{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:43Z","timestamp":1754157703314,"version":"3.41.2"},"reference-count":36,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2006,3,1]],"date-time":"2006-03-01T00:00:00Z","timestamp":1141171200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,3,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The aim of this paper is to present the key areas of activity to be used for drafting service level agreements (SLAs) for electronic services and, at the same time, to present best practices and problems that arise from the application of this discipline.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A range of recently published (2000\u20102005) works has been reviewed, in order to: a) analyse how an SLA has to be defined and applied b) identify the applicable best practices and c) identify the problem areas.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Provides guidance for the business and the Application Service Provider (ASP) when they want to engage in an outsourcing agreement by presenting best practices and problems that occur from the application of SLAs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>Suggests further research is needed in a number of research areas such as: development of semantic models for SLAs, development of flexible pricing models in relation with SLAs, definition of SLAs in cases of dynamic service creation, etc.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>A useful source of information both for academia and the business.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Provides practical insight on a specialized topic and guidance to researchers.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685220610678622","type":"journal-article","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T04:23:11Z","timestamp":1151986991000},"page":"185-195","source":"Crossref","is-referenced-by-count":5,"title":["Practices and problems in managing electronic services using SLAs"],"prefix":"10.1108","volume":"14","author":[{"given":"Panos","family":"Fitsilis","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022030720014469000_b1","doi-asserted-by":"crossref","unstructured":"Antonio, S., Arienzo, M., Esposito, M., Romano, P. and Ventre, G. (2004), \u201cManaging service level agreements in premium IP networks: a business\u2010oriented approach\u201d, Computer Networks, Vol. 46, pp. 853\u201066.","DOI":"10.1016\/j.comnet.2004.06.024"},{"key":"key2022030720014469000_b2","unstructured":"ASP Industry Consortium (2003), Service Level Agreements, available at: www.allaboutasp.org (accessed 15 September)."},{"key":"key2022030720014469000_b3","unstructured":"BDD\/3 Technical Committee (2002), \u201cBS15000\u20101:2002, IT service management\u201d, Part 1: Specification for service management, British Standard Institution, London."},{"key":"key2022030720014469000_b36","doi-asserted-by":"crossref","unstructured":"Bhoj, P., Singhal, S. and Chutani, S. (2001), \u201cSLA management in federated environments\u201d, Computer Networks, Vol. 35, pp. 5\u201024.","DOI":"10.1016\/S1389-1286(00)00149-3"},{"key":"key2022030720014469000_b7","doi-asserted-by":"crossref","unstructured":"Bouras, C. and Sevasti, A. (2004), \u201cSLA\u2010based QoS pricing in DiffServ networks\u201d, Computer Communications, Vol. 27, pp. 1868\u201080.","DOI":"10.1016\/S0140-3664(04)00236-1"},{"key":"key2022030720014469000_b8","unstructured":"CCTA (1987), Information Technology Infrastructure Library, HMSO, London."},{"key":"key2022030720014469000_b9","unstructured":"Converse Software (2004), Service Level Management\u2026 within Reach, Converse Software, San Mateo, CA, available at: www.conversesoftware.com (accessed 2 July)."},{"key":"key2022030720014469000_b10","unstructured":"COPC (2004), COPC\u20102000 CSP Cold Standard Release 3.4, Customer Operations Performance Center Inc., Amherst, NY."