208
10
chapter Information Systems
Sourcing
After 13 years, Kellwood, an American apparel maker, ended its soups!to!nuts IS outsourcing
arrangement with EDS . The primary focus of the original outsourcing contract was to integrate
12 individually acquired units with different systems into one system. Kellwood had been satis-
" ed enough with EDS ’ s performance to renegotiate the contract in 2002 and 2008, even though
at each renegotiation point, Kellwood had considered bringing the IS operations back in house,
or backsourcing. The 2008 contract iteration resulted in a more # exible $105 million contract that
EDS estimated would save Kellwood $2 million in the " rst year and $9 million over the remaining
contract years. But the situation at Kellwood had changed drastically. In 2008, Kellwood had been
purchased by Sun Capital Partners and taken private. The chief operating of" cer (COO), who was
facing a mountain of debt and possibly bankruptcy, wanted to consolidate and bring the operations
back in house to give some order to the current situation and reduce costs. Kellwood was suffering
from a lack of IS standardization as a result of its many acquisitions. The chief information of" cer
(CIO) recognized the importance of IS standardization and costs, but she was concerned that the
transition from outsourcing to insourcing would cause serious disruption to IS service levels and
project deadlines if it went poorly. Kellwood hired a third!party consultant to help it explore the
issues and decided that backsourcing would save money and respond to changes caused by both the
market and internal forces. Kellwood decided to backsource and started the process in late 2009. It
carefully planned for the transition, and the implementation went smoothly. By performing stream-
lined operations in house, it was able to report an impressive $3.6 million savings, or about 17% of
annual IS expenses after the " rst year. 1
The Kellwood case demonstrates a series of decisions made in relation to sourcing. Both the
decision to outsource IS operations and then to bring them back in house were based on a series of
This chapter is organized around decisions in the Sourcing Decision Cycle. The ! rst question
regarding information systems (IS) in the cycle relates to the decision to make (insource) or
buy (outsource) them. This chapter ’ s focus is on issues related to outsourcing whereas issues
related to insourcing are discussed in other chapters of this book. Discussed are the critical
decisions in the Sourcing Decision Cycle: how and where (cloud computing, onshoring,
offshoring). When the choice is offshoring, the next decision is where abroad (farshoring,
nearshoring, or captive centers). Explored next in this chapter is the ! nal decision in the
cycle, keep as is or change in which case the current arrangements are assessed and modi-
! cations are made to the outsourcing arrangem ...
The document discusses factors to consider when making outsourcing decisions, including cost/benefit analysis, core competencies, capacity, and ethics. It provides examples of how to calculate direct and indirect costs for insourcing vs outsourcing. Core competencies that provide customer value and are difficult for competitors to replicate should be kept in-house. Outsourcing non-core functions can free up resources. Capacity and flexibility also impact decisions. Ethical issues like responsibility to employees and cultural impacts must be weighed. Careful analysis of multiple factors is important for good outsourcing decisions.
Question 1The board of directors is considering updating the fle.docxmakdul
Question 1
The board of directors is considering updating the fleet of vehicles of the company which are used to ship goods to markets all around the United States. They will be leasing the vehicles as opposed to purchasing them outright. Please explain the advantages of leasing and which lease type would be more preferable?
Respond to this... The advantages of leasing include 100% financing at fixed rates and often require no money down from the lessee, protection against obsolescence to the lessee and passing the risk of residual value to the lessor, flexibility, less costly financing, tax advantages such as not having to report an asset or liability for a lease agreement, and off balance sheet financing. (Kieso, Weygandt, & Warfield, 2013).
I would say an operating lease is the more preferable lease options because if the company used a capital lease they would have an increase in the amount of reported debt (both short-term and long-term), have an increase in the amount of total assets (specifically long-lived assets). And they would have a lower income early in the life of the lease and, therefore, lower retained earnings.
“Many companies believe that capital leases negatively impact their financial position: Their debt to total equity ratio increases, and their rate of return on total assets decreases. As a result, the business community resists capitalizing leases. Whether this resistance is well founded is debatable. From a cash flow point of view, the company is in the same position whether accounting for the lease as an operating or a capital lease. Managers often argue against capitalization for several reasons. First, capitalization can more easily lead to violation of loan covenants. It also can affect the amount of compensation received by owners (for example, a stock compensation plan tied to earnings). Finally, capitalization can lower rates of return and increase debt to equity relationships, making the company less attractive to present and potential investors” (Kieso, Weygandt, & Warfield, 2013, pg. 1282).
References
Kieso, D. E., Weygandt, J. J., Warfield, T. D. (2013). Intermediate Accounting, 15th Edition. [VitalSource Bookshelf Online]. Retrieved from https://ambassadored.vitalsource.com/#/books/9781118722671/
Question 2
In some cases, one of the purposes of initiating a business combination is to control your value chain through vertical integration.
Consider the following two independent scenarios:
1. General Motors relies on an unrelated company for a key component
2. General Motors relies on a vertically integrated subsidiary for a key component
Discuss the pros and cons of both scenarios. Specifically address how a subsidiary that provides products only to the parent can be fairly evaluated on performance. What do you believe is the best option for General Motors? Explain.
Respond to this... The cons and pros could be pros and cons for the other.
1. General motors relies on an unrelated company for key compo ...
The CIO is concerned about the ever-increasing costs of maintaining the growing number of IT applications in the organization. Rapid proliferation of applications, especially cloud and SaaS technologies, has overwhelmed many IT departments and led to issues with integration, security, and maintenance. Application portfolio management (APM) approaches aim to address this by providing visibility into spending, prioritizing applications based on their value and costs, and ensuring applications map to business objectives. Key capabilities for successful APM implementation include developing strategies and governance, inventory management of applications, and reporting and rationalization of the portfolio.
IT Optimization: Navigation Fiscal AusterityOmar Toor
The Federal Government faces a situation similar to that of the private sector in the early 2000s. Many corporations experienced rapid growth in the late 1990s. Companies spent tens of millions of dollars on ERP, CRM, and other enterprise IT systems. As the below graphic illustrates, large enterprise systems grew corporate expense budgets at an unprecedented rate in the form of support, maintenance, enhancement, operations, and amortization. The late 1990’s technology and dot com busts, multiple downturns, and a recession caused industry to change their spending habits and drive cost out of their baseline. Some succeeded, many failed, and a few went bankrupt.
The question is whether Federal COOs, CFOs, and CIOs will wait for OMB to levy cuts on them or whether Federal executives will act to address the systemic drivers of IT expense so they are ready to respond to the inevitable round of forthcoming budget cuts. In the words of George Bernard Shaw, “The possibilities are numerous once we decide to act and not react.” Acting now could protect agency missions and even redirect additional funds to critical needs. If CFOs and CIOs wait for the inevitable budget mandate, it will be too late to identify waste - and the only thing left to cut will be investment dollars.
www.pwc.com/publicsector
1) The document discusses speed bumps that companies face in adopting advanced technology for document processing, including regulatory headaches, staying compliant, cost control, and meeting service level agreements. It also discusses technology speed bumps such as handling document volume and velocity, validation challenges, and issues with cloud vs. on-premise solutions.
2) It notes that while the technology for automated document processing has matured, many companies have been slow to adopt it due to rigid pricing models from some vendors and challenges upgrading legacy software.
3) However, it suggests the industry is at a critical juncture and companies that take a customer-centric approach with flexible, upgradeable technology will be best positioned to automate document processing and
This document discusses offshoring and outsourcing. It begins by defining offshoring as moving business processes like IT services to lower cost countries. It notes the differences between offshoring and outsourcing, with outsourcing involving hiring another company for work while offshoring moves work overseas. The document then discusses reasons for offshoring like reducing costs, focusing on core competencies, and accessing skills. It also examines factors like captive models versus outsourcing providers and the impact of offshoring on companies of different sizes. Finally, it discusses questions to consider for outsourcing decisions around what to outsource, which companies to outsource to, and how to structure deals.
Offshoring benefits such as lower costs are still valid, but a reassessment is needed. While offshoring saved money initially, hidden costs and wage increases in countries like India have reduced savings. Government actions now prohibit some offshore outsourcing. New risks have also emerged, so strategic objectives and requirements should be re-evaluated to determine if the current offshore model still fits or if onshoring or new options should be considered. A thorough review process assessing business changes, assumptions, costs, quality and objectives is recommended to inform contract renewal decisions.
Assignment 6 - IS Managment Issue IdentificationAshley Leonzio
This document discusses the challenges of determining when to retire or sunset software applications and products. It notes that while retiring legacy systems seems logical, there are many complicating factors to consider, such as costs, contractual obligations, regulatory compliance, and understanding how customers use the system. The document examines frameworks for evaluating products and the product lifecycle. It also discusses stakeholders impacted by sunsetting decisions and why determining when to retire products is fundamentally difficult, with many tradeoffs to evaluate.
The document discusses factors to consider when making outsourcing decisions, including cost/benefit analysis, core competencies, capacity, and ethics. It provides examples of how to calculate direct and indirect costs for insourcing vs outsourcing. Core competencies that provide customer value and are difficult for competitors to replicate should be kept in-house. Outsourcing non-core functions can free up resources. Capacity and flexibility also impact decisions. Ethical issues like responsibility to employees and cultural impacts must be weighed. Careful analysis of multiple factors is important for good outsourcing decisions.
Question 1The board of directors is considering updating the fle.docxmakdul
Question 1
The board of directors is considering updating the fleet of vehicles of the company which are used to ship goods to markets all around the United States. They will be leasing the vehicles as opposed to purchasing them outright. Please explain the advantages of leasing and which lease type would be more preferable?
Respond to this... The advantages of leasing include 100% financing at fixed rates and often require no money down from the lessee, protection against obsolescence to the lessee and passing the risk of residual value to the lessor, flexibility, less costly financing, tax advantages such as not having to report an asset or liability for a lease agreement, and off balance sheet financing. (Kieso, Weygandt, & Warfield, 2013).
I would say an operating lease is the more preferable lease options because if the company used a capital lease they would have an increase in the amount of reported debt (both short-term and long-term), have an increase in the amount of total assets (specifically long-lived assets). And they would have a lower income early in the life of the lease and, therefore, lower retained earnings.
“Many companies believe that capital leases negatively impact their financial position: Their debt to total equity ratio increases, and their rate of return on total assets decreases. As a result, the business community resists capitalizing leases. Whether this resistance is well founded is debatable. From a cash flow point of view, the company is in the same position whether accounting for the lease as an operating or a capital lease. Managers often argue against capitalization for several reasons. First, capitalization can more easily lead to violation of loan covenants. It also can affect the amount of compensation received by owners (for example, a stock compensation plan tied to earnings). Finally, capitalization can lower rates of return and increase debt to equity relationships, making the company less attractive to present and potential investors” (Kieso, Weygandt, & Warfield, 2013, pg. 1282).
References
Kieso, D. E., Weygandt, J. J., Warfield, T. D. (2013). Intermediate Accounting, 15th Edition. [VitalSource Bookshelf Online]. Retrieved from https://ambassadored.vitalsource.com/#/books/9781118722671/
Question 2
In some cases, one of the purposes of initiating a business combination is to control your value chain through vertical integration.
Consider the following two independent scenarios:
1. General Motors relies on an unrelated company for a key component
2. General Motors relies on a vertically integrated subsidiary for a key component
Discuss the pros and cons of both scenarios. Specifically address how a subsidiary that provides products only to the parent can be fairly evaluated on performance. What do you believe is the best option for General Motors? Explain.
Respond to this... The cons and pros could be pros and cons for the other.
1. General motors relies on an unrelated company for key compo ...
The CIO is concerned about the ever-increasing costs of maintaining the growing number of IT applications in the organization. Rapid proliferation of applications, especially cloud and SaaS technologies, has overwhelmed many IT departments and led to issues with integration, security, and maintenance. Application portfolio management (APM) approaches aim to address this by providing visibility into spending, prioritizing applications based on their value and costs, and ensuring applications map to business objectives. Key capabilities for successful APM implementation include developing strategies and governance, inventory management of applications, and reporting and rationalization of the portfolio.
IT Optimization: Navigation Fiscal AusterityOmar Toor
The Federal Government faces a situation similar to that of the private sector in the early 2000s. Many corporations experienced rapid growth in the late 1990s. Companies spent tens of millions of dollars on ERP, CRM, and other enterprise IT systems. As the below graphic illustrates, large enterprise systems grew corporate expense budgets at an unprecedented rate in the form of support, maintenance, enhancement, operations, and amortization. The late 1990’s technology and dot com busts, multiple downturns, and a recession caused industry to change their spending habits and drive cost out of their baseline. Some succeeded, many failed, and a few went bankrupt.
The question is whether Federal COOs, CFOs, and CIOs will wait for OMB to levy cuts on them or whether Federal executives will act to address the systemic drivers of IT expense so they are ready to respond to the inevitable round of forthcoming budget cuts. In the words of George Bernard Shaw, “The possibilities are numerous once we decide to act and not react.” Acting now could protect agency missions and even redirect additional funds to critical needs. If CFOs and CIOs wait for the inevitable budget mandate, it will be too late to identify waste - and the only thing left to cut will be investment dollars.
www.pwc.com/publicsector
1) The document discusses speed bumps that companies face in adopting advanced technology for document processing, including regulatory headaches, staying compliant, cost control, and meeting service level agreements. It also discusses technology speed bumps such as handling document volume and velocity, validation challenges, and issues with cloud vs. on-premise solutions.
2) It notes that while the technology for automated document processing has matured, many companies have been slow to adopt it due to rigid pricing models from some vendors and challenges upgrading legacy software.
3) However, it suggests the industry is at a critical juncture and companies that take a customer-centric approach with flexible, upgradeable technology will be best positioned to automate document processing and
This document discusses offshoring and outsourcing. It begins by defining offshoring as moving business processes like IT services to lower cost countries. It notes the differences between offshoring and outsourcing, with outsourcing involving hiring another company for work while offshoring moves work overseas. The document then discusses reasons for offshoring like reducing costs, focusing on core competencies, and accessing skills. It also examines factors like captive models versus outsourcing providers and the impact of offshoring on companies of different sizes. Finally, it discusses questions to consider for outsourcing decisions around what to outsource, which companies to outsource to, and how to structure deals.
Offshoring benefits such as lower costs are still valid, but a reassessment is needed. While offshoring saved money initially, hidden costs and wage increases in countries like India have reduced savings. Government actions now prohibit some offshore outsourcing. New risks have also emerged, so strategic objectives and requirements should be re-evaluated to determine if the current offshore model still fits or if onshoring or new options should be considered. A thorough review process assessing business changes, assumptions, costs, quality and objectives is recommended to inform contract renewal decisions.
Assignment 6 - IS Managment Issue IdentificationAshley Leonzio
This document discusses the challenges of determining when to retire or sunset software applications and products. It notes that while retiring legacy systems seems logical, there are many complicating factors to consider, such as costs, contractual obligations, regulatory compliance, and understanding how customers use the system. The document examines frameworks for evaluating products and the product lifecycle. It also discusses stakeholders impacted by sunsetting decisions and why determining when to retire products is fundamentally difficult, with many tradeoffs to evaluate.
1
Week 4 Textbook Problems
Week 4 Textbook Problems
6Week 4 Textbook ProblemsWeek 4 Textbook Problems
Ch. 10
#17. Role of IMF’s
International mutual funds (IMFs) have given investors access to foreign securities because the firm who sponsors IMF makes all their portfolio decisions and completes their transactions. Small investors can also invest in foreign securities by purchasing shares of IMFs, but international capital markets have become more integrated.
#18. Spinning and Laddering
Spinning is where an investment bank converts its shares from an IPO to corporate executives who may be considering an IPO that requires the help of an investment bank. Laddering is when investors place bids above the offer price on shares the first day they come out.
Laddering moves the value of shares up which may not accurately reflect the value of the stock. The owners of the firm may be affected because the will not receive as much profits from the IPO because the spinning and laddering. Spinning can result in shares being sold a lower price, but laddering will only occur if there is a strong demand for the shares.
#21. IPO Dilemma
The disadvantage of using an offer price of $12 instead of $14 is that they are giving up $2 per share, which means they will receive $8 million less. The advantage of this is that Denton can have a successful offering, which can result in them selling of their shares, which could lead to a secondary offering in the future if needed to raise more for new projects. Denton knows that the securities firm needs to set a low price so that they can attract a lot of investors to sell all the shares.
Dividend Yield Problem
Dividend yield = 4 x $0.10 =1.01%
$39.78
Ch. 12.
#1. Orders
A limit order is an order to execute a transaction when the price reaches a specific level, and a market order is an order to execute a transaction at market price.
#2. Margins
Margins specify a proportion of funds to be invested with money that was borrowed versus being paid in cash. Borrowing increases the return earned from the investment in stock, but it also increases the risk because the potential loss goes up, which can happen form investing in stock. Maintenance margin is the minimum amount of margin that must be maintained over the time the investor holds the investment.
#13 Bid-Ask Spread of Penny Stock
Penny stocks are very risky and the order cost for those kind of stocks are often higher because they do not trade on an organized exchange or on NASDAQ. Penny stocks also have zero or very few market makers and competition, and their stocks are usually illiquid, so they are hard to sell.
Ch. 13
#1. Future Contracts
A future contract is a standardized agreement to receive or deliver a specific amount of a financial instrument at a specified date and price. The clearinghouse records all transactions on future contracts, which gives a need for a purchaser of a future contract to check the creditwo.
The lecture discussed offshore outsourcing and offshoring of business services. It defined outsourcing as assigning peripheral business activities to external vendors, while offshoring refers to relocating entire business processes to another country. Offshoring provides benefits like lower labor costs, access to skilled talent, and ability to enter new markets. However, expected cost savings are often lower than anticipated due to hidden costs. Risks of offshoring include data security, loss of business knowledge, and vendor failure to deliver. Process maturity and contingency planning are important factors for successful offshoring. Outsourcing core competencies can allow companies to focus on innovation, but there is also risk of capabilities becoming non-core. Productivity measurement
Applying IT to Sweeten Divestitures: The Seller PerspectiveCognizant
A lion’s share of companies plan to divest in the next two years, according to industry gurus, but a significant number of divestment projects are delayed or deferred due to misalignment of the business strategy and the IT strategy. Here’s how sellers can leverage IT as an enabler to achieve the business objectives that drive the divestiture agenda.
What Goes Into Onboarding New Cybersecurity VendorsExecweb
The process of onboarding these vendors is far from straightforward. It requires a meticulous approach, combining technical evaluation, due diligence, and strategic alignment to ensure seamless integration and optimal security outcomes.
1Running Head Business ProjectSection 1 Business Requirement.docxfelicidaddinwoodie
1
Running Head: Business Project
Section 1: Business Requirements Document
I. Describe the scope and analyze how to control the scope.
Scope:
We live in computer age where businesses no more bound by borders or limited clientage. Computer and fast technology has renovated the Project's scope can be defined as such element in project that explains the boundaries of the project, set responsibilities for each team member and describe the procedures for how completed work will be verified and how it will be approved.
Meetup help the people together in thousands of cities to do what they want to do in life. Major scope is to give the human being a happiness and peace of mind so that no one gets disappointed that he never got a chance to do what he want to do in his life. It is based on a very simple single idea that is when we get together and do such tasks that matter to us or appeal us most, we’re doing our best. It's all about the central idea or major chunk of scope of Meetup. It assist the people together to do, search, teach and learn the things that help them to live long and what they desire most to do. Meetup now want to increase its scope by setting offices in main cities and want to do extensive advertisement so that more people know about services of company and connect with it.
How to Control Scope process
Changing a scope is an ongoing process that starts just after creation of baseline.
Control Scope Inputs
Five inputs are included in control scope process
1. Project management plan.
In this step scope baseline consisting of the WBS codes WBS dictionary as well as the project scope statement is analyzed. This phase describes how to control scope when the change control plan will intimate about project change control system.
2. Work performance information.
In this phase information is provided on deliverable status and it describes which deliverables are ready to launch and which one are currently work in progress, and how much work is still pending. This phase contains information related to any issues and risks that the development team is expected to face for particular deliverables or products.
3. Requirements documentation.
This is very important phase in input process as when a change request is made the requirements documentation acts as a reference to memorize what was originally agreed so that the change could be detected against the regional requirement.
4. Requirements traceability matrix.
It helps the project manager to estimate about the value of change that is required and the regional baseline that is already finalized and why this change is so important for this project. It assist him to identify source of change and he will consult about this change from the stakeholders who are expected to affect by this change.
5. Organizational process assets.
This will normally cover any particular policies and procedures that have been laid down by the delivery organization regarding scope manage ...
ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...Arno Kapteyn
In marketing a saying goes: “The Customer does not exist” this recognizes that each customer is unique in its desires and requirements and there is no such thing as a one size fits all. In analogy this session sets out with the statement that “The business does not exist”. An enterprise is a unique combination of central or de-central, task, geography, goal and/ or skills oriented divisions and departments. All these stakeholders have individual needs and requirements that might be met or supported by the services offered by the Enterprise IT Domain. To offer a one size fits all solution (per service) in response to this multitude of desires is to reuse the line of though from Henry Ford: “They can have any color they like as long as it is black”. This approach was very useful to help build the company into the global enterprise it is today. Yet at some point in the growth of the organization it was abandoned in favor of more variation of choice as a trip to the ford dealer will tell you. Even a standard product like a McDonalds hamburger varies to suite the (taste) requirements in different parts of the world.
