Review Article Open Access December 26, 2021

Rule-Based Automation for IT Service Management Workflows

1
Independent Researcher, USA
Page(s): 1-14
Received
October 09, 2021
Revised
November 30, 2021
Accepted
December 20, 2021
Published
December 26, 2021
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.
Copyright: Copyright © The Author(s), 2020. Published by Scientific Publications

Abstract

The automation of IT Service Management (ITSM) workflows using explicit rules and data has been established for years. Domain-specific rule engines interpret rules written in declarative rule modelling languages and generate forwarding arrows to process event streams and support decision making. Such automation is augmented by rule-driven Quality Assurance for correctness, safety, and risk management. The service desk is the onshore base of an ITSM supply chain. An end-to-end incident response service resolves incidents using only onshore resources and employs back office teams to help with unresolvable incidents. The forward factories of rule-based automation for ticket processing service are identified. Several rule-based workflows in incident and change management have been published. Further glimpses of the future across all ITSM workflows are provided based on training in an online ITSM service with automated operations. Rule engines are specialised components that direct the processing of data flows according to pre-defined rules. Decision factories complement the more common event-driven rule engines. While event processing occurs below the polling frequency of the source, rules in decision factories are triggered based on the arrival of data. These factories are applied in ITSM for risk and safety evaluation and quality assurance. Rule-enriched architectures incorporate domain-specific modelling languages to ensure correctness with respect to qualitative quality attributes. Dedicated factories provide resilience, detect slack or over-utilisation, and offer point-in-time assurance and testing.

1. Introduction

At their simplest, situation-action rules can be viewed as decision tables stored in an accessible form using a declarative language. Although facility management can include parts of IT service management (ITSM), IT service delivery still requires dedicated approaches.

The delivery of IT services is colocócated management, business processes, business service development, and business service provision. Using an event-driven Kingfisher approach allows a dedicated IT service management rule engine to fulfil the management architecture. Although several IT service management suites combine service request workflows with orchestration engines, rule-based automation focuses on common patterns for service request and incident workflows to achieve the promised added value with respect to the cost of implementation and change.

1.1. Overview of Rule-Based Automation in ITSM

Automation of service management workflows, such as in-service desk and change-management operations, enables tedious tasks to be performed without human intervention. Often this is an extension of automation that has been in place for many years but is based either on application program interfaces (APIs) or on rules embedded in scripts. In IT service management (ITSM) the underlying patterns are now becoming more common, namely automation based on a rule engine, commonly labelled rule-based automation.

One of the most important tasks in rules-based automation is the definition of the set of rules that a rule engine must be able to execute. Depending on the volume of events and jobs that are managed, these rules can be defined in a different tool, known as a decision factory [13]. As the load increases, a move to an event processing engine allows for real-time evaluation of the service-management events and a more immediate response. Event processing is a very important subset of the event-driven architecture style and is supported by complex event-processing systems. Event-driven architectures have a demand-response approach, responding to events and demands as they emerge, while batch processing performs a sequence of operations on an entire data set [14].

2. Foundations of Rule-Based Automation in ITSM

Although early ITSM automation was mainly script-based an emerging trend towards rule-based automation is supported by greater availability of event-driven service management technologies, the simplicity of rule design, and an approach to operational ITSM that is similar in spirit to event resolution expertise [15]. Four issues are explored: a unified definition of rule-based automation in ITSM, design patterns for rule-based ITSM automation, the characteristics of rule languages suitable for rule-based automation, and examples drawn from the incident management and change management workflows considered in service operation.

Automation services that help to scale up and improve control of operational ITSM work are important components of closing gaps in comprehensive ITSM service portfolios [16]. Scripting-based services are a huge success, and there is a growing number of accessible and easy to use decision worker systems and tools. Just-in-time decision factories which are event or signal driven in nature can use these components as part of their operations to make decisions in a timely manner. Furthermore it is possible to manage decision factories that often operate in batch mode based on offline data. The availability of decision workers is playing an important role in shifting towards rule-based automation of operational work [17].

Equation 1) Step-by-step derivation of the core “rule engine” model (event-driven)

Step 1: Represent an incoming event as structured facts

Let an ITSM event (incident/alert) be represented as a vector of facts:

e=f1,f2,,fn

Step 2: Define a rule as a condition action mapping (situation-action)

A single rule ri is:

ri:CieAie
  • Cie is a boolean predicate (condition part)
  • Aie is the action (route ticket, notify, create change, escalate, etc.)

Step 3: Determine which rules “fire” for an event (rule matching)

For a set of rules R={r1,,rm}, define the triggered subset:

Re={riRCie=true}

Step 4: Resolve conflicts (if multiple rules match)

If several rules match, most engines apply priority/salience, specificity, or agenda ordering. Model this as a scoring function:

sri,eR

Choose the executed rule:

r*e=argmaxriResri,e

Step 5: Execute action(s)

If actions are single-choice:

execute Ar*ee

If actions are multi-rule (allow several to fire), then:

riRe: execute Aie
2.1. Definitions and scope

Rule-based automation (RBA) denotes the use of explicit codified business rules to support or enable autonomous execution of IT Service Management (ITSM) workflows. It has become increasingly prevalent during the last decade, spurred by the advent of new supporting software technology, rising operational cost and associated service quality issues, and the growing business appetite for faster-paced IT service provisioning [18].

One major area of RBA activity concerns the automation of incident management workflows, including triage, service restoration, and first-level staff activities. Such automation is generally driven by rules that detect service-affecting incidents, classify them according to predefined criteria, and implement appropriate reactive or proactive responses. A related but separate area of RBA investigation focuses on the use of decision factories to deploy and execute IT service change workflows that are governed, in whole or in part, by business rules [19].

