Saturday, December 28, 2019

Cyber Attacks And Its Effects On The Nation s Economy

Present day events have shown that cyber-attacks are becoming more prevalent and sophisticated on the internet especially against our nation’s Critical Infrastructures (CI). One of them being the U.S. electrical power grid is also a national security risk that is currently vulnerable to cyber threats from malicious actors on the intent of causing a power blackout. The lack of protection on the power grid can result in an operational nightmare that can cause other government entities or specific CI targets that rely on the power grid to be non-operational. The consequence of a blackout would cost billions and can affect millions of people in the United States by delaying essential services needed to keep the country operational, which is essential for the nation’s economy and security. The complexity to understand cyber threats is ever changing due to technological advances and methods being used by computer hackers. The nation’s electricity system consists o f generators and regional networks of interconnected transmission lines that are vulnerable to a cyber-attack. However, with increased reliance to develop a smart grid to improve system operability such as supervisory control and data acquisition (SCADA) to monitor load balances remotely using internet protocols comes more risk for intruders. This paper will identify the risks associated with the electric grid and discuss the proposed new policy approaches that will help the electric industry which have beenShow MoreRelatedShould Government Implement Laws For Cyber Crime?977 Words   |  4 Pagesprevent cyber crime† Today is the era of technology and globalisation, as it connects the whole world together but also opens new ways to crime. Cyber crime is the result of negative use of technology. Cyber crime refers to a crime which is committed through internet or computer. Cyber crime is of differenr types like stealing of money or information, piracy, electronic vendalism that is destroying or changing the electronic information. Cyber terrorism which threatens not only one single nation butRead MoreChina Saper Threat777 Words   |  4 PagesWeak USA Cyber Policy vs China’s Security Threat to the USA? Abstract A cyber spy network based mainly in China hacked into classified documents from government and private organizations. One of the biggest questions still remains unanswered. Should the U.S. Congress conduct an in depth assessment of Chinese cyber spying and consider imposing tougher penalties on companies that benefit from industrial espionage. In this paper I will review china’s cyber threat and possible USA solutionsRead MoreGovernment Regulation By The Private Sector Essay1570 Words   |  7 PagesIntroduction Today, our nation is under constant attack by hackers, terrorist groups and other enemies. Unfortunately regardless of how innovative our government or private sectors have become with securing the network systems, the frequency and intensity of the attacks have only increased. Over the last decade, security breaches and cyber-attacks have highlighted how dependent our nation is on its critical infrastructure. It was concluded that a total of 54% of cyber-attacks targeted the US in 2013Read MoreThe Cyber Defenses Of The United States887 Words   |  4 PagesStates come under attack weekly if not daily and their cyber defenses must be kept up to par otherwise there will be an extreme loss of information and resources. FBI director James Comey can be quoted as saying â€Å"There are two kinds of big companies in the United States. There are those who ve been hacked by the Chinese and those who don t know they ve been hacked by the Chinese† (Comey). Comey can also be quoted as having said that, â€Å"China was seeking to obtain information that s useful to themRead MoreCyber Espionage Attacks And Cyber Attacks1662 Words   |  7 PagesCyber Espionage Attacks This kind of attacks differ from other types of cyber-attacks as they have a different source from where the actual attack comes from, which is mainly from within the organization that is being attacked. It may be the most difficult type of attack in which organizations are able to defend themselves from, for example if the attack is emanating from an individual that holds a high rank within the company. Taking an example of the United States where the government has a processRead MoreIs Cybercrime A Type Of Crime That Is Committed Over The Internet?1206 Words   |  5 PagesThe uses of Internet and computers have made life much easier; technology in general has improved the economy, medical research, and healthcare. Internet and computers have become a huge part of many people s lives in this era; it allows individuals to stay in touch, find information, and even make a living through online businesses. When there are positive points, there are bound to be some negative ones, and that is Cybercrime. Cybercrime is a type of crime that is committed over the InternetRead MoreThe Threat Of The Industrial Control System1315 Words   |  6 PagesNIST SP800-82 section 3.2 contains a table showing Adversarial Threats to ICS. For your discussion this week, you need to pick two of these and explain it in your own words. You also need to include an explanation of the potential risks to ICS s due to the threats. This means the impacts, consequences, and likelihood associated with each threat type. If possible, include an example of the threats. There are many threats which have the potential to impact industrial control systems. These threatsRead MoreThe United States National Security Strategies1398 Words   |  6 Pagesby the re-emergence of the Russian Federation and its subsequent rise in economic power. Another threat of significant concern can be found with Iran’s persistent efforts at attaining nuclear power; along with the asymmetrical threat of a terrorist attack, both at home and abroad. Regardless of the known security threats which inhibit Americans hunger for change and progression, we have reached a critical time in American history. As a result of our political and economic position, our military isRead MoreHow Technology Has Changed At A Remarkable Speed1470 Words   |  6 PagesOnline Collaboration, and Social Media are all well-known examples of the modern era inventions. They have radically changed the way we live our lives and depict ourselves. The effects of technology can be seen in every genre. In fact, it is the backbone of everything we do as an individual, a company or even as a nation. Since the invention of the Internet, the whole world has become a global village. As a result of this seamless connection, we are able to access information from anywhere in theRead MoreA Brief Note On Cyber Crime Through The Years1482 Words   |  6 PagesImportance of Cyber Security in America â€Å"If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. -Richard Clarke Cyber Crime through the Years Since the late 1980’s, cyber security has been a growing industry. Viruses such as the Morris Worm proved to the world that the internet was not a safe and secure architecture. In later years the Michelangelo virus, Melissa, and Concept began to push the IT industry for research on cyber security and antivirus

Friday, December 20, 2019

Substance Abuse And Addiction Counselor - 1393 Words

Substance Abuse and Addiction Counselor Substance abuse as well as addiction is a topic many people choose to ignore or tend to believe that it does not affect them. Addiction itself does not seek out certain types of people but can affect anyone, at any time, for any reason. Stress, per pressure, financial trouble, even genetics all play a role in substance abuse and addiction. Unlike others, I don’t see substance abusers as weak willed but instead in need of guidance and someone to talk to about their problems. That is why, when I decided to go to school I was very interested in becoming an Addiction Counselor. I am one of those types of people who really enjoy learning new things and coming up with solutions for myself or others. The biggest reason that I decided to go to college was to find a job that I was actually fascinated with and wouldn’t dread going to work day in and day out. The biggest concern I have for my future job is stability and job availability. One area that I don’t really find hi gh on my priority list is the money. I want to be able to make enough that I can survive and even thrive at times but I’m not looking for a job just for the financial gain. If I’m going to spend my life in a working profession it might as well be doing something I love. When most people think of substance abuse and addiction counseling they often only think of the 12 step program or alcoholics anonymous. The truth is that an addiction counselor must have a vast knowledge in theShow