Section D

Impact of ITSM Military Service Quality and Value on Service Trust

Hanchul Woo1, Sangdo Lee2, Jun-Ho Huh**, Sukjae Jeong*
Author Information & Copyright
1Hanchul Woo, Defense Information Officer of Defense Security Support School (DSSS), Defense Security Support, Command, Gwacheon City, Gyeonggi-do, Republic of Korea, woocking@hanmail.net
2Sangdo Lee, Cyber Security Center Manager with the Korea Midland Power Co., LTD., Boryeong, Republic of Korea, piterlee@gmail.com
*Corresponding Author : Sukjae Jeong, Business School, Kwangwoon University, 26 Kwangwoon-gil (447-1, Wolgye-dong), Nowon-Gu, Seoul 139-701, Republic of Korea, sjjeong@kw.ac.kr
**Corresponding Author : Jun-Ho Huh, Dept. of Data Informatics, Korea Maritime and Ocean University, Busan, Republic of Korea, 72networks@kmou.ac.kr

© Copyright 2020 Korea Multimedia Society. This is an Open-Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Received: Feb 04, 2020; Revised: Mar 07, 2020; Accepted: Mar 12, 2020

Published Online: Mar 31, 2020

Abstract

As the IT service environment grows, it is critical in terms of IT service quality to minimize the occurrence of failures due to changes in applications and to diagnose and recover in a short period of time how failure will affect the business. Thus, the Defense Acquisition Program Administration (DAPA) has been building and operating ITSMs to implement IT service management in a leading manner. Information Technology Service Management (ITSM) is divided into events, obstacles, changes, versions and setup management to ensure flexibility and stability in service delivery. It is also operated separately from service level, availability, capacity, financial and IT service continuity management to ensure service quality and cost efficiency. Based on ITSM military service history, this study looks at the impact of quality of service on value, satisfaction, and trust. The results of the analysis are highly valuable for future ITSM implementation and operation.

Keywords: Software engineering; ITSM; ITSM service quality; ITSM military service; DAPA; Management information systems

I. Introduction

Although DAPA aims to achieve budget reduction for the public and provide the best administrative service to the companies and military agencies while procuring military supplies, promoting defense businesses, and acquiring optimal weapon systems, there have been some problems in their IT service management:

  • - Due to the insufficient integrated management system based on the individual monitoring systems for each system and task, rapid response to system incidents is difficult.

  • - Information is not shared efficiently as their countermeasures and system recovery methods often depend on an individual’s experience or expertise. Moreover, the instructions for dealing with incidents are mainly managed with documents.

Proper business process and IT service system should be established together with an efficient IT process to maintain or improve the quality of service or develop a new business model [1-2]. In such regard, ITSM (IT Service Management) is the key to the solution. ITIL (IT Infrastructure Library)-based ITSM supports efficient system management without complicating the service process by providing guidance on how to achieve the management objectives strategically while consistently improving the quality of service. Since such ITSM system is expected to be able to provide high-level service to customers who are utilizing IT services in the military acquisition sector, this study attempted to analyze the level of satisfaction with ITSM application in the sector and proposed the development direction for the future [3-4].

As a result of applying the concept of ITSM to these problems, some improvements have been made so that, after analyzing them, an attempt will be made to redefine the future performance goals and present the possibility of continuous development of IT service in military acquisition programs considering the factors involved in achieving satisfactory service. Therefore, this study described the system proposed by a small defense company in the Republic of Korea.

In this study, processes and function automation were implemented with focus on IT services and service desk based on ITIL v2 in order to establish, develop, and operate the processes needed to provide services to customers effectively.

As such, this study is meaningful since it checks the importance of integrated management and satisfaction with various IT services based on those processes.

Due to the advancement of ITIL establishment, however, ITIL v3 is changing according to business value by strengthening the service life cycle viewpoint with focus on business value (ranging from IT planning to service design, operation, improvement, and strategy), strengthening IT governance support, and defining IT service as an asset that provides utility and assurance for business.

The recently released ITIL v4 focused on adaptation, adjustability, customization, and flexibility in IT service management. ITIL v4 expanded the existing concept with focus on value creation, process automation, and performance improvement, and it is increasing the importance of governance, reliability, stability, information security, and data security.

On the other hand, this study conducted research on the integrated management of IT services provided by Korea's national defense acquisition system, which was developed based on ITIL v2 as the existing system, and investigated the level of satisfaction with services with focus on ensuring that it can be used for understanding the necessity of the system and its advancement in the future.

II. Related Research

In the domestic ITSM market, with the announcement of ITILv3, the IT Governance field is expected to be added to the existing service desk and service level management fields operated with ITILv2. The expansion to IT Governance, which will include project and portfolio management, signifies the further advance of ITSM [5], [6]. Major target companies are those that have introduced ITSM systems into their business for more than two or three years, accounting for about 20~30% of all companies adopting ITSM. Thus, the demand for achieving IT Governance is expected to grow continuously for the ITSM market; based on such forecast, all the companies mentioned earlier are focusing on their customer requirements to increase customer satisfaction with their ITSM systems as well as seeking maximum return on their investment [7], [8].

In summary, we would like to emphasize again that the main contribution of this study is that it has proven, through scientific analysis, that the overall satisfaction level increased by managing the problems associated with service inconveniencies or operation efficiencies of the previous distributed systems.

On the other hand, ITIL v4 was officially released in the first quarter of 2019. ITIL has not been changed significantly since the last update in 2011 save for minor changes, but its framework is changed to a large extent [9], [10].

As the characteristic of the new version, the existing concept is expanded with focus on value creation, process automation, and performance improvement while maintaining the existing framework of ITIL v3. In particular, it is noteworthy that enterprise collaboration and communication are encouraged, and changes are made to accommodate agile and DevOps (Development Operations) in the ITIL framework [15]-[19].

2.1. History of ITIL

Let us look into the root of ITIL before describing what agile and DevOps are and why international IT service standards accommodate such culture [10], [11].

The CCTA (Central Communications and Telecommunications) Agency in the UK devised a set of recommendations for "a practical, convenient framework for businesses to define, plan, support, and provide IT services” in the 1980s. ITITL v1, which began as a collection of books on how to manage and implement IT services based on the CCTA recommendations, was composed of more than 30 books and published from 1986 to 1996 [12], [13].

Published between 2000 and 2001, ITIL v2 is a set of books on the process guidelines related to various areas of IT such as management, application, and service. The books were combined and published as eight books. CCTA in the UK was integrated into the OGC (Office of Government Commerce) in April 2001 [14].

OGC released “ITIL v3” in May 2007, which is currently known as the ITIL 2007 edition. ITIL v3 consists of 26 processes and functions and covers five key processes.

On the other hand, ITIL was updated again in July 2011. The guidelines, which clearly defined the processes that have not been defined at the time, were included, and the problems of the previous versions (lack of consistency and various errors) were fixed before completing the current ITIL v3.

2.2. Agile and DevOps

The Agile methodology is a software development methodology that is a compromise between unplanned development methods and excessively planned development methods. The waterfall development method, a traditional development method, was borrowed from the construction field; it consists of requirement definition → analysis → design → implementation → test → execution [15]-[17].

One of the important weaknesses of Agile Development when dealing with high-integrity software system is that it is lack of proven method in dealing with nonfunctional requirements [18]. Other method shows [19] a promising opportunity to improve Agile Development [20] from the requirements aspect.

Nonetheless, the waterfall development method has a disadvantage, i.e., it is difficult to change in line with the customer’s requirements because the next phase cannot be started before the previous step is completed, and the development output can be checked in the later development phase only.

