SlideShare a Scribd company logo
1 of 17
You have been hired as the CSO (Chief Security Officer) for an
organization. Your job is to develop a very brief computer and
internet security policy for the organization that covers the
following areas:
· Computer and email acceptable use policy
· Internet acceptable use policy
Make sure you are sufficiently specific in addressing each area.
There are plenty of security policy and guideline templates
available online for you to use as a reference or for guidance.
Your plan should reflect the business model and corporate
culture of a specific organization that you select.
Include at least 3 scholarly references in addition to the course
textbook. The UC Library is a good place to find these
references. At least two of the references cited need to be peer-
reviewed scholarly journal articles from the library.
Your paper should meet the following requirements:
• Be approximately 2-4 pages in length, not including the
required cover page and reference page.
• Follow APA6 guidelines. Your paper should include an
ABSTRACT, a body with fully developed content, and a
conclusion.
• Support your answers with the readings from the course and at
least three scholarly journal articles to support your positions,
claims, and observations, in addition to your textbook. The UC
Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using
excellent grammar and style techniques. You are being graded
in part on the quality of your writing.
Managing and Using Information Systems:
A Strategic Approach – Sixth Edition
Keri Pearlson, Carol Saunders,
and Dennis Galletta
© Copyright 2016
John Wiley & Sons, Inc.
1
Chapter 10
Information Systems Sourcing
2
© 2016 John Wiley & Sons, Inc.
2
Kellwood Opening Case
Why did Kellwood outsource?
Why did Kellwood decide to backsource after 13 years?
What was the result?
3
© 2016 John Wiley & Sons, Inc.
They wanted to integrate 12 acquisitions with different systems
Kellwood was purchased by Sun Capital Partners. COO wanted
to consolidate to reduce costs and standardize
Result was savings of $3.6 million per year, or 17% of total IS
expenses
3
Sourcing Decision Framework
4
© 2016 John Wiley & Sons, Inc.
Sourcing OptionsInsourcingOutsourcingDomesticDomestic in-
house production
Company produces its
products domestically without any outside contractsDomestic
outsourcing
Company uses services supplied by another domestic-based
companyOffshoreOffshore in-house sourcing
Company uses services supplied by its own foreign-based
affiliate (subsidiary)Offshore outsourcing
Company uses services supplied by an unaffiliated foreign-
based company
Figure 10.3. Different Forms of Sourcing.
(Source: http://www.dbresearch.com/
servlet/reweb2.ReWEB?rwsite=DBR_INTERNET_EN-PROD)
5
© 2016 John Wiley & Sons, Inc.
5
INSOURCING
A firm provides IS services or develops IS in its own in-house
IS organization
6
© 2016 John Wiley & Sons, Inc.
6
IT Outsourcing
With IT, there is equipment and personnel involved
Equipment and facilities are sold to outside vendors
Personnel might be hired by outside vendors
Services are hired from the vendors
Common length of agreement: 10 years
7
© 2016 John Wiley & Sons, Inc.
7
Insourcing DriversInsourcing ChallengesCore competencies
related to systems
Confidentiality or sensitive system components or services
Time available in-house to develop software
Expertise for software development in-houseInadequate support
from top management to acquire needed resources
Temptation from finding a reliable, competent outsourcing
provider
Insourcing drivers and challenges
8
© 2016 John Wiley & Sons, Inc.
8
Economics of Outsourcing
Benefits:
Sell equipment, buildings (large cash inflow)
Downsized payroll – outsourcer hires employees
Costs:
Services provided for a fee
Fixed costs usually over 10-year term
9
© 2016 John Wiley & Sons, Inc.
9
Drivers Disadvantages Offer cost savings
Offer service quality
Ease transition to new technologies
Offer better strategic focus
Provide better mgmt of IS staff
Handle peaks
Consolidate data centers
Infusion of cash Abdication of control
High switching costs
Lack of technological innovation
Loss of strategic advantage
Reliance on outsourcer