MoreRelatedSubstance Abuse And Addictive Behaviors760 Words   |  4 PagesSchool Counselors support all students so that they can succeed in the school setting, including those that have addictions or addictive behaviors. This is a challenging area, and school counselors must be able to understand causes and recognize signs of addictions, and provide services to support the needs of these students. Therefore, this paper discusses and evaluates the causes of addictions and addictive behaviors, analyzes possible sings of substance abuse and addiction in students, and designsRead MoreThe Effects Of Substance Abuse On The School Aged Populations787 Words   |  4 PagesSings of Substance Abuse and Addiction in the School-Aged Populations One study asked counselors about the prevalence of substances used by high school students and found that the counselors most often dealt with alcohol issues (Burrow-Sanchez Lopez, 2009). While alcohol may be one of the most widely dealt with substances from a counselor’s perspective, it is essential to be able to identify signs of alcohol abuse and other substance abuse so that action can be taken. Signs of substance abuse can varyRead MoreSubstance Abuse Counseling Laws And The Aca Ethics Code1465 Words   |  6 Pages Substance abuse counseling can be a rewarding career for anyone who has a desire to help people who are battling an addiction to drugs or alcohol. A substance abuse counselor can work in hospitals, prisons, therapeutic facilities, and halfway houses. The purpose of a substance abuse counselor is to help those who have an addiction manage it. In this paper I will be discussing Texas state counseling laws and the ACA ethics code and how these two can g uide my work as a substance abuse counselorRead MoreAddiction : The Problem Of Addiction1705 Words   |  7 PagesAddiction A crisis that many communities in Georgia are experiencing is addiction. A large substance that is currently being abuse is methamphetamine. Methamphetamine can be smoked, snorted, injected, taken orally and dissolved in liquids. The most common use is smoking and injecting the drug because of the immediate reaction it has on the body. It is highly addictive and has repeated patterns of binges and crashes with the individual constantly trying to reproduce their euphoric high. A recentRead MoreAddiction Counseling : An Bright Future Essay1191 Words   |  5 PagesAddiction Counseling: An Unfortunately Bright Future As a child, I was surrounded by drug and alcohol addiction. In fact, I didn’t realize this was even abnormal until I was nearly a teenager and saw that not all of my friends’ parents used illegal drugs on a regular basis or threw wild parties every weekend. It was unfortunate, but it was my reality. Being surrounded by addiction made me do everything that I could to stay away from drugs and other illegal substances. I saw the toll it had takenRead More Job Requirements of an Addiction Counselor Essay1007 Words   |  5 PagesThe job of an addiction counselor specializing in, but not limiting my choice to substance abuse is the job profession I have chosen. The opportunities for this field are very open in my area of the country and throughout the Unites States. The counselors that work within range of me are very busy, and have little time to offer to a person in training. I was able to arrange an email interview with a particular counselor working at a rehabilitatio n facility for alcoholics and drug addicts. His jobRead MoreMental Illness And Substance Abuse901 Words   |  4 Pagesmental illness and substance abuse, which may have complications on the actual treatment for mental illness. It is very important for the addiction counselor to properly understand both the differences between acute primary psychiatric disorders and any underlying psychiatric symptoms, caused by alcohol and other drugs. Sometimes the addiction needs to be treated first in order for the mental illness to be properly identified and successfully treated. Also addiction counselors need to understandRead MoreSubstance Abuse Counselors Should Follow The Four Ethical Principles1181 Words   |  5 Pagesinclude: hiring competent substance abuse counselors, effective assessing guidelines, appropriate Evidenced Based Treatment Plans, case management services, programs for Change, family services, and promoting prevention programs. The treatment program being designed will offer a warm and inviting atmosphere that welcomes all clients. Hiring competent substance abuse counselors will be beneficial for designing a successful treatment program. The substance abuse counselors will be unbiased, knowledgeableRead MoreSubstance Abuse Treatment Center Of The World798 Words   |  4 PagesIntroduction to the foundation of the issue. Here in Florida there many substance abuse treatment facilities, in fact there are so many that Southern Florida is not considered the substance abuse treatment center of the world. This is the description of Southern Florida that was talked about in classrooms, at an undergraduate program at Indian River State College (IRSC) in Fort Pierce Florida. Many time a professor would talk about Southern Florida being the treatment capital of the world, and thereRead MoreEssay on Social Aspect of Substance Abuse1001 Words   |  5 PagesAddiction is a difficult disease that involves several different factors including biological, psychological and sociological aspects. Anderson (1997) states that substance use refers generally to the ingestion of illicit drugs such as marijuana, cocaine, opiates, barbiturates, benzodiazepines, PCP, amphetamines, etc. The use of illicit drugs, such as alcohol and nicotine, are less frequently included in this definition, despite their widespread use and und isputed potential for harm. Substance abuse

Thursday, December 12, 2019

Advanced Operating System

Question: Identify three operating systems for Acme Toys Inc. Answer: Introduction: The report identifies three operating systems for Acme Toys Inc, (a leading manufacturer) for its expansion plan with usual departments. Moreover, conducting market research, the report finds out the most suitable operating system for the company. Considering the server should support certain criteria (multiuser environment, multiple processors, types of application as well as high security and memory) the report choose the OS with rules and reasons. Apart from this, it also considers the R D and network departments' requirements. Suitable OS for Acme Toys: According to the company and its expansion plan, the company needs an operating system, which is suitable for all the departments of the enterprise. The OS creates an interface between hardware and software such that internal hardware structure may not be the end-user concern (Stallings, 2016). Os works as program development tool and executor, I/O, system and file accessory as well as error detector and resource. For a vast and expanding network, choice of OS depends on the factors like multi-user environment, multiprocessor, various types of applications, high security and large memory for data files and information. 1. Windows: Windows is a multitasking Os with compatibility to work with multiple 32 and 64 bit CPUs as well as GPU. The easy way to learn the mode (GUI) as well as its availability has made the OS a popular choice. Selection of an OS depends on four factors Stability, functionality, security and workload (Stallings, 2016). Windows has versions for enterprise need. Windows with its modular approach differentiate between application-oriented software and core OS software. Due to its modular approach, error correction in the certain module does not affect other modules or the entire API. Again, it supports four user mode processes like service process, environment subsystems, etc. Windows has client server model that can quickly add new API, reliable and protected partitioned memory, open remote procedure call as well as distributed computing where the local server can pass the message to the remote server (Carpenter, 2016). Flexible OS routines run multiple thread single process execution, as wel l as inter-process communication with OOP features (encapsulation, inheritance), gives flexibility and protection to the process and resources. Windows is an all purpose OS with high-security measures, interoperability with another server like Unix, Macintosh, authentication support Kerberos v5 as well as application support (HTTP, SMTP, Pop, Mac CGI ). Windows Server is a stable OS with cloud readiness on MS Azure and Hyper-V (if cloud platform required). 