You are on page 1of 6

IT Services in Bina Bina University

Hendryantono Limantara Agnes Kurniati Nadia


Master of Information Technology Master of Information Technology Master of Information Technology
Binus Graduate Program Binus Graduate Program Binus Graduate Program
Anggrek Campus, Kemanggisan Jakarta Anggrek Campus, Kemanggisan Jakarta Anggrek Campus, Kemanggisan Jakarta
Email: anton.skatelbjb@gmail.com Email: akurniati@binus.edu Email: agnesnadiasayuti@gmail.com

Hari Herman Muhammad Jendro Yuwono


Master of Information Technology Master of Information Technology
Binus Graduate Program Binus Graduate Program
Anggrek Campus, Kemanggisan Jakarta Anggrek Campus, Kemanggisan Jakarta
Email: agnesnadiasayuti@gmail.com Email: muhammadjendroyuwono@hotmail.com

Abstract—Lorem ipsum dolor sit amet, consectetuer adipiscing B. Information Technology Service Management (ITSM)
elit. Etiam lobortis facilisis sem. Nullam nec mi et neque
pharetra sollicitudin. Praesent imperdiet mi nec ante. Donec
Service management (Cartlidge et al., 2012) is a set of
ullamcorper, felis non sodales commodo, lectus velit ultrices specialized organizational capabilities for providing value to
augue, a dignissim nibh lectus placerat pede. Vivamus nunc nunc, customers in term of service, including all of the processes,
molestie ut, ultricies vel, semper in, velit. Ut porttitor. Praesent methods, functions, roles, and activities that the service
in sapien. Lorem ipsum dolor sit amet, consectetuer adipiscing provider uses to deliver service to its customers. ITSM is an
elit. Duis fringilla tristique neque. Sed interdum libero ut metus.
Pellentesque placerat. Nam rutrum augue a leo. Morbi sed elit sit
implementation and management of IT service to ensure that
amet ante lobortis sollicitudin. Praesent blandit blandit mauris. IT service is aligned with business needs and actively support
Praesent lectus tellus, aliquet aliquam, luctus a, egestas a, turpis. the company. ITSM (Suhairi Gaol, 2013) can be a guide to
Mauris lacinia lorem sit amet ipsum. Nunc quis urna dictum the processes of IT service in the organization so that the
turpis accumsan semper. alignment between business and IT can be realized. There
Index Terms—IEEEtran, journal, LATEX, paper, template.
are several frameworks or methodologies that can be used
to implement ITSM, such as ITIL, COBIT, CMMI, ISO/IEC
I. I NTRODUCTION 20000, ISO 9000 (Cartlidge et al., 2012), Six Sigma, and
Nowadays our technology and information system has be- TOGAF (Arraj, 2013).[3]
come the important part of supporting our life. Afterwards, C. Information Technology Infrastructure Library (ITIL)
not only in the business part but also in educational the
ITIL is a set of best practices for ITSM (Suhairi Gaol,
information technology make the process of all kind business
2013). ITIL was published between 1989 and 1995 by Her
more efficient and effective. The University of Bina Bina is a
Majesty’s Stationery Office (HMSO) in the UK on behalf
company which is running in the field of education that was
of Central Communications and Telecommunications Agency
established in 2000. The University of Bina Bina engaged in
(CCTA). CCTA is now included in Office Government Com-
education S1 - S2 with 5 Studies program. There are 30000
merce (OGC). The initial version of ITIL consisted of 31
users, be it an active student, faculty, and employees. The
associated books covering all aspects of IT service provision.
University of Bina Bina has a mission to achieve Accreditation
This initial version was then revised and replaced by ITIL
in each program of study can achieve ISO certification and can
v2 consists of 7 books more closely connected. ITIL v2 is
be a World Class University in the future.
universally accepted and used in many countries by thousands
of organizations as a basis for effective IT service provision.
A. Information Technology Service (IT Service)
In 2007, ITIL v2 was replaced to ITIL v3 consisting of 5 core
IT service is a service which is provided by the IT service books covering the service lifecycle (Cartlidge et al., 2012).[3]
provider. IT service consists of a combination of information
technology, human resources, and processes. IT service gen- D. ITIL v2 and v3
erally makes a deal with the operational issues of information Most importantly, a detailed comparison between ITIL V3
technology and not on the development of the technology and V2 reveals that all the main processes known from ITIL
itself. For example, the process of making computer software V2 are still there, with only a few substantial changes. In
for sale are not the focus of IT service, but the computer many instances, however, ITIL V3 offers revised and enhanced
system used by the marketing and business development process descriptions. The main difference between ITIL V3
division will become the focus of IT service[6]. and V2 is the new ITIL V3 Service Lifecycle structure;
this means the old the structure of Service Support and F. Financial management for IT services
Service Delivery was replaced by a new one consisting of: 1) The objectives of financial management: To provide
Service Strategy Service Design Service Transition Service cost-effective stewardship of the IT assets and resources used
Operation Continual Service Improvement ITIL V3 also com- in providing IT services The aims of any IT services organ-
plements the processes known from ITIL V2 with a number of isation should include: To be able to fully account for the
new processes and puts more emphasis on producing value for spend on IT services and to be able to assign these costs to
the business. Due to the new Service Lifecycle structure, all the services delivered to the organisations customers To assist
interfaces between the ITIL processes were changed in order to management decisions on IT investment by providing detailed
reflect the new ITIL V3 process structure; so even if processes cost analysis regarding changes to IT services [9]
in ITIL V3 and V2 are broadly identical, their interfaces
have changed. Example: The Incident Management process
must now link to the Service Design processes, although a
comparison between Incident Management in ITIL V2 and V3
reveals that the process itself did not change substantially.[10]
E. Service Strategy
1) The objectives of service strategy: Service strategy
shows organizations how to transform service management
from an organisational capability into a strategic asset and to
then think and act in a strategic manner. Service strategy helps
clarify the relationships between various services, systems or
processes and the business models, strategies or objectives
Fig. 2. Financial Management
they support.[9] Other objectives include: Provide business
stakeholder value Differentiate the organisation Make solid
cases for investment Resolve conflicting demands for services G. Service design
Improve service quality by strategic planning We assume the designer does not need to start from scratch,
2) Value to the organisation/business of service strategy[9]: e.g. that a value model has been developed first the advantage
Provides guidance on how to design, and put in place is that this activity is already supported by established model-
service management as a strategic asset Sets the principles ing techniques and methodologies. Moreover, this means that
for developing service management policies, guidelines and essential decisions, as for the choice between using internal
processes across the service lifecycle Sets objectives and or external services (in which strategic concerns related to
expectations of performance towards serving customers and trust and collaboration play a role), have been made already
market spaces Identifies and prioritises opportunities Ensures (represented in the positioning of the value activities).
that organisations can manage the costs and risks associated 1) A service design method: The service design method
with their service portfolios Asks questions and plans a proposed here is based on the service models that we have
strategy for how to do something before progressing developed and takes the following steps. Starting point is the
value model. Step 6 marks the transition to web service design.
1. For each value object in the value model, introduce one
service (called one service). This step refers to the part of the
Service Realization Model that deals with what abstract core
services exist. Then consider in which value transfers the value
objects are exchanged and derived which service deliveries
are made by which actors, as part of which transactions
(Service Provisioning and Delivery Model). 2. If more than
one value activity is distinguished within a certain actor, they
give rise to core services as well. Furthermore, each value
activity corresponds to an (internal) actor that provides this
service to the actor in which the value activity is enclosed.
3. For each core service identified in 1 and 2, introduce the
resources needed. 4. For each resource identified in 3, indicate
Fig. 1. Strategy Generation the service that realizes this resource. If the service was not
identified yet, introduce a new one. This step draws again on
3) Introducing strategy generation[9]: the Service Provisioning Model. The step is applied recursively
4) The service strategy processes: Financial management till the scope of the model is reached. 5. For each service
for IT services Service portfolio management Demand identified in 1, 2 or 4, introduce additional enhancing services.
management The enhancing services identified in this step are services that
do not provide resources per se but are used to realize the 2. Service catalogue management
earlier identified services by providing access to them (cf. 3. Service level management
Service Composition Model) 6. For each service identified in 4. Availability management
1, 2, 4, or 5, try to delegate the service to a web service. This 5. Capacity management
is only possible when the service is informational in nature. 6. IT service continuity management
Core services can be informational, as in the case of digital 7. Information security management
products. In most cases, the enhancing services are suitable 8. Supplier management
candidates for automation.[1]

