Enter your keyword

2-s2.0-85017289449

[vc_empty_space][vc_empty_space]

Secured communication service strategic planning using itil v3 framework case study: X service

Vinietta E.a, Mattheus Edward I.Y.a, Shalannanda W.a

a Telecommunication Engineering, STEI ITB, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2016 IEEE.’X Service’ is a secured communication network service that is maintained by one of the national intelligence agencies which responsible for securing national classified information, ‘agent A’. As a communication service provider that is highly related to IT, ‘X Service Unit’ has not been applying IT service management (ITSM) practices properly. This has resulted in dissatisfaction from service users and inability to perform the required level of information security. In this paper, ITIL (IT Infrastructure Library) v3 has been chosen as a guidance to plan the service strategy for ‘X Service’. The design process is preceded with a literary study to have a good understanding in ITSM and ITIL v3. The next step is a field study that is done to understand the existing condition of ‘X Service Unit’. After analyzing the results of the mentioned studies, a strategic planning guidance based on ITIL v3 is designed with four strategy components, 4P, namely: Perspective, Position, Plan, and Pattern. This strategic planning guidance then has been successfully applied to design the strategic planning for service X for 2016-2020. In this paper, ITIL v3 Service Strategy [1] will be used as a main framework to design service strategy planning for the ,’X Service’.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Classified information,Communication service,It infrastructure libraries,IT service management (ITSM),ITIL V3,National Intelligence Agency,Secured communication,Service strategy[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]ITIL v3,secured communication,service strategy[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICWT.2016.7870850[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]