SlideShare a Scribd company logo
You have been hired as the CSO (Chief Security Officer) for an
organization. Your job is to develop a very brief computer and
internet security policy for the organization that covers the
following areas:
· Computer and email acceptable use policy
· Internet acceptable use policy
Make sure you are sufficiently specific in addressing each area.
There are plenty of security policy and guideline templates
available online for you to use as a reference or for guidance.
Your plan should reflect the business model and corporate
culture of a specific organization that you select.
Include at least 3 scholarly references in addition to the course
textbook. The UC Library is a good place to find these
references. At least two of the references cited need to be peer-
reviewed scholarly journal articles from the library.
Your paper should meet the following requirements:
• Be approximately 2-4 pages in length, not including the
required cover page and reference page.
• Follow APA6 guidelines. Your paper should include an
ABSTRACT, a body with fully developed content, and a
conclusion.
• Support your answers with the readings from the course and at
least three scholarly journal articles to support your positions,
claims, and observations, in addition to your textbook. The UC
Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using
excellent grammar and style techniques. You are being graded
in part on the quality of your writing.
Managing and Using Information Systems:
A Strategic Approach – Sixth Edition
Keri Pearlson, Carol Saunders,
and Dennis Galletta
© Copyright 2016
John Wiley & Sons, Inc.
1
Chapter 10
Information Systems Sourcing
2
© 2016 John Wiley & Sons, Inc.
2
Kellwood Opening Case
Why did Kellwood outsource?
Why did Kellwood decide to backsource after 13 years?
What was the result?
3
© 2016 John Wiley & Sons, Inc.
They wanted to integrate 12 acquisitions with different systems
Kellwood was purchased by Sun Capital Partners. COO wanted
to consolidate to reduce costs and standardize
Result was savings of $3.6 million per year, or 17% of total IS
expenses
3
Sourcing Decision Framework
4
© 2016 John Wiley & Sons, Inc.
Sourcing OptionsInsourcingOutsourcingDomesticDomestic in-
house production
Company produces its
products domestically without any outside contractsDomestic
outsourcing
Company uses services supplied by another domestic-based
companyOffshoreOffshore in-house sourcing
Company uses services supplied by its own foreign-based
affiliate (subsidiary)Offshore outsourcing
Company uses services supplied by an unaffiliated foreign-
based company
Figure 10.3. Different Forms of Sourcing.
(Source: http://www.dbresearch.com/
servlet/reweb2.ReWEB?rwsite=DBR_INTERNET_EN-PROD)
5
© 2016 John Wiley & Sons, Inc.
5
INSOURCING
A firm provides IS services or develops IS in its own in-house
IS organization
6
© 2016 John Wiley & Sons, Inc.
6
IT Outsourcing
With IT, there is equipment and personnel involved
Equipment and facilities are sold to outside vendors
Personnel might be hired by outside vendors
Services are hired from the vendors
Common length of agreement: 10 years
7
© 2016 John Wiley & Sons, Inc.
7
Insourcing DriversInsourcing ChallengesCore competencies
related to systems
Confidentiality or sensitive system components or services
Time available in-house to develop software
Expertise for software development in-houseInadequate support
from top management to acquire needed resources
Temptation from finding a reliable, competent outsourcing
provider
Insourcing drivers and challenges
8
© 2016 John Wiley & Sons, Inc.
8
Economics of Outsourcing
Benefits:
Sell equipment, buildings (large cash inflow)
Downsized payroll – outsourcer hires employees
Costs:
Services provided for a fee
Fixed costs usually over 10-year term
9
© 2016 John Wiley & Sons, Inc.
9
Drivers Disadvantages Offer cost savings
Offer service quality
Ease transition to new technologies
Offer better strategic focus
Provide better mgmt of IS staff
Handle peaks
Consolidate data centers
Infusion of cash Abdication of control
High switching costs
Lack of technological innovation
Loss of strategic advantage
Reliance on outsourcer