How can the IT Domain of an enterprise growing in complexity, size, geographical presence etc. strategically prepare to deal with this complexity and ensure it will (keep) deliver(ing) maximum value in the eyes of the individual stakeholder (groups)?
memo/Example 3220 memos.docMemo 1
Date:
5/3/2011
To:
VP of Human Resources
Cc:
Directors and Account Managers
From:
Fred Flintstone, HR Director
RE:
Telecommuting: An Untapped Resource
Globalization is in full swing and luckily our company is growing, both financially and geographically. Historically, our pool of candidates has been limited to the narrow field available in the immediate vicinity of our main office. To keep up with changing times we need to explore options to that will allow us to enjoy a larger pool of qualified candidates, as well as attracting and keeping those candidates. Enhancing our technology and opening our standard policies to telecommuting could give us the edge we need to stay ahead of our competitors.
Relevant Issues
Telecommuting is not a new concept. The government explored telecommuting options to conserve gas as early as the 1970s and the private sector began taking advantage of it as soon as home computers and the internet made it possible. Today, telecommuting is common place in many industries.
The newest generation of candidates and soon to be graduates have already adapted to a constant bombardment of steaming media, multitasking and all the newest technology. The brightest minds work well independently and desire the nontraditional workplace. Telecommuting opportunities will give them more flexible schedules, the ability to work on the go and the ability to work in whatever kind of environment they find most comfortable and productive. The downside to permitting our employees to work from home, or wherever, is we will lose a certain amount of control. We will have to screen candidates very carefully and develop other ways to track their productivity to assure they aren’t taking advantage of the situation.
There are multiple ways we could achieve telecommuting capabilities and before we move forward, we’ll have to investigate which option or combination of options will give us the best results at the least cost. In the long run, converting more of our staff to telecommuters will likely save us money on top of everything else.
Changing Perspective
We know our business is already successful. With that in mind, it’s hard to picture making dramatic changes to our business model and breaking from tradition. Part of the reason we’ve been successful this long is because of our ability to find solutions in unconventional ways. We shouldn’t be shutting our door to some of the best candidates because they don’t happen to live here. Allowing employees to work from home will open the pool of candidates nationally, and potentially worldwide, without us having to pay relocation costs.
We must also look at the changing generations and encourage the best results from our new hires and current employees. We already know that people learn best under varying conditions. This is true of the best work environments as well. While working standard 8 to 5 hours in the controlled environment of a trad ...
Home Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docxfideladallimore
Home Notifications My Community
BBA 3551-16P-5A19-S3, Information Systems Management
Unit VII
Unit VII Introduction
Greetings!! You are almost done with this
course!! Keep up the good work.
In Unit VI, we covered information security and
how to secure systems and data.
This week we take an in-depth look at
information systems management and
outsourcing. While outsourcing may have a
bad reputation when people think that jobs are
being taken away from someone, it can offer
many benefits to all organizations involved.
Also, it does not necessarily take away jobs. In
many instances, outsourcing simply
restructures the organizations within an
industry. When you think about outsourcing,
remember that it does not always mean hiring
workers outside the country. Outsourcing can
occur between two organizations in the same
city.
Professor Bulloch
Unit VII Study Guide
Click the link above to open the unit study
guide, which contains this unit's lesson and
reading assignment(s). This information is
necessary in order to complete this course.
Unit VII Discussion Board
Weight: 2% of course grade
Grading Rubric
Comment Due: Saturday, 05/11/2019
11:59 PM (CST)
Response Due: Tuesday, 05/14/2019
11:59 PM (CST)
Go to Unit VII Discussion Board »
Unit VII Case Study
Weight: 11% of course grade
Grading Rubric
Due: Tuesday, 05/14/2019 11:59 PM
(CST)
Instructions
Define what is meant by outsourcing.
Explain how Peter Drucker’s statement
(covered in the textbook in uCertify)
about how one company’s back room is
another company’s front room pertains
to outsourcing. Use an example.
Summarize the management
advantages, cost reduction, and risk
reduction of outsourcing.
Summarize the outsourcing risks
concerning control, long-term costs, and
exit strategy.
Discuss which company you would
outsource to and why. Does distance
matter?
As a manager of an organization, you will
often need to find ways to cut costs. One
way to cut costs is to outsource by hiring
another organization to perform the service.
Consider the scenario below.
As a manager for the public outreach
department, you realize that the current
system for managing outreach issues is
outdated. You would like to have a new
outreach system developed using the
Cloudera platform to help manage big data.
However, no one in the organization has the
expertise. You will have to outsource the
project to save on costs and avoid
management problems. Two companies
have sent in a bid—one from Vancouver,
Canada, and one from Mumbai, India. The
bid from India was slightly lower than the bid
from Canada. Compose a response that
includes the elements listed below.
Your case study must be at least two pages
in length (not counting the title and
reference pages), and you must use at least
two references as a source for your essay.
See the Suggested Reading section for
some sample articles on outsourcing. Be
sure to cite all sources used in.
The document outlines nine key steps that companies can take as part of a digital transformation journey to disrupt themselves before competitors do. The steps include: 1) designing an end-game disruptive business model, 2) analyzing gaps between the current and future models, 3) determining how to execute the transition, 4) architecting new technology, 5) auditing legacy systems, 6) building out a dual-speed IT architecture, 7) establishing a data security strategy, 8) maintaining security during transformation, and 9) using transformation as an opportunity to escalate security standards across the enterprise. Taking these steps can help traditional firms successfully transition to competing in the new digital landscape.
In this edition of Valuation Insights we discuss several hot topics related to intellectual property, including a framework for evaluating whether to develop IP in-house or purchase through an acquisition (Build vs. Buy Decision). In our Technical Notes section we discuss how patent rights can be used to exclude competitors from practicing an invention or alternatively how to receive monetary compensation or injunctive relief in the Federal Courts. Finally, our international in focus article discusses the Internal Revenue Service’s proposed regulations to address the tax treatment by multinational corporations of certain asset and business transfers under Internal Revenue Code Sections 376(a) and (d).
The document discusses implementing an agile approach to software development for Department of Defense information technology programs while still meeting requirements for Earned Value Management. It notes that the National Defense Authorization Act of 2010 Section 804 directed the development of a new acquisition process for IT systems that incorporates agile principles like early user involvement, rapid delivery of capabilities, and evolutionary prototyping. The presentation will argue that Earned Value Management can work with agile software development in the federal procurement context to recognize the business value being earned through time and money spent on projects.
In today’s global marketplace, successful companies must be able to integrate and quickly view quality audit information from their manufacturing sites all over the world. This strategic capability has become even more important as manufacturers have moved offshore and have become more complex. The value and immediacy of quality assurance data is a critical element to the survival of competitive manufacturing organizations. Software systems can address these issues.
Source:
Lyons Information Systems, Inc
http://www.lyonsinfo.com
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docxlorainedeserre
4.1 EXPLORING INCENTIVE PAY
4-1 Explore the incentive pay approach.
Incentive pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss212) or
variable pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss462)
rewards employees for partially or completely attaining a predetermined work objective.
Incentive or variable pay is defined as compensation, other than base wages or salaries that
fluctuate according to employees’ attainment of some standard, such as a preestablished
formula, individual or group goals, or company earnings.
Effective incentive pay systems are based on three assumptions:
Individual employees and work teams differ in how much they contribute to the
company, both in what they do as well as in how well they do it.
The company’s overall performance depends to a large degree on the performance of
individuals and groups within the company.
To attract, retain, and motivate high performers and to be fair to all employees, a
company needs to reward employees on the basis of their relative performance.
Much like seniority and merit pay approaches, incentive pay augments employees’ base pay,
but incentive pay appears as a one-time payment. Employees usually receive a combination
of recurring base pay and incentive pay, with base pay representing the greater portion of
core compensation. More employees are presently eligible for incentive pay than ever before,
as companies seek to control costs and motivate personnel continually to strive for exemplary
performance. Companies increasingly recognize the importance of applying incentive pay
programs to various kinds of employees as well, including production workers, technical
employees, and service workers.
Some companies use incentive pay extensively. Lincoln Electric Company, a manufacturer of
welding machines and motors, is renowned for its use of incentive pay plans. At Lincoln
Electric, production employees receive recurring base pay as well as incentive pay. The
company determines incentive pay awards according to five performance criteria: quality,
output, dependability, cooperation, and ideas. The company has awarded incentive payments
every year since 1934, through prosperous and poor economic times. In 2014, the average
profit sharing payment per employee was $33,984.
Coupled with average base
pay, total core compensation for Lincoln employees was $82,903. Over the past 10 years,
Lincoln’s profit-sharing payments averaged approximately 40 percent of annual salary.
1
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end1)
2
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end2)
3
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end3)
4
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end4)
4.1 Exploring Incentive Pay
4/15/20, 8:49 PM
Page 1 ...
38 u December 2017 January 2018The authorities beli.docxlorainedeserre
38 u December 2017 / January 2018
T
he authorities believe he slipped across the United States-Mexico
border sometime during the summer of 2016, likely deep in the
night. He carried no papers. The crossing happened in the rugged
backcountry of southeastern Arizona, where the main deterrent to
trespassers is the challenging nature of the terrain—not the metal
walls, checkpoints, and aerial surveillance that dominate much of the border.
But the border crosser was des-
ert-hardy and something of an expert
at camouflage. No one knows for cer-
tain how long he’d been in the United
States before a motion-activated cam-
era caught him walking a trail in the
Dos Cabezas Mountains on the night
of November 16. When a government
agency retrieved the photo in late Feb-
ruary, the image was plastered across
Arizona newspapers, causing an imme-
diate sensation.
The border crosser was a jaguar.
Jaguars once roamed throughout
the southwestern United States, but
are now quite rare. A core population
resides in the mountains of northern
Mexico, and occasionally an adventur-
ous jaguar will venture north of the bor-
der. When one of these elusive, graceful
cats makes an appearance stateside,
Mrill Ingram is The Progressive’s online media editor.
‘The Border Is
a Beautiful Place’
For Many, Both Sides of the
Arizona-Mexico Border Are Home
B
O
R
D
ER
A
R
TS
C
O
R
R
ID
O
R
By Mrill Ingram
Artists Ana Teresa Fernández in Agua Prieta, Mexico, and Jenea Sanchez in Douglas, Arizona, worked with dozens of community members to paint sections
of the border fence sky blue, “erasing” it as a symbolic act of resistance against increasing violence and oppression of human rights along the border.
https://apnews.com/79c83219af724016b8cfa2c505018ac4/agency-reports-rare-jaguar-sighting-mountains-arizona
The Progressive u 39
usually via a motion-triggered camera,
it may get celebrity status.
“We’ve had positive identifications
of seven cats, alive and well, in the last
twenty years in the United States,” says
Diana Hadley of the Mexico-based
Northern Jaguar Project, which works
with people in both countries to pro-
tect the big cat. One of those cats be-
came known as El Jefe, after he took
up residence in 2011 in the Santa Rita
Mountains south of Tucson, Arizona.
His presence was proof that the United
States still had enough wild habitat to
support a jaguar.
The new cat was especially excit-
ing because, based on size and shape,
observers initially thought it might
be female. “A lot of people in Arizona
would be very happy to have jaguars
from Mexico breeding in Arizona,” re-
marks Hadley.
In September 2017, the Arizo-
na-based Center for Biological Di-
versity released new video of the cat,
apparently a male, caught on a mo-
tion-triggered camera ambling through
the oak scrub forest in the Chiricahua
Mountains. He’s been named Sombra,
or Shadow, by schoolkids in Tucson.
Such things will no longer ...
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docxlorainedeserre
This document outlines key concepts related to recognizing and analyzing ethical problems. It discusses how to distinguish ethical questions from clinical or legal ones, and introduces the common features of ethical problems - a moral agent, a course of action, and an outcome. It uses the story of a veteran, Bill, missing therapy appointments as an example, with his therapist Kate feeling uncertain about what to do.
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docxlorainedeserre
4-5 Annotations and Writing Plan - Thu Jan 30 21:11
Claire Knaus
Annotations:
Bekalu, M. A., McCloud, R. F., & Viswanath, K. (2019). Association of Social Media Use With Social Well-Being, Positive Mental Health, and Self-Rated Health: Disentangling Routine Use From Emotional Connection to Use. Health Education & Behavior, 46(2_suppl), 69S-80S. https://doi.org/10.1177/1090198119863768
It seems that this source is arguing the effect of social media on mental health. This source uses this evidence to support the argument: Provided studies focusing on why individuals use social media, types of social network platforms, and the value of social capital. A counterargument for this source is: Studies that focus more on statistical usage rather than emotion connection. Personally, I believe the source is doing a good job of supporting its arguments because it provides an abundance of study references and clearly portrays the information and intent. I think this source will be very helpful in supporting my argument because of the focus on emotional connection to social media and its effects on mental health.
Matsakis, L. (2019). How Pro-Eating Disorder Posts Evade Filters on Social Media. In Gale Opposing Viewpoints Online Collection. Farmington Hills, MI: Gale. (Reprinted from How Pro-Eating Disorder Posts Evade Filters on Social Media, Wired, 2018, June 13) Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/UAZKKH366290962/OVIC?u=nhc_main&sid=OVIC&xid=2c90b7b5
It seems that this source is arguing that social media platforms are not doing enough to eliminate harmful pro-ED posts. This source uses this evidence to support the argument: Information about specific platforms and what they have done to moderate content, links for more information, and what constitutes as harmful content. A counterargument for this source is that it is too difficult for platforms to remove the content and to even find it. In addition, it is believed there may be harmful effects on vulnerable people posting this type of content. Personally, I believe the source is doing a good job of supporting its arguments because it provides opposing viewpoints as well as raising awareness of some of the dangers of social media posts. I think this source will be very helpful in supporting my argument because it provides information on specifically what is being done to moderate this type of content on social media, and what some of the difficulties in moderating are.
Investigators at University of Leeds Describe Findings in Eating Disorders (Pro-ana versus Pro-recovery: A Content Analytic Comparison of Social Media Users' Communication about Eating Disorders on Twitter and Tumblr). (2017, September 4). Mental Health Weekly Digest, 38. Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/A502914419/OVIC?u=nhc_main&sid=OVIC&xid=5e60152f
It seems that this source is arguing that there are more positive, anti-anorexia posts on social media than harmful, pro-ED content. ...
3Moral Identity Codes of Ethics and Institutional Ethics .docxlorainedeserre
This document discusses codes of ethics and institutional ethics structures in healthcare organizations. It begins by outlining the key learning objectives which focus on understanding the importance of codes of ethics and how they reflect an organization's values. It then discusses the role of codes of ethics in shaping an organization's moral identity and standards of conduct. The document provides examples of codes from the American Medical Association and Trinity Health. It emphasizes that codes of ethics should apply to all healthcare workers and cover areas like cultural competence, privacy, and nondiscrimination. Institutional ethics committees and review boards also help address ethical issues.
3NIMH Opinion or FactThe National Institute of Mental Healt.docxlorainedeserre
3
NIMH: Opinion or Fact
The National Institute of Mental Health (NIMH) was formed in 1946 and is one of 27 institutes that form the National Institute of Health (NIH) (NIMH, 2019). The mission of the NIMH is “To transform the understanding and treatment of mental illnesses through basic and clinical research, paving the way for prevention, recovery, and cure.” (NIMH, 2019). There are many different mental illnesses discussed on the NIMH website to include Attention-Deficit/Hyperactivity Disorder (ADHD). The NIMH website about ADHD is effective at providing the public general information and meets the criteria of authority, objectivity, and currency.
The NIMH website about ADHD provides an overview of ADHD, discusses signs and symptoms, and risk factors. The NIMH continues with information about treatment and therapies. Information provided by the NIMH is intended for both children and adults. The NIMH concludes on the page with studies the public can join and more resources for the public such as booklets, brochures, research and clinical trials.
As described by Jim Kapoun authority can be identified by who or what institution/organization published the document and if the information in the document is cited correctly (Cornell, 2020). The information on the website is published by the NIMH which is the lead research institute related to mental health for the last 70 plus years (NIMH, 2019). On the page related to ADHD the NIMH references the program of Children and Adults with Attention-Deficit/Hyperactivity Disorder (CHADD) and provides a hyperlink to access the resources available with the agency (NIMH,2019). This link can be found under the support groups section in the treatment and therapies. On the website to the right of the area describing inattention the NIMH has a section on research. In this block there is a link to “PubMed: Journal Articles about Attention Deficit Hyperactivity Disorder (ADHD)” which will take you to a search of the National Center for Biotechnology Information (NCBI) published by PubMed on ADHD (NIMH, 2019). Throughout the entire page the NIMH provides sources and hyperlinks to the sources as citations. Based on the reputation of the NIMH and the citations to the source material the website meets the criteria of authority.
According to Kapoun objectivity can be identified looking for areas where the author expresses his or her opinion (Cornell, 2020). Information provided on the NIMH page about ADHD does not express the opinion of the author. The author produces only factual information based on research. The NIMH makes it a point not to mention the names of medications when discussing treatments and only explains the medications fall in two categories stimulants and non-stimulants (NIMH, 2019). In this same area the NIMH provides hyperlinks to the NIMH Mental Health Medication and FDA website for information about medication. The extent at which the NIMH goes to not provide an opinion on the website meet ...
4.1
Updated April-09
Lecture Notes
Chapter 4
Enterprise Excellence
Implementation
ENTERPRISE EXCELLENCE
4.2
Updated April-09
Learning Objectives
• Management & Operations Plans
• Enterprise Excellence Projects
• Enterprise Excellence Project decision Process
• Planning the Enterprise Excellence Project
• Tollgate Reviews
• Project Notebook
4.3
Updated April-09
MANAGEMENT AND OPERATIONS PLANS
• The scope and complexity of the
implementation projects will vary from the
executive level, to the management level, to
the operational level
• Each plan, as it is developed and deployed,
will include projects to be accomplished
• Conflicts typically will occur amongst
requirements of quality, cost, and schedule
when executing a project
4.4
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• An Enterprise Excellence project will be one of three
types:
1. Technology invention or innovation
2. New product, service, or process development
3. Product, service, or process improvement
• Enterprise Excellence uses the scientific method
• The scientific method is a process of organizing
empirical facts and their interrelationships in a
manner that allows a hypothesis to be developed and
tested
4.5
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• The scientific method consists of the
following steps:
1. Observe and describe the situation
2. Formulate a hypothesis
3. Use the hypothesis to predict results
4. Perform controlled tests to confirm the hypothesis
4.6
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• Figure 4.1 shows the project decision process
4.7
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Inventing/Innovating Technology:
Technology development is accomplished using
system engineering
This system approach enables critical functional
parameters and responses to be quickly transferred
into now products, services, and processes
The process is a four-phase process (I2DOV):
Invention & Innovation – Develop – Optimize – Verify
4.8
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Development of Products, Services, and
Processes
The Enterprise Excellence approach for developing
products, services, and processes is the Design for
Lean Six Sigma strategy.
This strategy helps to incorporate customer
requirements and expectations into the product
and/or service.
Concept – Design – Optimize - Verify (CDOV) is a
specific sequential design & development process
used to execute the design strategy.
4.9
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Improving Products, Services, and Processes:
Improving products, services and processes usually
involves the effectiveness and efficiency of operations.
A product or service is said to be effective when it meets
all of its customer requirements.
Effectiveness can be simply expressed as "doing the
right things the first time ...
3Type your name hereType your three-letter and -number cours.docxlorainedeserre
3
Type your name here
Type your three-letter and -number course code here
The date goes here
Type instructor’s name here
Your Title Goes Here
This is an electronic template for papers written in GCU style. The purpose of the template is to help you follow the basic writing expectations for beginning your coursework at GCU. Margins are set at 1 inch for top, bottom, left, and right. The first line of each paragraph is indented a half inch (0.5"). The line spacing is double throughout the paper, even on the reference page. One space after punctuation is used at the end of a sentence. The font style used in this template is Times New Roman. The font size is 12 point. When you are ready to write, and after having read these instructions completely, you can delete these directions and start typing. The formatting should stay the same. If you have any questions, please consult with your instructor.
Citations are used to reference material from another source. When paraphrasing material from another source (such as a book, journal, website), include the author’s last name and the publication year in parentheses.When directly quoting material word-for-word from another source, use quotation marks and include the page number after the author’s last name and year.
Using citations to give credit to others whose ideas or words you have used is an essential requirement to avoid issues of plagiarism. Just as you would never steal someone else’s car, you should not steal his or her words either. To avoid potential problems, always be sure to cite your sources. Cite by referring to the author’s last name, the year of publication in parentheses at the end of the sentence, such as (George & Mallery, 2016), and page numbers if you are using word-for-word materials. For example, “The developments of the World War II years firmly established the probability sample survey as a tool for describing population characteristics, beliefs, and attitudes” (Heeringa, West, & Berglund, 2017, p. 3).
