Mgs Presentation Slides on-Sole- supplier relationship between Small size client and medium size vendor in domestic outsourcing- case study of a Chinese firm
This document provides information about an upcoming conference on digital forensics and cyber security, including the date, location, registration details, and key topics to be addressed. The conference will bring together practitioners and researchers from various fields related to digital forensics and cybersecurity. Some of the main topics to be covered include the usage of machine learning in digital forensics, handling digital evidence and network forensics, and standardized forensic processes. The conference aims to discuss approaches for securing data and digital investigations. It will provide opportunities for business and intellectual engagement among attendees.
"Risk Management in Open Finance Era" 26-12-2020Varlam Ebanoidze
"Risk Management in Open Finance Era"
This presentation on "Risk Management in Open Finance Era" is an attempt to visualize a New Operational Risk & Information Security strategies through industry development lenses, and simultaneously to "Zoom" into the details of operations, threats, and technical enablers for sound risk management to FIT the new paradigm of 'Open Finance'.
For example: to ensure a #ZeroTrust’ strategy and #ComposableArchitectures or even help the business to accelerate by ‘Capitalizing’ on Risk Data Value Chain and on #DifferentialPrivacy.
#RiskTech 4 #FinTech
NFC and consumers - Success factors and limitations in retail business - Flor...Florian Resatsch
Shown at the WIMA 2007 in Monaco, this presentation covers ideas and discussions around frequencies for retail business. Consumer applications with NFC are also discussed.
Nowak & Grantham _ The virtual incubator managing human capital in the softwa...Vasily Ryzhonkov
In a knowledge-based economy, the creation of wealth becomes synonymous with creating products and services with large software content. However, despite a few major players, the software industry as a whole is fragmented and consists mainly of small, niche market entrepreneurial ventures. The authors study the California software industry to characterize the major barriers to success for these ventures. Simultaneously, a fundamental shift of software technology to a component-based development paradigm will reinforce the industry’s fragmented nature by fuelling a third party, independent software component economy. Coupled with the globalization of the IT industry in general, the need for startups and small companies
to form strategic partnerships will become increasingly critical to their ability to create wealth. In recent years, innovative public–private partnerships have attempted to assist startups by addressing their lack of physical resources or capital. This is best illustrated by the dramatic growth of incubators and regional capital networks. In this paper, the authors propose a ‘‘ virtual incubator’’ model to facilitate startup success and business network formation, shifting the focus to the ‘‘ virtual
value chain’’ and to connecting startups with business expertise and strategic partners in the marketplace. The authors provide a theoretical basis for the model and its implementation, important to potential investors in virtual incubators.
How can data empower next generation FinTech and eCommerce?Charles Mok
This document discusses how data and new technologies can empower next-generation FinTech and eCommerce. It outlines how companies in these sectors are using big data, predictive analytics, personalized recommendations, and other innovations to improve customer experiences and outcomes. The document argues that Hong Kong has strong potential for FinTech and eCommerce success if it fosters effective competition, supports a regulatory sandbox, and adopts holistic policies around areas like talent, infrastructure, data access, and innovation-friendly regulations.
DutchMLSchool 2022 - Multi Perspective AnomaliesBigML, Inc
Multi Perspective Anomalies, by Jan W Veldsink, Master in the art of AI at Nyenrode, Rabobank, and Grio.
*Machine Learning School in The Netherlands 2022.
This document provides information about an upcoming conference on digital forensics and cyber security, including the date, location, registration details, and key topics to be addressed. The conference will bring together practitioners and researchers from various fields related to digital forensics and cybersecurity. Some of the main topics to be covered include the usage of machine learning in digital forensics, handling digital evidence and network forensics, and standardized forensic processes. The conference aims to discuss approaches for securing data and digital investigations. It will provide opportunities for business and intellectual engagement among attendees.
"Risk Management in Open Finance Era" 26-12-2020Varlam Ebanoidze
"Risk Management in Open Finance Era"
This presentation on "Risk Management in Open Finance Era" is an attempt to visualize a New Operational Risk & Information Security strategies through industry development lenses, and simultaneously to "Zoom" into the details of operations, threats, and technical enablers for sound risk management to FIT the new paradigm of 'Open Finance'.
For example: to ensure a #ZeroTrust’ strategy and #ComposableArchitectures or even help the business to accelerate by ‘Capitalizing’ on Risk Data Value Chain and on #DifferentialPrivacy.
