SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 6, December 2021, pp. 5292~5300
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i6.pp5292-5300  5292
Journal homepage: http://ijece.iaescore.com
From IT service management to IT service governance: An
ontological approach for integrated use of ITIL and COBIT
frameworks
Lamia Moudoubah, Abir El Yamami, Khalifa Mansouri, Mohammed Qbadou
Laboratory Signals, Distributed Systems and Artificial Intelligence (SSDIA), ENSET Mohammedia, University Hassan II
of Casablanca, Morocco
Article Info ABSTRACT
Article history:
Received Aug 25, 2020
Revised Apr 13, 2021
Accepted May 11, 2021
Some companies have achieved better performance as a result of their IT
investments, while others have not, as organizations are interested in
calculating the value added by their IT. There is a wide range of literature
that agrees that the best practices used by organizations promote continuous
improvement in service delivery. Nevertheless, overuse of these practices can
have undesirable effects and unquantified investments. This paper proposed a
practical tool formally developed according to the DSR design science
approach, it addresses a domain relevant to both practitioners and academics
by providing IT service governance (ITSG) domain model ontology,
concerned with maximizing the clarity and veracity of the concepts within it.
The results revealed that the proposed ontology resolved key barriers to
ITSG process adoption in organizations, and that combining COBIT and
ITIL practices would help organizations better manage their IT services and
achieve better business-IT alignment.
Keywords:
COBIT
IT service governance
IT service management
ITIL
Ontology
This is an open access article under the CC BY-SA license.
Corresponding Author:
Lamia Moudoubah
SSDIA laboratory, ENSET Mohammedia
Hassan II University of Casablanca
Casablanca, Morocco
Email: lamiae.modobah@gmail.com
1. INTRODUCTION
The thinking behind the ITSM principle is to solve the difficulties associated with managing IT
services in the enterprise. It has been observed that the proliferation of IT infrastructures makes companies
dependent on the quality, quantity and availability provided by these infrastructures. In other words, due to
the divergence in the "IT is business" or "business is IT" view, the design of IT infrastructure focuses on
technology rather than a rational and efficient customer-oriented approach [1].
This paper is an attempt to fill the void, the objective is to build a collective mapping of ITSG best
practices using the collection and synthesis of data from the official IT governance framework guides. This
mapping needs to be formal, extensive, and reproducible so that it can be shared with applications that are
smart, other areas of expertise, or IT qualified. According to [2], "COBIT alone is not sufficient to meet the
requirements of business/IT coordination.
COBIT only provides a governance mode, not the information system of an organization. On the
other hand, ITIL is becoming the default standard for IT management in organizations, providing a
comprehensive framework for the IT service lifecycle and can help organizations improve their performance.
The objective of this work is to submit an ontological approach for a combined exploitation of COBIT and
Int J Elec & Comp Eng ISSN: 2088-8708 
From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah)
5293
ITIL practices. This approach is elaborated by respecting the research methodology of design science (DSR).
The objective is to translate known practices into desirable situations via the deployment of technological
artifacts. The lack of relevance of scientific research in the field of information systems for professionals has
favored the birth of the concept of study in design science (DSR).
A collection of concepts, methods, and approaches to conduct studies can be described as DSR
methodology [3]. Its aim is to close the gap between technical awareness of the requesters and the practical
knowledge of the experts. Information systems specialists can benefit through using this approach knowledge
from different computer science, engineering, social science, economics and philosophy to study problems at
the crossroads of computer science as well as entities [4]. As a result, organizations will be capable of dealing
with critical information-related activities by creating and evaluating innovative computing artifacts [5].
DSR specifies 4 design artifacts (construction, model, method and instantiation). This contribution
focuses on the construct and the model. The construct describes the terminology of the problem domain [6],
while the model uses constraints to represent the current situation, the design problem, and the possible
solutions [7].
The proposed control is made up of constructs and service level management artifacts. The model in
this paper is defined by integrating different constructs to develop our alternative for the ITSG lifecycle. The
following is how the rest of the article is organized: section 2 provides an overview of the ITIL and COBIT
structures, followed by section 3 discussion of relevant work, section 4 presentation of our ITSG lifecycle
ontology, and section 5 discussion of our solution's evaluation mechanisms. Finally, in section 6, we discuss
the findings of our approach before coming to a conclusion in section 7.
2. RELATED WORKS
While it is still relatively new, the field of IT governance has its own set of skills system as well as
numerous technologies and methods [8]. The quantity of IT governance best practice constructs has grown;
each framework comes from a professional community with its own challenges and culture. The professional
literature provides various books, catalogs, and journal guides for applying these frameworks [9].
The development of best practice frameworks such as COBIT or ITIL, as well as the publication of
standards such as ISO 27001, which deals with IT security management, have resulted from the IT
governance problems that are primarily discussed in management reviews. In this regard, CIGREF states in a
technical publication that the diversity of IT governance principles and structures is frequently a source of
conflict and misunderstanding [10].
Similarly, Samiotakis [11] highlighted a point that is marginally addressed in the literature, which is
the difficulty of applying and integrating multiple IT governance standards and frameworks: according to
Smirnov et al. [12] "frameworks cannot simply be combined like puzzle pieces. They were created by
different people, at different times, in different places, deliverables/aspects/outcomes, with varying degrees
of granularity, precision, quality and consistency" [13].
In this context, Shing et al. [13] provide ITIL v3 - COBIT 5 process mapping, according to authors:
“When used together, the power of both approaches is amplified, with a greater likelihood of management
support, direction, and a more cost-effective use of implementation resources”. Likewise, this paper aims to
provide an integrated framework of ITSG on the basis of the most widely accepted best practices frameworks
COBIT and ITIL in [14]-[19]. The purpose is to provide a machine readable document for ITSG domain
model. Ontology can be used to create a formal definition of domain semantics since it is a formal and
explicit specification of a shared conceptualization [20].
Ontology is also described as a more formal and constructive specification. Conceptualization of
sharing knowledge representation, which can build the vocabulary and its structure Work around a clearly
defined consensus [21]. It aims to interweave human understanding of symbols with their machine
processing capabilities. In terms of IT service management, built and created a prototype decision-making
framework based on business needs for IT governance planning developed a new integration approach for
representing the lifecycle of cloud-based IT services and demonstrated how to use it to simplify cloud service
acquisition and use [22], [23].
Conger et al. [23] Proposed the ontology meta-model of ISO 27001 security standard, which
explained its basic concepts to compare the constructed meta-model with various existing information
security ontologies. Ontology for secure SLA representation (SSLA) was developed to address concerns about
cloud security and privacy risk assessment [24]. The following section will present the proposed ITSG domain
ontology in detail. The goal is to maximize the expressiveness, clarity, and authenticity of the concepts
belonging to it [25].
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300
5294
3. PROPOSED IT SERVICE GOVERNANCE ONTOLOGY
Planning, research, construction, and testing are all phases of traditional service management
models. These methodologies have been found to be very time consuming and to necessitate a significant
amount of human labor, both from the user and the supplier. ITSG is very different form ITSM; COBIT 5
clarifies the differences in its principle 5 “separating governance from management” by recognizing that each
serves a different purpose with different responsibilities and different activities. Since a formal definition of
ITSG does not exist, choosing the best ITSG mechanisms is a difficult task. Isolated issues are resolved as
they arise, and those individual solutions can often conflicting each other.
Yet, this section aims to make an ontological representation of ITSG domain supported the
gathering and analysis of knowledge contained in ITG hottest frameworks. The most goal of ITSG ontology
is to represent concepts of ITSG domain, also as their properties and relations. So as to develop the ITSG
ontology, a set information purification, coordination, research, and presentation. The ITGI’s official COBIT
(ISACA, 2020) and ITIL guides were used as sources of data.
Figure 1 introduces the ITSG suggested model, It is based on a mix of COBIT process: “Define and
manage service levels” and ITIL process “service level management”. The main objective is to separate