The reference list should appear at the end of a paper (see the next page). It provides the information necessary for a reader to locate and retrieve any source you cite in the body of the paper. Each source you cite in the paper must appear in your reference list; likewise, each entry in the reference list must be cited in your text. A sample reference page is included below; this page includes examples (George & Mallery, 2016; Heeringa et al., 2017; Smith et al., 2018; “USA swimming,” 2018; Yu, Johnson, Deutsch, & Varga, 2018) of how to format different reference types (e.g., books, journal articles, and a website). For additional examples, see the GCU Style Guide.
References
George, D., & Mallery, P. (2016). IBM SPSS statistics 23 step by step: A simple guide and reference. New York, NY: Routledge.
Heeringa, S. G., West, B. T., & Berglund, P. A. (2017). Applied survey data analysis (2nd ed.). New York, NY: Chapman & Hall/CRC Press.
Smith, P. D., Martin, B., Chewning, B., ...
3Welcome to Writing at Work! After you have completed.docxlorainedeserre
3
Welcome to Writing at Work! After you have completed the reading for the week, write an email to introduce yourself to your peers. The name of your thread should be what you would include in the subject of the email.
As you compose your email, keep in mind the following:
· You are addressing a group you will work with in a professional capacity for at least 15 weeks. Let us know something about you, but don't share anything you wouldn't want repeated.
· You should include what you perceive to be your relative strengths with regard to writing at work. What types of tasks would you feel most comfortable taking on?
· You should also include what aspects of writing at work make you feel least comfortable. What types of tasks would you not be as suited for?
· What do you hope to learn in the next several months?
Next, in an attachment, choose one of the following two prompts and write a letter, taking into account the purpose, audience, and appropriate style for the task.
1. Your organization has been contracted to complete a project for an important client, and you were charged with managing the project. It has unfortunately become clear that your team will not meet the deadline. Your supervisor has told you to contact the client in writing to alert them to the situation and wants to be cc'd on the message. Write a letter, which you will send via email, addressing the above.
2. After a year-long working relationship, your organization will no longer be making use of a freelancer's services due to no fault of their own. Write a letter alerting them to this fact.
Name:
HRT 4760 Assignment 01
Timeliness
First, you will choose one particular organization where you will conduct each of your 15 different observational assignments. Stick with this same organization throughout your coursework. (Do not switch around assignment locations at different organizations or locations.) The reason for continuing your observational assignments at the same organization is to give you a deeper understanding of this particular organization across the 15 different assignments. As you read on, you will get a more complete understanding as to how these 15 assignments come together.
Tip: Many students choose the organization where they are currently working. This works particularly well. If you are working there, you have much opportunity to gain access to the areas that will give you a more complete understanding of the quality of entire service package (the 15 different elements) that the organization offers to its customers.
This is one of a package of 15 different assignments that comprise the Elements of Service, which you will study this term. For this assignment, you will observe elements of service in almost any particular service establishment. A few examples of service establishments would include, but not be limited to these: Hotel, resort, private club, restaurant, airline, cruise line, grocery store, doctor’s office, coffee house, and scores of oth ...
More Related Content
Similar to 20810chapter Information Systems Sourcing .docx
1
Week 4 Textbook Problems
Week 4 Textbook Problems
6Week 4 Textbook ProblemsWeek 4 Textbook Problems
Ch. 10
#17. Role of IMF’s
International mutual funds (IMFs) have given investors access to foreign securities because the firm who sponsors IMF makes all their portfolio decisions and completes their transactions. Small investors can also invest in foreign securities by purchasing shares of IMFs, but international capital markets have become more integrated.
#18. Spinning and Laddering
Spinning is where an investment bank converts its shares from an IPO to corporate executives who may be considering an IPO that requires the help of an investment bank. Laddering is when investors place bids above the offer price on shares the first day they come out.
Laddering moves the value of shares up which may not accurately reflect the value of the stock. The owners of the firm may be affected because the will not receive as much profits from the IPO because the spinning and laddering. Spinning can result in shares being sold a lower price, but laddering will only occur if there is a strong demand for the shares.
#21. IPO Dilemma
The disadvantage of using an offer price of $12 instead of $14 is that they are giving up $2 per share, which means they will receive $8 million less. The advantage of this is that Denton can have a successful offering, which can result in them selling of their shares, which could lead to a secondary offering in the future if needed to raise more for new projects. Denton knows that the securities firm needs to set a low price so that they can attract a lot of investors to sell all the shares.
Dividend Yield Problem
Dividend yield = 4 x $0.10 =1.01%
$39.78
Ch. 12.
#1. Orders
A limit order is an order to execute a transaction when the price reaches a specific level, and a market order is an order to execute a transaction at market price.
#2. Margins
Margins specify a proportion of funds to be invested with money that was borrowed versus being paid in cash. Borrowing increases the return earned from the investment in stock, but it also increases the risk because the potential loss goes up, which can happen form investing in stock. Maintenance margin is the minimum amount of margin that must be maintained over the time the investor holds the investment.
#13 Bid-Ask Spread of Penny Stock
Penny stocks are very risky and the order cost for those kind of stocks are often higher because they do not trade on an organized exchange or on NASDAQ. Penny stocks also have zero or very few market makers and competition, and their stocks are usually illiquid, so they are hard to sell.
Ch. 13
#1. Future Contracts
A future contract is a standardized agreement to receive or deliver a specific amount of a financial instrument at a specified date and price. The clearinghouse records all transactions on future contracts, which gives a need for a purchaser of a future contract to check the creditwo.
The lecture discussed offshore outsourcing and offshoring of business services. It defined outsourcing as assigning peripheral business activities to external vendors, while offshoring refers to relocating entire business processes to another country. Offshoring provides benefits like lower labor costs, access to skilled talent, and ability to enter new markets. However, expected cost savings are often lower than anticipated due to hidden costs. Risks of offshoring include data security, loss of business knowledge, and vendor failure to deliver. Process maturity and contingency planning are important factors for successful offshoring. Outsourcing core competencies can allow companies to focus on innovation, but there is also risk of capabilities becoming non-core. Productivity measurement
Applying IT to Sweeten Divestitures: The Seller PerspectiveCognizant
A lion’s share of companies plan to divest in the next two years, according to industry gurus, but a significant number of divestment projects are delayed or deferred due to misalignment of the business strategy and the IT strategy. Here’s how sellers can leverage IT as an enabler to achieve the business objectives that drive the divestiture agenda.
What Goes Into Onboarding New Cybersecurity VendorsExecweb
The process of onboarding these vendors is far from straightforward. It requires a meticulous approach, combining technical evaluation, due diligence, and strategic alignment to ensure seamless integration and optimal security outcomes.
1Running Head Business ProjectSection 1 Business Requirement.docxfelicidaddinwoodie
1
Running Head: Business Project
Section 1: Business Requirements Document
I. Describe the scope and analyze how to control the scope.
Scope:
We live in computer age where businesses no more bound by borders or limited clientage. Computer and fast technology has renovated the Project's scope can be defined as such element in project that explains the boundaries of the project, set responsibilities for each team member and describe the procedures for how completed work will be verified and how it will be approved.
Meetup help the people together in thousands of cities to do what they want to do in life. Major scope is to give the human being a happiness and peace of mind so that no one gets disappointed that he never got a chance to do what he want to do in his life. It is based on a very simple single idea that is when we get together and do such tasks that matter to us or appeal us most, we’re doing our best. It's all about the central idea or major chunk of scope of Meetup. It assist the people together to do, search, teach and learn the things that help them to live long and what they desire most to do. Meetup now want to increase its scope by setting offices in main cities and want to do extensive advertisement so that more people know about services of company and connect with it.
How to Control Scope process
Changing a scope is an ongoing process that starts just after creation of baseline.
Control Scope Inputs
Five inputs are included in control scope process
1. Project management plan.
In this step scope baseline consisting of the WBS codes WBS dictionary as well as the project scope statement is analyzed. This phase describes how to control scope when the change control plan will intimate about project change control system.
2. Work performance information.
In this phase information is provided on deliverable status and it describes which deliverables are ready to launch and which one are currently work in progress, and how much work is still pending. This phase contains information related to any issues and risks that the development team is expected to face for particular deliverables or products.
3. Requirements documentation.
This is very important phase in input process as when a change request is made the requirements documentation acts as a reference to memorize what was originally agreed so that the change could be detected against the regional requirement.
4. Requirements traceability matrix.
It helps the project manager to estimate about the value of change that is required and the regional baseline that is already finalized and why this change is so important for this project. It assist him to identify source of change and he will consult about this change from the stakeholders who are expected to affect by this change.
5. Organizational process assets.
This will normally cover any particular policies and procedures that have been laid down by the delivery organization regarding scope manage ...
ISACA IT GRC Conference 2008 Creating Business Value by means of Stakeholder ...Arno Kapteyn
In marketing a saying goes: “The Customer does not exist” this recognizes that each customer is unique in its desires and requirements and there is no such thing as a one size fits all. In analogy this session sets out with the statement that “The business does not exist”. An enterprise is a unique combination of central or de-central, task, geography, goal and/ or skills oriented divisions and departments. All these stakeholders have individual needs and requirements that might be met or supported by the services offered by the Enterprise IT Domain. To offer a one size fits all solution (per service) in response to this multitude of desires is to reuse the line of though from Henry Ford: “They can have any color they like as long as it is black”. This approach was very useful to help build the company into the global enterprise it is today. Yet at some point in the growth of the organization it was abandoned in favor of more variation of choice as a trip to the ford dealer will tell you. Even a standard product like a McDonalds hamburger varies to suite the (taste) requirements in different parts of the world.
How can the IT Domain of an enterprise growing in complexity, size, geographical presence etc. strategically prepare to deal with this complexity and ensure it will (keep) deliver(ing) maximum value in the eyes of the individual stakeholder (groups)?
memo/Example 3220 memos.docMemo 1
Date:
5/3/2011
To:
VP of Human Resources
Cc:
Directors and Account Managers
From:
Fred Flintstone, HR Director
RE:
Telecommuting: An Untapped Resource
Globalization is in full swing and luckily our company is growing, both financially and geographically. Historically, our pool of candidates has been limited to the narrow field available in the immediate vicinity of our main office. To keep up with changing times we need to explore options to that will allow us to enjoy a larger pool of qualified candidates, as well as attracting and keeping those candidates. Enhancing our technology and opening our standard policies to telecommuting could give us the edge we need to stay ahead of our competitors.
Relevant Issues
Telecommuting is not a new concept. The government explored telecommuting options to conserve gas as early as the 1970s and the private sector began taking advantage of it as soon as home computers and the internet made it possible. Today, telecommuting is common place in many industries.
The newest generation of candidates and soon to be graduates have already adapted to a constant bombardment of steaming media, multitasking and all the newest technology. The brightest minds work well independently and desire the nontraditional workplace. Telecommuting opportunities will give them more flexible schedules, the ability to work on the go and the ability to work in whatever kind of environment they find most comfortable and productive. The downside to permitting our employees to work from home, or wherever, is we will lose a certain amount of control. We will have to screen candidates very carefully and develop other ways to track their productivity to assure they aren’t taking advantage of the situation.
There are multiple ways we could achieve telecommuting capabilities and before we move forward, we’ll have to investigate which option or combination of options will give us the best results at the least cost. In the long run, converting more of our staff to telecommuters will likely save us money on top of everything else.
Changing Perspective
We know our business is already successful. With that in mind, it’s hard to picture making dramatic changes to our business model and breaking from tradition. Part of the reason we’ve been successful this long is because of our ability to find solutions in unconventional ways. We shouldn’t be shutting our door to some of the best candidates because they don’t happen to live here. Allowing employees to work from home will open the pool of candidates nationally, and potentially worldwide, without us having to pay relocation costs.
We must also look at the changing generations and encourage the best results from our new hires and current employees. We already know that people learn best under varying conditions. This is true of the best work environments as well. While working standard 8 to 5 hours in the controlled environment of a trad ...
Home Notifications My CommunityBBA 3551-16P-5A19-S3, Infor.docxfideladallimore
Home Notifications My Community
BBA 3551-16P-5A19-S3, Information Systems Management
Unit VII
Unit VII Introduction
Greetings!! You are almost done with this
course!! Keep up the good work.
In Unit VI, we covered information security and
how to secure systems and data.
This week we take an in-depth look at
information systems management and
outsourcing. While outsourcing may have a
bad reputation when people think that jobs are
being taken away from someone, it can offer
many benefits to all organizations involved.
Also, it does not necessarily take away jobs. In
many instances, outsourcing simply
restructures the organizations within an
industry. When you think about outsourcing,
remember that it does not always mean hiring
workers outside the country. Outsourcing can
occur between two organizations in the same
city.
Professor Bulloch
Unit VII Study Guide
Click the link above to open the unit study
guide, which contains this unit's lesson and
reading assignment(s). This information is
necessary in order to complete this course.
Unit VII Discussion Board
Weight: 2% of course grade
Grading Rubric
Comment Due: Saturday, 05/11/2019
11:59 PM (CST)
Response Due: Tuesday, 05/14/2019
11:59 PM (CST)
Go to Unit VII Discussion Board »
Unit VII Case Study
Weight: 11% of course grade
Grading Rubric
Due: Tuesday, 05/14/2019 11:59 PM
(CST)
Instructions
Define what is meant by outsourcing.
Explain how Peter Drucker’s statement
(covered in the textbook in uCertify)
about how one company’s back room is
another company’s front room pertains
to outsourcing. Use an example.
Summarize the management
advantages, cost reduction, and risk
reduction of outsourcing.
Summarize the outsourcing risks
concerning control, long-term costs, and
exit strategy.
Discuss which company you would
outsource to and why. Does distance
matter?
As a manager of an organization, you will
often need to find ways to cut costs. One
way to cut costs is to outsource by hiring
another organization to perform the service.
Consider the scenario below.
As a manager for the public outreach
department, you realize that the current
system for managing outreach issues is
outdated. You would like to have a new
outreach system developed using the
Cloudera platform to help manage big data.
However, no one in the organization has the
expertise. You will have to outsource the
project to save on costs and avoid
management problems. Two companies
have sent in a bid—one from Vancouver,
Canada, and one from Mumbai, India. The
bid from India was slightly lower than the bid
from Canada. Compose a response that
includes the elements listed below.
Your case study must be at least two pages
in length (not counting the title and
reference pages), and you must use at least
two references as a source for your essay.
See the Suggested Reading section for
some sample articles on outsourcing. Be
sure to cite all sources used in.
The document outlines nine key steps that companies can take as part of a digital transformation journey to disrupt themselves before competitors do. The steps include: 1) designing an end-game disruptive business model, 2) analyzing gaps between the current and future models, 3) determining how to execute the transition, 4) architecting new technology, 5) auditing legacy systems, 6) building out a dual-speed IT architecture, 7) establishing a data security strategy, 8) maintaining security during transformation, and 9) using transformation as an opportunity to escalate security standards across the enterprise. Taking these steps can help traditional firms successfully transition to competing in the new digital landscape.
In this edition of Valuation Insights we discuss several hot topics related to intellectual property, including a framework for evaluating whether to develop IP in-house or purchase through an acquisition (Build vs. Buy Decision). In our Technical Notes section we discuss how patent rights can be used to exclude competitors from practicing an invention or alternatively how to receive monetary compensation or injunctive relief in the Federal Courts. Finally, our international in focus article discusses the Internal Revenue Service’s proposed regulations to address the tax treatment by multinational corporations of certain asset and business transfers under Internal Revenue Code Sections 376(a) and (d).
The document discusses implementing an agile approach to software development for Department of Defense information technology programs while still meeting requirements for Earned Value Management. It notes that the National Defense Authorization Act of 2010 Section 804 directed the development of a new acquisition process for IT systems that incorporates agile principles like early user involvement, rapid delivery of capabilities, and evolutionary prototyping. The presentation will argue that Earned Value Management can work with agile software development in the federal procurement context to recognize the business value being earned through time and money spent on projects.
In today’s global marketplace, successful companies must be able to integrate and quickly view quality audit information from their manufacturing sites all over the world. This strategic capability has become even more important as manufacturers have moved offshore and have become more complex. The value and immediacy of quality assurance data is a critical element to the survival of competitive manufacturing organizations. Software systems can address these issues.
Source:
Lyons Information Systems, Inc
http://www.lyonsinfo.com
Similar to 20810chapter Information Systems Sourcing .docx (12)
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docxlorainedeserre
4.1 EXPLORING INCENTIVE PAY
4-1 Explore the incentive pay approach.
Incentive pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss212) or
variable pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss462)
rewards employees for partially or completely attaining a predetermined work objective.
Incentive or variable pay is defined as compensation, other than base wages or salaries that
fluctuate according to employees’ attainment of some standard, such as a preestablished
formula, individual or group goals, or company earnings.
Effective incentive pay systems are based on three assumptions:
Individual employees and work teams differ in how much they contribute to the
company, both in what they do as well as in how well they do it.
The company’s overall performance depends to a large degree on the performance of
individuals and groups within the company.
To attract, retain, and motivate high performers and to be fair to all employees, a
company needs to reward employees on the basis of their relative performance.
Much like seniority and merit pay approaches, incentive pay augments employees’ base pay,
but incentive pay appears as a one-time payment. Employees usually receive a combination
of recurring base pay and incentive pay, with base pay representing the greater portion of
core compensation. More employees are presently eligible for incentive pay than ever before,
as companies seek to control costs and motivate personnel continually to strive for exemplary
performance. Companies increasingly recognize the importance of applying incentive pay
programs to various kinds of employees as well, including production workers, technical
employees, and service workers.
Some companies use incentive pay extensively. Lincoln Electric Company, a manufacturer of
welding machines and motors, is renowned for its use of incentive pay plans. At Lincoln
Electric, production employees receive recurring base pay as well as incentive pay. The
company determines incentive pay awards according to five performance criteria: quality,
output, dependability, cooperation, and ideas. The company has awarded incentive payments
every year since 1934, through prosperous and poor economic times. In 2014, the average
profit sharing payment per employee was $33,984.
Coupled with average base
pay, total core compensation for Lincoln employees was $82,903. Over the past 10 years,
Lincoln’s profit-sharing payments averaged approximately 40 percent of annual salary.
1
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end1)
2
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end2)
3
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end3)
4
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end4)
4.1 Exploring Incentive Pay
4/15/20, 8:49 PM
Page 1 ...
38 u December 2017 January 2018The authorities beli.docxlorainedeserre
38 u December 2017 / January 2018
T
he authorities believe he slipped across the United States-Mexico
border sometime during the summer of 2016, likely deep in the
night. He carried no papers. The crossing happened in the rugged
backcountry of southeastern Arizona, where the main deterrent to
trespassers is the challenging nature of the terrain—not the metal
walls, checkpoints, and aerial surveillance that dominate much of the border.
But the border crosser was des-
ert-hardy and something of an expert
at camouflage. No one knows for cer-
tain how long he’d been in the United
States before a motion-activated cam-
era caught him walking a trail in the
Dos Cabezas Mountains on the night
of November 16. When a government
agency retrieved the photo in late Feb-
ruary, the image was plastered across
Arizona newspapers, causing an imme-
diate sensation.
The border crosser was a jaguar.
Jaguars once roamed throughout
the southwestern United States, but
are now quite rare. A core population
resides in the mountains of northern
Mexico, and occasionally an adventur-
ous jaguar will venture north of the bor-
der. When one of these elusive, graceful
cats makes an appearance stateside,
Mrill Ingram is The Progressive’s online media editor.
‘The Border Is
a Beautiful Place’
For Many, Both Sides of the
Arizona-Mexico Border Are Home
B
O
R
D
ER
A
R
TS
C
O
R
R
ID
O
R
By Mrill Ingram
Artists Ana Teresa Fernández in Agua Prieta, Mexico, and Jenea Sanchez in Douglas, Arizona, worked with dozens of community members to paint sections
of the border fence sky blue, “erasing” it as a symbolic act of resistance against increasing violence and oppression of human rights along the border.
https://apnews.com/79c83219af724016b8cfa2c505018ac4/agency-reports-rare-jaguar-sighting-mountains-arizona
The Progressive u 39
usually via a motion-triggered camera,
it may get celebrity status.
“We’ve had positive identifications
of seven cats, alive and well, in the last
twenty years in the United States,” says
Diana Hadley of the Mexico-based
Northern Jaguar Project, which works
with people in both countries to pro-
tect the big cat. One of those cats be-
came known as El Jefe, after he took
up residence in 2011 in the Santa Rita
Mountains south of Tucson, Arizona.
His presence was proof that the United
States still had enough wild habitat to
support a jaguar.
The new cat was especially excit-
ing because, based on size and shape,
observers initially thought it might
be female. “A lot of people in Arizona
would be very happy to have jaguars
from Mexico breeding in Arizona,” re-
marks Hadley.
In September 2017, the Arizo-
na-based Center for Biological Di-
versity released new video of the cat,
apparently a male, caught on a mo-
tion-triggered camera ambling through
the oak scrub forest in the Chiricahua
Mountains. He’s been named Sombra,
or Shadow, by schoolkids in Tucson.
Such things will no longer ...
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docxlorainedeserre
This document outlines key concepts related to recognizing and analyzing ethical problems. It discusses how to distinguish ethical questions from clinical or legal ones, and introduces the common features of ethical problems - a moral agent, a course of action, and an outcome. It uses the story of a veteran, Bill, missing therapy appointments as an example, with his therapist Kate feeling uncertain about what to do.
