LINKING ITIL WITH OUTSOURCE SERVICES ROKHSAREH MOBARHAN UNIVERSITI TEKNOLOGI MALAYSIA

Similar documents
A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

PROBLEMS ASSOCIATED WITH EVALUATION OF EXTENSION OF TIME (EOT) CLAIM IN GOVERNMENT PROJECTS

ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

AN INTEGRATED SERVICE ARCHITECTURE FRAMEWORK FOR INFORMATION TECHNOLOGY SERVICE MANAGEMENT AND ENTERPRISE ARCHITECTURE

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

DEVELOPMENT OF SPAKE S MAINTENANCE MODULE FOR MINISTRY OF DEFENCE MALAYSIA SYED ARDI BIN SYED YAHYA KAMAL UNIVERSITI TEKNOLOGI MALAYSIA

SLANTING EDGE METHOD FOR MODULATION TRANSFER FUNCTION COMPUTATION OF X-RAY SYSTEM FARHANK SABER BRAIM UNIVERSITI TEKNOLOGI MALAYSIA

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

MULTICHANNEL ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING -ROF FOR WIRELESS ACCESS NETWORK MOHD JIMMY BIN ISMAIL

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

This item is protected by original copyright

ENHANCING WEB SERVICE SELECTION USING ENHANCED FILTERING MODEL AJAO, TAJUDEEN ADEYEMI

CAMERA CALIBRATION FOR UNMANNED AERIAL VEHICLE MAPPING AHMAD RAZALI BIN YUSOFF

ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA

MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

Goals for Today s Presentation

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

OPTIMIZED BURST ASSEMBLY ALGORITHM FOR MULTI-RANKED TRAFFIC OVER OPTICAL BURST SWITCHING NETWORK OLA MAALI MOUSTAFA AHMED SAIFELDEEN

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

LINK QUALITY AWARE ROUTING ALGORITHM IN MOBILE WIRELESS SENSOR NETWORKS RIBWAR BAKHTYAR IBRAHIM UNIVERSITI TEKNOLOGI MALAYSIA

CLOUD COMPUTING ADOPTION IN BANKING SYSTEM (UTM) IN TERMS OF CUSTOMERS PERSPECTIVES SHAHLA ASADI

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN


San Francisco Chapter. Cassius Downs Network Edge LLC

THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE

ADAPTIVE LOOK-AHEAD ROUTING FOR LOW LATENCY NETWORK ON-CHIP NADERA NAJIB QAID AL AREQI UNIVERSITI TEKNOLOGI MALAYSIA

MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING

HIGH SPEED SIX OPERANDS 16-BITS CARRY SAVE ADDER AWATIF BINTI HASHIM

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

ARM PROCESSOR EMULATOR MOHAMAD HASRUZAIRIN B MOHD HASHIM

1. You should attempt all 40 questions. Each question is worth one mark.

TRUSTED CLOUD COMPUTING FRAMEWORK IN CRITICAL INDUSTRIAL APPLICATION MERVAT ADIB BAMIAH UNIVERSITI TEKNOLOGI MALAYSIA

AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA

ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

DYNAMIC TIMESLOT ALLOCATION TECHNIQUE FOR WIRELESS SENSOR NETWORK OON ERIXNO

HARDWARE-ACCELERATED LOCALIZATION FOR AUTOMATED LICENSE PLATE RECOGNITION SYSTEM CHIN TECK LOONG UNIVERSITI TEKNOLOGI MALAYSIA

BORANG PENGESAHAN STATUS TESIS

FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA

MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR

PORTABLE ELECTRONICS QUEUE CONTROL SYSTEM WONG CHUN YUAN UNIVERSITY MALAYSIA PAHANG

COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI

UNSTEADY AERODYNAMIC WAKE OF HELICOPTER MAIN-ROTOR-HUB ASSEMBLY ISKANDAR SHAH BIN ISHAK UNIVERSITI TEKNOLOGI MALAYSIA

RECOGNITION OF PARTIALLY OCCLUDED OBJECTS IN 2D IMAGES ALMUASHI MOHAMMED ALI UNIVERSITI TEKNOLOGI MALAYSIA

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA

DYNAMIC TIMETABLE GENERATOR USING PARTICLE SWARM OPTIMIZATION (PSO) METHOD TEH YUNG CHUEN UNIVERSITY MALAYSIA PAHANG

VIRTUAL PRIVATE NETWORK: ARCHITECTURE AND IMPLEMENTATIONS

The ITIL v.3. Foundation Examination

Contents. List of figures. List of tables. 5 Managing people through service transitions 197. Preface. Acknowledgements.