2. UNIX: UNIX was originated in the BELL lab and gain popularity for high-security systems like research labs, military systems, etc. Its system kernel is isolated from the user application. The OS is known as ideal for utility servers like DNS, DHCP, etc. It has features like high efficiency, different machine compatibility as well as diverse configuration for complex tasks (Silberschatz, Galvin Gagne, 2016). UNIX has command line interface, and that is too difficult to learn for users. However, the new versions of SVR4, BSD as well as Solaris 10 have some new features like a multithreaded kernel, support for SMP, Internet-based server, and firewalls, real time processing support, virtual memory management, etc. but it is still difficult for end users. 3. LINUX: LINUX is a variation of UNIX and has a monolithic structure. The inflexibility of Linux can be compensated with its free package availability in the market. The loadable module feature of the OS gives the advantage over the UNIX. LINUX has some unique features like dynamic linking the kernel in its executing mode and hierarchical module structure. Again, the OS supports global namespace for file systems, TCP/IP protocol suite as well as interrupt handling from devices (Ramachandran Ramachandan, 2016). For the network, LINUX server offers single service with data center charges. Cloud framework like OpenStack supports LINUX. However, finding and fixing bugs in open source like LINUX is easier, but the same feature is taken as a disadvantage for corporate security. The Vserver of LINUX supports many virtual servers yet SELinux is incomparable for Windows server. Recommendation of OS for Acme Toys: According to the market research and comparison with other OS, the report identifies Windows as the most suitable for Acme Toys. However, the RD department requires a secure VPN; they should use UNIX /versions for the VPN. The UNIX-based server can be hosted easily on Windows server. For the rest of the departments, Windows is the best choice as an OS (Carpenter, 2016). 1. Client support and Interoperability: Windows supports NT workstation 4.0, 2000 Professional, XP Pro, Vista business as well as operates on Novel Netware, UNIX, Macintosh, sever 4.0 (Stallings, 2016). 2. Directory and File Services: Windows supports directories for network administrator as well as device addition, file sharing tools, distributed file services, etc (Bassil,2011). 3. Authentication Security: Windows support User level, server level security as well as authentication like interactive login, network authentication, and active directory. 4. Windows versions: Windows for Workgroup supports protocols like NetBEUI, TCP/IP as well as IPX/SPX (Carpenter, 2016). The version is used to increase productivity and sharing information. Windows XP Professional supports remote session, EFS, IPSec, recovery console, etc. Windows Vista supports updated GUI (Aero) as well as new multimedia capabilities (Silberschatz, Galvin Gagne, 2016). Windows7 is efficient in managing files, and Windows NT supports large file management, security, compression, encryption and symbolic links (Ramachandran Ramachandan, 2016). 5. VPN and UNIX: UNIX is stable, scalable with high performance, security and efficiency. The OS is also compatible with Windows and may work well with the VPN (Stevens Rago, 2013). Conclusion: The report compares three OS for an expanding manufacturer and finds out the most suitable OS for the firm. The report also discusses the reasons and criteria for the choice of the OS. References: Bassil, Y. (2011). Windows and linux operating systems from a security perspective. Journal of Global Research in Computer Science, 3(2), 17-24. Carpenter, T. (2016).Microsoft Windows Operating System Essentials.miamibeachhigh.schoolwires.com. Retrieved 14 March 2016, from https://miamibeachhigh.schoolwires.com/cms/lib07/FL01000126/Centricity/Domain/163/Sybex%20Microsoft%20Windows%20Operating%20System%20Essentials.pdf Ramachandran, S., Ramachandan, A. (2016).Rapid and Proactive Approach on Exploration of Vulnerabilities in Cloud based Operating Systems.citeseerx.ist.psu.edu. Retrieved 14 March 2016, from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.259.4330rep=rep1type=pdf Silberschatz, A., Galvin, P., Gagne, G. (2016).Operating Systems Concept.iit.qau.edu.pk. Retrieved 16 March 2016, from https://iit.qau.edu.pk/books/OS_8th_Edition.pdf Stallings, w. (2016). Operating Systems. sist.sysu.edu. Retrieved 13 March 2016, from https://sist.sysu.edu.cn/~isscwli/OSRef/William%20Stallings%20-%20Operating%20Systems%EF%BC%9AInternals%20and%20Design%20Principles(7th%20Edition)-2011.2.28.pdf Stevens, W. R., Rago, S. A. (2013).Advanced programming in the UNIX environment. Addison-Wesley.

Wednesday, December 4, 2019

Management of Information Technology Services

Question: Write an essay about the "Management of Information Technology Services". Answer: Introduction Information Technology Service Management is mainly defined as the activities those are mostly directed by the structured and organized in processes and supporting procedures those are implemented by a company in terms of planning, designing, operating as well as controlling the services of Information Technology offered to the consumers (Alexander 2013). It can often be equated with the ITIL; even though variety of standards and frameworks are there those can contribute to the entire ITSM discipline. The execution of the processes of IT Service Management in a company, especially those processes those are more workflow-driven. In addition, these processes can also become advantageous significantly from being supported with specialized tools of software. On the other hand, ITIL is mainly a set of practices or such a tool of ITSM that actually aims on the alignment of the IT services with the business requirements. This particular report is mainly implemented in order to shed light on the ITIL adoption strategies of HBZS Mining Rescue Services in terms of IT Service Management (Ali, Soomro and Brohi 2013). Therefore, this particular report has demonstrated a critical awareness regarding the importance as well as the significance of the IT Service Management and the requirement for HBZS Mining Rescue Services to assure that the effective strategies are in place for managing the significant investment in the IT infrastructure. On the other hand, this report is also aimed for demonstrating the potential for comprehending as well as evaluating the associated roles and responsibilities, activities and objectives for enabling the effective improvement, management and planning of the processes of IT service. In addition, in order to accomplish the objectives of this particular report, the ongoing IT Service Management processes are aimed to be analyzed in this report in the context of HBZS Mining Rescue Services. This report is also aimed to provide a view regarding th e future improvements to ITSM at HBZS Mining Rescue Services. On the other side, this particular report based on ITSM, is aimed to analyze the service transition phase as well as aimed to provide a view regarding the critical transition processes of HBZS Mining Rescue Services. Furthermore, this report is also aimed to illustrate the service operation processes followed by HBZS Mining Rescue Services in order to adopt ITIL strategies. It is also focuses on to provide some suggestions regarding the limitations as well as the benefits of outsourcing only service desk while managing the other functions of the internal IT department in order to mitigate the issues associated with outsourcing. On the other hand, this report is also aimed to discuss the Continual Service Improvement in terms of current service reporting in place as well as how it can be extended in future. Apart from that, this report also focuses on the press of fostering the business-OT partnership at all the levels of the operations of HBZS Mining Rescue Services. Company Background HBZS Mining Rescue Services is a prime mining organization in the Czech Republic. It is the only hard coal producer in the country with the annual production of near about 8-9 million tonnes from 4 mines with 23 shafts with the extraction of coal from the depths which is ranging from the 600 (Cyber Fox 2016). This organization mines its coal in the Karvinas Basin in the Upper-Silesiancoal basins Southern part (Cyber Fox 2016). On the other hand, the organization manufactures thermal coal as well as quality coking for the energy and steel markets in Central Europe. HBZS Mining Rescue Services can control the subsidiary, OKD that can pursue in relation to the coal mining (Cyber Fox 2016). It is the biggest employers in the Moravian-Silesian Region. On the other hand, HBZS Mining Rescue Services is the second biggest private employer in Czech Republic. On average 11000 people in 2011 worked for the organization. The primary responsibility of HBZS Mining Rescue Services is the rescue of materials as well as workers from the underground or from the environment that is non-breathable like underwater (Cyber Fox 2016). In addition, people have a