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docxlorainedeserre
4-5 Annotations and Writing Plan - Thu Jan 30 21:11
Claire Knaus
Annotations:
Bekalu, M. A., McCloud, R. F., & Viswanath, K. (2019). Association of Social Media Use With Social Well-Being, Positive Mental Health, and Self-Rated Health: Disentangling Routine Use From Emotional Connection to Use. Health Education & Behavior, 46(2_suppl), 69S-80S. https://doi.org/10.1177/1090198119863768
It seems that this source is arguing the effect of social media on mental health. This source uses this evidence to support the argument: Provided studies focusing on why individuals use social media, types of social network platforms, and the value of social capital. A counterargument for this source is: Studies that focus more on statistical usage rather than emotion connection. Personally, I believe the source is doing a good job of supporting its arguments because it provides an abundance of study references and clearly portrays the information and intent. I think this source will be very helpful in supporting my argument because of the focus on emotional connection to social media and its effects on mental health.
Matsakis, L. (2019). How Pro-Eating Disorder Posts Evade Filters on Social Media. In Gale Opposing Viewpoints Online Collection. Farmington Hills, MI: Gale. (Reprinted from How Pro-Eating Disorder Posts Evade Filters on Social Media, Wired, 2018, June 13) Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/UAZKKH366290962/OVIC?u=nhc_main&sid=OVIC&xid=2c90b7b5
It seems that this source is arguing that social media platforms are not doing enough to eliminate harmful pro-ED posts. This source uses this evidence to support the argument: Information about specific platforms and what they have done to moderate content, links for more information, and what constitutes as harmful content. A counterargument for this source is that it is too difficult for platforms to remove the content and to even find it. In addition, it is believed there may be harmful effects on vulnerable people posting this type of content. Personally, I believe the source is doing a good job of supporting its arguments because it provides opposing viewpoints as well as raising awareness of some of the dangers of social media posts. I think this source will be very helpful in supporting my argument because it provides information on specifically what is being done to moderate this type of content on social media, and what some of the difficulties in moderating are.
Investigators at University of Leeds Describe Findings in Eating Disorders (Pro-ana versus Pro-recovery: A Content Analytic Comparison of Social Media Users' Communication about Eating Disorders on Twitter and Tumblr). (2017, September 4). Mental Health Weekly Digest, 38. Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/A502914419/OVIC?u=nhc_main&sid=OVIC&xid=5e60152f
It seems that this source is arguing that there are more positive, anti-anorexia posts on social media than harmful, pro-ED content. ...
3Moral Identity Codes of Ethics and Institutional Ethics .docxlorainedeserre
This document discusses codes of ethics and institutional ethics structures in healthcare organizations. It begins by outlining the key learning objectives which focus on understanding the importance of codes of ethics and how they reflect an organization's values. It then discusses the role of codes of ethics in shaping an organization's moral identity and standards of conduct. The document provides examples of codes from the American Medical Association and Trinity Health. It emphasizes that codes of ethics should apply to all healthcare workers and cover areas like cultural competence, privacy, and nondiscrimination. Institutional ethics committees and review boards also help address ethical issues.
3NIMH Opinion or FactThe National Institute of Mental Healt.docxlorainedeserre
3
NIMH: Opinion or Fact
The National Institute of Mental Health (NIMH) was formed in 1946 and is one of 27 institutes that form the National Institute of Health (NIH) (NIMH, 2019). The mission of the NIMH is “To transform the understanding and treatment of mental illnesses through basic and clinical research, paving the way for prevention, recovery, and cure.” (NIMH, 2019). There are many different mental illnesses discussed on the NIMH website to include Attention-Deficit/Hyperactivity Disorder (ADHD). The NIMH website about ADHD is effective at providing the public general information and meets the criteria of authority, objectivity, and currency.
The NIMH website about ADHD provides an overview of ADHD, discusses signs and symptoms, and risk factors. The NIMH continues with information about treatment and therapies. Information provided by the NIMH is intended for both children and adults. The NIMH concludes on the page with studies the public can join and more resources for the public such as booklets, brochures, research and clinical trials.
As described by Jim Kapoun authority can be identified by who or what institution/organization published the document and if the information in the document is cited correctly (Cornell, 2020). The information on the website is published by the NIMH which is the lead research institute related to mental health for the last 70 plus years (NIMH, 2019). On the page related to ADHD the NIMH references the program of Children and Adults with Attention-Deficit/Hyperactivity Disorder (CHADD) and provides a hyperlink to access the resources available with the agency (NIMH,2019). This link can be found under the support groups section in the treatment and therapies. On the website to the right of the area describing inattention the NIMH has a section on research. In this block there is a link to “PubMed: Journal Articles about Attention Deficit Hyperactivity Disorder (ADHD)” which will take you to a search of the National Center for Biotechnology Information (NCBI) published by PubMed on ADHD (NIMH, 2019). Throughout the entire page the NIMH provides sources and hyperlinks to the sources as citations. Based on the reputation of the NIMH and the citations to the source material the website meets the criteria of authority.
According to Kapoun objectivity can be identified looking for areas where the author expresses his or her opinion (Cornell, 2020). Information provided on the NIMH page about ADHD does not express the opinion of the author. The author produces only factual information based on research. The NIMH makes it a point not to mention the names of medications when discussing treatments and only explains the medications fall in two categories stimulants and non-stimulants (NIMH, 2019). In this same area the NIMH provides hyperlinks to the NIMH Mental Health Medication and FDA website for information about medication. The extent at which the NIMH goes to not provide an opinion on the website meet ...
4.1
Updated April-09
Lecture Notes
Chapter 4
Enterprise Excellence
Implementation
ENTERPRISE EXCELLENCE
4.2
Updated April-09
Learning Objectives
• Management & Operations Plans
• Enterprise Excellence Projects
• Enterprise Excellence Project decision Process
• Planning the Enterprise Excellence Project
• Tollgate Reviews
• Project Notebook
4.3
Updated April-09
MANAGEMENT AND OPERATIONS PLANS
• The scope and complexity of the
implementation projects will vary from the
executive level, to the management level, to
the operational level
• Each plan, as it is developed and deployed,
will include projects to be accomplished
• Conflicts typically will occur amongst
requirements of quality, cost, and schedule
when executing a project
4.4
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• An Enterprise Excellence project will be one of three
types:
1. Technology invention or innovation
2. New product, service, or process development
3. Product, service, or process improvement
• Enterprise Excellence uses the scientific method
• The scientific method is a process of organizing
empirical facts and their interrelationships in a
manner that allows a hypothesis to be developed and
tested
4.5
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• The scientific method consists of the
following steps:
1. Observe and describe the situation
2. Formulate a hypothesis
3. Use the hypothesis to predict results
4. Perform controlled tests to confirm the hypothesis
4.6
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• Figure 4.1 shows the project decision process
4.7
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Inventing/Innovating Technology:
Technology development is accomplished using
system engineering
This system approach enables critical functional
parameters and responses to be quickly transferred
into now products, services, and processes
The process is a four-phase process (I2DOV):
Invention & Innovation – Develop – Optimize – Verify
4.8
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Development of Products, Services, and
Processes
The Enterprise Excellence approach for developing
products, services, and processes is the Design for
Lean Six Sigma strategy.
This strategy helps to incorporate customer
requirements and expectations into the product
and/or service.
Concept – Design – Optimize - Verify (CDOV) is a
specific sequential design & development process
used to execute the design strategy.
4.9
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Improving Products, Services, and Processes:
Improving products, services and processes usually
involves the effectiveness and efficiency of operations.
A product or service is said to be effective when it meets
all of its customer requirements.
Effectiveness can be simply expressed as "doing the
right things the first time ...
3Type your name hereType your three-letter and -number cours.docxlorainedeserre
3
Type your name here
Type your three-letter and -number course code here
The date goes here
Type instructor’s name here
Your Title Goes Here
This is an electronic template for papers written in GCU style. The purpose of the template is to help you follow the basic writing expectations for beginning your coursework at GCU. Margins are set at 1 inch for top, bottom, left, and right. The first line of each paragraph is indented a half inch (0.5"). The line spacing is double throughout the paper, even on the reference page. One space after punctuation is used at the end of a sentence. The font style used in this template is Times New Roman. The font size is 12 point. When you are ready to write, and after having read these instructions completely, you can delete these directions and start typing. The formatting should stay the same. If you have any questions, please consult with your instructor.
Citations are used to reference material from another source. When paraphrasing material from another source (such as a book, journal, website), include the author’s last name and the publication year in parentheses.When directly quoting material word-for-word from another source, use quotation marks and include the page number after the author’s last name and year.
Using citations to give credit to others whose ideas or words you have used is an essential requirement to avoid issues of plagiarism. Just as you would never steal someone else’s car, you should not steal his or her words either. To avoid potential problems, always be sure to cite your sources. Cite by referring to the author’s last name, the year of publication in parentheses at the end of the sentence, such as (George & Mallery, 2016), and page numbers if you are using word-for-word materials. For example, “The developments of the World War II years firmly established the probability sample survey as a tool for describing population characteristics, beliefs, and attitudes” (Heeringa, West, & Berglund, 2017, p. 3).
The reference list should appear at the end of a paper (see the next page). It provides the information necessary for a reader to locate and retrieve any source you cite in the body of the paper. Each source you cite in the paper must appear in your reference list; likewise, each entry in the reference list must be cited in your text. A sample reference page is included below; this page includes examples (George & Mallery, 2016; Heeringa et al., 2017; Smith et al., 2018; “USA swimming,” 2018; Yu, Johnson, Deutsch, & Varga, 2018) of how to format different reference types (e.g., books, journal articles, and a website). For additional examples, see the GCU Style Guide.
References
George, D., & Mallery, P. (2016). IBM SPSS statistics 23 step by step: A simple guide and reference. New York, NY: Routledge.
Heeringa, S. G., West, B. T., & Berglund, P. A. (2017). Applied survey data analysis (2nd ed.). New York, NY: Chapman & Hall/CRC Press.
Smith, P. D., Martin, B., Chewning, B., ...
3Welcome to Writing at Work! After you have completed.docxlorainedeserre
3
Welcome to Writing at Work! After you have completed the reading for the week, write an email to introduce yourself to your peers. The name of your thread should be what you would include in the subject of the email.
As you compose your email, keep in mind the following:
· You are addressing a group you will work with in a professional capacity for at least 15 weeks. Let us know something about you, but don't share anything you wouldn't want repeated.
· You should include what you perceive to be your relative strengths with regard to writing at work. What types of tasks would you feel most comfortable taking on?
· You should also include what aspects of writing at work make you feel least comfortable. What types of tasks would you not be as suited for?
· What do you hope to learn in the next several months?
Next, in an attachment, choose one of the following two prompts and write a letter, taking into account the purpose, audience, and appropriate style for the task.
1. Your organization has been contracted to complete a project for an important client, and you were charged with managing the project. It has unfortunately become clear that your team will not meet the deadline. Your supervisor has told you to contact the client in writing to alert them to the situation and wants to be cc'd on the message. Write a letter, which you will send via email, addressing the above.
2. After a year-long working relationship, your organization will no longer be making use of a freelancer's services due to no fault of their own. Write a letter alerting them to this fact.
Name:
HRT 4760 Assignment 01
Timeliness
First, you will choose one particular organization where you will conduct each of your 15 different observational assignments. Stick with this same organization throughout your coursework. (Do not switch around assignment locations at different organizations or locations.) The reason for continuing your observational assignments at the same organization is to give you a deeper understanding of this particular organization across the 15 different assignments. As you read on, you will get a more complete understanding as to how these 15 assignments come together.
Tip: Many students choose the organization where they are currently working. This works particularly well. If you are working there, you have much opportunity to gain access to the areas that will give you a more complete understanding of the quality of entire service package (the 15 different elements) that the organization offers to its customers.
This is one of a package of 15 different assignments that comprise the Elements of Service, which you will study this term. For this assignment, you will observe elements of service in almost any particular service establishment. A few examples of service establishments would include, but not be limited to these: Hotel, resort, private club, restaurant, airline, cruise line, grocery store, doctor’s office, coffee house, and scores of oth ...
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docxlorainedeserre
3
JWI 531 Finance II Assignment 1Template
HOW TO USE THIS TEMPLATE:
This is a template and checklist corresponding to your Assignment 1 paper: Enterprise Risk Management and Moat Strength. See below for an explanation of the color-coding in this template:
· All green text includes instructions to support your writing. You should delete all green text before submitting your final paper.
· All blue text indicates areas where you need to replace text with your own information. Replace the blue text with your own words in black.
· Headings and subheadings are written in black, bold type. Keep these in your paper.
TIPS:
· Write in the third person, using “he” or “she” or “they”, or using specific names. Do not use the second person “you”.
· The body of this paper has one-inch margins and uses a professional font (size 10-12); we recommend Arial or Times New Roman fonts.
· The Assignment template is already formatted with all needed specifications like margins, appropriate font, and double spacing.
· Before submitting your paper, use Grammarly to check for punctuation and usage errors and make the required corrections. Then read aloud to edit for tone and flow.
· You should also run your paper through SafeAssign to ensure that it meets the required standards for originality.
FINALIZING YOUR PAPER
Your submission should be a maximum of 4 pages in length. The page count doesnotinclude the Cover Page at the beginning and the References page at the end. The final paper that you submit for grading should be in black text only with all remaining green text and blue text removed. Assignment 1: Enterprise Risk Analysis and Moat Strength
Author’s Name
Jack Welch Management Institute
Professor’s Name
JWI 531
Date
Introduction
An Introduction should be succinct and to the point. Start your Introduction with a general and brief observation about the paper’s topic. Write a thesis statement, which is the “road map” for your paper - it helps your reader to navigate your work. In your thesis statement, be specific about the major areas you plan to address in your paper.
The headings below should guide your introduction, since they identify the topics to be addressed in your paper. The introduction is not a graded part of your rubric but it helps your reader to understand what your assignment will be about. We recommend that you write this part of your Introduction after you complete the other sections of your paper. It only needs to be one paragraph in length.
Analysis and Recommendations
You must answer each of the following questions in your paper. Keep your responses focused on the topic. Straying off into additional areas, even if they are interesting, will not earn additional marks, and may actually detract from the clarity of your responses.
I. Where is each company in its corporate lifecycle (startup, growth, maturity or decline)? Explain.
Before writing your response to this question, make sure you understand what characterizes ea ...
3Big Data Analyst QuestionnaireWithin this document are fo.docxlorainedeserre
3
Big Data Analyst Questionnaire
Within this document are four different questions. Each question is structured in the following manner:
1) Premise
- Contains any needed background information
2) Request
- The actual question, what you are to solve
3) Notes
- A space if you feel like including notes of any kind for the given question
Please place your answer for each question in a separate file, following this naming convention:
Name_Qn.docx, where n = the question number (i.e., 1, 2 ...). So the file for the first question should be named ‘Name_Q1.docx’.
When complete, please package everything together and send email responses to the designated POCs.
Page | 1
Premise:
You have a table named “TRADES” with the following six columns:
Column Name
Data Type
Description
Date
DATE
The calendar date on which the trade took place.
Firm
VARCHAR(255)
A symbol representing the Broker/Dealer who conducted the trade.
Symbol
VARCHAR(10)
The security traded.
Side
VARCHAR(1)
Denotes whether the trade was a buy (purchase) or a sell (sale) of a security.
Quantity
BIGINT
The number of shares involved in the trade.
Price
DECIMAL(18,8)
The dollar price per share traded.
You write a query looking for all trades in the month of August 2019. The query returns the following:
DATE
FIRM
SYMBOL
SIDE
QUANTITY
PRICE
8/5/2019
ABC
123
B
200
41
8/5/2019
CDE
456
B
601
60
8/5/2019
ABC
789
S
600
70
8/5/2019
CDE
789
S
600
70
8/5/2019
FGH
456
B
200
62
8/6/2019
3CDE
456
X
300
61
8/8/2019
ABC
123
B
300
40
8/9/2019
ABC
123
S
300
30
8/9/2019
FGH
789
B
2100
71
8/10/2019
CDE
456
S
1100
63
Questions:
1) Conduct an analysis of the data set returned by your query. Write a paragraph describing your analysis. Please also note any questions or assumptions made about this data.
2) Your business user asks you to show them a table output that includes an additional column categorizing the TRADES data into volume based Tiers, with a column named ‘Tier’. Quantities between 0-250 will be considered ‘Small’, quantities greater than ‘Small’ but less than or equal to 500 will be considered ‘Medium’, quantities greater than ‘Medium’ but less than or equal to 500 will be considered ‘Large’, and quantities greater than ‘Tier 3’ will be considered ‘Very Large’ .
a. Please write the SQL query you would use to add the column to the table output.
b. Please show the exact results you expect based on your SQL query.
3) Your business user asks you to show them a table output summarizing the TRADES data (Buy and Sell) on week-by-week basis.
a. Please write the SQL query you would use to query this table.
b. Please show the exact results you expect based on your SQL query.
Notes:
1
Premise:
You need to describe in writing how to accomplish a task. Your audience has never completed this task before.
Question:
In a few paragraphs, please describe how to complete a task of your choice. You may choose a task of your own liking or one of the sample tasks below:
1) How to make a p ...
3HR StrategiesKey concepts and termsHigh commitment .docxlorainedeserre
3
HR Strategies
Key concepts and terms
High commitment management •
High performance management •
HR strategy •
High involvement management •
Horizontal fi t •
Vertical fi t •
On completing this chapter you should be able to defi ne these key concepts.
You should also understand:
Learning outcomes
T • he purpose of HR strategy
Specifi c HR strategy areas •
How HR strategy is formulated •
How the vertical integration of •
business and HR strategies is
achieved
How HR strategies can be set out •
General HR strategy areas •
The criteria for a successful HR •
strategy
The fundamental questions on •
the development of HR strategy
How horizontal fi t (bundling) is •
achieved
How HR strategies can be •
implemented
47
48 Human Resource Management
Introduction
As described in Chapter 2, strategic HRM is a mindset that leads to strategic actions and reac-
tions, either in the form of overall or specifi c HR strategies or strategic behaviour on the part
of HR professionals. This chapter focuses on HR strategies and answers the following ques-
tions: What are HR strategies? What are the main types of overall HR strategies? What are the
main areas in which specifi c HR strategies are developed? What are the criteria for an effective
HR strategy? How should HR strategies be developed? How should HR strategies be
implemented?
What are HR strategies?
HR strategies set out what the organization intends to do about its human resource manage-
ment policies and practices and how they should be integrated with the business strategy and
each other. They are described by Dyer and Reeves (1995) as ‘internally consistent bundles of
human resource practices’. Richardson and Thompson (1999) suggest that:
A strategy, whether it is an HR strategy or any other kind of management strategy must
have two key elements: there must be strategic objectives (ie things the strategy is sup-
posed to achieve), and there must be a plan of action (ie the means by which it is pro-
posed that the objectives will be met).
The purpose of HR strategies is to articulate what an organization intends to do about its
human resource management policies and practices now and in the longer term, bearing in
mind the dictum of Fombrun et al (1984) that business and managers should perform well in
the present to succeed in the future. HR strategies aim to meet both business and human needs
in the organization.
HR strategies may set out intentions and provide a sense of purpose and direction, but they are
not just long-term plans. As Gratton (2000) commented: ‘There is no great strategy, only great
execution.’
Because all organizations are different, all HR strategies are different. There is no such thing as
a standard strategy and research into HR strategy conducted by Armstrong and Long (1994)
and Armstrong and Baron (2002) revealed many variations. Some strategies are simply very
general declarations of intent. Others go into much more detail. ...
3Implementing ChangeConstruction workers on scaffolding..docxlorainedeserre
3
Implementing Change
Construction workers on scaffolding.
hxdbzxy/iStock/Thinkstock
Learning Objectives
After reading this chapter, you should be able to do the following:
Summarize the nine steps in Ackerman and Anderson’s road map for change.
Analyze Cummings and Worley’s five dimensions of leading and managing change.
Describe how to align an organization with its new vision and future state.
Explain how roles/relationships and interventions are used to implement change.
Examine ways to interact with and influence stakeholders.
Change is the law of life and those who look only to the past or present are certain to miss the future.
—John F. Kennedy
Alan Mulally was selected to lead Ford in 2006 after he was bypassed as CEO at Boeing, where he had worked and was expected to become CEO. Insiders and top-level managers at Ford, some of whom had expected to become CEO, were initially suspicious and then outraged when Mulally was hired. They questioned what someone from the airplane industry would know about the car business (Kiley, 2009).
Chair William (Bill) Clay Ford, Jr.—who selected Mulally as CEO—told Ford’s officers that the company needed a fresh perspective and a shake-up, especially since it had lost $14.8 billion in 2008—the most in its 105-year history—and had burned through $21.2 billion, or 61%, of its cash (Kiley, 2009). Because Ford knew that the company’s upper echelon culture was closed, bureaucratic, and rejected outsiders and new ways of thinking, he was not surprised by his officers’ reactions. However, Ford’s managers had no idea that the company was fighting for its life. To succeed, Mulally would need Chair Ford’s full endorsement and support, and he got it.