2.2. Historical development and motivations

Despite the historical development of IT Service Management (ITSM) automation being difficult to chronicle, scattered historical records indicate that the first information technology jobs that were related to ITIL incident management were highly repetitive in nature and were therefore automated from the beginning. The first use cases for company-wide automation of ITIL incident management processing were explored in a banking environment in Switzerland around year 2000. Such rules-based automations were later adapted for supporting the ITIL change management process in a Swiss bank. In both cases, some additional risk analysis procedures were added to the original incident management automations for fulfilling the risk assessment requirements defined in the ITIL procedures [20]. For a few years these automations operated in the target environments without business engagement disturbances until the introduction of business engagement unit processing checks. This unit check required checking business engagement on every automated processing and not just checking it every second or third time [12]. The changed business requirement was not properly communicated to the ITIL process owner and escalated along the normal ITIL escalation channels within the banking company environment. Therefore, the original automations executed under the authority of the ITIL process owner and without any business engagement unit check remained operational even after the formal introduction of this new requirement [21]. Over these years several other job roles were operationally engaged to perform similar and simple checks to route end-user requests to the respective teams for fulfilling the user requests for service support such as for printer, network, SAP, etc. All these simple routing roles were later merged to create process owners for dedicated process rs for routing process in the United Kingdom [22].

3. Architectural Patterns for ITSM Automation

Rule-Based Automation for IT Service Management Workflows

Architectural patterns for IT service management automation. Rule-based automation encompasses various distinct architectural approaches, two of which arguably dominate day-to-day IT service management operations: the rule engine pattern and the decision factory pattern[11]. In the rule engine approach, an event, often signifying a significant change of state in an operational service or environment, serves as a trigger that causes one or more rules to be evaluated in a thematic rule engine. The typically discrete, open-ended nature of relevant events suggests and facilitates the use of an active computing paradigm (see, for example, Schuster et al. 2019). Conversely, a decision factory operates in batch mode, continually evaluating the same set of decision-making rules across a much larger volume of work that usually pertains to ongoing operations [23].

In IT service management (ITSM), the terms “event” and “incident” are often used interchangeably. Therefore, the images in this section illustrate rule engines operating in ITSM contexts. A number of actual and potential scenarios for invoking incident-management rule engines can be considered: breakdowns detected by automated monitoring tools, alerts escalated by human operators, requests from systems or applications, or simple “calls to arms” to fill urgent capacity gaps. Resilience, a crucial quality for any ITSM process, is a paramount concern for rule-engine implementations [24].

3.1. Rule engines and decision factories

Rule-based automation in ITSM can be realized within an event-driven architecture where dedicated rule engines act on incoming events as they happen, or via batch processing using a decision factory architectural pattern. In the first case, events matching rule conditions trigger the execution of corresponding actions. In the second case, events first enter a queue, and a dedicated decision factory processes them in a predefined order according to the business constraints [25].

The best approach depends on the system and the types of events processed. An event-driven approach is more efficient when the incident management rules require immediate or near-immediate decisions and actions [10]. A decision factory may generate a delay between an incident being raised in, for example, an external monitoring system and an associated change request in the change-management system, but the batch approach also has several advantages. It can be implemented centrally, with a single alert-batch engine capable of processing alerts from different sources; it can take resource-control decisions over alerts coming from different external systems; and it can leverage all available information by looking at all active alerts together [26].

3.2. Event-driven vs. batch processing

Two architectural patterns for implementing rule-based ITSM workflow automation are event-driven systems, in which rules are fired as events occur, and batch-processing systems, in which the rules are applied periodically to a set of relevant objects. Event-driven rule execution has long been associated with publish-subscribe architectures, including forward-chaining production systems. These systems have traditionally been complex, as rule furnaces must be assembled and tuned to give correct results, especially under high loads and when multiple events rush in bursts [27].

More recent work has, however, turned toward addressing the complexity of event-driven rules in ITSM implementations. According to previous studies, the ability to compose and manage large numbers of small, independent rules can introduce flexibility, simplicity, and transparency, as well as facilitate collaboration between different organizations. The properties of rule engines, such as retraceability and observability, can also assist the development of intelligent cybersecurity solutions [28].

An alternative to pure event-driven rule execution is the definition and periodic application of rule factories. In this approach, the rules are complex, implementing business logic and quality assurance, but the execution cycle is straightforward and fast [9]. Although this can lead to loss of content on crashes and limit responsiveness to events such as drastic changes in the IT park, it is simpler to manage than approaches with event-oriented high-load rule engines [29].

4. Rule Design and Management

Rule-based systems translate knowledge about an application domain into decision-making logic expressed in a form understood by a specialised computer program. Typically, this is a rule engine, which is designed to perform optimised forward or backward chaining over rules and facts. Rule engines and fully declarative systems permit rules to evolve rapidly. At a different level of abstraction, modelling languages such as Decision Model and Notation support the design of rule sets that are managed in rule factories attached to operational systems such as ITSMs [30].

Operational ITSM automation rules can be encoded in rule engines or expressed in more general-purpose business process management, event processing, or workflow management languages that link to underlying rule engines for decision-making and data look-up tasks [8]. The semantics of these languages enable reliable model-based analysis and testing that confirm the properties of interest prior to deployment. ITSM automation is often ambiguous in language but monotonic by nature, permitting specialised rule engines to be used [31]. Error checking can be provided by standard linting tools, and coverage analysis applied to unit tests, both using decision table representation styles. Exceptions to primary functions can thus readily be built and managed, enabling a achieves-failure-then-do-something-else style of design [32].

Equation 2) Step-by-step derivation of “decision factory” (batch / queued) model

Step 1: Queue the incoming events

Let events arrive over time and be added to queue Q:

QQ{e}

Step 2: Define a batch interval T

A decision factory runs every T minutes (or at fixed schedule):

  • Events arriving in [kT,k+1T) are processed in batch Bk.
  • Bk={ete[kT,k+1T)}

Step 3: Apply rules across the batch (global optimization / constraints)

Model as selecting actions aj for each event ejBk to maximize utility:

max{aj}ejBkUej,aj

subject to constraints:

ejBk1aj=assign-to-team gCapacityg

Step 4: The batching delay

If the batch runs every T, the expected waiting time before processing starts (assuming uniform arrivals) is:

EWbatch=T2
4.1. Rule modelling languages

Established modelling languages and software tools facilitate the specification of business rules for expert systems, with the objective of making imperative rules accessible to the business domain. The analogy is stricter, with a definition of a business-rule modelling language given as follows [33]: “A language that permits business users to define a business rule in order to make it available for use by rule engines located either within or external to the business modelling framework” (R. C. V. B. C. V. B. C. V. B. C. V. B. C. V. B. C. V. B. C. V. B. C. V. Bedini et al.).