Problems with security/confidentiality
Evaporation of cost savings
Drivers and disadvantages of outsourcing
10
© 2016 John Wiley & Sons, Inc.
10
Decisions about How to Outsource
Successfully
Decisions about whether or not to outsource need care and
deliberation.
Requires numerous other decisions about mitigating outsourcing
risks.
Three major decision areas: selection, contracting, and scope.
Selection: find compatible providers
Contracting:
Try for flexible management terms
Try for shorter (3-5 year) contracts
Try for SLAs (service level agreements on performance)
Scope – Determine if full or partial outsourcing
11
© 2016 John Wiley & Sons, Inc.
Offshoring
Short for outsourcing offshore
Definition:
When the MIS organization uses contractor services in a distant
land. (Insourcing offshore would be your own dept offshore)
Substantial potential cost savings through reduced labor costs.
Some countries offer a very well educated labor force.
Implementation of quality standards:
Six Sigma
ISO 9001
12
© 2016 John Wiley & Sons, Inc.
12
Selecting an Offshoring Destination
About 100 countries are now exporting software services and
products.
What makes countries attractive for offshoring?
High English language proficiency.
Countries that are peaceful/politically stable.
Countries with lower crime rates.
Countries with friendly relationships.
Security and/or trade restrictions.
Protects intellectual property
Level of technical infrastructure available.
Good, efficient labor force
Once a country is selected, the particular city in that country
needs to be assessed as well.
13
© 2016 John Wiley & Sons, Inc.
13
Selecting an Offshoring Destination
Countries like India make an entire industry of offshoring.
Software Engineering Institute’s Capability Maturity Model
(CMM).
Level 1: the software development processes are immature,
bordering on chaotic.
Level 5: processes are quite mature, sophisticated, systematic,
reliable
Indian firms are well known for their CMM Level 5 software
development processes, making them desirable
14
© 2016 John Wiley & Sons, Inc.
14
Offshore Destination-
Development Tiers
Carmel and Tjia suggest that there are three tiers of software
exporting nations:
Tier 1: Mature.
United Kingdom, United States, Japan, Germany, France,
Canada, the Netherlands, Sweden, Finland, India, Ireland,
Israel, China, and Russia.
Tier 2: Emerging.
Brazil, Costa Rica, South Korea, and many Eastern European
countries.
Tier 3: Infant.
Cuba, Vietnam, Jordan, and 15 to 25 others.
Tiers: based on industrial maturity, the extent of clustering of
some critical mass of software enterprises, and export revenues.
The higher tiered countries have higher levels of skills and
higher costs.
© 2016 John Wiley & Sons, Inc.
15
15
Farshoring
Definition: sourcing service work to a foreign, lower-wage
country that is relatively far away in distance or time zone.
Client company hopes to benefit from one or more ways:
Big cost savings due to exchange rates, labor costs, government
subsidies, etc.
For the US and UK, India and China are popular
Oddly, India and China also offshore to other locations
16
© 2016 John Wiley & Sons, Inc.
16
Nearshoring
Definition: sourcing service work to a foreign, lower-wage
country that is relatively close in distance or time zone.
Client company hopes to benefit from one or more ways of
being close:
geographically, temporally, culturally, linguistically,
economically, politically or from historical linkages.
Distance and language matter.
There are three major global nearshore clusters:
20 nations around the U.S., and Canada
27 countries around Western Europe
smaller cluster of three countries in East Asia
17
© 2016 John Wiley & Sons, Inc.
17
Captive Centers
An overseas subsidiary that is set up to serve the parent
company.
Alternative to offshoring or nearshoring.
Four major stategies that are being employed:
Hybrid Captive – performs core business processes for parent
company but outsources noncore work to offshore provider
Shared Captive - performs work for both parent company and
external customers.
Divested captive - have a large enough scale and scope that it
could be sold for a profit by the parent company.