#RiskTech 4 #FinTech
NFC and consumers - Success factors and limitations in retail business - Flor...Florian Resatsch
Shown at the WIMA 2007 in Monaco, this presentation covers ideas and discussions around frequencies for retail business. Consumer applications with NFC are also discussed.
Nowak & Grantham _ The virtual incubator managing human capital in the softwa...Vasily Ryzhonkov
In a knowledge-based economy, the creation of wealth becomes synonymous with creating products and services with large software content. However, despite a few major players, the software industry as a whole is fragmented and consists mainly of small, niche market entrepreneurial ventures. The authors study the California software industry to characterize the major barriers to success for these ventures. Simultaneously, a fundamental shift of software technology to a component-based development paradigm will reinforce the industry’s fragmented nature by fuelling a third party, independent software component economy. Coupled with the globalization of the IT industry in general, the need for startups and small companies
to form strategic partnerships will become increasingly critical to their ability to create wealth. In recent years, innovative public–private partnerships have attempted to assist startups by addressing their lack of physical resources or capital. This is best illustrated by the dramatic growth of incubators and regional capital networks. In this paper, the authors propose a ‘‘ virtual incubator’’ model to facilitate startup success and business network formation, shifting the focus to the ‘‘ virtual
value chain’’ and to connecting startups with business expertise and strategic partners in the marketplace. The authors provide a theoretical basis for the model and its implementation, important to potential investors in virtual incubators.
How can data empower next generation FinTech and eCommerce?Charles Mok
This document discusses how data and new technologies can empower next-generation FinTech and eCommerce. It outlines how companies in these sectors are using big data, predictive analytics, personalized recommendations, and other innovations to improve customer experiences and outcomes. The document argues that Hong Kong has strong potential for FinTech and eCommerce success if it fosters effective competition, supports a regulatory sandbox, and adopts holistic policies around areas like talent, infrastructure, data access, and innovation-friendly regulations.
DutchMLSchool 2022 - Multi Perspective AnomaliesBigML, Inc
Multi Perspective Anomalies, by Jan W Veldsink, Master in the art of AI at Nyenrode, Rabobank, and Grio.
*Machine Learning School in The Netherlands 2022.
AI in Finance, background material of Aalto Fintech Seminar, fall 2019Ruth Kaila
The document discusses how artificial intelligence and big data are impacting the financial services sector. Key points include:
- Digital technologies like blockchain, big data analytics, machine learning and AI are presenting both challenges and opportunities for financial institutions.
- Fintech startups and large tech companies are challenging traditional banks and financial firms. According to a PwC report, financial services could lose up to 40% of revenue to fintech.
- AI and machine learning can be applied across the financial sector in areas like customer interfaces, internal operations, financial markets, and regulation/surveillance. Examples given include chatbots, robo-advisers, credit decisions, fraud detection, and asset allocation.
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
A wide spectrum of cybersecurity and open source security news in this week’s Open Source Insight, including the need for hospitals to ramp up their cybersecurity efforts; the need to include open source security in any plan to secure medical devices; a major data breach at Italian bank Unicredit; two Black Duck executives share their views on open source security in video interviews; and why the automotive industry many be close to an iPhone moment.
Citizen centric digital and mobile-identity, personal data ecosystems and the...Dr Rachel O'Connell
This document summarizes a presentation by Dr. Rachel O'Connell on assessing security issues related to emerging digital identity, personal data, and internet of things ecosystems. She discusses how these systems are converging and creating new commercial opportunities but also pushing legal, security, and regulatory discussions into new areas. Some key points are: (1) these nascent ecosystems evolving at different rates could introduce diverse new threat vectors; (2) a siloed development approach creates perception issues that need addressing; (3) interactions between citizen-centric and machine-to-machine systems may require the most oversight. International rules may also be needed to govern cybersecurity threats and warfare in these interconnected new domains.
The document discusses four emerging trends:
1. The nature of success is changing as individuals have greater reach and influence due to the internet.
2. The digital world is expanding through the internet of things (IoT) and connectivity of everyday objects.
3. Power structures are shifting as IoT allows seamless data sharing across networks in a way that decentralizes control.
4. Business models must change and become more transparent as IoT enables real-time data sharing between companies and customers.