control from management as it is highlighted by COBIT V5 principles. The service level control (SLC) is the
process for establishing a shared understanding of the appropriate level of service, both consumer and
provider to prevent misunderstandings or omissions, it is important to have a better understanding of roles
and responsibilities. The process of recording and agreeing on service targets in service level agreements
(SLAs), then tracking and updating real service levels against those targets is known as service level
management (SLM). The ontological representation of each process domain is described in the subsection
below.
Figure 1. The proposed ITSG model
3.1. Service level control artefact
Process objective: to develop a shared understanding of the necessary level of service.
Process description: The central entity type is the IT process: DS1: define and manage IT services,
this process belongs to COBIT IT domain “delivery and support” and it is defined by the business objective
“Establishing a shared understanding of the level of service required”.
COBIT provides a maturity profile for this process based on a ranking of just six maturity level
entity type elements (0 non-existent, 1 initial/ad Hoc, 2 repeatable but intuitive, 3 specified process, 4
controlled and observable, 5 optimized).
COBIT proposes a set of detailed control objectives for the control of formal SLA; it defines the
aspects of SLA, the aspects of success processes, tracking, and reporting, the review of SLA and service
improvement program.
COBIT expounds a set of Key goal indicators and key performance indicators for each IT process it
does not, however, specify how to report these indicators. To do so, organizations must adopt other IT
frameworks. In our case, ITIL framework is adopted for managing service levels. The ontological
representation of service governance domain knowledge is shown in Figure 2.
Int J Elec & Comp Eng ISSN: 2088-8708 
From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah)
5295
Figure 2. Service level control process ontology
3.2. Service level management artefact
The SLM artefact is designed based on the combination of ITIL SLM practices and COBIT DS1
detailed control objectives. For that aim, 3 SLM processes are developed and are presented below.
3.3. Identification of service requirements
Process Goal: Gather criteria for new IT services or changes to existing IT services from the
consumer's perspective. The goal is to strengthen relationships with happy customers so that IT resources can
be spent on the areas that the customer considers most important.
Application services, technical services, and professional services are the three types of services that
are identified by a service name and a service description. Three service levels should be specified for each
service: Gold, Silver, and Bronze. The service levels are determined by the metrics that measure the quality
of the service.
The user may request a service level change during this process, according to ITIL. To do so, the
user must first identify the QoS specifications, which include things like availability: (number of allowed
downtimes, availability thresholds, number of interruptions allowed, procedures for announcing interruptions
to the service…), performance requirements: (implementation Duration continuity: (availability to be
recovered,…) required capacity for the service, response time from applications,…), and service desk
(incident response time, problem response time,…).
COBIT indicates that the conditions for service should be registered and subjected to a preliminary
assessment by the service level manager, so that alternatives may be validated latter by the business unit
strategic. The objective is to eliminate those services that cannot be aligned with key business objectives and
keep only those who can be possibly validated by the strategic business unit. The ontological representation
of the SLM Process: “identification of service requirements” domain knowledge is shown in Figure 3.
Figure 3. The service level requirements management method' ontology
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300
5296
3.4. Agrements SIGN-OFF and service activation
Process goal: Verify service acceptance and ensure that both the supplier and the customer sign off
on service contracts. ITIL points out that once the service quality metrics are met, a contract between the
service customer and the service provider is used as a basis for billing or cost allocation, and it helps explain
what value customers are getting for their money. This procedure guarantees that all relevant operational
compliance undertakings (OLAs) are authorised by their service operators, as well as that the receiver
approves the strategic compliance agreement (SLA). The ontological representation of the SLM Process:
"Agreements sign-off and service activation" domain awareness is depicted in Figure 4.
Figure 4. Ontology for signing off on agreements and activating services
3.5. Service level monitoring and reporting
Process Goal: To enhance service quality, track achieved service levels and compare them to
agreed-upon service level goals. COBIT emphasizes the importance of appointing a service level manager
who is responsible for monitoring and reporting on the achievement of the established service performance
standards as well as any problems encountered during processing. The service level manager initiates a
service inspection session in this process, with the goal of identifying the root cause of weak areas so that
remedial action (root cause resolutions) can be taken, thus enhancing potential service quality.
The service level manager can submit customer satisfaction surveys on a regular basis to find areas
where work quality can be enhanced. A service level report is produced following the service level
monitoring session and distributed to consumers and other relevant parties as a basis for service quality
improvement measures. The ontological representation of the SLM Process: “Service Level Monitoring and
Reporting” domain awareness is depicted in Figure 5.
Figure 5. Service level monitoring and reporting process ontology
Int J Elec & Comp Eng ISSN: 2088-8708 
From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah)
5297
4. ARTEFACT EVALUATION
4.1. Ontology taxonomy evaluation
ITSG ontology has been implemented in protégé software [26] to test the proposed ITSG artefact for
inconsistency, incompleteness, and redundancy, and the credibility has been checked using the inference
engines Fact++1.6.5 [27] and Pellet [28] incorporated as plug-ins in protégé software. Figure 6 shows the
inferred classes that were created.
Figure 6. ITSG ontology inferred classes
4.2. Domaine knowledge validation
The goal of the suggested ontology was enabling an ITSG system which integrates COBIT and ITIL
practices dedicated to service management. In order to validate our proposed alternative domain knowledge,
it is mandatory to check if ITSG key performance indicators (KPIs) provided by COBIT can be calculated
through the proposed ITSG system. Jena Fuseki Server 3.4.0 was used to demonstrate our ontology-based
approach for this purpose. Jena Fuseki is a SPARQL server that uses the SPARQL protocol over HTTP to
provide REST-style SPARQL HTTP updates, SPARQL queries, and SPARQL updates. The ontology data
was populated using Protégé tools. This is then translated to XML/OWL format and submitted to Jena Fuseki
Server to be sorted as a dataset.
5. RESULTS AND DISCUSSION
In general, governance refers to an organization's ability to monitor and normalize its activities in
order to prevent conflicts of interest among its various stakeholders. IT governance, in particular, refers to the
methods for managing and regulating an organization's information system. According to Yamami et al. [29]
“governance is the combination of steering and control, steering to ensure that today's decisions are preparing
properly tomorrow, and control to measure the gap from what was planned.” In this paper, we are interested
in IT service Governance models implementation in organizations. ITIL is the most used framework in
organizations, according to Leoz et al. [30] organizations tend to implement ITIL for management purpose;
they are limited to adopting the processes of incident response, issue resolution, process improvement and the
function of service desk.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300
5298
The service level agreement process is often neglected since it can put strain on IT departments. Yet,
the SLA process is highly dependent to the other processes. We present through Figure 7 the relationship
between the SLA process and the other processes of ITIL framework [29].
Figure 7. Relationship between ITIL processes
Indeed, implementing ITSG processes t is not an easy job since its definition and role are not clear.
This work aims to provide in this sense a comprehensive method for the control of ITSM components since
the identification of service requirements phase up to the reporting of services. Even though there is an
increasing amount of research dealing with ITSM, a complete ITSG ontology does not exist. As a result,
creating a shared representation is needed of IT service control concepts and to show how these concepts
relate to ITSM problems in information systems engineering.
The aim is to provide a machine-readable text for the ITSG domain model, which will be added to
the technical literature. Second, to the scientific literature concerned with enhancing IT governance systems
through a better understanding of their architectures. Similarly, the ITSG ontology's main goal is to represent
ITSG domain concepts, their properties, and relationships, to create a shared representation of ITSG concepts
among researchers and practitioners, to demonstrate how these concepts relate to ITSM problems, to make
ITSG knowledge reusable in similar information systems engineering situations, and to support the
development of new ITSG modes.
To meet these needs, the most widely used IT governance frameworks, COBIT and ITIL, have been