Terminated Captive - has been shut down, usually because its
inferior service was hurting the parent company’s reputation.
18
© 2016 John Wiley & Sons, Inc.
18
Backsourcing
When a company takes back in-house, previously outsourced, IS
assets, activities, and skills.
Partial or complete reversal
Many companies have backsourced such as Continental
Airlines, Cable and Wireless, and Halifax Bank of Scotland.
70% of outsourcing clients have had negative experiences and
25% have backsourced.
4% of 70 North American companies would not consider
backsourcing.
19
© 2016 John Wiley & Sons, Inc.
19
Backsourcing Reasons
Mirror reason for outsourcing (to reduce costs, increase quality
of service, etc.)
Costs were higher than expected
Poor service
Change in management
Change in the way IS is perceived within the company
New situations (mergers, acquisitions, etc.)
20
© 2016 John Wiley & Sons, Inc.
20
Crowdsourcing
Definition:
Taking a task traditionally performed by an employee or
contractor, and
Outsourcing it to an undefined, generally large group of people,
In the form of an open call.
Used by companies to increase productivity, lower production
costs, and fill skill gaps.
Can be used for a variety of tasks.
Companies do not have control over the people doing the work.
21
© 2016 John Wiley & Sons, Inc.
21
Partnering Arrangements
Strategic networks: arrangements made with other organizations
to offer synergistic or complementary services
Example: The Mitsui Keiretsu contains over 30 firms spanning
many industries. The members use each others’ services and
don’t compete: Toshiba, Fujifilm, Sony are members
Business ecosystems (see chapter 9): Informal, emerging
relationships
22
© 2016 John Wiley & Sons, Inc.
Deciding Where -
Onshore, Offshore, or in the Cloud?
New option: cloud computing
See chapter 6 for basic definitions; advantages; disadvantages.
Works when outsourcing or insourcing
23
© 2016 John Wiley & Sons, Inc.
Cloud Computing Options
On-premise
Private clouds
Data—managed by the company or offsite by a third party.
Community clouds.
Cloud infrastructure is shared by several organizations
Supports the shared concerns of a specific community.
Public clouds.
Data is stored outside of the corporate data centers
In the cloud provider’s environment
Hybrid clouds
Combination of two or more other clouds.
24
© 2016 John Wiley & Sons, Inc.
Public Clouds - Versions
Infrastructure as a Service (IaaS).
Infrastructure through grids or clusters of virtualized servers,
networks, storage, and systems software.
Designed to augment or replace the functions of an entire data
center.
The customer may have full control of the actual server
configuration.
More risk management control over the data and environment.
Platform as a Service (PaaS).
Virtualized servers
Clients can run existing applications or develop new ones
Provider manages the hardware, operating system, and capacity
Limits the enterprise risk management capabilities.
25
© 2016 John Wiley & Sons, Inc.
Public Clouds - Versions
Software as a Service (SaaS) or Application Service Provider
(ASP).
Software application functionality through a web browser.
The platform and infrastructure are fully managed by the cloud
provider.
If the operating system or underlying service isn’t configured
correctly, the data at the higher application layer may be at risk.
The most widely known and used form of cloud computing.
Some managers shy away from cloud computing because they
are concerned about:
security—specifically about external threats from remote
hackers and security breaches as the data travels to and from the
cloud.
data privacy.
26
© 2016 John Wiley & Sons, Inc.
To manage risk, an SLA needs to spell out these requirements.
26
Managing and Using Information Systems:
A Strategic Approach – Sixth Edition
Keri Pearlson, Carol Saunders,
and Dennis Galletta
© Copyright 2016
John Wiley & Sons, Inc.
Copyright of Fairfield County Business Journal is the property
of Westfair Communications,
Inc. and its content may not be copied or emailed to multiple
sites or posted to a listserv
without the copyright holder's express written permission.
However, users may print,
download, or email articles for individual use.

