Applying IT services business relationship management on security outsource company

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Most outsource security companies have not implemented information technology optimally. A company must implement information technology that is oriented to customers and stakeholders to be competitive. Outsourcing security companies need to apply a systematic approach for managing customer-oriented services. In this study, we implemented business relationship management based on Information Technology Infrastructure Library (ITIL) framework to develop a service strategy, especially for an outsourced security company. There are 5 stages of activities carried out, namely identifying stakeholders, defining business outcomes, establishing strategic and funding requirements, defining business cases, and validating business activity patterns. Verification and revision of customer requirement analysis are performed to validate and evaluate the results. The result of implementing business relationship management is the recommendations of four IT services that suits the organization. The four IT service recommendations are websites, CRM services, monitoring services, and ordering services. Business case documents for each service have been created to identify business impacts and risks.

Original languageEnglish
Title of host publicationProceedings - 2018 5th International Conference on Electrical Engineering Computer Science and Informatics, EECSI 2018
EditorsDeris Stiawan, Imam Much Ibnu Subroto, Munawar A. Riyadi, Christian Sri Kusuma Aditya, Zulfatman Has, Anton Yudhana, Agus Eko Minarno
PublisherInstitute of Advanced Engineering and Science
Pages426-431
Number of pages6
ISBN (Electronic)9781538684023
DOIs
Publication statusPublished - Oct 2018
Event5th International Conference on Electrical Engineering Computer Science and Informatics, EECSI 2018 - Malang, Indonesia
Duration: 16 Oct 201818 Oct 2018

Publication series

NameInternational Conference on Electrical Engineering, Computer Science and Informatics (EECSI)
Volume2018-October
ISSN (Print)2407-439X

Conference

Conference5th International Conference on Electrical Engineering Computer Science and Informatics, EECSI 2018
Country/TerritoryIndonesia
CityMalang
Period16/10/1818/10/18

Keywords

  • Customer requirements analysis
  • IT service strategy
  • ITIL framework
  • Relationship management
  • Service strategy

Fingerprint

Dive into the research topics of 'Applying IT services business relationship management on security outsource company'. Together they form a unique fingerprint.

Cite this