On the other hand, the agile development method is used to develop software gradually and repetitively like an assembly line in the manufacturing industry. There is a higher possibility of obtaining needed software at the end, because development is conducted by repeating short-term development and receiving feedback repeatedly, which is called “Iteration.”.

In other words, unlike the previous methodologies that took the lead through planning, the agile development methodology creates prototypes ceaselessly at regular intervals without development based on forecast and develops large-scale software by adding and modifying the basic requirements from time to time as the need arises.

DevOps is a compound word consisting of software development and operation and can be defined as any development environment or culture that emphasizes communication, collaboration, and integration between software developers and IT professionals. It is a culture wherein interdependent response between software development organizations and operation organizations is emphasized, and organizations develop and deploy software products and services within a short period of time. This culture enables actual task performers to concentrate on service improvement activities at a higher level by developing and deploying services as soon as possible through the automation of tasks that were already proven and repeated by the organization through the integration of development and operation. The ultimate goal of DevOps is to increase efficiency and raise effectively the standard of the service provided by the enterprise quickly from the perspective of the customers who actually use the service [20], [21].

2.3. Impact of ITIL v4

Agile and DevOps are still unfamiliar to or rejected by the Korean public sector and institutions. Likewise, many persons in charge and developers in corporations consider Agile to be an impractical or an unrealistic concept that does not match the reality of Republic of Korea.

On the other hand, ITIL has been continually developed mainly by foreign joint ventures since its introduction in Korea in 2000. Governments and many companies are using the ITSM solution that implements the ITIL v3 concept. The ITSM currently used by many institutions has its limitations, however.

Most ITILs started as a form of SLA (Service Level Agreement) requested by the user to manage effectively the IT infrastructure in the early days. It began by applying first the matter that can be applied in the IT infrastructure environment, which is easy to measure and manage, because it was difficult to find SLA-based cases in Korea. Focusing on infrastructure-focused cases, infrastructure-oriented indicator management, and SLA measurement items since then, the ITSM solution was also developed in line with such matters.

Given this situation, even the ITSM solutions introduced by organizations that manage infrastructures and services in an integrated manner are concentrating on infrastructures. Many IT managers are having difficulty managing software or services using ITSM, because software control know-how or indicators are not applied. The same is true for most private companies.

The biggest difficulty lies in managing quick and various requests for service improvement or change using the existing ITIL. The decision-making process became complex as the focus of ITIL is the CAB (Change Advisory Board), which is inevitably accompanied by the problem of taking a long time before end-user demands are reflected to real services.

Second is the difference in viewpoint. When an IT service is developed and launched, operation is performed. The purpose of development is to modify and patch quickly when a problem occurs, but that of operation is to provide stable services. As a result, operation tries to avoid changes because it can be difficult if a server fails due to change. Such difference in point of view inevitably leads to conflict.

Third is the lack of flexibility. Recently, communication with IT departments has become increasingly more important as more departments need to access IT and IT systems from the service aspect. Nonetheless, the existing ITIL v3 has limitations in reflecting this requirement flexibly.

Fourth, introducing an ITSM that complies with ITIL v3 costs a lot. Since raising quality by improving the way IT services are managed does not come cheap, it was difficult for companies with insufficient financial resources to adopt and manage ITSM. As a result, conglomerates and SMBs could not use ITSM universally. There was also the problem of insufficient experience in best practices and better management indicators, which could be obtained if ITSM was used in many places [21].

If ITIL v4 including Agile and DevOps is released as a solution to cope with these difficulties, the Korean government and many enterprises are expected to follow suit. Accordingly, many ITSM solutions will implement the Agile and DevOps concept.

If it is done, it will be a solution to the current ITIL v3-based operations that currently experience difficulties. Software development and operations will be managed by the ITIL management tools applied with ITIL v4, instead of a separate project management tool. Literally, DevOps, development and operation, will be linked as one to provide continuous, fast services.

2.4. Definition of ITSM

ITSM is an IT service management framework that aims to prevent the deterioration of service quality due to diversified IT management environments, lack of standard management system, and unstable system operation and provide the details of the standard IT service management process, organization, and technology based on ITIL, the best operation/management practice for securing higher-level service quality and competitiveness [22-24].

As the best practice of ITSM, ITIL is a reference of the IT-related standard operation process for companies. ITIL originated from the 45 books first published in 1986 by British government agency CCTA, currently known as OGC to provide guidance for systematically managing the information infrastructures of all government agencies.

Figure 1 presents the elements making up an ITSM system, the most important of which is the IT process, which is the process of providing and supporting IT service. The next most important part involves manpower and organization. It is essential that manpower with the skills and abilities necessary for providing optimal IT service be fostered/secured, that an organization be established with them, and that an appropriate role be assigned to each of them.

jmis-7-1-55-g1
Fig. 1. ITSM Process.
Download Original Figure

The technology used here refers to the tool or solution required to provide optimal IT service; without such element, the effects of ITSM cannot be realized properly. Recently, many solution companies have released solutions related to ITSM. Figure 2 shows ITSM System Layer.

jmis-7-1-55-g2
Fig. 2. ITSM System Layer.
Download Original Figure
2.5. ITSM Process Model

In examining the IT process models for ITSM, some of the major models include CobiT (Control Objectives for Information and related Technology), ITIL, and CMM (Capability Maturity Model). Among them, the one most closely related to ITSM and which has relatively detailed contents is ITIL. The core elements of ITSM are the service delivery and service support processes, which are considered to be the two major components of the service management presented by the ITIL framework as part of ITIL as a set of best practices (i.e., standardized best practices of IT resources, organization, and operations for IT service management). The service delivery process sets the level of IT service to allow a company to maintain it to achieve its business goals, whereas the service support process consists of support processes for service provision. The major processes are described as follows.

2.5.1. ITIL and eSCM

Although the models for ITSM include CMMI (Capability Maturity Model Integration), MOF (Managed Object Format), ITIL (IT Infrastructure Library), eSCM (eSourcing Capability Model), etc., only ITIL and eSCM will be introduced in this paper. ITIL is recognized as the industry standard.

2.5.2. ITIL (IT Infrastructure Library)

First developed by CCTA (Central Computer and Telecommunication Agency; UK), ITIL (IT Infrastructure First developed by CCTA, ITIL is a library that has been published in book form and which contains practices associated with IT service operation. Although ITIL had focused on the operation of IT infrastructure in the early stage, it has been expanded by including a series of best practices for managing IT services after its effectiveness was validated by several organizations and it was placed under the supervision of OGC. It is primarily divided into two domains: Service Delivery, which defines all types of processes necessary for the contract and monitoring of the service level agreed upon with customers; and Service Support for the operation and support of service delivery processes.

The respective service modules of the former and the latter are not operated or applied separately but can be completed by the overall flow and circulation of processes. ITIL-based certification (BS15000) can only be given by BSI; even though OGC currently has the right, many IT companies including MS (Microsoft), HP (Hewlett-Packard Co.), IBM (International Business Machines Co.), CA (CA Technologies), etc. are participating in its development and the supplementary work for each domain, based on the principle of making it applicable to and independent of the client-server environment and e-business environment of any company. ITILv3 is currently being adopted, and it is possible to acquire ISO90012 (International Standardization Organization) or BS15000 (British Standard 15000) certification if a certain service adopts this standard [22]-[24].