The distinction between business-rule modelling languages and rule-modelling notations is brought out by Allen et al. in the context of modelling business rules for decision-support systems: “A business-rule modelling language provides a means for business users to create a set of business rules, which may be implemented as business processes or decision-support systems in a rule-modelling notation, no matter what its nature. The rule-modelling notation supports the formal specification of rules and their software-based management from a business-rule perspective [34].”

5. Workflow Automation Scenarios in ITSM

A variety of decision- and workflow-centric processes can benefit from rule-based automation tailored to decision capture, execution, and management. Rule-based systems can augment IT service management operations such as incident management and change management [35, 1].

Automation of incident management aims to increase throughput by generating accurate, low-risk, high-value responses to incidents while freeing human operators to focus on high-risk or consequential cases. Less than 20% of incidents can be completely automated without supervision, but the vast majority can be executed as decision factories—situations where rules provide explicit answers to most scenarios even if humans provide the decisions for a few. Typical rules capture the categorization and triage of incidents, and the orchestration of automated responses [7]. Even if the incident response is mostly automated, it may still require human confirmation because service owners need to give the green light for significant applications. If the incident requires simple queries for resolution, these requests can be generated automatically for any incident and assigned to the appropriate support group or team. The increasing volume of requests for password resets offers another example of incident resolution that can be streamlined or automated [36].

Automation of change management can streamline the operation while mitigating risks. The scope of automation often extends to risk assessment of individual changes and scheduling of changes in just a few steps. The operational and technical validation checklist typically remains under human control. Risk assessment can begin with a table of risk assessments for different change types, or a list or matrix of similar changes with associated levels of technical and operational risk. A change may still require the scheduling efforts of human operators, but these actors receive automated recommendations on the most suitable window [37].

5.1. Incident management

Various workflows in incident management are suitable for rule-based automation. Some of the simplest work items are the creation, acknowledgment, and escalation of incidents, which are often based on status changes or timeouts [6]. The rules invoked in these situations are typically trivial and indexed for efficiency [38]. Automated notifications to users of incident updates represent another common application. Although several of the service desk tools provide these notifications as built-in features, they are frequently ignored. Automated reporting of Open, High-Priority Incidents is another common work item. A list of such incidents is generated and emailed to a predetermined list of recipients on a scheduled basis. Policy dictates when these notifications are triggered [39].

Routing rules aim to direct incidents to the appropriate on-call individual, but these are often set up erroneously and require manual intervention to resolve problematic situations. A more sophisticated approach employs an off-line machine-learning model trained from historical assignment data to predict the target assignment group for incoming incidents [40]. The model output is cached for efficient access and incorporated into the rule process. The inference process yields a predicted assignment group that is checked against the existing data for accuracy. When the predicted assignment group is not the same as the actual group, an additional rule captures the condition and logs it for future retraining of the machine-learning model [41].

5.2. Change management

During change planning, rules for risk assessment and risk treatment may use information from incident management (notably the known error database) or the wider IT service conFigure uration system models. Review and authorization for changes are also suited to rules, particularly if a risk assessment is combined with information about impact on service levels [42]. To assist management activity the rules may use the service catalog and service level agreement models and other relevant knowledge. It is then appropriate to use risk and impact assessment rules to determine the required authorization level [43, 2].

Automated execution of changes can be considered as the information orchestrator calling action executors associated with the automation toolset. When treatment of an identified risk is planned and these rules have provided an escalation to a pre-defined authorization group, either for awareness or action, SQL queries to the records in the problem management module will also assist. Integration with the automation toolset should provide feedback on execution success or failure, allowing associated errors to be raised and managed [44].

6. Quality, Safety, and Risk Considerations

Particular attention must be paid to rules that control required manual activities, such as system provisioning. For example, in the context of incident management a rule may determine that the change request should be processed by the change manager instead of an automatic execution because the change is too complex or has too many dependencies [45]. An alternative approach for complex change requests is to use a two-step decision: if the rule factory deems the execution of the change request safe, then the rule engine directly executes the change request; otherwise it is escalated to the change manager. Whenever a manual step is involved the risk of human error increases significantly, which must be accounted for when designing the automation strategy [46].

In the event of a failure of the automated execution of a change request (e.g. incorrect provisioning), the process must be able to recover and continue without external intervention if possible. One alternative is to embed recovery logic in the execution state itself, but a better option is to define a corresponding negative scenario that is monitored by an incident management automation factory [47, 4]. For example, a rule may monitor the conFigure uration management database to assert that an application required by the change request has been provisioned correctly, and the creation of an incident in case of failure would complete the error-handling loop [48].

Equation 3) Step-by-step derivation of a latency/throughput model (illustrative, queueing-inspired)

Let:

  • λ = event arrival rate (events/min)
  • μ = processing capacity (events/min), with μ>λ

Event-driven expected processing delay (simple M/M/1 intuition)

A widely used approximation for mean time in system is:

ETevent1μ-λ

Add a base overhead t0 (parsing, rule evaluation setup, logging):

ETeventt0+1μ-λ

Batch decision-factory expected delay

Batch adds expected wait T/2:

ETbatcht0+T2+1μ-λ
6.1. Error handling and resilience

An error in rule evaluation can have severe consequences. Whenever an ITSM rule integration performs a non-null state change, this should be bypassed unless explicitly ruled safe [49]. There are usually two forms of rules that can trigger non-null state changes: corrective relaying rules, where an external event led to an undesirable state, and proactive relaying rules, where an external cause is detected that is probably going to lead to an undesirable state, warranting a preventive correction. In both scenarios, one wants to retain a level of confidence in the validity of the action imposed by the system [50].