The company’s biggest cultural challenge was to break down the silos that various executives had built. As we will discuss more in Chapter 4, silos are specific processes or departments in an organization that work independently of each other without strong communication between or among them. A lack of communication can often stifle productivity and innovation, and this was exactly what was happening at Ford.
Mulally devised a turnaround strategy and developed it into the Way Forward Plan. The plan centralized and modernized plants to handle several models at once, to be sold in several markets. The plan was designed to break up the fiefdoms of isolated cultures, in which leaders independently developed and decided where to sell cars. Mulally’s plan also kept managers in positions for longer periods of time to deepen their expertise and improve consistency of operations. The manager who ran the Mazda Motor affiliate commented, “I’m going into my fourth year in the same job. I’ve never had such consistency of purpose before” (as cited in Kiley, 2009, “Meetings About Meetings,” para. 2).
Mulally’s leadership style involved evaluating and analyzing a situation using data and facts and then earning individuals’ support with his determinatio ...
3Assignment Three Purpose of the study and Research Questions.docxlorainedeserre
3
Assignment Three: Purpose of the study and Research Questions
RES 9300
Recently, Autism has become a serious health concern to parents. According to Center for Disease Control and Prevention (2018), about one in fifty nine United States children has been identified with autism spectrum disorder with one in six children developing developmental disability ranging from mild disabilities such as speech and language impairments to serious developmental disabilities, such as intellectual disabilities, cerebral palsy, and autism (CDC,2018). World Health Organization (2019) estimates that 1 in 160 children globally has autism making it one of the most prevalent diseases. Despite the disease prevalence, most population has little knowledge about the disease. Many health practitioners have proposed early care as a means to control the disease effects.
Purpose Statement
The purpose of this study is to determine whether early intervention services can help improve the development of children suffering from autism. This study also aims to explore the general public awareness and perception about autism disorder.
Research Questions
(1) How should service delivery for autistic patients be improved to promote their health? (2) What impact does early intervention services have on development of children suffering from autism? (3) How can public knowledge on autism improve support and care for autistic patients? (4) What effect will early intervention have on patient’s social skills?
References
Center for Disease Control and Prevention. (2018). Autism Spectrum Disorder (ASD). Data & Statistics. Retrieved From https://www.cdc.gov/ncbddd/autism/data.html
World Health Organization. (2019). Autism Spectrum Disorders. Fact Sheet. Retrieved From https://www.who.int/news-room/fact-sheets/detail/autism-spectrum-disorders
3
Assignment Two: Theoretical Perspective and Literature Review
RES 9300
Literature Map
Parenting an Autism Child
(Dependent Variable)
9
Mothers/Father Role
Education
Religious Beliefs
Gender/Age
Financial Resources
Maternal Relationship
Region
Public Awareness
Support
Ethnicity
Independent Variables
Secondary Source I Will Be Using In My Literature Review
Mother/Father Roles
Glynn, K. A. (2015). Predictors of parenting practices in parents of children with autism spectrum disorder.
Religious Beliefs
Huang, C. Y., Yen, H. C., Tseng, M. H., Tung, L. C., Chen, Y. D., & Chen, K. L. (2014). Impacts of autistic behaviors, emotional and behavioral problems on parenting stress in caregivers of children with autism. Journal of Autism and Developmental Disorders, 44(6), 1383-1390.
Education
Brezis, R. S., Weisner, T. S., Daley, T. C., Singhal, N., Barua, M., & Chollera, S. P. (2015). Parenting a child with autism in India: Narratives before and after a parent–child intervention program. Culture, Medicine, and Psychiatry, 39(2), 277-298.
Financial Resources
Zaidm ...
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docxlorainedeserre
380067.docx
by Jamie Feryll
FILE
T IME SUBMIT T ED 22- MAR- 2019 06:38AM WORD COUNT 3608
CHARACT ER COUNT 204 57
380067 .DOCX (28.82K)
%4
SIMILARIT Y INDEX
EXCLUDE QUOT ES ON
EXCLUDE
BIBLIOGRAPHY
ON
380067.docx
ORIGINALITY REPORT
380067.docx
WRITECHECK REPORT
PAGE 1
PAGE 2
PAGE 3
PAGE 4
PAGE 5
PAGE 6
PAGE 7
PAGE 8
PAGE 9
PAGE 10
PAGE 11
PAGE 12
PAGE 13
PAGE 14
PAGE 15
PAGE 16
380067.docxby Jamie Feryll380067.docxORIGINALITY REPORT380067.docxWRITECHECK REPORT
380067
by Jamie Feryll
FILE
T IME SUBMIT T ED 13- MAR- 2019 03:56PM WORD COUNT 34 63
CHARACT ER COUNT 1957 5
ARCHAEOLOGY.DOCX (31.23K)
%5
SIMILARIT Y INDEX
EXCLUDE QUOT ES ON
EXCLUDE
BIBLIOGRAPHY
ON
380067
ORIGINALITY REPORT
380067
WRITECHECK REPORT
PAGE 1
PAGE 2
PAGE 3
PAGE 4
PAGE 5
PAGE 6
PAGE 7
PAGE 8
PAGE 9
PAGE 10
PAGE 11
PAGE 12
PAGE 13
PAGE 14
PAGE 15
380067by Jamie Feryll380067ORIGINALITY REPORT380067WRITECHECK REPORT
Interpretations of Iron Age Architecture Brochs in Society/Social Identity
Archaeology is a historical field which has advanced over the years based on more discoveries still being experienced by the archaeologists who seek them. According to Kelly and Thomas (2010; p.5), the concession that life existed in more ancient times than stipulated by biblical scholars and human culture allowed the archaeologists to dig deeper into genealogical data. Iron Age architecture and social/society identity relate to one another. For instance, the population, based on their identity and perception will construct buildings that directly reflect their beliefs. This essay will discuss these archaeological concepts of Iron Age architecture and society/social identity. Need a paragraph on brochs and how many and where they are across Scotland with patcialur focus on the atlantc region, this is not relevant for masters essay. Must define broch from its architecture and how long it would take to build and note famous ones and note the ones that will be referred to in this essay – this could be Perhaps incorpated into the next paragraph.
Iron Age architecture has over the years been dominated by differing archaeological concepts and debates. It was defined by settlements and settlement structures such as duns, brochs, wheelhouses, hillforts, stone-built round houses and timber. The social and societal identity which is identified through material remains indicates aspects of differentiation, regional patterns and segregation. According to Kelly and Thomas (2010; p.28), people who existed in Iron Age Scotland were isolated. This is demonstrated by the presence of a burial followed by an assembled chariot at Newbridge. Northern and western Scotland have been the source of the well-structured developments that have provided cultural, architectural and social data over time. Maes Howe, which is the largest Orkney burial cairn, located between Stromne ...
39Chapter 7Theories of TeachingIntroductionTheories of l.docxlorainedeserre
This document summarizes theories of teaching from several influential learning theorists. It discusses how theorists like Thorndike, Guthrie, Skinner, Hull, Tolman, and Gagné viewed the role of the teacher based on their behavioral and cognitive learning theories derived from animal and child studies. They generally saw teaching as managing external conditions to ensure specified behavioral changes in learners. The document then contrasts this with theories of teaching from adult learning theorists like Rogers, who rejected the notion that teaching is controlling learning and saw the teacher's role differently.
38 Monthly Labor Review • June 2012TelecommutingThe.docxlorainedeserre
38 Monthly Labor Review • June 2012
Telecommuting
The hard truth about telecommuting
Telecommuting has not permeated the American workplace, and
where it has become commonly used, it is not helpful in reducing
work-family conflicts; telecommuting appears, instead, to have
become instrumental in the general expansion of work hours,
facilitating workers’ needs for additional worktime beyond the
standard workweek and/or the ability of employers to increase or
intensify work demands among their salaried employees
Mary C. Noonan
and
Jennifer L. Glass
Mary C. Noonan is an Associate
Professor at the Department of
Sociology, The University of Iowa;
Jennifer L. Glass is the Barbara
Bush Regents Professor of Liberal
Arts at the Department of Sociol-
ogy and Population Research
Center, University of Texas at
Austin. Email: [email protected]
uiowa.edu or [email protected]
austin.utexas.edu.
Telecommuting, defined here as work tasks regularly performed at home, has achieved enough
traction in the American workplace to
merit intensive scrutiny, with 24 percent
of employed Americans reporting in recent
surveys that they work at least some hours
at home each week.1 The definitions of
telecommuting are quite diverse. In this ar-
ticle, we define telecommuters as employ-
ees who work regularly, but not exclusively,
at home. In our definition, at-home work
activities do not need to be technologically
mediated nor do telecommuters need a
formal arrangement with their employer to
work at home.
Telecommuting is popular with policy
makers and activists, with proponents
pointing out the multiple ways in which
telecommuting can cut commuting time
and costs,2 reduce energy consumption
and traffic congestion, and contribute to
worklife balance for those with caregiving
responsibilities.3 Changes in the structure
of jobs that enable mothers to more effec-
tively compete in the workplace, such as
telecommuting, may be needed to finally
eliminate the gender gap in earnings and
direct more earned income to children,
both important public policy goals.4
Evidence also reveals that an increasing num-
ber of jobs in the American economy could be
performed at home if employers were willing
to allow employees to do so.5 Often, employees
can perform jobs at home without supervision
in the “high-tech” sector, in the financial sector,
and many in the communication sector that are
technology dependent. The obstacles or barriers
to telecommuting seem to be more organiza-
tional, stemming from the managers’ reluctance
to give up direct supervisory control of workers
and from their fears of shirking among workers
who telecommute.6
Where the impact of telecommuting has
been empirically evaluated, it seems to boost
productivity, decrease absenteeism, and increase
retention.7 But can telecommuting live up to its
promise as an effective work-family policy that
helps employees meet their nonwork responsi-
bilities? To do so, tel ...
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
1. 208
10
chapter Information Systems
Sourcing
After 13 years, Kellwood, an American apparel maker, ended
its soups!to!nuts IS outsourcing
arrangement with EDS . The primary focus of the original
outsourcing contract was to integrate
12 individually acquired units with different systems into one
system. Kellwood had been satis-
" ed enough with EDS ’ s performance to renegotiate the
contract in 2002 and 2008, even though
at each renegotiation point, Kellwood had considered bringing
the IS operations back in house,
or backsourcing. The 2008 contract iteration resulted in a more
# exible $105 million contract that
EDS estimated would save Kellwood $2 million in the " rst
year and $9 million over the remaining
contract years. But the situation at Kellwood had changed
drastically. In 2008, Kellwood had been
purchased by Sun Capital Partners and taken private. The chief
operating of" cer (COO), who was
facing a mountain of debt and possibly bankruptcy, wanted to
consolidate and bring the operations
back in house to give some order to the current situation and
reduce costs. Kellwood was suffering
from a lack of IS standardization as a result of its many
acquisitions. The chief information of" cer
(CIO) recognized the importance of IS standardization and
2. costs, but she was concerned that the
transition from outsourcing to insourcing would cause serious
disruption to IS service levels and
project deadlines if it went poorly. Kellwood hired a
third!party consultant to help it explore the
issues and decided that backsourcing would save money and
respond to changes caused by both the
market and internal forces. Kellwood decided to backsource
and started the process in late 2009. It
carefully planned for the transition, and the implementation
went smoothly. By performing stream-
lined operations in house, it was able to report an impressive
$3.6 million savings, or about 17% of
annual IS expenses after the " rst year. 1
The Kellwood case demonstrates a series of decisions made in
relation to sourcing. Both the
decision to outsource IS operations and then to bring them back
in house were based on a series of
This chapter is organized around decisions in the Sourcing
Decision Cycle. The ! rst question
regarding information systems (IS) in the cycle relates to the
decision to make (insource) or
buy (outsource) them. This chapter ’ s focus is on issues
related to outsourcing whereas issues
related to insourcing are discussed in other chapters of this
book. Discussed are the critical
decisions in the Sourcing Decision Cycle: how and where
(cloud computing, onshoring,
offshoring). When the choice is offshoring, the next decision is
where abroad (farshoring,
nearshoring, or captive centers). Explored next in this chapter is
the ! nal decision in the
cycle, keep as is or change in which case the current
arrangements are assessed and modi-
3. ! cations are made to the outsourcing arrangement, a new
outsourcing provider is selected,
or the operations and services are backsourced, or brought back
in house. Risks and strat-
egies to mitigate risks are discussed at each stage of the cycle.
1 For more information see Stephanie Overby, “Company
Saves Millions by Ending Outsourcing Deal,” CIO.com,
http://www.cio.
com/article/549463/Company_Saves_Millions_By_Ending_IT_
Outsourcing_Deal?page=1&taxonomyId=3195 (accessed
January
31, 2012); B. Bacheldor, “Kellwood Stayed on Top of Its
Outsourcing All the Way to the End,” CIO.com,
http://blogs.cio.com/
beth_bacheldor/kellwood_stayed_
on_top_of_its_outsourcing_all_the_way_to_the_end?page=0
(accessed February 10, 2012).
c10.indd 208 11/26/2015 6:32:09 PM
http://www.cio.com/article/549463/Company_Saves_Millions_B
y_Ending_IT_Outsourcing_Deal?page=1&taxonomyId=3195
http://blogs.cio.combeth_bacheldor/kellwood_stayed_%20on_to
p_of_its_outsourcing_all_the_way_to_the_end?page=0
209Sourcing Decision Cycle Framework
factors. These factors, similar to those used by many companies
in their sourcing decisions, are discussed later in
this chapter. The global outsourcing market has been growing
steadily. Companies of all sizes pursue outsourcing
arrangements, and many multimillion!dollar deals have been
widely publicized. As more companies adopt out-
sourcing as a means of controlling IS costs and acquiring
4. “best!of!breed” capabilities, managing these supplier
relationships has become increasingly important. IS departments
must maximize the bene"t of these relationships
to the enterprise and pre!empt problems that might occur.
Failure in this regard could result in deteriorating quality
of service, loss of competitive advantage, costly contract
disputes, low morale, and loss of key personnel.
How IS services are provided to a "rm has become an important
strategic and tactical discussion. As brie#y
mentioned in Chapter$6, there are numerous alternatives to
sourcing computing power, applications, and infrastruc-
ture. This chapter examines the sourcing cycle to consider the
full range of decisions related to who should perform
the IS work of an organization. The cycle begins with a decision
to make or buy information services and products.
Once the decision to make or buy has been "nalized, a series of
questions must be answered about where and how
these services should be delivered or products developed. The
discussion in this chapter is built around the Sourcing
Decision Cycle framework discussed in the next section.
Considering the answers to sourcing questions can help
explain a number of terms associated with sourcing: insourcing,
outsourcing, cloud computing, full outsourcing,
selective outsourcing, multisourcing, onshoring, offshoring,
nearshoring, farshoring, and backsourcing. For each
type of sourcing decision, the risks, or likelihood of something
negative occurring as a result of the decision, are
discussed, and some steps that can be taken to manage the risks
are proposed.
Sourcing Decision Cycle Framework
Sourcing does not really just involve only one decision. It
involves many decisions. The rest of this chapter is built
around the critical sourcing decisions shown in Figure$10.1.
Many of the chapter headings are tied to key decisions
5. in Figure$ 10.1. Although the Sourcing Decision Cycle starts
anywhere, we choose to start with the original
make!or!buy decision. If an organization decides to “make,”
that means that it plans to create and run its own
applications. “Buy,” on the other hand, means the organization
plans to obtain its applications from an outside
HYBRID CAPTIVE
CENTER
OFFSHORING
OUTSOURCING
ONSHORING
CLOUD
INSOURCING
Where abroad?
Make
Note: Insourcing can
include captive centers
Buy
Keep as is or
Change?
Where?
FARSHORING
6. NEARSHORING
How to
source?
Where?
FIGURE 10.1 Sourcing Decision Cycle framework.
c10.indd 209 11/26/2015 6:32:09 PM
210 Information Systems Sourcing
vendor or vendors. When the “buy” option is selected, the
organization becomes a client company that must then
decide on “how” and “where” to outsource. The answers to the
“how” question include the scope of the outsourcing
and the steps that should be taken to ensure its success. The
answers to the “where” question focus on whether the
client company should work with an outsourcing provider (i.e.,
vendor) in its own country, offshore, or in a cloud.
If the client company decides to go offshore because labor is
cheaper or needed skills are more readily available, it
must make another decision: It must decide whether it wants the
work done in a country that is relatively nearby or
in a country that is quite distant. Finally, the client company
chooses an outsourcing provider (or decides to do its
own IS work). After a while, the client company faces another
decision. It periodically must evaluate the sourcing
arrangement and see whether a change is in order. If the in
house work is unsatisfactory or other opportunities that
are preferable to the current arrangement have become
available, then the client company may turn to outsourcing.
If, on the other hand, the outsourcing arrangement is
7. unsatisfactory, the client company has several options to con-
sider: to correct any existing problems and continue outsourcing
with its current provider, to outsource with another
provider, or to backsource. If the company decides to make a
change in its sourcing arrangements at this point, the
Sourcing Decision Cycle starts over again.
Starting the Cycle: The Make!or!Buy Sourcing Decision
Managers decide whether to make or buy information services
and products. The products can include an appli-
cation or a system, and services can range from help desk
support, telecommunications, running data centers, and
even implementing and operating business processes as in
business process outsourcing (BPO). A simple “make”
decision often involves insourcing some or all of the business’s
IS infrastructure, and a simple “buy” decision often
involves outsourcing, although it could also include purchasing
packaged software. In its simplest form, the make!
or!buy decision hinges on whether to insource (“make”) or
outsource (“buy”).
Insourcing
The most traditional approach to sourcing is insourcing, or
providing IS services or developing them in the com-
pany’s own in house IS organization and/or in its local cloud.
Several “yes” answers to the questions posed in
Figure$10.2 favor the decision to insource. Probably the most
common reason is to keep core competencies in house.
Managers are concerned that if they outsource a core
competency, they risk losing control over it or losing contact
with suppliers who can help them remain innovative in relation
to that competency. Failing to control the competency
or stay innovative is a sure way to forfeit a company’s
competitive advantage. On the other hand, by outsourcing
commodity work, a "rm can concentrate on its core
competencies. Other factors that weigh in favor of insourcing
8. are having an IS service or product that requires considerable
security, con"dentiality, or adequate resources in house
(e.g., time to complete the project with current staf"ng or IS
professionals with the needed skills and training).
In some companies, the IS function is underappreciated by top
management. As long as everything is running
smoothly, top managers may not notice the work done by or
appreciate the services and products of the IS orga-
nization. Often an IS department that insources has found it
necessary to compete for resources differently than
if it outsources. It is necessary for the department to have
enough respect and support from top management to
acquire resources and get the department’s job done. A major
risk of insourcing is that the complexities of running
IS in house requires management attention and resources that
might better serve the company if focused on other
value!added activities.
Captive centers are a new variation of insourcing. A captive
center is an overseas subsidiary that is created to
serve its main “client,” the parent company, but it may serve
other clients as well. Firms have set up such subsid-
iaries to operate like an outsourcing provider, but the "rms
actually own the subsidiaries. They are launched in
less expensive locations, usually away from the company’s
headquarters or major operating units. The three most
common types of captive centers are basic, shared, and hybrid.2
The basic captive center provides services only
to the parent "rm. The shared captive center performs work for
both a parent company and external customers.
2 I. Oshri, J. Kotalarsky and C.!M. Liew, “What to Do with
Your Captive Center: Four Strategic Options,” The Wall Street
Journal (May 12, 2008), http://
www.wsj.com/articles/SB121018777870174513 (accessed
9. September 2, 2015).
c10.indd 210 11/26/2015 6:32:10 PM
http://www.wsj.com/articles/SB121018777870174513
http://www.wsj.com/articles/SB121018777870174513
211Sourcing Decision Cycle Framework
The$hybrid captive center typically performs the more
expensive, higher pro"le or mission!critical work for the par-
ent company and outsources the more commoditized work that
is more cheaply provided by an offshore provider.
Outsourcing
Outsourcing means purchasing a good or service that was
previously provided internally or that could be provided
internally but is now provided by outside vendors. In the early
days of outsourcing, outside providers often took
over entire IS departments, including people, equipment, and
management responsibility. Reducing costs was the
primary motivation for outsourcing. This classic approach
prevailed through most of the 1970s and 1980s but then
experienced a decline in popularity. In 1989, Eastman Kodak
Company’s multivendor approach to meeting its
IS needs created the “Kodak effect.” Kodak outsourced its data
center operations to IBM, its network to Digital
Equipment Company, and its desktop supply and support
operations to Businessland.3 Kodak managed these rela-
tionships through strategic alliances.4 It retained a skeleton IS
staff to act for its business personnel with out-
sourcing providers. Its approach to supplier management
became a model emulated by Continental Bank, General
Dynamics, Continental Airlines, National Car Rental, and many
more.5
10. Kodak’s watershed outsourcing arrangement ushered in new
outsourcing practices that put all IS activities up
for grabs, including those providing competitive advantage. As
relationships with outsourcing providers become
FIGURE 10.2 Make or buy? Questions and risks.
Make or Buy Questions Suggests
Insourcing
Suggests
Outsourcing
Examples of Associated Risk in
Worse"Case Scenarios
Does it involve a core competency? Yes No If outsourced: Loss
of control over
strategic initiatives; loss of strategic focus
Does it involve con!dential or sensitive
IS services or software development?