2.5.3. eSCM (eSourcing Capability Model)

eSCM was originally developed to assess the competency of IT outsourcing service providers objectively and improve the quality of service. At the same time, it is the model for evaluating the capability of IT service providers. eSCM was developed by CMU (Canadian Maritime Union) after benchmarking the existing ISO9000, MB (Malcolm Baldridge), COBIT (Control Objectives for Information and Related Technologies), ITIL, etc. It consists of some of the major issues pertaining to outsourcing tasks, such as proposal, negotiation, contract, service design, construction, service provision, and service level management, and the definitions of 85 practices in 10 areas (i.e., knowledge management, manpower management, performance management, relationship management, risk management, contract management, service design & establishment, service provision, service transfer). Similar to CMM (Capability Maturity Model), it adopts five competency levels for certification by CMU [25]-[27].

2.5.4. Comparison between ITIL and eSCM

As the working-level practices for service quality improvement for IT organizations, ITIL places emphasis on the basic service operation and support tasks necessary for ensuring the internal stability of the IT-related department/section of an IT company to improve their IT service quality. In contrast, as the first specialized certification standard for IT outsourcing services, eSCM has as its main interest the management of the relationship between the IT outsourcing provider and customer and service proposal/negotiation/contract/design and construction/provision/support until the end of the contract. Table 1 shows the comparisons. In short, while eSCM provides the guidelines for the pre-business phase, ITIL specifies the service design, establishment, and provision stages [28], [29].

Table 1. Comparison with eSCM.
Category eSCM ITIL
Object of Development Developing the process capability of IT outsourcing service provider & management of relationship with the ITO user Database organized for easy understanding of best practices in the IT service management field
Focus Certification of comprehensive process maturity for the management of ITO business cycle and projects Improvement of IT service operation & support tasks
Coverage Entire life cycle and support process IT service operation & support
Evaluation Method Measurement of phased maturity at organization levels through CMU or other qualified institutions Verification of internalization capability of ITIL by senior panel
Certification 2~5-level certification for organizational maturity Examination of compliance with the BS15000 standard
Download Excel Table

Recently, the concept of ITSM has become a popular solution for issues pertaining to corporate IT service management; it has become clear that most of the company businesses categorically depend on the quantity, quality, and availability of services provided and supported by the ICT infrastructure when IT infrastructure is used widely.

Therefore, the insufficient working capital and lack of flexibility of SMEs in terms of R&D have always been the major issue especially when it comes to developing new but innovative weapons systems requiring cutting-edge technologies. Their limited service and support to the customers often cause them to fall way behind large and multinational corporations. Still, it does not mean that their potential should be disregarded, as history shows that small but innovative companies can be quite successful in the hi-tech field. Their technical or technological capability is still vital to the military industry as it can break fresh ground for the future with novel concepts. With just a little support, the entire military industry can enjoy the benefits of partnering with SMEs when developing new and advanced weaponry or weapons systems.

2.6. Information Service Quality Measurement
2.6.1. Service Quality

The definition of service varies by each researcher, but we can see that each researcher makes a variety of definitions, with all researchers agreeing on the intangibility and characteristics consumed at the same time as production. Kim [30] and Han [31] have noted that a service is defined as an intangible asset that is produced by the service provider by providing part of the work or produced by the service provider and the customer interacting to meet the needs of the customer.

An et al. [32] defined the service as follows: it defined a service as an intangible activity that provides customers with some satisfaction with performance but cannot be owned or stored and transported.

According to the Parasuraman, Zeithaml and Berry [33], the concept of quality of service is harder to assess than quality of product, the perception of quality of service comes as a result of comparisons between consumers' expectations and actual performance of services, and the assessment of the quality of service by consumers also includes an assessment of the delivery process of services, including service performance. Grönroos [34] explained that "Perceived service quality" is perceived as a difference between expected and experienced quality and noted that the quality of two dimensions of process quality and resulting quality is formed through a filter called the image of the service provider or service provider.

Parasuraman, Zeithaml and Berry [33] have developed the SERQUAL model. The model consists of the service quality into 22 categories of five dimensions: tangible, reliable, responsive, confident, and empathy. Meanwhile, Rust and Oliver [35] have proposed that service quality in three dimensions: service product, service delivery and service environment. Lee and Ra [36] highlighted that service quality in three dimensions is referred to as process quality, result quality and environmental quality, and can be evaluated as a very logical and comprehensive model from an intuitive or practical point of view.

2.6.2. Service Value

Ettinger [37] said that in order to establish a successful strategy, consumers should evaluate the service value recognized by consumers, saying that the service value recognized by consumers is directly affected by the quality of the services received. Lee [38] pointed out that most studies show that quality of service affects the value of service, including that of quality of service affects the value of service. Conversely, Parasuranman et al. [39] noted that system availability, the nature of system quality during service quality, is not significant to perceived value, namely service value. Most studies have pointed out that the higher the quality of the service, the higher the value of the service, but that the relationship between the two is not significant. Therefore, it is meaningful to analyze whether ITSM's quality of service factors have a significant positive impact on the value of the service.

2.6.3. Service Satisfaction

Richard, L.O [40] attributed satisfaction to emotional variables formed by prior factors and quality of service to the recognition of the recognition of excellence in the individual attributes of services. Choi and Kang [41] studied and analyzed that customer satisfaction of hospitality companies (hotels, restaurants, lodging, etc.) does not have a significant positive impact on financial performance, but customer satisfaction of non-return companies (banking, hospital, distribution, etc.) has a significant impact on financial performance.

2.6.4. Service trust

Cha [42] pointed out that trust builds a lasting relationship when the customer is positive or emotionally trusted with the employee, and that a successful relationship with the service provider and the customer strengthens the relationship by allowing the service provider to trust in the customer's interests and to immerse itself in that relationship. Kim [43] noted that service confidence is being used as a concept similar to belief, conviction, expectation, consistency, safety, and so on, but various concepts are established according to the perspective, circumstances, and targets of the study on trust, which in marketing is 'trusted, belief, expectation, or certainty' and secondly 'convincing the other's dependence on the other. Service trust can be seen as being formed when the performance expected in advance by actual perceptual performance is reached. By summing up the preceding studies, a customer confidence is the same concept as service confidence and the customer confidence term is judged by service trust and research analysis was conducted.

2.6.5. Relationship among service confidence, value, and satisfaction

Through consideration of various research literature, we reviewed the identification of the relationship among service confidence, value and satisfaction. In particular, Park analyzed that the value of a service does not directly affect service confidence, whereas it affects service confidence through an intermediary variable called service satisfaction [44]. Kwon et al. [45] demonstrated that visual value and investment value had a positive impact on trust, the higher the value perceived, the higher the service satisfaction, and the more satisfied the customer, the higher the confidence. Through consideration of various research literature, the service value and the service satisfaction have been identified as variables that affect the service confidence. In this study, we verify whether ITSM's service value has a significant positive impact on service confidence, along with research and analysis of whether service satisfaction factors have a significant positive impact on service confidence [46]-[51].

III. ITSM Military Service

Figure 3 shows the comprehensive status board which is used as a window to achieve smooth communications. The integrated operation management system provides the IT service management status through a digital dashboard after establishing linkages between the service desk, service level management system, integrated resource management system, and integrated security management system. The weekly failures, entire structure compositions, weekly failure developments, weekly failure handlings, and weekly change-processing rates are presented with graphs on the board and the failure status can be retrieved based on a specific condition such as the name of the institution or task entered arbitrarily. Additionally, detailed information such as the status for processing requests, failure registration information, failure result information of particular failure is provided.

jmis-7-1-55-g3
Fig. 3. ITSM Military Service comprehensive status board.
Download Original Figure

In Figure 4, the basic data for calculating service levels provides the individual baselines for the number of failures, target-time compliance rates, rate of operation, security breach incidents, and user satisfaction based on the (SLA) Service Level Agreements. The information collected by the integrated operation management system for the service levels is used to calculate individual service levels based on the service target, operation & performance information, and service level management agreement. The resulting service levels are then provided to the user/operator as the information with which he/she can assess and manage his/her own levels.

jmis-7-1-55-g4
Fig. 4. Military Service Level Agreements (MSLA)
Download Original Figure

IV. Performance Evaluation: Concepts of Service Satisfaction and Analysis of Hypothetical Models

This study analyzed the characteristics of empirical samples by using the Mahalanobis distance to check the sincerity of 155 responses to the survey and used 154 data, excluding 1 response, for the analysis. Table 2 shows the characteristics of the survey samples.