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA

Integrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta

DESIGN AND IMPLEMENTATION OF A MUSIC BOX USING FPGA TAN KIAN YIAK

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

RESOURCE ALLOCATION SCHEME FOR FUTURE USER-CENTRIC WIRELESS NETWORK WAHEEDA JABBAR UNIVERSITI TEKNOLOGI MALAYSIA

DYNAMIC MOBILE SERVER FOR LIVE CASTING APPLICATIONS MUHAMMAD SAZALI BIN HISHAM UNIVERSITI TEKNOLOGI MALAYSIA

WEB MANAGEMENT SYSTEM FOR SERIOUS GAME IN INTERNAL MEDICAL PRACTICE. Phoon Wei Yin

SSME Master Class Part VI Applying SSME & the IT Service Curriculum for ICT Service Management

Implementing ITIL v3 Service Lifecycle

SOLUTION AND INTERPOLATION OF ONE-DIMENSIONAL HEAT EQUATION BY USING CRANK-NICOLSON, CUBIC SPLINE AND CUBIC B-SPLINE WAN KHADIJAH BINTI WAN SULAIMAN

ITIL: The Key Differences Between Versions 2 and 3

"Charting the Course... ITIL 2011 Service Offerings & Agreement (SOA) Certification Program. Course Summary

THESIS PROJECT ARCHIVE SYSTEM (T-PAS) SHAHRUL NAZMI BIN ISMAIL

SMART AQUARJUM (A UTOMATIC FEEDING MACHINE) SY AFINAZ ZURJATI BINTI BAHARUDDIN

MAGNETIC FLUX LEAKAGE SYSTEM FOR WIRE ROPE INSPECTION USING BLUETOOTH COMMUNICATION MUHAMMAD MAHFUZ BIN SALEHHON UNIVERSITI TEKNOLOGI MALAYSIA

ITIL 2011 Overview - 1 Day (English and French)

An Executive Overview of ITIL v3

AUTOMATIC RAILWAY GATE CONTROLLERUSING ZIGBEE NURLIYANA HAZIRAH BINTI MOHD SAFEE (B )

REPORT 2015/149 INTERNAL AUDIT DIVISION

SUPERVISOR VERIFICATION

ISO/ IEC (ITSM) Certification Roadmap

TUITION CENTRE MANAGEMENT SYSTEM (TCMS) ZARIFAH BINTI MOHD PAHMI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

ITIL Foundation Program Certification Program. The Minimum number of students per session is 6 where the maximum is 25.

Signature : IHSAN BIN AHMAD ZUBIR. Date : 30 November 2007

COMPARISON STUDY OF NEXT GENERATION FTTH PON ARCHITECTURES MOHAMED ELMAGZOUB ABDALLA ZEINELABDIN

ITIL Foundation Exam Study Guide

Introduction... 1 Part I: How ITIL Can Help You... 7

EXIN Expert in IT Service Management based on ISO/IEC Preparation Guide

UNIVERSITI PUTRA MALAYSIA CLASSIFICATION SYSTEM FOR HEART DISEASE USING BAYESIAN CLASSIFIER

Ric Mims, itsmf Houston LIG and HDI Houston

AUTOMATIC DETECTION TEMPERATURE TRANSMITTER FOR CALIBRATION PROCESS USING THERMOCOUPLE MUHAMAD FARID BIN A.WAHAB

Module 6: Functions. ITIL Foundation v V1. Reader s Note QAI India Ltd. I

Using ITIL to Measure Your BCP

Don t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL

Transcription:

