IT Service Management Lifecycle: A Comprehensive Analysis

Verified

Added on  2025/09/03

|12
|3102
|92
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Contents
Introduction................................................................................................................................2
ITSM..........................................................................................................................................2
ITIL............................................................................................................................................2
Framework of ITIL and Governance.........................................................................................2
RISK...........................................................................................................................................2
Strategy of service......................................................................................................................3
Design of service........................................................................................................................3
Transition of Service..................................................................................................................3
Service Operation.......................................................................................................................4
Improvement of Service.............................................................................................................4
Management protocol for Business Relationship......................................................................5
Management of Financial Service..............................................................................................5
Management of Capacity...........................................................................................................5
Conclusion................................................................................................................................10
References................................................................................................................................11
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
This report analyses the work plan structure of lifecycle model. ITIL contains a huge process
and it is not necessary for organizations to implement whole framework. Transition is used to
overcome risk and errors and makes lifecycle better. By support of business relationship
application increase rate of the project satisfaction. This application is very helpful to
increase the growth rate of industry.
ITSM
This process is used by organizations and companies to increase business values by using
technologies. It refers to a process that is associated with different methods like planning,
designing, making, support and deals with the lifecycle process. ITSM includes following
sub-parts or process which comes under the ITSM.
Planning
Designing Protocols
Delivering of service
Operate with services
Controlling
ITIL
It is a type of framework which is used by the organizations. Using this framework provides
lots of business profits and benefits. ITIL contains a huge process and it is not necessary for
organizations to implement whole framework. They can use service which they want for their
organization. There are many frameworks of ITIL like COBIT and Microsoft framework. It is
a type of library that helps in improving ITSM process.
ITIL process is divided into many sub-parts which are following as:
Strategy of service
Design of service
Transition of service
Different operation of service
Improvement of service
The framework of ITIL and Governance
ITIL is worked as a key for establishing administration of IT. Mainly IT is a business of
administration and then selects administration of ITIL. There are many rules for this lifecycle
process.
RISK
It is an entity that is used to define any type of loss, damage or any type of threat which
comes in this process during the execution is known as risk. There are many types of risk
Document Page
which can affect this process. Sometimes risk is also known as hazard. This process also
affects the capacity by which targets are not achieved.
Strategy of service
This method is used to make the strategy for successful execution. This is initial step of
lifecycle process. There are 4 Ps of strategy method which is very important and helps in
achieving the goal.
4 Ps of the strategy of service are following as:
Perspective: This method is used to identify visions and specialist make rationality with
customers.
Position: This method is used to deal with administrative which includes high esteem.
Plan: This method is used to make a plan to make strategy. It also describes way uses by IT
specialists to deal with the process.
Pattern: This method is used to make any decision. This method is a reliable method.
These are 4 Ps of strategy method which helps strategy method.
Design of service
This phase is used to design the lifecycle process. The design phase is divided into many sub-
parts that describes the design process. Sub-parts include catalog, management of service, it
also manages the capacity, availability and IT security. All these parts are very crucial in the
design process. This process is achieved by all these sub-parts.
Parts of Design of Service
It is important to meet the business needs of the IT services.
Service intended is available for both fit for use and fit for reason.
It is also necessary to minimize the cost and time.
Design models and frameworks all these are also part of the design model.
Transition of Service
This method uses design and tests to achieve goal. It is used to overcome risk and errors and
makes lifecycle better. It also deploys products as per client needs. There is some objective of
this phase that describes why this phase is important in the lifecycle process. This method
increases satisfaction level of client. Because it delivers the product as per the client's need.
Sub-parts of the transition are following as:
Management changes
Evaluation of process
Planning of process
Deploy and development of service and products
Validation and testing of products
Knowledge management
Document Page
Service Operation
This method is used to deliver services to user as per the agreement. It is method where all
other types of processes are modeled. Strategy, transition, and design all these processes are
comes under operation of service. All the users are more friendly with this phase as compare
to the other phase. The operation of service is also is categorized into many sub-parts. All
these sub-parts are following as:
Event: This method is used by different types of events. This method all filter events.
Incident: This method deals with all incidents which are found in the lifecycle.
Manages the incidents.
Request: This method completes the request and needs of the client. It also manages
changes if necessary.
Access: This method is very crucial from the security point of view. Because it
opposes unauthorized access of any person. Allow to valid users.
Problem: This method is dealing with problems that come during the process and tries
to manage all these problems which are dangerous for the lifecycle process.
Control: This is a method that is used to deal with process of infrastructure. It also
manages IT operations as well and consist many other things like backup and restore
of data.
Application: This method is used to manages applications that are related to the
lifecycle process.
All these are the sub-parts of operation of service which helps in achieving all the points of
the lifecycle process. Mainly there are 4 balances of operations of service which are
following as:
1. Outside business vs Internal part of IT
2. Responsive vs stability
3. Administration cost vs Administration of Quality
4. Proactive vs Reactive
Improvement of Service
This method is used to manage improvements in the service lifecycle process. It also sees
provider performance and helps in improving infrastructure to get the goal with better quality.
