Extending the IT service quality measurement framework through a systematic literature review

M Lepmets, A Cater-Steel, F Gacenga… - Journal of Service Science …, 2012 - Springer
Continuous improvement of service quality results in enhanced customer satisfaction,
increased efficiency and maximisation of business value of the service within the company …

Applying probabilistic model checking to financial production risk evaluation and control: A case study of Alibaba's Yu'e Bao

H Gao, S Mao, W Huang, X Yang - IEEE transactions on …, 2018 - ieeexplore.ieee.org
The core challenge of financial companies is to maximize business profits and minimize
capital risks in enterprise operations management, mainly by considering their liquidity risk …

Topics and applied theories in it service management

T Proehl, K Erek, F Limbach… - 2013 46th Hawaii …, 2013 - ieeexplore.ieee.org
This article examines the IT Service Management (ITSM) research literature, starting from
past up to the present. The applied research method is the literature review, in which a …

Vulnerability assessment in autonomic networks and services: A survey

M Barrere, R Badonnel, O Festor - … communications surveys & …, 2013 - ieeexplore.ieee.org
Autonomic networks and services are exposed to a large variety of security risks. The
vulnerability management process plays a crucial role for ensuring their safe configurations …

Change scheduling based on business impact analysis of change-related risk

T Setzer, K Bhattacharya… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In today's enterprises, the alignment of IT service infrastructures to continuously changing
business requirements is a key cost driver, all the more so as most severe service …

A sat-based autonomous strategy for security vulnerability management

M Barrere, R Badonnel, O Festor - 2014 IEEE network …, 2014 - ieeexplore.ieee.org
Computer and network systems are consistently exposed to security threats, making their
management even more complex. The management of known vulnerabilities plays a crucial …

A solution for identifying the root cause of problems in it change management

RL dos Santos, JA Wickboldt… - 12th IFIP/IEEE …, 2011 - ieeexplore.ieee.org
The reuse of knowledge acquired by operators to diagnose failures in Information
Technology (IT) infrastructures has potential to decrease the recurrence of failures and …

Supporting vulnerability awareness in autonomic networks and systems with OVAL

M Barrère, R Badonnel, O Festor - 2011 7th International …, 2011 - ieeexplore.ieee.org
Changes that are operated by autonomic networks and systems may generate
vulnerabilities and increase the exposure to security attacks. We present in this paper a new …

Automated runtime risk management for voice over IP networks and services

O Dabbebi, R Badonnel, O Festor - 2010 IEEE Network …, 2010 - ieeexplore.ieee.org
Voice over IP (VoIP) has become a major paradigm for providing telephony services at a
lower cost and with a higher flexibility. VoIP infrastructures are however exposed to multiple …

Planning in the large: Efficient generation of it change plans on large infrastructures

S Hagen, WL da Costa Cordeiro… - … on network and …, 2012 - ieeexplore.ieee.org
Change Management, a core process of the Information Technology Infrastructure Library
(ITIL), is concerned with the management of changes to networks and services to minimize …