Fig. 5. ITIL Service Design

I. Service Reporting
Fig. 3. Service Cycle The goal of service reporting is to provide periodic consoli-
dated reports to users and business stakeholders on the historic
2) Business Service Management[4]: Design of new or
performance of all of the services against service levels. It aims
changed services for introduction into live environment Guid-
to provide the information for different services in a consistent
ance for designing and developing services Converting strate-
format, providing[2]:
gic objectives into service portfolios and service assets, or
* Comparison of SLA achievement across different services
improve existing services Development of design capabilities
and different suppliers
for service management
* One place for publishing all reports from all suppliers.

Fig. 6. Consolidation Service Report

Every supplier is responsible for:


* Providing service reports at the agreed time
* Providing service reports with the agreed information.
The SIAM provider is responsible for:
* Verifying the validity of service reports
* Collating service reports from multiple suppliers
Fig. 4. Business Service Management * Publishing and communicating the consolidated service
reports.
H. ITIL Service Design The reports should present factual information. This sup-
Key processes in ITIL Service Design ports a culture where these consolidated reports can be pub-
1. Design coordination (Providing and maintaining single lished to all users of the services and all suppliers, without
point of coordination and control of all design activities) specific confidentiality agreements.
Reports typically include information sourced from multiple 10. Handling complaints and Compliments
datasets, consolidated into a single validated and consistent set.
Information is typically presented by:
* Service
* Supplier
* Customer (location and function).
Aggregated views are also created at different levels to
provide appropriate levels of summarization for different levels
in the organization, e.g. operational, tactical, strategic. In the
most mature of SIAM operations, this reporting aligns not just
to the supplied services, but also to the business processes and
services that those capabilities support.
This mature reporting typically attributes financial value
to the impact of service failures and disruption, alongside
business impact such as lost business hours, a number of
customers affected, and financial implications such as lost
business.
J. Service Level Agreement Management
Service Level Management (SLM)[4] 1. Designing SLA

