SlideShare a Scribd company logo
1 of 22
208
10
chapter Information Systems
Sourcing
After 13 years, Kellwood, an American apparel maker, ended
its soups!to!nuts IS outsourcing
arrangement with EDS . The primary focus of the original
outsourcing contract was to integrate
12 individually acquired units with different systems into one
system. Kellwood had been satis-
" ed enough with EDS ’ s performance to renegotiate the
contract in 2002 and 2008, even though
at each renegotiation point, Kellwood had considered bringing
the IS operations back in house,
or backsourcing. The 2008 contract iteration resulted in a more
# exible $105 million contract that
EDS estimated would save Kellwood $2 million in the " rst
year and $9 million over the remaining
contract years. But the situation at Kellwood had changed
drastically. In 2008, Kellwood had been
purchased by Sun Capital Partners and taken private. The chief
operating of" cer (COO), who was
facing a mountain of debt and possibly bankruptcy, wanted to
consolidate and bring the operations
back in house to give some order to the current situation and
reduce costs. Kellwood was suffering
from a lack of IS standardization as a result of its many
acquisitions. The chief information of" cer
(CIO) recognized the importance of IS standardization and
costs, but she was concerned that the
transition from outsourcing to insourcing would cause serious
disruption to IS service levels and
project deadlines if it went poorly. Kellwood hired a
third!party consultant to help it explore the
issues and decided that backsourcing would save money and
respond to changes caused by both the
market and internal forces. Kellwood decided to backsource
and started the process in late 2009. It
carefully planned for the transition, and the implementation
went smoothly. By performing stream-
lined operations in house, it was able to report an impressive
$3.6 million savings, or about 17% of
annual IS expenses after the " rst year. 1
The Kellwood case demonstrates a series of decisions made in
relation to sourcing. Both the
decision to outsource IS operations and then to bring them back
in house were based on a series of
This chapter is organized around decisions in the Sourcing
Decision Cycle. The ! rst question
regarding information systems (IS) in the cycle relates to the
decision to make (insource) or
buy (outsource) them. This chapter ’ s focus is on issues
related to outsourcing whereas issues
related to insourcing are discussed in other chapters of this
book. Discussed are the critical
decisions in the Sourcing Decision Cycle: how and where
(cloud computing, onshoring,
offshoring). When the choice is offshoring, the next decision is
where abroad (farshoring,
nearshoring, or captive centers). Explored next in this chapter is
the ! nal decision in the
cycle, keep as is or change in which case the current
arrangements are assessed and modi-
! cations are made to the outsourcing arrangement, a new
outsourcing provider is selected,
or the operations and services are backsourced, or brought back
in house. Risks and strat-
egies to mitigate risks are discussed at each stage of the cycle.
1 For more information see Stephanie Overby, “Company
Saves Millions by Ending Outsourcing Deal,” CIO.com,
http://www.cio.
com/article/549463/Company_Saves_Millions_By_Ending_IT_
Outsourcing_Deal?page=1&taxonomyId=3195 (accessed
January
31, 2012); B. Bacheldor, “Kellwood Stayed on Top of Its
Outsourcing All the Way to the End,” CIO.com,
http://blogs.cio.com/
beth_bacheldor/kellwood_stayed_
on_top_of_its_outsourcing_all_the_way_to_the_end?page=0
(accessed February 10, 2012).
c10.indd 208 11/26/2015 6:32:09 PM
http://www.cio.com/article/549463/Company_Saves_Millions_B
y_Ending_IT_Outsourcing_Deal?page=1&taxonomyId=3195
http://blogs.cio.combeth_bacheldor/kellwood_stayed_%20on_to
p_of_its_outsourcing_all_the_way_to_the_end?page=0
209Sourcing Decision Cycle Framework
factors. These factors, similar to those used by many companies
in their sourcing decisions, are discussed later in
this chapter. The global outsourcing market has been growing
steadily. Companies of all sizes pursue outsourcing
arrangements, and many multimillion!dollar deals have been
widely publicized. As more companies adopt out-
sourcing as a means of controlling IS costs and acquiring
“best!of!breed” capabilities, managing these supplier
relationships has become increasingly important. IS departments
must maximize the bene"t of these relationships
to the enterprise and pre!empt problems that might occur.
Failure in this regard could result in deteriorating quality
of service, loss of competitive advantage, costly contract
disputes, low morale, and loss of key personnel.
How IS services are provided to a "rm has become an important
strategic and tactical discussion. As brie#y
mentioned in Chapter$6, there are numerous alternatives to
sourcing computing power, applications, and infrastruc-
ture. This chapter examines the sourcing cycle to consider the
full range of decisions related to who should perform
the IS work of an organization. The cycle begins with a decision
to make or buy information services and products.
Once the decision to make or buy has been "nalized, a series of
questions must be answered about where and how
these services should be delivered or products developed. The
discussion in this chapter is built around the Sourcing
Decision Cycle framework discussed in the next section.
Considering the answers to sourcing questions can help
explain a number of terms associated with sourcing: insourcing,
outsourcing, cloud computing, full outsourcing,
selective outsourcing, multisourcing, onshoring, offshoring,
nearshoring, farshoring, and backsourcing. For each
type of sourcing decision, the risks, or likelihood of something
negative occurring as a result of the decision, are
discussed, and some steps that can be taken to manage the risks
are proposed.
Sourcing Decision Cycle Framework
Sourcing does not really just involve only one decision. It
involves many decisions. The rest of this chapter is built
around the critical sourcing decisions shown in Figure$10.1.
Many of the chapter headings are tied to key decisions
in Figure$ 10.1. Although the Sourcing Decision Cycle starts
anywhere, we choose to start with the original
make!or!buy decision. If an organization decides to “make,”
that means that it plans to create and run its own
applications. “Buy,” on the other hand, means the organization
plans to obtain its applications from an outside
HYBRID CAPTIVE
CENTER
OFFSHORING
OUTSOURCING
ONSHORING
CLOUD
INSOURCING
Where abroad?
Make
Note: Insourcing can
include captive centers
Buy
Keep as is or
Change?
Where?
FARSHORING
NEARSHORING
How to
source?
Where?
FIGURE 10.1 Sourcing Decision Cycle framework.
c10.indd 209 11/26/2015 6:32:09 PM
210 Information Systems Sourcing
vendor or vendors. When the “buy” option is selected, the
organization becomes a client company that must then
decide on “how” and “where” to outsource. The answers to the
“how” question include the scope of the outsourcing
and the steps that should be taken to ensure its success. The
answers to the “where” question focus on whether the
client company should work with an outsourcing provider (i.e.,
vendor) in its own country, offshore, or in a cloud.
If the client company decides to go offshore because labor is
cheaper or needed skills are more readily available, it
must make another decision: It must decide whether it wants the
work done in a country that is relatively nearby or
in a country that is quite distant. Finally, the client company
chooses an outsourcing provider (or decides to do its
own IS work). After a while, the client company faces another
decision. It periodically must evaluate the sourcing
arrangement and see whether a change is in order. If the in
house work is unsatisfactory or other opportunities that
are preferable to the current arrangement have become
available, then the client company may turn to outsourcing.
If, on the other hand, the outsourcing arrangement is
unsatisfactory, the client company has several options to con-
sider: to correct any existing problems and continue outsourcing
with its current provider, to outsource with another
provider, or to backsource. If the company decides to make a
change in its sourcing arrangements at this point, the
Sourcing Decision Cycle starts over again.
Starting the Cycle: The Make!or!Buy Sourcing Decision
Managers decide whether to make or buy information services
and products. The products can include an appli-
cation or a system, and services can range from help desk
support, telecommunications, running data centers, and
even implementing and operating business processes as in
business process outsourcing (BPO). A simple “make”
decision often involves insourcing some or all of the business’s
IS infrastructure, and a simple “buy” decision often
involves outsourcing, although it could also include purchasing
packaged software. In its simplest form, the make!
or!buy decision hinges on whether to insource (“make”) or
outsource (“buy”).
Insourcing
The most traditional approach to sourcing is insourcing, or
providing IS services or developing them in the com-
pany’s own in house IS organization and/or in its local cloud.
Several “yes” answers to the questions posed in
Figure$10.2 favor the decision to insource. Probably the most
common reason is to keep core competencies in house.
Managers are concerned that if they outsource a core
competency, they risk losing control over it or losing contact
with suppliers who can help them remain innovative in relation
