets with the business, and then monitors and produces
reports on delivery against the agreed level of service. The purpose of the SLM
process is to ensure that all operational services and their performance are
measured in a consistent, professional manner throughout the IT organization,
and that the services and the reports produced meet the needs of the business and
customers.
70
III.
Capacity Management: includes business, service and component capacity
management across the service lifecycle. A key success factor in managing
capacity is ensuring that it is considered during the design stage. The purpose of
Capacity Management is to provide a point of focus and management for all
capacity and performance-related issues, relating to both services and resources,
and to match the capacity of IT to the agreed business demands.
IV.
Availability Management: The purpose of Availability Management is to
provide a point of focus and management for all availability-related issues,
relating to services, components and resources, ensuring that availability targets
in all areas are measured and achieved, and that they match or exceed the current
and future agreed needs of the business in a cost-effective manner.
V.
IT Service Continuity Management (ITSCM): The purpose of ITSCM is to
maintain the appropriate on-going recovery capability within IT services to
match the agreed needs, requirements and timescales of the business. ITSCM
includes a series of activities throughout the lifecycle to ensure that, once service
continuity and recovery plans have been developed, they are kept aligned with
Business Continuity Plans and business priorities.
VI.
Information Security Management (ISM): ISM needs to be considered within
the overall corporate governance framework. Corporate governance is the set of
responsibilities and practices exercised by the board and executive management
with the goal of providing strategic direction, ensuring that the objectives are
achieved, ascertaining that the risks are being managed appropriately, and
verifying that the enterprise’s resources are used effectively. The purpose of the
ISM process is to align IT security with business security and ensure that
information security is effectively managed in all service and Service
Management activities
71
VII.
Supplier Management: this process ensures that suppliers and the services they
provide are managed to support IT service targets and business expectations.
The purpose of the Supplier Management process is to obtain value for money
from suppliers and to ensure that suppliers perform to the targets contained
within their contracts and agreements, while conforming to all of the terms and
conditions.
2.4.2.2.3 Service Transition
The role of Service Transition is to deliver services that are required by the
business into operational use. Service Transition delivers this by receiving the
Service Design Package from the Service Design stage and delivering into the
Operational stage every necessary element required for ongoing operation and
support of that service. If business circumstances, assumptions or requirements have
changed since design, then modifications may well be required during the Service
Transition stage in order to deliver the required service.
Service Transition focuses on implementing all aspects of the service, not just
the application and how it is used in ‘normal’ circumstances. It needs to ensure that
the service can operate in foreseeable extreme or abnormal circumstances, and that
support for failure or errors is available.
As you can see in the figure 2.11, there are seven processes and activities in
the service transition.
72
Figure 2.19 Service Transition
I.
Transition Planning and Support: The goals of Transition Planning and
Support are to:
73
•
plan and coordinate resources to ensure that the requirements of Service
Strategy encoded in Service Design are effectively realized in Service
Operations
•
Identify, manage and control the risks of failure and disruption across
transition activities.
II.
Change Management: ensures that changes are recorded, evaluated,
authorized, prioritized, planned, tested, implemented, documented and
reviewed in a controlled manner. The purpose of the Change Management
process is to ensure that standardized methods are used for the efficient and
prompt handling of all changes.
III.
Service Validation and Testing: The key purpose of service validation and
testing is to provide objective evidence that the new/changed service supports
the business requirements, including the agreed SLAs.
IV.
Release and Deployment Management: The goal of the Release and
Deployment Management process is to assemble and position all aspects of
services into production and establish effective use of new or changed
services. It covers the whole assembly and implementation of new/changed
services for operational use, from release planning through to early life
support.
V.
Application Development and Customization: This process focuses on the
performance of a new or changed service. The purpose of this process is to
provide standard means of determining whether the actual performance of a
new or changed service compares favorably to predicted performance, and
whether it operates acceptably by providing value to the customer.
74
VI.
Service asset and configuration management: The configuration
management part of this process provides a logical model of the IT
infrastructure, consisting of configuration items, their attributes, and their
relationships. This process manages the service assets in order to support the
other service management processes.
VII.
Knowledge Management: The purpose of Knowledge Management is to
ensure that the right person has the right knowledge, at the right time to
deliver and support the services required by the business.
2.4.2.2.4 Service Operation
The purpose of Service Operation is to deliver agreed levels of service to
users and customers, and to manage the applications, technology and infrastructure
that support delivery of the services. It is only during this stage of the lifecycle that
services actually deliver value to the business, and it is the responsibility of Service
Operation staff to ensure that this value is delivered.
75
Figure 2.20 Service Operation
Service Operation has some processes as follow:
I.
Request Fulfillment Process: The purpose of Request Fulfillment is to enable
users to request and receive standard services; to source and deliver these
services; to provide information to users and customers about services and
procedures for obtaining them; and to assist with general information,
complaints and comments.
76
II.
Access management: The purpose of the this process is to provide the rights for
users to be able to access a service or group of services, while preventing access
to non-authorized users. The process includes verifying identity and entitlement,
granting access to services, logging and tracking access, and removing or
modifying rights when status or roles change.
III.
Event Management: According to definition of event, “An event is a change of
state that has significance for the management of a configuration item or IT
service”, Event Management is the process that monitors all events that occur
through the IT Infrastructure to allow for normal operation and also to detect and
escalate exception conditions.
IV.
Incident Management: According to definition of incident, “An incident is an
unplanned interruption to an IT service, or a reduction in the quality of an IT
service. Failure of a configuration item that has not yet impacted service is also
an incident”, Incident management concentrates on restoring the service to users
as quickly as possible, in order to minimize business impact. After the incident
has been investigated and diagnosed, and the resolution has been tested, the
Service Desk should ensure that the user is satisfied before the incident is closed.
V.
Problem Management: The key objectives of Problem Management are to
prevent problems and resulting incidents from happening, to eliminate recurring
incidents and to minimize the impact of incidents that cannot be prevented.
VI.
IT Operations Management: is the function responsible for the daily
operational activities needed to manage the IT Infrastructure. This is done
according to the Performance Standards defined during Service Design.
77
VII.
IT Facilities Management: is responsible for managing the physical
environment where the IT infrastructure is located. Facilities Management
includes all aspects of managing the physical environment, for example power
and cooling, building access management, and environmental monitoring.
2.4.2.2.5 Continual Service Improvement
Continual Service Improvement (CSI) is concerned with maintaining value
for customers through the continual evaluation and improvement of the quality of
services and the overall maturity of the ITSM service lifecycle and underlying
processes.
The primary purpose of CSI is to continually align and re-align IT services to
the changing business needs by identifying and implementing improvements to IT
services that support business processes. These improvement activities support the
lifecycle approach through Service Strategy, Service Design, service Transition and
Service Operation. In effect, CSI is about looking for ways to improve process
effectiveness, efficiency as well as cost effectiveness.
78
Figure 2.21 Continual Service Improvements
Following processes are associated with Continual Service Improvement:
I.
Service Evaluation: The objective of Service Evaluation is to evaluate
service quality on a regular basis. This includes identifying areas where the
targeted service levels are not reached and holding regular talks with business
to make sure that the agreed service levels are still in line with business
needs.
II.
Process Evaluation: This process objective is To evaluate processes on a
regular basis. This includes identifying areas where the targeted process
metrics are not reached, and holding regular benchmarking, audits, maturity
assessments and reviews.
79
III.
Definition of Improvement Initiatives: The main goal of this process is
definition specific initiatives aimed at improving services and processes,
based on the results of service and process evaluation. The resulting
initiatives are either internal initiatives pursued by the service provider on his
own behalf, or initiatives which require the customer’s cooperation.
IV.
Continual Service Improvement Monitoring: verifies if improvement
initiatives are proceeding according to plan, and to introduce corrective
measures where necessary.
Table 2.2 ITIL V3 processes and sub processes
80
81
82
2.5 Chapter Summary
This chapter discussed outsourcing, IT Governance and its different frameworks. In
more detail ITIL Framework, its versions and processes, the best practices are described.
This literature review is expected to be the elements on doing the next phases of the study.
CHAPTER 3
METHODOLOGY
3.1 Introduction
Methodology is a organized, documented set of procedures, rules, principles
and guidelines that describes how something will be done. It includes the
frameworks, techniques, methods, patterns and procedures used to accomplish a set
of goals and objectives. This chapter provides a clear guideline on how the project
goals and objectives shall be achieved. Three main phases should be completed
regarding to accomplish the goals of this research. Each of these phases will be
discussed by details in this chapter.
84
3.2 Project Methodology
Project methodology is the guidelines to ensure that project is conducted in a
disciplined and well-managed manner. By the implementation of mythologies,
programs, documents and data can be achieved as a result of activities and tasks that
are included in the methodology.
In order to get some information about the outsourcing problems and
challenges, some analyses were carried out. The required methodology for this study
started from initial planning, an analysis of the general outsourcing problems, study
about ITIL Framework and its component, and at the final phase we are going to
develop a proposed framework for managing software development outsourcing
project. Figure 3.1 shows the project methodology framework.
85
Phase 1: Initial Planning
• Project objectives
• Project scopes
• Project methodology
Phase 2: Analysis
Literature Review
Identifying CICT
problems
• Definitions
• Identify outsourcing
and challenges
• Analysis the ITIL
framework and its
component • Interview
• questionnaire
Phase 3: Develop a Proposed
Framework
•
•
•
•
Identify components of framework
Framework development
Framework implementation
Framework acceptance
Figure 3.1 Project Methodology Framework
86
3.2.1 Phase 1: Initial Planning Phase
The project starts with the first phase that is Initial Planning. The main
purpose of this phase is to define the goals, scope and methodology of the project.
First of all, the title of the project is discussed with the supervisor. The objective of
the study is analyzed and identified according to the problem statement. Project
scope is identified to draw the boundary of this study. Finally, some researches on
the background of the study are done in order to decide on the methodology of the
study.
3.2.2 Phase 2: Analysis
Data analysis is the process of looking at and summarizing data with the
intent to extract useful information and develop conclusions. In this phase, few
activities are carried out such as literature review, identify problems of outsourcing
projects and as a case study software development outsourcing projects of CICT are
studied. At this phase, the aim is to gain an in-depth understanding of outsourcing
and ITIL framework.