Fig. 8. SLA

Fig. 7. SLA
K. Knowledge Management
Frameworks Operational Level Agreement (OLA) = agreement
Service Knowledge Management System[7] Build a system
between IT service provider and part of same organization
that supports delivery of services, e.g., facility department
(OLA targets underpin those of SLA) Underpinning contracts
= contracts with external partners/suppliers Types of SLAs:
a) Service-based SLAs covering 1 service b) Customer-based
SLAs covering all services of individual customer group
Multi-level SLAs: (1) corporate level with generic SLM issues;
(2) customer level with customer-/business-unit-specific SLM
issues; (3) service level with service-specific SLM issues with
regard to customer
2. Determining, documenting and agreeing on requirements
for new services / Producing SLRs
3. Negotiating, documenting and agreeing on SLAs for
operational services
4. Monitoring service performance against SLA
5. Producing service reports Fig. 9. Knowledge Management
6. Conducting service reviews instigating improvements
within overall service improvement plan delivering results: * Knowledge database vs. knowledge base
7. Collating, measuring and improving customer satisfaction * Identify the right balance between face-to-face activities and
8. Review and revise SLAs and OLAs, underpinning agree- database driven approach * Base all inputs on the taxonomy
ments and service scope * Provide context search with various search paths Keywords
9. Develop contracts and relationships Visual processes Etc.
Fig. 10. Knowledge Management management. While we are looking to build a centralized
asset repository, its important to understand the difference be-
tween asset repository and configuration management database
L. Asset Management (CMDB). The CMDB is an evolution of the asset repository
which is part of the ITIL framework. Beyond the scope of
The fact that your IT infrastructure is growing is undisputed; asset discovery and tracking, the CMDB is integrated with
and you know it! Each day new users are being added and so service desk functions and is part of IT service management
are IT assets hardware and software. Its the responsibility of and change management.
system admins to track and manage these assets. Potential IT 2) Hardware Asset Management: Hardware asset manage-
issues could be resolved quickly, efficiently, and with better IT ment is the process of tracking and managing the physi-
administration support, if you have the visibility into all the IT cal components of computers and computer networks, from
assets that exist in the organizational IT landscape network, acquisition through disposal. The goals of hardware asset
data center, remote sites, user workstations, etc.[5] IT asset management are to account for all hardware assets on the IT
management (ITAM) is a set of business practices that join infrastructure to provide comprehensive inventory visibility.
financial, contractual, and inventory functions to support life Further, to help with vendor contract and lease management,
cycle management and strategic decision making for the IT and to assist in making budgetary forecasts based on the stock
environment [1]. Managing IT assets allows you to get maxi- of assets and business requirement.
mum value from the use of the assets, right-size IT inventory, 3) Software Asset Management: Software asset manage-
and optimize inventory purchase decisions and strategies. IT ment is similar to hardware asset management, but focuses
asset management provides you the means to achieve com- on software assets, including licenses, versions, and installed
plete visibility into your IT infrastructure inventory, helping endpoints. ITIL states that the goals of software asset man-
you gain an in-depth understanding of: What systems and agement are to reduce IT costs and limit business, legal and
equipment exist Where components reside How they are security risks related to the ownership and use of computer
used What they cost When were they added to the inventory software, while maximizing IT responsiveness and end-user
Whether they have an expiry date How they impact IT and productivity.
business services This level of visibility into asset details
will help organizations improve infrastructure efficiency and M. Event Management
performance, and minimize related overhead expenses. All An event can be defined as any detectable or discernable
organizations, in one way or the other, perform ITAM. Its occurrence that has significance for the management of the IT
important to implement ITAM practices intelligently, in order Infrastructure of the delivery of IT service and evaluation of
to achieve IT operational efficiency, financial accountability the impact a deviation might cause to the services. [8] Events
of asset purchase, simpler auditing and compliance, and long- are typically notifications created by an IT service, configura-
term asset manageability and maintenance. In this white paper, tion item or monitoring tool. The effective service operation
well focus on the benefits of proper IT asset management, is dependent on knowing the status of the infrastructure and
best practices, and how to implement it, so it benefits your IT detecting any deviation from a normal or expected operation.
teams, business, end-users and employees. This is provided by good monitoring and control systems,