Problems with security/confidentiality
Evaporation of cost savings
Drivers and disadvantages of outsourcing
10
© 2016 John Wiley & Sons, Inc.
10
Decisions about How to Outsource
Successfully
Decisions about whether or not to outsource need care and
deliberation.
Requires numerous other decisions about mitigating outsourcing
risks.
Three major decision areas: selection, contracting, and scope.
Selection: find compatible providers
Contracting:
Try for flexible management terms
Try for shorter (3-5 year) contracts
Try for SLAs (service level agreements on performance)
Scope – Determine if full or partial outsourcing
11
© 2016 John Wiley & Sons, Inc.
Offshoring
Short for outsourcing offshore
Definition:
When the MIS organization uses contractor services in a distant
land. (Insourcing offshore would be your own dept offshore)
Substantial potential cost savings through reduced labor costs.
Some countries offer a very well educated labor force.
Implementation of quality standards:
Six Sigma
ISO 9001
12
© 2016 John Wiley & Sons, Inc.
12
Selecting an Offshoring Destination
About 100 countries are now exporting software services and
products.
What makes countries attractive for offshoring?
High English language proficiency.
Countries that are peaceful/politically stable.
Countries with lower crime rates.
Countries with friendly relationships.
Security and/or trade restrictions.
Protects intellectual property
Level of technical infrastructure available.
Good, efficient labor force
Once a country is selected, the particular city in that country
needs to be assessed as well.
13
© 2016 John Wiley & Sons, Inc.
13
Selecting an Offshoring Destination
Countries like India make an entire industry of offshoring.
Software Engineering Institute’s Capability Maturity Model
(CMM).
Level 1: the software development processes are immature,
bordering on chaotic.
Level 5: processes are quite mature, sophisticated, systematic,
reliable
Indian firms are well known for their CMM Level 5 software
development processes, making them desirable
14
© 2016 John Wiley & Sons, Inc.
14
Offshore Destination-
Development Tiers
Carmel and Tjia suggest that there are three tiers of software
exporting nations:
Tier 1: Mature.
United Kingdom, United States, Japan, Germany, France,
Canada, the Netherlands, Sweden, Finland, India, Ireland,
Israel, China, and Russia.
Tier 2: Emerging.
Brazil, Costa Rica, South Korea, and many Eastern European
countries.
Tier 3: Infant.
Cuba, Vietnam, Jordan, and 15 to 25 others.
Tiers: based on industrial maturity, the extent of clustering of
some critical mass of software enterprises, and export revenues.
The higher tiered countries have higher levels of skills and
higher costs.
© 2016 John Wiley & Sons, Inc.
15
15
Farshoring
Definition: sourcing service work to a foreign, lower-wage
country that is relatively far away in distance or time zone.
Client company hopes to benefit from one or more ways:
Big cost savings due to exchange rates, labor costs, government
subsidies, etc.
For the US and UK, India and China are popular
Oddly, India and China also offshore to other locations
16
© 2016 John Wiley & Sons, Inc.
16
Nearshoring
Definition: sourcing service work to a foreign, lower-wage
country that is relatively close in distance or time zone.
Client company hopes to benefit from one or more ways of
being close:
geographically, temporally, culturally, linguistically,
economically, politically or from historical linkages.
Distance and language matter.
There are three major global nearshore clusters:
20 nations around the U.S., and Canada
27 countries around Western Europe
smaller cluster of three countries in East Asia
17
© 2016 John Wiley & Sons, Inc.
17
Captive Centers
An overseas subsidiary that is set up to serve the parent
company.
Alternative to offshoring or nearshoring.
Four major stategies that are being employed:
Hybrid Captive – performs core business processes for parent
company but outsources noncore work to offshore provider
Shared Captive - performs work for both parent company and
external customers.
Divested captive - have a large enough scale and scope that it
could be sold for a profit by the parent company.