Being able to relate different facts implicitly, resourcing a dependency graph of situational facts can help in automating error recovery [51]. If the dependency graph for a change is known, upon running an error-free clean-up a new clean situational fact can be generated and applied, allowing control to resume with a clean slate. The overall architecture can furthermore help achieving resilience, through automatic black-box rehabilitation. In accordance with the previous statement, as long a command is neither corrective nor proactive relaying, failing to evaluate should degrade gracefully without the need for any explicit error handling. The use of strategies and simplification rules, for instance, should relax to dead ends if completion no longer holds [52, 5].

As a result, a white-box system has been described that can be resourced as a black box. Black-box resilience emerges as a by-product of open architecture, while safety bugs are made detectable by describing them in a clean situation [53].

7. Conclusion

The proposal and examples provided illustrate how rule-based automation can easily and sustainably constrain workflows in ITSM processes other than incident management. Rule-based systems enable staging ATM change workflows without requiring switchover builds or DB schema changes, automatically promoting change request templates from ATM status to pre-production or production status based on upcoming schedules, other system releases of particular relevance, or simply expiration time.

Role and service group memberships are managed outside the ATM application but serviced with an initial integration that maps IT to business responsibilities [54].

An event-driven risk management system can automate much of the risk management process, categorising all ATM changes following normal service without the need for sign-off, automatically escalating the remaining changes for sign-off based on their risk classification, and preparing for the risk management board meeting by collecting and formatting the presentation material from the change tracking system. Adopting these patterns has the potential to reduce risk and speed ATM and other change workflows significantly. The requirement to input information twice or more in a temporary staging area, such as for change categorisation and risk assessment, is moot in practice, as current manual practices are error-prone and neglected [55].

Prioritising error handling is fundamental to delivering any kind of workflow automation component safely. Introduced as supervised pre-production playbooks beget unsupervised production playbooks, in full ATM mode or transition periods requiring residual supervision, it is essential to default failure recovery attempts by third parties and automatic escalation for management sign-off. With such measures in place, even ATM incidents caused by automated incidents can be accommodated [56].

7.1. Final Thoughts and Future Directions for ITSM Automation

Given the impetus from rising customer expectations and the consequent need for effective, efficient, and timely IT service delivery, rule-based automation of IT Service Management workflows offers a direction for increasing the throughput and quality of these services [57].

Rule-based automation requires • the systematisation and documentation of the industry policies and processes that guide IT service delivery; • an understanding of the risks of each [decision point] in the automation; and • an architecture that separates the code that makes decisions from the supporting machinery. By implementing these recommendations for three equally important ITSM workflows—incident management, problem management, and change management—the effort and risk in automating decisions are reduced. The quality of automation, measured by the level of throughput achieved, is then limited by the amount of bureaucratic work in these workflows, not the decision-making itself [58].

The increasing complexity and interconnectedness of IT systems will continue to increase the volume of decisions required to manage the systems, putting pressure on these subject-matter experts. Three strategies for dealing with this increasing demand will be improved tooling for the subject-matter expert, process-oriented documentation, and the reinforcement of training and practice. Of these, improved tooling can be applied most rapidly. A change in attitude is required: the improvement should incorporate and build upon existing decisions by the subject-matter experts, automation be within their control, and the risk from the uncontrolled application of system decisions understood and managed [59].

