19,159 research outputs found

    MAKE-OR-BUY THEORIES: WHERE DO WE STAND?

    Get PDF
    The aim of this paper is to discuss the state-of-the art and the directions for research on the make-orbuy problem. After thirty years of research efforts, we now have numerous contributions explaining different aspects of the nature and existence of the firm. The search for a unified theory, however, still remains, at a theoretical level, a challenge. The task is not easy, perhaps because the theory of the firm develops along two different strands, one analyzing the factors influencing the boundaries, and the other one relating to the internal structure; or because, even inside the same research strand, it is not really easy to grasp the similarities and differences between contributions that have followed one another in rapid succession over the last few years. This paper examines the theories concerning the make-or-buy problem, focusing on recent contributions that have tried to develop a unified framework and emphasizes the role of incomplete contracts as a common and significant trait of the theories discussed

    A Resource-Based Analysis of IT Oursourcing

    Get PDF
    This paper studies the relationships between the choice of a sourcing mode for information systems, the value of the resources used in systems development activities and the presence of those resources at sufficient level within the firm. The objective is to better understand the factors underlying the decision to keep the development of an information system inside the firm or to entrust it to an outside partner. A sourcing model is proposed using the resource-based theory. A case study is used to illustrate the concepts used in the research model. Data from this case illustrate how the model could be used to predict the appropriate sourcing mode, given the availability of the necessary resources and their strategic value. Ce document étudie les liens entre le choix d'un mode de gestion (interne ou impartition) et la valeur stratégique des ressources utilisées pour la conduite de l'activité évaluée. Les éléments de base de l'approche des ressources sont présentés et un modÚle d'approvisionnement est dérivé de cette approche. Un cas est utilisé pour illustrer les concepts.Resource-based theory, software development, outsourcing, management of software development projects, Théorie fondée sur les compétences, développement de logiciels, impartition, gestion de projets de développement de systÚmes

    A Systematic Approach to Optimise Management in Global Sourcing Relationships

    Get PDF
    Despite a large number of studies, global IT sourcing projects are, in practice, performed ad-hoc and rely mostly on the manager’s experience. Outsourcing software development presents extra challenges because development is performed in an inter-organisational network. Although organisations collaborate by transferring knowledge from the customer to the vendor (e.g., requirements) and from the vendor to the client (e.g., product and status reports), each has its own interests and needs; which often conflict. Tacit requirements, conflicting interests and knowledge-domain gaps contribute to generate final solutions that cost more in terms of resources than what was originally planned or that do not help customers to meet their ambitions. In this work we propose eStudio, our semi-automatic quantitative-data based framework to provide guidance to reason about obstacles in, for instance, knowledge co-ordination

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp

    A comparative Test of the Efficiency, focus and Learning Perspectives of Outsourcing

    Get PDF
    Despite the fact that vertical integration has been a key question of management studies for more than fifty years, we still do not have a unified, coherent view of outsourcing. In particular, multiple theoretical perspectives such as transaction cost economics, industrial organization, and strategy, could explain the outsourcing decision, but the implications of these different streams have neither been theoretically integrated, nor tested simultaneously. In an attempt to disentangle the various causes of outsourcing, we suggest three different rationales for outsourcing: cost reduction, focusing on core capabilities and importing knowledge into the firm. We develop several hypotheses, which we then test on secondary data on French small- and medium-sized enterprises. Results indicate that the learning rationale appears to be the strongest factor influencing the outsourcing decision. Some performance implications of this rationale are also suggested and tested.outsourcing; transaction cost economics; resource-based view; knowledge-based view

    Environmental Sustainability in Information Technologies Governance

    Get PDF
    [Abstract] In the present day, many risk factors affect the continuity of a business. However, this situation produces a conducive atmosphere to approach alternatives that relieve this situation for organizations. Within these alternatives, environmental sustainability (ES) and information technologies governance (IT governance or ITG) stand out. Both alternatives allow organizations to address intrinsically common issues such as strategic alignment, generation of value, mechanisms for performance improvement, risk management and resource management. This article focuses on the fusion of both alternatives, determining to what extent current ITG models consider ES issues. With this purpose, the strategy followed was firstly to identify the relevant factors of ES present in the main approaches of the domain (ISO14001, GRI G4, EMAS, SGE21 and ISO26000). As a result, we identified 27 activities and 103 sub-activities of ES. Next, as the second main objective, we determined which of those factors are present in the main current ITG approaches (COBIT5, ISO38500 and WEILL & ROSS). Finally, we concluded through a quantitative study that COBIT5 is the most sustainable (i.e., the one that incorporates more ES issues) ITG approach
    • 

    corecore