huge range of ancillary commercial activities. This organization mainly gives a non-stop emergency service. Ongoing ITSM at HBZS ITSM or the Information Technology Service Management is defined as the entire activities those are simply directed by several specific policies as well as structured and organized in the processes and supporting procedures as well those are performed by a company or the part of a company for designing, planning, delivering, operating and controlling IT services those are offered to the consumers (Barafort, Di Renzo and Merlan 2012). On the other hand, Information Technology Infrastructure Library or ITIL is defined as the set of practices for ITSM or the Information Technology Service Management that aims on the alignment of the IT services with the requirements of business (Borghoff and Pareschi 2013). ITIL mainly demonstrates the checklists, tasks, procedures as well as processes those are not specific in terms of organization. However, it can easily be applied by a company in order to establish integration with the strategy of the company, maintaining a minimum competency level a s well as delivering value. In case of HBZS Mining Rescue Services, at the very first phase of the ITIL adoption, this organization has selected an ITIL adoption approach that is based on tools assuming that organized processes supported by their tools would save both of the resources as well as time. Moreover, they have managed for implementing six processes of ITIL in a short time. These processes are the knowledge management, configuration management, Service Asset, Change Management, Request Fulfillment as well as Incident and Event Management (Chauhan, Raman and Singh 2013). This particular phase has provided a solid base for the future even though this particular phase was mainly IT internal oriented. However, there is a major as well as a crucial constraint has been obtained in this particular phase of the ITIL adoption. It was not the lack of IT staff skills or the resources. The major as well as essential constraint was low maturity of business. IT was not yet considered as a business partners despite all the objectives those HBZS Mining Rescue Services had reached. On the other hand, during the second phase of the ITIL adoption in the business operation of HBZS Mining Rescue Services, a change in the upper management has meant a new scope of improvement (Cots, Casadess and Marimon 2014). Therefore, the IT department consequently has faced few new challenges: these are as follows: First of all, IT department of HBZS Mining Rescue Services has failed for explaining properly to the new management regarding the IT operations (Cox 2013). It was quite obvious that the IT department of HBZS Mining Rescue Services concentrated too much in the on the explanation of technical aspects of their work those were incomprehensible to the rest of the business operations. Secondly, the management change was a significant scope for changing their strategy of communication as well as for achieving a partnership with the business (Dahlstrom, Walker and Dziuban 2013). On the other hand, the business of HBZS Mining Rescue Services has also perceived the IT departments activities widely within the organization, homogeneous fashion. In addition, the IT department of HBZS Mining Rescue Services was paralyzed by the disputes of competency (Davenport 2013). The individual departments of HBZS Mining Rescue Services had mainly conflicted the necessities as well as the IT department was asked for resolving it. The management department of HBZS Mining Rescue Services wants the business for accepting the responsibility to set requirements as well as priorities as the conflict management is not the role of IT. Now the major concern of HBZS Mining Rescue Services should be to discover the techniques through which the Information Technology Service Management of the organization can be improved. In order to do so, additional processes of ITIL should be adopted by HBZS Mining Rescue Services as well as the existing processes should also be improved (Davenport 2013). Both of the mentioned remedies can be applied on the ITSM of HBZS Mining Rescue Services. In this situation, the most effective improvement on the ITIL strategies can be implemented by establishing the Digital Service Catalogue within the ITSM strategies of HBZS Mining Rescue Services (Fitzsimmons and Fitzsimmons 2013). The service catalogue is simply the curated as well as the organized collection of any all the services related to the Information Technology those can be performed by or within an organization. The IT service catalogue or the digital service catalogue is where the IT publishes the services that it mainly offers. F or HBZS Mining Rescue Services, the Digital Service Catalogues would act as the tools of knowledge management for the consultants as well as the employees of this particular organization. It can be done by permitting them for routing their requests regarding and for the services of this organization to the expert or the IT department of the company who has the knowledge regarding the issues encountered in the ITSM operations (Fitzsimmons and Fitzsimmons 2013). The reasons for which the IT service catalogue should be implemented in order to improve the ITSM operations of the organization are as follows: The IT service catalogue is ITIL compliant. It also improves the customer satisfaction It also improves the IT service department reputation of HBZS Mining Rescue Services It gives effectives as well as efficient channel of engagement for the standard services without or with authorizations. The IT service catalogues can also showcase the service availability for the consumption of business user (Foster and Kesselman 2013). The IT service Catalogues can also improve the opportunities of IT for the service automation that is resulted in the performance of higher service delivery. This particular IT service catalogue tool can resolve all the four challenges: The IT service catalogue or the digital service catalogue can divide the activities of the department of Information Technology in accordance with the activities of business as well as utilizing the terminology of business that made it understandable more easily to the business (Galliers and Leidner 2014). The IT service catalogue can play a significant role in implementing the meetings of regular service review established invaluable channels of communication. On the other hand, this particular tool in the ITIL strategy can also assign tickets from the service desk that is connected to the suitable definition of service within the service catalogue; given metrics those are understandable to the business operations of HBZS Mining Rescue Services (Hesson, Soomro and Geray 2012). Service Transition The major objective of the ITIL Service Transition of HBZS Mining Rescue Services is for building as well as deploying the IT services in the business operations of the organization. The major feature of service transition in the business operations of HBZS Mining Rescue Services is for ensuring that the changes to the service management processes as well as services are continued in a well-coordinated and well-organized manner (Iden and Eikebrokk 2014). On the other hand, Service Transition has built as well as deployed modified or new services in the business operations of HBZS Mining Rescue Services. HBZS Mining Rescue Services has followed several major processes of service transition (Ionita and Gordas 2013). HBZS Mining Rescue Services has mainly implemented the process of service transition as per the ITIL 2011. These major processes are as follows: Change Management Process Objective the major process objective of change management in service transition adopted in the business operations of HBZS Mining Rescue Services is for controlling the lifecycle of all the changes encountered in the IT operations (Marchewka 2014). The prime goal of change management in HBZS Mining Rescue Services is for enabling the advantageous changes to be implemented with the minimum disruption to the services of IT. Change Evaluation Process Objective The prime objective of the change evaluation in the service transition is for assessing the important changes such as the introduction of a substantial or a new service to an existing service of HBZS Mining Rescue Services, before those changes are permitted for proceeding to the next stage in the lifecycle of their business operations (Nurfaizah, Utami, and Arief 2015). Project Management (Transition Support and Planning) Process Objective - the major process objective of the Process Management in the service transition in the IT operations of HBZS Mining Rescue Services is for planning as well as coordinating the resources for deploying a prime release (Picard, Renault and Barafort 