Yes No If outsourced: Competitive secrets may
be leaked
Is there enough time available to
complete software development
projects in house?
Yes No If insourced: Project not completed on
time
Do the in"house IS professionals have
adequate training, experience, or skills
11. to provide the service or develop the
software?
Yes No If outsourced: Technological innovations
limited to what provider offers;
overreliance on provider’s skills
Are there reliable outsourcing
providers who are likely to stay
in business for the duration of the
contract?
No Yes If outsourced: Project not completed or,
if completed, is over budget and late
when another provider takes it over
Is there an outsourcing provider that
has a culture and practices that are
compatible with the client?
No Yes If outsourced: Con#ict between client
and provider personnel
Does the provider have economies of
scale that make it cheaper to provide
the service or develop the software
than in house?
Most likely No Most likely Yes If outsourced: Excessive costs
of project
or operations because of the way the
contract is written
Does it offer a better ability to handle
peaks?
12. Most likely No Most likely Yes If insourced: Loss of business
Does it involve consolidating data
centers?
Most likely No Most likely Yes If insourced: Inef!cient
operations
3 L. Applegate and R. Montealegre, “Eastman Kodak Co.:
Managing Information Systems Through Strategic Alliances,”
Harvard Business School case
192030 (September 1995).
4 Anthony DiRomualdo and Vijay Gurbaxani, “Strategic Intent
for IT Outsourcing,” Sloan Management Review (June 22,
1998).
5 Mary C. Lacity, Leslie P. Willcocks, and David F. Feeny,
“The Value of Selective IT Sourcing,” Sloan Management
Review (March 22, 1996).
c10.indd 211 11/26/2015 6:32:10 PM
212 Information Systems Sourcing
more sophisticated, companies realize that even such essential
functions as customer service are sometimes better
managed by experts on the outside. Over the years, motives for
outsourcing broadened beyond cost control. The
next section examines factors and risks to be considered in
making the outsourcing decision. The sourcing strategy
suggested by the answers to the key how to source question and
associated risks are listed in Figure$10.2.
Factors in the Outsourcing Decision
Under what conditions would an organization decide to
13. outsource? There are three primary factors that are likely to
favor the decision to seek to buy the services or products of an
outsourcing provider: lower costs due to economies
of scale, ability to handle processing peaks, and the client
company’s need to consolidate data centers. These and
other factors are listed in Figure$10.2.
One of the most common reasons given for outsourcing is the
desire to reduce costs. Outsourcing providers
derive savings from economies of scale that client companies
often cannot realize. Outsourcing providers achieve
these economies through centralized (often “greener”) data
centers, preferential contracts with suppliers, and large
pools of technical expertise. Most often, enterprises lack such
resources on a suf"cient scale within their own
IS departments. For example, a single company may need only
5,000 PCs, but an outsourcing provider might
negotiate a contract for 50,000 to spread over many clients and
at a much lower cost per computer. Second, the
outsourcing provider’s larger pool of resources than the client
company’s allows the provider leeway in assign-
ing available capacity to its clients on demand. For instance, at
year!end, an outsourcing provider potentially can
allocate additional mainframe capacity to ensure timely
completion of nightly processing in a manner that would
be impossible for an enterprise running its own bare!bones data
center. Third, an outsourcing provider may help
a client company to consolidate data centers following a merger
or acquisition or when the internal group cannot
overcome the inertia of its top management. Outsourcing may
also offer an infusion of cash as a company sells its
equipment to the outsourcing vendor.
If the service or product involves a core competency, then the
organization should strongly consider insourcing
to protect the bene"ts the organization enjoys from its own
14. competency. However, if the product or service is con-
sidered to be a commodity instead of a core competency, then
there are some distinct advantages to outsourcing. By
bringing in outside expertise, client company management often
can pay more attention to its core activities rather
than to IS operations. Further, if an organization does not have
employees with the training, experience, or skills
in house to successfully implement new technologies, it should
consider outsourcing. This is because outsourcing
providers generally have larger pools of talent with more
current knowledge of advancing technologies and best
practices. For example, many outsourcing providers gain vast
experience solving business intelligence problems
whereas IS staff within a single company would have only
limited experience, if any. That is why client companies
turn to outsourcing providers to help them implement such
technologies as Enterprise 2.0, Web 2.0 tools, cloud
computing, and enterprise resource planning (ERP) systems.
However, it is important to remember that client
company managers are ultimately still responsible for IS
services and products provided to their "rm.
Outsourcing providers also have an added advantage because
they can specialize in IS services. Outsourcing
providers’ extensive experience in dealing with IS professionals
helps them to understand how to hire, manage,
and retain IS staff effectively. Often they can offer IS personnel
a professional environment in which to work that
a typical company cannot afford to build. For example, a Web
designer would have responsibility for one Web site
within a company but for multiple sites when working for an
outsourcing provider. It becomes the outsourcing
provider’s responsibility to "nd, train, and retain highly
marketable IS talent. Outsourcing relieves a client of costly
investments in continuous training to keep its IS staff current
with the newest technologies and the headaches of
15. hiring and retaining highly skilled staff that easily can change
jobs.
Outsourcing Risks
Opponents of outsourcing cite a considerable number of risks
with it (see Figure$10.2). A manager should consider
each of these before making a decision about outsourcing. Each
risk can be mitigated with effective planning and
ongoing management.
c10.indd 212 11/26/2015 6:32:10 PM
213Sourcing Decision Cycle Framework
6 Stephanie Overby, “The Hidden Costs of Offshore
Outsourcing” (September 1, 2003),
http://www.cio.com/article/29654/The_Hidden_Costs_of_
Offshore_Outsourcing (accessed June 4, 2012).
First, outsourcing requires that a client company surrender a
degree of control over critical aspects of the
enterprise. The potential loss of control could extend to several
areas: project control, scope creep, technologies
employed, costs, "nancial controls, accuracy and clarity of
"nancial reports, and even the company’s IS direction.
By turning over data center operations, for example, a company
puts itself at the mercy of an outsourcing provider’s
ability to manage this function effectively. A manager must
choose an outsourcing provider carefully and negotiate
terms that encourage an effective working relationship.
Second, outsourcing client companies may not adequately
anticipate new technological capabilities when nego-
tiating outsourcing contracts. Outsourcing providers may not
16. recommend so!called bleeding!edge technologies for
fear of losing money in the process of implementation and
support, even if their implementation would best serve
the client company. Thus, poorly planned outsourcing can result
in a loss in IS #exibility. For example, some out-
sourcing providers were slow to adopt social technologies for
their clients because they feared the bene"ts would
not be as tangible as the costs of entering the market. This
reluctance impinged on clients’ ability to realize social
business strategies. To avoid this problem, an outsourcing client
should have a chief technology of"cer (CTO)
or technology group that is charged with learning about and
assessing emerging technologies that can be used to
support its company’s business strategy.
Third, by surrendering IS functions, a client company gives up
any real potential to develop them for compet-
itive advantage—unless, of course, the outsourcing agreement is
sophisticated enough to comprehend developing
such an advantage in tandem with the outsourcing company.
However, the competitive advantage may be compro-
mised if it is made available to the outsourcing provider’s other
clients. Under many circumstances, the outsourcing
provider becomes the primary owner of any technological
solutions that it develops for the client. This allows the
outsourcing provider to leverage the knowledge to bene"t other
clients, possibly even competitors of the initial
client company.
Fourth, contract terms may leave client companies highly
dependent on their outsourcing provider with little
recourse in terms of terminating troublesome provider
relationships. That is, the clients may be locked into an
arrangement that they no longer want. It may be too expensive
to switch to another outsourcing provider should
the contract sour. Despite doing due diligence and background
17. checks, the outsourcing provider may be unreliable
or go out of business before the end of the contract. The risk of
over!reliance for any number of reasons typi-
cally increases as the size of the outsourcing contract increases.
DHL Worldwide Express entrusted 90% of its IT
development and maintenance projects to a large Indian!based
company, Infosys. “There’s a lot of money wrapped
up in a contract this size, so it’s not something you take lightly
or hurry with,” said Ron Kifer, DHL’s Vice President
of Program
Solution
s and Management.6 Clearly, DHL faced considerable risk in
offshoring with Infosys because
of its reliance on the provider.
Fifth, it might be harder to keep its competitive secrets when a
company employs an outsourcing provider.
Although outsourcing providers are sensitive to keeping client
information separated in their systems, an outsourcer’s
staff will usually work with multiple customers. Some managers
are concerned that their company databases are no
longer kept in house, and the outsourcing provider’s other
customers may have easier access to sensitive information.
Although all outsourcing agreements contain clauses to keep
customer data and systems secure, managers still voice
18. concern about data security and process skills when they are
managed by a third party. Thinking through the security
issues carefully and implementing controls where possible
mitigate this risk. Often, the outsourcing provider has
more secure processes and practices in place simply because its
business depends on it—it’s a competitive necessity
and often a core competency of the outsourcing provider.
Sixth, the outsourcing provider’s culture or operations may be
incompatible with that of the client company,
making the delivery of the contracted service or system dif"cult.
Con#icts between the client’s staff and the staff
of the outsourcing provider may delay progress or harm the
quality of the service or product delivered by the out-
sourcing provider.
Finally, although many companies turn to outsourcing because
of perceived cost savings, these savings may
never be realized. Typically, the cost savings are premised on
the old way that the company performed the processes.
c10.indd 213 11/26/2015 6:32:10 PM
http://www.cio.com/article/29654/The_Hidden_Costs_of_Offsh
ore_Outsourcing
19. 214 Information Systems Sourcing
However, new technologies may usher in new processes, and the
anticipated savings on the old processes become
moot. Further, the outsourcing client is, to some extent, at the
mercy of the outsourcing provider. Increased vol-
umes due to unspeci" ed growth, software upgrades, or new
technologies not anticipated in the contract may end
up costing a " rm considerably more than it anticipated when it
signed the contract. Also, some savings, although
real, may be hard to measure.
Decisions about How to Outsource Successfully
Clearly, the decision about whether to outsource must be made
with adequate care and deliberation. It must be fol-
lowed with numerous other decisions about how to mitigate
outsourcing risks and make the outsourcing arrange-
ment work. Once these decisions have been made, they should
be openly communicated to all relevant stakeholders.
Three major decision areas are selection, contracting, and
scope.
Selection
20. Selection!related decisions focus on " nding compatible
outsourcing providers whose capabilities, managers,
internal operations, technologies, and culture complement those
of the client company. This means that compati-
bility and cultural " t might trump price, especially when
long!term partnerships are envisioned. Selection factors
are discussed more fully in the “where” and “where abroad”
decisions.
Contracting
Many “how” decisions center around the outsourcing contract.
In particular, client companies must ensure that
contract terms allow them the # exibility they require to manage
and, if necessary, sever supplier relationships.
The 10 !year contracts that were so popular in the early 1990s
are being replaced with contracts of shorter duration
lasting 3 to 5 years and full life cycle service contracts that are
broken up into stages. Deal size also has declined
this millennium. Although the numbers of megadeals and
midrange contracts awarded each year have remained
relatively stable since 2002, smaller contracts valued at $100
million or less had more than tripled a decade later. 7
Social Business Lens: Crowdsourcing
Crowdsourcing is a form of outsourcing that is provided
21. by a very large number of individuals. Two forms of
crowdsourcing are available: collaboration and tournament.
Collaboration crowdsourcing occurs when individ-
uals use social media to collectively create a common document
or solution. Examples are Wikipedia or crowd-
sourcing for innovation as was discussed in Chapter$ 5 .
Tournament crowdsourcing also uses social media to solicit
and collect independent solutions from a potentially large
number of individuals but selects one or a few of the
contributions in exchange for ! nancial or non! nancial
compensation.
Some sites offer marketplaces to promote particular types of
tournament crowdsourcing. Consider 99designs
(99designs.com), which is the largest online graphic design
marketplace where people or ! rms can go to get
affordable designs for such things as logos, labels, business
cards, and Web sites. It is anticipated that by 2016,
the site will have over a million members offering graphic
services. Businesses can source graphic design work
by launching design contests to the 99design community,
working individually with designers who are members
of the community, or purchasing design templates from
99designs ’ ready"made logo store. Recently, 99designs
opened a new site, Swiftly, for customers who want to get small
22. design tasks done quickly for a # at fee.
Sources: I. Blohm , J. M. Leimeister , and H. Krcmar
, “Crowdsourcing: How to Benefit from (Too) Many Great
Ideas ” MIS Quarterly
Executive 12 , no. 4 ( 2013 ), 199 – 211 ; About 99designs,
http://99designs.com/about (downloaded May 22, 2015).
7 Stephanie Overby , “ IT Outsourcing Deal Size Data
Shows Decade!Long Decline ,”
http://www.cio.com/article/2399755/it!organization/it!outsourci
ng!
deal!size!data!shows!decade!long!decline.html (accessed March
9, 2015) .
c10.indd 214 11/26/2015 6:32:10 PM
http://99designs.com/about
http://www.cio.com/article/2399755/it%E2%80%90organization
/it%E2%80%90outsourcing%E2%80%90deal%E2%80%90size%
E2%80%90data%E2%80%90shows%E2%80%90decade%E2%80
%90long%E2%80%90decline.html
http://www.cio.com/article/2399755/it%E2%80%90organization
/it%E2%80%90outsourcing%E2%80%90deal%E2%80%90size%
E2%80%90data%E2%80%90shows%E2%80%90decade%E2%80
23. %90long%E2%80%90decline.html
http://www.cio.com/article/2399755/it%E2%80%90organization
/it%E2%80%90outsourcing%E2%80%90deal%E2%80%90size%
E2%80%90data%E2%80%90shows%E2%80%90decade%E2%80
%90long%E2%80%90decline.html
215Sourcing Decision Cycle Framework
Often client companies and outsourcing providers have formal
outsourcing arrangements, called service level
agreements (SLAs) that de"ne the level of service to be
provided. SLAs often describe the contracted delivery
time and expected performance of the service. Contracts are
tightened by adding clauses describing actions to be
taken in the event of a deterioration in quality of service or
noncompliance with the SLA. Service levels, baseline
period measurements, growth rates, and service volume
#uctuations are speci"ed in the contracts to reduce oppor-
tunistic behavior on the part of the outsourcing provider.
Research demonstrates that tighter contracts tend to lead
to more successful outsourcing arrangements.8 To write tighter
contracts, it is a good idea for the client company to
develop contract management skills and to hire both outsourcing
and legal experts. Unfortunately, a tight contract
24. does not provide much solace to a client company when an
outsourcing provider goes out of business. It also does
not replace having a good relationship with the outsourcing
provider that allows the client to work out problems
when something unanticipated occurs.
Scope
Most enterprises outsource at least some IS functions. This is
where scope questions come into play. De"ning the
scope of outsourcing means that the client must decide whether
to pursue outsourcing fully or selectively with one
(single sourcing) or more providers (multisourcing). If a client
decides to go the selective outsourcing route, it may
insource most of its IS duties but selectively outsource the
remaining functions.
Full outsourcing implies that an enterprise outsources all its IS
functions from desktop services to software
development. An enterprise typically outsources everything
only if it does not view IT as a strategic advantage.
Full outsourcing can free resources to be employed in areas that
add greater value. This choice can also reduce
overall cost per transaction due to size and economies of scale.9
Many companies outsource IS simply to allow
their managers to focus attention on other business issues.
25. Others outsource to accommodate growth and respond
to their business environment. Kellwood, the case discussed at
the beginning of the chapter, appeared to have used
full outsourcing to improve operations.
With selective outsourcing, an enterprise chooses which IT
capabilities to retain in house and which to give to
one or more outsiders. A “best!of!breed” approach is taken to
choose suppliers for their expertise in speci"c tech-
nology areas. Possible areas for selective sourcing include Web
site hosting, Web 2.0 applications, cloud services,
business process application development, help desk support,
networking and communication, social IT services, and
data center operations. Although an enterprise can acquire
top!level skills and experience through such relationships,
the effort required to manage them grows tremendously with
each new provider. Still, selective outsourcing, some-
times called strategic sourcing, reduces the client company’s
reliance on outsourcing with only one provider. It also
provides greater #exibility and often better service due to the
competitive market.10 To illustrate, an enterprise might
retain a specialist "rm to develop social business applications
and at the same time select a large outsourcing provider,
such as IBM, to assume mainframe maintenance.
26. Consider JetBlue, an airline that turned to Verizon to manage its
IT infrastructure—its network, data center, and
help desk. The six!year contract with Verizon allows the data
centers to scale as JetBlue grows and helps JetBlue
“reduce the cycle time for delivery of those capabilities and
allow the rest of IT to focus on other capabilities,”
said JetBlue CIO, Joe Eng. Eng asserted that JetBlue can still
have control over IT: “We own the decision paths,
the service!level agreements and what direction we want to
take, but Verizon will be key in the implementation.”11
Verizon was chosen over other providers for a number of
reason, especially because the operation of networks is
its core business.
A client company that decides to use multiple providers when
fully or selectively outsourcing is multisourc-
ing. IT multisourcing is de"ned as delegating “IT projects and
services in a managed way to multiple vendors
8 See, for example, C. Saunders, M. Gebelt, and Q. Hu,
“Achieving Success in Information Systems Outsourcing,”
California Management Review 39,
no. 2 (1997), 63–79; M. Lacity and R. Hirschheim, Information
Systems Outsourcing: Myths, Metaphors and Realities
(Hoboken, NJ: John Wiley, 1995).
27. 9 Tom Field, “An Outsourcing Buyer’s Guide: Caveat Emptor”
(April 1, 1997).
10 Ibid.
11 M. Hamblen, “Verizon to Manage JetBlue’s Network, Data
Centers and Help Desk,” CIO.com (October 6, 2009),
http://www.computerworld.com/s/
article/9138965/Verizon_to_manage_JetBlue_s_network_data_c
enters_and_help_desk (accessed January 31, 2012).
c10.indd 215 11/26/2015 6:32:10 PM
http://www.computerworld.com/s/article/9138965/Verizon_to_
manage_JetBlue_s_network_data_centers_and_help_desk
216 Information Systems Sourcing
12 Martin Wiener and Carol Saunders, “Forced Coopetition in
IT Multi!Sourcing,” The Journal of Strategic Information
System 23, no. 3 (2014), 210–25.
13 Ibid.
14 Ibid.
15 Till Winkler, Alexander Benlian, Marc Piper, and Henry
Hirsch, “Bayer HealthCare Delivers a Dose of Reality for Cloud
Payoff Mantras in Multina-
28. tionals,” MIS Quarterly Executive 13, no. 4 (2014), 193–207.
who must (at least partly) work cooperatively to achieve the
client’s business objectives.”12 Over the last 15 years,
numerous bene"ts of IT multisourcing have made this approach
take off markedly in terms of number of com-
panies using it and contract sizes. In particular, it helps
companies limit the risks associated with working with
just one provider. It can also help client "rms lower their IT
service costs due to competition among providers,
improve the quality through best!of!breed services, enhance
their #exibility in adapting to changing market condi-
tions, and provide easier access to specialized IT expertise and
capabilities.13 However, multisourcing comes with
its downsides. Having more providers requires more
coordination than with working with a single outsourcing
provider. Further, when a major problem occurs, there may be a
tendency to “"nger!point.” That is, each out-
sourcing provider may claim that the problem is caused by or
can be corrected only by another provider. And as
outsourcing providers expand their service offerings,
unexpected competition among providers can hurt the client
if not managed well.
Adidas, a multinational footwear and sports apparel company,
29. recently adopted a multisourcing strategy,
which carefully pitted three IT providers against each other at
the same time that they were working coopera-
tively together.14 Adidas split virtually all of its huge IT
budget allocated for outsourcing among three providers:
a large Indian outsourcing company with which it had worked
for a decade and two “hungry” smaller "rms.
Adidas selected the three "rms in such a way that at least two
vendors, and sometimes all three, could perform
particular services that it needed. The large Indian outsourcing
provider had become complacent, and the competi-
tion provided better IT services at a lower price. In addition, all
three vendors were charged to be more innovative.
Through careful management, Adidas orchestrated the delicate
balance between provider cooperation and compe-
tition among the providers.
Deciding Where—In the Cloud, Onshoring, or Offshoring?
Until recently, outsourcing options were either to use services
onshore (work performed in the same country as the
client) or offshore (work performed in another country). More
recently, a new sourcing option has become more
available and more accepted by managers: cloud computing. We
next describe the three sourcing options. We also
describe some answers to the “how” question: how to make the
30. arrangement successful. Many best practices were
discussed in the previous subsection because they are common
to all three outsourcing options. A few more unique
practices are discussed in the next sections.
Cloud Computing
As discussed in Chapter$6, cloud computing is the dynamic
provisioning of third!party!provided IT services
over the Internet using the concept of shared services.
Companies offering cloud computing make an entire
data center’s worth of servers, networking devices, systems
management, security, storage, and other infra-
structure available to their clients. In that way, their clients can
buy the exact amount of storage, computing
power, security, or other IT functions that they need, when they
need it, and pay only for what they use. Thus,
the client company can realize cost savings by sharing the
provider’s resources with other clients. The pro-
viders also provide 24/7 access using multiple mobile devices,
high availability for large backup data storage,
and ease of use.