to that competency. Failing to control the competency
or stay innovative is a sure way to forfeit a company’s
competitive advantage. On the other hand, by outsourcing
commodity work, a "rm can concentrate on its core
competencies. Other factors that weigh in favor of insourcing
are having an IS service or product that requires considerable
security, con"dentiality, or adequate resources in house
(e.g., time to complete the project with current staf"ng or IS
professionals with the needed skills and training).
In some companies, the IS function is underappreciated by top
management. As long as everything is running
smoothly, top managers may not notice the work done by or
appreciate the services and products of the IS orga-
nization. Often an IS department that insources has found it
necessary to compete for resources differently than
if it outsources. It is necessary for the department to have
enough respect and support from top management to
acquire resources and get the department’s job done. A major
risk of insourcing is that the complexities of running
IS in house requires management attention and resources that
might better serve the company if focused on other
value!added activities.
Captive centers are a new variation of insourcing. A captive
center is an overseas subsidiary that is created to
serve its main “client,” the parent company, but it may serve
other clients as well. Firms have set up such subsid-
iaries to operate like an outsourcing provider, but the "rms
actually own the subsidiaries. They are launched in
less expensive locations, usually away from the company’s
headquarters or major operating units. The three most
common types of captive centers are basic, shared, and hybrid.2
The basic captive center provides services only
to the parent "rm. The shared captive center performs work for
both a parent company and external customers.
2 I. Oshri, J. Kotalarsky and C.!M. Liew, “What to Do with
Your Captive Center: Four Strategic Options,” The Wall Street
Journal (May 12, 2008), http://
www.wsj.com/articles/SB121018777870174513 (accessed
September 2, 2015).
c10.indd 210 11/26/2015 6:32:10 PM
http://www.wsj.com/articles/SB121018777870174513
http://www.wsj.com/articles/SB121018777870174513
211Sourcing Decision Cycle Framework
The$hybrid captive center typically performs the more
expensive, higher pro"le or mission!critical work for the par-
ent company and outsources the more commoditized work that
is more cheaply provided by an offshore provider.
Outsourcing
Outsourcing means purchasing a good or service that was
previously provided internally or that could be provided
internally but is now provided by outside vendors. In the early
days of outsourcing, outside providers often took
over entire IS departments, including people, equipment, and
management responsibility. Reducing costs was the
primary motivation for outsourcing. This classic approach
prevailed through most of the 1970s and 1980s but then
experienced a decline in popularity. In 1989, Eastman Kodak
Company’s multivendor approach to meeting its
IS needs created the “Kodak effect.” Kodak outsourced its data
center operations to IBM, its network to Digital
Equipment Company, and its desktop supply and support
operations to Businessland.3 Kodak managed these rela-
tionships through strategic alliances.4 It retained a skeleton IS
staff to act for its business personnel with out-
sourcing providers. Its approach to supplier management
became a model emulated by Continental Bank, General
Dynamics, Continental Airlines, National Car Rental, and many
more.5
Kodak’s watershed outsourcing arrangement ushered in new
outsourcing practices that put all IS activities up
for grabs, including those providing competitive advantage. As
relationships with outsourcing providers become
FIGURE 10.2 Make or buy? Questions and risks.
Make or Buy Questions Suggests
Insourcing
Suggests
Outsourcing
Examples of Associated Risk in
Worse"Case Scenarios
Does it involve a core competency? Yes No If outsourced: Loss
of control over
strategic initiatives; loss of strategic focus
Does it involve con!dential or sensitive
IS services or software development?
Yes No If outsourced: Competitive secrets may
be leaked
Is there enough time available to
complete software development
projects in house?
Yes No If insourced: Project not completed on
time
Do the in"house IS professionals have
adequate training, experience, or skills
to provide the service or develop the
software?
Yes No If outsourced: Technological innovations
limited to what provider offers;
overreliance on provider’s skills
Are there reliable outsourcing
providers who are likely to stay
in business for the duration of the
contract?
No Yes If outsourced: Project not completed or,
if completed, is over budget and late
when another provider takes it over
Is there an outsourcing provider that
has a culture and practices that are
compatible with the client?
No Yes If outsourced: Con#ict between client
and provider personnel
Does the provider have economies of
scale that make it cheaper to provide
the service or develop the software
than in house?
Most likely No Most likely Yes If outsourced: Excessive costs
of project
or operations because of the way the
contract is written
Does it offer a better ability to handle
peaks?
Most likely No Most likely Yes If insourced: Loss of business
Does it involve consolidating data
centers?
Most likely No Most likely Yes If insourced: Inef!cient
operations
3 L. Applegate and R. Montealegre, “Eastman Kodak Co.:
Managing Information Systems Through Strategic Alliances,”
Harvard Business School case
192030 (September 1995).
4 Anthony DiRomualdo and Vijay Gurbaxani, “Strategic Intent
for IT Outsourcing,” Sloan Management Review (June 22,
1998).
5 Mary C. Lacity, Leslie P. Willcocks, and David F. Feeny,
“The Value of Selective IT Sourcing,” Sloan Management
Review (March 22, 1996).
c10.indd 211 11/26/2015 6:32:10 PM
212 Information Systems Sourcing
more sophisticated, companies realize that even such essential
functions as customer service are sometimes better
managed by experts on the outside. Over the years, motives for
outsourcing broadened beyond cost control. The
next section examines factors and risks to be considered in
making the outsourcing decision. The sourcing strategy
suggested by the answers to the key how to source question and
associated risks are listed in Figure$10.2.
Factors in the Outsourcing Decision
Under what conditions would an organization decide to
outsource? There are three primary factors that are likely to
favor the decision to seek to buy the services or products of an
outsourcing provider: lower costs due to economies
of scale, ability to handle processing peaks, and the client
company’s need to consolidate data centers. These and
other factors are listed in Figure$10.2.
One of the most common reasons given for outsourcing is the
desire to reduce costs. Outsourcing providers
derive savings from economies of scale that client companies
often cannot realize. Outsourcing providers achieve
these economies through centralized (often “greener”) data
centers, preferential contracts with suppliers, and large
pools of technical expertise. Most often, enterprises lack such
resources on a suf"cient scale within their own
IS departments. For example, a single company may need only
5,000 PCs, but an outsourcing provider might
negotiate a contract for 50,000 to spread over many clients and
at a much lower cost per computer. Second, the
outsourcing provider’s larger pool of resources than the client
company’s allows the provider leeway in assign-
ing available capacity to its clients on demand. For instance, at
year!end, an outsourcing provider potentially can
allocate additional mainframe capacity to ensure timely
completion of nightly processing in a manner that would
be impossible for an enterprise running its own bare!bones data
center. Third, an outsourcing provider may help
a client company to consolidate data centers following a merger
or acquisition or when the internal group cannot
overcome the inertia of its top management. Outsourcing may
also offer an infusion of cash as a company sells its
equipment to the outsourcing vendor.
If the service or product involves a core competency, then the
organization should strongly consider insourcing
to protect the bene"ts the organization enjoys from its own
competency. However, if the product or service is con-
sidered to be a commodity instead of a core competency, then
there are some distinct advantages to outsourcing. By
bringing in outside expertise, client company management often
can pay more attention to its core activities rather
than to IS operations. Further, if an organization does not have
employees with the training, experience, or skills
in house to successfully implement new technologies, it should
consider outsourcing. This is because outsourcing
providers generally have larger pools of talent with more
current knowledge of advancing technologies and best
practices. For example, many outsourcing providers gain vast
experience solving business intelligence problems
whereas IS staff within a single company would have only
limited experience, if any. That is why client companies
turn to outsourcing providers to help them implement such
technologies as Enterprise 2.0, Web 2.0 tools, cloud
computing, and enterprise resource planning (ERP) systems.
However, it is important to remember that client
company managers are ultimately still responsible for IS
services and products provided to their "rm.
Outsourcing providers also have an added advantage because