References

  1. Abiteboul, S., Hull, R., & Vianu, V. (1995). Foundations of databases. Addison-Wesley.
  2. Kummari, D. N. (2021). A Framework for Risk-Based Auditing in Intelligent Manufacturing Infrastructures. International Journal on Recent and Innovation Trends in Computing and Communication, 9(12), 245-262.
  3. Aho, A. V., Lam, M. S., Sethi, R., & Ullman, J. D. (2006). Compilers: Principles, techniques, and tools (2nd ed.). Pearson.
  4. Goutham Kumar Sheelam, Botlagunta Preethish Nandan, "Machine Learning Integration in Semiconductor Research and Manufacturing Pipelines," International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2021.101274.[CrossRef]
  5. Alur, R., & Dill, D. L. (1994). A theory of timed automata. Theoretical Computer Science, 126(2), 183–235.[CrossRef]
  6. Meda, R. (2021). Digital Infrastructure for Predictive Inventory Management in Retail Using Machine Learning. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI, 10.[CrossRef]
  7. Aral, S., Brynjolfsson, E., & Van Alstyne, M. (2013). Information, technology, and information worker productivity. Information Systems Research, 23(3), 849–867.[CrossRef]
  8. Inala, R. (2021). A New Paradigm in Retirement Solution Platforms: Leveraging Data Governance to Build AI-Ready Data Products. Journal of International Crisis and Risk Communication Research, 286-310.
  9. Ba, J. L., Kiros, J. R., & Hinton, G. E. (2016). Layer normalization. arXiv.
  10. Aitha, A. R. (2021). Optimizing Data Warehousing for Large Scale Policy Management Using Advanced ETL Frameworks.[CrossRef]
  11. Bajaj, S., & Mylopoulos, J. (2016). The role of business rules in agile requirements engineering. Requirements Engineering, 21(4), 389–410.
  12. Segireddy, A. R. (2021). Containerization and Microservices in Payment Systems: A Study of Kubernetes and Docker in Financial Applications. Universal Journal of Business and Management, 1(1), 1–17. Retrieved from https://www.scipublications.com/journal/index.php/ujbm/article/view/1352.[CrossRef]
  13. Barocas, S., Hardt, M., & Narayanan, A. (2019). Fairness and machine learning: Limitations and opportunities. MIT Press.
  14. Gottimukkala, V. R. R. (2021). Digital Signal Processing Challenges in Financial Messaging Systems: Case Studies in High-Volume SWIFT Flows.[CrossRef]
  15. Berends, J., Kratzke, N., & Quint, P. (2020). Decision factories for process automation: Architectural patterns and industrial implications. Journal of Systems and Software, 169, 110712.[CrossRef]
  16. Amistapuram, K. (2021). Digital Transformation in Insurance: Migrating Enterprise Policy Systems to .NET Core. Universal Journal of Computer Sciences and Communications, 1(1), 1–17. Retrieved from https://www.scipublications.com/journal/index.php/ujcsc/article/view/1348.[CrossRef]
  17. Bhattacharya, P., & Ganguly, N. (2016). Rule mining for operational decision automation: A survey. ACM Computing Surveys, 49(4), 1–36.[CrossRef]
  18. Rongali, S. K. (2021). Cloud-Native API-Led Integration Using MuleSoft and .NET for Scalable Healthcare Interoperability. Available at SSRN 5814563.
  19. Birkhoff, G. (1940). Lattice theory. American Mathematical Society.[CrossRef]
  20. Varri, D. B. S. (2021). Cloud-Native Security Architecture for Hybrid Healthcare Infrastructure. Available at SSRN 5785982.[CrossRef]
  21. Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford University Press.
  22. Yandamuri, U. S. (2021). A Comparative Study of Traditional Reporting Systems versus Real-Time Analytics Dashboards in Enterprise Operations. Universal Journal of Business and Management, 1(1), 1–13. Retrieved from https://www.scipublications.com/journal/index.php/ujbm/article/view/1357.[CrossRef]
  23. Brodie, M. L., & Stonebraker, M. (1995). Migrating legacy systems: Gateways, interfaces, and the incremental approach. Morgan Kaufmann.
  24. Vadisetty, R., Polamarasetti, A., Guntupalli, R., Rongali, S. K., Raghunath, V., Jyothi, V. K., & Kudithipudi, K. (2021). Legal and Ethical Considerations for Hosting GenAI on the Cloud. International Journal of AI, BigData, Computational and Management Studies, 2(2), 28-34.[CrossRef]
  25. Cardoso, J., & Sheth, A. (2006). Semantic e-workflow composition. Journal of Intelligent Information Systems, 26(3), 191–225.[CrossRef]
  26. Koppolu, H. K. R. (2021). Data-Driven Strategies for Optimizing Customer Journeys Across Telecom and Healthcare Industries. International Journal Of Engineering And Computer Science, 10(12).
  27. Chen, G., & Kotz, D. (2000). A survey of context-aware mobile computing research. Dartmouth Computer Science Technical Report TR2000-381.
  28. Chava, K., Chakilam, C., & Recharla, M. (2021). Machine Learning Models for Early Disease Detection: A Big Data Approach to Personalized Healthcare. International Journal of Engineering and Computer Science, 10(12), 25709–25730. https://doi.org/10.18535/ijecs.v10i12.4678.[CrossRef]
  29. Clercq, D. D., & Denecker, M. (2013). FO(.) logic and its applications. Theory and Practice of Logic Programming, 13(4–5), 659–673.
  30. Sriram, H. K., ADUSUPALLI, B., & Malempati, M. (2021). Revolutionizing Risk Assessment and Financial Ecosystems with Smart Automation, Secure Digital Solutions, and Advanced Analytical Frameworks.[CrossRef]
  31. Cook, D. J., Augusto, J. C., & Jakkula, V. R. (2009). Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing, 5(4), 277–298.[CrossRef]
  32. Paleti, S. (2021). Cognitive Core Banking: A Data-Engineered, AI-Infused Architecture for Proactive Risk Compliance Management. AI-Infused Architecture for Proactive Risk Compliance Management (December 21, 2021).[CrossRef]
  33. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.[CrossRef]
  34. Kaulwar, P. K. (2021). From Code to Counsel: Deep Learning and Data Engineering Synergy for Intelligent Tax Strategy Generation. Journal of International Crisis and Risk Communication Research, 1-20.
  35. DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30.[CrossRef]
  36. Rao Suura, S. (2021). Personalized Health Care Decisions Powered By Big Data And Generative Artificial Intelligence In Genomic Diagnostics. Journal of Survey in Fisheries Sciences. https://doi. org/10.53555/sfs. v7i3, 3558.[CrossRef]
  37. Dey, A. K., Abowd, G. D., & Salber, D. (2001). A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human–Computer Interaction, 16(2–4), 97–166.[CrossRef]
  38. Annapareddy, V. N. (2021). Transforming Renewable Energy and Educational Technologies Through AI, Machine Learning, Big Data Analytics, and Cloud-Based IT Integrations. Machine Learning, Big Data Analytics, and Cloud-Based IT Integrations (December 30, 2021).
  39. Ebert, C., & Louridas, P. (2020). DevOps. IEEE Software, 37(4), 94–96.[CrossRef]
  40. Endres, A., & Rombach, D. (2003). A handbook of software and systems engineering. Pearson.
  41. Challa, K. (2021). Cloud Native Architecture for Scalable Fintech Applications with Real Time Payments. International Journal Of Engineering And Computer Science, 10(12).[CrossRef]
  42. Feldman, S. I. (1979). Make—A program for maintaining computer programs. Software: Practice and Experience, 9(4), 255–265.[CrossRef]
  43. Pamisetty, A. (2021). A comparative study of cloud platforms for scalable infrastructure in food distribution supply chains.
  44. Floridi, L., & Cowls, J. (2019). A unified framework of five principles for AI in society. Harvard Data Science Review, 1(1).[CrossRef]
  45. Adusupalli, B. (2021). Multi-Agent Advisory Networks: Redefining Insurance Consulting with Collaborative Agentic AI Systems. Journal of International Crisis and Risk Communication Research, 45-67.
  46. Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of reusable object-oriented software. Addison-Wesley.
  47. Botlagunta Preethish Nandan. (2021). Enhancing Chip Performance Through Predictive Analytics and Automated Design Verification. Journal of International Crisis and Risk Communication Research , 265–285. https://doi.org/10.63278/jicrcr.vi.3040.
  48. Garlan, D., & Shaw, M. (1993). An introduction to software architecture. In Advances in software engineering and knowledge engineering (pp. 1–39). World Scientific.[CrossRef]
  49. Pamisetty, V. (2021). A Cloud-Integrated Framework for Efficient Government Financial Management and Unclaimed Asset Recovery. Available at SSRN 5272351.
  50. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.
  51. Adusupalli, B., Singireddy, S., Sriram, H. K., Kaulwar, P. K., & Malempati, M. (2021). Revolutionizing Risk Assessment and Financial Ecosystems with Smart Automation, Secure Digital Solutions, and Advanced Analytical Frameworks. Universal Journal of Finance and Economics, 1(1), 101-122.[CrossRef]
  52. Harel, D. (1987). Statecharts: A visual formalism for complex systems. Science of Computer Programming, 8(3), 231–274.[CrossRef]
  53. Chava, K., Chakilam, C., & Recharla, M. (2021). Machine Learning Models for Early Disease Detection: A Big Data Approach to Personalized Healthcare. International Journal of Engineering and Computer Science, 10(12), 25709–25730. https://doi.org/10.18535/ijecs.v10i12.4678.[CrossRef]
  54. Hinton, G. E., Osindero, S., & Teh, Y.-W. (2006). A fast learning algorithm for deep belief nets. Neural Computation, 18(7), 1527–1554.[CrossRef] [PubMed]
  55. Kommaragiri, V. B., Gadi, A. L., Kannan, S., & Preethish Nanan, B. (2021). Advanced Computational Technologies in Vehicle Production. Digital Connectivity, and Sustainable Transportation: Innovations in Intelligent Systems, Eco-Friendly Manufacturing, and Financial Optimization.
  56. Hohpe, G., & Woolf, B. (2003). Enterprise integration patterns: Designing, building, and deploying messaging solutions. Addison-Wesley.
  57. Paleti, S., Singireddy, J., Dodda, A., Burugulla, J. K. R., & Challa, K. (2021). Innovative Financial Technologies: Strengthening Compliance, Secure Transactions, and Intelligent Advisory Systems Through AI-Driven Automation and Scalable Data Architectures. Secure Transactions, and Intelligent Advisory Systems Through AI-Driven Automation and Scalable Data Architectures (December 27, 2021).[CrossRef]
  58. Humphrey, W. S. (1989). Managing the software process. Addison-Wesley.[CrossRef]
  59. IEEE. (2014). IEEE standard for software lifecycle processes (IEEE Std 12207-2008). IEEE.
Article metrics
Views
1
Downloads
0