Terminated Captive - has been shut down, usually because its
inferior service was hurting the parent company’s reputation.
18
© 2016 John Wiley & Sons, Inc.
18
Backsourcing
When a company takes back in-house, previously outsourced, IS
assets, activities, and skills.
Partial or complete reversal
Many companies have backsourced such as Continental
Airlines, Cable and Wireless, and Halifax Bank of Scotland.
70% of outsourcing clients have had negative experiences and
25% have backsourced.
4% of 70 North American companies would not consider
backsourcing.
19
© 2016 John Wiley & Sons, Inc.
19
Backsourcing Reasons
Mirror reason for outsourcing (to reduce costs, increase quality
of service, etc.)
Costs were higher than expected
Poor service
Change in management
Change in the way IS is perceived within the company
New situations (mergers, acquisitions, etc.)
20
© 2016 John Wiley & Sons, Inc.
20
Crowdsourcing
Definition:
Taking a task traditionally performed by an employee or
contractor, and
Outsourcing it to an undefined, generally large group of people,
In the form of an open call.
Used by companies to increase productivity, lower production
costs, and fill skill gaps.
Can be used for a variety of tasks.
Companies do not have control over the people doing the work.
21
© 2016 John Wiley & Sons, Inc.
21
Partnering Arrangements
Strategic networks: arrangements made with other organizations
to offer synergistic or complementary services
Example: The Mitsui Keiretsu contains over 30 firms spanning
many industries. The members use each others’ services and
don’t compete: Toshiba, Fujifilm, Sony are members
Business ecosystems (see chapter 9): Informal, emerging
relationships
22
© 2016 John Wiley & Sons, Inc.
Deciding Where -
Onshore, Offshore, or in the Cloud?
New option: cloud computing
See chapter 6 for basic definitions; advantages; disadvantages.
Works when outsourcing or insourcing
23
© 2016 John Wiley & Sons, Inc.
Cloud Computing Options
On-premise
Private clouds
Data—managed by the company or offsite by a third party.
Community clouds.
Cloud infrastructure is shared by several organizations
Supports the shared concerns of a specific community.
Public clouds.
Data is stored outside of the corporate data centers
In the cloud provider’s environment
Hybrid clouds
Combination of two or more other clouds.
24
© 2016 John Wiley & Sons, Inc.
Public Clouds - Versions
Infrastructure as a Service (IaaS).
Infrastructure through grids or clusters of virtualized servers,
networks, storage, and systems software.
Designed to augment or replace the functions of an entire data
center.
The customer may have full control of the actual server
configuration.
More risk management control over the data and environment.
Platform as a Service (PaaS).
Virtualized servers
Clients can run existing applications or develop new ones
Provider manages the hardware, operating system, and capacity
Limits the enterprise risk management capabilities.
25
© 2016 John Wiley & Sons, Inc.
Public Clouds - Versions
Software as a Service (SaaS) or Application Service Provider
(ASP).
Software application functionality through a web browser.
The platform and infrastructure are fully managed by the cloud
provider.
If the operating system or underlying service isn’t configured
correctly, the data at the higher application layer may be at risk.
The most widely known and used form of cloud computing.
Some managers shy away from cloud computing because they
are concerned about:
security—specifically about external threats from remote
hackers and security breaches as the data travels to and from the
cloud.
data privacy.
26
© 2016 John Wiley & Sons, Inc.
To manage risk, an SLA needs to spell out these requirements.
26
Managing and Using Information Systems:
A Strategic Approach – Sixth Edition
Keri Pearlson, Carol Saunders,
and Dennis Galletta
© Copyright 2016
John Wiley & Sons, Inc.
Copyright of Fairfield County Business Journal is the property
of Westfair Communications,
Inc. and its content may not be copied or emailed to multiple
sites or posted to a listserv
without the copyright holder's express written permission.
However, users may print,
download, or email articles for individual use.