integrated. COBIT practices are used for the audit and control perspective, while ITIL practices take the
service management perspective. The objective is to distinguish control from management, as emphasized by
COBIT V5. The ITSG ontology is formally developed according to the DSR approach. The proposed objects
are designed using COBIT best practices (DS1: Define and manage service levels) and ITIL best practices
(service level management). They were used to search for inconsistency, incompleteness, and redundancy in
the safe applications. The inference engines Fact ++ and Pellet were used to verify the credibility.
While COBIT defines a set of key performance indicators for the DS1 phase, it does not specify
how these indicators should be reported. The Jena Fuseki server was used to manage the ITSG SPARQL
queries in order to validate the proposed ontological domain information. It turns out that with the proposed
ITSG alternative, the COBIT DS1 KPIs can be calculated efficiently as shown in Table 1. This leads to the
belief that a combination of ITIL and COBIT processes can lead to a substantial change in service quality and
improved Business-IT service alignment.
By sharing ITSG knowledge, the expertise of ITG practices is used in the organization, and
coordination between external providers and consumers is improved. The results are expected to contribute to
the development of IT governance frameworks for use by non-specialized IT governance executives in
companies, and to minimize the bureaucracy of IT executives. The proposed artifact may be a paradigm shift
in how information management frameworks are integrated to meet the needs of organizations. By
recognizing existing waste, ITIL and Lean IT practices can be combined to ensure that IT processes operate
effectively, safely, and efficiently.
Int J Elec & Comp Eng ISSN: 2088-8708 
From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah)
5299
Table 1. Explains the SPARQL queries that were used to calculate COBIT DS1 phase KPIs
KPI 1 : Resolution of a service level update request with a time lag
SELECT *
WHERE {
?consumer o:initiates ?request.
?request o:requests ?SL.
?request o:request_date ?requestDate.
?request o:response_date ?responseDate.
BIND (?responseDate - ?requestDate as ?resolutionTimeLag).
?request o:request_decision ?decision.
FILTER (?decision ="resolved").
}
KPI 2: Consumer satisfaction surveys are conducted on a regular
basis.
SELECT (COUNT(*) as ?surveyFrequency ) ?consumer
WHERE {
?consumer o:repliesTo ?survey .
?survey o:survey_date ?s.
BIND ( YEAR(?s) as ?year).
BIND (xsd:string(?year) as ?y).
FILTER ( ?y ="2017").
}
GROUPBY ?consumer
KPI 3: The amount of time it takes to fix a service level problem
SELECT ?SL ?rootCauseAnalyses ?rootCauseResolution
?resolutionTimeLag
WHERE {
?rootCauseAnalyses o:analyses ?SL.
?RCR o:resolves ?SL.
?rootCauseAnalyses o:RCA_date_begin ?RCADB.
?rootCauseResolution o:RCR_date ?RCRD.
BIND ( ?RCRD - ?RCADB as ?resolutionTimeLag).
}
KPI4: Number of times that cause analysis of service level
procedures and subsequent resolution is completed within required
period
SELECT ( COUNT(*) as ?numberOfcompletedRCA )
WHERE {
?rootCauseAnalyses o:analyses ?SL.
?rootCauseResolution o:resolves ?SL.
?rootCauseAnalyses o:RCA_expected_date_end ?RCAEDE.
?rootCauseResolution o:RCR_date ?RCRD.
FILTER ( ?RCRD < ?RCAEDE).
}
KPI5: The importance of the additional funding required to meet
the specified service level
SELECT *
WHERE {
?RootCauseResolution o:resolves ?SL.
?RootCauseResolution o:RCR_cost ?RootCauseResolutionCost.
}
6. CONCLUSION
The problem of applying IT best practices to determine the contribution of IT investments to
business value has received increasing attention from practitioners and academics in recent decades. IT
governance has emerged as a response to this issue. Organizations must adopt the structures and processes
necessary to ensure that only services aligned with strategic business objectives are approved and prioritized.
Adopting these processes, however, is difficult due to a lack of clarity in their meaning and function.
This paper proposes an alternative to the ITSG system by presenting an ontology that has been formally
constructed using the DSR approach and aims to formalize ITG knowledge. The aim was to clear up any
misconceptions about the ITSG model implementation's intent.
The ontology scheme was designed and evaluated using the Protégé program. SPARQL queries on
the JENA FUSEKI server successfully validated the proposed ITSG domain ontology. The obtained results
reveal that the proposed ontology enables effective control of IT services and may result in substantial
progress in service quality and improved alignment of IT and business services.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300
5300
REFERENCES
[1] W. Hanchul, S.-J. Jeong, and J.-Ho Huh, "Improvement of ITSM it service efficiency in military electronic
service," Journal of Information Processing Systems, vol. 16, no. 2, pp. 246-260, 2020, doi: 10.3745/JIPS.03.0134.
[2] Z. Dong and Z. Chao, "Adoption of COBIT 5 and ITIL in Small and Medium Size Enterprises in China," Thesis,
School of Engineering, Jönköping, 2014.
[3] L. Aleš, H. Tomaž, and P. Andreja, "IT governance mechanisms and contingency factors: Towards an adaptive IT
governance model," Organizacija, vol. 51, no. 4, pp. 286-310, 2018, doi: 10.2478/orga-2018-0024.
[4] A. Hevner, R. Alan, S. T. March, T. Salvatore, and J. Park, "Design Science in Information Systems Research,"
MIS Quarterly, vol. 28, no. 1, pp. 75-105, 2004.
[5] D. Ajantha and T. Bernhard, "Enriching Conceptual Modelling Practices through Design Science," International
Conference on Exploring Modeling Methods for Systems Analysis and Design-BPMDS 2011, vol. 81, 2011,
pp. 497-510.
[6] S. Michael, B. Tilo and K. Helmut, "Explicating design theories with conceptual models: Towards a theoretical role
of reference models," Wissenschaftstheorie und gestaltungsorientierte Wirtschaftsinformatik, Physica-Verlag HD,
pp. 175-194, 2009, doi: 10.1007/978-3-7908-2336-3_9
[7] S. A. Herbert “The sciences of the artificial,” MIT press, 2019.
[8] CIGREF, "IT frameworks," CIGREF, 2009. Accessed, 10 4 2016. [Online]. Available:
http://www.cigref.fr/cigref_publications/RapportsContainer/Parus2009/Referentiels_de_la_DSI_CIGREF_2009.pdf
[9] R. R. Ben, " The effects of the multiplicity of standards and repositories of good practice: the case of the
Information Systems Department," (in France) Thèse de doctorat, Conservatoire national des arts et metiers-
CNAM, 2015.
[10] B. Barafort, A. -L. Mesquida, and A. Mas, "Integrating risk management in IT settings from ISO standards and
management systems perspectives," Computer Standards & Interfaces, vol. 54, Part 3, pp. 176-185, 2017, doi:
10.1016/j.csi.2016.11.010.
[11] M. Samiotakis, "Integrating ITIL and COBIT 5 to Optimize IT Process and Service Delivery," 6th itSMF South
East Europe Conference, Athens, Greece, 2013.
[12] A. Smirnov, A. Ponomarev, N. Shilov, A. Kashevnik, and N. Teslya, "Ontology-based human-computer cloud for
decision support: architecture and applications in tourism," International Journal of Embedded and Real-Time
Communication Systems (IJERTCS), vol. 9, no. 1, pp. 1-19, 2018, doi: 10.4018/IJERTCS.2018010101.
[13] L. C.-Shing, J. Z.-Wei, and H. L.-Kai, "A fuzzy ontology and its application to news summarization," IEEE
Transactions on Cybernetics, vol. 35, no 5, pp. 859-880, 2005, doi: 10.1109/TSMCB.2005.845032.
[14] C. Office, “ITIL service strategy,” Norwich: the Stationery Office (TSO), 2011.
[15] C. Office, “ITIL Service Design,” Norwich: the Stationery Office (TSO), 2011.
[16] C. Office, “ITIL Service Transtion,” Norwich: the Stationery Office (TSO), 2011.
[17] C. Office, “ITIL service Operation,” Norwich: the Stationery Office (TSO), 2011.
[18] C. Office, “ITIL Continual service imprivement,” Norwich: the Stationery Office (TSO), 2011.
[19] A. EL Yamami, "Representing IT Projects Risk Management Best," Engineering, Technology & Applied Science
Research, vol. 7, no. 5, pp. 2062-2067, 2017, doi: 10.48084/etasr.1340.
[20] L. X.-Wen, L. X.-Chun, and H. Ke-Jin, "Design and implementation of IT governance planning decision supporting
system," CCDC'09: Proceedings of the 21st annual international conference on Chinese control and decision
conference, 2009, pp. 5665-5668.
[21] K. Joshi, Y. Yesha, and T. Finin, "Automating Cloud Services Lifecycle through Semantic technologies," IEEE
Transactions on Services Computing, vol. 7, no. 1, pp. 109-122, 2013, doi: 10.1109/TSC.2012.41.
[22] C.-Yu Lee, K. M. Kavi, R. A. Paul, and M. Gomathisankaran, "Ontology of Secure Service Level Agreement,"
IEEE 16th International Symposium on High Assurance Systems Engineering (HASE 2015), Daytona Beach,
Florida, USA, 2015, pp. 166-172, doi: 10.1109/HASE.2015.33.
[23] S. Conger, M. Winniford and L. Erickson-Harris, "Service management in operations," AMCIS 2008 Proceedings,
Canada, p. 362, 2008.
[24] M. A. Mark, “The protégé project: a look back and a look forward,” AI matters, vol. 1, no 4, p. 4-12, 2015, doi:
10.1145/2757001.2757003.
[25] K. Building, "Fact ++," School of Computer Science University of Manchester, 2021. [Online]. Available:
http://owl.man.ac.uk/factplusplus/.
[26] Pellet, “Clark & Parsia, LLC,” 2021. [Online]. Available: http://pellet.owldl.com/
[27] A. Jena, "Jena Fuseki Server," Apache Software Foundation, 2021. [Online]. Available:
https://jena.apache.org/documentation/fuseki2/index.html.
[28] H.Österle et al., "Memorandum on Design-Oriented Information Systems Research," European Journal of
Information Systems, vol. 20, pp. 7-10, 2011.
[29] A. El Yamami, K. Mansouri, M. Qbadou, and El H. Illoussamen, “Multi-objective IT project selection model for
improving SME strategy deployment,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 8, no 2, pp. 1102-1011, 2018, doi: 10.11591/ijece.v8i2.
[30] G. De Leoz and S. Petter, "Considering the social impacts of artefacts in information systems design science
research," European Journal of Information Systems, vol. 27, no. 2, pp. 154-170, 2018, doi:
10.1080/0960085X.2018.1445462.