Mainly this provides feedback and review to service and provides improvement if necessary.
It also helps in attain result on basis of client needs. It is considered as last phase of lifecycle
process. There are some sub-parts of improvement process which are following as:
Review: This phase is used to review service and infrastructure as well in regular
intervals. Due to this process quality of lifecycle process is increases and helps in
finding better results.
Evaluation: It is a process by the support of them find out working application of
service model. It is very useful to increase quality rate of the product.
Initiatives: This method is used to provide initiatives and improve services.
Monitoring: This phase is used in finding the improvements and verify improvements
according to needs and plans.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Management protocol for Business Relationship
It is a method for managing and finding the relationship between provider and client. By
support of business relationship application increase rate of the project satisfaction. In this
application find out the need for market or client and according to their requirement provide
work solution. The relationship of business management is very important tool for increasing
the productivity of business range. When association or organization follows the concept of
business relationship at that time rate on work management should be improved. There some
parts which come under business management which are following as:
Maintain relationship: This method is used to maintain the quality protocol in the
service. In this application provide suitable work relationship between provider and
client for find out business requirement.
Requirement: This phase is used in finding the needs of the client. It also provides
new services and products for the existing services.
It also provides different types of agreements.
Sometimes it takes feedback from the client and improves rate and quality of service
as per the client's needs.
It handles client complaints and provides a better solution.
Manage and keep full detail of all the services.
Management of Financial Service
It is the application by the support of them find out the financial application of any
organization. This application is very helpful to increase the growth rate of the industry.
When the organization fulfills clients' needs at that time the rate of financial services should
be very high. If the organization not fulfill the need of client in that time rate of financial
service growth should be decreased. This phase consists three parts which are charging,
budget and accounting.
Management of Capacity
Capacity management is the application by the support they find out the work capacity of the
organization. This application is very helpful in identifying rate of work capacity to fulfill the
need of client.
Management activity for IT services:
(1) Impact on the business process: The activity of management is the application by the
support of the level of administration for business administration should be increased. By the
support of the activity of management application work situation of business application
should be improved. Management activity provides and a path function by the support of
them need of the client and on the behalf of the client requirement provide the suitable work
solution.
Document Page
(2) Assessment broke: In this application analysis the recuperation process of work
management. When the appraisal of hard is including in the business application on that time
rate of quality assessment should be broken and generated products could not satisfy the need
of client (Zeng et al., 2015).
(3) Project Requirement: It is the application which finds out the requirement of the project.
With the support of the required protocol find the need for project planning and on the behalf
of project application provide the suitable path function which improves the work quality.
(4) Plan recovery: Plan recovery is the plan of server backup. When the organization
provide a suitable work plan and work application is not full fill the requirement of a client at
that time by the use of the plan recovery application provides an alternative way to manage
the business application.
Management of data security:
Management of data security is a very important application in the organization by the
support of them increases the range of security parameters. For the management of data
security applications use the planning, overseeing, keeping and holding application to
increase the security application.
The key factor of management of data security application:
(1) Work control: Work control is the application by the support of them identifies the
policy of information security and finds the assigned duty for security protocol. In this
application find out the documentation function by the use of them increase the rate of
security application (Altamony et al., 2016).
(2) Plan: Plan is the time parameter of security application. By the support of the security
plan protocol increase the understanding of security for the association. All the security
activity is measured by the support of the culture of security application.
(3) Work Implement: Change in the implement of the security application is the concept by
the support of the rate of security implementation increase the work structure of the
association.
(4) Evaluation: Security evaluation is the framework by which the use of them provides a
secure path function to analysis the work report. SLA provides a procedure with the support
of them the working strategy of the security application should be improved.
Document Page
(5) Security maintains: Security maintains is the application by the support improve the
range of security function for the work application. According to the parameter of SLA
provide a suitable understanding of security application (Dudin et al., 2017).
Executives Issues
It is part of the procedure arrangement with the help of them improves the life cycle of
administration of IT. For the protocol of objective fundamental analyzed the object of issues
for increasing the work performance.
Procedure Issues:
(1) Issue of Reactive: In this application find the center of activity for the administration of a
piece to justify the follow-up.
(2) Issue of Proactive: In this application determines the natural flag to improve the security
application. All the security imagination process is included in the issue of proactive
application.
Process of improvement
(1) Development of methodology: Methodology of development is the process in which find
out the rate of improvement.
(2) Estimate Define: Estimate defines is the protocol by the use of them increases the perfect
gauge for the midst protocol. The plan of the estimate totally depends on the rate of
development.
(3) Gain information fundamental: In this application observing the data by the support of
them create the new innovation for the procedure application.
(4) Information Process: The information process is the parameter by the support of them
represents the data result for the workout and improves the performance level of the structure.