More Related Content

Similar to You have been hired as the CSO (Chief Security Officer) for an org.docx

Ei Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla RetEi Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla Ret
Lou_Mottola58
 
EI Retirement Right_Sourcing FLORIDA
EI Retirement Right_Sourcing FLORIDAEI Retirement Right_Sourcing FLORIDA
EI Retirement Right_Sourcing FLORIDA
Lou_Mottola58
 
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
Nguyen Hoang
 
STUDY GUIDE Disney Case on StrategyGoals and Objectiv.docx
STUDY GUIDE  Disney Case on StrategyGoals and Objectiv.docxSTUDY GUIDE  Disney Case on StrategyGoals and Objectiv.docx
STUDY GUIDE Disney Case on StrategyGoals and Objectiv.docx
deanmtaylor1545
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
Michael Punzo
 
Right Sourcing South Dakota
Right Sourcing South DakotaRight Sourcing South Dakota
Right Sourcing South Dakota
Lou_Mottola58
 
Idc successful cloud partners e book
Idc   successful cloud partners e bookIdc   successful cloud partners e book
Idc successful cloud partners e book
Jarek Sokolnicki
 

Similar to You have been hired as the CSO (Chief Security Officer) for an org.docx (20)

Ei Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla RetEi Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla Ret
 
EI Retirement Right_Sourcing FLORIDA
EI Retirement Right_Sourcing FLORIDAEI Retirement Right_Sourcing FLORIDA
EI Retirement Right_Sourcing FLORIDA
 
Managing risks when offshoring services including a practical indian experie...
Managing risks when offshoring services  including a practical indian experie...Managing risks when offshoring services  including a practical indian experie...
Managing risks when offshoring services including a practical indian experie...
 
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
 
FIN 571 Week 6 Individual Signature Assignment
FIN 571 Week 6 Individual Signature AssignmentFIN 571 Week 6 Individual Signature Assignment
FIN 571 Week 6 Individual Signature Assignment
 
Outsourcing vs Offshoring
Outsourcing vs OffshoringOutsourcing vs Offshoring
Outsourcing vs Offshoring
 
FIN 571 Individual Signature Assignment
FIN 571 Individual Signature AssignmentFIN 571 Individual Signature Assignment
FIN 571 Individual Signature Assignment
 
FIN 571 Individual Signature Assignment
FIN 571 Individual Signature AssignmentFIN 571 Individual Signature Assignment
FIN 571 Individual Signature Assignment
 
STUDY GUIDE Disney Case on StrategyGoals and Objectiv.docx
STUDY GUIDE  Disney Case on StrategyGoals and Objectiv.docxSTUDY GUIDE  Disney Case on StrategyGoals and Objectiv.docx
STUDY GUIDE Disney Case on StrategyGoals and Objectiv.docx
 
Service Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxService Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptx
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
 
Right Sourcing South Dakota
Right Sourcing South DakotaRight Sourcing South Dakota
Right Sourcing South Dakota
 
Idc successful cloud partners e book
Idc   successful cloud partners e bookIdc   successful cloud partners e book
Idc successful cloud partners e book
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
 
Outsourcing and its potential for india
Outsourcing and its potential for indiaOutsourcing and its potential for india
Outsourcing and its potential for india
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & Offshoring
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
 
KPMG Morning Keynote
KPMG  Morning KeynoteKPMG  Morning Keynote
KPMG Morning Keynote
 

More from odiliagilby

Pease read and incorporate the following articles from the EBSCO h.docx
Pease read and incorporate the following articles from the EBSCO h.docxPease read and incorporate the following articles from the EBSCO h.docx
Pease read and incorporate the following articles from the EBSCO h.docx
odiliagilby
 
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docxPeer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
odiliagilby
 
People. I need some help with this assignment that needs to be done .docx
People. I need some help with this assignment that needs to be done .docxPeople. I need some help with this assignment that needs to be done .docx
People. I need some help with this assignment that needs to be done .docx
odiliagilby
 