Cloud computing’s many advantages make it quite popular with
executives. The total global cloud computing
market is estimated to spurt from $61 billion in 2012 to $241
31. billion in 2020.15 This growth was originally fueled
by small! to medium!size businesses that lacked large IT
functions or internal capabilities. More recently, larger
companies have been signing up for cloud services to take
advantage of the cloud’s many bene"ts.
c10.indd 216 11/26/2015 6:32:10 PM
217Sourcing Decision Cycle Framework
Advantages and Risks/Challenges of Cloud Computing Cloud
computing offers a number of advantages.
Because resources can be shared, costs for IT infrastructure and
services can be slashed. There are no up!front
investment costs, and ongoing costs are variable according to
the "rm’s needs, especially for those with multina-
tional units in large countries.16 The Commonwealth Bank of
Australia claimed that its IT costs dropped by approx-
imately 40% when it moved to a cloud for IT infrastructure,
software, and development.17 Further, with companies
such as Amazon, Google, IBM, and Microsoft vying for
customers, pricing is still rather competitive. Flexibility
is enhanced because infrastructure needs that vary over time can
32. be met dynamically. For many companies, cloud
computing means “pay!as!you!go.” They can get the exact level
of IT support that they need when they need it.
Further, cloud computing is scalable, which means that more
providers can be added if requirements increase, or
they theoretically can be taken out of play if the needs decrease.
This allows business units to focus on their core
competencies as long as they do not need to deal with local
idiosyncrasies and customizations.18
Net#ix realized the advantages of cloud computing to support
its strategic initiative to stream movies to its cus-
tomers instead of mailing them DVDs. To do so, it needed so
much more infrastructure that the cloud appeared to be
its only option. “Net#ix.com is nearly 100% in the cloud.$.$.$.
We really couldn’t build data centers fast enough,” says
Jason Chan, Net#ix’s cloud security architect. The introduction
of a Net#ix application for iPhones will place even
greater spikes in demand, at least temporarily. But Chan isn’t
concerned: “That’s what cloud is really intended for.”19
As with any sourcing decision, organizations considering cloud
computing must weigh its bene"ts against its
risks and challenges. Executives worry over many of the same
types of risks that are found with other types of out-
33. sourcing. In particular, they fear technical lock in, long!term
business commitments, and lost IT capabilities, which
ultimately could lead to overdependence on the outsourcing
provider.20 IT executives are particularly concerned
that they might lose control over the IT environment for which
they bear responsibility. One big concern with cloud
computing has been security, speci"cally with external threats
from remote hackers and security breaches as the
data travel to and from the cloud. Tied to the concerns about
security are concerns about data privacy. The stan-
dards, monitoring, and maintenance tools for cloud computing
are still not mature. This makes security, interoper-
ability, and data mobility dif"cult. However, knowing that their
business is on the line, many cloud providers have
strengthened their security and are willing to deal with the
security issues of individual customers. For example,
when Bayer HealthCare ran into security risks related to its
pharmaceutical customer data in its cloud customer
relationship management (CRM), a middleware solution was
implemented to protect internal systems against intru-
sions from outside the "rewall.
Another challenge that causes some managers to shy away from
cloud computing is the fact that the ability to
tailor service!level requirements, such as uptime, response time,
34. availability, performance, and network latency,
to the speci"c needs of a client is far less than with insourcing
or many other outsourcing options. To manage this
risk, an SLA needs to spell out these requirements. For
multinationals, a related challenge is data sovereignty,
which means that data are subject to the laws of the country in
which they are located.21 The Commonwealth
Bank of Australia has excluded some application providers
because the core data need to remain in Australia.22
Bayer Healthcare took a different, far more time!consuming
approach. It adopted a global solution that took into
account the different regulatory requirements and processes
across its business units in different countries. It also
used a two!platform approach: The business units in small and
medium countries used an in!house system as their
“common platform,” while business units in larger countries
with more complex systems relied on cloud providers
that offered an “advanced” cloud!based platform.23
16 Ibid.
17 Daniel Schlagwein, Alan Thorogood, and Leslie Willcocks,
“How Commonwealth Bank of Australia Gained Benefits Using
a Standards!Based,
Multiprovider Cloud Model,” MIS Quarterly Executive 13, no.
4 (2014), 209–22.
35. 18 Winkler et al., “Bayer HealthCare Delivers a Dose of
Reality,” 193–207.
19 Tim Greene, “Netflix Deals with Cloud Security Concerns,”
CIO.com (September 21, 2011),
http://www.cio.com/article/print/690236 (accessed
September 22, 2011).
20 Schlagwein, Thorogood, and Willcocks, “How
Commonwealth Bank of Australia Gained Benefits,” 209–22.
21 Winkler et al., “Bayer HealthCare Delivers a Dose of
Reality,” 193–207; Schlagwein, Thorogood, and Willcocks,
“How Commonwealth Bank of
Australia Gained Benefits,” 209–22.
22 Schlagwein, Thorogood, and Willcocks, “How
Commonwealth Bank of Australia Gained Benefits.”
23 Winkler et al., “Bayer HealthCare Delivers a Dose of
Reality,” 193–207.
c10.indd 217 11/26/2015 6:32:10 PM
http://www.cio.com/article/print/690236
218 Information Systems Sourcing
24 Ben Eaton, Hanne Kristine Hallingby, Per!Jonny Nesse, Ole
36. Hanset, “Achieving Payoffs from an Industry Cloud Ecosystem
at BankID,” MIS Quarterly
Executive 13, no. 4 (December 2014), 51–60.
25 Paul J. Stamas, Michelle L. Daarst!Brown, and Schoot A.
Bernard, “The Business Transformation Payoffs of Cloud
Services at Mohawk,” MIS
Quarterly Executive 13, no. 4 (December 2014), 177–92.
26 Ibid.
27 Diana Kelley, “How Data!Centric Protection Increases
Security in Cloud Computing and Virtualization” (2011),
http://www.securitycurve.com
(accessed September 22, 2011).
28 Ibid.; Winkler et al., “Bayer HealthCare Delivers a Dose of
Reality,” 193–207.
Cloud Computing Options Cloud computing comes in many
different forms. Options include on!premise or
private clouds, community clouds, hybrid clouds and public
clouds. In private clouds, data are managed by the
organization and remain within its existing infrastructure, or it
is managed offsite by a third party for the organi-
zation (client company). In a community cloud, the cloud
infrastructure is shared by several organizations and
supports the shared concerns of a speci"c community. An
example of a community cloud is Norway’s BankID
37. community. BankID relies on a cloud infrastructure to provide a
system that enables electronic identi"cation,
authentication, and signing. Members of the BankID community
include Norwegian banks, the Norwegian
government, the Norwegian Banking Federation, and
merchants.24
A hybrid cloud is a combination of two or more other clouds.
Mohawk, a U.S. manufacturer of premium paper
products discussed in Chapter$6, has a hybrid cloud. It is part
of a computing environment with on!premises ERP
and manufacturing systems, a secure suite of private cloud
services to send and receive data "les among on!prem-
ises databases and to integrate with its business partners, and a
suite of cloud services to integrate public cloud
applications with internal applications and business
processes.25
In a public cloud, data are stored outside of the corporate data
centers in the cloud provider’s environment. As
discussed in Chapter$6, public clouds include:
• Infrastructure as a service (IaaS): Provides infrastructure
through grids or clusters or virtualized servers, net-
works, storage, and systems software designed to augment or
38. replace the functions of an entire data center.
The customer may have full control of the actual server
con"guration allowing more risk management con-
trol over the data and environment. The earlier Net#ix example
illustrates the IaaS cloud option.
• Software as a service (SaaS): Provides software application
functionality through a Web browser. Mohawk
uses the Web for a variety of SaaS applications (e.g.,
e!marketing, CRM, and human resources [HR]).26
Both the platform and the infrastructure are fully managed by
the cloud provider, which means that if the
operating system or underlying service is not con"gured
correctly, the data at the higher application layer
may be at risk. This is the most widely known and used form of
cloud computing. A provider of SaaS is
sometimes called application service provider (ASP).27
• Platform as a service (PaaS): Provides services using
virtualized servers on which clients can run existing
applications or develop new ones without having to worry about
maintaining the operating systems, server
hardware, load balancing, or computing capacity; the cloud
provider manages the hardware and under-
lying operating system, which limits its enterprise risk
39. management capabilities. Bayer Healthcare’s cloud
platform!based component development (PaaS) is used to
customize cloud solutions when the existing SaaS
solutions are unable to satisfy the complex, idiosyncratic needs
of its large business units.28
Onshoring
Outsourcing does not necessarily mean that IT services and
software development are shipped abroad. Onshoring,
also called inshoring, means performing outsourcing work
domestically (i.e., in the same country). Onshoring may
be considered the “opposite” of offshoring. In scope, it involves
either selective or full outsourcing.
A growing trend in onshoring in the United States is rural
sourcing, which is hiring outsourcing providers with
operations in rural parts of the country. Rural sourcing "rms can
be competitive because they take advantage of
lower salaries and living costs when compared to "rms in
metropolitan areas. Dealing with a rural company can
have advantages in terms of different time zones, similar
culture, and fewer hassles compared with dealing with
foreign outsourcing providers. However, the rural sourcing "rms
are usually too small to handle large!scale projects
40. c10.indd 218 11/26/2015 6:32:10 PM
http://www.securitycurve.com
219Sourcing Decision Cycle Framework
29 Bob Violino, “Rural Outsourcing on the Rise in the U.S.”
(March 7, 2011),
http://www.computerworld.com/s/article/353556/Lure_of_the_C
ountryside?
taxonomyId=14&pageNumber=1 (accessed September 22,
2011).
30 India Brand Equity Foundation,
http://www.ibef.org/industry/information!technology!india.aspx
(accessed March 9, 2015).
31 Aditya Bhasin, Vinay Couto, Chris Disher, and Gil Irwin,
“Business Process Offshoring: Making the Right Decision”
(January 29, 2004), http://www2.
cio.com/consultant/report2161.html (accessed August 14, 2005).
and may not have the most technologically advanced employees.
Rural sourcing is often viewed as more politically
correct than offshoring.29
41. Offshoring
Offshoring (which is short for offshore sourcing) occurs when
the IS organization uses contractor services, or even
its own hybrid captive center in a distant land. The functions
sent offshore range from routine IT transactions to
increasingly higher!end, knowledge!based business processes.
Programmer salaries can be a fraction of those in the home
country in part because the cost of living and the
standard of living in the distant country are much lower, maybe
as much as 70% lower when only considering direct
labor costs. However, these savings come at a price because
other costs increase. Additional technology, telecom-
munications, travel, process changes, and management overhead
are required to relocate and supervises overseas
operations. For example, during the transition period, which can
be rather lengthy, offshore workers must often
be brought to the home country headquarters for extended
periods to become familiar with the company’s oper-
ations and technology. Because of the long transition period, it
can often take several years for offshoring’s labor
savings to be fully realized. And even if they are realized, they
may never re#ect the true cost to a company. Many,
especially those who have lost their jobs to offshore workers,
argue that offshoring cuts into the very "ber of the
42. society in the country of origin whose companies are laying off
workers. Yet, it helps the economies of the countries
where offshoring is performed. For example, India’s IT services
industry, the largest private sector employer, was a
$108$billion industry in "scal year 2013 with $76 billion
derived from exports of services and products.30
Even though the labor savings are often very attractive,
companies sometimes turn to offshoring for other rea-
sons. The employees in many offshore companies are typically
well educated (often holding master’s degrees) and
proud to work for an international company. The offshore
service providers are often “pro"t centers” that have
established Six Sigma, ISO 9001, Capability Maturity Model
(CMM), or another certi"cation program. These off-
shore providers usually are more willing to “throw more
brainpower at a problem” to meet their performance goals
than many companies in the United States or Western Europe.
In offshore economies, technology know!how is a
relatively cheap commodity in ample supply.31
Offshoring raises the fundamental question of what to send
offshore and what to keep within the enterprise IS
organization when implementing the selective outsourcing
model. Because communications are made dif"cult by
43. differences in culture, time zones, and possibly language,
outsourced tasks are usually those that can be well spec-
i"ed. They typically, but not always, are basic noncore
transactional systems that require the users or customers to
have little in!depth knowledge. In contrast, early stage
prototypes and pilot development are often kept in house
because this work is very dynamic and requires familiarity with
business processes. Keeping the work at home
allows CIOs to offer learning opportunities to in house staff. In
summary, the cost savings that lure many companies
to turn to offshoring need to be assessed in relation to the
increased risks and communication problems in working
with offshore workers and relying on them to handle major
projects.
Deciding Where Abroad—Nearshoring or Farshoring?
Offshoring can be either relatively proximate (nearshoring) or
in a distant land (farshoring). Each of these offshore
options is described in more detail here. They are also shown in
Figure$10.3 with other domestic and nondomestic
sourcing options in Figure$10.3. In some cases, the distinction
is hard to make because some cloud computing can
be considered as insourcing if it is a local private cloud or local
community cloud or some hybrid. However, in
most cases, cloud computing tends to be a form of outsourcing
44. either domestically or nondomestically in the ether.
Further, although most captive centers could be considered a
form of insourcing, hybrid captive centers sometimes
outsource a client’s simple, more commoditized work.
c10.indd 219 11/26/2015 6:32:10 PM
http://www.computerworld.com/s/article/353556/Lure_of_the_C
ountryside?taxonomyId=14&pageNumber=1
http://www.ibef.org/industry/information%E2%80%90technolog
y%E2%80%90india.aspx
http://www2.cio.com/consultant/report2161.html
220 Information Systems Sourcing
Farshoring
Farshoring is a form of offshoring that involves sourcing
service work to a foreign, lower!wage country that is
relatively far away in distance or time zone (or both). For
countries such as the United States and United Kingdom
that outsource large amounts of work, India and China are the
most popular farshoring destinations. Ironically,
companies in India and China are now themselves farshoring to
countries with lower labor costs.
45. Nearshoring
Nearshoring , on the other hand, uses providers in foreign,
lower!wage countries that are relatively close in dis-
tance or time zones to the client company. With nearshoring,
the client company hopes to bene" t from one or more
dimensions of being close: geographic, temporal, cultural,
linguistic, economical, political, or historic linkages.
Nearshoring basically challenges the assumption on which
farshoring is premised: Distance doesn ’ t matter. The
advocates of nearshoring argue that distance does matter, and
when closer on one or more of these dimensions,
the client company faces fewer challenges in terms of
communication, control, supervision, coordination, or social
bonding.
Geographic Lens: Corporate Social Responsibility
Many outsourcing clients are increasing their corporate social
responsibility (CSR) expectations for themselves
and for their global IS outsourcing providers. Pessimists of
global IS outsourcing are concerned that it maximizes
pro! t for the rich but offers little or no bene! ts for other
groups, especially the poor in developing countries. The
pessimists are concerned that global IS outsourcing will deepen
income inequalities and have disruptive effects
46. on society around the globe. Optimists of global IS outsourcing
see it as a way of sharing wealth on a global
basis. It is ethically justi! ed because it can improve ef! ciency,
help developing countries where unemployment is
very high by providing jobs, lead to transfers of knowledge and
information technology, and encourage better
educational systems in less developed countries so that people
can do the outsourcing work. Ironically, global IS
outsourcing may bene! t both the more developed origin country
(frequently the United States, Western Europe,
and Australia) as well as the destination country through free
trade and reduced prices for computers and com-
munications equipment. It also may fuel the creation of
high"level jobs for workers in more developed countries.
To promote corporate social responsibility, both clients and
outsourcing providers should implement the
following guidelines: understand relevant CSR regulatory
requirements to ensure compliance, establish mea-
sures and report CSR performance and compliance to
stakeholders, respond to inquiries about CSR compliance,
embed CSR in ongoing operations, and develop a CSR culture
through hiring and education.
Sources: R. Babin and B. Nicholson , “ Corporate
47. Social and Environmental Responsibility and Global IT
Outsourcing ,” MIS Quarterly
Executive 8 , no. 4 ( 2009 ), 203 – 12 ; Laura D ’ Andrea
Tyson , “ Outsourcing: Who ’ s Safe Anymore? ” (February 23,
2004 ) .
FIGURE 10.3 Different forms of sourcing.
Source: Adapted from
http://www.dbresearch.com/PROD/DBR_INTERNET_EN"PROD
/PROD0000000000179790/Offshoring%3A+
Globalisation+wave+reaches+services+se.PDF (downloaded
May 22, 2015).
Insourcing Outsourcing
Domestic
(local)
Situation in which a ! rm provides IS
services or develops IS in its own
in house organization and/or in its
local private cloud or, possibly, local
community cloud
Purchase of a good or services that was previously provided
48. internally or that could be provided internally but is now
provided by an outside domestic outsourcing provider
(i.e., onshoring), or outsourced to a rural or local cloud
provider
Nondomestic Situation in which a ! rm uses an
offshore captive center
Situation when the IS organization uses contractor services
in a distant land or in the ether; may include nearshoring,
farshoring, cloud computing, or a hybrid captive center
c10.indd 220 11/26/2015 6:32:10 PM
http://www.dbresearch.com/PROD/DBR_INTERNET_EN%E2%
80%90PROD/PROD0000000000179790/Offshoring:+Globalisati
on+wave+reaches+services+se.PDF
221Sourcing Decision Cycle Framework
Three major global clusters of countries are focused on building
a reputation as a home for nearshoring: a cluster
of 20 nations around the United States and Canada, a cluster of
27 countries around Western Europe, and a smaller
49. cluster of three countries in East Asia: China, Malaysia, and
Korea.32
The dimensions of being close clearly extend beyond distance
and time zone. For example, language makes
a difference in nearshoring. That is why Latin American
nearshoring destinations are appealing to Texas and
Florida where there is a large Spanish!speaking population and
why French!speaking North African nations are
appealing to France. These dimensions likely play a key role
when companies are trying to decide between a near-
shore or farshore destination (particularly India). Ironically,
India, which exports roughly "ve times the software
of the strictly nearshoring nations in the three major
nearshoring clusters, is responding to the competitive threat
that these nations pose by offering its clients nearshoring
options. For example, India!based Tata Consulting Ser-
vices (TCS) offers its British clients services that are nearshore
(Budapest, Hungary), farshore (India), or onshore
(London, United Kingdom). It is likely that the differentiation
based on “distance” will continue to be important
in the outsourcing arena.
Selecting an Offshore Destination: Answering the “Where
Abroad?” Question
50. A dif"cult decision that many companies face is selecting an
offshoring destination. To answer the where abroad
question, client companies must consider attractiveness, level of
development, and cultural differences.
Attractiveness Approximately 100 countries are now exporting
software services and products. For various rea-
sons, some countries are more attractive than others as hosts of
offshoring business because of the "rm’s geographic
orientation. With English as the predominant language of
outsourcing countries (i.e., United States and United
Kingdom), countries with a high English pro"ciency are more
attractive than those where different languages
are spoken. Geopolitical risk is another factor that affects the
use of offshore "rms in a country. Countries on the
verge of war, with high rates of crime, and with hostile
relationships with the client company’s home country are
typically not suitable candidates for this business. Other factors
including regulatory restrictions, trade issues, data
security, and intellectual property also affect the attractiveness
of a country for an offshoring arrangement. Hiring
legal experts who know the laws of the outsourcing provider’s
company can mitigate legal risks. Nonetheless, some
countries are more attractive than others because of their legal
systems. The level of technical infrastructure avail-
51. able in some countries also can add to or detract from the
attractiveness of a country. Although a company may
decide that a certain country is attractive overall for offshoring,
it still must assess city differences when selecting
an offshore outsourcing provider. For example, Chennai is a
better location in India for "nance and accounting, but
Delhi has better call center capabilities.33
Some countries have created an entire industry of providing IT
services through offshoring. India, for example,
took an early mover advantage in the industry. With a large,
low!cost English!speaking labor pool, many entre-
preneurs set up programming factories that produce high!quality
software to meet even the toughest standards.
One measure of the level of pro"ciency of the development
process within an IS organization is the Software
Engineering Institute’s Capability Maturity Model (CMM).34
Its Level 1 means that the software development
processes are immature, bordering on chaotic. Few processes
are formally de"ned, and output is highly inconsis-
tent. At the other end of the model is Level 5 in which
processes are predictable, repeatable, and highly re"ned.
Level 5 companies are consistently innovating, growing, and
incorporating feedback. The software factories in
many Indian enterprises are well known for their CMM Level 5
52. software development processes, making them
extremely reliable, and, thus, desirable as vendors. However, if
the client company is not at the same CMM level
as the provider, it may want to specify which CMM processes it
will pay for to avoid wasting money. Further,
it may seek to elevate its own CMM certi"cation to close the
process gap between what it can do and what the
outsourcing provider can do.
32 Erran Carmel and Pamela Abbott, “Why ‘Nearshore’ Means
that Distance Matters,” Communications of the ACM 50, no. 10
(October 2007), 40–46.
33 Ben Worthen and Stephanie Overby, “USAA IT Chief Exits”
(June 15, 2004),
http://www.cio.com/archive/061504/tl_management.html
(accessed
August 14, 2005).