},{"key":"key2022030720014469000_b12","unstructured":"Dan, A., Ludwig, H. and Pacifici, G. (2003), Web Services Differentiation with Service Level Agreements, IBM Software Group, Armonk, NY."},{"key":"key2022030720014469000_b13","unstructured":"ebXML Technical Architecture Project Team (2005), ebXML Technical Architecture Specification v1.0.4, Technical."},{"key":"key2022030720014469000_b15","doi-asserted-by":"crossref","unstructured":"Hiles, A. (1994), \u201cService level agreements: panacea or pain?\u201d, The TQM Magazine, Vol. 6 No. 2, pp. 14\u201016.","DOI":"10.1108\/09544789410053966"},{"key":"key2022030720014469000_b16","doi-asserted-by":"crossref","unstructured":"Hoffner, Y., Field, S., Grefen, P. and Ludwig, H. (2001), \u201cContract driven creation and operation of virtual enterprises\u201d, Computer Networks, Vol. 37, pp. 111\u201036.","DOI":"10.1016\/S1389-1286(01)00210-9"},{"key":"key2022030720014469000_b17","unstructured":"Hyder, E., Heston, K. and Paulk, M. (2004), The eSourcing Capability Model for Service Providers, Carnegie Mellon University, Institute of Software Research International, Pittsburgh, PA, available at: http:\/\/itsqc.cs.cmu.edu (accessed 14 September)."},{"key":"key2022030720014469000_b19","doi-asserted-by":"crossref","unstructured":"Keijzer, J., Tait, D. and Goedman, R. (2000), \u201cJAIN: a new approach to services in communication networks\u201d, IEEE Communications Magazine, Vol. 38 No. 1, pp. 94\u20109.","DOI":"10.1109\/35.815458"},{"key":"key2022030720014469000_b22","doi-asserted-by":"crossref","unstructured":"Ma, Q., Pearson, J. and Tadisina, S. (2005), \u201cAn exploratory study into factors of service quality for application service providers\u201d, Information & Management, Vol. 42, pp. 1067\u201080.","DOI":"10.1016\/j.im.2004.11.007"},{"key":"key2022030720014469000_b23","unstructured":"Maurer, W., Matlus, R. and Frey, N. (2000), A Guide to Successful SLA Development and Management, GartnerGroup, Stamford, CT."},{"key":"key2022030720014469000_b25","unstructured":"Office of Government Commerce (2000), ITIL Service Delivery, The Stationery Office, London."},{"key":"key2022030720014469000_b26","unstructured":"Office of Government Commerce (2001), ITIL Service Support, The Stationery Office, London."},{"key":"key2022030720014469000_b27","doi-asserted-by":"crossref","unstructured":"Peppard, J. (2003), \u201cManaging IT as a portfolio of services\u201d, European Management Journal, Vol. 21 No. 4, pp. 467\u201083.","DOI":"10.1016\/S0263-2373(03)00074-4"},{"key":"key2022030720014469000_b28","doi-asserted-by":"crossref","unstructured":"Perry, M. and Bauer, M. (2004), \u201cPolicies, rules and their engines: what do they mean for SLAs?\u201d, in Negoita, M.Gh. et al. (Eds), KES 2004, Springer, Berlin, pp. 1164\u201070.","DOI":"10.1007\/978-3-540-30132-5_158"},{"key":"key2022030720014469000_b29","doi-asserted-by":"crossref","unstructured":"Piccinelli, G., Vitantorio, G. and Mokrushin, L. (2001), \u201cDynamic service aggregation in electronic marketplaces\u201d, Computer Networks, Vol. 37, pp. 95\u2010109.","DOI":"10.1016\/S1389-1286(01)00211-0"},{"key":"key2022030720014469000_b30","doi-asserted-by":"crossref","unstructured":"Sahai, A., Machiraju, V., Sayal, M., Moorsel, A. and Casati, F. (2002), \u201cAutomated SLA monitoring for web services\u201d, in Feridun, M. et al. (Eds), DSOM 2002, Springer, Berlin, pp. 28\u201041.","DOI":"10.1007\/3-540-36110-3_6"},{"key":"key2022030720014469000_b33","doi-asserted-by":"crossref","unstructured":"Trienekens, J., Bouman, J. and Van Der Zwan, M. (2004), \u201cSpecification of service level agreements: problems, principles and practices\u201d, Software Quality Journal, Vol. 12, pp. 43\u201057.","DOI":"10.1023\/B:SQJO.0000013358.61395.96"},{"key":"key2022030720014469000_b35","doi-asserted-by":"crossref","unstructured":"Wade, V.P. (1999), \u201cService