Table 2. General Characteristics of Survey Subjects.
Survey Subjects Frequency Percentage
Age 20s 18 11.7
30s 54 35.1
40s 42 27.3
50s 40 26.0
Total 154 100.0
Department Program Management Division 29 18.8
Contract Management Division 47 30.5
Administrative Division 75 48.7
Others 3 1.9
Total 154 100.0
Position Captain / Grade 7 9 5.8
Major / Grade 6 50 32.5
Lieutenant Colonel / Grade 5 74 48.1
General Manager or Team Manager 21 13.6
Total 154 100.0
Experience 1 - 2 years 3 1.9
3 - 5 years 18 11.7
5 - 7 years 35 22.7
7 -10 years 35 22.7
10 years or longer 63 40.9
Total 154 100.0
Download Excel Table

In terms of the position of respondents of the survey, those working in the administrative division and having experience with ITSM services accounted for the highest portion. The analysis of the survey subjects showed that 84% were middle managers or higher-ranked, confirming the validity of the response.

Reliability means that “the same results are obtained when the measurement target is measured multiple times, and there is internal consistency among the items constituting an indicator.” We used Cronbach's alpha coefficient to analyze and confirm the internal consistency of reliability and the SPSS program for statistical analysis and confirmation. Cronbach's alpha coefficient is used to improve the measurement reliability by identifying items with low internal consistency and removing them from the measurement. The alpha coefficient is a value between 0 and 1, and a high value means high reliability. A value between 0.8 and 0.9 is generally considered highly reliable, and a value between 0.6 and 0.7 is generally considered reliable. Items with alpha coefficient of 0.6 or lower are considered to have no internal consistency. Table 3 shows results of reliability analysis.

Table 3. Results of Reliability Analysis.
Reliability Analysis Factor Cronbach’s Alpha Initial Items Final Items
Human Quality .843 6 5
System Quality .784 6 3
Result Quality .776 5 3
Service Value .694 3 3
Satisfaction with Service .849 3 3
Service Reliability .842 4 4

All items had Cronbach's alpha coefficient of 0.6 or higher; thus, they were confirmed to have internal consistency.

Download Excel Table

V. Performance Evaluation: Feasibility Analysis

5.1. Exploratory Factor Analysis

Table 4 shows the result of the exploratory factor analysis of the measured items. The first exploratory factor analysis of ITSM's service quality factor showed sufficient total load value of 67.133%, but the second exploratory factor analysis was performed since system quality factors 4, 5, and 6 were not grouped and were consequently removed although system quality factors 1, 2, and 3 were grouped. As a result, the total load value increased to 72.191%, confirming that the same grouping of the hypothetical study model was possible.

Table 4. Results of Exploratory Factor Analysis.
Component
1 2 3 4 5 6
Human Quality 1 .053 .744 .258 -.040 .071 -.015
Human Quality 2 .264 .854 .148 -.054 .017 .052
Human Quality 3 .254 .784 .025 .039 .175 .028
Human Quality 4 -.101 .612 .226 .253 .276 .403
Human Quality 5 -.025 .654 .046 .155 .252 .250
System Quality 1 .135 .171 .770 .007 .286 .007
System Quality 2 .028 .126 .837 .074 -.086 -.254
System Quality 3 .024 .189 .802 .157 -.092 .195
Result Quality 1 -.049 .021 .292 .777 .209 .276
Result Quality 2 .013 .130 -.106 .800 -.037 -.262
Result Quality 3 -.008 -.034 .125 .833 .213 .142
Service Value 1 .228 .080 -.048 .155 .779 -.015
Service Value 2 .318 .267 .111 .348 .590 .092
Service Value 3 .120 .273 .069 .049 .669 .207
Satisfaction with Service 1 .429 .258 .004 .006 .376 .509
Satisfaction with Service 2 .590 .137 -.076 .080 .254 .573
Satisfaction with Service 3 .548 .263 -.106 .066 -.006 .681
Service Reliability 1 .682 .169 .253 .006 .221 .173
Service Reliability 2 .889 .100 .077 .081 .085 .003
Service Reliability 3 .848 .058 .013 -.008 .064 .021
Service Reliability 4 .680 .061 -.034 -.247 .292 .266

“Factor extraction method: Principle component analysis Rotation method: Varimax with Kaiser normalization”

The measured items of the service human quality factor, system quality factor, and resultant quality factor of ITSM with low component value were removed to ensure the consistency of the service factors of the study mode.

Download Excel Table
5.2. Fit Analysis of Individual Factors

The fit analysis of individual ITSM service quality factors analyzes the similarity between the study model and individual factors. The high fit range of an individual factor means that the study model represents the factor well. The analysis results indicate high convergent validity of the two relationships. Table 5 shows the chi-square and RMR values used for the model fit analysis.

Table 5. Results of Fit Analysis.
Subject χ2 χ2 DF P (≥.05) RMR (≤.08) Remarks
Human Quality 21.254 9 .011 .018
Human Quality* 14.096 5 .015 .017 Human quality 6 is removed.
System Quality 70.268 9 .000 .044
System Quality* 0 - - 0 System qualities 4, 5, and 6 are removed.
Result Quality 70.590 5 - .078
Result Quality* 0 - - .035 Result qualities 4 and 5 are removed.
Service Value - - .273 .000
Satisfaction with Service - - - .000
Service Reliability 2.599 2 .273 .009

* The analysis results are the values after removing the questions that show a low level of overlapping.

Download Excel Table

The analysis of the chi-squared values checks the fit with the measured item of the questionnaire. This study performed the fit analysis, but the result was meaningless since the chi-squared p-value was significant. As such, we performed the fit analysis with RMR, and it showed that the quality factor was fit when the RMR value was 0.08 or lower. Since all RMR values of the factors are in the range of 0.08 or lower, we conducted the study by reflecting the first and additional exploratory factor analyses and excluding human quality factor 6, system quality factor 4, system quality factor 5, system quality factor 6, result quality factor 4, and result quality factor 5.

5.3. Fit Analysis of All Factors

We analyzed the factor load with the analysis result of the convergent validity of the potential factors to check the fit of all factors of the hypothetical study model.

Table 6 shows the result of the first-factor load. A factor load square of 0.5 or higher mostly indicates important convergent validity, and that between 0.4 and 0.5 indicates convergent validity.

Table 6. Result of 1st Factor Load Analysis.
Potential Factor Variable Observed Factor Variable Standardized Factor Load Standardized Factor Load Square Average Variance Extracted (AVE)
Human Quality Factor Human Quality 1 0.669 0.448 0.406
Human Quality 2 0.831 0.691
Human Quality 3 0.763 0.582
Human Quality 4 0.703 0.494
Human Quality 5 0.658 0.433
Human Quality 6 0.265 0.070
System Quality Factor System Quality 1 0.693 0.480 0.442
System Quality 2 0.638 0.407
System Quality 3 0.679 0.461
System Quality 4 0.599 0.359
System Quality 5 0.710 0.504
System Quality 6 0.349 0.122
Result Quality Factor Result Quality 1 0.594 0.353 0.336
Result Quality 2 0.253 0.064
Result Quality 3 0.521 0.271
Result Quality 4 0.722 0.521
Result Quality 5 0.686 0.471
Service Value Factor Service Value 1 0.596 0.355 0.440
Service Value 2 0.750 0.563
Service Value 3 0.635 0.403
Satisfaction with Service Factor Satisfaction with Service 1 0.751 0.564 0.660
Satisfaction with Service 2 0.882 0.778
Satisfaction with Service 3 0.799 0.638
Service Reliability Factor Service Reliability 1 0.729 0.531 0.581
Service Reliability 2 0.833 0.694
Service Reliability 3 0.774 0.599
Service Reliability 4 0.706 0.498
Download Excel Table

The most desirable range is 0.7 or higher, but it is not specified. We conducted the second-factor load analysis after excluding human quality 6, which showed load square of 0.4 or lower, system quality factors 4, 5, and 6, and result quality factors 4 and 5, which were not grouped in the factor analysis. Table 7 shows the result.