More Related Content

Similar to You have been hired as the CSO (Chief Security Officer) for an org.docx

Ei Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla RetEi Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla RetLou_Mottola58
 
Ei Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla RetEi Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla RetLou_Mottola58
 
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaperNguyen Hoang
 
FIN 571 Week 6 Individual Signature Assignment
FIN 571 Week 6 Individual Signature AssignmentFIN 571 Week 6 Individual Signature Assignment
FIN 571 Week 6 Individual Signature Assignment
MadekynBailey
 
Outsourcing vs Offshoring
Outsourcing vs OffshoringOutsourcing vs Offshoring
Outsourcing vs Offshoring
Source-A-Tech
 
FIN 571 Individual Signature Assignment
FIN 571 Individual Signature AssignmentFIN 571 Individual Signature Assignment
FIN 571 Individual Signature Assignment
MadekynBailey
 
FIN 571 Individual Signature Assignment
FIN 571 Individual Signature AssignmentFIN 571 Individual Signature Assignment
FIN 571 Individual Signature Assignment
AnaKasts
 
STUDY GUIDE Disney Case on StrategyGoals and Objectiv.docx
STUDY GUIDE  Disney Case on StrategyGoals and Objectiv.docxSTUDY GUIDE  Disney Case on StrategyGoals and Objectiv.docx
STUDY GUIDE Disney Case on StrategyGoals and Objectiv.docx
deanmtaylor1545
 
Service Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxService Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptx
kamlakargadegaonkar2
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6Michael Punzo
 
Right Sourcing South Dakota
Right Sourcing South DakotaRight Sourcing South Dakota
Right Sourcing South DakotaLou_Mottola58
 
Idc successful cloud partners e book
Idc   successful cloud partners e bookIdc   successful cloud partners e book
Idc successful cloud partners e bookJarek Sokolnicki
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
Haashimm
 
Outsourcing and its potential for india
Outsourcing and its potential for indiaOutsourcing and its potential for india
Outsourcing and its potential for india
Jajju12345
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & Offshoring
Ravi Mevcha
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
mybrands2
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
shyaminfopvtltd
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
vernonlopezz
 
KPMG Morning Keynote
KPMG  Morning KeynoteKPMG  Morning Keynote
KPMG Morning Keynote
techcouncil
 

Similar to You have been hired as the CSO (Chief Security Officer) for an org.docx (20)

Ei Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla RetEi Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla Ret
 
Ei Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla RetEi Retirement Right Sourcing Fla Ret
Ei Retirement Right Sourcing Fla Ret
 
Managing risks when offshoring services including a practical indian experie...
Managing risks when offshoring services  including a practical indian experie...Managing risks when offshoring services  including a practical indian experie...
Managing risks when offshoring services including a practical indian experie...
 
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
2 24800 2012_north_american_cloud_contact_center_solutions_whitepaper
 
FIN 571 Week 6 Individual Signature Assignment
FIN 571 Week 6 Individual Signature AssignmentFIN 571 Week 6 Individual Signature Assignment
FIN 571 Week 6 Individual Signature Assignment
 
Outsourcing vs Offshoring
Outsourcing vs OffshoringOutsourcing vs Offshoring
Outsourcing vs Offshoring
 
FIN 571 Individual Signature Assignment
FIN 571 Individual Signature AssignmentFIN 571 Individual Signature Assignment
FIN 571 Individual Signature Assignment
 
FIN 571 Individual Signature Assignment
FIN 571 Individual Signature AssignmentFIN 571 Individual Signature Assignment
FIN 571 Individual Signature Assignment
 
STUDY GUIDE Disney Case on StrategyGoals and Objectiv.docx
STUDY GUIDE  Disney Case on StrategyGoals and Objectiv.docxSTUDY GUIDE  Disney Case on StrategyGoals and Objectiv.docx
STUDY GUIDE Disney Case on StrategyGoals and Objectiv.docx
 
Service Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxService Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptx
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
 
Right Sourcing South Dakota
Right Sourcing South DakotaRight Sourcing South Dakota
Right Sourcing South Dakota
 
Idc successful cloud partners e book
Idc   successful cloud partners e bookIdc   successful cloud partners e book
Idc successful cloud partners e book
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
 
Outsourcing and its potential for india
Outsourcing and its potential for indiaOutsourcing and its potential for india
Outsourcing and its potential for india
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & Offshoring
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
 
Uop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment startUop fin 571 week 6 assignment start
Uop fin 571 week 6 assignment start
 
KPMG Morning Keynote
KPMG  Morning KeynoteKPMG  Morning Keynote
KPMG Morning Keynote
 

More from briancrawford30935

You have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docxYou have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docx
briancrawford30935
 
You have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxYou have been working as a technology associate the information .docx
You have been working as a technology associate the information .docx
briancrawford30935
 
You have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docxYou have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docx
briancrawford30935
 
You have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docxYou have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docx
briancrawford30935
 
You have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docxYou have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docx
briancrawford30935
 
You have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docxYou have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docx
briancrawford30935
 
You have been successful in your application for the position be.docx
You have been successful in your application for the position be.docxYou have been successful in your application for the position be.docx
You have been successful in your application for the position be.docx
briancrawford30935
 