they can specialize in IS services. Outsourcing
providers’ extensive experience in dealing with IS professionals
helps them to understand how to hire, manage,
and retain IS staff effectively. Often they can offer IS personnel
a professional environment in which to work that
a typical company cannot afford to build. For example, a Web
designer would have responsibility for one Web site
within a company but for multiple sites when working for an
outsourcing provider. It becomes the outsourcing
provider’s responsibility to "nd, train, and retain highly
marketable IS talent. Outsourcing relieves a client of costly
investments in continuous training to keep its IS staff current
with the newest technologies and the headaches of
hiring and retaining highly skilled staff that easily can change
jobs.
Outsourcing Risks
Opponents of outsourcing cite a considerable number of risks
with it (see Figure$10.2). A manager should consider
each of these before making a decision about outsourcing. Each
risk can be mitigated with effective planning and
ongoing management.
c10.indd 212 11/26/2015 6:32:10 PM
213Sourcing Decision Cycle Framework
6 Stephanie Overby, “The Hidden Costs of Offshore
Outsourcing” (September 1, 2003),
http://www.cio.com/article/29654/The_Hidden_Costs_of_
Offshore_Outsourcing (accessed June 4, 2012).
First, outsourcing requires that a client company surrender a
degree of control over critical aspects of the
enterprise. The potential loss of control could extend to several
areas: project control, scope creep, technologies
employed, costs, "nancial controls, accuracy and clarity of
"nancial reports, and even the company’s IS direction.
By turning over data center operations, for example, a company
puts itself at the mercy of an outsourcing provider’s
ability to manage this function effectively. A manager must
choose an outsourcing provider carefully and negotiate
terms that encourage an effective working relationship.
Second, outsourcing client companies may not adequately
anticipate new technological capabilities when nego-
tiating outsourcing contracts. Outsourcing providers may not
recommend so!called bleeding!edge technologies for
fear of losing money in the process of implementation and
support, even if their implementation would best serve
the client company. Thus, poorly planned outsourcing can result
in a loss in IS #exibility. For example, some out-
sourcing providers were slow to adopt social technologies for
their clients because they feared the bene"ts would
not be as tangible as the costs of entering the market. This
reluctance impinged on clients’ ability to realize social
business strategies. To avoid this problem, an outsourcing client
should have a chief technology of"cer (CTO)
or technology group that is charged with learning about and
assessing emerging technologies that can be used to
support its company’s business strategy.
Third, by surrendering IS functions, a client company gives up
any real potential to develop them for compet-
itive advantage—unless, of course, the outsourcing agreement is
sophisticated enough to comprehend developing
such an advantage in tandem with the outsourcing company.
However, the competitive advantage may be compro-
mised if it is made available to the outsourcing provider’s other
clients. Under many circumstances, the outsourcing
provider becomes the primary owner of any technological
solutions that it develops for the client. This allows the
outsourcing provider to leverage the knowledge to bene"t other
clients, possibly even competitors of the initial
client company.
Fourth, contract terms may leave client companies highly
dependent on their outsourcing provider with little
recourse in terms of terminating troublesome provider
relationships. That is, the clients may be locked into an
arrangement that they no longer want. It may be too expensive
to switch to another outsourcing provider should
the contract sour. Despite doing due diligence and background
checks, the outsourcing provider may be unreliable
or go out of business before the end of the contract. The risk of
over!reliance for any number of reasons typi-
cally increases as the size of the outsourcing contract increases.
DHL Worldwide Express entrusted 90% of its IT
development and maintenance projects to a large Indian!based
company, Infosys. “There’s a lot of money wrapped
up in a contract this size, so it’s not something you take lightly
or hurry with,” said Ron Kifer, DHL’s Vice President
of Program
Solution
s and Management.6 Clearly, DHL faced considerable risk in
offshoring with Infosys because
of its reliance on the provider.
Fifth, it might be harder to keep its competitive secrets when a
company employs an outsourcing provider.
Although outsourcing providers are sensitive to keeping client
information separated in their systems, an outsourcer’s
staff will usually work with multiple customers. Some managers
are concerned that their company databases are no
longer kept in house, and the outsourcing provider’s other
customers may have easier access to sensitive information.
Although all outsourcing agreements contain clauses to keep
customer data and systems secure, managers still voice
concern about data security and process skills when they are
managed by a third party. Thinking through the security
issues carefully and implementing controls where possible
mitigate this risk. Often, the outsourcing provider has
more secure processes and practices in place simply because its
business depends on it—it’s a competitive necessity
and often a core competency of the outsourcing provider.
Sixth, the outsourcing provider’s culture or operations may be
incompatible with that of the client company,
making the delivery of the contracted service or system dif"cult.
Con#icts between the client’s staff and the staff
of the outsourcing provider may delay progress or harm the
quality of the service or product delivered by the out-
sourcing provider.
Finally, although many companies turn to outsourcing because
of perceived cost savings, these savings may
never be realized. Typically, the cost savings are premised on
the old way that the company performed the processes.
c10.indd 213 11/26/2015 6:32:10 PM
http://www.cio.com/article/29654/The_Hidden_Costs_of_Offsh
ore_Outsourcing
214 Information Systems Sourcing
However, new technologies may usher in new processes, and the
anticipated savings on the old processes become
moot. Further, the outsourcing client is, to some extent, at the
mercy of the outsourcing provider. Increased vol-
umes due to unspeci" ed growth, software upgrades, or new
technologies not anticipated in the contract may end
up costing a " rm considerably more than it anticipated when it
signed the contract. Also, some savings, although
real, may be hard to measure.
Decisions about How to Outsource Successfully
Clearly, the decision about whether to outsource must be made
with adequate care and deliberation. It must be fol-
lowed with numerous other decisions about how to mitigate
outsourcing risks and make the outsourcing arrange-
ment work. Once these decisions have been made, they should
be openly communicated to all relevant stakeholders.
Three major decision areas are selection, contracting, and
scope.
Selection
Selection!related decisions focus on " nding compatible
outsourcing providers whose capabilities, managers,
internal operations, technologies, and culture complement those
of the client company. This means that compati-
bility and cultural " t might trump price, especially when
long!term partnerships are envisioned. Selection factors
are discussed more fully in the “where” and “where abroad”
decisions.
Contracting
Many “how” decisions center around the outsourcing contract.
In particular, client companies must ensure that
contract terms allow them the # exibility they require to manage
and, if necessary, sever supplier relationships.
The 10 !year contracts that were so popular in the early 1990s
are being replaced with contracts of shorter duration
lasting 3 to 5 years and full life cycle service contracts that are
broken up into stages. Deal size also has declined
this millennium. Although the numbers of megadeals and
midrange contracts awarded each year have remained
relatively stable since 2002, smaller contracts valued at $100
million or less had more than tripled a decade later. 7
Social Business Lens: Crowdsourcing
Crowdsourcing is a form of outsourcing that is provided
by a very large number of individuals. Two forms of
crowdsourcing are available: collaboration and tournament.
Collaboration crowdsourcing occurs when individ-
uals use social media to collectively create a common document
or solution. Examples are Wikipedia or crowd-
sourcing for innovation as was discussed in Chapter$ 5 .
Tournament crowdsourcing also uses social media to solicit
and collect independent solutions from a potentially large
number of individuals but selects one or a few of the
contributions in exchange for ! nancial or non! nancial
compensation.
Some sites offer marketplaces to promote particular types of
tournament crowdsourcing. Consider 99designs
(99designs.com), which is the largest online graphic design
marketplace where people or ! rms can go to get
affordable designs for such things as logos, labels, business
cards, and Web sites. It is anticipated that by 2016,
the site will have over a million members offering graphic
services. Businesses can source graphic design work
by launching design contests to the 99design community,
working individually with designers …
20810chapter       Information Systems Sourcing    .docx