Table 7. Result of 2nd-Factor Load Analysis.
Potential Factor Variable Observed Factor Variable Standardized Factor Load Standardized Factor Load Square Average Variance Extracted (AVE)
Human Quality Factor Human Quality 1 0.679 0.461 0.530
Human Quality 2 0.831 0.691
Human Quality 3 0.767 0.588
Human Quality 4 0.696 0.484
Human Quality 5 0.651 0.424
System Quality Factor System Quality 1 0.746 0.557 0.548
System Quality 2 0.751 0.564
System Quality 3 0.723 0.523
Result Quality Factor Result Quality 1 0.838 0.702 0.562
Result Quality 2 0.524 0.75
Result Quality 3 0.843 0.711
Service Value Factor Service Value 1 0.571 0.326 0.443
Service Value 2 0.798 0.637
Service Value 3 0.606 0.367
Satisfaction with Service Factor Satisfaction with Service 1 0.748 0.560 0.659
Satisfaction with Service 2 0.879 0.772
Satisfaction with Service 3 0.806 0.649
Service Reliability Factor Service Reliability 1 0.721 0.520 0.580
Service Reliability 2 0.816 0.666
Service Reliability 3 0.770 0.593
Service Reliability 4 0.735 0.540
Download Excel Table

The results of the second-factor load analysis showed that the standardized factor load squares were 0.4 or higher, confirming the impact of the convergent validity.

We then checked the discriminant validity. We compared the AVE of a potential factor with the correlation squared of the potential factor and considered the existence of discriminant validity if the AVE was larger than the correlation squared.

VI. Hypothetical Model and Its Analysis for Research on ITSM Service Satisfaction

The trend of recent research works on public institutions is to assess not only the quality of the service provision process but also the result. Thus, a statistical method often used in the field of public service at present has been used to perform scientific analysis and obtain objective results. This study divided the service quality of ITSM into “process quality” and “resulting (outcome) quality”: human quality and system quality define process quality since the service provision process is processed by people and internal system.

The hypotheses and models below were established on the premise that each element of the ITSM service quality would significantly affect the service value.

Hypotheses for the components of service quality and value.

<Hypothesis H1>

H1.1 : Human quality will have a significant positive impact on service value.

H1.2 : System quality will have a significant positive impact on service value.

H1.3 : The resulting quality will have a significant positive impact on service value.

Hypotheses for the components of service quality and satisfaction.

<Hypothesis H2>

H2.1: Human quality will have a significant positive (+) influence on service satisfaction.

H2.2: System quality will have a significant positive (+) influence on service satisfaction.

H2.3: The resulting quality will have a significant positive (+) influence on service satisfaction.

The hypotheses have been formulated based on the view that service value affects service satisfaction. Likewise, based on the views that service value has an influence on the reliability of service, and that service satisfaction has a positive influence on reliability, the following hypotheses and model have been established:

(3) Hypotheses for service value, satisfaction, and reliability

<Hypothesis H3, 4, 5>

H3 : Service value will have a significant positive impact on service satisfaction.

H4 : Service value will have a significant positive impact on service reliability.

H5 : Service satisfaction will have a significant positive impact on service reliability.

A comprehensive hypothetical model for the correlations between the variables of components of service quality is shown in Figure 5.

jmis-7-1-55-g5
Fig. 5. Hypothetical Model.
Download Original Figure

Meanwhile, the measurement items were set by considering the items related to actual IT service requests or support after checking the existing research works on the ITSM service satisfaction, and a Likert 7-point scale was used. Table 8 shows measurement items for the ITSM service satisfaction research hypotheses.

Table 8. Measurement Items for the ITSM Service Satisfaction Research Hypotheses.
Variable Measurement Item
Human Quality * The staff in charge quickly processes the requested ITSM service.
* The staff in charge processes the task ITSM service flexibly considering the circumstances.
* The staff in charge is kind and polite.
* The staff in charge makes an effort to reduce the waiting time.
* The staff in charge explains the procedure, terms, and regulations in simple terms.
* The staff in charge shows willingness to help actively.
System Quality * Manage input information safely in ITSM.
* Satisfied with the ITSM design.
* Searching the necessary information in ITSM is convenient.
* All the services provided by ITSM are easy to use.
* I trust the security of ITSM.
* Page loading in ITSM is fast.
Resulting Quality * ITSM processes the task by prioritizing public interest.
* ITSM’s operating system and policy are systematic.
* ITSM makes an effort to develop creative services.
* ITSM provides roles and services that meet the expectations on IT service.
Service Value * ITSM is worthy of the time spent.
* ITSM provides service commensurate with the effort made.
* The development cost of ITSM is worth it.
Service Satisfaction * I am satisfied with the ITSM service.
* I am satisfied with the attitude of the staff in charge of IT service.
* I am satisfied with the competence of the staff who processed the ITSM service task.
Service Reliability * I trust the competence of the staff in charge of ITSM service.
* I trust the staff in charge of ITSM service in general.
* I trust all the steps of ITSM service processing.
* I trust the sincerity of the staff in charge of ITSM service.
Download Excel Table

VII. Analysis of Service Satisfaction and Discussion

ITSM achieves consolidated management for the IT services supporting an acquisition system, and no outside connections can be established with such ITSM. Issues pertaining to the D2B can be addressed to System Q and A or a Call Center for problem-solving. In other words, internal staff can take the necessary measures for problems by directly connecting with ITSM.

We believe that satisfaction with the system can be used for system advancement and for checking organizational performance regarding the systems that use similar public institutions.

7.1. Discussion

The DAPA is operating its IT service with the aim of providing the best services for both corporations and military in terms of service efficiency or budget reduction for the procurement of military supplies, promotion of the defense industry, and acquisition of the best weapon systems. The obstacles in the information system lead to budget loss or hamper securing the feasibility of informatization businesses; in extreme cases, they can cause heavy losses by crippling the business. Such obstacles also delay the provision of information services, thereby not only raising the dissatisfaction level of users but also causing loss of credibility and efficiency. These problems have been gradually improved since the introduction of ITSM, and the significance of this study lies in realizing the best administrative services by presenting the effects of the IT service factors on service quality through analysis/research on the ITSM operation. The level of prompt, accurate provision of the required information through the introduction of various types of systems affects the credibility of the systems as well as the reliability of the organizations or agencies providing the services. The study reconfirmed the necessity of ITSM and the service quality factors largely affecting the credibility of the services.

7.2. Hypothesis Testing

By conducting a survey on the satisfaction or reliability of ITSM service, hypothesis testing was performed for the major items affecting the service.

While a service factor such as human or output (resulting) quality has a direct impact on the service value, system quality affects it indirectly without any direct impact.

Service satisfaction is tantamount to reliability of service through human and output qualities. The prerequisite for reliable ITSM service is service satisfaction on which human and output qualities have a direct influence.