LINKING ITIL WITH OUTSOURCE SERVICES ROKHSAREH MOBARHAN UNIVERSITI TEKNOLOGI MALAYSIA

LINKING ITIL WITH OUTSOURCE SERVICES CASE STUDY: CENTER OF INFORMATION COMMUNICATION TECHNOLOGY IN UTM ROKHSAREH MOBARHAN A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Science (Information Technology Management) Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia NOVEMBER 2009

iii To my beloved husband and family for their encouragement, support and pray

iv ACKNOWLEDGEMENT In the name of Allah, Most Gracious, Most Merciful. First and foremost I am grateful to ALLAH on His blessing in completing this thesis. I wish to express my sincere appreciation to my supervisor, Assoc. Prof. Dr. Azizah Abdul Rahman for encouragement, precious guidance and critics. Without her continued support and interest, this thesis would not have been the same as presented here, and also to the staffs of CICT, for their valuable feedback. I would also like to thank to all my family members for their prayers and all their supports and encouragements. My gratitude also goes to my beloved and wonderful husband, thank you for the encouragement, for being my inspiration, for the understanding you have given to me and most importantly, for your endless love. I thank you all.

v ABSTRACT The arrival of the Internet and the rush to e-commerce has seen many companies look to outside vendors to supply necessary skills and competencies, as these are often not available in-house. Many large organizations are increasingly outsourcing their IT functions. Factors like lower costs, improved productivity, higher quality, higher customer satisfaction, and ability to focus on core areas are some of the benefits of outsourcing. However, there are many challenges and problems associated with IT outsourcing. As a strategic resource, outsourcing must be governed accordingly to mitigating the problems. In this project, I identify the main problems and challenges related to IT outsourcing. In addition, we delve into some important issues on IT outsourcing, particularly the challenges along with benefits. IT Infrastructure Library (ITIL ) delivers framework by providing best practices that provide governance on delivering quality, cost effective, and efficient IT services. So ITIL V3 will be used as a solution in this project. ITIL can be served as a framework for managing the relationship with an outsourcing service provider. This study will help the management to identify the problems and take the necessary remedial steps. In this project, a framework will be suggested that is arisen from the ITIL V3 framework for managing the outsourcing projects and there are some activities and suggestion to implementing each process.

vi ABSTRAK Kemunculan internet dan e-dagang telah menyebabkan kebanyakan syarikat mencari pembekal luar untuk membekal kemahiran dan kompetensi yang diperlukan, Hal ini demikian kerana ia tidak didapati di rumah. Banyak organisasi besar semakin mengembangkan fungsi IT mereka kepada subkontraktor IT. Faktor-faktor seperti kos yang lebih rendah, produktiviti yang semakin meningkat, kualiti yang lebih tinggi, kepuasan pelanggan yang semakin tinggi, dan kemampuan untuk fokus pada bidang utama adalah beberapa manfaat kepada subkontraktor IT. Namun, terdapat banyak cabaran dan masalah yang berkaitan dengan subkontraktor IT. Sebagai sumber strategi, subkontraktor harus diatur dengan bijak untuk mengurangkan masalah. Dalam projek ini, saya telah mengenalpasti masalah dan cabaran utama yang berkaitan dengan subkontraktor IT. Selain itu, saya juga telah mengkaji beberapa isu penting khususnya cabaran dan faedah subkontraktor IT. IT Infrastructure Library (ITIL ) menyampaikan rangka kerja dengan menyediakan amalan-amalan terbaik yang memberi kerajaan penyampaian terbaik, kos yang efektif dan perkhidmatan IT yang berkesan. ITIL V3 digunakan sebagai penyelesaian dalam projek ini. ITIL boleh dijadikan sebagai rangka kerja untuk menguruskan hubungan dengan pembekal perkhidmatan subkontraktor. Kajian ini akan membantu bahagian pengurusan untuk mengenalpasti masalah dan mengambil langkah-langkah pembaikan yang diperlukan. Dalam projek ini, sebuah rangka kerja dihasilkan dengan menggunakan ITIL V3 untuk menguruskan projek-projek subkontraktor dan beberapa saranan untuk aktiviti dan cadangan pelaksanaan masing-masing.