More Related Content

Similar to 20810chapter Information Systems Sourcing .docx

1Week 4 Textbook ProblemsWeek 4 Textbook Problems 6W.docx
1Week 4 Textbook ProblemsWeek 4 Textbook Problems     6W.docx1Week 4 Textbook ProblemsWeek 4 Textbook Problems     6W.docx
1Week 4 Textbook ProblemsWeek 4 Textbook Problems 6W.docxvickeryr87
 
Service Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxService Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxkamlakargadegaonkar2
 
Applying IT to Sweeten Divestitures: The Seller Perspective
Applying IT to Sweeten Divestitures: The Seller PerspectiveApplying IT to Sweeten Divestitures: The Seller Perspective
Applying IT to Sweeten Divestitures: The Seller PerspectiveCognizant
 
What Goes Into Onboarding New Cybersecurity Vendors
What Goes Into Onboarding New Cybersecurity VendorsWhat Goes Into Onboarding New Cybersecurity Vendors
What Goes Into Onboarding New Cybersecurity VendorsExecweb
 
1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docxfelicidaddinwoodie
 
ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...
ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...
ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...Arno Kapteyn
 
memoExample 3220 memos.docMemo 1Date532011ToVP of.docx
memoExample 3220 memos.docMemo 1Date532011ToVP of.docxmemoExample 3220 memos.docMemo 1Date532011ToVP of.docx
memoExample 3220 memos.docMemo 1Date532011ToVP of.docxandreecapon
 
Home Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docx
Home Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docxHome Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docx
Home Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docxfideladallimore
 
Valuation Insights - Q4 2016
Valuation Insights - Q4 2016Valuation Insights - Q4 2016
Valuation Insights - Q4 2016Duff & Phelps
 
Earned Value + Agile = Success
Earned Value + Agile = SuccessEarned Value + Agile = Success
Earned Value + Agile = SuccessGlen Alleman
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEeAuditor Audits & Inspections
 

Similar to 20810chapter Information Systems Sourcing .docx (12)

1Week 4 Textbook ProblemsWeek 4 Textbook Problems 6W.docx
1Week 4 Textbook ProblemsWeek 4 Textbook Problems     6W.docx1Week 4 Textbook ProblemsWeek 4 Textbook Problems     6W.docx
1Week 4 Textbook ProblemsWeek 4 Textbook Problems 6W.docx
 
Service Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxService Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptx
 
Applying IT to Sweeten Divestitures: The Seller Perspective
Applying IT to Sweeten Divestitures: The Seller PerspectiveApplying IT to Sweeten Divestitures: The Seller Perspective
Applying IT to Sweeten Divestitures: The Seller Perspective
 
What Goes Into Onboarding New Cybersecurity Vendors
What Goes Into Onboarding New Cybersecurity VendorsWhat Goes Into Onboarding New Cybersecurity Vendors
What Goes Into Onboarding New Cybersecurity Vendors
 
1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx
 
ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...
ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...
ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...
 
memoExample 3220 memos.docMemo 1Date532011ToVP of.docx
memoExample 3220 memos.docMemo 1Date532011ToVP of.docxmemoExample 3220 memos.docMemo 1Date532011ToVP of.docx
memoExample 3220 memos.docMemo 1Date532011ToVP of.docx
 
Home Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docx
Home Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docxHome Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docx
Home Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docx
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Valuation Insights - Q4 2016
Valuation Insights - Q4 2016Valuation Insights - Q4 2016
Valuation Insights - Q4 2016
 
Earned Value + Agile = Success
Earned Value + Agile = SuccessEarned Value + Agile = Success
Earned Value + Agile = Success
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 

More from RAJU852744

2222020 Report Pagehttpsww3.capsim.comcgi-bindispla.docx
2222020 Report Pagehttpsww3.capsim.comcgi-bindispla.docx2222020 Report Pagehttpsww3.capsim.comcgi-bindispla.docx
2222020 Report Pagehttpsww3.capsim.comcgi-bindispla.docxRAJU852744
 
2212020 Soil Colloids (Chapter 8) Notes - AGRI1050R50 Intro.docx
2212020 Soil Colloids (Chapter 8) Notes - AGRI1050R50 Intro.docx2212020 Soil Colloids (Chapter 8) Notes - AGRI1050R50 Intro.docx
2212020 Soil Colloids (Chapter 8) Notes - AGRI1050R50 Intro.docxRAJU852744
 
20 Other Conditions That May Be a Focus of Clinical AttentionV-c.docx
20 Other Conditions That May Be a Focus of Clinical AttentionV-c.docx20 Other Conditions That May Be a Focus of Clinical AttentionV-c.docx
20 Other Conditions That May Be a Focus of Clinical AttentionV-c.docxRAJU852744
 
223 Case 53 Problems in Pasta Land by Andres Sous.docx
223 Case 53 Problems in Pasta Land by  Andres Sous.docx223 Case 53 Problems in Pasta Land by  Andres Sous.docx
223 Case 53 Problems in Pasta Land by Andres Sous.docxRAJU852744
 
222111Organization N.docx
222111Organization N.docx222111Organization N.docx
222111Organization N.docxRAJU852744
 
22-6  Reporting the Plight of Depression FamiliesMARTHA GELLHOR.docx
22-6  Reporting the Plight of Depression FamiliesMARTHA GELLHOR.docx22-6  Reporting the Plight of Depression FamiliesMARTHA GELLHOR.docx
22-6  Reporting the Plight of Depression FamiliesMARTHA GELLHOR.docxRAJU852744
 
2012 © Laureate Education, Inc. ASSIGNMENT AND FINAL P.docx
2012 © Laureate Education, Inc. ASSIGNMENT AND FINAL P.docx2012 © Laureate Education, Inc. ASSIGNMENT AND FINAL P.docx
2012 © Laureate Education, Inc. ASSIGNMENT AND FINAL P.docxRAJU852744
 
216Author’s Note I would like to thank the Division of Wo.docx
216Author’s Note I would like to thank the Division of Wo.docx216Author’s Note I would like to thank the Division of Wo.docx
216Author’s Note I would like to thank the Division of Wo.docxRAJU852744
 
2019 International Conference on Machine Learning, Big Data, C.docx
2019 International Conference on Machine Learning, Big Data, C.docx2019 International Conference on Machine Learning, Big Data, C.docx
2019 International Conference on Machine Learning, Big Data, C.docxRAJU852744
 
2018 4th International Conference on Green Technology and Sust.docx
2018 4th International Conference on Green Technology and Sust.docx2018 4th International Conference on Green Technology and Sust.docx
2018 4th International Conference on Green Technology and Sust.docxRAJU852744
 
202 S.W.3d 811Court of Appeals of Texas,San Antonio.PROG.docx
202 S.W.3d 811Court of Appeals of Texas,San Antonio.PROG.docx202 S.W.3d 811Court of Appeals of Texas,San Antonio.PROG.docx
202 S.W.3d 811Court of Appeals of Texas,San Antonio.PROG.docxRAJU852744
 