More Related Content

What's hot

BtoBプラットフォーム受発注for製造業 概要資料.pdf
BtoBプラットフォーム受発注for製造業 概要資料.pdfBtoBプラットフォーム受発注for製造業 概要資料.pdf
BtoBプラットフォーム受発注for製造業 概要資料.pdf
ssuserfea64a1
 

What's hot (20)

Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementIntroduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT management
 
BtoBプラットフォーム受発注for製造業 概要資料.pdf
BtoBプラットフォーム受発注for製造業 概要資料.pdfBtoBプラットフォーム受発注for製造業 概要資料.pdf
BtoBプラットフォーム受発注for製造業 概要資料.pdf
 
データ分析基盤運⽤チームの 運⽤業務を改善してみた話
データ分析基盤運⽤チームの 運⽤業務を改善してみた話データ分析基盤運⽤チームの 運⽤業務を改善してみた話
データ分析基盤運⽤チームの 運⽤業務を改善してみた話
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture Frameworks
 
Data mart consolidation
Data mart consolidationData mart consolidation
Data mart consolidation
 
BigQuery Query Optimization クエリ高速化編
BigQuery Query Optimization クエリ高速化編BigQuery Query Optimization クエリ高速化編
BigQuery Query Optimization クエリ高速化編
 
Initiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsInitiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business Needs
 
基幹システム RDRAモデルサンプル
基幹システム RDRAモデルサンプル基幹システム RDRAモデルサンプル
基幹システム RDRAモデルサンプル
 
ChatGPTを使った要件定義のRDRA的考察.pdf
ChatGPTを使った要件定義のRDRA的考察.pdfChatGPTを使った要件定義のRDRA的考察.pdf
ChatGPTを使った要件定義のRDRA的考察.pdf
 
ブロックチェーンの仕組みと動向(入門編)
ブロックチェーンの仕組みと動向(入門編)ブロックチェーンの仕組みと動向(入門編)
ブロックチェーンの仕組みと動向(入門編)
 
Basics of BI and Data Management (Summary).pdf
Basics of BI and Data Management (Summary).pdfBasics of BI and Data Management (Summary).pdf
Basics of BI and Data Management (Summary).pdf
 
Hyperledger Fabric Private Chaincodeについて
Hyperledger Fabric Private ChaincodeについてHyperledger Fabric Private Chaincodeについて
Hyperledger Fabric Private Chaincodeについて
 
Reactive Design Patterns
Reactive Design PatternsReactive Design Patterns
Reactive Design Patterns
 
Knowledge Management Implementation Road map
Knowledge Management Implementation Road mapKnowledge Management Implementation Road map
Knowledge Management Implementation Road map
 
AI時代の要件定義
AI時代の要件定義AI時代の要件定義
AI時代の要件定義
 
Capturing Knowledge: Adding Value to an Organization
Capturing Knowledge: Adding Value to an Organization Capturing Knowledge: Adding Value to an Organization
Capturing Knowledge: Adding Value to an Organization
 
Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...
 