34 CMM is now referred to as Capability Maturity Model
Integration (CMMI).
c10.indd 221 11/26/2015 6:32:11 PM
http://www.cio.com/archive/061504/tl_management.html
53. 222 Information Systems Sourcing
35 Erran Carmel and Paul Tjia, Offshoring Information
Technology (Cambridge, UK: Cambridge University Press,
2005).
36 Overby, “The Hidden Costs of Offshore Outsourcing.”
37 Carmel and Tjia, Offshoring Information Technology.
38 Ibid., 181.
Development Tiers A very important factor in selecting an
offshore destination is the level of development of
the country, which often subsumes a variety of other factors.
For example in the highest tier, the countries have an
advanced technological foundation and a broad base of
institutions of higher learning. Carmel and Tjia suggest that
there are three tiers of software exporting nations:35
• Tier 1—Mature software!exporting nations: These include
such highly industrialized nations as the United
Kingdom, the United States, Japan, Germany, France, Canada,
the Netherlands, Sweden, and Finland. It also
includes the three “I’s” (i.e., India, Ireland, and Israel) that
became very prominent software exporters in the
1990s as well as China and Russia, which entered the tier in the
2000s.
54. • Tier 2—Emerging software!exporting nations: These nations
are the up!and!comers. They tend to have small
population bases or unfavorable conditions such as political
instability or an immature state of economic develop-
ment. Countries in this tier include Brazil, Costa Rica, South
Korea, and many Eastern European countries.
• Tier 3—Infant stage software!exporting nations: These nations
have not signi"cantly affected the global
software market, and their software industries are mostly
“cottage industries” with small, isolated "rms.
Some of the 15 to 25 Tier 3 countries are Cuba, Vietnam, and
Jordan.
The tiers were determined on the basis of industrial maturity,
the extent of clustering of some critical mass of
software enterprises, and export revenues. The higher!tiered
countries tend to offer higher levels of skills but also
charge higher prices.
Cultural Differences Often misunderstandings arise because of
differences in culture and, sometimes, language.
For example, GE Real Estate’s CIO quickly learned that U.S.
programmers have a greater tendency to speak up and
55. offer suggestions whereas Indian programmers might think
something does not make sense, but they go ahead and
do what they were asked, assuming that this is what the client
wants.36 Thus, a project, such as creating an auto-
mation system for consumer credit cards that is common sense
for a U.S. worker, may be harder to understand and
take longer when undertaken by an offshore worker. The end
result may be a more expensive system that responds
poorly to situations unanticipated by its offshore developers. It
is important to be aware of and to manage the risks
due to cultural differences.
Sometimes cultural and other differences are so great that
companies take back in house operations that were
previously outsourced offshore. Carmel and Tjia outlined some
examples of communication failures with Indian
developers due to differences in language, culture, and
perceptions about time:37
• What is funny in one culture is not necessarily funny in
another culture.
• Indians are less likely than Westerners, especially the British,
to engage in small talk.
56. • Indians, like Malaysians and other cultures, are hesitant about
saying “no.” Answers to questions to which
one option for response is “no” are extremely dif"cult to
interpret.
• Indians often are not concerned with deadlines. When they
are, they are likely to be overly optimistic about
their ability to meet the deadlines of a project. One cultural
trainer was heard to say, “When an Indian
programmer says the work will be "nished tomorrow, it only
means it will not be ready today.”38
Re!evaluation—Keep as Is or Change Decision
The "nal decision in the Sourcing Decision Cycle requires an
assessment as to whether the sourcing arrangement is
working as it should be. If everything is basically satisfactory,
then the arrangement can continue as is. Otherwise,
the arrangement may need to be adjusted. If the arrangement is
very unsatisfactory, another outsourcing provider
c10.indd 222 11/26/2015 6:32:11 PM
223Sourcing Decision Cycle Framework
57. may be selected or backsourcing may occur. Backsourcing is a
business practice in which a company takes back in
house assets, activities, and skills that are part of its
information systems operations and were previously outsourced
to one or more outside IS providers.39 Kellwood, the company
described at the beginning of this chapter, frequently
re!evaluated its outsourcing arrangements and eventually
backsourced.
Backsourcing may be partial or complete reversal of an
outsourcing contract. A growing number of companies
around the globe have brought their outsourced IS functions
back in house after terminating, renegotiating, or let-
ting their contracts expire. Some companies, such as
Continental Airlines, Cable and Wireless, Halifax Bank of
Scotland, Sears, Bank One, and Xerox, have backsourced
contracts worth a billion dollars or more.
The most expensive contract that was backsourced to date was
the one that JP Morgan Chase signed with IBM
for a whopping $5 billion dollars. JP Morgan Chase terminated
its contract and brought information systems (IS)
operations back in house only 21 months into a seven!year
mega!contract. The CIO of JP Morgan Chase, Austin
58. Adams, stated at that time, “We believe managing our own
technology infrastructure is best for the long!term
growth and success of our company, as well as our shareholders.
Our new capabilities will give us competitive
advantages, accelerate innovation, and enable us to become
more streamlined and ef"cient.”40 A number of factors
appear to have played a role in the decision to bring the IS
operations back in house. Outsourcing appeared to stag-
nate IT at JP Morgan Chase under the outsourcing arrangement.
Another factor is that the company had undergone
a major change with its July 2004 merger with Bank One, which
had gained a reputation for consolidating data
centers and eliminating thousands of computer applications.
And the man who had played a big role in the consoli-
dation was Bank One’s CIO, Austin Adams. In his new role at
JP Morgan Chase, Adams managed the switch from
IBM to self!suf"ciency by taking advantage of the cost!cutting
know!how he had gained at Bank One. Thus, the
underperforming JP Morgan Chase learned much from the
ef"cient Bank One.41
It is not only large companies that are backsourcing. Small! to
medium!size "rms also report having negative
outsourcing experiences, and many of these have backsourced
or are considering backsourcing. Given the size and
59. number of the current outsourcing contracts and the dif"culties
of delivering high!quality information services and
products, backsourcing is likely to remain an important option
to be considered by many client companies.
Ironically, the reasons given for backsourcing often mirror the
reasons for outsourcing in the "rst place. That
is, companies often claim that they backsource to reduce costs
and become more ef"cient. Based on reports in the
popular press, the most common reasons given for backsourcing
are a change in the way the IS is perceived by the
organization, the need to regain control over critical activities
that had been outsourced, a change in the executive
team (where the new executives favored backsourcing), higher
than expected costs, and poor service. The studies
found that backsourcing was not always due to problems.
Sometime companies saw opportunities, such as mergers,
acquisitions, or new roles for IS, that required backsourcing to
be realized.42
Outsourcing decisions can be dif"cult and expensive to reverse
because outsourcing requires the enterprise to
acquire the necessary infrastructure and staff. Unless
experienced IT staff from elsewhere in the "rm can contribute,
outsourcing major IT functions means losing staff to either the
60. outsourcing provider or other companies. When IT
staff gets news that their company is considering outsourcing,
they often seek work elsewhere. Even when staff
are hired by the outsourcing provider to handle the account,
they may be transferred to other accounts, taking with
them critical knowledge. Although backsourcing represents the
"nal decision in one Sourcing Decision Cycle, it
is invariably followed by another cycle of decisions as the
company seeks to respond to its dynamic environment.
39 Rudy Hirschheim, “Backsourcing: An Emerging Trend”
(1998); Mary C. Lacity and Leslie P. Willcocks, “Relationships
in IT Outsourcing: A Stake-
holder’s Perspective,” Framing the Domains of IT Management.
Projecting the Future".".". Through the Past, ed. Robert W.
Zmud (Cincinnati, OH: Pin-
naflex Education Resources, 2000), 355–84.
40 Stephanie Overby, “Outsourcing—and Backsourcing—at JP
Morgan Chase” (2005), http://www.cio.com/article/print/10524
(accessed July 23, 2008).
41 Paul Strassmann, “Why JP Morgan Chase Really Dropped
IBM” (January 13, 2005),
http://www.baselinemag.com/c/a/Projects!Management/Why!
JP!Morgan!Chase!Really!Dropped!IBM/.
42 N. Veltri, C. Saunders, and C. B. Kavan, “Information
61. Systems Backsourcing: Correcting Problems and Responding to
Opportunities” (2008). These
economic and relationship issues are similar to those found in
the three empirical studies that have performed backsourcing
research to date: Bandula
Jayatilaka, “IS Sourcing a Dynamic Phenomena: Forming an
Institutional Theory Perspective,” Information Systems
Outsourcing: Enduring Themes, New
Perspectives and Global Challenges, ed. Rudy Hirschheim,
Armin Heinzl, and Jens Dibbern (Berlin: Springer!Verlag,
2006), 103–34; R. Hirschheim
and M. C. Lacity, “Four Stories of Information Systems
Sourcing,” Information Systems Outsourcing: Enduring Themes,
New Perspectives and Global
Challenges, ed. R. Hirschheim, Armin Heinzl, and J. Dibbern
(Berlin: Springer!Verlag, 2006), 303–46; Dwayne Whitten and
Dorothy Leidner, “Bringing
IT Back: An Analysis of the Decision to Backsource or Switch
Vendors,” Decision Sciences 37, no. 4 (2006), 605–21.
c10.indd 223 11/26/2015 6:32:11 PM
http://www.cio.com/article/print/10524
http://www.baselinemag.com/c/a/Projects%E2%80%90Managem
ent/Why%E2%80%90JP%E2%80%90Morgan%E2%80%90Chase
63. sourcing provider(s). However, as business becomes more
complex and organizations become more intertwined
with one another, it becomes increasingly important to consider
outsourcing in a broader context that includes stra-
tegic networks and business ecosystems.
Strategic Networks
Typically, outsourcing relationships are couched in terms of an
outsourcing provider and a client—just as we
have done in this chapter. A different approach to viewing
outsourcing arrangements is the strategic network, a
long!term, purposeful “arrangement by which companies set up
a web of close relationships that form a veritable
system geared to providing product or services in a coordinated
way.”43 The client company becomes a hub and its
suppliers, including its outsourcing providers, are part of its
network. The advantage of the strategic network is that
it lowers the costs of working with others in its network. In
doing so, the client company can become more ef"cient
than its competitors as well as #exible enough to respond to its
rapidly changing environment. Perhaps the strategic
network is the best way to think about outsourcing arrangements
in today’s world.
An example of a strategic network is a Japanese keiretsu that
64. has a hub company, a policy that encourages spe-
cialization within the network, and investments ("nancial and
otherwise) in long!term relationships.44 Japanese
companies manage their outsourcing activities based on inputs
from different types of suppliers.45 The strategic
suppliers (kankei kaisa) fall into the keiretsu category whereas
independent suppliers (dokuritsu kaisha) do not.
Japanese companies work very closely with other companies in
the keiretsu.
Another type of strategic network that increasingly affects
outsourcing arrangements is a network with a parent
or multinational organization and a number of its subsidiaries.
Often one subsidiary performs outsourcing services
for another subsidiary in the network. Given the increasingly
complex structure of today’s multinationals, the role
of strategic networks in outsourcing arrangements is likely to
grow.
Business Ecosystems
Digital ecosystems are discussed in Chapter$ 9. Another type of
ecosystem is the business ecosystem, which is
de"ned as “an economic community supported by a foundation
of interacting organizations and individuals—the
organisms of the business world.”46 This economic community
65. is comprised of customers, suppliers, lead pro-
ducers, competitors, outsourcing providers, and other
stakeholders. Over time, the community members’ invest-
ments, capabilities, and roles become aligned as they all move
toward a shared vision.
In Norway, a business ecosystem was created by Norwegian
banks using the BankID cloud community dis-
cussed earlier in the chapter.47 The community with its cloud
infrastructure was established in 2000 by two major
Norwegian banks. Eventually, other Norwegian banks, the
Federation of Norwegian Banking, and the government
joined in as core members to subsidize and nurture the
ecosystem. Merchants were brought into the ecosystem
to grow the community and its offerings. Students and landlords
were brought in when BankID was expanded to
allow students to pay for their housing online. The BankID
ecosystem also includes the main cloud infrastructure
suppliers as core members and equipment vendors and the
outsourcing companies as peripheral members. Systems
such as BankID are becoming more and more common.
c10.indd 224 11/26/2015 6:32:11 PM
66. 225Case Study
Where would you go if you needed to " nd hundreds of people
each willing to take on a tiny portion of a large task for minimal
pay? Projects like these include " lling out surveys, verifying or
entering data, writing articles, and transcribing audio " les.
They are increasingly common in the digital age, so you might
turn to an online marketplace such as Crowdsourcing.com,
CrowdFlower , or Amazon ’ s Mechanical Turk where people
around the globe go to " nd work.
Daniel Maloney, an AOL executive, recently turned to
crowdsourcing for help inventorying AOL ’ s vast video
library.
( Note: This de# nition of crowdsourcing differs from the one
used in Chapter $ 5 as a way to spur innovation. ) He broke
the
! CASE STUDY 10!1 Crowdsourcing at AOL
S U M M A R Y
• Firms typically face a range of sourcing decisions. The
Sourcing Decision Cycle Framework highlights decisions about
67. where the work will be performed. Decisions include insourcing
versus outsourcing; onshoring versus cloud com-
puting versus offshoring; and selecting among offshoring
options (nearshoring versus farshoring). The cycle involves an
assessment of the adequacy of the IS service/product delivery.
The assessment can trigger a new cycle.
• Cost savings or " lling the gaps in the client company ’ s IT
skills are powerful reasons for outsourcing. Other reasons
include
the ability of the company to adopt a more strategic focus,
manage IS staff better, better handle peaks, or consolidate data
cen-
ters. The numerous risks involved in outsourcing arrangements
must be carefully assessed by IS and general managers alike.
• Full or selective outsourcing offers client companies an
alternative to keeping top!performing IS services in house.
These " rms can meet their outsourcing needs by using
single!vendor or multiple!vendor models (multisourcing).
• Cloud computing allows client " rms to buy the exact amount
of storage, computing power, security, or other IT
functions that they need, when they need it. It includes
infrastructure as a service (IaaS), platforms as a service (PaaS),
68. and software as a service (SaaS).
• Offshoring may be performed in a country that is proximate
along one or a number of dimensions (nearshoring) or that
is distant (farshoring). Offshoring must be managed carefully
and take into consideration functional differences.
• As business becomes more complex, outsourcing should be
considered in the broader context of strategic networks and
business ecosystems.
D I S C U S S I O N Q U E S T I O N S
1. The make!versus!buy decision is important every time a
new application is requested of the IS group. What, in your
opinion,
are the key reasons an IS organization should make its own
systems? What are the key reasons it should buy an application?
2. Is offshoring a problem to your country? To the global
economy? Please explain.
3. When does cloud computing make sense for a large
corporation that already has an IS organization? Give an
example of
69. cloud computing that might make sense for a start!up company.
4. Does a captive center resolve the concerns managers
have about outsourcing to a third party vendor? Why or why
not?
K E Y T E R M S
backsourcing (p.$223)
business ecosystem (p.$224)
captive center (p.$210)
cloud computing (p.$216)
community cloud (p.$218)
crowdsourcing (p.$214)
farshoring (p.$220)
full outsourcing (p.$215)
hybrid cloud (p.$218)
insourcing (p.$210)
IT multisourcing (p.$215)
nearshoring (p.$220)
offshoring (p.$219)
onshoring (p.$218)
outsourcing (p.$211)
private clouds (p.$218)
70. public cloud (p.$218)
selective outsourcing (p.$215)
service level agreements
(SLA) (p.$215)
strategic network (p.$224)
c10.indd 225 11/26/2015 6:32:11 PM
226 Information Systems Sourcing
The road to Altia Business Park in San Pedro Sula, Honduras,
is quite memorable. On one side of the road are gated com-
munities with small but neatly maintained stucco houses. On the
other side of the road is a small river with clear running
water. One bank of the river is covered with tightly cramped
shanties. Further down the road towers a 13!story monolith
in black glass. This is the home of Altia Business Park, a
technological park developed by Grupo Karims , a multinational
corporation with core businesses in textiles and real estate and
operations in Asia, North America, Central America, and the
Caribbean. The building is antiseismic and Leed Certi" ed,
which means that it follows green building practices. It is
71. energy
self!suf" cient and connected to North and South America
through three " ber optic submarine cables. The building is the
" rst of two that will comprise the Business Park.
On a recent visit, Corporate Marketing Director Barbara Rivera
guided an American student group through the marbled
halls of the building. She introduced Marcus, who was a
manager in the call center in the building. Marcus explained
that
call center business, especially to North America, was picking
up. He was born and raised in the United States and graduated
from the University of Maryland. Because he could not " nd
work in the United States upon graduation, he moved to Hon-
duras where he has family. Rivera also introduced Lena, a
20!something professional, who spoke to the visiting group in
perfect English, complete with current idioms. Lena had
recently graduated from a university in Honduras with a master
’ s
degree in graphical design. She said this degree was very
helpful in managing the room full of graphic designers working
for
the company that maintains the Web site for Sandal Resorts.
Rivera told the visitors that the average salary of the workers in
72. ! CASE STUDY 10!2 Altia Business Park
large job into microtasks and described the tasks that he needed
to be done on Mechanical Turk. In particular, each worker
was asked to " nd Web pages containing a video and identify the
video ’ s source and location on those pages. The over
one!half million workers that were registered at Mechanical
Turk could read about the tasks and decide if they wanted to
perform them.
Using the crowdsourcing service, the AOL project took less
than a week to get up and running and only a couple of
months to reach completion. The total cost was about as much
as it would have been to hire two temp workers for the same
period.
Maloney was pleased with the cost savings and added, “We had
a very high number of pages we needed to process. Being
able to tap into a scaled work force was massively helpful.” 48
However, he really did not know very much about the workers
who did the work for AOL, and he likely had to make sure that
their work was done correctly.
Critics of crowdsourcing feel it can lead to “digital
sweatshops,” where workers, many of whom may be underage,
73. put
in long hours to generate very little pay and no bene" ts. Some
also believe that crowdsourcing will eliminate full!time jobs.
The crowdsourcing marketplace services counter that they are
trying to register stay!at!home parents or college students
with spare time.
Discussion Questions
1. Is crowdsourcing as used by AOL a form of
outsourcing? Why or why not?
2. What steps do you think Maloney might have taken to
ensure that the crowdsourcing would be a success for the
inventory
project?
3. What factors should be considered when deciding
whether to crowdsource a particular part of a business?
4. Describe the advantages and disadvantages of
crowdsourcing.
Sources: http://aws.amazon.com/mturk (accessed April 17,
2012); Haydn Shaughnessy , “ How to Cut Consulting Costs
by 90% and Keep
74. Your Talent Happy! ” www.forbes.com (accessed April 16,
2012) ; Scott Kirsner , “ My Life as a Micro"Laborer ,“
www.boston.com (accessed
April 1, 2012) ; R. E. Silverman , “ Big Firms Try
Crowdsourcing ,”
http://online.wsj.com/article/SB10001424052970204409004577
157493201863200.
html?mod=djem_jiewr_IT_domainid (accessed November 2,
2011) (accessed January 17, 2012) .
48 R. E. Silverman , “ Big Firms Try Crowdsourcing ”
(January 17, 2012 ),
http://online.wsj.com/article/SB10001424052970204409004577
157493201863200.
html?mod=djem_jiewr_IT_domainid (accessed November 2,
2011) .
c10.indd 226 11/26/2015 6:32:11 PM
http://aws.amazon.com/mturk
http://www.forbes.com
http://www.boston.com
http://online.wsj.com/article/SB10001424052970204409004577
157493201863200.html?mod=djem_jiewr_IT_domainid
http://online.wsj.com/article/SB10001424052970204409004577
75. 157493201863200.html?mod=djem_jiewr_IT_domainid
227
49 The GDP was $4,300 at the time of the case according to
CIA—World Fact Book—Honduras,
https://www.cia.gov/library/publications/the!world!
factbook/geos/ho.html (accessed February 13, 2012); GDP is
now $4,800,
https://www.cia.gov/library/publications/the!world!factbook/ge
os/ho.html
(accessed March 9, 2015); and 65% of the population still live
below the poverty line; see also
http://hondurasoutsourcing.nearshoreamericas.com/.
the companies in the Business Park was $4,800 a year 49 and
people were eager to get the jobs because of the excellent pay in
a country where 65% of the population lives below the poverty
line. The country has a literacy rate of 84.3%, and 47% of the
employable work force is between the ages of 20 and 34, so the
competition for good jobs can be " erce. Honduras actually
has more English speakers as a proportion of population than
the average Central American economy.
76. Discussion Questions
1. Discuss offshoring from the perspective of potential
workers in your country. Discuss offshoring from the
perspective
of potential workers in Honduras.
2. Barbara Rivera is marketing Altia Business Park as a
nearshoring site to companies in North America. What
character-
istics make it a desirable nearshoring site to them?
3. Is this a good idea to market Altia Business Park as a
nearshoring site to people in North America? Why or why not?
Case Study
c10.indd 227 11/26/2015 6:32:11 PM
https://www.cia.gov/library/publications/the%E2%80%90world
%E2%80%90factbook/geos/ho.html
https://www.cia.gov/library/publications/the%E2%80%90world
%E2%80%90factbook/geos/ho.html
https://www.cia.gov/library/publications/the%E2%80%90world
%E2%80%90factbook/geos/ho.html