200 wordsResearch Interest Lack of minorities in top level ma.docx
200 wordsResearch Interest Lack of minorities in top level ma.docx200 wordsResearch Interest Lack of minorities in top level ma.docx
200 wordsResearch Interest Lack of minorities in top level ma.docxRAJU852744
 
2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docx2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docxRAJU852744
 
200520201ORG30002 – Leadership Practice and Skills.docx
200520201ORG30002 – Leadership Practice and Skills.docx200520201ORG30002 – Leadership Practice and Skills.docx
200520201ORG30002 – Leadership Practice and Skills.docxRAJU852744
 
2182020 Sample Content Topichttpspurdueglobal.brights.docx
2182020 Sample Content Topichttpspurdueglobal.brights.docx2182020 Sample Content Topichttpspurdueglobal.brights.docx
2182020 Sample Content Topichttpspurdueglobal.brights.docxRAJU852744
 
21 hours agoMercy Eke Week 2 Discussion Hamilton Depression.docx
21 hours agoMercy Eke Week 2 Discussion Hamilton Depression.docx21 hours agoMercy Eke Week 2 Discussion Hamilton Depression.docx
21 hours agoMercy Eke Week 2 Discussion Hamilton Depression.docxRAJU852744
 
2192020 Originality Reporthttpsucumberlands.blackboar.docx
2192020 Originality Reporthttpsucumberlands.blackboar.docx2192020 Originality Reporthttpsucumberlands.blackboar.docx
2192020 Originality Reporthttpsucumberlands.blackboar.docxRAJU852744
 
21720201Chapter 14Eating and WeightHealth Ps.docx
21720201Chapter 14Eating and WeightHealth Ps.docx21720201Chapter 14Eating and WeightHealth Ps.docx
21720201Chapter 14Eating and WeightHealth Ps.docxRAJU852744
 
2020221 Critical Review #2 - WebCOM™ 2.0httpssmc.grte.docx
2020221 Critical Review #2 - WebCOM™ 2.0httpssmc.grte.docx2020221 Critical Review #2 - WebCOM™ 2.0httpssmc.grte.docx
2020221 Critical Review #2 - WebCOM™ 2.0httpssmc.grte.docxRAJU852744
 
2020422 Take Test Learning Assessment for Week Four – GENDE.docx
2020422 Take Test Learning Assessment for Week Four – GENDE.docx2020422 Take Test Learning Assessment for Week Four – GENDE.docx
2020422 Take Test Learning Assessment for Week Four – GENDE.docxRAJU852744
 

More from RAJU852744 (20)

2222020 Report Pagehttpsww3.capsim.comcgi-bindispla.docx
2222020 Report Pagehttpsww3.capsim.comcgi-bindispla.docx2222020 Report Pagehttpsww3.capsim.comcgi-bindispla.docx
2222020 Report Pagehttpsww3.capsim.comcgi-bindispla.docx
 
2212020 Soil Colloids (Chapter 8) Notes - AGRI1050R50 Intro.docx
2212020 Soil Colloids (Chapter 8) Notes - AGRI1050R50 Intro.docx2212020 Soil Colloids (Chapter 8) Notes - AGRI1050R50 Intro.docx
2212020 Soil Colloids (Chapter 8) Notes - AGRI1050R50 Intro.docx
 
20 Other Conditions That May Be a Focus of Clinical AttentionV-c.docx
20 Other Conditions That May Be a Focus of Clinical AttentionV-c.docx20 Other Conditions That May Be a Focus of Clinical AttentionV-c.docx
20 Other Conditions That May Be a Focus of Clinical AttentionV-c.docx
 
223 Case 53 Problems in Pasta Land by Andres Sous.docx
223 Case 53 Problems in Pasta Land by  Andres Sous.docx223 Case 53 Problems in Pasta Land by  Andres Sous.docx
223 Case 53 Problems in Pasta Land by Andres Sous.docx
 
222111Organization N.docx
222111Organization N.docx222111Organization N.docx
222111Organization N.docx
 
22-6  Reporting the Plight of Depression FamiliesMARTHA GELLHOR.docx
22-6  Reporting the Plight of Depression FamiliesMARTHA GELLHOR.docx22-6  Reporting the Plight of Depression FamiliesMARTHA GELLHOR.docx
22-6  Reporting the Plight of Depression FamiliesMARTHA GELLHOR.docx
 
2012 © Laureate Education, Inc. ASSIGNMENT AND FINAL P.docx
2012 © Laureate Education, Inc. ASSIGNMENT AND FINAL P.docx2012 © Laureate Education, Inc. ASSIGNMENT AND FINAL P.docx
2012 © Laureate Education, Inc. ASSIGNMENT AND FINAL P.docx
 
216Author’s Note I would like to thank the Division of Wo.docx
216Author’s Note I would like to thank the Division of Wo.docx216Author’s Note I would like to thank the Division of Wo.docx
216Author’s Note I would like to thank the Division of Wo.docx
 
2019 International Conference on Machine Learning, Big Data, C.docx
2019 International Conference on Machine Learning, Big Data, C.docx2019 International Conference on Machine Learning, Big Data, C.docx
2019 International Conference on Machine Learning, Big Data, C.docx
 
2018 4th International Conference on Green Technology and Sust.docx
2018 4th International Conference on Green Technology and Sust.docx2018 4th International Conference on Green Technology and Sust.docx
2018 4th International Conference on Green Technology and Sust.docx
 
202 S.W.3d 811Court of Appeals of Texas,San Antonio.PROG.docx
202 S.W.3d 811Court of Appeals of Texas,San Antonio.PROG.docx202 S.W.3d 811Court of Appeals of Texas,San Antonio.PROG.docx
202 S.W.3d 811Court of Appeals of Texas,San Antonio.PROG.docx
 
200 wordsResearch Interest Lack of minorities in top level ma.docx
200 wordsResearch Interest Lack of minorities in top level ma.docx200 wordsResearch Interest Lack of minorities in top level ma.docx
200 wordsResearch Interest Lack of minorities in top level ma.docx
 
2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docx2019 14th Iberian Conference on Information Systems and Tech.docx
2019 14th Iberian Conference on Information Systems and Tech.docx
 
200520201ORG30002 – Leadership Practice and Skills.docx
200520201ORG30002 – Leadership Practice and Skills.docx200520201ORG30002 – Leadership Practice and Skills.docx
200520201ORG30002 – Leadership Practice and Skills.docx
 
2182020 Sample Content Topichttpspurdueglobal.brights.docx
2182020 Sample Content Topichttpspurdueglobal.brights.docx2182020 Sample Content Topichttpspurdueglobal.brights.docx
2182020 Sample Content Topichttpspurdueglobal.brights.docx
 
21 hours agoMercy Eke Week 2 Discussion Hamilton Depression.docx
21 hours agoMercy Eke Week 2 Discussion Hamilton Depression.docx21 hours agoMercy Eke Week 2 Discussion Hamilton Depression.docx
21 hours agoMercy Eke Week 2 Discussion Hamilton Depression.docx
 
2192020 Originality Reporthttpsucumberlands.blackboar.docx
2192020 Originality Reporthttpsucumberlands.blackboar.docx2192020 Originality Reporthttpsucumberlands.blackboar.docx
2192020 Originality Reporthttpsucumberlands.blackboar.docx
 
21720201Chapter 14Eating and WeightHealth Ps.docx
21720201Chapter 14Eating and WeightHealth Ps.docx21720201Chapter 14Eating and WeightHealth Ps.docx
21720201Chapter 14Eating and WeightHealth Ps.docx
 
2020221 Critical Review #2 - WebCOM™ 2.0httpssmc.grte.docx
2020221 Critical Review #2 - WebCOM™ 2.0httpssmc.grte.docx2020221 Critical Review #2 - WebCOM™ 2.0httpssmc.grte.docx
2020221 Critical Review #2 - WebCOM™ 2.0httpssmc.grte.docx
 