Introduction to COBIT 2019 Certification and Training
Introduction to COBIT 2019 Certification and TrainingIntroduction to COBIT 2019 Certification and Training
Introduction to COBIT 2019 Certification and Training
 
Le Digital : Les nouvelles technologies au service de la performance des proc...
Le Digital : Les nouvelles technologies au service de la performance des proc...Le Digital : Les nouvelles technologies au service de la performance des proc...
Le Digital : Les nouvelles technologies au service de la performance des proc...
 
Cobit presentation
Cobit presentationCobit presentation
Cobit presentation
 

Similar to From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks

Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...
IJECEIAES
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...
CSITiaesprime
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016
Rui Silva
 

Similar to From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks (20)

Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
 
How cobit can complement itil to achieve BIT
How cobit can complement itil to achieve BITHow cobit can complement itil to achieve BIT
How cobit can complement itil to achieve BIT
 
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
 
Strengthening Employees Responsibility To Enhance Governance Of It Cobit Ra...
Strengthening Employees Responsibility To Enhance Governance Of It   Cobit Ra...Strengthening Employees Responsibility To Enhance Governance Of It   Cobit Ra...
Strengthening Employees Responsibility To Enhance Governance Of It Cobit Ra...
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise IT
 
Developing a new architecture to improve itsm on cloud computing environment
Developing a new architecture to improve itsm on cloud computing environmentDeveloping a new architecture to improve itsm on cloud computing environment
Developing a new architecture to improve itsm on cloud computing environment
 
Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...
 
IT Carve-out Projects: Towards a Maturity Model
IT Carve-out Projects: Towards a Maturity ModelIT Carve-out Projects: Towards a Maturity Model
IT Carve-out Projects: Towards a Maturity Model
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
 
Whitepaper - IoT Maturity Model (IoTMM)
Whitepaper  - IoT Maturity Model (IoTMM)Whitepaper  - IoT Maturity Model (IoTMM)
Whitepaper - IoT Maturity Model (IoTMM)
 
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTechnology organization environment framework in cloud computing
Technology organization environment framework in cloud computing
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016
 
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technology
 
A Case Study On Implementing ITIL In Business Organization Considering Busi...
A Case Study On Implementing ITIL In Business Organization   Considering Busi...A Case Study On Implementing ITIL In Business Organization   Considering Busi...
A Case Study On Implementing ITIL In Business Organization Considering Busi...
 
Core model of information technology governance system design in local govern...
Core model of information technology governance system design in local govern...Core model of information technology governance system design in local govern...
Core model of information technology governance system design in local govern...
 

More from IJECEIAES

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
IJECEIAES
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
IJECEIAES
 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...
IJECEIAES
 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
IJECEIAES
 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...
IJECEIAES
 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...
IJECEIAES
 

More from IJECEIAES (20)

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning model
 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...
 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection method
 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural network
 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...
 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...
 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...
 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...
 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacenters
 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...
 