3.2.2.1 Literature Review
The literature review is an essential stage in conducting a research project.
Reading and appraising what other people have written about the subject area are
87
also very important. According to Naoum (1998), it can be both descriptive and
analytical. It is descriptive in that it describes the work of previous writers and it is
analytical in that it critically analyzes the contribution of others with the view of
identifying similarities and contradictions made by previous writers.
A review of the literature has the following purposes:
•
To justify choice of research question, theoretical or conceptual
framework, and method;
•
To establish the importance of the topic;
•
To provide background information needed to understand the study;
•
To show familiarity with significant and/or up-to-date research relevant
to the topic;
•
To establish study as one link in a chain of research that is developing
knowledge in related field.
In this stage, essential things such as the definitions, types of outsourcing,
way of outsourcing, its benefits and disadvantages, also ITIL, its evolution and
benefits and other related studies were identified and analyzed.
3.2.2.2 Identifying CICT problems
The purpose of this part is to identify CICT’s problems with outsourcing
projects, so data collection is very important. Establishing a data collection process
should be seen as a fundamental step at the start of any improvement activity.
88
A data collection process ensures that a project can efficiently and accurately
collate data enabling to measure and establish a baseline of current performance
whilst quantifying later improvements. Without accurate and timely information,
improvement projects can flounder, change agents may guess at fixes and resultant
solutions be inappropriate.
Research methods for data collection can be classified in various ways.
However, one of the most common distinctions is between qualitative and
quantitative research methods.
Quantitative data collection methods are used to study natural phenomena.
They rely on random sampling and structured data collection instruments that fit
diverse experiences into predetermined response categories. They produce results
that are easy to summarize, compare, and generalize. Examples of quantitative
methods include survey methods, laboratory experiments, formal methods such as
econometrics, and numerical methods for instance mathematical modeling.
Qualitative data collection methods are used to study social and cultural
phenomena. They play an important role in impact evaluation by providing
information useful to understand the processes behind observed results and assess
changes in people’s perceptions of their well-being There are different ways for
collecting data such as questionnaire and interview. Qualitative data sources include
observation and participant observation (fieldwork), interviews and questionnaires,
documents and texts, and the researcher’s impressions and reactions.
89
In this project, for collecting data about the CICT, we use qualitative data
collection, interview and questionnaire. The interview questions are attached in
Appendix A and the questionnaire is attached in Appendix B.
3.2.3 Phase 3: Develop a Proposed Framework
In this phase, researcher after analyzing of collected data about CICT and
general information should propose proper framework or list of suggestions for the
CICT based on the best practices.
After developing the framework, it should implement in CICT and if it has
some problem, it should be solved after getting comment from the CICT manager.
3.3 Chapter Summary
This chapter discussed various aspects of the study related to the research
design, including the method, data collection processes and data analysis techniques.
CHAPTER 4
INITIAL FINDINGS
4.1 Introduction
This chapter covers the analysis of current situation of the case study. The
case study for this project is Center of Information Communication Technology
(CICT). Findings from this analysis provide the researcher with a solid ground in
implementing the framework
91
4.2 Organizational Analysis
Before proceeding with any analysis, it is very important to understand about
the case study which is CICT, UTM.
CICT or the Center of Information and Communication Technology was
established in 1975 by the name of Computer Center or ‘Pusat Komputer’. The aim
was to assist the University's administrative computing as well as to provide
consultancy in government agencies computerization such as the Teachers' Training
Division, the Malaysian Examinations Council and the Public Services Department.
In 1981, the Department of Computer Science was established to offer
Computer Science courses. The Computer Center then merged with this department
in order to combine all ICT expertise in UTM. In 1991, a decision has been made to
launch the Faculty of Computer Science and Information Technology and reestablish
the Computer Center so that both entities can fully concentrate on their own
functions.
On 19 January 2004, the Computer Center was upgraded to CICT or the
Center of Information and Communication Technology.
Now, CICT is responsible for ensuring that staffs and students have access to
teaching, learning and research resources by providing the University's IT
infrastructure, acquiring, developing and supporting new and emerging technologies
and systems, and providing access to millions of digital resources across the
University's campuses.
92
CICT is continually developing and delivering the new initiatives by
extending access to the University's network, CICT services and support digital
resources, and by developing and supporting the delivery of e-learning.
4.2.1 CICT Mission, Vision and Objectives
The vision of CICT is “to become the source of quality and innovative ICT
services towards achieving the University's aspirations”.
The missions of CICT are “We are committed to fulfill the University's ICT
requirements through activities in administrative and academic computing, providing
ICT infrastructure, training, ICT research and consultation based on quality”.
CICT aims:
•
To become a leader in excellence and innovative information technology
services
•
To provide centralized and integrated ICT service
•
To be the reference center for ICT
•
To explore new technology in ICT services and implementation.
The objectives of CICT are:
•
To increase the adoption of information technology in all University
activities
93
•
To provide guaranteed ICT infrastructure and facilities
•
To become the reference center in ICT service and deployment in the
University
•
To become the center of software / application development in the
University
•
To explore new technologies in ICT services and implementation
•
To increase the ICT competencies of the University community
4.2.2 CICT Organizational Structure
The functions of CICT are divided in six divisions. The divisions are
academic computing, service and infrastructure, administrative computing, corporate
planning, and training and consultancy. Figure 4.1 illustrates the organizational
structure of CICT.
94
Figure 4.1 CICT Organizational Chart
4.3 Questionnaire and Interview Analysis
The goal of interview is to understand the CICT challenges and problem with
the software development outsourcing projects. The interview was held with Mr.
Helmee Yaacob -manager of the development team at CICT and IT officer for HR
system-. The interview questions are attached to the project (Appendix A).
95
A questionnaire is a series of questions asked to individuals to obtain
statistically useful information about a given topic. In this project, the questionnaire
was given to the user of HRFIN project to find the other problems from the user’s
viewpoint the questionnaire has been attached in appendix B.
Through the interview and questionnaire CICT reasons for outsourcing a
project, outsourcing problems, CICT Satisfaction of outsourcing providers, service
quality and others can be determined. Also this interview can help us in gathering
essential information to give suggestions to CICT for solving their problems.
CICT uses IT for doing most of their works such as data collection, data
analyzing, collaboration and so on. They use some software related to their work,
and for the software development project they use NetBeans and Oracle.
Being the only center of ICT in UTM cause to having a lot of programs, but
they can’t do all of those projects inside. Sometimes they outsource their software
development projects. The type of CICT software development outsourcing is
Software Development Outsourcing and software Acquisition (Total outsourcing). It
means all the software development stages such as design, development,
programming, and testing is outsourced.
CICT started outsourcing from 2005. Their reasons for using outsourcing are
the lack of related technology and lack of adequate staffs. If their project is big, they
don’t have enough staff to handling the project, or the staffs don’t have related
knowledge, so they have to outsource their projects.
96
Their fist outsourcing project was Human Resource and Finance System. This
project was very big and complex, and they hadn’t enough and adequate staffs, so
outsourcing was the only way to get work done more efficiently and effectively This
project took one and half year to completing.
CICT has problems when conducting with outsourcing such as deliverable
quality problems, misunderstanding and time problems, because developing mutual
understanding between client and outsourcer takes more time. Also because of lack
of a managed relationship and clear contract content, the outsourcer can’t understand
what CICT exactly expects.
Most of their problems for the software development projects are:
•
Misunderstandings of the contract content and services. The software
development projects need to have more details about the project. User
needs, requirements and other things should be identified with details. On
the other hand mutual understanding of the project between CICT and
Third-Party Company takes a lot of time. Sometimes some of the
requirement can’t be understand by the vender. Sometime the contract
content
is
not
very
clear,
so
misunderstanding
it
cause
to
misunderstanding.
•
Time consuming. For development project, the analysis and requirement
definition stage takes more time, because if the requirement identify
carefully, problems decrease. But Most of the time, first meeting is not
enough for gathering all data. For developing HRFIN project, outsider
came to CICT several times and collects their needed information, but
after starting the project again they came here for more information. So it
cause to taking more time. As you can see, the misunderstanding added
more problems to project.
97
•
Frequently changing of the requirement. When their projects take a long
time, the requirements change during that time, so applying the changes
has additional cost for them. For example HRFIN project took one and
half year. That was long time. During that time something such as the
university policies and staffs needs changed. So they have to add new
functionality or change some part of the program according to their new
requirement. Therefore it had additional cost and time.
•
Poor relationship management. They lose their direct management on the
project; also they cannot manage and govern their relationship. HRFIN
was their first outsourcing project and they hadn’t any experience on the
outsourcing. They hadn’t any plan for conducting with outsource
providers. So they didn’t have any control on the project.
There are some benefits they get from outsourcing, including:
•
They Gain new technology in programming. Using HRFIN outsourcing
brought new technology in java development using NetBeans with 12
layer
•
Using outsourcing the project, reduced issues for handling the staffs.
•
After completing the project, staffs can be terminate, because they are not
permanent staffs, so the cost increase.
After implementing the outsource project, if a problem occurs, they try to
solve them internally but if they can’t, they inform the outsource company via
sending email, calling or sometimes visiting. Then it takes four days to one week for
solving their problems. It is very important for them, because if the software problem
cause to stopping the work, it must be solve immediately. In this case one week is
too much.
98
They try to use more meetings and dissections for solving their problems, but
they couldn’t find an appropriate solution. These reasons cause CICT to not satisfy
using outsourcing a lot.
As you can see, table 4.1 shows the summary of analyzing.
Table 4.1 summary of interview and questionnaire analyzing
Topic
Interviewee
kinds of CICT
outsourcing projects
Reasons of
outsourcing the
project
Type of CICT SDO
CICT information
• Mr. Helmee Yaacob, manager of the development team
at CICT and IT officer for HR system
•
Software development project
•
Lack of adequate staffs
•
Lack of related technology and programming skills inside
•
Software Development Outsourcing and software
Acquisition (Total outsourcing)
•
Gain new technology of netbean programming with 12
layers
Benefits gain by
outsourcing
•
Project outsourcing, reduced issues for handling the
staffs during the project.
• After completing the project, staffs can be terminate,
because they are not permanent staffs, so the cost
increase.