The document also summarizes efforts to involve citizens in co-creating IoT solutions through workshops in various cities to help design use cases that meet user needs and address issues of privacy, security and ethics.
The dynamic synergy between data analytics and cognitive process automation embodies the very essence of data-driven decision-making. In this latest piece from the E42 Blog, we dive deep into the very synergy that has firmly established itself as the bedrock of modern business strategy, ushering in precision, efficiency, and growth for enterprises.
This document discusses how blockchain technologies can benefit marketing and advertising. It provides examples of how blockchain is being used to address issues with digital advertising fraud and transparency. One collaboration uses blockchain to reduce reconciliation times and provide closer to real-time campaign data. Another partners media companies with IBM's blockchain to increase financial transparency in media buying. A third case discusses American Express using Hyperledger's blockchain to make its loyalty program more flexible by allowing merchants more control over rewards offers. The document promotes blockchain as a way to increase trust and market opportunities for marketers.
Semantics and ontologies for smart cities liliana ibeth barbosa santillanibeth06
The document discusses two ontology models: OntoDeviceTrust and OntoVehiclesTheft. OntoDeviceTrust aims to structure trust between mobile device users and application producers through a model composed of twelve ontologies across producer and consumer applications. It defines concepts like certificates and relationships to evaluate safety. OntoVehiclesTheft seeks to reduce auto theft rates through an application providing citizen information and domain-independent ontologies to support auto theft data in a social environment. Both models aim to integrate knowledge and reuse features to support their domains.
Tijdens de vierde sessie van de vierdelige reeks Master Minds on Data Science hield Eric van Tol een presentatie over businesscases en verdienmodellen.
Event report from Cyber Security roundtable discussions held in 5 cities. Manila on 31August 2016, Jakarta 6 October 2016, Kuala Lumpur 21 October 2016, Singapore 27 October 2016 and Hong Kong 11 November 2016. Organised by CIO Academy Asia and its partner Fortinet.
From the conference Future Tech in Insurance at Forsikringsakademiet, nov 15 2016. Defining cognitive and how that is relevant for insurance companies.
Unlocking Value of Data in a Digital AgeRuud Brink
InfoGraphic about Intelligence Hubs as accelerator of the Digital organisation. Five steps how you could think big, and act small to unlock value of Data in your organisation. Contact me for the office A0 poster.
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
CryptoLocker was a ransomware trojan which targeted computers running Microsoft Windows and was first observed by Dell SecureWorks in September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message, which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin
Explore the new 2014 TorrentLocker and get inside his C&C server
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
While progress has been made in cybersecurity education, reducing spam, and increasing secure online transactions and incident response capabilities, international cooperation remains fragmented and several challenges remain. Key ongoing challenges include the evolution of technologies and applications, weaknesses in user authentication like passwords, securing the growing Internet of Things, improving detection and response to cyber incidents, developing metrics to measure cybersecurity effectiveness, issues with cloud computing, ensuring child online safety, strengthening the capabilities of national CERT teams, and having more countries develop national cybersecurity strategies. Addressing these challenges will be important for continuing to build confidence and security in ICT use globally.
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketEMC
This Frost & Sullivan report examines the proliferation of identity theft and data breaches caused by single-factor authentication or weak passwords, and describes how, to decrease the impact of threats, companies are integrating mobile OTP, OTP tokens, and USB tokens to protect network access and end users.
By applying wireless sensor technology to humanitarian issues, social enterprises can help address global development challenges and replicate solutions across many issues. However, inadequate human and technical capacity as well as barriers to consumer adoption limit the use of wireless sensor networks in social enterprises. Ultimately, a lack of investment is the biggest barrier to using big data and wireless sensor technologies to help social enterprises and developing nations.
Big data and wireless sensor technologies can help social enterprises address global development challenges by providing real-time information. However, barriers like inadequate technical capacity and high sensor costs limit their adoption. Creating easy-to-use systems and lowering costs is needed to realize big data's potential to empower social enterprises and improve lives in the developing world.
1. Smart cards are credit card sized cards with embedded integrated chips that act as security tokens. They connect to readers through direct contact or wireless technologies like RFID.
2. Smart cards have various applications including use in telecommunications, identification, government, financial, healthcare, loyalty programs, and transportation.