Pennsylvania v. MarkMark Davis has been charged with Driving W.docx
Pennsylvania v. MarkMark Davis has been charged with Driving W.docxPennsylvania v. MarkMark Davis has been charged with Driving W.docx
Pennsylvania v. MarkMark Davis has been charged with Driving W.docx
odiliagilby
 
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docxPBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
odiliagilby
 
Part1 Q1. Classify each of the following as-      (i)qual.docx
Part1 Q1. Classify each of the following as-      (i)qual.docxPart1 Q1. Classify each of the following as-      (i)qual.docx
Part1 Q1. Classify each of the following as-      (i)qual.docx
odiliagilby
 

More from odiliagilby (20)

Per the text, computers are playing an increasingly important role i.docx
Per the text, computers are playing an increasingly important role i.docxPer the text, computers are playing an increasingly important role i.docx
Per the text, computers are playing an increasingly important role i.docx
 
Pennsylvania was the leader in sentencing and correctional reform .docx
Pennsylvania was the leader in sentencing and correctional reform .docxPennsylvania was the leader in sentencing and correctional reform .docx
Pennsylvania was the leader in sentencing and correctional reform .docx
 
Penetration testing is a simulated cyberattack against a computer or.docx
Penetration testing is a simulated cyberattack against a computer or.docxPenetration testing is a simulated cyberattack against a computer or.docx
Penetration testing is a simulated cyberattack against a computer or.docx
 
Perform an analysis of the social demographic, technological, econ.docx
Perform an analysis of the social  demographic, technological, econ.docxPerform an analysis of the social  demographic, technological, econ.docx
Perform an analysis of the social demographic, technological, econ.docx
 
Perform research and discuss whether text messaging is cheaper or mo.docx
Perform research and discuss whether text messaging is cheaper or mo.docxPerform research and discuss whether text messaging is cheaper or mo.docx
Perform research and discuss whether text messaging is cheaper or mo.docx
 
People in developed nations are fond of warning people in developing.docx
People in developed nations are fond of warning people in developing.docxPeople in developed nations are fond of warning people in developing.docx
People in developed nations are fond of warning people in developing.docx
 
Pease read and incorporate the following articles from the EBSCO h.docx
Pease read and incorporate the following articles from the EBSCO h.docxPease read and incorporate the following articles from the EBSCO h.docx
Pease read and incorporate the following articles from the EBSCO h.docx
 
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docxPeer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
 
Perception is all EXCEPT [removed] [removed]Structuring and orga.docx
Perception is all EXCEPT [removed] [removed]Structuring and orga.docxPerception is all EXCEPT [removed] [removed]Structuring and orga.docx
Perception is all EXCEPT [removed] [removed]Structuring and orga.docx
 
Performance Based Factors and Measures for Quality AssessmentWri.docx
Performance Based Factors and Measures for Quality AssessmentWri.docxPerformance Based Factors and Measures for Quality AssessmentWri.docx
Performance Based Factors and Measures for Quality AssessmentWri.docx
 
People. I need some help with this assignment that needs to be done .docx
People. I need some help with this assignment that needs to be done .docxPeople. I need some help with this assignment that needs to be done .docx
People. I need some help with this assignment that needs to be done .docx
 
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docx
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docxPerceptions and Causes of Psychopathology PaperPrepare a 1,0.docx
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docx
 
People are attracted to occupations that complement their personalit.docx
People are attracted to occupations that complement their personalit.docxPeople are attracted to occupations that complement their personalit.docx
People are attracted to occupations that complement their personalit.docx
 
Perception of Pleasure and Pain Presentation3 slides- An explanati.docx
Perception of Pleasure and Pain Presentation3 slides- An explanati.docxPerception of Pleasure and Pain Presentation3 slides- An explanati.docx
Perception of Pleasure and Pain Presentation3 slides- An explanati.docx
 