You have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docxYou have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docx
briancrawford30935
 
You have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docxYou have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docx
briancrawford30935
 
You have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docxYou have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docx
briancrawford30935
 
You have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docxYou have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docx
briancrawford30935
 
You have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docxYou have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docx
briancrawford30935
 
You have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docxYou have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docx
briancrawford30935
 
You have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docxYou have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docx
briancrawford30935
 
You have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docxYou have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docx
briancrawford30935
 
You have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docxYou have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docx
briancrawford30935
 
You have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docxYou have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docx
briancrawford30935
 
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docxYou have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
briancrawford30935
 
You have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docxYou have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docx
briancrawford30935
 
You have learned about the Spanish conquest and colonization of the .docx
You have learned about the Spanish conquest and colonization of the .docxYou have learned about the Spanish conquest and colonization of the .docx
You have learned about the Spanish conquest and colonization of the .docx
briancrawford30935
 

More from briancrawford30935 (20)

You have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docxYou have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docx
 
You have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxYou have been working as a technology associate the information .docx
You have been working as a technology associate the information .docx
 
You have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docxYou have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docx
 
You have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docxYou have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docx
 
You have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docxYou have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docx
 
You have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docxYou have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docx
 
You have been successful in your application for the position be.docx
You have been successful in your application for the position be.docxYou have been successful in your application for the position be.docx
You have been successful in your application for the position be.docx
 
You have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docxYou have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docx
 
You have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docxYou have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docx
 
You have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docxYou have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docx
 
You have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docxYou have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docx
 
You have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docxYou have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docx
 
You have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docxYou have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docx
 
You have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docxYou have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docx
 
You have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docxYou have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docx
 
You have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docxYou have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docx
 
You have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docxYou have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docx
 
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docxYou have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
 
You have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docxYou have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docx
 
You have learned about the Spanish conquest and colonization of the .docx
You have learned about the Spanish conquest and colonization of the .docxYou have learned about the Spanish conquest and colonization of the .docx
You have learned about the Spanish conquest and colonization of the .docx
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