2015). It has been done within the predicted quality, time as well as cost estimates of the IT operations of HBZS Mining Rescue Services. Application Development Process Objective the process objectives of the application development in the service transition in the business operation of HBZS Mining Rescue Services is for making available systems as well as applications that can give the necessary functionalities or the features of the IT services of the organization (Renault, Cortina and Barafort 2015). This particular process incorporates the maintenance as well as the development of the custom applications and the product customization as well from the vendors of software. Deployment and Release Management Process Objective The process objective of the deployment as well as the release management in the service transition mechanism of HBZS Mining Rescue Services is for planning, controlling as well as scheduling the release movement for testing and living the environments (Schwalbe 2015). The prime objective of the release management for HBZS Mining Rescue Services is to assure that the live environment integrity is secured and that the exact components are released. Service Testing as well as Validation Process Objective the process objective of the service testing and validation in the service transition process of HBZS Mining Rescue Services is for ensuring that the resulting services as well as the deployed releases fulfill the expectations of customer as well as or verifying that the IT operations of HBZS Mining Rescue Services is capable of supporting the new service (Schwalbe 2015). Configuration Management and Service Asset Process Objective The process objective of the configuration management and service asset is for maintaining information regarding the configuration items necessary for delivering an IT service, incorporating their relationships (Willcocks 2013). Knowledge Management Process Objective the process objective of the knowledge management in the service transition in the IT operations of HBZS Mining Rescue Services is for gathering, sharing as well as storing information and knowledge inside a company (Chao and Chandra 2012). The prime purpose of the knowledge management is for improving the efficiency by minimizing the necessity for rediscovering the knowledge. In the first phase or the service transition phase of ITIL adoption of HBZS Mining Rescue Services can result several issues of operations in other enterprises. In case of this organization, HBZS Mining Rescue Services should follow some critical service transition processes in order to mitigate the probable operational issues associated with the service transition processes in the business operations of the organization (Luftman 2014). These critical processes are simply the improvisation of the service transition processes those are followed by HBZS Mining Rescue Services. The critical transition processes are as follows: Transition Planning and Support With the help of the Transition Planning and Support, HBZS Mining Rescue Services can be able to ensure that the orderly transition of a modified or a new service into the production together with the required adaptations to the processes of service management. It must include the operational requirements and service design as well within the transition planning. the Transition Planning and Support has two sets of objectives. Those are the Coordination and planning as well as Improvement and Standardization (Rathnam, Johnsen and Wen 2015). In case of the Coordination as well as Planning, it can help the organization to coordinate the activities as well as resources across the service teams, suppliers, as well as projects needed to modify successfully an existing service or to introduce new service or to retire a particular service. It also manages risks for minimizing failure chances (Santana Tapia 2012). On the other hand, the improvement and the sta ndardization objectives assure adoption of re-usable and standard supporting systems and processes. It would also improve continually the performance of the stage of service transition of the business operations of HBZS Mining Rescue Services. Thus the well-organized as well as a well-managed process of transition planning and support would deliver several benefits to the IT operations of HBZS Mining Rescue Services. In the activities of service transition, consistency through the usage of the accepted set of models, standards as well as policies. Service Validation and Testing the major objective of the service transition as well as testing is for providing the evidence of objective to the changes or new service support, the requirements of stakeholders, business as well as customer of HBZS Mining Rescue Services (Long 2012). It would be helpful for HBZS Mining Rescue Services to support the Deployment and Release process assuring the suitable testing levels are performed at the time of deployment, build and release activities. It can also be applied over the entire lifecycle for ensuring the quality of any aspect of the services of HBZS Mining Rescue Services. Change Evaluation this particular process should be modified in the service transition process of HBZS Mining Rescue Services by aiming to assess the prime changes such as the introduction of the substantial change or the new service change to the existing IT service before those changes are permitted for proceeding to the next phase in their life-cycle (Lloyd et al., 2014). Release and Deployment Management this process can be improvised as well as modified by building delivering as well as testing the ability for providing the services those are specified by the service design and that would accomplish the requirements of stakeholders and deliver the desired solution (Lloyd et al., 2014). Change Management the modification of the change management in the service transition operation of HBZS Mining Rescue Services would respond to the changing business requirements of the consumers of HBZS Mining Rescue Services (Taylor, Case and Spalding 2015). It would also increase the RFC value as well as minimize the re-work, distribution and incidents. Service Asset and Configuration Management This process in the service transition can ensure that the assets needed for delivering services are controlled properly and that reliable and accurate details regarding those assets is present where and while it is required (Taylor, Case and Spalding 2014). It can also assure that the assets under the control of the HBZS Mining Rescue Services are properly cared, controlled as well as identified across the entire lifecycle. Knowledge Management the modification of the knowledge management system can analyzes, share, store and gather information as well as knowledge within HBZS Mining Rescue Services. It can also improve the efficiency by minimizing the requirement for rediscovering knowledge (Case 2014). Knowledge management is the central process of service transition which is responsible to provide knowledge to all the other processes of IT service management. These critical transition processes are significantly inter-related to the other HBSZ as well as the ITIL processes. These processes have the potential for managing as well as planning the resources and capacity necessary to deploy, test, build and package a release into production. On the other hand, as a part of the ITIL adoption of HBZS Mining Rescue Services, it can provide a rigorous and consistent framework to evaluate the risk profile as well as service capability before a changed or a new service is released in HBZS Mining Rescue Services (Vehvilinen, Hyvnen and Alm 2015). On the other hand, while adopting ITIL, these processes also provide good quality of information and knowledge for expediting effective decisions regarding promoting a release to HBZS Mining Rescue Services. Service Operation The Service Operation in ITIL adoption mainly encompasses the daily infrastructure, processes as well as activities those are responsible to deliver value to the business of HBZS Mining Rescue Services with the help of advanced technology. In the service operation of HBZS Mining Rescue Services, service experience and consumerism is the major factors (Pinard et al., 2012). The objective of the service operation in ITIL adoption of HBZS Mining Rescue Services is for maintaining the daily services to the point that there are no consequences. It also ensures the organization that the IT services are effectively and efficiently delivered. The service operation mainly implements the operational tasks. There are few major processes those are the part of the ITIL stage Service Operation. These are as follows: Event Management the project objective of the event management in the service operation of HBZS Mining Rescue Services is for ensuring the services are