The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today many business processes are based on IT systems. These systems are exposed to different threats, which may lead to failures of critical business processes. Thus, enterprises prepare themselves against threats and failures of critical IT systems by means of Business Continuity Management (BCM). The phenomenon of outsourcing introduces a new dimension to BCM. In an outsourcing relationship the...
Global Software Engineering (GSE) research contains few examples consciously applying what Glass and colleagues have termed an 'evaluative-critical' approach. In this study we apply dilemma analysis to conduct a critical review of a major (and ongoing) near shore Business Process Outsourcing project in New Zealand. The project has become so troubled that a Government Minister has recently been assigned...
Outsourcing is a well-accepted and commonly used business practice. Practitioners and scholars acknowledge that there are not only benefits but also risks involved in the external production of company services. But are the risks the same for different types of outsourcing? This paper explores how senior management evaluates the risks of business process outsourcing (BPO), compared to those of IT...
Vendor selection is one of critical decision issues in the theoretical and practical circles. Many researchers in the field of management have paid attention to the vendor selection. This article applies Fuzzy-AHP(FAHP) to evaluate vendors in IS outsourcing projects based on risk assessment. In applying the method, it shows that it is very well suited as a decision-making tool for outsourcing vendor...
In recent years, information system (IS) outsourcing is increasing in business organizations as a way to govern their operation. One of the problem of IS outsourcing is how to find a vendor who has the highest risks/benefits ratio. This article applies AHP-DEA to evaluate vendors in IS outsourcing projects based on risk and benefit assessment.
Logistics outsourcing, as a new logistics mode, plays an important role in focusing resources on core business, and also reduces logistics costs and improves customer satisfaction. Therefore, more and more SMEs pay close attention to logistics outsourcing. However, when the enterprise selected the logistics outsourcing, there are also many risks. The success of logistics outsourcing depends largely...
Crowdsourcing was defined as the act of taking tasks traditionally performed by an employee or contractor, and outsourcing them to a group (crowd) of people or community in the form of an open call. The legal issues of crowdsourcing is mainly manifested in three aspects: the legal relationship between contract-issuing party and WitKey, the risk of misuse of personal information and the protection...
Effectively and efficiently performing business processes is a key success factor for achieving economic entrepreneurial goals. Amongst others, the argument of more stringent cost pressure lead companies to enforce outsourcing activities. Thus, the management of services - both, from the service requester and provider point of view - gained importance. However, considering only economic aspects is...
Logistics outsourcing risk is emerging as a key challenge to logistics management in supply chain. The risk analysis is a critical first step in managing logistics outsourcing risk. The main purpose of this paper is to study the risk associated with logistics outsourcing using system dynamics theory. Firstly, we analyze the logistics outsourcing risk from the system thinking perspective. Secondly,...
With the promised benefits for outsourcing IT security services also come major risks. IT security outsourcing decisions possess major legal, organizational and contractual risks. Drawing on National Institute of Standards and Technology (NIST) publications as the principal source of information, supplemented by interviews with key security personnel, this research reviewed and extracted IT security...
Offshoring (offshore outsourcing) is increasingly used in software-centric projects, specifically in the development phases of software projects. Using a mixture of onsite local staff and remote offshore staff in business-centric projects, such as business consulting, requirements elicitation and software testing, put many challenges to team organizing, charter definition and offshore personnel skills...
We have developed a model to investigate the technology innovation effects of increased outsourcing of production on a low cost region. Increase in profits and reduction in the resource requirement by adapting related innovation could spur the increase of outsourcing. Firms in lower cost region can develop the capacity of innovation through dasialearning by doingpsila and even investment in R&D...
Based on the relationship exchange theory, we categorize the characteristics of IT outsourcing partnership into six dimensions by reviewing and analyzing the literatures. There are trust, flexibility, communication, cooperation, management, risk and benefit share. Based on the six characteristics of partnership, competent and environmental factors including providerpsilas factors, customerpsilas factors...
Offshore outsourcing has become a cost-saving measure in modern software businesses. However, there are numerous risks associated in this business model. Among these risks, "mum effect" could be one of the serious threats to software development projects. This paper extends our previous work on the perceived probability of "mum effect" in offshore outsourcing scenarios based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.