2020422 Take Test Learning Assessment for Week Four – GENDE.docx
2020422 Take Test Learning Assessment for Week Four – GENDE.docx2020422 Take Test Learning Assessment for Week Four – GENDE.docx
2020422 Take Test Learning Assessment for Week Four – GENDE.docx
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

20810chapter Information Systems Sourcing .docx

  • 1. 208 10 chapter Information Systems Sourcing After 13 years, Kellwood, an American apparel maker, ended its soups!to!nuts IS outsourcing arrangement with EDS . The primary focus of the original outsourcing contract was to integrate 12 individually acquired units with different systems into one system. Kellwood had been satis- " ed enough with EDS ’ s performance to renegotiate the contract in 2002 and 2008, even though at each renegotiation point, Kellwood had considered bringing the IS operations back in house, or backsourcing. The 2008 contract iteration resulted in a more # exible $105 million contract that EDS estimated would save Kellwood $2 million in the " rst year and $9 million over the remaining contract years. But the situation at Kellwood had changed drastically. In 2008, Kellwood had been purchased by Sun Capital Partners and taken private. The chief operating of" cer (COO), who was facing a mountain of debt and possibly bankruptcy, wanted to consolidate and bring the operations back in house to give some order to the current situation and reduce costs. Kellwood was suffering from a lack of IS standardization as a result of its many acquisitions. The chief information of" cer (CIO) recognized the importance of IS standardization and
  • 2. costs, but she was concerned that the transition from outsourcing to insourcing would cause serious disruption to IS service levels and project deadlines if it went poorly. Kellwood hired a third!party consultant to help it explore the issues and decided that backsourcing would save money and respond to changes caused by both the market and internal forces. Kellwood decided to backsource and started the process in late 2009. It carefully planned for the transition, and the implementation went smoothly. By performing stream- lined operations in house, it was able to report an impressive $3.6 million savings, or about 17% of annual IS expenses after the " rst year. 1 The Kellwood case demonstrates a series of decisions made in relation to sourcing. Both the decision to outsource IS operations and then to bring them back in house were based on a series of This chapter is organized around decisions in the Sourcing Decision Cycle. The ! rst question regarding information systems (IS) in the cycle relates to the decision to make (insource) or buy (outsource) them. This chapter ’ s focus is on issues related to outsourcing whereas issues related to insourcing are discussed in other chapters of this book. Discussed are the critical decisions in the Sourcing Decision Cycle: how and where (cloud computing, onshoring, offshoring). When the choice is offshoring, the next decision is where abroad (farshoring, nearshoring, or captive centers). Explored next in this chapter is the ! nal decision in the cycle, keep as is or change in which case the current arrangements are assessed and modi-
  • 3. ! cations are made to the outsourcing arrangement, a new outsourcing provider is selected, or the operations and services are backsourced, or brought back in house. Risks and strat- egies to mitigate risks are discussed at each stage of the cycle. 1 For more information see Stephanie Overby, “Company Saves Millions by Ending Outsourcing Deal,” CIO.com, http://www.cio. com/article/549463/Company_Saves_Millions_By_Ending_IT_ Outsourcing_Deal?page=1&taxonomyId=3195 (accessed January 31, 2012); B. Bacheldor, “Kellwood Stayed on Top of Its Outsourcing All the Way to the End,” CIO.com, http://blogs.cio.com/ beth_bacheldor/kellwood_stayed_ on_top_of_its_outsourcing_all_the_way_to_the_end?page=0 (accessed February 10, 2012). c10.indd 208 11/26/2015 6:32:09 PM http://www.cio.com/article/549463/Company_Saves_Millions_B y_Ending_IT_Outsourcing_Deal?page=1&taxonomyId=3195 http://blogs.cio.combeth_bacheldor/kellwood_stayed_%20on_to p_of_its_outsourcing_all_the_way_to_the_end?page=0 209Sourcing Decision Cycle Framework factors. These factors, similar to those used by many companies in their sourcing decisions, are discussed later in this chapter. The global outsourcing market has been growing steadily. Companies of all sizes pursue outsourcing arrangements, and many multimillion!dollar deals have been widely publicized. As more companies adopt out- sourcing as a means of controlling IS costs and acquiring
  • 4. “best!of!breed” capabilities, managing these supplier relationships has become increasingly important. IS departments must maximize the bene"t of these relationships to the enterprise and pre!empt problems that might occur. Failure in this regard could result in deteriorating quality of service, loss of competitive advantage, costly contract disputes, low morale, and loss of key personnel. How IS services are provided to a "rm has become an important strategic and tactical discussion. As brie#y mentioned in Chapter$6, there are numerous alternatives to sourcing computing power, applications, and infrastruc- ture. This chapter examines the sourcing cycle to consider the full range of decisions related to who should perform the IS work of an organization. The cycle begins with a decision to make or buy information services and products. Once the decision to make or buy has been "nalized, a series of questions must be answered about where and how these services should be delivered or products developed. The discussion in this chapter is built around the Sourcing Decision Cycle framework discussed in the next section. Considering the answers to sourcing questions can help explain a number of terms associated with sourcing: insourcing, outsourcing, cloud computing, full outsourcing, selective outsourcing, multisourcing, onshoring, offshoring, nearshoring, farshoring, and backsourcing. For each type of sourcing decision, the risks, or likelihood of something negative occurring as a result of the decision, are discussed, and some steps that can be taken to manage the risks are proposed. Sourcing Decision Cycle Framework Sourcing does not really just involve only one decision. It involves many decisions. The rest of this chapter is built around the critical sourcing decisions shown in Figure$10.1. Many of the chapter headings are tied to key decisions
  • 5. in Figure$ 10.1. Although the Sourcing Decision Cycle starts anywhere, we choose to start with the original make!or!buy decision. If an organization decides to “make,” that means that it plans to create and run its own applications. “Buy,” on the other hand, means the organization plans to obtain its applications from an outside HYBRID CAPTIVE CENTER OFFSHORING OUTSOURCING ONSHORING CLOUD INSOURCING Where abroad? Make Note: Insourcing can include captive centers Buy Keep as is or Change? Where? FARSHORING
  • 6. NEARSHORING How to source? Where? FIGURE 10.1 Sourcing Decision Cycle framework. c10.indd 209 11/26/2015 6:32:09 PM 210 Information Systems Sourcing vendor or vendors. When the “buy” option is selected, the organization becomes a client company that must then decide on “how” and “where” to outsource. The answers to the “how” question include the scope of the outsourcing and the steps that should be taken to ensure its success. The answers to the “where” question focus on whether the client company should work with an outsourcing provider (i.e., vendor) in its own country, offshore, or in a cloud. If the client company decides to go offshore because labor is cheaper or needed skills are more readily available, it must make another decision: It must decide whether it wants the work done in a country that is relatively nearby or in a country that is quite distant. Finally, the client company chooses an outsourcing provider (or decides to do its own IS work). After a while, the client company faces another decision. It periodically must evaluate the sourcing arrangement and see whether a change is in order. If the in house work is unsatisfactory or other opportunities that are preferable to the current arrangement have become available, then the client company may turn to outsourcing. If, on the other hand, the outsourcing arrangement is
  • 7. unsatisfactory, the client company has several options to con- sider: to correct any existing problems and continue outsourcing with its current provider, to outsource with another provider, or to backsource. If the company decides to make a change in its sourcing arrangements at this point, the Sourcing Decision Cycle starts over again. Starting the Cycle: The Make!or!Buy Sourcing Decision Managers decide whether to make or buy information services and products. The products can include an appli- cation or a system, and services can range from help desk support, telecommunications, running data centers, and even implementing and operating business processes as in business process outsourcing (BPO). A simple “make” decision often involves insourcing some or all of the business’s IS infrastructure, and a simple “buy” decision often involves outsourcing, although it could also include purchasing packaged software. In its simplest form, the make! or!buy decision hinges on whether to insource (“make”) or outsource (“buy”). Insourcing The most traditional approach to sourcing is insourcing, or providing IS services or developing them in the com- pany’s own in house IS organization and/or in its local cloud. Several “yes” answers to the questions posed in Figure$10.2 favor the decision to insource. Probably the most common reason is to keep core competencies in house. Managers are concerned that if they outsource a core competency, they risk losing control over it or losing contact with suppliers who can help them remain innovative in relation to that competency. Failing to control the competency or stay innovative is a sure way to forfeit a company’s competitive advantage. On the other hand, by outsourcing commodity work, a "rm can concentrate on its core competencies. Other factors that weigh in favor of insourcing
