This explanation is taken from ITSM - An Overview - Proactive ITSM White Paper - Issue 3, September 11, 2002.