Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.4.763

Case Study Plan for Information Security SLA Performance System in Public Sector  

Jeong, Jae Ho (Korea University)
Kim, Huy Kang (Korea University)
Abstract
Information security started as an IT operation process and is now recognized as an important issue of information technology, and each international organization is newly defining the concept. Information security itself is a new combination of IT technologies, a set of technologies and a technology area. As IT outsourcing becomes common in many public sectors, SLAs are introduced to evaluate the level of IT services. In the area of information security, many studies have been conducted on the derivation and selection of SLA performance indicators, but it is difficult to find a way to apply the performance indicators to service level evaluation and performance systems. This thesis conducted a study on the application of a service evaluation system for information security performance indicators based on the public sector and a performance system including compensation regulations. It presents standards and rewards(incentive and penalty) that define expectation and targets of performance indicators that take into account the environment and characteristics of a specific public sector, and defines appropriate SLA costs. It proposes a change plan for the organizational structure for practical SLA application and service level improvement.
Keywords
SLA Measurement; Evaluation; Incentive and Penalty;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Shin, Sung-Jin, Sung-Yul Rhew, and Yoo-Ri Kim. "A case study on selection and improvement of sla evaluation metrics." The KIPS Transactions: PartD 16.4, pp.541-548, Aug. 2009
2 Rhew, Sung-Yul, Sung-Jin Shin, and Yoo-Ri Kim. "A Study on Selection and Improvement of SLA Evaluation Metrics Using IT Maturity Model." Journal of Information Technology Services 8.4, pp141-150, Dec. 2009
3 National Information Society Agency. "The Operation Management Guideline of Information System", 2005
4 Jo, Yeon-ho, et al. "A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions." Journal of the Korea Institute of Information Security & Cryptology, 25(4), pp905-914, Aug. 2015   DOI
5 Choi, Yun-Ho. "A IT Service Management Performance Model Based on Val IT for IT Governance." Proceedings of the Korea Information Processing Society Conference. Korea Information Processing Society, pp.1724-1727, Nov. 2012
6 KISA, "Development of efficient operation plan of security SLA for security service." pp.99-145. 2010
7 Lee, E. J. "A Study on the Operation of ITSM for Small Scale IT Department." Journal of Human Computer Interaction 2011.1 (2011): 12-13.
8 Kim, Dong-Soo, and Hee-Wan Kim. "A Study on the Audit Model of Outsourcing Operation based on Availability Metrics in perspective of Service Level Agreenment." Journal of digital convergence 13.7, pp.183-196, Jul. 2015   DOI
9 Claire Agutter. "ITIL Essentials Foundation Essentials ITIL 4 Edition", ITIL, 2020
10 Kang, Un-Sik, Kyoung-Han Bae, and Hyun-Soo Kim. "A Cost Optimization Model of IT Operation Service by Improving Service Request Management Process." Journal of Information Technology Services 6.3, pp.87-110, Dev. 2007
11 Park, Chul-Han, Sang-Soo Kim, and Hoh In. "A Selection Methodology for SLA Evaluation Factors with End-user Perspective." Proceedings of the Korea Information Processing Society Conference. Korea Information Processing Society, pp.495-498, Nov. 2006
12 Sim, Hyun-bo. "From Information Security To Syber Security." RESEAT Monitoring Report, 2012.
13 Lee, Byoung-Chol, and SungYul Rhew. "The Maintenance Cost Estimation Model for Information System Maintenance Based on the Operation, Management and Service Metrics." Journal of The Korea Society of Computer and Information 18(5), pp.77-85, May. 2013   DOI
14 Hwang Kyung-tae and Nam Gi-chan."Foundation of IT Service Management Based on ITIL V3", 2008
15 Park, WonIl, and MyongSoon Park. "Cloud computing billing system associated with SLA." Proceeding of Korea Computer Congress 2013, pp.854-855, Jun. 2013
16 Standard, Australian. "ISO/IEC27002." Information technology-security techniques-code of practice for information security controls,(AS ISO/IEC 27002: 2015). 2015.
17 ITIL, "Service Support", The Stationery Office, 2001
18 ITIL, "Service Delivery", The Stationery Office, 2001