You have been hired as the CSO (Chief Security Officer) for an org.docx

  • 1. You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas: · Computer and email acceptable use policy · Internet acceptable use policy Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. Include at least 3 scholarly references in addition to the course textbook. The UC Library is a good place to find these references. At least two of the references cited need to be peer- reviewed scholarly journal articles from the library. Your paper should meet the following requirements: • Be approximately 2-4 pages in length, not including the required cover page and reference page. • Follow APA6 guidelines. Your paper should include an ABSTRACT, a body with fully developed content, and a conclusion. • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. Managing and Using Information Systems: A Strategic Approach – Sixth Edition Keri Pearlson, Carol Saunders,
  • 2. and Dennis Galletta © Copyright 2016 John Wiley & Sons, Inc. 1 Chapter 10 Information Systems Sourcing 2 © 2016 John Wiley & Sons, Inc. 2 Kellwood Opening Case Why did Kellwood outsource? Why did Kellwood decide to backsource after 13 years? What was the result? 3 © 2016 John Wiley & Sons, Inc.
  • 3. They wanted to integrate 12 acquisitions with different systems Kellwood was purchased by Sun Capital Partners. COO wanted to consolidate to reduce costs and standardize Result was savings of $3.6 million per year, or 17% of total IS expenses 3 Sourcing Decision Framework 4 © 2016 John Wiley & Sons, Inc. Sourcing OptionsInsourcingOutsourcingDomesticDomestic in- house production Company produces its products domestically without any outside contractsDomestic outsourcing Company uses services supplied by another domestic-based companyOffshoreOffshore in-house sourcing Company uses services supplied by its own foreign-based affiliate (subsidiary)Offshore outsourcing Company uses services supplied by an unaffiliated foreign- based company Figure 10.3. Different Forms of Sourcing. (Source: http://www.dbresearch.com/ servlet/reweb2.ReWEB?rwsite=DBR_INTERNET_EN-PROD)
  • 4. 5 © 2016 John Wiley & Sons, Inc. 5 INSOURCING A firm provides IS services or develops IS in its own in-house IS organization 6 © 2016 John Wiley & Sons, Inc. 6 IT Outsourcing With IT, there is equipment and personnel involved Equipment and facilities are sold to outside vendors Personnel might be hired by outside vendors Services are hired from the vendors Common length of agreement: 10 years 7 © 2016 John Wiley & Sons, Inc.
  • 5. 7 Insourcing DriversInsourcing ChallengesCore competencies related to systems Confidentiality or sensitive system components or services Time available in-house to develop software Expertise for software development in-houseInadequate support from top management to acquire needed resources Temptation from finding a reliable, competent outsourcing provider Insourcing drivers and challenges 8 © 2016 John Wiley & Sons, Inc. 8 Economics of Outsourcing Benefits: Sell equipment, buildings (large cash inflow) Downsized payroll – outsourcer hires employees Costs: Services provided for a fee Fixed costs usually over 10-year term
  • 6. 9 © 2016 John Wiley & Sons, Inc. 9 Drivers Disadvantages Offer cost savings Offer service quality Ease transition to new technologies Offer better strategic focus Provide better mgmt of IS staff Handle peaks Consolidate data centers Infusion of cash Abdication of control High switching costs Lack of technological innovation Loss of strategic advantage Reliance on outsourcer Problems with security/confidentiality Evaporation of cost savings Drivers and disadvantages of outsourcing 10 © 2016 John Wiley & Sons, Inc. 10
  • 7. Decisions about How to Outsource Successfully Decisions about whether or not to outsource need care and deliberation. Requires numerous other decisions about mitigating outsourcing risks. Three major decision areas: selection, contracting, and scope. Selection: find compatible providers Contracting: Try for flexible management terms Try for shorter (3-5 year) contracts Try for SLAs (service level agreements on performance) Scope – Determine if full or partial outsourcing 11 © 2016 John Wiley & Sons, Inc. Offshoring Short for outsourcing offshore Definition: When the MIS organization uses contractor services in a distant land. (Insourcing offshore would be your own dept offshore) Substantial potential cost savings through reduced labor costs. Some countries offer a very well educated labor force. Implementation of quality standards: Six Sigma ISO 9001 12 © 2016 John Wiley & Sons, Inc.
  • 8. 12 Selecting an Offshoring Destination About 100 countries are now exporting software services and products. What makes countries attractive for offshoring? High English language proficiency. Countries that are peaceful/politically stable. Countries with lower crime rates. Countries with friendly relationships. Security and/or trade restrictions. Protects intellectual property Level of technical infrastructure available. Good, efficient labor force Once a country is selected, the particular city in that country needs to be assessed as well. 13 © 2016 John Wiley & Sons, Inc. 13 Selecting an Offshoring Destination Countries like India make an entire industry of offshoring. Software Engineering Institute’s Capability Maturity Model (CMM).
  • 9. Level 1: the software development processes are immature, bordering on chaotic. Level 5: processes are quite mature, sophisticated, systematic, reliable Indian firms are well known for their CMM Level 5 software development processes, making them desirable 14 © 2016 John Wiley & Sons, Inc. 14 Offshore Destination- Development Tiers Carmel and Tjia suggest that there are three tiers of software exporting nations: Tier 1: Mature. United Kingdom, United States, Japan, Germany, France, Canada, the Netherlands, Sweden, Finland, India, Ireland, Israel, China, and Russia. Tier 2: Emerging. Brazil, Costa Rica, South Korea, and many Eastern European countries. Tier 3: Infant. Cuba, Vietnam, Jordan, and 15 to 25 others. Tiers: based on industrial maturity, the extent of clustering of some critical mass of software enterprises, and export revenues. The higher tiered countries have higher levels of skills and higher costs. © 2016 John Wiley & Sons, Inc.