Pennsylvania v. MarkMark Davis has been charged with Driving W.docx
Pennsylvania v. MarkMark Davis has been charged with Driving W.docxPennsylvania v. MarkMark Davis has been charged with Driving W.docx
Pennsylvania v. MarkMark Davis has been charged with Driving W.docx
 
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docxPBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
 
Part1 Q1. Classify each of the following as-      (i)qual.docx
Part1 Q1. Classify each of the following as-      (i)qual.docxPart1 Q1. Classify each of the following as-      (i)qual.docx
Part1 Q1. Classify each of the following as-      (i)qual.docx
 
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docx
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docxPaul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docx
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docx
 
Past and FuturePlease respond to the followingImagine back .docx
Past and FuturePlease respond to the followingImagine back .docxPast and FuturePlease respond to the followingImagine back .docx
Past and FuturePlease respond to the followingImagine back .docx
 
Partisan considerations have increasingly influenced the selection.docx
Partisan considerations have increasingly influenced the selection.docxPartisan considerations have increasingly influenced the selection.docx
Partisan considerations have increasingly influenced the selection.docx
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

You have been hired as the CSO (Chief Security Officer) for an org.docx

  • 1. You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas: · Computer and email acceptable use policy · Internet acceptable use policy Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. Include at least 3 scholarly references in addition to the course textbook. The UC Library is a good place to find these references. At least two of the references cited need to be peer- reviewed scholarly journal articles from the library. Your paper should meet the following requirements: • Be approximately 2-4 pages in length, not including the required cover page and reference page. • Follow APA6 guidelines. Your paper should include an ABSTRACT, a body with fully developed content, and a conclusion. • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. Managing and Using Information Systems: A Strategic Approach – Sixth Edition Keri Pearlson, Carol Saunders,
  • 2. and Dennis Galletta © Copyright 2016 John Wiley & Sons, Inc. 1 Chapter 10 Information Systems Sourcing 2 © 2016 John Wiley & Sons, Inc. 2 Kellwood Opening Case Why did Kellwood outsource? Why did Kellwood decide to backsource after 13 years? What was the result? 3 © 2016 John Wiley & Sons, Inc.
  • 3. They wanted to integrate 12 acquisitions with different systems Kellwood was purchased by Sun Capital Partners. COO wanted to consolidate to reduce costs and standardize Result was savings of $3.6 million per year, or 17% of total IS expenses 3 Sourcing Decision Framework 4 © 2016 John Wiley & Sons, Inc. Sourcing OptionsInsourcingOutsourcingDomesticDomestic in- house production Company produces its products domestically without any outside contractsDomestic outsourcing Company uses services supplied by another domestic-based companyOffshoreOffshore in-house sourcing Company uses services supplied by its own foreign-based affiliate (subsidiary)Offshore outsourcing Company uses services supplied by an unaffiliated foreign- based company Figure 10.3. Different Forms of Sourcing. (Source: http://www.dbresearch.com/ servlet/reweb2.ReWEB?rwsite=DBR_INTERNET_EN-PROD)
  • 4. 5 © 2016 John Wiley & Sons, Inc. 5 INSOURCING A firm provides IS services or develops IS in its own in-house IS organization 6 © 2016 John Wiley & Sons, Inc. 6 IT Outsourcing With IT, there is equipment and personnel involved Equipment and facilities are sold to outside vendors Personnel might be hired by outside vendors Services are hired from the vendors Common length of agreement: 10 years 7 © 2016 John Wiley & Sons, Inc.
  • 5. 7 Insourcing DriversInsourcing ChallengesCore competencies related to systems Confidentiality or sensitive system components or services Time available in-house to develop software Expertise for software development in-houseInadequate support from top management to acquire needed resources Temptation from finding a reliable, competent outsourcing provider Insourcing drivers and challenges 8 © 2016 John Wiley & Sons, Inc. 8 Economics of Outsourcing Benefits: Sell equipment, buildings (large cash inflow) Downsized payroll – outsourcer hires employees Costs: Services provided for a fee Fixed costs usually over 10-year term