Cite This Article

APA Style
Kolla, S. H. (2020). Rule-Based Automation for IT Service Management Workflows. Online Journal of Engineering Sciences, 1(1), 1-14. https://doi.org/10.31586/ojes.2020.1360
ACS Style
Kolla, S. H. Rule-Based Automation for IT Service Management Workflows. Online Journal of Engineering Sciences 2020 1(1), 1-14. https://doi.org/10.31586/ojes.2020.1360
Chicago/Turabian Style
Kolla, Siva Hemanth. 2020. "Rule-Based Automation for IT Service Management Workflows". Online Journal of Engineering Sciences 1, no. 1: 1-14. https://doi.org/10.31586/ojes.2020.1360
AMA Style
Kolla SH. Rule-Based Automation for IT Service Management Workflows. Online Journal of Engineering Sciences. 2020; 1(1):1-14. https://doi.org/10.31586/ojes.2020.1360
@Article{ojes1360,
AUTHOR = {Kolla, Siva Hemanth},
TITLE = {Rule-Based Automation for IT Service Management Workflows},
JOURNAL = {Online Journal of Engineering Sciences},
VOLUME = {1},
YEAR = {2020},
NUMBER = {1},
PAGES = {1-14},
URL = {https://www.scipublications.com/journal/index.php/OJES/article/view/1360},
ISSN = {2833-0145},
DOI = {10.31586/ojes.2020.1360},
ABSTRACT = {The automation of IT Service Management (ITSM) workflows using explicit rules and data has been established for years. Domain-specific rule engines interpret rules written in declarative rule modelling languages and generate forwarding arrows to process event streams and support decision making. Such automation is augmented by rule-driven Quality Assurance for correctness, safety, and risk management. The service desk is the onshore base of an ITSM supply chain. An end-to-end incident response service resolves incidents using only onshore resources and employs back office teams to help with unresolvable incidents. The forward factories of rule-based automation for ticket processing service are identified. Several rule-based workflows in incident and change management have been published. Further glimpses of the future across all ITSM workflows are provided based on training in an online ITSM service with automated operations. Rule engines are specialised components that direct the processing of data flows according to pre-defined rules. Decision factories complement the more common event-driven rule engines. While event processing occurs below the polling frequency of the source, rules in decision factories are triggered based on the arrival of data. These factories are applied in ITSM for risk and safety evaluation and quality assurance. Rule-enriched architectures incorporate domain-specific modelling languages to ensure correctness with respect to qualitative quality attributes. Dedicated factories provide resilience, detect slack or over-utilisation, and offer point-in-time assurance and testing.},
}
%0 Journal Article
%A Kolla, Siva Hemanth
%D 2020
%J Online Journal of Engineering Sciences

