1 |
Shin, Sung-Jin, Sung-Yul Rhew, and Yoo-Ri Kim. "A case study on selection and improvement of sla evaluation metrics." The KIPS Transactions: PartD 16.4, pp.541-548, Aug. 2009
|
2 |
Rhew, Sung-Yul, Sung-Jin Shin, and Yoo-Ri Kim. "A Study on Selection and Improvement of SLA Evaluation Metrics Using IT Maturity Model." Journal of Information Technology Services 8.4, pp141-150, Dec. 2009
|
3 |
National Information Society Agency. "The Operation Management Guideline of Information System", 2005
|
4 |
Jo, Yeon-ho, et al. "A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions." Journal of the Korea Institute of Information Security & Cryptology, 25(4), pp905-914, Aug. 2015
DOI
|
5 |
Choi, Yun-Ho. "A IT Service Management Performance Model Based on Val IT for IT Governance." Proceedings of the Korea Information Processing Society Conference. Korea Information Processing Society, pp.1724-1727, Nov. 2012
|
6 |
KISA, "Development of efficient operation plan of security SLA for security service." pp.99-145. 2010
|
7 |
Lee, E. J. "A Study on the Operation of ITSM for Small Scale IT Department." Journal of Human Computer Interaction 2011.1 (2011): 12-13.
|
8 |
Kim, Dong-Soo, and Hee-Wan Kim. "A Study on the Audit Model of Outsourcing Operation based on Availability Metrics in perspective of Service Level Agreenment." Journal of digital convergence 13.7, pp.183-196, Jul. 2015
DOI
|
9 |
Claire Agutter. "ITIL Essentials Foundation Essentials ITIL 4 Edition", ITIL, 2020
|
10 |
Kang, Un-Sik, Kyoung-Han Bae, and Hyun-Soo Kim. "A Cost Optimization Model of IT Operation Service by Improving Service Request Management Process." Journal of Information Technology Services 6.3, pp.87-110, Dev. 2007
|
11 |
Park, Chul-Han, Sang-Soo Kim, and Hoh In. "A Selection Methodology for SLA Evaluation Factors with End-user Perspective." Proceedings of the Korea Information Processing Society Conference. Korea Information Processing Society, pp.495-498, Nov. 2006
|
12 |
Sim, Hyun-bo. "From Information Security To Syber Security." RESEAT Monitoring Report, 2012.
|
13 |
Lee, Byoung-Chol, and SungYul Rhew. "The Maintenance Cost Estimation Model for Information System Maintenance Based on the Operation, Management and Service Metrics." Journal of The Korea Society of Computer and Information 18(5), pp.77-85, May. 2013
DOI
|
14 |
Hwang Kyung-tae and Nam Gi-chan."Foundation of IT Service Management Based on ITIL V3", 2008
|
15 |
Park, WonIl, and MyongSoon Park. "Cloud computing billing system associated with SLA." Proceeding of Korea Computer Congress 2013, pp.854-855, Jun. 2013
|
16 |
Standard, Australian. "ISO/IEC27002." Information technology-security techniques-code of practice for information security controls,(AS ISO/IEC 27002: 2015). 2015.
|
17 |
ITIL, "Service Support", The Stationery Office, 2001
|
18 |
ITIL, "Service Delivery", The Stationery Office, 2001
|