Data of information protocol is key by the use of them represent the result through the work
structure (Schmidt et al., 2019).
(5) Information and data analysis: Learning of data information is the protocol by the
support of them the concept of business discovers should be improved. Through the support
of the outer and inner elements analysis the information protocol to increase the business
application.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
(6) Introduction of data uses: It is the application in which understanding the tool of data to
increase the security application. Leadership is the perfect way by which the support of them
examines the understanding of business process (Hornstein et al., 2015).
(7) Enhancement Implementation: It is part of the improvement of business applications.
By the support of the information application work experience of the business process should
be improved.
The cycle of Deming: Cycle of Deming is the process of improvement of a quality
application. In this application conceder those working models by the support of the quality
of the project application should be improved. Work planning, Do work check and
application action is the part of the cycle of Deming.
Work progress of Deming cycle:
(1) Work Plan: In this application prepare an idea to complete the work project.
(2) Do: In this protocol analysis the action plan is conceded to gain the work output result.
(3) Study or check: Check the resulting outcome which is full-fill the need of the client or
satisfy the market demand.
Improvement Procedure functions: Improvement rate of the Deming cycle is the
application by the support of the analysis of the quality application for the work project.
Improvement in continuous structure: In this application find out the forward protocol for
improvement application. The objective entryway is analysis the rate of improvement for
manage the high-quality application (Molina-Azorin et al., 2015).
Undertaking implementation: Undertaking implementation is the test protocol by the
support of them finds out the instrument of the Deming cycle to improve the quality
application. With the support of the execution application increase the level of quality in the
association.
Process application: For the cycle of Deming application analysis the process of consistency
for all cases of a quality application.
Management of change: Management of change is the application by the use of them
improves the quality application for the project. In this process on the behalf of the
requirement of project analysis the working model. Parameter of change application is the
Document Page
segment by the use of them the quality of work application should be improved. Work
planning and action work is the model that is the cause of improvement application. By the
support of the execution process analysis the rate of quality function for the association
(Dudin et al., 2015).
Management of Quality: Management of quality is the application by the support of them
increases the satisfaction rate of the client. Quality is the basic need of the project. When the
association provides an effective range of quality applications on that time rate of market
benefits should be improved. Improvement of quality is a factor by the support of their
framework of work application should be improved. Management of total quality and six
sigma applications create a path function by the support of them increase the rate of work
quality application.
Document Page
Conclusion
Security evaluation is the framework by which the use of them provides a secure path
function to analysis the work report. By the support of security plan protocol increase the
understanding of security for the association. Parameter of change application is the segment
by the use of them the quality of work application should be improved. When the association
provides an effective range of quality applications on that time rate of market benefits should
be improved. Through the support of the outer and inner elements analysis the information
protocol to increase the business application.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Altamony, H., Al-Salti, Z., Gharaibeh, A., & Elyas, T. (2016). The relationship between
change management strategy and successful enterprise resource planning (ERP)
implementations: A theoretical perspective. International Journal of Business Management
and Economic Research, 7(4), 690-703.
Dudin, M. N., Smirnova, O. O., Vysotskaya, N. V., Frolova, E. E., & Vilkova, N. G. (2017).
The Deming cycle (PDCA) concept as a tool for the transition to the innovative path of the
continuous quality improvement in production processes of the agro-industrial
sector. European Research Studies, 20(2), 283.
Dudin, M., Frolova, E., Gryzunova, N., & Shuvalova, E. (2015). The Deming Cycle (PDCA)
concept as an efficient tool for continuous quality improvement in the agribusiness. Asian
Social Science, 11(1), 239-246.
Hornstein, H. A. (2015). The integration of project management and organizational change
management is now a necessity. International Journal of Project Management, 33(2), 291-
298.
Molina-Azorin, J. F., Tarí, J. J., Pereira-Moliner, J., Lopez-Gamero, M. D., & Pertusa-Ortega,
E. M. (2015). The effects of quality and environmental management on competitive
advantage: A mixed methods study in the hotel industry. Tourism Management, 50, 41-54.
Schmidt, H. (2019). Explosive precursor safety: An application of the Deming Cycle for
continuous improvement. Journal of Chemical Health and Safety, 26(1), 31-36.
Zeng, J., Phan, C. A., & Matsui, Y. (2015). The impact of hard and soft quality management
on quality and innovation performance: An empirical study. International journal of
production economics, 162, 216-226.
Eikebrokk, T. R., & Iden, J. (2017). Strategising IT service management through ITIL
implementation: model and empirical test. Total Quality Management & Business
Excellence, 28(3-4), 238-265.
Eikebrokk, T. R., & Iden, J. (2017). Strategising IT service management through ITIL
implementation: model and empirical test. Total Quality Management & Business
Excellence, 28(3-4), 238-265.
Document Page
Jäntti, M., & Hotti, V. (2016). Defining the relationships between IT service management and
IT service governance. Information Technology and Management, 17(2), 141-150.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]