%@ 2833-0145
%V 1
%N 1
%P 1-14

%T Rule-Based Automation for IT Service Management Workflows
%M doi:10.31586/ojes.2020.1360
%U https://www.scipublications.com/journal/index.php/OJES/article/view/1360
TY  - JOUR
AU  - Kolla, Siva Hemanth
TI  - Rule-Based Automation for IT Service Management Workflows
T2  - Online Journal of Engineering Sciences
PY  - 2020
VL  - 1
IS  - 1
SN  - 2833-0145
SP  - 1
EP  - 14
UR  - https://www.scipublications.com/journal/index.php/OJES/article/view/1360
AB  - The automation of IT Service Management (ITSM) workflows using explicit rules and data has been established for years. Domain-specific rule engines interpret rules written in declarative rule modelling languages and generate forwarding arrows to process event streams and support decision making. Such automation is augmented by rule-driven Quality Assurance for correctness, safety, and risk management. The service desk is the onshore base of an ITSM supply chain. An end-to-end incident response service resolves incidents using only onshore resources and employs back office teams to help with unresolvable incidents. The forward factories of rule-based automation for ticket processing service are identified. Several rule-based workflows in incident and change management have been published. Further glimpses of the future across all ITSM workflows are provided based on training in an online ITSM service with automated operations. Rule engines are specialised components that direct the processing of data flows according to pre-defined rules. Decision factories complement the more common event-driven rule engines. While event processing occurs below the polling frequency of the source, rules in decision factories are triggered based on the arrival of data. These factories are applied in ITSM for risk and safety evaluation and quality assurance. Rule-enriched architectures incorporate domain-specific modelling languages to ensure correctness with respect to qualitative quality attributes. Dedicated factories provide resilience, detect slack or over-utilisation, and offer point-in-time assurance and testing.
DO  - Rule-Based Automation for IT Service Management Workflows
TI  - 10.31586/ojes.2020.1360
ER  - 
  1. Abiteboul, S., Hull, R., & Vianu, V. (1995). Foundations of databases. Addison-Wesley.
  2. Kummari, D. N. (2021). A Framework for Risk-Based Auditing in Intelligent Manufacturing Infrastructures. International Journal on Recent and Innovation Trends in Computing and Communication, 9(12), 245-262.
  3. Aho, A. V., Lam, M. S., Sethi, R., & Ullman, J. D. (2006). Compilers: Principles, techniques, and tools (2nd ed.). Pearson.
  4. Goutham Kumar Sheelam, Botlagunta Preethish Nandan, "Machine Learning Integration in Semiconductor Research and Manufacturing Pipelines," International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2021.101274.[CrossRef]
  5. Alur, R., & Dill, D. L. (1994). A theory of timed automata. Theoretical Computer Science, 126(2), 183–235.[CrossRef]
  6. Meda, R. (2021). Digital Infrastructure for Predictive Inventory Management in Retail Using Machine Learning. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI, 10.[CrossRef]
  7. Aral, S., Brynjolfsson, E., & Van Alstyne, M. (2013). Information, technology, and information worker productivity. Information Systems Research, 23(3), 849–867.[CrossRef]
  8. Inala, R. (2021). A New Paradigm in Retirement Solution Platforms: Leveraging Data Governance to Build AI-Ready Data Products. Journal of International Crisis and Risk Communication Research, 286-310.
  9. Ba, J. L., Kiros, J. R., & Hinton, G. E. (2016). Layer normalization. arXiv.
  10. Aitha, A. R. (2021). Optimizing Data Warehousing for Large Scale Policy Management Using Advanced ETL Frameworks.[CrossRef]
  11. Bajaj, S., & Mylopoulos, J. (2016). The role of business rules in agile requirements engineering. Requirements Engineering, 21(4), 389–410.
  12. Segireddy, A. R. (2021). Containerization and Microservices in Payment Systems: A Study of Kubernetes and Docker in Financial Applications. Universal Journal of Business and Management, 1(1), 1–17. Retrieved from https://www.scipublications.com/journal/index.php/ujbm/article/view/1352.[CrossRef]
  13. Barocas, S., Hardt, M., & Narayanan, A. (2019). Fairness and machine learning: Limitations and opportunities. MIT Press.
  14. Gottimukkala, V. R. R. (2021). Digital Signal Processing Challenges in Financial Messaging Systems: Case Studies in High-Volume SWIFT Flows.[CrossRef]
  15. Berends, J., Kratzke, N., & Quint, P. (2020). Decision factories for process automation: Architectural patterns and industrial implications. Journal of Systems and Software, 169, 110712.[CrossRef]
  16. Amistapuram, K. (2021). Digital Transformation in Insurance: Migrating Enterprise Policy Systems to .NET Core. Universal Journal of Computer Sciences and Communications, 1(1), 1–17. Retrieved from https://www.scipublications.com/journal/index.php/ujcsc/article/view/1348.[CrossRef]
  17. Bhattacharya, P., & Ganguly, N. (2016). Rule mining for operational decision automation: A survey. ACM Computing Surveys, 49(4), 1–36.[CrossRef]
  18. Rongali, S. K. (2021). Cloud-Native API-Led Integration Using MuleSoft and .NET for Scalable Healthcare Interoperability. Available at SSRN 5814563.
  19. Birkhoff, G. (1940). Lattice theory. American Mathematical Society.[CrossRef]
  20. Varri, D. B. S. (2021). Cloud-Native Security Architecture for Hybrid Healthcare Infrastructure. Available at SSRN 5785982.[CrossRef]
  21. Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford University Press.
  22. Yandamuri, U. S. (2021). A Comparative Study of Traditional Reporting Systems versus Real-Time Analytics Dashboards in Enterprise Operations. Universal Journal of Business and Management, 1(1), 1–13. Retrieved from https://www.scipublications.com/journal/index.php/ujbm/article/view/1357.[CrossRef]
  23. Brodie, M. L., & Stonebraker, M. (1995). Migrating legacy systems: Gateways, interfaces, and the incremental approach. Morgan Kaufmann.
  24. Vadisetty, R., Polamarasetti, A., Guntupalli, R., Rongali, S. K., Raghunath, V., Jyothi, V. K., & Kudithipudi, K. (2021). Legal and Ethical Considerations for Hosting GenAI on the Cloud. International Journal of AI, BigData, Computational and Management Studies, 2(2), 28-34.[CrossRef]