1) IT Asset Management Methodology: The major goal which are based on two types of tools: Active monitoring tools
of ITAM is to establish a centralized asset repository that that poll key configuration items to determine their status and
accounts for the presence and purchase of all your hardware availability. Any expectations will generate an alert that needs
and software inventory. To achieve this, ITAM methodology to be communicated to the appropriate tool or team for action.
comprises the following steps: Asset discovery, data capture, Passive monitoring tools that detect and correlate operational
and storage Discovering all hardware and software compo- alerts or communications generated by configuration items.
nents of IT inventory on the IT infrastructure and capturing 1) The objectives of event management: Event management
their details, such as the type of asset, make, specification, etc., is to provide the entry point for the execution of many service
and storing it in an asset repository Asset tracking Being operation processes and activities. In addition, it provides a
able to identify and track change in the location of assets, way of comparing actual performance and behavior against
increase or decrease the number of assets, track assignment design standards and Service Level Agreements. Other ob-
status and user information Asset life cycle management jectives include: Provides the ability to detect, interpret and
Being able to capture the asset life cycle data right from initiate appropriate action for events Basis for operational
requisitioning, purchase and assignment, to expiry and de- monitoring and control and entry point for many service
commissioning Asset reporting and alerting Being able to operation activities Provides operational information, as well
generate asset inventory reporting, and receive alerts on asset as warnings and exceptions, to aid automation Supports
warranty and lease expiration Centralized organization-wide continual service improvement activities of service assurance
ITAM process and asset repository will also help you support and reporting and service improvement
various ITIL functions, such as configuration management, 2) The scope of event management: Event management
incident management, problem management, and service level can be applied to any aspect of service management that
in sapien. Lorem ipsum dolor sit amet, consectetuer adipiscing
elit. Duis fringilla tristique neque. Sed interdum libero ut
metus. Pellentesque placerat. Nam rutrum augue a leo. Morbi
sed elit sit amet ante lobortis sollicitudin. Praesent blandit
blandit mauris. Praesent lectus tellus, aliquet aliquam, luctus
a, egestas a, turpis. Mauris lacinia lorem sit amet ipsum. Nunc
quis urna dictum turpis accumsan semper.
ACKNOWLEDGMENT
The authors would like to thank...
Fig. 11. Event Management
R EFERENCES
[1] Birger Andersson Maria Bergholtz Ananda Edirisuriya Tharaka Ilaype-
needs to be controlled and which can be automated. This ruma Jelena Zdravkovic Hans Weigand, Paul Johannesson. Value-based
service design based on a general service architecture.
include: Configuration Items (CIs): z Some CIs will be [2] Kevin Holland. An example ITIL-based model for effective Service
included because they need to stay in a constant state z Some Integration and Management. AXELOS, 2015.
CIs will be included because their status needs to change [3] Dwykie Alexandra Krisantus Wanandi Yanuari Harisky Suryadiputra Li-
awatimena Kornelius Irfandhi, Ariani Indrawati. Implementation of
frequently and event management can be used to automate information technology service management at data and information
this and update the CMS Environmental conditions (e.g. fire system center of xyz university. 2016.
and smoke detection) Software license monitoring for usage [4] Univ.-Prof. Dr.-Ing. Wolfgang Maass. Service management itil service
design. 2012.
to ensure optimum/legal license utilisation and allocation Se- [5] Vinod Mohan. IT Asset Management Benefits Best Practices. Solar-
curity (e.g. intrusion detection) Normal activity (e.g. tracking winds, 2013.
the use of an application or the performance of a server) [6] ALSOLENDSKI SUSTYO PRAKOSO. PENGEMBANGAN APLIKASI
WEB. Jakarta Indonesia, 2014.
The difference between monitoring and event management [7] Thomas Schell. ITIL Knowledge Management. Clariant International
These two areas are very closely related but slightly different Ltd., 2008.
in nature. Event management is focused on generating and [8] UCISA. Itil a guide to event manage-
ment. Retrieved From https://www.ucisa.ac.uk/-
detecting meaningful notifcations about the status of the IT /media/files/members/activities/itil/serviceo peration/eventmm anagement/itila
infrastructure and services. Whilst monitoring is required to[9] UCISA. Itil introducing service strat-
detect and track these notifications, monitoring is broader than egy. Retrieved From https://www.ucisa.ac.uk/-
/media/files/members/activities/itil/services trategy/itili ntroducing
event management. For example, monitoring tools will check [10] www.it processmaps.com. Introduction: Itil version 3 and the itil process map
the status of a device to ensure that it is operating within v3. 2009.
acceptable limits, even if that device is not generating events.