Due to the characteristics of the military, service satisfaction has an indirect rather than direct influence on system quality.

The fact that the factors of system quality such as design, page speed, search speed, etc. do not have a direct influence on service value or the characteristics of the closed world of the military organization where emphasis is placed on the continuity of business can be recognized through hypothesis testing.

To test the hypotheses established in this study, 320 survey responses were collected, and 154 valid ones were checked with Mahalanobis distance to investigate the correlations between ITSM service quality, value, satisfaction level, and reliability and each variable.

The correlations and the discriminant validity between the potential factors were determined. Discriminant validity is determined by comparing the AVE (Average Variance Extracted with the square of the correlation; if the value AVE is greater than the latter, the validity is considered to be affirmative. The arithmetic expression and the results are shown below. Table 9 shows the Square of Correlations and Discriminant Validity. Table 10 presents the Result of Hypotheses Testing.

Table 9. Square of Correlations and Discriminant Validity.
Human Quality System Quality Resulting Quality Service Value Service Satisfaction Service Reliability
Human Quality 0.530 - - - - -
System Quality 0.190 0.548 - - - -
Resulting Quality 0.039 0.104 0.562 - - -
Service Value 0.373 0.077 0.298 0.443 - -
Service Satisfaction 0.249 0.002 0.048 0.411 0.659 -
Service Reliability 0.144 0.042 0.001 0.361 0.630 0.580

* The AVE values are highlighted in bold.

Download Excel Table
Table 10. Result of Hypotheses Testing.
Hypothesis Path Coefficient SE CR P Standardized Path Coefficient Adopt/Reject
Human Quality Service Value 0.420 0.097 4.343 *** 0.556 Adopt
Human Quality Service Reliability 0.223 0.180 1.239 0.215 0.174 Reject
System Quality Service Value -0.067 0.079 -0.847 0.397 -0.089 Reject
System Quality Service Reliability -0.185 0.132 -1.400 0.161 -0.146 Reject
Resulting Quality Service Value 0.254 0.060 4.196 *** 0.464 Adopt
Resulting Quality Service Reliability -0.149 0.115 -1.291 0.197 -0.161 Reject
Service Value Service Satisfaction 1.149 0.328 3.495 *** 0.678 Reject
Service Value Service Reliability 0.089 0.157 0.566 0.572 0.061 Reject
Service Satisfaction Service Reliability 0.644 0.110 5.839 *** 0.743 Adopt
Download Excel Table
AVE = i = 1 n λ i 2 Π ,
(1)

where λi = A standardized factor loading of the first measurement variable and Π = No. of measurement variables.

The results of hypotheses analysis can be summarized as follows. First, concerning the correlation between the components of service quality and service value, human quality and resulting quality were determined to have a significant positive influence on service value.

Second, among the service quality components, human quality, system quality, and resulting quality had no significant direct influence on service satisfaction. Such result may be attributed to the fact that, regardless of these three qualities, only rapid failover or particular problem-solving service was required in terms of operation (business) continuity or service availability; even considering the service satisfaction was deemed to be an obstacle. This could be the typicalness of the organizations or members involved in the military acquisition programs that mandate them to perform special tasks in a high-security environment. Nevertheless, it was possible to find an indirect influence on service satisfaction through the intermediate variable “Service value.” This supports the existing research result that service satisfaction holds a higher position in terms of quality than service value considering the fact that the accumulated service values lead to service satisfaction in the end. Third, for the correlations between service value, service satisfaction, and service reliability, service value had a direct influence on service satisfaction, which in turn had a direct influence on service reliability.

Nonetheless, service value was determined not to affect service reliability directly. Fourth, the results showed that, due to the particular characteristics of DAPA’s organization, members, and operation as well as unique security-oriented characteristic, the nature of pursuing efficiency in business through operational continuity and availability does not have a direct influence on service reliability but actually wields an indirect impact on it. As mentioned above, the structural equation model presented in this study has been verified as an adequate model. The verification results of the structural hypotheses related to the model are shown in Figure 6.

jmis-7-1-55-g6
Fig. 6. Result of Verification for the Hypothetical Model.
Download Original Figure

We believe that satisfaction with the system can be used for system advancement and for checking organizational performance regarding systems that use similar public institutions.

VIII. Conclusion and Implications

This study confirmed the effect of ITSM service in military acquisition agency on increasing the efficiency, and this section discusses the implications through the empirical study of the ITSM service quality factors.

First, we can confidently say that this study broadened various academic study domains regarding the effects of ITSM on increasing efficiency and ITSM service quality factors. There have been many studies on the effect of ITSM and ITSM service quality factors for services in the private sector and applications of various study results. Nonetheless, studies of the military sector are limited due to security, and it is difficult to use data for the same reason. The most important implication of this study is that it attempted to apply various studies for the private sector to the military sector. The potential benefits of ITSM include targeting enhanced organizational performance through organizational specialization and outsourcing by adopting the IT business processes and securing the transparency, fairness, and reliability of the specialized military acquisition administration.

Second, this study expanded the analyzed service quality factors and examined the relationships of various service quality factors that are not standardized service quality factors to reflect the special attributes of the military acquisition agency. It also reported results that were different from the results of the studies in the existing literature.

Third, this study is meaningful since it is a study of the adoption of ITSM for the methodical management of the IT system using the public data by utilizing the limitation from the special nature and closed limitation of security, although there is shortage of data related to the special attribute of the military acquisition agency. It is also a systematic study on the impact of service quality on service values and satisfaction with service.

Fourth, the results of this study provide a useful reference to ITSM service providers and organization managers. We can confidently say that providing the necessary and available information services increases the efficiency of business continuity and availability, thereby possibly serving as one of the practical measures to enhance the service reliability of the agency and increasing the transparency, fairness, and efficiency of the organizational culture.

Abbreviations

DAPA

Defense Acquisition Program Administration

ITSM

Information Technology Service Management

ITIL

IT Infrastructure Library

DevOps

Development Operations

CCTA

Central Communications and Telecommunications Agency

OGC

Office of Government Commerce

SLA

Service Level Agreement

CAB

Change Advisory Board

CobiT

Control Objectives for Information and related Technology

CMM

Capability Maturity Model

CMMI

Capability Maturity Model Integration

MOF

Managed Object Format

eSCM

eSourcing Capability Model

MS

Microsoft Co.

HP

Hewlett-Packard Co.

IBM

International Business Machines Co.

CA

CA Technologies Co.

ISO90012

International Standardization Organization

BS15000

British Standard 15000

CMU

Canadian Maritime Union

MB

Malcolm Baldridge

COBIT

Control Objectives for Information and Related Technologies

SLA

Service Level Agreements

MSLA

Military Service Level Agreements

AVE

Average Variance Extracted

Acknowledgements

This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2017S1A5B8060156).

REFERENCES

[1].

Dimou I., Wietgrefe H., Van Selm M., and Janovszki L., “Demonstration of a Cross Security Domain Service Management Capability for Federated Missions,” in Proceedings of IEEE Military Communications Conference (MILCOM), pp. 184-191, 2014.

[2].

Je S. M., “Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service,” Journal of Multimedia Information System, vol. 6, no. 3, pp. 131-138, 2019.

[3].

Steinberg Randy A., Measuring ITSM. Trafford Publishing, 2013.

[4].

Lee S., Woo H., and Shin Y., “High performance data exchange architecture design and implementation for software development between disconnected networks,” in Proceedings of the 7-th International Conference on Advanced Information Management and Service (ICIPM), pp. 27-32, 2011.

[5].

Abraham Dávila., Rosanna Janampa., Paula Angeleri., and Karin Melendez., “ITSM model for very small organisation: an empirical validation,” IET Software, pp. 1, 2019.