  • 8. are having an IS service or product that requires considerable security, con"dentiality, or adequate resources in house (e.g., time to complete the project with current staf"ng or IS professionals with the needed skills and training). In some companies, the IS function is underappreciated by top management. As long as everything is running smoothly, top managers may not notice the work done by or appreciate the services and products of the IS orga- nization. Often an IS department that insources has found it necessary to compete for resources differently than if it outsources. It is necessary for the department to have enough respect and support from top management to acquire resources and get the department’s job done. A major risk of insourcing is that the complexities of running IS in house requires management attention and resources that might better serve the company if focused on other value!added activities. Captive centers are a new variation of insourcing. A captive center is an overseas subsidiary that is created to serve its main “client,” the parent company, but it may serve other clients as well. Firms have set up such subsid- iaries to operate like an outsourcing provider, but the "rms actually own the subsidiaries. They are launched in less expensive locations, usually away from the company’s headquarters or major operating units. The three most common types of captive centers are basic, shared, and hybrid.2 The basic captive center provides services only to the parent "rm. The shared captive center performs work for both a parent company and external customers. 2 I. Oshri, J. Kotalarsky and C.!M. Liew, “What to Do with Your Captive Center: Four Strategic Options,” The Wall Street Journal (May 12, 2008), http:// www.wsj.com/articles/SB121018777870174513 (accessed
  • 9. September 2, 2015). c10.indd 210 11/26/2015 6:32:10 PM http://www.wsj.com/articles/SB121018777870174513 http://www.wsj.com/articles/SB121018777870174513 211Sourcing Decision Cycle Framework The$hybrid captive center typically performs the more expensive, higher pro"le or mission!critical work for the par- ent company and outsources the more commoditized work that is more cheaply provided by an offshore provider. Outsourcing Outsourcing means purchasing a good or service that was previously provided internally or that could be provided internally but is now provided by outside vendors. In the early days of outsourcing, outside providers often took over entire IS departments, including people, equipment, and management responsibility. Reducing costs was the primary motivation for outsourcing. This classic approach prevailed through most of the 1970s and 1980s but then experienced a decline in popularity. In 1989, Eastman Kodak Company’s multivendor approach to meeting its IS needs created the “Kodak effect.” Kodak outsourced its data center operations to IBM, its network to Digital Equipment Company, and its desktop supply and support operations to Businessland.3 Kodak managed these rela- tionships through strategic alliances.4 It retained a skeleton IS staff to act for its business personnel with out- sourcing providers. Its approach to supplier management became a model emulated by Continental Bank, General Dynamics, Continental Airlines, National Car Rental, and many more.5
  • 10. Kodak’s watershed outsourcing arrangement ushered in new outsourcing practices that put all IS activities up for grabs, including those providing competitive advantage. As relationships with outsourcing providers become FIGURE 10.2 Make or buy? Questions and risks. Make or Buy Questions Suggests Insourcing Suggests Outsourcing Examples of Associated Risk in Worse"Case Scenarios Does it involve a core competency? Yes No If outsourced: Loss of control over strategic initiatives; loss of strategic focus Does it involve con!dential or sensitive IS services or software development? Yes No If outsourced: Competitive secrets may be leaked Is there enough time available to complete software development projects in house? Yes No If insourced: Project not completed on time Do the in"house IS professionals have adequate training, experience, or skills
  • 11. to provide the service or develop the software? Yes No If outsourced: Technological innovations limited to what provider offers; overreliance on provider’s skills Are there reliable outsourcing providers who are likely to stay in business for the duration of the contract? No Yes If outsourced: Project not completed or, if completed, is over budget and late when another provider takes it over Is there an outsourcing provider that has a culture and practices that are compatible with the client? No Yes If outsourced: Con#ict between client and provider personnel Does the provider have economies of scale that make it cheaper to provide the service or develop the software than in house? Most likely No Most likely Yes If outsourced: Excessive costs of project or operations because of the way the contract is written Does it offer a better ability to handle peaks?
  • 12. Most likely No Most likely Yes If insourced: Loss of business Does it involve consolidating data centers? Most likely No Most likely Yes If insourced: Inef!cient operations 3 L. Applegate and R. Montealegre, “Eastman Kodak Co.: Managing Information Systems Through Strategic Alliances,” Harvard Business School case 192030 (September 1995). 4 Anthony DiRomualdo and Vijay Gurbaxani, “Strategic Intent for IT Outsourcing,” Sloan Management Review (June 22, 1998). 5 Mary C. Lacity, Leslie P. Willcocks, and David F. Feeny, “The Value of Selective IT Sourcing,” Sloan Management Review (March 22, 1996). c10.indd 211 11/26/2015 6:32:10 PM 212 Information Systems Sourcing more sophisticated, companies realize that even such essential functions as customer service are sometimes better managed by experts on the outside. Over the years, motives for outsourcing broadened beyond cost control. The next section examines factors and risks to be considered in making the outsourcing decision. The sourcing strategy suggested by the answers to the key how to source question and associated risks are listed in Figure$10.2. Factors in the Outsourcing Decision Under what conditions would an organization decide to
  • 13. outsource? There are three primary factors that are likely to favor the decision to seek to buy the services or products of an outsourcing provider: lower costs due to economies of scale, ability to handle processing peaks, and the client company’s need to consolidate data centers. These and other factors are listed in Figure$10.2. One of the most common reasons given for outsourcing is the desire to reduce costs. Outsourcing providers derive savings from economies of scale that client companies often cannot realize. Outsourcing providers achieve these economies through centralized (often “greener”) data centers, preferential contracts with suppliers, and large pools of technical expertise. Most often, enterprises lack such resources on a suf"cient scale within their own IS departments. For example, a single company may need only 5,000 PCs, but an outsourcing provider might negotiate a contract for 50,000 to spread over many clients and at a much lower cost per computer. Second, the outsourcing provider’s larger pool of resources than the client company’s allows the provider leeway in assign- ing available capacity to its clients on demand. For instance, at year!end, an outsourcing provider potentially can allocate additional mainframe capacity to ensure timely completion of nightly processing in a manner that would be impossible for an enterprise running its own bare!bones data center. Third, an outsourcing provider may help a client company to consolidate data centers following a merger or acquisition or when the internal group cannot overcome the inertia of its top management. Outsourcing may also offer an infusion of cash as a company sells its equipment to the outsourcing vendor. If the service or product involves a core competency, then the organization should strongly consider insourcing to protect the bene"ts the organization enjoys from its own
  • 14. competency. However, if the product or service is con- sidered to be a commodity instead of a core competency, then there are some distinct advantages to outsourcing. By bringing in outside expertise, client company management often can pay more attention to its core activities rather than to IS operations. Further, if an organization does not have employees with the training, experience, or skills in house to successfully implement new technologies, it should consider outsourcing. This is because outsourcing providers generally have larger pools of talent with more current knowledge of advancing technologies and best practices. For example, many outsourcing providers gain vast experience solving business intelligence problems whereas IS staff within a single company would have only limited experience, if any. That is why client companies turn to outsourcing providers to help them implement such technologies as Enterprise 2.0, Web 2.0 tools, cloud computing, and enterprise resource planning (ERP) systems. However, it is important to remember that client company managers are ultimately still responsible for IS services and products provided to their "rm. Outsourcing providers also have an added advantage because they can specialize in IS services. Outsourcing providers’ extensive experience in dealing with IS professionals helps them to understand how to hire, manage, and retain IS staff effectively. Often they can offer IS personnel a professional environment in which to work that a typical company cannot afford to build. For example, a Web designer would have responsibility for one Web site within a company but for multiple sites when working for an outsourcing provider. It becomes the outsourcing provider’s responsibility to "nd, train, and retain highly marketable IS talent. Outsourcing relieves a client of costly investments in continuous training to keep its IS staff current with the newest technologies and the headaches of