vii TABLE OF CONTENT CHAPTER TITLE PAGE TITLE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS LIST OF APPENDICES i ii iii iv v vi vii xi xii xiv xv 1 PROJECT OVERVIEW 1 1.1 Introduction 1 1.2 Background of the problem 3 1.3 Statement of the problem 4 1.4 Project Objectives 5 1.5 Scope of the project 5 1.6 Importance of the project 6 1.7 Chapter Summary 7

viii 2 LITERATURE REVIEW 8 2.1 Introduction 8 2.2 Outsourcing 10 2.2.1 Definition of Outsourcing 11 2.2.2 Types of Outsourcing 12 2.2.3 Software Development 14 2.2.3.1 Software development life cycle (SDLC) 14 2.2.3.1.1 Planning Stage 15 2.2.3.1.2 Requirements definition Stage 16 2.2.3.1.3 Design Stage 17 2.2.3.1.4 Development Stage 19 2.2.3.1.5 Integration and test Stage 20 2.2.3.1.6 Installation and Acceptance Stage 21 2.2.3.2 Software development Outsourcing (SDO) 23 2.2.4 Steps of Outsourcing 24 2.2.5 Advantages of Outsourcing 32 2.2.6 Disadvantages of Outsourcing 35 2.2.7 Case study 37 2.2.7.1 Duct layout industry 37 2.2.7.2 Contact Advocate 40 2.2.8 Outsourcing Governance 42 2.3 IT Governance 45 2.3.1 Definition of IT Governance 47 2.3.2 IT Governance Focus Areas 51 2.3.3 IT Governance Frameworks 53 2.4 IT Infrastructure Library 56 2.4.1 ITIL Benefits 58 2.4.2 ITIL Evolution 60 2.4.2.1 ITIL V2 vs. V3 61 2.4.2.2 ITIL V3 books 62 2.4.2.2.1 Service Strategy 65 2.4.2.2.2 Service Design 67 2.4.2.2.3 Service Transition 71 2.4.2.2.4 Service Operation 74

ix 2.4.2.2.5 Continual Service Improvement 77 2.5 Chapter Summary 82 3 METHODOLOGY 83 3.1 Introduction 83 3.2 Project Methodology 84 3.2.1 Initial Planning Phase 86 3.2.2 Analysis 86 3.2.2.1 Literature Review 86 3.2.2.2 Identifying CICT problems 87 3.2.3 Develop a Proposed Framework 89 3.3 Chapter Summary 89 4 INITIAL FINDINGS 90 4.1 Introduction 90 4.2 Organizational Analysis 91 4.2.1 CICT Mission, Vision and Objectives 92 4.2.2 CICT Organizational Structure 93 4.3 Questionnaire and Interview Analysis 94 4.4 suitable component of ITIL for outsourcing 99 4.5 general proposed framework 102 4.6 Chapter summary 103 5 FRAMEWORK REFINEMENT 104 5.1 Introduction 104 5.2 Proposed framework design 105 5.2.1 ITIL Implementation Framework 105 5.2.1.1 Phase 1 106 5.2.1.2 Phase 2 107 5.2.1.3 Phase 3 109

x 5.2.1.4 Phase 4 111 5.2.2 Framework implementation roadmap 111 5.2.2.1 Incident Management Process 114 5.2.2.2 Problem Management Process 117 5.2.2.3 Financial Management Process 118 5.2.2.4 Service level management 120 5.2.2.5 Change management 122 5.2.2.6 Supplier management 125 5.2.2.7 Information Security Management 127 5.2.2.8 Service Evaluation 129 5.3 OMF Implementation Project Organizational Structure 132 5.3.1 Implementation team and groups 132 5.3.1.1 Steering Group 132 5.3.1.2 ITIL Implementation Project Manager 133 5.3.1.3 Implementation Teams 134 5.3.2 Framework Applying Steps 134 5.4 Framework verification 136 5.5 Framework Finalization 136 5.5.1 Risk Management 137 5.6 Chapter Summary 141 6 DISCUSSION AND CONCLUSION 142 6.1 Achievements 142 6.2 Constraints and Challenges 143 6.3 Recommendations 144 6.4 Chapter Summary 145 REFERENCES 146 APPENDICES A-E 151-167