  25. Cardoso, J., & Sheth, A. (2006). Semantic e-workflow composition. Journal of Intelligent Information Systems, 26(3), 191–225.[CrossRef]
  26. Koppolu, H. K. R. (2021). Data-Driven Strategies for Optimizing Customer Journeys Across Telecom and Healthcare Industries. International Journal Of Engineering And Computer Science, 10(12).
  27. Chen, G., & Kotz, D. (2000). A survey of context-aware mobile computing research. Dartmouth Computer Science Technical Report TR2000-381.
  28. Chava, K., Chakilam, C., & Recharla, M. (2021). Machine Learning Models for Early Disease Detection: A Big Data Approach to Personalized Healthcare. International Journal of Engineering and Computer Science, 10(12), 25709–25730. https://doi.org/10.18535/ijecs.v10i12.4678.[CrossRef]
  29. Clercq, D. D., & Denecker, M. (2013). FO(.) logic and its applications. Theory and Practice of Logic Programming, 13(4–5), 659–673.
  30. Sriram, H. K., ADUSUPALLI, B., & Malempati, M. (2021). Revolutionizing Risk Assessment and Financial Ecosystems with Smart Automation, Secure Digital Solutions, and Advanced Analytical Frameworks.[CrossRef]
  31. Cook, D. J., Augusto, J. C., & Jakkula, V. R. (2009). Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing, 5(4), 277–298.[CrossRef]
  32. Paleti, S. (2021). Cognitive Core Banking: A Data-Engineered, AI-Infused Architecture for Proactive Risk Compliance Management. AI-Infused Architecture for Proactive Risk Compliance Management (December 21, 2021).[CrossRef]
  33. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.[CrossRef]
  34. Kaulwar, P. K. (2021). From Code to Counsel: Deep Learning and Data Engineering Synergy for Intelligent Tax Strategy Generation. Journal of International Crisis and Risk Communication Research, 1-20.
  35. DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30.[CrossRef]
  36. Rao Suura, S. (2021). Personalized Health Care Decisions Powered By Big Data And Generative Artificial Intelligence In Genomic Diagnostics. Journal of Survey in Fisheries Sciences. https://doi. org/10.53555/sfs. v7i3, 3558.[CrossRef]
  37. Dey, A. K., Abowd, G. D., & Salber, D. (2001). A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human–Computer Interaction, 16(2–4), 97–166.[CrossRef]
  38. Annapareddy, V. N. (2021). Transforming Renewable Energy and Educational Technologies Through AI, Machine Learning, Big Data Analytics, and Cloud-Based IT Integrations. Machine Learning, Big Data Analytics, and Cloud-Based IT Integrations (December 30, 2021).
  39. Ebert, C., & Louridas, P. (2020). DevOps. IEEE Software, 37(4), 94–96.[CrossRef]
  40. Endres, A., & Rombach, D. (2003). A handbook of software and systems engineering. Pearson.
  41. Challa, K. (2021). Cloud Native Architecture for Scalable Fintech Applications with Real Time Payments. International Journal Of Engineering And Computer Science, 10(12).[CrossRef]
  42. Feldman, S. I. (1979). Make—A program for maintaining computer programs. Software: Practice and Experience, 9(4), 255–265.[CrossRef]
  43. Pamisetty, A. (2021). A comparative study of cloud platforms for scalable infrastructure in food distribution supply chains.
  44. Floridi, L., & Cowls, J. (2019). A unified framework of five principles for AI in society. Harvard Data Science Review, 1(1).[CrossRef]
  45. Adusupalli, B. (2021). Multi-Agent Advisory Networks: Redefining Insurance Consulting with Collaborative Agentic AI Systems. Journal of International Crisis and Risk Communication Research, 45-67.
  46. Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of reusable object-oriented software. Addison-Wesley.
  47. Botlagunta Preethish Nandan. (2021). Enhancing Chip Performance Through Predictive Analytics and Automated Design Verification. Journal of International Crisis and Risk Communication Research , 265–285. https://doi.org/10.63278/jicrcr.vi.3040.
  48. Garlan, D., & Shaw, M. (1993). An introduction to software architecture. In Advances in software engineering and knowledge engineering (pp. 1–39). World Scientific.[CrossRef]
  49. Pamisetty, V. (2021). A Cloud-Integrated Framework for Efficient Government Financial Management and Unclaimed Asset Recovery. Available at SSRN 5272351.
  50. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.
  51. Adusupalli, B., Singireddy, S., Sriram, H. K., Kaulwar, P. K., & Malempati, M. (2021). Revolutionizing Risk Assessment and Financial Ecosystems with Smart Automation, Secure Digital Solutions, and Advanced Analytical Frameworks. Universal Journal of Finance and Economics, 1(1), 101-122.[CrossRef]
  52. Harel, D. (1987). Statecharts: A visual formalism for complex systems. Science of Computer Programming, 8(3), 231–274.[CrossRef]
  53. Chava, K., Chakilam, C., & Recharla, M. (2021). Machine Learning Models for Early Disease Detection: A Big Data Approach to Personalized Healthcare. International Journal of Engineering and Computer Science, 10(12), 25709–25730. https://doi.org/10.18535/ijecs.v10i12.4678.[CrossRef]
  54. Hinton, G. E., Osindero, S., & Teh, Y.-W. (2006). A fast learning algorithm for deep belief nets. Neural Computation, 18(7), 1527–1554.[CrossRef] [PubMed]
  55. Kommaragiri, V. B., Gadi, A. L., Kannan, S., & Preethish Nanan, B. (2021). Advanced Computational Technologies in Vehicle Production. Digital Connectivity, and Sustainable Transportation: Innovations in Intelligent Systems, Eco-Friendly Manufacturing, and Financial Optimization.
  56. Hohpe, G., & Woolf, B. (2003). Enterprise integration patterns: Designing, building, and deploying messaging solutions. Addison-Wesley.
  57. Paleti, S., Singireddy, J., Dodda, A., Burugulla, J. K. R., & Challa, K. (2021). Innovative Financial Technologies: Strengthening Compliance, Secure Transactions, and Intelligent Advisory Systems Through AI-Driven Automation and Scalable Data Architectures. Secure Transactions, and Intelligent Advisory Systems Through AI-Driven Automation and Scalable Data Architectures (December 27, 2021).[CrossRef]
  58. Humphrey, W. S. (1989). Managing the software process. Addison-Wesley.[CrossRef]
  59. IEEE. (2014). IEEE standard for software lifecycle processes (IEEE Std 12207-2008). IEEE.