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...
 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...
 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D model
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Recently uploaded (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 6, December 2021, pp. 5292~5300 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i6.pp5292-5300  5292 Journal homepage: http://ijece.iaescore.com From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks Lamia Moudoubah, Abir El Yamami, Khalifa Mansouri, Mohammed Qbadou Laboratory Signals, Distributed Systems and Artificial Intelligence (SSDIA), ENSET Mohammedia, University Hassan II of Casablanca, Morocco Article Info ABSTRACT Article history: Received Aug 25, 2020 Revised Apr 13, 2021 Accepted May 11, 2021 Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment. Keywords: COBIT IT service governance IT service management ITIL Ontology This is an open access article under the CC BY-SA license. Corresponding Author: Lamia Moudoubah SSDIA laboratory, ENSET Mohammedia Hassan II University of Casablanca Casablanca, Morocco Email: lamiae.modobah@gmail.com 1. INTRODUCTION The thinking behind the ITSM principle is to solve the difficulties associated with managing IT services in the enterprise. It has been observed that the proliferation of IT infrastructures makes companies dependent on the quality, quantity and availability provided by these infrastructures. In other words, due to the divergence in the "IT is business" or "business is IT" view, the design of IT infrastructure focuses on technology rather than a rational and efficient customer-oriented approach [1]. This paper is an attempt to fill the void, the objective is to build a collective mapping of ITSG best practices using the collection and synthesis of data from the official IT governance framework guides. This mapping needs to be formal, extensive, and reproducible so that it can be shared with applications that are smart, other areas of expertise, or IT qualified. According to [2], "COBIT alone is not sufficient to meet the requirements of business/IT coordination. COBIT only provides a governance mode, not the information system of an organization. On the other hand, ITIL is becoming the default standard for IT management in organizations, providing a comprehensive framework for the IT service lifecycle and can help organizations improve their performance. The objective of this work is to submit an ontological approach for a combined exploitation of COBIT and
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah) 5293 ITIL practices. This approach is elaborated by respecting the research methodology of design science (DSR). The objective is to translate known practices into desirable situations via the deployment of technological artifacts. The lack of relevance of scientific research in the field of information systems for professionals has favored the birth of the concept of study in design science (DSR). A collection of concepts, methods, and approaches to conduct studies can be described as DSR methodology [3]. Its aim is to close the gap between technical awareness of the requesters and the practical knowledge of the experts. Information systems specialists can benefit through using this approach knowledge from different computer science, engineering, social science, economics and philosophy to study problems at the crossroads of computer science as well as entities [4]. As a result, organizations will be capable of dealing with critical information-related activities by creating and evaluating innovative computing artifacts [5]. DSR specifies 4 design artifacts (construction, model, method and instantiation). This contribution focuses on the construct and the model. The construct describes the terminology of the problem domain [6], while the model uses constraints to represent the current situation, the design problem, and the possible solutions [7]. The proposed control is made up of constructs and service level management artifacts. The model in this paper is defined by integrating different constructs to develop our alternative for the ITSG lifecycle. The following is how the rest of the article is organized: section 2 provides an overview of the ITIL and COBIT structures, followed by section 3 discussion of relevant work, section 4 presentation of our ITSG lifecycle ontology, and section 5 discussion of our solution's evaluation mechanisms. Finally, in section 6, we discuss the findings of our approach before coming to a conclusion in section 7. 2. RELATED WORKS While it is still relatively new, the field of IT governance has its own set of skills system as well as numerous technologies and methods [8]. The quantity of IT governance best practice constructs has grown; each framework comes from a professional community with its own challenges and culture. The professional literature provides various books, catalogs, and journal guides for applying these frameworks [9]. The development of best practice frameworks such as COBIT or ITIL, as well as the publication of standards such as ISO 27001, which deals with IT security management, have resulted from the IT governance problems that are primarily discussed in management reviews. In this regard, CIGREF states in a technical publication that the diversity of IT governance principles and structures is frequently a source of conflict and misunderstanding [10]. Similarly, Samiotakis [11] highlighted a point that is marginally addressed in the literature, which is the difficulty of applying and integrating multiple IT governance standards and frameworks: according to Smirnov et al. [12] "frameworks cannot simply be combined like puzzle pieces. They were created by different people, at different times, in different places, deliverables/aspects/outcomes, with varying degrees of granularity, precision, quality and consistency" [13]. In this context, Shing et al. [13] provide ITIL v3 - COBIT 5 process mapping, according to authors: “When used together, the power of both approaches is amplified, with a greater likelihood of management support, direction, and a more cost-effective use of implementation resources”. Likewise, this paper aims to provide an integrated framework of ITSG on the basis of the most widely accepted best practices frameworks COBIT and ITIL in [14]-[19]. The purpose is to provide a machine readable document for ITSG domain model. Ontology can be used to create a formal definition of domain semantics since it is a formal and explicit specification of a shared conceptualization [20]. Ontology is also described as a more formal and constructive specification. Conceptualization of sharing knowledge representation, which can build the vocabulary and its structure Work around a clearly defined consensus [21]. It aims to interweave human understanding of symbols with their machine processing capabilities. In terms of IT service management, built and created a prototype decision-making framework based on business needs for IT governance planning developed a new integration approach for representing the lifecycle of cloud-based IT services and demonstrated how to use it to simplify cloud service acquisition and use [22], [23]. Conger et al. [23] Proposed the ontology meta-model of ISO 27001 security standard, which explained its basic concepts to compare the constructed meta-model with various existing information security ontologies. Ontology for secure SLA representation (SSLA) was developed to address concerns about cloud security and privacy risk assessment [24]. The following section will present the proposed ITSG domain ontology in detail. The goal is to maximize the expressiveness, clarity, and authenticity of the concepts belonging to it [25].
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300 5294 3. PROPOSED IT SERVICE GOVERNANCE ONTOLOGY Planning, research, construction, and testing are all phases of traditional service management models. These methodologies have been found to be very time consuming and to necessitate a significant amount of human labor, both from the user and the supplier. ITSG is very different form ITSM; COBIT 5 clarifies the differences in its principle 5 “separating governance from management” by recognizing that each serves a different purpose with different responsibilities and different activities. Since a formal definition of ITSG does not exist, choosing the best ITSG mechanisms is a difficult task. Isolated issues are resolved as they arise, and those individual solutions can often conflicting each other. Yet, this section aims to make an ontological representation of ITSG domain supported the gathering and analysis of knowledge contained in ITG hottest frameworks. The most goal of ITSG ontology is to represent concepts of ITSG domain, also as their properties and relations. So as to develop the ITSG ontology, a set information purification, coordination, research, and presentation. The ITGI’s official COBIT (ISACA, 2020) and ITIL guides were used as sources of data. Figure 1 introduces the ITSG suggested model, It is based on a mix of COBIT process: “Define and manage service levels” and ITIL process “service level management”. The main objective is to separate control from management as it is highlighted by COBIT V5 principles. The service level control (SLC) is the process for establishing a shared understanding of the appropriate level of service, both consumer and provider to prevent misunderstandings or omissions, it is important to have a better understanding of roles and responsibilities. The process of recording and agreeing on service targets in service level agreements (SLAs), then tracking and updating real service levels against those targets is known as service level management (SLM). The ontological representation of each process domain is described in the subsection below. Figure 1. The proposed ITSG model 3.1. Service level control artefact Process objective: to develop a shared understanding of the necessary level of service. Process description: The central entity type is the IT process: DS1: define and manage IT services, this process belongs to COBIT IT domain “delivery and support” and it is defined by the business objective “Establishing a shared understanding of the level of service required”. COBIT provides a maturity profile for this process based on a ranking of just six maturity level entity type elements (0 non-existent, 1 initial/ad Hoc, 2 repeatable but intuitive, 3 specified process, 4 controlled and observable, 5 optimized). COBIT proposes a set of detailed control objectives for the control of formal SLA; it defines the aspects of SLA, the aspects of success processes, tracking, and reporting, the review of SLA and service improvement program. COBIT expounds a set of Key goal indicators and key performance indicators for each IT process it does not, however, specify how to report these indicators. To do so, organizations must adopt other IT frameworks. In our case, ITIL framework is adopted for managing service levels. The ontological representation of service governance domain knowledge is shown in Figure 2.