xi LIST OF TABLES TABLE NO. TITLE PAGE 2.1 Definitions of IT governance 49 2.2 ITIL V3 processes and sub processes 80 4.1 Summary of interview analyzing 98 4.2 ITIL V3 processes regarding outsourcing 100 5.1 benefits of the framework processes for CICT 130

xii LIST OF FIGURES FIGURE NO. TITLE PAGE 2.1 Literature Review Framework 9 2.2 Outsourcing 12 2.3 SDLC Stages 15 2.4 Input and output of planning stage 16 2.5 Input and output of requirements definition stage 17 2.6 Input and output of Design stage 18 2.7 Input and output of Development stage 19 2.8 Input and output of Integration and Test stage 21 2.9 Input and output of installation and acceptance stage 22 2.10 Steps of Outsourcing 26 2.11 Outsourcing challenges 43 2.12 Key Aspects of Outsourcing Governance 44 2.13 Evolution of the IT Function within organizations 45 2.14 IT Governance objectives 50 2.15 Focus areas of IT Governance 51 2.16 The service lifecycle 62 2.17 Key links, inputs & outputs of the service lifecycle 64 2.18 Service Design 68 2.19 Service Transition 72 2.20 Service Operation 75

xiii 2.21 Continual Service Improvements 78 3.1 Project Methodology Framework 85 4.1 CICT Organizational Chart 94 4.2 general proposed framework 102 5.1 Outsourcing Management Framework 106 5.2 Framework implementation roadmap 112 5.3 suggested Incident/Problem Report Form 116 5.4 Framework implementation Steps 135 5.5 Finalized OM Framework for CICT 139 5.6 OMF for software Development Projects 140

xiv LIST OF ABBREVIATIONS CCTA Central Computer and Telecommunications Agency CMM Capability Maturity Model COBIT Control Objectives for Information and Related Technology CSI Continual Service Improvement DSL Definitive Software Library EDA Exploratory Data Analysis IACEP Informational and Analytical Centre of Environmental Protection ITGI Information Technology Governance Institute ITIL IT Infrastructure Library ITSCM Information Technology Service Continuity Management OGC Office of Government Commerce OLA Operating Level Agreement RFC Request for Change ROI Return on Investment SDO Software Development Outsourcing SLA Service Level Agreement SLM Service Level Management SQP Service Quality Plan OMF _ Outsourcing Management Framework

xv LIST OF APPENDICES APPENDIX TITLE PAGE A Interview Questions 151 B Questionnaire 152 C UTM Suggested List 155 D Suggested SLA Template 156 E Acceptance Test for OM Framework 162

CHAPTER 1 PROJECT OVERVIEW 1.1 Introduction In recent years Information Technology has become an inseparable part of every organizations and the existence of an organization crucially depends on the effective application of IT. With the emergence of e-commerce, the use of technology is becoming just an accepted, indeed expected way of conducting business and also a way of creating new opportunities that provide them with a source of competitive advantage [1]. The arrival of the Internet and the rush to e-commerce has seen many companies look to outside vendors to supply necessary skills and competencies, as these are often not available in-house. Because developing e-commerce applications can place great demands on companies, and managers often conclude that the only

2 way to meet short deadlines for new technology projects is to contract for specialist services [1]. However, the challenges for IT managers are to co-ordinate and work in partnership with the business to deliver high quality IT services [43]. Due to enhanced focus on the customer in the planning, development and delivery of information services, IT service management (ITSM) has become increasingly important. ITSM strives to the better alignment of IT efforts to business needs and to manage the efficient providing of IT services with guaranteed quality [54]. There are some mechanisms for implementing Information Technology Governance like COBIT, ITIL, Six Sigma, and CMM, CMMI. In this trend towards embracing principles of organizational IT Service Management, the IT Infrastructure Library (ITIL) has become the worldwide de facto standard in Service Management. It is a set of books describing IT management processes and practices [45]. Globally, most of the IT organizations are currently focused on using ITIL to implement and improving IT Support and Delivery processes.