99
Problems of using
outsourcing
•
Misunderstanding of the contract content and services
•
Time consuming
•
Frequently requirement changes that caused to additional
cost
•
Outsourcing relationship management
treating with
•
Most of the time internally
problem After
•
Inform outsider via Email, fax, calling or visiting
•
For externally, 4 days to one week
installation
time taken to solve
the problem
CICT satisfaction of •
Because of cited problem, CICT is not satisfying
outsourcing
outsourcing too much.
4.4
Suitable Component of ITIL for Managing the Outsourcing
According to the outsourcing problem of CICT and the problems mentioned
in Literature Review, there are some component of ITIL related to them. These
components help to better managing the outsourcing projects.
In the next project we’re going to explain how these components can solve
the CICT outsourcing problems. Table 4.2 shows the ITIL processes related to
outsourcing.
100
Table 4.2 ITIL V3 processes regarding outsourcing
ITIL
V3
Processes
Specific benefits to
General Benefits
CICT
book
Service Strategy
Financial
Management
• To
the • defines
determines
required
financial
resources
over
the
structures
necessary
for
the
the
management of financial
planning period, and to
planning data of the
allocate
CICT
those
for
optimum benefits.
Service
• To
the • To
defines
provide
thorough
boundaries of the project
assessment of service-
Management
in terms of the functions
level
and services that the
insight that helps CICT
service provider will give
eliminate
to company, the volume
features
of work that will be
from contracts, and it
accepted and delivered,
ensures that they don't
and acceptance criteria
pay outside vendors for
for responsiveness and
service levels they don't
the
really need.
Service Design
Level
quality
of
requirements
unneeded
and
• To
deliverables.
options
Mitigate
misunderstanding
Supplier
management
• To ensure that suppliers
• To
ensure
that
perform to the targets
outsourcing
contained
their
perform all conditions
and
and term of contract
within
contracts
agreements,
while
conforming to all of the
terms and conditions
between
vendor
provider
CICT
and
101
Service Operation
Problem
management
• To facilitate root-cause
analysis
to
eliminate
recurring
incidents
by
• To
help
in
finding the cause of
incident , so it can
identifying and resolving
remove
underlying
problems.
immediately
The
is
result
CICT
problem
fewer
disruptions of project.
Change
management
• The risk of disrupting
critical systems through
of
undocumented
especially
and
unplanned changes drops
Service transition
• To manage the changes
dramatically.
systems
the
project,
when
the
requirement changes.
Critical
are
available
when people need them
and IT support personnel
spend less time chasing
down and fixing outages
that
could've
been
Service
Evaluation
Improvement
Continual Service
avoided.
• To assess project outage
and
to
corrective
instigate
action
if
required. And to ensure
the vendors processes is
align with SLA
• To ensure about quality
of service delivered by
vendors.
102
4.5 General Proposed Framework
I proposed a general framework for managing the outsourcing project. On the
next project the framework should be tested and maybe some changes will be
necessary. Also we exactly identified which processes of ITIL are associated with
which stages of software development outsourcing project.
Initialing
• Problem
management
Development
• Service Level
Management
Closing
• Service
Evaluation • Financial
management
• Supplier management
• Change management
Figure 4.2 General Proposed Framework
103
4.6 Chapter Summary
This chapter describes organizational structure of the CICT and its functions.
CICT interview was analyzed. It helps to understand current situation in the
organization and identify necessary processes that should be implemented. We found
some of ITIL processes regarding CICT, and finally just proposed a general
framework.
CHAPTER 5
FRAMEWORK REFINEMENT
5.1 Introduction
One of the main objectives of this project is to develop a framework for
managing the outsourcing projects. This framework is arrived from the ITIL V3
framework.
The OM Framework will provide guidelines for the outsourcing services to
achieve good outsourcing relationship management by implementing it. Through the
researcher analysis of outsourcing and ITIL V3, the framework was developed by
integrating all the important and suitable components. The framework design will be
discussed in details in this chapter.
105
5.2 Proposed framework design
In developing the proposed framework, it is vital to incorporate
methodologies and concepts to ensure a successful delivery service that achieves
business goals. The development of the proposed framework for managing the
outsourcing projects involves the related components of ITIL V3 framework. These
components have been determined by the researcher during literature review and
analysis phase as described in chapter 2 and 4. The components are discussed in the
following sections.
5.2.1 ITIL Implementation Framework
A phased approach needs to be taken to the ITIL implementation for CICT
outsourcing projects. This recognizes the limitations of staffing resources that can be
allocated to the project, and acknowledges that staff will still be required to complete
their normal activities.
According results of the questionnaire and interviews, the implementation
phases of framework is divided into 4 phases (Figure 5.1). These phases should be
implemented according to their importance for the CICT and also based on the
simplicity to implementation.
106
Figure 5.1 Outsourcing Management Framework (OM Framework)
5.2.1.1 Phase 1
Service support processes, such as incident management and problem
management, are among the first ITIL processes that organizations start to
implement. Many IT organizations start the implementation of IT service
management processes from incident management [68].
Incident Management is a sub process in ITIL that need to be implemented in
every company for better IT operation. Incident Management is the process for
dealing with all incidents; this can include failures, questions or queries reported by
the users of HRFIN project or by technical staff. The primary goal of the Incident
Management process is to restore normal service operation as quickly as possible
[53].
107
Incident Management is strongly linked to Problem Management, which is
charged with determining the root cause of an incident. So after implementing
Incident management process, when all possible incidents are stored, Problem
management should be implemented.
The next process in phase1 is problem management. Problem Management
investigates the underlying cause of incidents, and aims to prevent incidents of a
similar nature from recurring. By removing errors, which often requires a structural
change to the IT infrastructure in the CICT, the number of incidents can be reduced
over time [53].
Although Incident and Problem Management are separate processes, they are
closely related and will typically use the same tools, and may use similar
categorization, impact and priority coding systems. This will ensure effective
communication when dealing with related incidents and problems [53].
Above mentioned processes is recommended first, because they are fairly
easy processes and able to gain early benefits. It is usually better to start with
something easier and something that will show immediate benefit with minimum
effort. It will motivate implementation team to continue ITIL implementation
project.
5.2.1.2 Phase 2
The first process in phase 2 that is important to implement is financial
management. Financial management helps CICT to account for expenditure, identify
108
costs, improve the budgeting process, identify costs that were higher than expected,
identify areas for possible cost reduction, identify the cause of costs, and implement
the way of cost control.
The Financial Management is responsible for enabling the CICT to account
fully for the spend on outsourcing services and to attribute these costs to the services
delivered to CICT, and to control and manage the overall IT outsourcing budget and
enable the fair and equitable recovery of costs (by charging) for the provision of IT
services. The financial management output is an input for the Service Level
Management, so it should be implement before SLM.
Implementing financial management can also help CICT to decide if the
outsourcing is more cost effective than in sourcing or not. So it should be
implemented before the other processes to find the better solution for the
organization.
After deciding about the outsourcing and find all the outsourcing cost it’s
time to implement Service Level Management that is one of the most important
processes of IT Service Management and is a vital process for every outsourcing
project in that it is responsible for agreeing and documenting service level targets and
responsibilities within SLAs, for every activity within IT [51].
SLA also receives input from the incident and problem management. Because
the experience from the last projects can help them to define a better SLA that is very
clear. And also they can find the problems that happened before in the projects and
find their solutions and mention them in the new SLA.
109
The objective of the Service Level Management process is to manage and
maintain the quality of IT services delivered to the CICT. The process also seeks to
improve on the quality of service delivered to the CICT outsourcing projects.
The purpose of the SLM process is to ensure that all operational services and
their performance are measured in a consistent, professional manner throughout the
IT organization, and that the services and the reports produced meet the needs of the
business and customers.
5.2.1.3 Phase 3
There are three other processes, supplier management, change management
and security management that should be implemented in the phase 3.
The first important process to manage the outsourcing projects is the
managing supplier. After implementing a good Service Level Agreement, it’s very
important that the supplier should be monitored. It’s for ensuring that the supplier
performs all the SLA statements and agreements.
The goal of the Supplier Management process is to manage suppliers and the
services they supply, to provide seamless quality of IT service to the business and to
ensure that suppliers perform to the targets contained within their contracts and
agreements, while conforming to all of the terms and conditions. [51].
110
It is essential that Supplier Management processes and planning are involved
in all stages of the project.
Next important process to implement is change management. Gartner reports
that 80% of project failures are caused by changes. So, if all changes are under
control as soon as possible, a lot of these failures will be prevented. That is definitely
a quick win and quick wins is what ITIL implementation project manager wants to
keep the motivation of support teams up and keep upper management committed to
the project. It may be a while to realize the benefits of Service Level Management.
Any changes can happen for the software development project, so CICT
needs to have a good plan for every changes to reduce the additional time and cost.
So Change Management has an important role in these kinds of projects, especially
for CICT that they don’t have any special plan when the changes occur.
Information security management is the last processes of this phase.
Information security is a management activity within the corporate governance
framework, which provides the strategic direction for security activities and ensures
objectives are achieved.
When a company outsources their activities, the security finds an important
role. So this process should be implemented to ensuring that security of the
information are implemented, as the purpose of information security is to ensure that
information security is effectively managed in all services and to provide a focus for
all aspects of IT security and manage all IT security activities.
111
5.2.1.4 Phase 4
After implementing all the necessary process in the previous phases, in this
phase, service evaluation should be implemented. When the whole processes were
implemented, service evaluation is needed to understand whether the performance
and value of a service is acceptable and to evaluate service quality on a regular basis.
Service Evaluation is a final process that helps CICT to recognize that the
outsourcer has delivered the predefined services with all accepted features.
5.2.2 Framework Implementation Roadmap for Software Development Projects
After proposing the framework, the road map can help to follow each
process inside the each phase. Figure 5.2 shows that each process should be applied
in each phases.
112
processes
Phase1:
Phase2:
Phase3:
Phase4:
Phase5:
Phase6:
Planning
Requirement
Design
Development
Testing
Installation
Definition
Incident
Management
Problem
Management
Financial
Management
Service Level
Management
Supplier
Management
Change
Management
Information
Security
Management
Service
Evaluation
Figure5.2 Framework implementation roadmap for software development
outsourcing
Incident management is a process that should be applied in the whole phases
of the project from planning to installation, because the incidents may happen in
every phases of the project, and all of them should be recorded.