monitored constantly as well as for filtering and categorizing events in terms of deciding on the suitable actions (Probst, Case and Elephant 2013). Incident Management the major process objective of the incident management in service operation of HBZS Mining Rescue Services is for managing the lifecycle of all incidents (Mesquida et al., 2012). The prime goal of incident management is for returning the IT service towards the users as soon as possible. Request Fulfillment the process objective of request fulfillment is for fulfilling the service requests that in most of the cases are the requests for information or the minor changes. Access Management The process objective of the access management in service operation of the organization is for granting the authorized users the right for using a service at the time of preventing access to the non-authorized users (Suhairi and Gaol 2013). The processes of access management execute essentially policies demonstrated in the Information Security Management. Sometimes, it is also referred to as the Identity Management or Rights Management. Problem Management the process objective of the problem management in the service operation of HBZS Mining Rescue Services is for managing the lifecycle of all issues. The prime goal of problem management is for preventing the incidents from obtaining and for reducing the incident impact that cannot be prevented (Jntti and Hotti 2015). The Proactive Problem Management also analyzes Incident Records and utilizes data gathered by the other processes of IT service management for identifying significant issues or trends. IT Operations Control the process objective of IT operations control is for controlling and monitoring the IT services and their underlying infrastructure. It also executes routine tasks of daily basis based on the operation of the infrastructure applications and components (Alexander 2013). It also incorporates the routine maintenance, output and print management, restore and back up activities and job scheduling. Facilities Management the process objective of the facilities management is for managing the physical environment of HBZS Mining Rescue Services where the IT infrastructure of the company is located (Ali, Soomro and Brohi 2013). It also incorporates all of the aspect of the management of the physical environment such as environmental monitoring, business access management and cooling and power. Application Management It is actually responsible to manage the applications across their entire lifecycle (Borghoff and Pareschi 2013). Technical Management It gives the technical expertise as well as support for the IT infrastructure management. The current and one of the most effective challenges for the company is the possibility that HBZSs Mining Rescue Services would outsource totally the IT department of the organization. HBZS Mining Rescue Services have confronted with the plans for the entire outsourcing of the IT department due to the coal crisis realization (Borghoff and Pareschi 2013). Thus, at present the most important and critical challenge is unquestionably how to define the IT value of the business. The ITIL framework fortunately is oriented strongly to provide and demonstrate the value and the hope of the company is that the organization would be capable of proving that the internal department of IT of the enterprise is more advantageous. The service desk is a prime IT service inside the IT service Management discipline as demonstrated by the ITIL. It is intended for providing a Single Point of Contact for meeting the requirements of communication of both the IT staff and users (Borghoff and Pareschi 2013). Contract with an outside company for providing the technical support is one of the most widely utilized outsourcing forms. However, if any particular business looking for outsourcing the needs of the help desk services for understanding the limitations as well as the benefits and to set the goals of outsourcing. While the outsourcing is discussed often in financial items, the help desk outsourcing impact is much wider than that. It can also have an influence on the productivity at both of the rank-and-file and management levels while utilized as internal support. An outsourced help desk as a customer service resource can become a major driver of the customer retention as well as customer satisfaction (Chauhan, Raman and Singh 2013). The potential influence of an outsourced help desk in short, for worse or for better is so wide that careful selection and goal-setting can be crucial to the success of HBZS Mining Rescue Services. Hence, in the present scenario of HBZS Mining Rescue Services, there are several benefits as well as limitations of outsourcing only the service desk during the process of the maintaining the other functions of the internal IT department of the organization. Service Desk Outsourcing Advantages The benefits or the advantages of the service desk outsourcing by HBZS Mining Rescue Services are as follows: Financial Leverage the service desk outsourcing for the HBZS Mining Rescue Services minimizes the fixed costs. As a result, it can increase the return on investment of this organization. Focus on Core Competencies the outsourcing of the service help desk of HBZS Mining Rescue Services can free up management for spending more time on the areas where the organization is best positioned for adding the value (Cots, Casadess and Marimon 2014). Flexible Capacity It is one of the most crucial advantages of the Service Help Desk outsourcing for HBZS Mining Rescue Services. The call volume of the service help desk outsourcing can greatly vary for the other reasons as well as the seasonal reasons (Cox 2013). The outsourcing through the service help desk creates flexible potential in order to handle these changes in volume. Continual updating training As this organization, HBZS Mining Rescue Services is specialized in the help desk outsourcings services, thus, this organization are better positioned for keeping training current. Limitations of Service Desk Outsourcing The limitations or the shortfalls of the service desk outsourcing by HBZS Mining Rescue Services are as follows: Loss of Control over training - HBZS Mining Rescue Services may be concerned that few nuances can be lost while the training is outsourced. Lack of concern for the consumers the service help desk of HBZS Mining Rescue Services can become the first line of contact with the customers as well as if representatives are not enough professional, thus it can also badly reflect on this organization (Dahlstrom, Walker and Dziuban 2013). Remote Personnel While the service desk outsourcing can take the benefits of the global potential, a more local touch can ignore the cultural differences. HBZS Mining Rescue Services has mainly outsourced the help desk services in search of the positives to be only blindsided by the negatives. These negatives existence should not turn the company against the outsourcing through service help desk as the advantages are still legitimate. The identification of those potential negatives rather should serve as the initial step to overcoming and managing the obstacles to the outsourcing of the service help desk (Davenport 2013). For accentuating the positive that is realizing the advantages of the outsourcing through service help desk without being overwhelmed by the shortfalls, HBZS Mining Rescue Services should three components to planning a successful program of service help desk. Recognize the basic mission the service help desk through outsourcing should have one of three basic missions such as for providing the support of internal technology; for providing support for the users of business-to-business; or for providing support for the customers (Judy 2013). Set measurable objectives It can begin with the financial objectives like the return on investment but it should encompass also the goals of services (Taylor, Case and Spalding 2015). These might incorporate percentage of situations, average length of call and response time resolved on the initial call, user or customer satisfaction as well as customer retention. Demonstrate the help desk search the goals as well as mission demonstrate the specific goals and wider mission of a program of service desk outsource (Case 2014). Then, these demonstrations should generate the search basis for a outsource provider of service help desk. CSI and Business-IT Alignment The IT department of HBZS Mining Rescue Services has moved from a technological point of view to the service point of view (Vehvilinen, Hyvnen and Alm 2015). Therefore, a formalized process of Continual Service Improvement should be established. HBZS Mining Rescue Services are currently using or following a certain continual Service Improvement process. Continual Service Improvement Process As per the