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah) 5295 Figure 2. Service level control process ontology 3.2. Service level management artefact The SLM artefact is designed based on the combination of ITIL SLM practices and COBIT DS1 detailed control objectives. For that aim, 3 SLM processes are developed and are presented below. 3.3. Identification of service requirements Process Goal: Gather criteria for new IT services or changes to existing IT services from the consumer's perspective. The goal is to strengthen relationships with happy customers so that IT resources can be spent on the areas that the customer considers most important. Application services, technical services, and professional services are the three types of services that are identified by a service name and a service description. Three service levels should be specified for each service: Gold, Silver, and Bronze. The service levels are determined by the metrics that measure the quality of the service. The user may request a service level change during this process, according to ITIL. To do so, the user must first identify the QoS specifications, which include things like availability: (number of allowed downtimes, availability thresholds, number of interruptions allowed, procedures for announcing interruptions to the service…), performance requirements: (implementation Duration continuity: (availability to be recovered,…) required capacity for the service, response time from applications,…), and service desk (incident response time, problem response time,…). COBIT indicates that the conditions for service should be registered and subjected to a preliminary assessment by the service level manager, so that alternatives may be validated latter by the business unit strategic. The objective is to eliminate those services that cannot be aligned with key business objectives and keep only those who can be possibly validated by the strategic business unit. The ontological representation of the SLM Process: “identification of service requirements” domain knowledge is shown in Figure 3. Figure 3. The service level requirements management method' ontology
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300 5296 3.4. Agrements SIGN-OFF and service activation Process goal: Verify service acceptance and ensure that both the supplier and the customer sign off on service contracts. ITIL points out that once the service quality metrics are met, a contract between the service customer and the service provider is used as a basis for billing or cost allocation, and it helps explain what value customers are getting for their money. This procedure guarantees that all relevant operational compliance undertakings (OLAs) are authorised by their service operators, as well as that the receiver approves the strategic compliance agreement (SLA). The ontological representation of the SLM Process: "Agreements sign-off and service activation" domain awareness is depicted in Figure 4. Figure 4. Ontology for signing off on agreements and activating services 3.5. Service level monitoring and reporting Process Goal: To enhance service quality, track achieved service levels and compare them to agreed-upon service level goals. COBIT emphasizes the importance of appointing a service level manager who is responsible for monitoring and reporting on the achievement of the established service performance standards as well as any problems encountered during processing. The service level manager initiates a service inspection session in this process, with the goal of identifying the root cause of weak areas so that remedial action (root cause resolutions) can be taken, thus enhancing potential service quality. The service level manager can submit customer satisfaction surveys on a regular basis to find areas where work quality can be enhanced. A service level report is produced following the service level monitoring session and distributed to consumers and other relevant parties as a basis for service quality improvement measures. The ontological representation of the SLM Process: “Service Level Monitoring and Reporting” domain awareness is depicted in Figure 5. Figure 5. Service level monitoring and reporting process ontology
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah) 5297 4. ARTEFACT EVALUATION 4.1. Ontology taxonomy evaluation ITSG ontology has been implemented in protégé software [26] to test the proposed ITSG artefact for inconsistency, incompleteness, and redundancy, and the credibility has been checked using the inference engines Fact++1.6.5 [27] and Pellet [28] incorporated as plug-ins in protégé software. Figure 6 shows the inferred classes that were created. Figure 6. ITSG ontology inferred classes 4.2. Domaine knowledge validation The goal of the suggested ontology was enabling an ITSG system which integrates COBIT and ITIL practices dedicated to service management. In order to validate our proposed alternative domain knowledge, it is mandatory to check if ITSG key performance indicators (KPIs) provided by COBIT can be calculated through the proposed ITSG system. Jena Fuseki Server 3.4.0 was used to demonstrate our ontology-based approach for this purpose. Jena Fuseki is a SPARQL server that uses the SPARQL protocol over HTTP to provide REST-style SPARQL HTTP updates, SPARQL queries, and SPARQL updates. The ontology data was populated using Protégé tools. This is then translated to XML/OWL format and submitted to Jena Fuseki Server to be sorted as a dataset. 5. RESULTS AND DISCUSSION In general, governance refers to an organization's ability to monitor and normalize its activities in order to prevent conflicts of interest among its various stakeholders. IT governance, in particular, refers to the methods for managing and regulating an organization's information system. According to Yamami et al. [29] “governance is the combination of steering and control, steering to ensure that today's decisions are preparing properly tomorrow, and control to measure the gap from what was planned.” In this paper, we are interested in IT service Governance models implementation in organizations. ITIL is the most used framework in organizations, according to Leoz et al. [30] organizations tend to implement ITIL for management purpose; they are limited to adopting the processes of incident response, issue resolution, process improvement and the function of service desk.
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300 5298 The service level agreement process is often neglected since it can put strain on IT departments. Yet, the SLA process is highly dependent to the other processes. We present through Figure 7 the relationship between the SLA process and the other processes of ITIL framework [29]. Figure 7. Relationship between ITIL processes Indeed, implementing ITSG processes t is not an easy job since its definition and role are not clear. This work aims to provide in this sense a comprehensive method for the control of ITSM components since the identification of service requirements phase up to the reporting of services. Even though there is an increasing amount of research dealing with ITSM, a complete ITSG ontology does not exist. As a result, creating a shared representation is needed of IT service control concepts and to show how these concepts relate to ITSM problems in information systems engineering. The aim is to provide a machine-readable text for the ITSG domain model, which will be added to the technical literature. Second, to the scientific literature concerned with enhancing IT governance systems through a better understanding of their architectures. Similarly, the ITSG ontology's main goal is to represent ITSG domain concepts, their properties, and relationships, to create a shared representation of ITSG concepts among researchers and practitioners, to demonstrate how these concepts relate to ITSM problems, to make ITSG knowledge reusable in similar information systems engineering situations, and to support the development of new ITSG modes. To meet these needs, the most widely used IT governance frameworks, COBIT and ITIL, have been integrated. COBIT practices are used for the audit and control perspective, while ITIL practices take the service management perspective. The objective is to distinguish control from management, as emphasized by COBIT V5. The ITSG ontology is formally developed according to the DSR