5,246 research outputs found

    Critical Issues of IT Outsourcing Vendors in India

    Get PDF
    Global outsourcing of IT and IT-enabled services (ITES) has now become an accepted corporate strategy of a vast majority of firms around the world. The functions being offshored have increased in scope and magnitude and have climbed the value chain ladder. However, the literature has overwhelmingly focused on client-centric issues to the neglect of vendor concerns. There is a rich tradition of ranking critical issues confronting Information Systems executives, and some studies have even explored critical issues of outsourcing clients. These rankings have significant implications for both researchers and practitioners. Our study focuses on the nascent area of IT outsourcing vendors. We examine the issues from the standpoint of IT outsourcing vendors in India, currently the primary destination for IT offshoring. The results suggest that for the Indian vendors, the most critical issues are not related to cultural, language, and time-zone differences as suggested in many writings. Rather, the most critical concerns are issues dealing with work arrangements and relationships with the client, and issues related to the client’s organizational readiness for offshoring. Clearly the understanding of such issues is important to the vendors, but also to the clients in order to maintain an effective dyadic relationship

    Critical Issues in EHR Implementation: Provider and Vendor Perspectives

    Get PDF
    Stakeholders, both internal and external, can have differing and sometimes conflicting perspectives and priorities even though each has a vested interest in organizational success. Using the lens of stakeholder theory, we examine the differing views of stakeholders (namely, medical providers and vendors) in the implementation of electronic health record (EHR) systems. The implementation process itself can be broken down into three phases: pre-implementation, during implementation, and post-implementation. After determining a comprehensive set of seventeen key issues relevant to each phase, we discovered that there are significant differences in the perceptions of EHR vendors and their customers in terms of which issues in each phase of an EHR implementation are most important. These findings indicate that vendors tend to underestimate the role of nursing staff and that providers tend to underestimate the role of security. Both groups, however, agree that physician support throughout the implementation is essential for success

    Critical Issues of IT Outsourcing Vendors in India

    Get PDF
    Global outsourcing of IT and IT-enabled services (ITES) has now become an accepted corporate strategy of a vast majority of firms around the world. The functions being offshored have increased in scope and magnitude and have climbed the value chain ladder. However, the literature has overwhelmingly focused on client-centric issues to the neglect of vendor concerns. There is a rich tradition of ranking critical issues confronting Information Systems executives, and some studies have even explored critical issues of outsourcing clients. These rankings have significant implications for both researchers and practitioners. Our study focuses on the nascent area of IT outsourcing vendors. We examine the issues from the standpoint of IT outsourcing vendors in India, currently the primary destination for IT offshoring. The results suggest that for the Indian vendors, the most critical issues are not related to cultural, language, and time-zone differences as suggested in many writings. Rather, the most critical concerns are issues dealing with work arrangements and relationships with the client, and issues related to the client’s organizational readiness for offshoring. Clearly the understanding of such issues is important to the vendors, but also to the clients in order to maintain an effective dyadic relationship

    Internet of things security implementation using blockchain for wireless technology

    Get PDF
    Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin

    Client’s Readiness Assessment Success Factors for Outsourcing Software Projects

    Get PDF
    IT services such as software development, application maintenance, disaster recovery, help desk, network and operations are critical and highly demanded to better support the operations and management of organizations, especially in the government sector. The government sector faces various problems in providing IT services due to constraints or lack of knowledge, skills and expertise, human resource and technology. Thus, IT services need to be outsourced to overcome these problems. While the need for outsourcing has increased, reported weaknesses of the outsourcing activities are attributed to issues such as project rationale and the unclear role of the project team, lack of involvement of subject matter experts and users in the early stages, lack of control and lack of emphasis on quality. These issues indicate the low readiness level of the client’s organization to take up outsourcing activities. Therefore, this study aims to analyze the contributing readiness factors that clients should comply with in order to ensure the success of outsourcing software projects. Systematic reviews and content analysis were employed in order to propose a conceptual model. There are 27 factors identified and classified into 9 dimensions.  There are six internal dimensions were identified as contributing to the client’s readiness such as strategy, people, organization culture, process, technology and management whilst three other external dimensions include the government, market and people. The outcome of this study is a software outsourcing readiness model that will assist software practitioners in designing effective outsourcing software project strategies. The model is important since the agencies have difficulty in addressing their readiness level as part of the implementation plan and to avoid project failure

    Towards a unified model for successful implementation of outsourcing and reversibility of information systems

    Get PDF
    AbstractOutsourcing information systems services is considered a strategic decision for many organizations because it is a risky endeavor. When issues arise during the outsourcing process, many organizations tend to switch their operations from external vendors back to in-house, i.e., implement reversibility or back-sourcing. There is evidence of sufficient scale to warrant further attention to the reversibility process due to the increased failure of outsourcing projects. One of the main goals of this paper is to provide a conceptual framework that can help implement both outsourcing and reversibility projects successfully. In addition to the risks associated with the outsourcing process, most researches focus on the outsourcing process after the relationship between the vendor and the organization is established, while the activities related to pre-outsourcing and post-outsourcing stages are neglected or given little concern. Another objective of this work is to integrate the outsourcing phase with the pre and post outsourcing phases. This paper also aims to identify the critical factors affecting the outsourcing and reversibility processes, thereby dealing with the outsourcing risks from the beginning rather than as an afterthought

    Control, Process Facilitation, and Requirements Change in Offshore Requirements Analysis: The Provider Perspective

    Get PDF
    Process, technology, and project factors have been increasingly driving organizations to offshore early software development phases, such as requirements analysis. This emerging trend necessitates greater control and process facilitation between client and vendor sites. The effectiveness of control and facilitation has, however, not been examined within the context of requirements analysis and change. In this study, we examine the role of control and facilitation in managing changing requirements and on success of requirements gathering in the Indian offshore software development environment. Firms found that control by client-site coordinators had a positive impact on requirements analysis success while vender site-coordinators did not have similar influence. Process facilitation by client site-coordinators affected requirements phase success indirectly through control. The study concludes with recommendations for research and practice

    SME and NPO readiness for adopting software-as-a-service in developing countries

    Get PDF
    Includes abstract.Includes bibliographical references.This research aims to study [Software-as-a-Service] SaaS readiness and adoption in South Africa. South Africa is an emerging economy, but it has the qualities of both an emerging and a developing country. The telecommunications infrastructure in particular has the qualities of a developing country. This study focuses on small to medium sized organisations, comprising both enterprises and non-profit organisations. Molla and Licker's (2005a) Perceived E-Readiness Model (PERM) is adapted and used to study SaaS readiness and adoption. Important SaaS multi-theoretical factors were added to the PERM to increase the rigorousness of the model
    • 

    corecore