  • 15. hiring and retaining highly skilled staff that easily can change jobs. Outsourcing Risks Opponents of outsourcing cite a considerable number of risks with it (see Figure$10.2). A manager should consider each of these before making a decision about outsourcing. Each risk can be mitigated with effective planning and ongoing management. c10.indd 212 11/26/2015 6:32:10 PM 213Sourcing Decision Cycle Framework 6 Stephanie Overby, “The Hidden Costs of Offshore Outsourcing” (September 1, 2003), http://www.cio.com/article/29654/The_Hidden_Costs_of_ Offshore_Outsourcing (accessed June 4, 2012). First, outsourcing requires that a client company surrender a degree of control over critical aspects of the enterprise. The potential loss of control could extend to several areas: project control, scope creep, technologies employed, costs, "nancial controls, accuracy and clarity of "nancial reports, and even the company’s IS direction. By turning over data center operations, for example, a company puts itself at the mercy of an outsourcing provider’s ability to manage this function effectively. A manager must choose an outsourcing provider carefully and negotiate terms that encourage an effective working relationship. Second, outsourcing client companies may not adequately anticipate new technological capabilities when nego- tiating outsourcing contracts. Outsourcing providers may not
  • 16. recommend so!called bleeding!edge technologies for fear of losing money in the process of implementation and support, even if their implementation would best serve the client company. Thus, poorly planned outsourcing can result in a loss in IS #exibility. For example, some out- sourcing providers were slow to adopt social technologies for their clients because they feared the bene"ts would not be as tangible as the costs of entering the market. This reluctance impinged on clients’ ability to realize social business strategies. To avoid this problem, an outsourcing client should have a chief technology of"cer (CTO) or technology group that is charged with learning about and assessing emerging technologies that can be used to support its company’s business strategy. Third, by surrendering IS functions, a client company gives up any real potential to develop them for compet- itive advantage—unless, of course, the outsourcing agreement is sophisticated enough to comprehend developing such an advantage in tandem with the outsourcing company. However, the competitive advantage may be compro- mised if it is made available to the outsourcing provider’s other clients. Under many circumstances, the outsourcing provider becomes the primary owner of any technological solutions that it develops for the client. This allows the outsourcing provider to leverage the knowledge to bene"t other clients, possibly even competitors of the initial client company. Fourth, contract terms may leave client companies highly dependent on their outsourcing provider with little recourse in terms of terminating troublesome provider relationships. That is, the clients may be locked into an arrangement that they no longer want. It may be too expensive to switch to another outsourcing provider should the contract sour. Despite doing due diligence and background
  • 17. checks, the outsourcing provider may be unreliable or go out of business before the end of the contract. The risk of over!reliance for any number of reasons typi- cally increases as the size of the outsourcing contract increases. DHL Worldwide Express entrusted 90% of its IT development and maintenance projects to a large Indian!based company, Infosys. “There’s a lot of money wrapped up in a contract this size, so it’s not something you take lightly or hurry with,” said Ron Kifer, DHL’s Vice President of Program Solution s and Management.6 Clearly, DHL faced considerable risk in offshoring with Infosys because of its reliance on the provider. Fifth, it might be harder to keep its competitive secrets when a company employs an outsourcing provider. Although outsourcing providers are sensitive to keeping client information separated in their systems, an outsourcer’s staff will usually work with multiple customers. Some managers are concerned that their company databases are no longer kept in house, and the outsourcing provider’s other customers may have easier access to sensitive information. Although all outsourcing agreements contain clauses to keep customer data and systems secure, managers still voice
  • 18. concern about data security and process skills when they are managed by a third party. Thinking through the security issues carefully and implementing controls where possible mitigate this risk. Often, the outsourcing provider has more secure processes and practices in place simply because its business depends on it—it’s a competitive necessity and often a core competency of the outsourcing provider. Sixth, the outsourcing provider’s culture or operations may be incompatible with that of the client company, making the delivery of the contracted service or system dif"cult. Con#icts between the client’s staff and the staff of the outsourcing provider may delay progress or harm the quality of the service or product delivered by the out- sourcing provider. Finally, although many companies turn to outsourcing because of perceived cost savings, these savings may never be realized. Typically, the cost savings are premised on the old way that the company performed the processes. c10.indd 213 11/26/2015 6:32:10 PM http://www.cio.com/article/29654/The_Hidden_Costs_of_Offsh ore_Outsourcing
  • 19. 214 Information Systems Sourcing However, new technologies may usher in new processes, and the anticipated savings on the old processes become moot. Further, the outsourcing client is, to some extent, at the mercy of the outsourcing provider. Increased vol- umes due to unspeci" ed growth, software upgrades, or new technologies not anticipated in the contract may end up costing a " rm considerably more than it anticipated when it signed the contract. Also, some savings, although real, may be hard to measure. Decisions about How to Outsource Successfully Clearly, the decision about whether to outsource must be made with adequate care and deliberation. It must be fol- lowed with numerous other decisions about how to mitigate outsourcing risks and make the outsourcing arrange- ment work. Once these decisions have been made, they should be openly communicated to all relevant stakeholders. Three major decision areas are selection, contracting, and scope. Selection
  • 20. Selection!related decisions focus on " nding compatible outsourcing providers whose capabilities, managers, internal operations, technologies, and culture complement those of the client company. This means that compati- bility and cultural " t might trump price, especially when long!term partnerships are envisioned. Selection factors are discussed more fully in the “where” and “where abroad” decisions. Contracting Many “how” decisions center around the outsourcing contract. In particular, client companies must ensure that contract terms allow them the # exibility they require to manage and, if necessary, sever supplier relationships. The 10 !year contracts that were so popular in the early 1990s are being replaced with contracts of shorter duration lasting 3 to 5 years and full life cycle service contracts that are broken up into stages. Deal size also has declined this millennium. Although the numbers of megadeals and midrange contracts awarded each year have remained relatively stable since 2002, smaller contracts valued at $100 million or less had more than tripled a decade later. 7 Social Business Lens: Crowdsourcing Crowdsourcing is a form of outsourcing that is provided
  • 21. by a very large number of individuals. Two forms of crowdsourcing are available: collaboration and tournament. Collaboration crowdsourcing occurs when individ- uals use social media to collectively create a common document or solution. Examples are Wikipedia or crowd- sourcing for innovation as was discussed in Chapter$ 5 . Tournament crowdsourcing also uses social media to solicit and collect independent solutions from a potentially large number of individuals but selects one or a few of the contributions in exchange for ! nancial or non! nancial compensation. Some sites offer marketplaces to promote particular types of tournament crowdsourcing. Consider 99designs (99designs.com), which is the largest online graphic design marketplace where people or ! rms can go to get affordable designs for such things as logos, labels, business cards, and Web sites. It is anticipated that by 2016, the site will have over a million members offering graphic services. Businesses can source graphic design work by launching design contests to the 99design community, working individually with designers …