Problem management is a process to find the cause of an incident, so it
should be applied after incident management and also it should be carried on the
whole software development life cycle.
113
After these two processes, financial management should be applied from the
planning phase, because it helps CICT to realize if outsourcing is a cost effective
option for CICT or not. During the project, any changes may happen and for each
change, the related cost should be identified. Therefore financial management should
be continued on the other phases.
The next important process is Service Level Management. A Service Level
Agreement should be prepared in the requirement definition phase and two parties
should agree to its statements.
After agreeing on SLA, the supplier management process should be started. It
is an ongoing process from design phase to installation to monitoring the outsourcers.
It checks supplier to ensure that they are doing each phases according to the
agreements.
During the software development project any changes can happen. So a
change management is required to managing them in a good manner with low cost
and time. And also change management should be kept until the installation phase.
After managing the changes, the important process that should be
implemented is Information Security Management. This process helps CICT to
ensure that the information is used by the authorized people. So it started from design
phase to testing phase.
The final process is service evaluation that should be applied in the last two
phases, testing and installation phases.
114
Now, all identified processes are described in more detail and the suggestion
and activities for implementing them are explained:
5.2.2.1 Incident Management Process
The ITIL definition of an incident is “an incident is any event which is not
part of the standard operation of a service and which cause an interruption to, or a
reduction in, the quality of that service.” This includes bugs, outages, and even user
interface problems.
Note that incident management does not include root cause analysis or
correction. It is all about restoring service [53].
The incidents database is an important asset for software development
projects. Learning from past experience in service management, allows shifting from
a reactive approach to a more proactive one [69]. So the CICT related staffs should
create a database for recording the incidents.
Incident management process is consisted of following activities [71]:
115
•
CICT should define Incident manager for managing the incident which
occurs during software development outsourcing projects.
•
Incident manager should define required training of the staff for detecting the
incident and how to resolve it if they can.
•
They should identify what documentation and forms will be used in incident
management.
•
So they need to create Incident management forms. Suggested form is
illustrated in figure 5.3. This form can complete the CICT forms in Appendix
C.
•
They must ensure that the staffs know how to use the forms.
•
Documentation the process for incident management is necessary.
•
Ensuring that the technician can understand and follow the incident process is
important.
Output from the incident management process should be following:
•
Request for change
•
Incident resolution and closure
•
Updated incident record
•
Management information (reports)
•
Input to the Problem Management process
116
Incident Report Form
Reporter Information
Date of Report:
Reporter Name:
His / Her Job Title:
Department:
Signature:
Incident Information
Date of Incident:
BPPO
Very Critical
HCM
High
Urgency
Location of
HCD
Medium
Incident
Keselamatan
Low
If others, please specify:
Attachments:
YES
Describe how
incident occurred
Fixed
Further action required:
Not fixed
Resolution
No action
Follow up
Incident/problem Solution Information
The cause of
incident/problem
what action has
been done to
solving it
Resolve Time and
Date
Resolver name:
Her/ His job title:
Signature:
Tester Engineer Name:
Date:
Signature:
Figure 5.3 suggested Incident/Problem Report Form
NO
117
5.2.2.2 Problem Management Process
ITIL defines a ‘problem’ as the cause of one or more incidents. Problem
Management involves root-cause analysis to determine and resolve the cause of
incidents, proactive activities to detect and prevent future problems/incidents and a
Known Error sub-process to allow quicker diagnosis and resolution if further
incidents do occur [53].
Recurring incidents can be identified as Problems that require correction.
This is the job of the Problem management process.
Problem management depends on the output of Incident process. Ideally
Incident management produces consistent record classification and data for trending
in support of problem identification. Once Incident management can reliably produce
this level of output, the data can be trusted to support the implementation of Problem
management [74].
•
One of the first activities associated with the Problem management process
that CICT should implement it is the “Major Incident Review” process, often
referred to as a postmortem activity. The premise of this activity is to review
high impact incidents to determine root cause and implement measures to
avoid a reoccurrence. This activity will implement under the management of
the incident restoration process and led by the incident manager. This can be
considered as reactive Problem management.
•
The next activity is the realization that Problem management is a distinct
process that requires its own process models, policies and resources and is
supported by incident reporting. While at this point the process is
118
implemented at a level of maturity that has significant benefits, the majority
of activity is still focused on reactive problem identification and elimination.
•
The third level of implementation will include the identification or proactive
issues for the explicit purpose of incident avoidance of the CICT outsourcing
projects. Known Error record will open for the purpose of impact analysis
and assessment before the incident occurs [74].
Problem management implementation process is also consisted of following
activities [73]:
•
CICT should assign the role of problem manager to their analyzer or
developer.
•
Then train the other staffs to detect the problem.
•
Problem manager and incident manager should design the documentation
forms.
•
After designing, they should create the forms (suggested form is illustrated in
figure 5.3).
•
The process of problem management should be documented inside the forms.
5.2.2.3 Financial Management Process
Financial Management is the sound stewardship of the monetary resources of
the organization. It supports the organization in planning and executing its business
objectives and requires consistent application throughout the organization to achieve
maximum efficiency and minimum conflict. It is an iterative cycle of budgeting and
accounting [76].
119
The purpose of Financial Management is to ensure that the cost of
outsourcing services is justifiable and it also helps to identify particularly costly
areas that CICT may want to examine to see if doing the project in sourcing might
reduce costs or outsourcing is better.
Financial Management links closely to Service Level Management. There
may be a difference between desirable and affordable service levels and it is the
Service Level Management process that enables a balance to be struck between what
the outsourcer would like and what is possible with the funds available. Financial
Management is an input to the Service Level Management process as it provides
budget and cost information to work with when negotiating service level agreements
[75].
In order for the budgets to be realistic and to serve as a reference for the
CICT, it is necessary to first identify all the cost items. Estimating the cost associated
with these items is not always a simple task and external factors that are not under
the direct control of the CICT often have an influence, such as an increase in the cost
of software licenses, etc.
It is essential that budgets take these uncertainties into account and care is
taken to avoid their rendered obsolete by the slightest change in the requirements.
The Financial Management process is typically implemented along the
following activities:
120
•
CICT financial manager should provide a list of all outsourcing expenditures
to decide if outsourcing is more cost effective than doing in source.
•
They should ensure that funds are available for planned events.
•
They should provide detailed financial information for proposed initiatives
•
They should Track current expenditures against the budget.
•
Financial manager should record all expenditure using spreadsheet software
or something else.
•
For it to be of value, the expenditure record must be kept up to date.
5.2.2.4 Service level management
Service levels and their associated agreements are great tools for enabling
managers to measure and guide their outsourcing relationships. When developed and
used correctly, service levels can help ensure successful outsourcing engagements.
Developed and used incorrectly, however, they can lead to poor results, dissatisfied
customers, competitive disadvantage and ultimately failure to achieve good results in
a deal [70].
The main goal of Service Level Management is to define, negotiate and
monitor the quality of the project services that are accepted by two parties.
The results of interaction/negotiation should be incorporated in the Service
Level Requirements document (SLR) [77]. So they should have a SLR that is about
the CICT Requirement for an aspect of an IT Service. This document should reflect
the CICT needs and expectations regarding:
121
•
The functionality and characteristics of the service.
•
The availability of the service.
•
The continuity of the service.
•
Service implementation time and procedures.
The next step in implementation must be the preparation and acceptance of
the agreements necessary for the services. A detailed description of the service must
be included in the SLAs. They should talk about everything from the more general
aspects to the most specific details of the service [77].
The suggested SLA for CICT is included the following important parts (see
Appendix D):
•
Service description: describes the services and scope of services
•
Roles and responsibilities definition: specify the responsibilities of the
both parties, CICT and the outsourcer.
•
Requesting service: describes how CICT can contact to outsourcer.
•
Service Maintenance: describes the maintenance related work.
•
Pricing: identify how they calculate the cost and calculate the amount of
cost.
•
Reporting and reviewing: determines the periodic review and service level
reporting.
The Service Level Management process is typically implemented along the
following activities:
122
•
CICT should prepare SLR first to know about their needed functionality
of the software development projects.
•
Also they need to have a SLA template, to have a managed and
monitored relationship with the outsourcers.
•
Two parties should define the responsibilities and the functions and
services in detail and with very clear statements.
•
The SLA should be reviewed and monitor frequently by the project
manager.
•
Frequently report of the project progress should be prepared by
outsourcer.
5.2.2.5 Change management
The main aim of Change Management is to evaluate and plan the change
process to ensure that, if a change is made, it is done in the most efficient way
possible [77].
Before implementing Change management process in CICT, a Change
manager should be defined, the one person who is most responsible and accountable
for change management. The change manager is more of a role, depending on the
size, complexity and structure of the organization, there may be more than one
person playing the role of change manager for assisting with several activities. The
change manager plays a leading role in many of the major activities of change
management as follows [78]:
•
Receive and filter requests for change (RFCs). There must be a single point
of collection for RFCs. The change manager will review new RFCs and filter
out those that are impractical or duplicates of existing requests. The change
123
manager will serve as the gatekeeper to the activities of the change
management process.
•
Coordinate the activities of the change advisory board (CAB). The change
manager will serve as leader and facilitator for the change advisory board and
its emergency committee. The change manager will convene the CAB.
The change manager and the CAB will make recommendations for
implementation, further analysis, deferment or cancellation of an RFC.
•
Issue and maintain the forward schedule of changes (FSC). The change
manager is the keeper of the FSC. When the change advisory board approves
changes, the change manager will add the change to the FSC and will give it
to outsourcer to implementation.
•
Close RFC. The authority to declare a change complete and closed should be
limited to the change manager. A change should be removed from open status
only when it has been verified that the change has been successfully
implemented and accepted by the CICT.
Change management implementation includes some cost such as expenditure
and people. In expenditure terms, the cost is about the any purchases of software
designed to aid the creation and processing of request for change. But CICT can
reduce this cost by using the suggested templates. In people terms, CICT should
assign the roles and responsibilities to existing members of staffs, such as analyzer or
developer.
So the activities for change management are:
•
CICT should allocate on person as a change manager, he/ she can be the
outsourcing project manager.
