• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • Tagged with
  • 5
  • 5
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Information Technology Outsourcing and its Risks : supplier lock-in, hidden costs and the loss of control over outsourced IT

Blyth, Domenico January 2008 (has links)
<p>Nowadays, information technology outsourcing (ITO) represents an established business practice in which a considerable number of companies are involved. Since the success of ITO is highly dependent on the exposure to ITO risks, studying the very risks is of great importance. The aim of this thesis consists in revealing the occurrence of specific ITO risks: supplier lock-in, hidden costs and the loss of control over outsourced IT. Further aims of this work are the revelation of measures which can be taken in order to face these risks and of the influences these risks have on backsourcing considerations. The first part of this thesis constitutes the theoretical framework which is based on the review of relevant literature. Within this part of the work, transaction cost theory and resource-based theory are presented and applied for the discussion of the specific ITO risks under consideration. Furthermore, a multidimensional approach is utilized in order to illustrate the various dimensions of ITO. By this means, the identification of situations in which the ITO risks under consideration appear is enabled. The empirical part of this exploratory research is based on a multiple case study. The data necessary for this qualitative research was gathered from telephone interviews conducted with both ITO clients and IT suppliers. The results of this study indicate that the ITO risks under consideration all pose considerable threats to ITO operations and that there are both internal and external measures ITO companies can take in order to face these risks. Furthermore, the risks under discussion influence backsourcing considerations.</p>
2

Information Technology Outsourcing and its Risks : supplier lock-in, hidden costs and the loss of control over outsourced IT

Blyth, Domenico January 2008 (has links)
Nowadays, information technology outsourcing (ITO) represents an established business practice in which a considerable number of companies are involved. Since the success of ITO is highly dependent on the exposure to ITO risks, studying the very risks is of great importance. The aim of this thesis consists in revealing the occurrence of specific ITO risks: supplier lock-in, hidden costs and the loss of control over outsourced IT. Further aims of this work are the revelation of measures which can be taken in order to face these risks and of the influences these risks have on backsourcing considerations. The first part of this thesis constitutes the theoretical framework which is based on the review of relevant literature. Within this part of the work, transaction cost theory and resource-based theory are presented and applied for the discussion of the specific ITO risks under consideration. Furthermore, a multidimensional approach is utilized in order to illustrate the various dimensions of ITO. By this means, the identification of situations in which the ITO risks under consideration appear is enabled. The empirical part of this exploratory research is based on a multiple case study. The data necessary for this qualitative research was gathered from telephone interviews conducted with both ITO clients and IT suppliers. The results of this study indicate that the ITO risks under consideration all pose considerable threats to ITO operations and that there are both internal and external measures ITO companies can take in order to face these risks. Furthermore, the risks under discussion influence backsourcing considerations.
3

RISK ANALYSIS FOR EXPLORING THE OPPORTUNITIES IN CLOUD OUTSOURCING / RISK ANALYSIS FOR EXPLORING THE OPPORTUNITIES IN CLOUD OUTSOURCING

Kommineni, Mohanarajesh, Parvathi, Revanth January 2013 (has links)
Context: Cloud Outsourcing is a new form of outsourcing which is not more under implementation and yet to be implemented. It is a form of outsourcing in which software organizations outsource the work to e-freelancers available throughout the world using cloud services via the Internet. Software organizations handovers the respective task to the cloud and from the cloud e-freelancers undertake the development of task and then return back the finished task to the cloud. Organizations recollect the finished task from the cloud and verify it and then pay to the e-freelancer. Objectives: The aim of this study is to identify the sequence of activities involved during the entire process of cloud outsourcing and to find out the risks which are likely to be occurred during the implementation of this process. To prioritize the elicitated risks according to their probability of occurrence, impact and cost required to mitigate the corresponding risk. Methods: Data is collected by literature review and then the data is synthesized. On the other side interviews with practitioners are conducted to know the activities involved and to find out the risks that are likely to be occurred during the implementation of cloud outsourcing. After this, a survey is conducted in order to prioritize the risks and a standard risk analysis is conducted to know the risks which are likely to be occurred. Literature review is done using four databases including the literature from the year 1990 to till date. Results: Totally we have identified 21 risks that are likely to be occurred and 8 activities so far. By performing risk analysis we have presented the risks, which should be considered first and relevant counter measures are suggested to overcome them. / mr.kommineni@me.com, mr.kommineni1@gmail.com phone no. +919963420123
4

Strategies for Minimizing Defects in Offshore-Outsourced Products

Layen-Layeni, More 01 January 2017 (has links)
Business leaders increasingly grapple with longer and more complex supply chain nodes wrought by the globalization of corporate manufacturing processes. The flow of outsourced materials is also more vulnerable to high-profile product-harm crises, sabotage, product defect, and recall problems. The purpose of this single case study was to explore manufacturing strategies used by business leaders of an original equipment manufacturer (OEM) in the United States to minimize the defects in offshore-outsourced products. The sample was 2 OEM business leaders who have successfully reduced the defects in offshore-manufactured products in their Michigan facility. The conceptual framework was agency theory. Data were collected from observational field notes, company records, and transcripts of open-ended interviews. Data were coded and analyzed to identify emergent themes, which included factors the OEM considered in selecting offshore suppliers, strategies for minimizing defects, validation of the effectiveness of these strategies, and the development of trust and working partnerships with offshore suppliers. Reducing defect risks from outsourced products may decrease catastrophic fatalities and financial repercussions for businesses, and simultaneously improve consumer safety and trust as implications for social change.
5

Information Technology Outsourcing Strategies to Ensure Customer Satisfaction

Rajack, Clyde 01 January 2019 (has links)
Many information technology (IT) outsourcing initiatives fail, resulting in a high impact on business results and customer satisfaction. Without effective strategies, business leaders who outsource their IT services are at considerable risk of failure and stakeholder dissatisfaction. The purpose of this multiple case study was to explore outsourcing strategies that IT managers in Southern Ontario, Canada, used to ensure customer satisfaction. Participants included 9 executives with experience in complex IT outsourcing initiatives. Stakeholder theory and transaction cost economics theory were the conceptual frameworks for the study. Data were gathered using semistructured interviews to query 8 topical areas including IT outsourcing reasons, challenges, and successful solutions. Data analysis using thematic analysis revealed 4 themes: strategic intent for outsourcing, applicable frameworks, risk awareness, and partnership strategies. Key findings included the importance of clients’ and suppliers’ focus on deal principles, innovation, and work-collaboration strategies to enhance performance and customer satisfaction. Information technology managers’ application of the findings of this study may improve business success and contribute to positive social change by revitalizing the clients’ and suppliers’ economies to create job opportunities and improve the quality of lives of employees and their communities.

Page generated in 0.0724 seconds