management and the telecommunications information networking architecture\u201d, Computer Communications, Vol. 22, pp. 1633\u20107.","DOI":"10.1016\/S0140-3664(99)00142-5"},{"key":"key2022030720014469000_b34","doi-asserted-by":"crossref","unstructured":"Ward, C., Buco, M., Chang, R. and Luan, L. (2002), \u201cA generic SLA semantic model for the execution management of e\u2010business outsourcing contracts\u201d, in Bauknecht, K., Tjoa, A.M. and Quirchmayr, G. (Eds), EC\u2010Web 2002, Springer, Berlin, pp. 363\u201076.","DOI":"10.1007\/3-540-45705-4_38"},{"key":"key2022030720014469000_frd1","doi-asserted-by":"crossref","unstructured":"Beulen, E., Fenema, P. and Currie, W. (2005), \u201cFrom application outsourcing to infrastructure management: extending the offshore outsourcing service portfolio\u201d, European Management Journal, Vol. 23 No. 2, pp. 133\u201044.","DOI":"10.1016\/j.emj.2005.02.010"},{"key":"key2022030720014469000_frd2","doi-asserted-by":"crossref","unstructured":"Bissel, T., Bogen, M., Bonkowski, C. and Hadamschek, V. (2000), \u201cService level management with agent technology\u201d, Computer Networks, Vol. 34, pp. 831\u201041.","DOI":"10.1016\/S1389-1286(00)00154-7"},{"key":"key2022030720014469000_frd3","unstructured":"Blum, B. (2002), \u201cService level management and service level agreements\u201d, International Network Services, available at: www.ins.com (accessed 16 April)."},{"key":"key2022030720014469000_frd5","doi-asserted-by":"crossref","unstructured":"Currie, W. (2003), \u201cA knowledge\u2010based risk assessment framework for evaluating web\u2010enabled application outsourcing projects\u201d, International Journal of Project Management, Vol. 21, pp. 207\u201017.","DOI":"10.1016\/S0263-7863(02)00095-9"},{"key":"key2022030720014469000_frd6","unstructured":"Fitsilis, P. (2005), \u201cService level agreements (SLA): a tool for managing electronic services\u201d, Online Magazine, No. 5, pp. 17\u201018."},{"key":"key2022030720014469000_frd7","unstructured":"Johnston, R. and Clark, G. (2001), Service Operations Management, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022030720014469000_frd8","doi-asserted-by":"crossref","unstructured":"Kern and Willcocks, L. (2000), \u201cExploring information technology outsourcing relationships: theory and practice\u201d, Journal of Strategic Information Systems, Vol. 9, pp. 321\u201050.","DOI":"10.1016\/S0963-8687(00)00048-2"},{"key":"key2022030720014469000_frd9","doi-asserted-by":"crossref","unstructured":"Khalfan, A. (2004), \u201cInformation security considerations in IS\/IT outsourcing projects: a descriptive case study of two sectors\u201d, International Journal of Information Management, Vol. 24, pp. 29\u201042.","DOI":"10.1016\/j.ijinfomgt.2003.12.001"},{"key":"key2022030720014469000_frd10","unstructured":"Niessen, J. and Oldenburg, P. (2000), Service Level Management, CCTA, London."},{"key":"key2022030720014469000_frd11","unstructured":"Specification \u2013 ebXML_TA_v1.0.4.doc (2005), available at: www.ebxml.org (accessed 15 May)."},{"key":"key2022030720014469000_frd12","unstructured":"TINA Consortium Web page (2005), available at: www.tinac.com (accessed 15 May)."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220610678622","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220610678622\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220610678622\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:58Z","timestamp":1753402138000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/14\/2\/185-195\/172761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,1]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,3,1]]}},"alternative-id":["10.1108\/09685220610678622"],"URL":"https:\/\/doi.org\/10.1108\/09685220610678622","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2006,3,1]]}}}