•
Also CICT need to Change Advisory Board that is a group consist of analyzer
and developer to help the change manager in assessment of changes.
124
•
After assigning the roles and responsibilities, it is important to ensure that
those participating in the implementation and subsequent operation of the
process understand what is required of them. That means required training
should be defined
•
CICT should use some forms to creating request for changes.
•
The request for change should be reviewed by CAB and accepted by change
manager.
•
Also the change and its budget for its implementation should be considered.
The outputs from the change management process are [77]:
•
Forward schedule of changes (FSC) – A forward schedule of changes is a
listing of upcoming changes which are be scheduled and communicated to
other IT service management processes and to the rest of the CICT. The
forward schedule of changes shows the changes that have been approved and
given a date for implementation.
•
Updated Requests For Changes
•
Change advisory board decisions - The discussions of the change advisory
board provide the basis for the change manager's decisions to approve or
reject proposed changes. The members of the CAB help to determine if
changes make sense from technical, financial, and business viewpoints.
•
Change management reports - Change management reports allow managers
to evaluate the effectiveness of the process in the past and its direction in the
future.
125
5.2.2.6 Supplier management
The purpose of Supplier Management is to plan, manage and review suppliers
of outsourcing services and to monitor the agreed service levels.
Organizations that establish a formal supplier management program can work
more effectively with outsourcers to achieve better business, service and cost
outcomes, according to Gartner. Even the best developed and structured contract and
service-level agreement (SLA) aren't enough to effectively manage vendor
relationships. So If CICT implements supplier management can better manage
information flow, and have more comprehensive and relevant information about the
outsourcer, which places them in a stronger position during negotiations.
"Vendor Management: 2009 Research Agenda Survey" indicates that
commercial and government organizations are showing a growing interest in SM to
improve spending controls, visibility, governance and regulatory compliance.
Outsourcer relationship management is about ensuring that the outsourcer's
goals and CICT's goals remain aligned, and that the outsourcer delivers the services
the CICT expects.
Before doing any activities, CICT needs a supplier manager. His/ Her roles is
to ensure that the CICT goals are met, outsourcer services are scoped, documented
and aligned with SLAs, documents roles and responsibilities between lead and subcontracted suppliers, assesses the impact of changes, attends CAB meeting, performs
contract or SLA reviews at the determined time.
126
There are some activities and suggestions to helping CICT to better supplier
management:
•
First CICT should choose outsourcers with standardized processes.
•
Then categorize outsourcers and choose the best one.
•
CICT should define roles and responsibilities of the staffs.
•
Regular meetings and scorecards can help CICT to increase supplier
performance.
•
Defined service-level agreement measurements and metric reporting (for
example, response time)
•
Outsourcer summary reports that distill information from performance
surveys are provided quarterly to the CICT senior management team for
review.
•
Outsourcer should prepare regular reports on results of the each phase of
project
•
Monthly/bi-weekly review can help CICT to focus on reviewing service
levels and identifying areas that require management attention. The agenda
for these meetings can include milestone review, quality review, performance
and assessment.
•
Also they can have weekly meeting between both project managers and
developers for successful service delivery. These meetings will ensure
identification of issues early so that they can be addressed. The agenda for
these meetings can include project review, issue resolution, and team
discussion. The day-to-day interactions must be focused on resolving any
issues as they arise. The CICT teams should understand when issues should
be escalated, and the outsourcer team should make a commitment to take
ownership of issues related to application services.
127
5.2.2.7 Information Security Management
The purpose of information security management is to ensure that the
information is correct and complete, that it is always available for the development
purposes and that it is only used by the outsourcer people who are authorized to do
so [77].
About 60% of companies fail to do security risk mitigation when outsourcing
software development, according to Gartner. Perfect security is impossible, but CICT
should aim to provide a level of security appropriate to their objectives and operation
needs. However, security is one of the most essential factors for successful
outsourcing. Security issues may result in terrific expenses on re-establishing
damaged reputation, leaving aside correcting mistakes or even re-doing all the work.
To ensure that outsourcing arrangements meet the needed standard of
security, an outsourcing security expert, highlighted lately four necessary stages,
including knowing requirements, specifying expectations of the outsourcer, ensuring
that the outsourcer can meet those requirements, and staying up-to-date.
Successful security management is a must for successful outsourcing.
Companies applying for software development outsourcing should ensure that their
security management requirements are well defined and indicated in the agreements
and contracts that control outsourcing relationships.
Security Management is a continuous process and the Security Plan and
security-related sections of the SLAs should be kept up-to-date
128
CICT should develop security policy and define:
•
The relationship with the general CICT policy.
•
Coordination with other IT processes.
•
The protocols for access to information.
•
The risk assessment procedures.
•
Training programmes.
•
The level of monitoring of security.
•
What reports need to be issued periodically.
•
The scope of the Security Plan.
•
The structure and people responsible for the Security Management
process.
•
The processes and procedures employed.
There are some ways to control the security, such as:
•
CICT should define a security policy that is align with the CICT goals.
•
CICT should ensure the outsourcer clearly understands and implements
the security strategy they demand, including data protection and
intellectual property protection within the outsourced service.
•
The security requirements are based on such factors as the nature of the
CICT business, regulatory considerations, sensitivity of the data, and the
consequences of loss or misuse.
•
Thoroughly examine the level and the approach to IT security the
outsourcing provider employs: access control, monitoring the integrity of
outsourced operations, etc. And have all CICT security needs reflected in
the contract.
•
There should be ongoing IT security management in the CICT, as new
security threats and challenges evolve. Making security a regular item at
129
the management meetings with the outsourcing provider is a best practice
to provide for security issues.
•
It is also important that Security Management is up-to-date regarding
new risks and vulnerabilities caused by viruses, spyware, denial of
service attacks, and that the necessary hardware and software upgrades
are made.
5.2.2.8 Service Evaluation
The process of service evaluation is to consider whether the performance and
value of a service is acceptable and to evaluate service quality on a regular basis.
This includes identifying areas where the targeted service levels are not reached and
holding regular talks with outsourcer to make sure that the agreed service levels are
still in line with CICT needs.
Service evaluation goal is to assess project outage and to instigate corrective
action if required. And to ensure the outsourcer processes is align with SLA.
There are activities as follow to evaluate the final services:
•
CICT tester of the project should test the program to ensure that all
the objectives are achieved.
•
CICT should define some measurements that help them to measure
the quality of final services, such as user satisfaction. Customer
satisfaction on IT outsourcing service is significant in the direction to
outsourcing performance.
130
•
CICT should ask staffs and users about reporting every dissatisfaction
of the project
•
Have a regular meeting during the outsourcing project. Have a good
Service level management and supplier management can help to
ensure that the services are aligned with the CICT goals and
requirements.
Table 5.1 shows the benefits of each processes of framework for CICT. It
means that according to the CICT problems, these processes have some benefits for
CICT that help them to mitigate or remove the problems.
Table 5.1 benefits of the framework processes for CICT
CICT Problems
Framewor
k Related
Benefits for CICT
Processes
• Downtime problem
Incident
Management
• Ensures that all the incidents are addressed in the
CICT.
• Finds a solution for each happened incidents.
• Recurring same
problem.
Problem
Management
• Reduces the downtime of the project.
• Downtime
• Finds a permanent solution for the problems.
problem
• Cost problem
• Eliminate of recurring of the same problems.
Financial
Management
• Makes sure that outsourcing is the best options for
CIC according to their budget.
• Ensures that funds are available for planned
modules.
• Helps to track current expenditures against the
budget.
131
• Misunderstanding
of
Service
contract Level
the
Management
statement.
• Misunderstanding
of
• Understand the CICT requirements through an open
process by creating Service Level Requirement
(SLR).
• The CICT expectations are managed and met by
the
outsourcers.
• Eliminates misunderstandings.
requirements.
• Service levels can be measured against agreed
targets.
• Ensure that all services and conditions necessary for
the CICT are mentioned in the agreement.
• By declaring all condition and requirements in a
clear statement, they can solve the time and cost
problem (see 4.3 for more information about the
CICT problems).
• Not
having
effective
plan
an
Supplier
to
Management
manage
their
relationship
with
• Ensures that outsourcing provider perform all
conditions and term of contracts.
• The weekly and monthly reports can help CICT to
control the project from far distance.
outsourcer.
• Helps CICT to manage the relationship between two
parties by providing the meetings and reports.
• How to manage Change
when Management
project
the requirement changes.
• Applying the necessary changes with the cost and
requirement
change.
time control.
• Reduce additional
cost
• Manages the changes of the project, especially when
and
when
• By preparing a Request for Change (RFC), CICT
time
can filter, prioritize, and manage any changes and
changes
also the cost and expenditure of the changes is
occur.
determined.
• It helps CICT to reduce the additional cost that is
related to any changes.
• Security
when
problem Information
conducting Security
with outsourcers
Management
• By defining the Information Security policy, they
can monitor the security of their information.
• Ensures that just authorized people access to the
information.
132
• How to ensure about
the service quality
Service
Evaluation
• Ensures about quality of service delivered by
outsource providers.
• Defines measurements to evaluate the outsourcer
functionality.
5.3 OM Framework Implementation Project Organizational Structure
5.3.1 Implementation team and groups
For the purpose of implementing the OM framework in CICT several teams
and groups should be identified. Members of this group should be selected from the
employees of the CICT software project team and CIO.
5.3.1.1 Steering Group
A steering committee is necessary to lead the team through the ITIL adoption.
This role sets project direction, makes key decisions and provides final approval of
Program deliverables.
133
The Implementation Project Manager should act as a steering group for this
project, bringing in other parties as required to make sound decisions. He can be the
CIO of CICT.
Key activities for this role include:
•
Champions process solutions across the CICT
•
Conducts periodic meetings to monitor Program progress and issues
•
Provides final review and approval of program deliverables
•
Identifies and appoints key Program team members
•
Coordinates major program decisions that have been escalated to the Steering
Group on a timely basis to meet program objectives.
5.3.1.2 ITIL Implementation Project Manager
Project manager should be proposed among Heads of the CICT (for example
CIO). Project manager should be familiar with process in project and has to know
concept of the ITIL Framework. This role provides project management oversight
and expertise to assist Core Teams in accomplishing their objectives.
Key activities for this role include:
• Co-ordinates activities with other project managers when necessary.