  • 10. 15 15 Farshoring Definition: sourcing service work to a foreign, lower-wage country that is relatively far away in distance or time zone. Client company hopes to benefit from one or more ways: Big cost savings due to exchange rates, labor costs, government subsidies, etc. For the US and UK, India and China are popular Oddly, India and China also offshore to other locations 16 © 2016 John Wiley & Sons, Inc. 16 Nearshoring Definition: sourcing service work to a foreign, lower-wage country that is relatively close in distance or time zone. Client company hopes to benefit from one or more ways of being close: geographically, temporally, culturally, linguistically, economically, politically or from historical linkages.
  • 11. Distance and language matter. There are three major global nearshore clusters: 20 nations around the U.S., and Canada 27 countries around Western Europe smaller cluster of three countries in East Asia 17 © 2016 John Wiley & Sons, Inc. 17 Captive Centers An overseas subsidiary that is set up to serve the parent company. Alternative to offshoring or nearshoring. Four major stategies that are being employed: Hybrid Captive – performs core business processes for parent company but outsources noncore work to offshore provider Shared Captive - performs work for both parent company and external customers. Divested captive - have a large enough scale and scope that it could be sold for a profit by the parent company. Terminated Captive - has been shut down, usually because its inferior service was hurting the parent company’s reputation. 18 © 2016 John Wiley & Sons, Inc.
  • 12. 18 Backsourcing When a company takes back in-house, previously outsourced, IS assets, activities, and skills. Partial or complete reversal Many companies have backsourced such as Continental Airlines, Cable and Wireless, and Halifax Bank of Scotland. 70% of outsourcing clients have had negative experiences and 25% have backsourced. 4% of 70 North American companies would not consider backsourcing. 19 © 2016 John Wiley & Sons, Inc. 19 Backsourcing Reasons Mirror reason for outsourcing (to reduce costs, increase quality of service, etc.) Costs were higher than expected Poor service Change in management Change in the way IS is perceived within the company New situations (mergers, acquisitions, etc.) 20 © 2016 John Wiley & Sons, Inc.
  • 13. 20 Crowdsourcing Definition: Taking a task traditionally performed by an employee or contractor, and Outsourcing it to an undefined, generally large group of people, In the form of an open call. Used by companies to increase productivity, lower production costs, and fill skill gaps. Can be used for a variety of tasks. Companies do not have control over the people doing the work. 21 © 2016 John Wiley & Sons, Inc. 21 Partnering Arrangements Strategic networks: arrangements made with other organizations to offer synergistic or complementary services Example: The Mitsui Keiretsu contains over 30 firms spanning many industries. The members use each others’ services and don’t compete: Toshiba, Fujifilm, Sony are members Business ecosystems (see chapter 9): Informal, emerging
  • 14. relationships 22 © 2016 John Wiley & Sons, Inc. Deciding Where - Onshore, Offshore, or in the Cloud? New option: cloud computing See chapter 6 for basic definitions; advantages; disadvantages. Works when outsourcing or insourcing 23 © 2016 John Wiley & Sons, Inc. Cloud Computing Options On-premise Private clouds Data—managed by the company or offsite by a third party. Community clouds. Cloud infrastructure is shared by several organizations Supports the shared concerns of a specific community. Public clouds. Data is stored outside of the corporate data centers In the cloud provider’s environment Hybrid clouds Combination of two or more other clouds. 24 © 2016 John Wiley & Sons, Inc.
  • 15. Public Clouds - Versions Infrastructure as a Service (IaaS). Infrastructure through grids or clusters of virtualized servers, networks, storage, and systems software. Designed to augment or replace the functions of an entire data center. The customer may have full control of the actual server configuration. More risk management control over the data and environment. Platform as a Service (PaaS). Virtualized servers Clients can run existing applications or develop new ones Provider manages the hardware, operating system, and capacity Limits the enterprise risk management capabilities. 25 © 2016 John Wiley & Sons, Inc. Public Clouds - Versions Software as a Service (SaaS) or Application Service Provider (ASP). Software application functionality through a web browser. The platform and infrastructure are fully managed by the cloud provider.
  • 16. If the operating system or underlying service isn’t configured correctly, the data at the higher application layer may be at risk. The most widely known and used form of cloud computing. Some managers shy away from cloud computing because they are concerned about: security—specifically about external threats from remote hackers and security breaches as the data travels to and from the cloud. data privacy. 26 © 2016 John Wiley & Sons, Inc. To manage risk, an SLA needs to spell out these requirements. 26 Managing and Using Information Systems: A Strategic Approach – Sixth Edition Keri Pearlson, Carol Saunders, and Dennis Galletta © Copyright 2016 John Wiley & Sons, Inc.
  • 17. Copyright of Fairfield County Business Journal is the property of Westfair Communications, Inc. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.