  • 6. 9 © 2016 John Wiley & Sons, Inc. 9 Drivers Disadvantages Offer cost savings Offer service quality Ease transition to new technologies Offer better strategic focus Provide better mgmt of IS staff Handle peaks Consolidate data centers Infusion of cash Abdication of control High switching costs Lack of technological innovation Loss of strategic advantage Reliance on outsourcer Problems with security/confidentiality Evaporation of cost savings Drivers and disadvantages of outsourcing 10 © 2016 John Wiley & Sons, Inc. 10
  • 7. Decisions about How to Outsource Successfully Decisions about whether or not to outsource need care and deliberation. Requires numerous other decisions about mitigating outsourcing risks. Three major decision areas: selection, contracting, and scope. Selection: find compatible providers Contracting: Try for flexible management terms Try for shorter (3-5 year) contracts Try for SLAs (service level agreements on performance) Scope – Determine if full or partial outsourcing 11 © 2016 John Wiley & Sons, Inc. Offshoring Short for outsourcing offshore Definition: When the MIS organization uses contractor services in a distant land. (Insourcing offshore would be your own dept offshore) Substantial potential cost savings through reduced labor costs. Some countries offer a very well educated labor force. Implementation of quality standards: Six Sigma ISO 9001 12 © 2016 John Wiley & Sons, Inc.
  • 8. 12 Selecting an Offshoring Destination About 100 countries are now exporting software services and products. What makes countries attractive for offshoring? High English language proficiency. Countries that are peaceful/politically stable. Countries with lower crime rates. Countries with friendly relationships. Security and/or trade restrictions. Protects intellectual property Level of technical infrastructure available. Good, efficient labor force Once a country is selected, the particular city in that country needs to be assessed as well. 13 © 2016 John Wiley & Sons, Inc. 13 Selecting an Offshoring Destination Countries like India make an entire industry of offshoring. Software Engineering Institute’s Capability Maturity Model (CMM).
  • 9. Level 1: the software development processes are immature, bordering on chaotic. Level 5: processes are quite mature, sophisticated, systematic, reliable Indian firms are well known for their CMM Level 5 software development processes, making them desirable 14 © 2016 John Wiley & Sons, Inc. 14 Offshore Destination- Development Tiers Carmel and Tjia suggest that there are three tiers of software exporting nations: Tier 1: Mature. United Kingdom, United States, Japan, Germany, France, Canada, the Netherlands, Sweden, Finland, India, Ireland, Israel, China, and Russia. Tier 2: Emerging. Brazil, Costa Rica, South Korea, and many Eastern European countries. Tier 3: Infant. Cuba, Vietnam, Jordan, and 15 to 25 others. Tiers: based on industrial maturity, the extent of clustering of some critical mass of software enterprises, and export revenues. The higher tiered countries have higher levels of skills and higher costs. © 2016 John Wiley & Sons, Inc.
  • 10. 15 15 Farshoring Definition: sourcing service work to a foreign, lower-wage country that is relatively far away in distance or time zone. Client company hopes to benefit from one or more ways: Big cost savings due to exchange rates, labor costs, government subsidies, etc. For the US and UK, India and China are popular Oddly, India and China also offshore to other locations 16 © 2016 John Wiley & Sons, Inc. 16 Nearshoring Definition: sourcing service work to a foreign, lower-wage country that is relatively close in distance or time zone. Client company hopes to benefit from one or more ways of being close: geographically, temporally, culturally, linguistically, economically, politically or from historical linkages.