[6].

Manuel Mora., Fen Wang., Jorge Marx Gómez., and Oswaldo Díaz., “A Comparative Review on the Agile Tenets in the IT Service Management and the Software Engineering Domains,” in Proceedings of International Conference on Software Process Improvement, Springer, Cham, pp. 102-115, 2019.

[7].

Lee S., Woo H., and Shin Y., “Study on Personal Information Leak Detection Based on Machine Learning,” Advanced Science Letters, vol. 23, no. 12, pp. 12818-12821, 2017.

[8].

Lee Y. W., “An Empirical Study on Evaluation Criteria of Projection Mapping Videos in Terms of Public Design,” Journal of Korea Multimedia Society, vol. 18, no. 8, pp. 950-959, 2015.

[9].

McNaughton Blake, Pradeep Ray, Lundy Lewis, “Designing an evaluation framework for IT service management,” Information & Management, vol. 47, no. 4, pp. 219-225, 2010.

[10].

Heikkinen Sanna, and Marko Jäntti, “Studying Continual Service Improvement and Monitoring the Quality of ITSM,” in Proceedings of International Conference on the Quality of Information and Communications Technology, Springer, Cham, pp. 193-206, 2019.

[11].

Manuel Mora., Mahesh Raisinghani., Rory V. O'Connor., Jorge Marx Gomez., and Ovsei Gelman., “An extensive review of IT service design in seven international ITSM processes frameworks: Part I,” International journal of information technologies and systems approach (IJITSA), IGI global, vol. 7, no. 2, pp. 83-107, 2014.

[12].

Abir El Yamami., Khalifa Mansouri., Mohammed Qbadou., and El Hossein Illoussamen., “Introducing ITIL framework in small enterprises: tailoring ITSM practices to the size of company,” International Journal of Information Technologies and Systems Approach (IJITSA), vol. 12, no.1, pp. 1-19, 2019.

[13].

Kim A., Lee S., Lee H., and Shin Y., “Fair resource allocation scheme using cooperative game theory in layer 1 VPN,” in Proceeding of the 8th International Conference on Computing Technology and Information Management (NCM and ICNIT), vol. 1, pp. 7-10, 2012.

[14].

Varga Sergio, Gilmar Barreto, Paulo D. Battaglin, “Increasing Information Systems Availabiliy Through Accuracy, Awareness, Completeness and Manageability of ITSM,” in Proceeding of the 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-4, 2019.

[15].

Kim S. K., “A Study on the Effect of Blockchain on Personal Information Protection,” Journal of Multimedia Information System, vol. 6, no. 3, pp.125-130, 2019.

[16].

Freddy Aquino., Diego Pacheco., Paula Angeleri., Rosanna Janampa., Karin Melendez., Abraham Dávila., “Information Technology Service Management Processes for Very Small Organization: A Proposed Model,” in Proceedings of International Conference on Software Process Improvement, Springer, pp. 55-68, 2018.

[17].

Stanley J. E., Mills R. F., Raines R. A., and Baldwin, R. O., “Correlating network services with operational mission impact,” in Proceedings of IEEE Military Communications Conference (MILCOM), pp. 162-168, 2005.

[18].

R. Chapman, N. White, and J. Woodcock, “What can agile methods bring to high-integrity software development?” Communications of the ACM, vol. 60, no. 10, pp. 38–41, 2017.

[19].

Sun Peng, Jingwei Yang, Hua Ming, and Carl K. Chang, “A Multi-layered Desires Based Framework to Detect Users' Evolving Non-functional Requirements,” in Proceedings of IEEE 42-nd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 28-37, 2018.

[20].

Ramsden Graham, “Agile ITSM Transformation,” ITSM Press, pp. 1-176, 2018.

[21].

HT Jung, Data net http://www.datanet.co.kr/news/articleView.html?idxno=131756 (accessed on 22 October 2019) (In Korean).

[22].

Hochstein Axel, Rüdiger Zarnekow, Walter Brenner, “ITIL as common practice reference model for IT service management: formal assessment and implications for practice,” in Proceedings of IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 704-710, 2005.

[23].

Seo Y. S., and Bae D. H., “On the value of outlier elimination on software effort estimation research,” Empirical Software Engineering, vol. 18, no. 4, pp. 659-698, 2013.

[24].

Tan Wui-Gee, Aileen Cater-Steel, Mark Toleman, “Implementing IT service management: a case study focussing on critical success factors,” Journal of Computer Information Systems, vol. 50, no. 2, pp. 1-12, 2009.

[25].

Winniford MaryAnne, Sue Conger, Lisa Erickson-Harris, “Confusion in the ranks: IT service management practice and terminology,” Information systems management, vol. 26, no. 2, pp. 153-163, 2009.

[26].

Iden Jon, and Tom Roar Eikebrokk, “Implementing IT Service Management: A systematic literature review,” International Journal of Information Management, vol. 33, no. 3, pp. 512-523, 2013.

[27].

Braun Christian, Robert Winter, “Integration of IT service management into enterprise architecture,” in Proceedings of the 2007 ACM symposium on Applied computing, pp. 1215-1219, 2007.

[28].

M. W. Johnson.; A. Hately.; B. A. Miller.; R. Orr., “Evolving standards for IT service management,” IBM Systems Journal, vol. 46, no. 3, pp. 583-597, 2007.

[29].

Antoni Lluís Mesquida., Antonia Mas., Esperança Amengual., Jose A. Calvo-Manzano., “IT Service Management Process Improvement based on ISO/IEC 15504: A systematic review,” Information and Software Technology, vol. 54, no. 3, pp. 239-247, 2012.

[30].

Kim J. H., “A Study on the Determinants of Service Quality and Customer Loyalty Concerning the Police Service,” Kyonggi University, 2005.

[31].

Han J. J., and Han K. S., “A Study on Service Quality Factors of Logistic Catalog Management System Affecting the Service Trust,” Journal of Digital Convergence, vol. 11, no. 11, pp. 257-263, 2013.

[32].

Ahn K. H., Ha Y. W., and Park H. S., “Marketing Principle,” Hakhyun Press, 2008.

[33].

Parasuraman A., Zeithaml V. A., and Berry L. L., “A conceptual model of service quality and its implications for future research,” Journal of marketing, vol. 49, no. 4, pp. 41-50, 1985.

[34].

Gronroos C., “A service quality model and its marketing implications,” European Journal of Marketing, vol. 18, no. 4, pp. 36-44, 1984.

[35].

Rust R. T., and Oliver R. L., “Service quality: insights and managerial implications from the frontier,” Service quality: New directions in theory and practice, pp. 1-19, 1994.

[36].

Lee Y. J., and Ra S. N., “The Process of Changing the Service Quality Assessment System for Korean Companies,” Seoul National University Press. Seoul, 2006.

[37].

Ettinger J. W., “Consumer-perceived value: the key to a successful business strategy in the healthcare marketplace,” Journal of the American Geriatrics Society, vol. 46, no. 1, pp. 111-113, 1998.

[38].

Lee G. C., “The effects of service quality on service value, customer satisfaction, behavior intentions in the traditional market: Focusing on the moderating effect of perceived pleasure and merchant consciousness,” Doctoral dissertation, Konyang University, 2011.

[39].

Parasuraman A., Zeithaml V. A., and Malhotra A., “ES-QUAL: A multiple-item scale for assessing electronic service quality,” Journal of service research, vol. 7, no. 3, pp. 213-233, 2005.

[40].

Janis Dietz, Satisfaction: a behavioral perspective on the consumer, Journal of Consumer Marketing, Emerald Group Publishing, vol. 14, pp. 408, 1997.