• Provides status of work in progress and/or issues
134
• Develops project work plans, schedules and staffing requirements for projects
assigned.
• Conducts weekly change, issues and status meetings to track progress and
risks with Core Teams assigned to.
• Ensures that outstanding project management, process implementation and
design requirements and/or issues are being addressed for projects assigned.
• Schedules workshops and meetings as required.
• Provides overall leadership and management for the projects assigned.
5.3.1.3 Implementation Teams
Implementation teams should consist of staffs of the CICT who familiar with
processes in working area. Implementation Teams for each specific process within
the ITIL framework should incorporate selected members of the Service
Management Project Team and key staff members of the software development
team. Heads of Departments and employees of the CICT will need to be included as
changes recommended will affect staff under their control.
5.3.2 Framework Applying Steps
The researcher recommends 5 steps that CICT should undertake to
demonstrate adherence to the Outsourcing Management Framework. The steps
detailed are as depicted in figure 5.4.
135
1
2
3
4
5
Figure 5.4 Framework implementation Steps
136
5.4 Framework verification
OM framework verification was conducted with the Mr. Helmee Yaacob,
development team manager and outsourcing manager and also their team members.
They commented on the framework and then acknowledged the framework
comprehensiveness and clarified that it will be a good guidance for CICT to
managing the outsourcing relationship and outsourcing projects (see Appendix E).
And also they approved the incident report form and other forms and acknowledge
that these are so useful for CICT. The Acceptance Test for OM Framework
Questionnaire has been attached in appendix D.
5.5 Framework Finalization
After developing the framework, it was shown to the CICT development
team and they gave some comments and suggestion on the OM Framework.
ITIL V3 doesn’t have any special process as a risk management, but Mr.
Helmee Yaacob suggested adding this process to the framework. Because risk
management is an important process in whole the software development outsourcing.
So I considered it in my Framework.
137
Risk refers to future conditions or circumstances that exist outside of the
control of the project team that will have an adverse impact on the project if they
occur. A risk is a potential future problem that has not yet occurred.
So it should be implemented in phase 2. Because before making an
agreement, the organization should be considered any related risks and the suggested
solution for them. Also it should be continued in all the phases to attention to all the
risk during the projects.
So I should add another part in section 5.2 as Risk Management:
5.5.1 Risk Management
The main goal of risk management is to identify, assess and control risks.
This includes analyzing the value of assets to the business, identifying threats to
those assets, and evaluating how vulnerable each asset is to those threats.
In organizations almost every decision has an upside and a downside
involving some degree of risk. Effective risk management structure supports better
decision-making through a good understanding of risks and their likely impact.
Ensuring CICT makes cost effective use of risk management first involves creating
an approach built up of well defined steps and then embedding them [79].
138
CICT can achieve some benefit of risk management implementation. The key
benefit is the achievement of CICT objectives. The others are better focus on
business priorities, strengthening of the planning process and the means to help
management identify opportunities, a cultural change that supports open discussion
about risks and potentially damaging information; improved financial and
operational management by ensuring that risks are adequately considered in the
decision-making process; and increased accountability of management. Risk
assessment and risk management are important contributors to the success of an IT
outsourcing projects.
There are some activities for managing the risk of project:
•
First CICT should identify all possible risks if they outsourced their
software development project, and create a risk management plan.
•
They should analyze the risks to find the potential and important risk,
and response to the important risk first.
•
The most important thing CICT can apply in the risk management is to
create contingency plan for high risks.
•
They should control the risk during the project and look for the new
risks.
•
Also, they should ensure that outsource company have a high degree of
understanding of the project.
•
The project manager can be a risk manager as well.
After applying all comments, my Framework is changed to the figure 5.5 and
its road map finalized as the figure 5.6.
139
Figure 5.5 Finalized OM Framework for CICT
Figure 5.6 Roadmap of Outsourcing Management Framework for software Development Projects
140
141
5.6 Chapter Summary
This chapter identified process maturity level that is necessary for effective
framework design of the ITIL implementation project. And based on the gathered
information
about
current IT
infrastructure
of
CICT
outsourcing
projects,
implementation framework is developed. Also this chapter describes project
organizational structure and expected deliverables of the CICT projects after
deployment.
CHAPTER 6
DISCUSSION AND CONCLUSION
6.1 Achievements
Throughout the process of doing literature review and analysis of the case
study, tremendous achievement, knowledge and experience were collected. A good
understanding of current situation of CICT is obtained and referring to the objectives
of the project, a research of ITIL framework have been carried out with a thorough
case study. With all the information in hand, suitable processes of ITIL framework
for Outsourcing project were identified. Based on these elements, the Framework
was developed. Upon the completion of the framework, framework verification was
conducted with CICT development team.
Here are the achievements during the investigation and review:
143
•
From the analysis, organizational structure of the CICT and its
responsibilities were determined.
•
Form interviews and questionnaires, CICT outsourcing project
problems and issues during outsourcing were identified.
•
According to literature review and CICT analyzes the suitable
processes of ITIL Framework were identified and the Outsourcing
Management Framework was developed,
•
Researcher gave some suggestion to implement and apply the ITIL
processes in the CICT.
6.2 Constraints and Challenges
One the project constraint is to gathering the information about HRFIN
problems after outsourcing. Because it’s the first software development outsourcing
project of CICT. Interview and questionnaire are used to find the HRFIN users
problems. HRFIN project is implementing phase by phase, and some of its phases are
not implemented yet, so the documentation about problems is not full.
Another objective is to propose a framework that its elements raised from
ITIL framework. This objective is achieved, but there are some problems in the way
of development. Because I’ve used new version of ITIL that is V3 and the documents
and papers about it are not so much. So it was difficult to answering this question”
How to apply it to CICT? ”.
144
6.3 Recommendations
The objectives of the project are to determine set of standard ITIL processes,
operational management procedures and practices which will allow the CICT to
manage a software development outsourcing projects. The pursuance of the research
has determined some areas that can be enhanced for further studies, such as:
•
Measuring the level of Service Quality after OM Framework implementation
•
Comparison of Customer satisfaction level before and after OM Framework
implementation in CICT.
•
Developing post implementation strategy for the CICT.
•
Information that is presented in the project can be use by organizations that
have outsourced their IT service.
•
The ITIL implementation framework will be useful for other department of
UTM.
The researcher hopes that the OM Framework will be useful piece of
information for CICT and other department that use outsourcing especially those in
the higher education institute that wish to embark on ITIL implementation.
This project has certainly brought great achievement for the researcher in
understanding the corrections between human skills, management and IT.
145
6.4 Chapter Summary
This chapter have three sections and stated in detail on the project
achievement, constraint, challenges and future recommendations related to current
project. From the outcome of the case study, findings were purpose of ITIL processes
in Outsourcing Projects.
The first section is discussed achievements that were obtained during
research and analysis. The second section is described constraints and challenges that
were faced by researcher during doing this project. Last section of this chapter has
recommendations for future research based on the findings and conclusions of the
study.
146
REFERENCES
1. John Ward and Joe Peppard, ‘Strategic Planning for Information Systems’, John
Willey & Sons, third edition, Oct: 2007.
2. Subhankar Dhar and Bindu Balakrishnan, ‘Risks, Benefits, and Challenges in
Global IT Outsourcing: Perspectives and Practices’, IEEE International
Conference, 2006.
3. http://www.wisegeek.com/what-is-outsourcing.htm, [online]
4. http://www.mariosalexandrou.com/definition/outsourcing.asp, [online]
5. Federal Financial Institutions Examination Council, “Outsourcing Technology
Services”, June: 2004.
6. Yu-An Huanga, Hsien-Jui Chungb and Chad Linc, “ R&D sourcing strategies:
Determinants and consequences”,2008.
7. http://www.outsourceit2philippines.com/blog/?p=157, [online]
8. http://www.sourcingmag.com/content/what_is_bpo.asp, [online]
9. Tas, J. & Sunder, “Financial Services Business Process Outsourcing”,
Communications of the ACM, 2004.
10. http://archwayconsultancy.com/, [online]
11. Forest Peterson, “Legal Offshoring: India's Pie”, [online]
12. Ian del Carmen, “Simple Steps to Rock-Solid Outsourcing Deals”, [online]
13. Ian del Carmen, “What You Need to Know About Outsourcing: Is Outsourcing
Really For You?”.
14. Zhang Pei, Zeng Zhen-xiang, Huang Chun-ping, “A Framework for IT
Outsourcing Decision Process”, 2005
147
15. Gunther Kruse and Christine Berry, “OUTSOURCING: The ‘how to’ Guide”,
2007
16. “MODERN TRENDS IN INFORMATION SYSTEM”. [online]
17. Ben Stevens, “Maintenance Outsourcing”, Aryana Group – IPAMC, 2006.
18. Outsourcing Factory Incorporated, “Steps to Select the Right Outsourcing
Vendor”, 2008.
19. Gerry Kennedy, “The ACCESS Precept: Roadmap to Outsourcing Success”,
2007
20. Glenn Wheaton,”Request For Proposal (RFP)”, 2008.
21. Warren S. Reid, “Outsourcing: The 20 Steps to Success”, [online]
22. Priyesh Goyal and Rajat Chamria, “Business Process Outsourcing: An
Introduction to BPO Industry”, sep: 2007.
23. Ernst & Young, European outsourcing survey, “Outsourcing: the rise of
fragmentation”, 2008.
24. Dhar, S., Gangurde, R., & Sridar, R., “Global information technology
outsourcing: From a risk management perspective”, 2004.
25. “Advantages of outsourcing”, http://jobs.lovetoknow.com/, [online]
26. JC Redmond, “Reasons for Outsourcing”, [online]
27. IT Governance Institute, “board briefing on IT Governance”, [online]
28. Ann All, “IT Governance: Taking It from the Top”, Feb:2008
29. Karen D. Schwartz ,”IT Governance Definition and Solutions”, may:2007
30. Peter Weill and Jeanne W. Ross, “IT governance”, 2007
31. Andrew Clifford, “What is IT governance?”, [online]
32. W.Van Grembergen, "Strategies for Information Technology Governance", Idea
Group Publishing, 2004.
33. HP, "HP IT Service Management (ITSM), Transforming IT organizations into
service providers", 2003.