3 1.2 Background of the problem In today s global economy, outsourcing has become a very common phenomenon. Many large organizations have outsourced some or all of their IT functions. Factors like lower costs, improved productivity, higher quality, higher customer satisfaction, time to market, and ability to focus on core areas are some of the benefits of outsourcing [2]. However, there are many challenges and risks associated with outsourcing like Management challenges, Cultural/language communication risks, Security risks, Knowledge transfer challenges, loss of flexibility in reacting to changing business conditions, lack of customer focus, contractual misunderstandings, Hidden costs, and maintaining outsourcing relationships[2]. The Centre for Information and Communication Technology (CICT) in UTM is responsible for ensuring that staffs and students have access to teaching, learning and research resources by providing the University's IT infrastructure, acquiring, developing and supporting new and emerging technologies and systems, and providing access to millions of digital resources across the University's campuses. The vision of CICT is to become the source of quality and innovative ICT services towards achieving the University's aspirations. It had and has many programs for achieving these goals and objectives, such as Human Resource System, Finance System, Document Management, Enterprise Portal, Smart Card System, Business Intelligent and others. CICT uses outsourcing for some of these projects. In spite of many advantages that outsourcing brought for them, they are facing some problems like misunderstanding, quality, cost problems.

4 According to the cited problems, it is so important to have a well managed plan for outsourcing actions. Furthermore ITIL is not only an effective tool for managing internal IT processes. It can also serve as a framework for managing the relationship with an outsourcing service provider. 1.3 Statement of the Problem This research attempts to find the answers to some problems related to: i. What is CICT situation and its problem when conducting with the software development outsourcing projects? ii. What are the elements in ITIL v3 framework that are suitable for this case study? iii. How to best manage software development outsourcing projects? iv. How ITIL can be used to manage CICT outsourcing projects? In this research is intended to use a relevant research methodology to analyze the data that will be gathered and arrive with the suggestions for the improvement that can benefit the organization, which would enhance outsourcing management performance.

5 1.4 Project Objectives This project will focus on the following five objectives: i. To identify challenges and problems those arise during outsourcing project. ii. To understand the CICT situation and its problem when conducting with the outsourcing, especially software development outsourcing projects. iii. To analyze of how a manager can manage and supervise outsourcing projects and give some suggestions which arise from ITIL methodology. iv. To determine elements in ITIL v3 those are suitable for adapting to CICT to manage the outsourcing projects. v. To propose a framework towards the adoption or adaptation of ITIL for the Software Development Outsourcing Projects. 1.5 Scope of the project This study will concentrate on the Outsourcing projects, especially software development outsourcing, it s conducting problems and challenges, and as a case study CICT will be analyzed. In this project, Information Technology Infrastructure Library (ITIL) will be used for solving the problems associated with outsourcing, so it will cover an overall view of ITIL V3 Framework and it component.

6 1.6 Importance of the project When someone decided to use outsourcing services, it is imperative to: Select the right partner Identify issues related to outsourced project management. Improve outsourcing management issues Furthermore, it is important to understand the: Security during outsourcing Relationship with the outsourcer Relevant risks Process used for development a contract To ensure the success of outsourcing, the client and provider are required to confront some critical challenges. The outsourcings should be govern to control and mitigate the risks and to ensure that the outsourcing deliver value to the organization [63]. So, this research project will significantly focus on find the problems of outsourcing and try to give some solutions using ITIL framework. In other words, it will try to implement the ITIL framework for managing the software development outsourcing projects. The main aim of this project is to propose a framework for governing the Software Development Outsourcing.

7 1.7 Chapter Summary Introduction of the research project, background of the problem, statement of the problem, problem objectives, and scope of the project was identified in this chapter.