[41].

Choi M. S., and Kang K. H., “The effect of customer satisfaction on firm performance in America - The moderating effect of economic condition,” International Journal of Tourism and Hospitality Research, vol. 31, no. 9. pp. 71-84, 2017.

[42].

Cha Y. G., “A study on the Factors and Model of Hotel Relationship Marketing,” Journal of Industrial Economics and Business, vol. 13, no. 2, pp. 259-291, 2000.

[43].

Kim Y. H., “Effects of Trust on Organizational Citizenships Behavior and Learning by Sharing,” Korean Journal of Business Administration, vol. 38, pp. 987-1002, 2003.

[44].

Park J. H., and Joo S. H., “Effects of Export-Supporting Service Quality on Service Value, Customer Responses in the field of Defense Industry,” The Quarterly Journal of Defense Policy Studies, vol. 25, no. 1, pp. 207-252, 2009.

[45].

Kwon S. H., Kim T. U., and Lee Y. K., “The roles of customer’s perceived value, satisfaction, trust and their relationship with loyalty in internet shopping environment,” Korean Management Science Review, vol. 20, no. 1, pp. 149-163, 2003.

[46].

Mayerl Christian, Tobias Vogel, Sebastian Abeck, “SOA-based integration of IT service management applications,” in Proceedings of IEEE International Conference on Web Services (ICWS'05), pp. 785-786, 2005.

[47].

Bartolini Claudio, Mathias Sallé, David Trastour, “IT service management driven by business objectives an application to incident management,” in Proceedings of the 10th IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 45-55, 2006.

[48].

Paul P. Maglio., Savitha Srinivasan., Jeffrey Thomas Kreulen., J.C. Spohrer., “Service systems, service scientists, SSME, and innovation,” Communications of the ACM, vol. 49, no. 7, pp. 81-85, 2006.

[49].

Grönroos Christian, “From scientific management to service management: a management perspective for the age of service competition,” International Journal of Service Industry Management, vol. 5, no. 1, pp. 5-20, 1994.

[50].

Woohan Chul, Lee Sang Chun, Cho Sung Kak, Leesang Do, and Cho Yong Gun, “An Analysis on ITSM application to improve IT Service in defense acquisition,” Proceedings of Fall Conference KICS, 527-528, 2009. (In Korean)

[51].

Woohan Chul, Kang Seok Jung, Lee Bum Koo, “An Analysis on ITSM application to improve the effectiveness of IT Service In Defense Acquisition SectorsAnalysis of Factors for Strengthening Submarine Industry Basis,” Proceedings of Institute of Control, Robotics and Systems, 249-258, 2012.

Authors

Hanchul Woo

jmis-7-1-55-i1

Hanchul Woo received B.S. Korea Army Academy at Yeong-Cheon (KAAY), Republic of Korea in Feb. 1998. He received Master of Business Administration (Military MIS), Dongguk University. 2005. Also, He received Ph. D. at Dept., of Defense Acquisition Program, Kwangwoon University, Seoul, Republic of Korea in Feb. 2020. Defense Acquisition Program Administration Service at ROK (2006-2019). Since 2019, he has been an Instructor/Assistant Professor of Defense Information Officer of Defense Security Support School (DSSS), Defense Security Support, Command, Seoul, Republic of Korea.

Sangdo Lee

jmis-7-1-55-i2

Sangdo Lee received the B.S. degree in computer science from Sangji University, Wonju City, Korea, in 1998 and the M.S. degree in information security from Sungkyunwan University, Seoul, Korea, in 2005. Received the Ph.D. in Engineering Degree from Department of Major of Computer Engineering, Graduate School, Soongsil University, Seoul, Republic of Korea in Feb. 2018. From 2015 to 2019, he was a Cyber Security Control Team Assistant with the Korea Hydro and Nuclear Power (KHNP) Co. LTD., Currently he is Cyber Security Center Manager with the Korea Midland Power Co., LTD, Boryeong, Korea. (Feb. 2020-). His research interest includes the Industrial Control System (ICS) of cyber security terror and Big data techniques using security system logs, fundamental study of machine learning, and industrial Control system (ICS).

Jun-Ho Huh

jmis-7-1-55-i3

Jun-Ho Huh was born in Kyoto, Japan. He was finished the Cooperative Marine Science and Engineering Program, Texas A&M University at Galveston, United States of America in Aug. 2006. Received B.S. in Science Degree from Department of Major of Applied Marine Sciences (Currently Faculty of Marine Biomedical Sciences), And, B.S. in Engineering Degree (Double Major) from Department of Major of Computer Engineering from Jeju National University at Ara, Jeju, Republic of Korea in Aug. 2007. Received M.A. in Education Degree from Department of Major of Computer Science Education, Graduate School of Education, Pukyoug National University at Daeyeon, Busan, Republic of Korea in Aug. 2012. Received the Ph.D. in Engineering Degree from Department of Major of Computer Engineering, Graduate School, Pukyoug National University at Daeyeon, Busan, Republic of Korea in Feb. 2016.

He received the Best Paper Award from Korea Multimedia Society eleven times (November 2014, May 2015, November 2015, May 2016, October 2016, May, 2017; three times, October 2017, October 2018, Nov., 2019), the Undergraduate Student Paper Bronze Medal (Corresponding Author) Awarded, Korea Information Processing Society, in April 2017, the Best Paper Award the 10th 2016 International Interdisciplinary Workshop Series from HSST, in August 2016, the Best Paper Award the 16th International Conference on Control, Automation and Systems October 2016, ICROS with IEEE Xplore, and the Springer Nature Journal Award, Human-centric Computing and Information Sciences most cited paper award 2019 (Research published in the journal, from 2016 to 2018; SCIE IF=3.212). In addition, he received the Best Paper Awards (Two times) from the 15th International Conference on Multimedia Information Technology and Applications (MITA 2019), and the Best Poster Award (First Place) from the 7th International Conference on Big Data Applications and Services (BIGDAS 2019).

Technical Committee at IFAC (International Federation of Automatic Control), CC 1 (Systems and Signals), TC 1.5. (Networked Systems) (2017-2020). And, Technical Committee at IFAC, CC 3 (Computers, Cognition and Communication), TC 3.2 (Computational Intelligence in Control) (2017-2020). Technical Committee at IFAC, CC 7 (Transportation and Vehicle Systems), TC 7.2. (Marine Systems) (2017-2020).

Also, he is Managing Editor at Journal of Multimedia Information System (JMIS), Korea Multimedia Society (KCI-E indexed). Research Professor of Dankook University at Jukjeon, Yongin, Republic of Korea (July. 2016- Sep. 2016). He was an Assistant Professor with the Department of Software, Catholic University of Pusan, Republic of Korea, from December 2016 to August 2019. Since September 2019, he has been an Assistant Professor (Tenure Track) with the Department of Data Informatics, (National) Korea Maritime and Ocean University, Republic of Korea.

His research interests include green IT, smart grid, edge computing, network security, the IoT, AI, big data, and system architecture.

Sukjae Jeong

jmis-7-1-55-i4

Sukjae Jeong received B.S in Engineering Degree from Department of Logistics System Engineering from Korea Maritime University at Pusan (Currently Korea Maritime and Ocean University). He received M.A in Engineering Degree from Engineering Degree from Yonsei University, Seoul. Received the Ph.D. degree in industrial engineering from Yonsei University. He is an Associate Professor (Tenure Track) of operation management and supply chain with School of Business, Kwangwoon University.

He has published numerous articles in research publications, including the International Journal of Advanced Manufacturing Technology, Expert Systems with Applications, the International Journal of Production Economics, Energy, and Energy Policy.