current process of Continual Service Improvement followed by HBZS Mining Rescue Services in terms of adopting ITIL, it can be stated that the process of Continual Service Improvement has used the methods from the quality management in terms of learning from the previous failures as well as the successes of the organization (Suhairi and Gaol 2013). On the other hand, the Continual Service Improvement process mainly focuses on the continual improvement of the efficiency as well as the effectiveness of the processes and services of IT, in line with the continual improvement concept adopted in the ISO 20000. There are several major processes are the part of the ITIL adoption stages of the business operations of HBZS Mining Rescue Services. These are as follows: Service Review In case of this particular process, its process objective in terms of CSI followed by HBZS Mining Rescue Services while adopting ITIL is for reviewing the infrastructure as well as business services on a daily basis (Jntti and Hotti 2015). The major aim of this particular process in Continual Service Improvement is for improving the quality of service where necessary as well as for identifying more economical ways to provide a service where possible. Process evaluation On the other hand, the process projective of this particular process of continual service improvement in HBZS Mining Rescue Services in terms of ITIL adoption is for evaluating the processes in a daily basis (Judy 2013). It also incorporates the recognizing areas where the metrics of the targeted processes are not reached as well as holding regular reviews, maturity assessments, audits and benchmarks as well. Definition of the initiatives of Continual Service Improvement the process objective of the CSI initiatives followed by HBZS Mining Rescue Services while adopting ITIL in the IT services of this company is for defining particular initiatives those are focused on the improvement of the processes as well as services (Iden and Eikebrokk 2014). It is mainly done based on the outcomes of the process evaluations as well as the service reviews. Monitoring of the initiatives of Continual Service Improvement the process objective of this particular process is for verifying of the initiatives of improvement are proceeding in accordance with the plan and for introducing also some corrective as well as rectifying measures where required (Ionita and Gordas 2013). From the above discussion, it can be said that HBZS Mining Rescue Services have utilized an effective model of Continual Service Improvement (CSI) in order to adopt an efficient ITIL strategy. However, there are some areas over which few extensions are required in order to improvise the CSI model of HBZS Mining Rescue Services during the ITIL adoption in future. In this particular scenario of HBZS Mining Rescue Services, the Continual Service Improvement process should aim on the increase in the efficiency of the processes in the ITIL adoption of the company (Marchewka 2014). On the other hand, CSI model of HBZS Mining Rescue Services must be capable of maximizing the cost of services as well as the effectiveness and the efficiency of the services or the process under the ITIL adoption and underlying the processes of IT Service Management as well. Continual Service Improvement is the last stage or phase in the life cycle of ITIL (Nurfaizah, Utami and Arief 2015). There are several im portant activities of the extended Continual Service Improvement Process, those can be followed by HBZS Mining Rescue Services while adopting ITIL. These are as follows: The extended CSI would review the information as well as the trends of management for ensuring that the services are meeting the agreed levels of service. The extended Continual Service Improvement can also review the trends and the information of management for ensuring that the outcomes of the processes of IT Service Management are achieving the intended outcomes (Picard, Renault and Barafort 2015). On the other hand, the extended CSI processes followed by HBZS Mining Rescue Services can also conduct the internal audits by verifying compliance It can also conduct the internal as well as the external reviews of the service for identifying the opportunities associated with the extended Continual Service Improvement followed by HBZS Mining Rescue Services (Renault, Cortina and Barafort 2015). The extended Continual Service Improvement processes followed by HBZS Mining Rescue Services can conduct the maturity assessments against the activities as well as roles of process for highlighting areas of concern or improvement (Schwalbe 2015). On the other hand, it can also review the analyzed data In addition, the extended CSI followed by HBZS Mining Rescue Services in ITIL adoption can also present the recommendations to the senior management in terms of improvement The extended Continual Service Improvement processes in ITIL adoption phase of HBZS Mining Rescue Services can help the improvement opportunities based on the higher priority. In addition, it can also manage as well as deliver cross divisional and cross functional improvement projects. On the other side, the extended Continual Service Improvement Service of HBZS Mining Rescue Services can also build the effective relationships with the IT senior managers as well as the business of HBZS Mining Rescue Services (Willcocks 2013). It can also impact all of the levels of management for ensuring that the activities of service improvement are getting the required support as well as are well-resourced enough for implementing the solutions (Luftman 2014). Business-IT Alignment Business-IT Alignment is simply a dynamic state in that HBZS Mining Rescue Services can be capable of using effectively IT for achieving the objectives of this particular business organization that is typically improved marketplace competitiveness or financial performance. It has mainly ensured the capacity of the organization for demonstrating a positive relationship between the accepted financial measures of performance and the information technology (Willcocks 2013). The IT department of HBZS Mining Rescue Services has a much clearer need understanding of its customers in terms of their Business-IT Alignment. This business has mainly discovered the benefits to communicate with Information Technology. In order to mitigate the issues associated with the business-IT alignment; this organization has to improve the maturity of its business processes (Willcocks 2013). Therefore, for improving the Business-IT alignment ITIL training and certification were important, not only for the meet ings and the discussions with the counterparts of the company in other organizations but for acquiring new knowledge that can permit the company for comparing its experiences and expand also its viewpoints. Conclusions and Recommendations to the IT Manager HBZS Mining Rescue Services have selected the ITIL framework due to the enhancing demands on the IT department that led to the requirement for making the activities of the organization more effective. ITIL framework has also been selected by HBZS Mining Rescue Services in order to structure the activities of the organization in a consistent way was the way forward. However, there are some issues associated with the ITIL adoption techniques as well as the processes. Therefore, there can be some recommendations which can help HBZS Mining Rescue Services to improve its ITIL framework by making few significant modifications on it. These recommending processes or the modifications are as follows: In order to resolve the issues encountered in the operations of the IT department, HBZS Mining Rescue Services should establish a well-organized as well as well-structured service catalogue. This particular tool can mitigate all of the four challenges associated with the ITIL adoption by the IT department of the organization. Dividing the IT department activities in accordance with the business activities as well as using the business terminology has made it understandable easily to the business. In addition, setting the review meetings of daily service can establish the invaluable channels of communication with the help of the establishment of the service catalogue within the ITIL framework. The organizational size is very much important while approaching the main strategic objective of HBZS Mining Rescue Services. Communication between the business as well as IT is a huge issue for each organization. However, it can be expected that it is more sensitive in the SMB like HBZS Mining Rescue Services to the relative maturity of both of the companys IT department as well as the organization. Hence, in this scenario, the establishment of the Continual Service Improvement Process can become significant to overcome this critical issue. HBZS Mining Rescue Services should work out an appropriate communication policy for the operational purposes or in case of the key incidents. In addition, HBZS Mining Rescue Services should keep simple all the strategies of the implementation ITIL framework of the IT department. On the other side, it should be written three times with an exclamation mark. The organization should not hesitate for cutting off anything that is rarely used as well as proves useless. Furthermore, most importantly, communication is the major bridge that can connect all of the activities of the IT department while adopting the ITIL framework. In order to complete the implementation of the ITIL framework, the IT department has to collect as well as share knowledge regarding the ITIL adoption. HBZS Mining Rescue Services should also publicize as well as celebrate the organizations achievements and successes in order to increase their popularity and reputation. The IT department of HBZS Mining Rescue Services should not be over creating while adopting ITIL. The organization should utilize all kinds of possible ways to accomplish the ITIL adoption without any hesitation. 