  • 11. Distance and language matter. There are three major global nearshore clusters: 20 nations around the U.S., and Canada 27 countries around Western Europe smaller cluster of three countries in East Asia 17 © 2016 John Wiley & Sons, Inc. 17 Captive Centers An overseas subsidiary that is set up to serve the parent company. Alternative to offshoring or nearshoring. Four major stategies that are being employed: Hybrid Captive – performs core business processes for parent company but outsources noncore work to offshore provider Shared Captive - performs work for both parent company and external customers. Divested captive - have a large enough scale and scope that it could be sold for a profit by the parent company. Terminated Captive - has been shut down, usually because its inferior service was hurting the parent company’s reputation. 18 © 2016 John Wiley & Sons, Inc.
  • 12. 18 Backsourcing When a company takes back in-house, previously outsourced, IS assets, activities, and skills. Partial or complete reversal Many companies have backsourced such as Continental Airlines, Cable and Wireless, and Halifax Bank of Scotland. 70% of outsourcing clients have had negative experiences and 25% have backsourced. 4% of 70 North American companies would not consider backsourcing. 19 © 2016 John Wiley & Sons, Inc. 19 Backsourcing Reasons Mirror reason for outsourcing (to reduce costs, increase quality of service, etc.) Costs were higher than expected Poor service Change in management Change in the way IS is perceived within the company New situations (mergers, acquisitions, etc.) 20 © 2016 John Wiley & Sons, Inc.
  • 13. 20 Crowdsourcing Definition: Taking a task traditionally performed by an employee or contractor, and Outsourcing it to an undefined, generally large group of people, In the form of an open call. Used by companies to increase productivity, lower production costs, and fill skill gaps. Can be used for a variety of tasks. Companies do not have control over the people doing the work. 21 © 2016 John Wiley & Sons, Inc. 21 Partnering Arrangements Strategic networks: arrangements made with other organizations to offer synergistic or complementary services Example: The Mitsui Keiretsu contains over 30 firms spanning many industries. The members use each others’ services and don’t compete: Toshiba, Fujifilm, Sony are members Business ecosystems (see chapter 9): Informal, emerging
  • 14. relationships 22 © 2016 John Wiley & Sons, Inc. Deciding Where - Onshore, Offshore, or in the Cloud? New option: cloud computing See chapter 6 for basic definitions; advantages; disadvantages. Works when outsourcing or insourcing 23 © 2016 John Wiley & Sons, Inc. Cloud Computing Options On-premise Private clouds Data—managed by the company or offsite by a third party. Community clouds. Cloud infrastructure is shared by several organizations Supports the shared concerns of a specific community. Public clouds. Data is stored outside of the corporate data centers In the cloud provider’s environment Hybrid clouds Combination of two or more other clouds. 24 © 2016 John Wiley & Sons, Inc.
  • 15. Public Clouds - Versions Infrastructure as a Service (IaaS). Infrastructure through grids or clusters of virtualized servers, networks, storage, and systems software. Designed to augment or replace the functions of an entire data center. The customer may have full control of the actual server configuration. More risk management control over the data and environment. Platform as a Service (PaaS). Virtualized servers Clients can run existing applications or develop new ones Provider manages the hardware, operating system, and capacity Limits the enterprise risk management capabilities. 25 © 2016 John Wiley & Sons, Inc. Public Clouds - Versions Software as a Service (SaaS) or Application Service Provider (ASP). Software application functionality through a web browser. The platform and infrastructure are fully managed by the cloud provider.
  • 16. If the operating system or underlying service isn’t configured correctly, the data at the higher application layer may be at risk. The most widely known and used form of cloud computing. Some managers shy away from cloud computing because they are concerned about: security—specifically about external threats from remote hackers and security breaches as the data travels to and from the cloud. data privacy. 26 © 2016 John Wiley & Sons, Inc. To manage risk, an SLA needs to spell out these requirements. 26 Managing and Using Information Systems: A Strategic Approach – Sixth Edition Keri Pearlson, Carol Saunders, and Dennis Galletta © Copyright 2016 John Wiley & Sons, Inc.
  • 17. Copyright of Fairfield County Business Journal is the property of Westfair Communications, Inc. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.