34. Symons Craig, Mark Cecere, G. Oliver Young, and Natalie Lambert, “IT
Governance Framework: Structures, Processes, And Communication”, White
Paper, Forester Research, March: 2005.
35. Van Grembergen, W., “Introduction to the mini track IT governance and its
mechanisms”, Proceedings of the 35th Hawaii International Conference on
System Sciences, 2002.
148
36. Webb, P., Pollard, C., and Ridley, G. “Attempting to define IT Governance:
Wisdom or Folly”, Proceedings of the 39th Hawaii International Conference on
system Sciences, 2006.
37. Shamsul Sahibudin, Mohammad Sharifi Masarat, Ayat, “Combining ITIL,
COBIT and ISO/IEC 27002 in Order to Design a Comprehensive IT Framework
in Organizations”, 2008.
38. George Spafford, “The Benefits of Standard IT Governance Frameworks”, 2003.
39. Jim Long, “what is Six Sigma?”, [online]
40. David L. Cannon, Timothy S. Bergmann, Brady Pamplin “CISA - Certified
Information Systems Auditor”, [online]
41. John Morency, “COBIT vs. ITIL”, 2005
42. Lou Hunnebeck, “ISO 9000 vs. ITIL vs. Six Sigma”, 2004.
43. Alison Cartlidge, Ashley Hanna, Colin Rudd, Ivor Macfarlane , John
Windebank, Stuart Rance, “An Introductory Overview of ITIL® V3”, The UK
Chapter of the itSMF. 2007.
44. Pink Elephant, ‘The ITIL® Story’ White Paper, September, 2004
45. Michael Brenner, “Classifying ITIL Processes , A Taxonomy under Tool
Support Aspects”, 2006
46. Evelyn Hubbert, Simon Yates, Rachel A. Dines, ‘The Evolution From Process
To Service Model’, October 2007
47. Tim Young , “Optimizing ITIL Service Delivery”, nov:2003
48. Hank Marquis, “ITIL® v3: What It Is and Why You Should Care”, 2008
49. IBM Corporation, “Introduction to the IT Infrastructure Library”, 2004
50. Office of Government Commerce (OGC), ITIL Core Books , Service Strategy,
TSO, UK, 2007
51. Office of Government Commerce (OGC), ITIL Core Books , Service Design,
TSO, UK, 2007
52. Office of Government Commerce (OGC), ITIL Core Books , Service Transition,
TSO, UK, 2007
53. Office of Government Commerce (OGC), ITIL Core Books , Service operation,
TSO, UK, 2007
54. Steven M. Bragg, “Outsourcing”, [online]
55. James Bucki, “Top 6 Outsourcing Disadvantages”, [online]
149
56. Outsourcing
:
Pros
vs.
Cons,
http://www.squidoo.com/ProsandConsofOutsourcing, [online]
57. Axel Hochstein, Dr. Rüdiger Zarnekow, Prof. Dr. Walter Brenner, “ITIL as
Common Practice Reference Model for IT Service Management: Formal
Assessment and Implications for Practice”,
58. IT Governance Institute, “Governance of Outsourcing”, [online]
59. Sankar, C. et al. “Global Information Architectures: Alternatives and Tradeoffs”,
International Journal of Information Management, 13, 2 (April, 1993), 84–93.
60. Weill, P. and Ross, J. IT governance, Boston, Massachusetts, Harvard Business
School Press, 2004.
61. Weill P. and Vitale M. Place to space, “migrating to eBusienss models”, Harvard
Business School Press. Boston, Massachusetts, 2002.
62. J.C., Henderson, “Plugging into Strategic Partnerships: The Critical IS
Connection”, Sloan Management Review, Spring, 1990, pp. 7–18.
63. Fan Jing Meng, Xiao Yang He, Shun Xiang Yang, Peng Ji, “A Unified
Framework for Outsourcing Governance”, IEEE International Conference on ECommerce, 2007
64. “The Software Development Life Cycle (SDLC) For Small To Medium
Database Applications”, [online]
65. http://www.e-isn.com/software-outsourcing-types.htm, [online]
66. Pravesh Mehra, “A comprehensive talent strategy for services outsourcing”
67. HP, “ITIL Version 3 Frequently Asked Questions HP Services”, march: 2007
68. Marko Jäntti, “Lessons Learnt from the Improvement of Customer Support
Processes: A Case Study on Incident Management”, c_Springer-Verlag Berlin
Heidelberg 2009.
69. João Caldeira and Fernando Brito e Abreu, “Influential Factors on Incident
Management: Lessons Learned from a Large Sample of Products in Operation”,
2008
70. William Maurer and Richard T. Matlus, “How to Develop and Apply SLAs in
Outsourcing”, Gartner, 7 Feb. 2007
71. British Educational Communications and Technology Agency, “incident
management”, 2004
72. Troy DuMoulin, “ITIL Implementation Roadmap (incident Management), 2007
150
73. British Educational Communications and Technology Agency, “problem
management”, 2004
74. Troy DuMoulin, “ITIL Implementation Roadmap (Problem Management), 2007
75. British Educational Communications and Technology Agency, “financial
management”, 2004
76. Troy DuMoulin, “ITIL Implementation Roadmap (financial Management), 2007
77. http://itil.osiatis.es/ITIL_course/it_service_management, [online]
78. http://www.anticlue.net/archives/000840.htm, [online]
79.
OGC
website,
“Risk
Management”,
http://www.best-management-
practice.com/Knowledge-Centre/Best-Practice-Guidance/Management-of-Risk/,
[online]
151 Appendix A
Interview questions
1. Do you give some of your IT projects to outside providers?
2. What kinds of your IT services are outsourced? If “Other”, please explain your
answer.
3. Do these service (what you give to outsiders) cover all your job?
4. Why do you use outsourcing services? Please explain your answer.
5. What kinds of problems do you have when conducting with outsourcing?
6. Which types of software development outsourcing do you have?
7. What kinds of problems do you face with software development projects?
8. Have the problems ever canceled your contract? Why?
9. What benefits do you get from outsourcing?
10. How do you inform the outsource providers about application outage?
11. How long do you need to wait for specialist for elimination of problem and how
often does same problem arise?
12. Do you use any ways to solving these problems?
13. How much dose Using those way help you?
14. Do you satisfy using outsourcing?
15. Any suggestions for better work and solving the problems.
152 Appendix B
Questionnaire
Thank you for taking the time to help us with this survey.
16. How important is using IT in doing your work?
Not important at all
Somewhat important
Not very important
Very important
17. What kind of work do you do using IT?
Data collection
Collaboration
Data analyzing
Communication
Forecasting
Other
If “Other”, please explain your answer:
..............................................................................................................................................
..............................................................................................................................................
18. What kind of software do you use in your job?
..............................................................................................................................................
..............................................................................................................................................
19. What kind of your IT services are outsourced?
Software programming
help desk
Networks
supportive
Others ……………………………………………………………………..
20. Why do you use outsourcing services? Please explain your answer.
Reducing the cost
lack of related technology
153 Lack of adequate staff
enabling to focus on your core
business
Getting work done more efficiently or effectively
Others……………………………………………………………………
……………………………………………………………………………
21. What kind of problem do you have when conducting with outsourcing? Please
explain your answer.
Time
misunderstanding
Maintaining relationship
quality
Cost
others
……………………………………………………………………………………
……………………………………………………………………………………
22. What kind of outages usually do you have after implementing the outsourced
project? Please explain your answers.
……………………………………………………………………………………
……………………………………………………………………………………
23. How often does same problem arise?
Very often
Never
Often
Seldom
Very seldom
24. How do you inform the outsourcer department about application outage?
Call
Send email/ fax/ voice
message
Visit
Other
154 If “other”, please explain your answer:
..............................................................................................................................................
..............................................................................................................................................
25. How long do you need to wait for specialist for elimination of problem?
More than 1 week
1 day
4-7 days
during day
2-4 days
do not need to wait
26. Do you satisfy using outsourcing? Why?
Yes
No
……………………………………………………………………………………
……………………………………………………………………………………
27. Have you think about any way to eliminating these problems?
……………………………………………………………………………………
……………………………………………………………………………………
28. Do you have any suggestions for better communication and better working with
outsourcers?
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
155 Appendix C
UTM – IUMIS, Suggestion List
Component: Rekod 7P
Version:
OR#:
UTA_SL_HRMS_PKP_009
CR#, if any:
Test Case#:
Test Level:
UTA(Session 2)
Date:
26/06/2009
Attachment:
YES
NO
Severity:
3
1
2
Observation Description:
Sumber manusia > Perkhidmatan > Maklumat Peribadi > Rekod 7P
Screen: Perincian Sumbangan Sepanjang Tempoh Perkhidmatam
Currently, the contents Penyelidikan is used as default screen of Perincian
Sumbangan Sepanjang Tempoh Perkhidmatam. Please change it to put the contents of
Pengajaran dan Penyeliaan as the default screen.
Raised By:
Khairul Azmi Ishak/ Helmee Yaakob
OR Status
Signature:
Date
Open
Closed
Date:
Regression
Component affected:
Reviewed by (Team
Leader)
Comments:
Resolution:
Resolved by:
Verified by:
Developer:
Date:
QA (XYBASE)
Date:
Test Engineer
Date:
156 Appendix D
Suggested SLA Template
Service Level Agreement (SLA)
For
CICT outsourcing projects
By
CICT
Effective Date:
157 1. General Agreement Overview
This Agreement represents a Service Level Agreement (“SLA” or
“Agreement”) between Outsourcer and CICT for the provisioning of Software
development project.
This Agreement remains valid until superseded by a revised agreement
mutually endorsed by two parties. Changes will be recorded in an Amendments
section of this Agreement and are effective upon mutual endorsement by them.
This Agreement outlines the parameters of all services covered as they are
mutually understood by them.
The purpose of this Agreement is to ensure that resources are in place to
provide consistent service support and delivery to the CICT by the Service
Provider(s).
2. Service Description
2.1 Service Scope
Place the CICT project focused service description here.
2.2 Assumptions
•
Services provided by outsourcer are clearly documented in the service
catalog.
•
Funding for major updates will be negotiated on a service-by-service
basis.
•
Changes to services will be communicated and documented.