3. Business intelligence refers to collecting, storing, and analyzing business data to inform management decisions. It includes tools like spreadsheets, reporting software, data visualization, data mining, and online analytical processing.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
AI in Finance, background material of Aalto Fintech Seminar, fall 2019Ruth Kaila
The document discusses how artificial intelligence and big data are impacting the financial services sector. Key points include:
- Digital technologies like blockchain, big data analytics, machine learning and AI are presenting both challenges and opportunities for financial institutions.
- Fintech startups and large tech companies are challenging traditional banks and financial firms. According to a PwC report, financial services could lose up to 40% of revenue to fintech.
- AI and machine learning can be applied across the financial sector in areas like customer interfaces, internal operations, financial markets, and regulation/surveillance. Examples given include chatbots, robo-advisers, credit decisions, fraud detection, and asset allocation.
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
A wide spectrum of cybersecurity and open source security news in this week’s Open Source Insight, including the need for hospitals to ramp up their cybersecurity efforts; the need to include open source security in any plan to secure medical devices; a major data breach at Italian bank Unicredit; two Black Duck executives share their views on open source security in video interviews; and why the automotive industry many be close to an iPhone moment.
Citizen centric digital and mobile-identity, personal data ecosystems and the...Dr Rachel O'Connell
This document summarizes a presentation by Dr. Rachel O'Connell on assessing security issues related to emerging digital identity, personal data, and internet of things ecosystems. She discusses how these systems are converging and creating new commercial opportunities but also pushing legal, security, and regulatory discussions into new areas. Some key points are: (1) these nascent ecosystems evolving at different rates could introduce diverse new threat vectors; (2) a siloed development approach creates perception issues that need addressing; (3) interactions between citizen-centric and machine-to-machine systems may require the most oversight. International rules may also be needed to govern cybersecurity threats and warfare in these interconnected new domains.
The document discusses four emerging trends:
1. The nature of success is changing as individuals have greater reach and influence due to the internet.
2. The digital world is expanding through the internet of things (IoT) and connectivity of everyday objects.
3. Power structures are shifting as IoT allows seamless data sharing across networks in a way that decentralizes control.
4. Business models must change and become more transparent as IoT enables real-time data sharing between companies and customers.
The document also summarizes efforts to involve citizens in co-creating IoT solutions through workshops in various cities to help design use cases that meet user needs and address issues of privacy, security and ethics.
The dynamic synergy between data analytics and cognitive process automation embodies the very essence of data-driven decision-making. In this latest piece from the E42 Blog, we dive deep into the very synergy that has firmly established itself as the bedrock of modern business strategy, ushering in precision, efficiency, and growth for enterprises.
This document discusses how blockchain technologies can benefit marketing and advertising. It provides examples of how blockchain is being used to address issues with digital advertising fraud and transparency. One collaboration uses blockchain to reduce reconciliation times and provide closer to real-time campaign data. Another partners media companies with IBM's blockchain to increase financial transparency in media buying. A third case discusses American Express using Hyperledger's blockchain to make its loyalty program more flexible by allowing merchants more control over rewards offers. The document promotes blockchain as a way to increase trust and market opportunities for marketers.
Semantics and ontologies for smart cities liliana ibeth barbosa santillanibeth06
The document discusses two ontology models: OntoDeviceTrust and OntoVehiclesTheft. OntoDeviceTrust aims to structure trust between mobile device users and application producers through a model composed of twelve ontologies across producer and consumer applications. It defines concepts like certificates and relationships to evaluate safety. OntoVehiclesTheft seeks to reduce auto theft rates through an application providing citizen information and domain-independent ontologies to support auto theft data in a social environment. Both models aim to integrate knowledge and reuse features to support their domains.
Tijdens de vierde sessie van de vierdelige reeks Master Minds on Data Science hield Eric van Tol een presentatie over businesscases en verdienmodellen.
Event report from Cyber Security roundtable discussions held in 5 cities. Manila on 31August 2016, Jakarta 6 October 2016, Kuala Lumpur 21 October 2016, Singapore 27 October 2016 and Hong Kong 11 November 2016. Organised by CIO Academy Asia and its partner Fortinet.
From the conference Future Tech in Insurance at Forsikringsakademiet, nov 15 2016. Defining cognitive and how that is relevant for insurance companies.