7.2 Conclusion This particular report has successfully provided a view regarding the significant processes of ITIL adoption that can play an effective role in the IT operations of HBZS Mining Rescue Services. First of all, this report on the IT Service Management of HBZS Mining Rescue Services has clearly illustrated the further future improvements those are required over the IT service management at the organization. Thus, a conclusion has been drawn in this scenario that HBZS Mining Rescue Services have to essentially implement additional ITIL processes as well as have to make few crucial and important improvements over the processes of ITIL adoption. On the other hand, in the phase of the service transition can result in several operational issues in other firms. In order to avoid such issues, HBZS Mining Rescue Services have to follow few critical service transition processes which are greatly inter-related to the ITIL as well as the other processes of the organization. In addition, the major c oncern of HBZS Mining Rescue Services is to mitigate the current outsourcing problem. Therefore, this particular report has successfully conveyed all of the limitations as well as the benefits of the service desk which can then specify the way to resolve such issues of outsourcing. Moreover, the IT department of this particular organization has already moved from a technological viewpoint to the service viewpoint. thus, this report has successfully specified the process of establishing Continual Service Improvement Process. On the other hand, most importantly, this report has also shed light on the significance f the extended CSI process by fostering the Business-IT partnership at all the levels of HBZS Mining Rescue Services. Reference List Alexander, K., 2013.Facilities management: theory and practice. Routledge. Ali, S.M., Soomro, T.R. and Brohi, M.N., 2013. Mapping information technology infrastructure library with other information technology standards and best practices.Journal of Computer Science,9(9), p.1190. Barafort, B., Di Renzo, B. and Merlan, O., 2012. Benefits resulting from the combined use of ISO/IEC 15504 with the Information Technology Infrastructure Library (ITIL). InProduct Focused Software Process Improvement(pp. 314-325). Springer Berlin Heidelberg. Borghoff, U.M. and Pareschi, R. eds., 2013.Information technology for knowledge management. Springer Science Business Media. Case, G., 2014. ITIL v3. Continual Service Improvement.Office of Government Commerce. Chao, C.A. and Chandra, A., 2012. Impact of owner's knowledge of information technology (IT) on strategic alignment and IT adoption in US small firms.Journal of Small Business and Enterprise Development,19(1), pp.114-131. Chauhan, S., Raman, A. and Singh, N.P., 2013. A Comparative Cost Analysis of on Premises IT Infrastructure and Cloud-Based Email Services in an Indian Business School.International Journal of Cloud Applications and Computing (IJCAC),3(2), pp.21-34. Cots, S., Casadess, M. and Marimon, F., 2014. Benefits of ISO 20000 IT service management certification.Information Systems and e-Business Management, pp.1-18. Cox, D.S., 2013. Factors Influencing Adoption of Information Technology Infrastructure Library: Utilizing the Technology Acceptance Model (TAM).ProQuest LLC. Cyber Fox, s. (2016).OKD | OKD, HBZS, a. s.. [online] Okd.cz. Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013.ECAR study of undergraduate students and information technology. 2013. Davenport, T.H., 2013.Process innovation: reengineering work through information technology. Harvard Business Press. Fitzsimmons, J. and Fitzsimmons, M., 2013.Service management: Operations, strategy, information technology. McGraw-Hill Higher Education. Fitzsimmons, J. and Fitzsimmons, M., 2013.Service management: Operations, strategy, information technology. McGraw-Hill Higher Education Foster, I. and Kesselman, C. eds., 2013.The Grid 2: Blueprint for a new computing infrastructure. Elsevier. Galliers, R.D. and Leidner, D.E., 2014.Strategic information management: challenges and strategies in managing information systems. Routledge. Hesson, M., Soomro, T.R. and Geray, O., 2012. Role of Information Technology Infrastructure Library in E-Government. Iden, J. and Eikebrokk, T.R., 2014. Exploring the relationship between information technology infrastructure library and process management: theory development and empirical testing.Knowledge and Process Management,21(4), pp.292-306. Ionita, I. and Gordas, V., 2013. Impact of ISO/IEC 20000 Series Standards on Development of an IT Service Management System.Calitatea,14(134), p.75. Jntti, M. and Hotti, V., 2015. Defining the relationships between IT service management and IT service governance.Information Technology and Management, pp.1-10. Judy, M.S., 2013.Continual Service Improvement for mission and personal success(No. SAND2013-3555C). Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States). Lloyd, V., Wheeldon, D., Lacy, S. and Hanna, A., 2014.ITIL continual service improvement. Tso. Long, J.O., 2012. Continual Service Improvement. InITIL 2011 At a Glance(pp. 91-95). Springer New York. Luftman, J., 2014. Assessing business-IT alignment maturity.Strategies for information technology governance,4, p.99. Marchewka, J.T., 2014.Information technology project management. John Wiley Sons. Mesquida, A.L., Mas, A., Amengual, E. and Calvo-Manzano, J.A., 2012. IT Service Management Process Improvement based on ISO/IEC 15504: A systematic review.Information and Software Technology,54(3), pp.239-247. Nurfaizah, N., Utami, E. and Arief, M.R., 2015. Rancangan Information Technology Service Management Menggunakan Information Technology Infrastructure Library (Studi Kasus: STMIK AMIKOM Purwokerto).Telematika,8(2). Picard, M., Renault, A. and Barafort, B., 2015. A Maturity Model for ISO/IEC 20000-1 Based on the TIPA for ITIL Process Capability Assessment Model. InSystems, Software and Services Process Improvement(pp. 168-179). Springer International Publishing. Pinard, D., Evans, R. and Mankovskii, S., Mitel Corporation, 2012.Web based help desk. U.S. Patent 6,230,287. Probst, J., Case, G. and Elephant, P., 2013. Integrating Six Sigma and ITIL for continual service improvement. Rathnam, R.G., Johnsen, J. and Wen, H.J., 2015. Alignment of business strategy and IT strategy: a case study of a fortune 50 financial services company.Journal of Computer Information Systems,45(2), pp.1-8. Renault, A., Cortina, S. and Barafort, B., 2015. Towards a maturity model for ISO/IEC 20000-1 based on the TIPA for ITIL process capability assessment model. InSoftware Process Improvement and Capability Determination(pp. 188-200). Springer International Publishing. Santana Tapia, R.G., 2012.Assessing business-IT alignment in networked organizations. University of Twente. Schwalbe, K., 2015.Information technology project management. Cengage Learning. Schwalbe, K., 2015.Information technology project management. Cengage Learning. Suhairi, K. and Gaol, F.L., 2013. The Measurement of Optimization Performance of Managed Service Division with ITIL Framework using Statistical Process Control.Journal of Networks,8(3), pp.518-529. Taylor, S., Case, G. and Spalding, G., 2014.Continual service improvement. Stationery Office. Taylor, S., Case, G. and Spalding, G., 2015. ITIL: continual service improvement.Published by TSO (The Stationery Office). Vehvilinen, A., Hyvnen, E. and Alm, O., 2015. A semi-automatic semantic annotation and authoring tool for a library help desk service.Emerging Technologies for Semantic Work Environments: Techniques, Methods, and Applications, IGI Group, Hershey, USA. Willcocks, L., 2013.Information management: the evaluation of information systems investments. Springer.