•
Service will be provided in adherence to any related policies, processes
and procedures
158 •
Scheduling of all service related requests will be conducted in
accordance with service descriptions.
3. Roles and Responsibilities
3.1 Parties
List all relevant contact persons, for example:
The following service owner(s) will be used as the basis of the Agreement
Service Owner
Title/ Role
Contact Information
3.2 Service Scope
The following Services are covered by this Agreement;
Reference No.
Service
1001
Provides staffs with a understandable interface
3.3 Service Provider Responsibilities
Service Provider responsibilities and/or requirements in support of this
Agreement include:
•
Provide outsourcer with helpdesk services
159 •
Maintain and update of the project for a period of time until an
extension is made (if required.)
•
Provide the ability for an extension to the contract (if required)
•
Meet response times associated with the priority assigned to
incidents and service requests.
•
Generating quarterly reports on service level performance.
3.4 CICT Responsibilities
CICT responsibilities and/or requirements in support of this Agreement
include:
•
CICT is a middle man to communicate between stakeholders and
vendors.
•
Provide outsourcer with any information required for project to be
completed
•
Provide real estate agents for interviews required..
•
Communicate specific service availability requirements
4. Requesting Service
Clear and unambiguous definitions of how long it will take the parties to
respond. For example this section might include the definition of initial response to
inquiry. For the CICT response time is more important to know, so we consider the
distance in KM and then according to this distance the response time will be
evaluated
Distance of outsourcer organization to UTM: ………………………………..
1. Web / IT Request: ……………………………………………………….....
2. Contact person Phone: ……………………………………………………...
160 3. Contact person Email: ……………………………………………………….
5. Maintenance and Service Changes
All services and/or related components require regularly scheduled
maintenance (“Maintenance Window”) in order to meet established service levels.
These activities will render systems and/or applications unavailable for normal user
interaction as published in the maintenance calendar.
•
General statement on Change Management process
•
Communication about emergency maintenance
Additional locations and timeframes as required should be added. For example,
standard maintenance, major upgrades/changes,
6 Pricing
6.1 Charges
It depends on how big the scope is which is depending on the amount of the
modules of the project.
7 Reporting, Reviewing and Auditing
7.1
Periodic Review
This Agreement is valid from the Effective Date outlined herein and is valid
until the Date of Termination.
The Outsourcer Relationship Manager is responsible for regular reviews of
this document. Contents of this document may be amended as required, provided
mutual agreement is obtained from both parties and communicated to all affected
161 parties. The Outsourcer Relationship Manager will incorporate all subsequent
revisions and obtain mutual agreements / approvals as required.
Designated Review Owner: [Document Owner]
Review Period: [Review Period] e.g. “Annually” or “Quarterly”
Previous Review Date: [Last or Previous Review Date]
Next Review Date: [Next Review Date]
7.2
Service Level Reporting
The Service Provider will supply the CICT with the following reports on the
intervals indicated:
The report should be presented in three ways:
1. Discussions: every two weeks
2. Monthly
3. Meeting on high level committee, 3 or 4 times in a year.
Report Name
Interval
Initial Report
14th June 2010
Contract Extension Report
21st June 2010
14th October 2010
Quarter Report
8 Contract Agreement
Accorder
Job Title
Agreement Date
162 Appendix E
Acceptance Test for OM Framework
Purpose of Framework: To develop a framework that implements ITIL concepts
Immediate Goal:
To solve the software development outsourcing problems
Long-Term Goal:
To improve the outsourcing relationship management and improve quality of
services
Name:
Faculty:
Position:
Date:
How do you rate the OM Framework at this time? (Please mark √ at the respective boxes)
5
Perceived Usefulness:
4
3
2
1
Very Useful
Not Useful
The degree to which a user believes that using the OM Framework will enhance
performance.
5
4
3
2
1
Very Easy
Perceived Ease of Use:
Very Hard
The degree to which a user believes that using the OM Framework will be free from effort.
5
Attitude towards Using:
Favorable
4
3
2
1
Very Favorable
Not
Feeling favorable or unfavorable towards using the OM Framework.
Behavioral Intention to use:
Will Use
Will Not Use
The Strength’s of one’s intentions to use the OM Framework in the future.
Meets its Purpose:
Yes
No
Achievement of Immediate Goal:
Yes
No
Achievement of Long-Term Goal:
Will Achieve
Will Fail
Suggestions:……………………………………………………………………………………
……………………………………………………….…………………………………………
163 Participant 1
Acceptance Test for OM Framework
Purpose of Framework: To develop a framework that implements ITIL concepts
Immediate Goal:
To solve the software development outsourcing problems
Long-Term Goal:
To improve the outsourcing relationship management and improve quality of
services
Name:
Helmee Yaacob
Faculty: CICT
Position: System Analysis and manager of the development team at CICT
Date:
7 October 2009
How do you rate the OM Framework at this time? (Please mark √ at the respective boxes)
Very Useful
Perceived Usefulness:
5
4
3
2
1
Not Useful
The degree to which a user believes that using the OM Framework will enhance
performance.
5
4
3
2
1
Very Easy
Perceived Ease of Use:
Very Hard
The degree to which a user believes that using the OM Framework will be free from effort.
5
Attitude towards Using:
Favorable
4
3
2
1
Very Favorable
Not
Feeling favorable or unfavorable towards using the OM Framework.
Behavioral Intention to use:
Will Use
Will Not Use
The Strength’s of one’s intentions to use the OM Framework in the future.
Meets its Purpose:
Yes
No
Achievement of Immediate Goal:
Yes
No
Achievement of Long-Term Goal:
Will Achieve
Will Fail
Suggestions: you should put on Risk Management during project. Because it‘s very
important to project outsourcing.
164 Participant 2
Acceptance Test for OM Framework
Purpose of Framework: To develop a framework that implements ITIL concepts
Immediate Goal:
To solve the software development outsourcing problems
Long-Term Goal:
To improve the outsourcing relationship management and improve quality of
services
Name:
Fazilah Seren
Faculty: CICT
Position: Developer
Date:
7 October 2009
How do you rate the OM Framework at this time? (Please mark √ at the respective boxes)
Very Useful
Perceived Usefulness:
5
4
3
2
1
Not Useful
The degree to which a user believes that using the OM Framework will enhance
performance.
5
4
3
2
1
Very Easy
Perceived Ease of Use:
Very Hard
The degree to which a user believes that using the OM Framework will be free from effort.
5
Attitude towards Using:
Favorable
4
3
2
1
Very Favorable
Not
Feeling favorable or unfavorable towards using the OM Framework.
Behavioral Intention to use:
Will Use
Will Not Use
The Strength’s of one’s intentions to use the OM Framework in the future.
Meets its Purpose:
Yes
No
Achievement of Immediate Goal:
Yes
No
Achievement of Long-Term Goal:
Will Achieve
Will Fail
Suggestions:
165 Participant 3
Acceptance Test for OM Framework
Purpose of Framework: To develop a framework that implements ITIL concepts
Immediate Goal:
To solve the software development outsourcing problems
Long-Term Goal:
To improve the outsourcing relationship management and improve quality of
services
Name:
Shahral Amir
Faculty: CICT
Position: Programmer
Date:
7 October 2009
How do you rate the OM Framework at this time? (Please mark √ at the respective boxes)
Very Useful
Perceived Usefulness:
5
4
3
2
1
Not Useful
The degree to which a user believes that using the OM Framework will enhance
performance.
5
4
3
2
1
Very Easy
Perceived Ease of Use:
Very Hard
The degree to which a user believes that using the OM Framework will be free from effort.
5
Attitude towards Using:
Favorable
4
3
2
1
Very Favorable
Not
Feeling favorable or unfavorable towards using the OM Framework.
Behavioral Intention to use:
Will Use
Will Not Use
The Strength’s of one’s intentions to use the OM Framework in the future.
Meets its Purpose:
Yes
No
Achievement of Immediate Goal:
Yes
No
Achievement of Long-Term Goal:
Will Achieve
Will Fail
Suggestions:
166 Participant 4
Acceptance Test for OM Framework
Purpose of Framework: To develop a framework that implements ITIL concepts
Immediate Goal:
To solve the software development outsourcing problems
Long-Term Goal:
To improve the outsourcing relationship management and improve quality of
services
Name:
Zaman
Faculty: CICT
Position: PPPM
Date:
7 October 2009
How do you rate the OM Framework at this time? (Please mark √ at the respective boxes)
Very Useful
Perceived Usefulness:
5
4
3
2
1
Not Useful
The degree to which a user believes that using the OM Framework will enhance
performance.
5
4
3
2
1
Very Easy
Perceived Ease of Use:
Very Hard
The degree to which a user believes that using the OM Framework will be free from effort.
5
Attitude towards Using:
Favorable
4
3
2
1
Very Favorable
Not
Feeling favorable or unfavorable towards using the OM Framework.
Behavioral Intention to use:
Will Use
Will Not Use
The Strength’s of one’s intentions to use the OM Framework in the future.
Meets its Purpose:
Yes
No
Achievement of Immediate Goal:
Yes
No
Achievement of Long-Term Goal:
Will Achieve
Will Fail
Suggestions:
167 Participant 5
Acceptance Test for OM Framework
Purpose of Framework: To develop a framework that implements ITIL concepts
Immediate Goal:
To solve the software development outsourcing problems
Long-Term Goal:
To improve the outsourcing relationship management and improve quality of
services
Name:
Suzana
Faculty: CICT
Position: Developer
Date:
7 October 2009
How do you rate the OM Framework at this time? (Please mark √ at the respective boxes)
Very Useful
Perceived Usefulness:
5
4
3
2
1
Not Useful
The degree to which a user believes that using the OM Framework will enhance
performance.
5
4
3
2
1
Very Easy
Perceived Ease of Use:
Very Hard
The degree to which a user believes that using the OM Framework will be free from effort.
5
Attitude towards Using:
Favorable
4
3
2
1
Very Favorable
Not
Feeling favorable or unfavorable towards using the OM Framework.
Behavioral Intention to use:
Will Use
Will Not Use
The Strength’s of one’s intentions to use the OM Framework in the future.
Meets its Purpose:
Yes
No
Achievement of Immediate Goal:
Yes
No
Achievement of Long-Term Goal:
Will Achieve
Will Fail
Suggestions:
Download