Unlocking Value of Data in a Digital AgeRuud Brink
InfoGraphic about Intelligence Hubs as accelerator of the Digital organisation. Five steps how you could think big, and act small to unlock value of Data in your organisation. Contact me for the office A0 poster.
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
CryptoLocker was a ransomware trojan which targeted computers running Microsoft Windows and was first observed by Dell SecureWorks in September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message, which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin
Explore the new 2014 TorrentLocker and get inside his C&C server
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
While progress has been made in cybersecurity education, reducing spam, and increasing secure online transactions and incident response capabilities, international cooperation remains fragmented and several challenges remain. Key ongoing challenges include the evolution of technologies and applications, weaknesses in user authentication like passwords, securing the growing Internet of Things, improving detection and response to cyber incidents, developing metrics to measure cybersecurity effectiveness, issues with cloud computing, ensuring child online safety, strengthening the capabilities of national CERT teams, and having more countries develop national cybersecurity strategies. Addressing these challenges will be important for continuing to build confidence and security in ICT use globally.
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketEMC
This Frost & Sullivan report examines the proliferation of identity theft and data breaches caused by single-factor authentication or weak passwords, and describes how, to decrease the impact of threats, companies are integrating mobile OTP, OTP tokens, and USB tokens to protect network access and end users.
By applying wireless sensor technology to humanitarian issues, social enterprises can help address global development challenges and replicate solutions across many issues. However, inadequate human and technical capacity as well as barriers to consumer adoption limit the use of wireless sensor networks in social enterprises. Ultimately, a lack of investment is the biggest barrier to using big data and wireless sensor technologies to help social enterprises and developing nations.
Big data and wireless sensor technologies can help social enterprises address global development challenges by providing real-time information. However, barriers like inadequate technical capacity and high sensor costs limit their adoption. Creating easy-to-use systems and lowering costs is needed to realize big data's potential to empower social enterprises and improve lives in the developing world.
1. Smart cards are credit card sized cards with embedded integrated chips that act as security tokens. They connect to readers through direct contact or wireless technologies like RFID.
2. Smart cards have various applications including use in telecommunications, identification, government, financial, healthcare, loyalty programs, and transportation.
3. Business intelligence refers to collecting, storing, and analyzing business data to inform management decisions. It includes tools like spreadsheets, reporting software, data visualization, data mining, and online analytical processing.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
1. SOLE-SPPLIER RELATIONSHIP
BETWEEN SMALL SIZE CLIENT AND
MEDIUM SIZE VENDOR IN DOMESTIC
OUTSOURCING- CASE STUDY OF A
CHINESE FIRM
BY: LINLIN ZHANG, FATIMAH AL HALAL, VISHAL ADITHIYA
Course: MIS40690: Managing Global Sourcing
2. o Small
o Telecom Industry
o Reason For Outsourcing
Knowledge Gap
Reduce Cost
o Medium size
o Software Industry
o Motivation to be vendor
Marketing
Next contract
ABOUT THE COMPANIES
Client (Smart Telecom) Vendor (hsoft)
3. ABOUT THE PROJECT: SMART BUILDING
Smart Building Software Project Integration
o Security System
o Alarm System
o Building Automation System
o Communication System
Smart
building
Alarm
Building OA
communication
security
4. AUTOETHNOGRAPHY METHODOLOGY: A SELF REFLECTIVE METHOD
Used Autoethnography research methodology . A genre of writing and research that displays multiple layers of
consciousness, connecting the personal experience working in the client firm.
DATA SOURCE
o SELF-OBSERVATIONAL DATA
o Chronicle events close to the actual happening through observing the self in situation.
SELF-REFLECTIVE DATA
o Maintain a detailed critically reflexive journal of thoughts and experience.
5. o Kick-off and requirements definition
o Market research and First vendor filtering
o Interview,
o Request for Proposal
o Evaluate responses
o Proof of Concept
o Select vendor
o Conference
o Time management: schedule of two
companies
o HR management
o Budget management
o Communication management
Vendor Selection Process and Management Control Stages
Vendor Selection Process Client Took Control of Management Stages
7. ANALYSIS
oDiversity
oClient’ Role
oSmall client VS Medium Size Vendor
oTop Level Concern
oMotivation for Cooperation
oGuanxi method
oSupplier selection processes in china
oSole supplier relationship in domestic outsourcing
oLimitations on Self reflective Methodology