II. C ONCLUSION
Lorem ipsum dolor sit amet, consectetuer adipiscing elit.
Etiam lobortis facilisis sem. Nullam nec mi et neque pharetra
sollicitudin. Praesent imperdiet mi nec ante. Donec ullamcor-
per, felis non sodales commodo, lectus velit ultrices augue,
a dignissim nibh lectus placerat pede. Vivamus nunc nunc,
molestie ut, ultricies vel, semper in, velit. Ut porttitor. Praesent
in sapien. Lorem ipsum dolor sit amet, consectetuer adipiscing
elit. Duis fringilla tristique neque. Sed interdum libero ut
metus. Pellentesque placerat. Nam rutrum augue a leo. Morbi
sed elit sit amet ante lobortis sollicitudin. Praesent blandit
blandit mauris. Praesent lectus tellus, aliquet aliquam, luctus
a, egestas a, turpis. Mauris lacinia lorem sit amet ipsum. Nunc
quis urna dictum turpis accumsan semper.

A PPENDIX A
P ROOF OF THE F IRST Z ONKLAR E QUATION
Lorem ipsum dolor sit amet, consectetuer adipiscing elit.
Etiam lobortis facilisis sem. Nullam nec mi et neque pharetra
sollicitudin. Praesent imperdiet mi nec ante. Donec ullamcor-
per, felis non sodales commodo, lectus velit ultrices augue,
a dignissim nibh lectus placerat pede. Vivamus nunc nunc,
molestie ut, ultricies vel, semper in, velit. Ut porttitor. Praesent

You might also like