approach. The proposed objects are designed using COBIT best practices (DS1: Define and manage service levels) and ITIL best practices (service level management). They were used to search for inconsistency, incompleteness, and redundancy in the safe applications. The inference engines Fact ++ and Pellet were used to verify the credibility. While COBIT defines a set of key performance indicators for the DS1 phase, it does not specify how these indicators should be reported. The Jena Fuseki server was used to manage the ITSG SPARQL queries in order to validate the proposed ontological domain information. It turns out that with the proposed ITSG alternative, the COBIT DS1 KPIs can be calculated efficiently as shown in Table 1. This leads to the belief that a combination of ITIL and COBIT processes can lead to a substantial change in service quality and improved Business-IT service alignment. By sharing ITSG knowledge, the expertise of ITG practices is used in the organization, and coordination between external providers and consumers is improved. The results are expected to contribute to the development of IT governance frameworks for use by non-specialized IT governance executives in companies, and to minimize the bureaucracy of IT executives. The proposed artifact may be a paradigm shift in how information management frameworks are integrated to meet the needs of organizations. By recognizing existing waste, ITIL and Lean IT practices can be combined to ensure that IT processes operate effectively, safely, and efficiently.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah) 5299 Table 1. Explains the SPARQL queries that were used to calculate COBIT DS1 phase KPIs KPI 1 : Resolution of a service level update request with a time lag SELECT * WHERE { ?consumer o:initiates ?request. ?request o:requests ?SL. ?request o:request_date ?requestDate. ?request o:response_date ?responseDate. BIND (?responseDate - ?requestDate as ?resolutionTimeLag). ?request o:request_decision ?decision. FILTER (?decision ="resolved"). } KPI 2: Consumer satisfaction surveys are conducted on a regular basis. SELECT (COUNT(*) as ?surveyFrequency ) ?consumer WHERE { ?consumer o:repliesTo ?survey . ?survey o:survey_date ?s. BIND ( YEAR(?s) as ?year). BIND (xsd:string(?year) as ?y). FILTER ( ?y ="2017"). } GROUPBY ?consumer KPI 3: The amount of time it takes to fix a service level problem SELECT ?SL ?rootCauseAnalyses ?rootCauseResolution ?resolutionTimeLag WHERE { ?rootCauseAnalyses o:analyses ?SL. ?RCR o:resolves ?SL. ?rootCauseAnalyses o:RCA_date_begin ?RCADB. ?rootCauseResolution o:RCR_date ?RCRD. BIND ( ?RCRD - ?RCADB as ?resolutionTimeLag). } KPI4: Number of times that cause analysis of service level procedures and subsequent resolution is completed within required period SELECT ( COUNT(*) as ?numberOfcompletedRCA ) WHERE { ?rootCauseAnalyses o:analyses ?SL. ?rootCauseResolution o:resolves ?SL. ?rootCauseAnalyses o:RCA_expected_date_end ?RCAEDE. ?rootCauseResolution o:RCR_date ?RCRD. FILTER ( ?RCRD < ?RCAEDE). } KPI5: The importance of the additional funding required to meet the specified service level SELECT * WHERE { ?RootCauseResolution o:resolves ?SL. ?RootCauseResolution o:RCR_cost ?RootCauseResolutionCost. } 6. CONCLUSION The problem of applying IT best practices to determine the contribution of IT investments to business value has received increasing attention from practitioners and academics in recent decades. IT governance has emerged as a response to this issue. Organizations must adopt the structures and processes necessary to ensure that only services aligned with strategic business objectives are approved and prioritized. Adopting these processes, however, is difficult due to a lack of clarity in their meaning and function. This paper proposes an alternative to the ITSG system by presenting an ontology that has been formally constructed using the DSR approach and aims to formalize ITG knowledge. The aim was to clear up any misconceptions about the ITSG model implementation's intent. The ontology scheme was designed and evaluated using the Protégé program. SPARQL queries on the JENA FUSEKI server successfully validated the proposed ITSG domain ontology. The obtained results reveal that the proposed ontology enables effective control of IT services and may result in substantial progress in service quality and improved alignment of IT and business services.
  • 9.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300 5300 REFERENCES [1] W. Hanchul, S.-J. Jeong, and J.-Ho Huh, "Improvement of ITSM it service efficiency in military electronic service," Journal of Information Processing Systems, vol. 16, no. 2, pp. 246-260, 2020, doi: 10.3745/JIPS.03.0134. [2] Z. Dong and Z. Chao, "Adoption of COBIT 5 and ITIL in Small and Medium Size Enterprises in China," Thesis, School of Engineering, Jönköping, 2014. [3] L. Aleš, H. Tomaž, and P. Andreja, "IT governance mechanisms and contingency factors: Towards an adaptive IT governance model," Organizacija, vol. 51, no. 4, pp. 286-310, 2018, doi: 10.2478/orga-2018-0024. [4] A. Hevner, R. Alan, S. T. March, T. Salvatore, and J. Park, "Design Science in Information Systems Research," MIS Quarterly, vol. 28, no. 1, pp. 75-105, 2004. [5] D. Ajantha and T. Bernhard, "Enriching Conceptual Modelling Practices through Design Science," International Conference on Exploring Modeling Methods for Systems Analysis and Design-BPMDS 2011, vol. 81, 2011, pp. 497-510. [6] S. Michael, B. Tilo and K. Helmut, "Explicating design theories with conceptual models: Towards a theoretical role of reference models," Wissenschaftstheorie und gestaltungsorientierte Wirtschaftsinformatik, Physica-Verlag HD, pp. 175-194, 2009, doi: 10.1007/978-3-7908-2336-3_9 [7] S. A. Herbert “The sciences of the artificial,” MIT press, 2019. [8] CIGREF, "IT frameworks," CIGREF, 2009. Accessed, 10 4 2016. [Online]. Available: http://www.cigref.fr/cigref_publications/RapportsContainer/Parus2009/Referentiels_de_la_DSI_CIGREF_2009.pdf [9] R. R. Ben, " The effects of the multiplicity of standards and repositories of good practice: the case of the Information Systems Department," (in France) Thèse de doctorat, Conservatoire national des arts et metiers- CNAM, 2015. [10] B. Barafort, A. -L. Mesquida, and A. Mas, "Integrating risk management in IT settings from ISO standards and management systems perspectives," Computer Standards & Interfaces, vol. 54, Part 3, pp. 176-185, 2017, doi: 10.1016/j.csi.2016.11.010. [11] M. Samiotakis, "Integrating ITIL and COBIT 5 to Optimize IT Process and Service Delivery," 6th itSMF South East Europe Conference, Athens, Greece, 2013. [12] A. Smirnov, A. Ponomarev, N. Shilov, A. Kashevnik, and N. Teslya, "Ontology-based human-computer cloud for decision support: architecture and applications in tourism," International Journal of Embedded and Real-Time Communication Systems (IJERTCS), vol. 9, no. 1, pp. 1-19, 2018, doi: 10.4018/IJERTCS.2018010101. [13] L. C.-Shing, J. Z.-Wei, and H. L.-Kai, "A fuzzy ontology and its application to news summarization," IEEE Transactions on Cybernetics, vol. 35, no 5, pp. 859-880, 2005, doi: 10.1109/TSMCB.2005.845032. [14] C. Office, “ITIL service strategy,” Norwich: the Stationery Office (TSO), 2011. [15] C. Office, “ITIL Service Design,” Norwich: the Stationery Office (TSO), 2011. [16] C. Office, “ITIL Service Transtion,” Norwich: the Stationery Office (TSO), 2011. [17] C. Office, “ITIL service Operation,” Norwich: the Stationery Office (TSO), 2011. [18] C. Office, “ITIL Continual service imprivement,” Norwich: the Stationery Office (TSO), 2011. [19] A. EL Yamami, "Representing IT Projects Risk Management Best," Engineering, Technology & Applied Science Research, vol. 7, no. 5, pp. 2062-2067, 2017, doi: 10.48084/etasr.1340. [20] L. X.-Wen, L. X.-Chun, and H. Ke-Jin, "Design and implementation of IT governance planning decision supporting system," CCDC'09: Proceedings of the 21st annual international conference on Chinese control and decision conference, 2009, pp. 5665-5668. [21] K. Joshi, Y. Yesha, and T. Finin, "Automating Cloud Services Lifecycle through Semantic technologies," IEEE Transactions on Services Computing, vol. 7, no. 1, pp. 109-122, 2013, doi: 10.1109/TSC.2012.41. [22] C.-Yu Lee, K. M. Kavi, R. A. Paul, and M. Gomathisankaran, "Ontology of Secure Service Level Agreement," IEEE 16th International Symposium on High Assurance Systems Engineering (HASE 2015), Daytona Beach, Florida, USA, 2015, pp. 166-172, doi: 10.1109/HASE.2015.33. [23] S. Conger, M. Winniford and L. Erickson-Harris, "Service management in operations," AMCIS 2008 Proceedings, Canada, p. 362, 2008. [24] M. A. Mark, “The protégé project: a look back and a look forward,” AI matters, vol. 1, no 4, p. 4-12, 2015, doi: 10.1145/2757001.2757003. [25] K. Building, "Fact ++," School of Computer Science University of Manchester, 2021. [Online]. Available: http://owl.man.ac.uk/factplusplus/. [26] Pellet, “Clark & Parsia, LLC,” 2021. [Online]. Available: http://pellet.owldl.com/ [27] A. Jena, "Jena Fuseki Server," Apache Software Foundation, 2021. [Online]. Available: https://jena.apache.org/documentation/fuseki2/index.html. [28] H.Österle et al., "Memorandum on Design-Oriented Information Systems Research," European Journal of Information Systems, vol. 20, pp. 7-10, 2011. [29] A. El Yamami, K. Mansouri, M. Qbadou, and El H. Illoussamen, “Multi-objective IT project selection model for improving SME strategy deployment,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no 2, pp. 1102-1011, 2018, doi: 10.11591/ijece.v8i2. [30] G. De Leoz and S. Petter, "Considering the social impacts of artefacts in information systems design science research," European Journal of Information Systems, vol. 27, no. 2, pp. 154-170, 2018, doi: 10.1080/0960085X.2018.1445462.