58 research outputs found

    Intellectual risk management in projects of transportation of large vehicles by the game theory

    Get PDF
    Показано, що транспортування великогабаритних вантажів є проектом, в якому команда останнього постійно стикається із інтелектуальними ризиками протидії оточуючого середовища у вигляді субпідрядників (шляховиків, електриків, автоінспекції, тощо) виконанню окремих етапів проекту. Управління цими ризиками містить різні форми співпраці із субпідрядниками, – від об’єднання (SCRUM-технології) до конкурентної гри із "супротивником". Запропоновано адаптивну комплексну структуру технології проектної діяльності з перевезення великогабаритного багажу, яка передбачає на початку кожного етапу виявлення форми співпраці із субпідрядником та гнучку технологію роботи із ним.It has been shown that the transport of large-sized cargoes is a project in which the latter team constantly faces the intellectual risks of counteracting the environment in the form of subcontractors (roadmakers, electricians, road inspectors, etc.) for the implementation of individual stages of the project. Managing these risks involves various forms of cooperation with subcontractors, from the merger (SCRUM-technology) to the game with the "opponent". The adaptive complex structure of the project activity on transportation of large-sized luggage is offered, which provides at the beginning of each stage the identification of the form of cooperation with the subcontractor and the flexible technology of work with it. The aim of the work is to reduce the time and cost of implementing large baggage transportation projects by managing the intellectual risks of counteraction from subcontractors of the project through the development and implementation of an adaptive integrated structure of the project activity technology, which foresees, at the beginning of each phase of the project, the identification of the form of cooperation with the next subcontractors and the flexible working technology with them. To achieve this goal, the following tasks were set and solved: analyzed problems of transportation of large-sized cargoes and revealed design features of such activity; Estimated intellectual risks of counteraction to project activity from "subcontractors" of the project; proposed adaptive complex structure of technology project activity, which combines SCRUM technology and game; the industrial tests of the results of the research with a positive technical and economic effect have been carried out. The results of the work were used in the system of support for the adoption of design decisions in the context of intellectual risks "SOLINTR". The system "SOLINTR" was involved in the PEO "ECHO" when planning and equipping the project of transportation of large-sized cargo at a distance of 235 km with a positive technical and economic effect

    Using bricolage to facilitate emergent collectives in SMEs

    Get PDF
    Starting a new business is often done in a realm of improvisation if resources are scarce and the business horizon is far from clear. Strategic improvisation occurs when the design of novel activities unite. We conducted an investigation of so called ‘emergent collectives’ in the context of a small and medium-sized enterprise (SME). Emergent collectives are networks of information nodes with minimal central control and largely controlled by a protocol specification where people can add nodes to the network and have a social incentive to do so. We considered here emergent collectives around an enterprise resources planning (ERP) software and a customer relation management (CRM) software in two open source software (OSS) communities. We investigated how the use of bricolage in the context of a start-up microenterprise can facilitate the adoption of an information system (IS) based on emergent collectives. Bricolage is an improvisational approach that allows learning form concrete experience. In our case study we followed the inception of a new business initiative up to the implementation of an IS, during a period of two years. The case study covers both the usefulness of bricolage for strategic improvisation and for entrepreneurial activity in a knowledge-intensive new business. We adopted an interpretative research strategy and used participatory action research to conduct our inquiry. Our findings lead to the suggestion that emergent collectives can be moulded into a usable set of IS resources applicable in a microenterprise. However the success depends heavily on the ICT managerial and technological capabilities of the CEO and his individual commitment to the process of bricolage. Our findings also show that open ERP and CRM software are not passing delusions. These emergent collectives will not take over proprietary ERP and CRM software all of a sudden, but clearly the rules of the game are slowly changing due to the introduction of new business models. The study contributes to the research of OSS as emergent collectives, bricolage and IS adoption in SMEs

    Decision Support Tools for Cloud Migration in the Enterprise

    Full text link
    This paper describes two tools that aim to support decision making during the migration of IT systems to the cloud. The first is a modeling tool that produces cost estimates of using public IaaS clouds. The tool enables IT architects to model their applications, data and infrastructure requirements in addition to their computational resource usage patterns. The tool can be used to compare the cost of different cloud providers, deployment options and usage scenarios. The second tool is a spreadsheet that outlines the benefits and risks of using IaaS clouds from an enterprise perspective; this tool provides a starting point for risk assessment. Two case studies were used to evaluate the tools. The tools were useful as they informed decision makers about the costs, benefits and risks of using the cloud.Comment: To appear in IEEE CLOUD 201

    Understanding Components of IT Risks and Enterprise Risk Management

    Get PDF
    This study aims to synthesise the risk factors associated with IT/IS and categorise or classify them into a few main major themes to guide the IT management in their risk management exercises. This chapter is organised into five main sections. First, the chapter begins with introduction to IT and risk in general. Second is the description of methodological approach, review of literature on and description of IT risk, factors and enterprise risk management. Third is the result and discussion of IT risk classification identified from the reviewed articles. Finally, the chapter ends with a brief description of future work

    Factors Influencing IT Project Performance

    Get PDF

    Risks and Hidden Costs: A Study of 26 Outsourced Projects

    Get PDF
    Despite the current unfavorable outlook of the larger economy, there has been a steady increase in information systems outsourcing by organizations which is projected to reach $97.9 billion in 2012. Ordinarily, organizations outsource their software projects to avoid the risks associated with developing the software internally and to control costs. However, a study of twenty six outsourced projects indicates that such organizations face unique risks and hidden costs that are particular to software outsourcing. This paper describes research done to estimate the effort expended by organizations in overseeing and participating in outsourced software projects and the implications for identifying risks and predicting costs of such projects. For many of the organizations that participated in the survey, uncovering the actual costs and risks of an outsourced project was an eye opener: the hidden costs and risks are surprisingly significant and are typically not managed by the organization

    The impacts of cloud computing adoption at Higher Education institutions: a SWOT analysis

    Get PDF
    The integration of advanced technologies within education has frequently enhanced teaching. In higher education it is not a surprise that using the latest developments in cloud computing improves learning practices and thus ensures they are more interactive, available, and convenient. The ease of integration, collaboration, and sharing of information and knowledge made possibleby cloud computing will be further enhanced if this technical advancement is used wisely and in a foolproof manner. In this paper, a SWOT analysis of the impact of cloud computing on higher education methodologies is presented. A SWOT analysis is here demonstrated to be a helpful guide in decision-making for all higher education institutions when considering the migration of their present learning systems to cloud based systems

    Managing of Information Systems Risks in Extended Enterprises: The Case of Outsourcing

    Get PDF
    IT security issues and outsourcing of business processes are common but largely disjoint themes in the literature; common consideration is rare even though information security risk becomes a shared risk both through IS-based processes at outsourcing partners and potentially tightly-integrated IS systems. This paper explores this lack of an integrated model combining IT risk management view with the outsourcing process. Towards the development of an integrated model outsourcing and risk managing process phases are detailed; common phases of each serve as the basis for the introduction of an integrated model. Finally the paper suggests some points for future research

    Unfolding Dyadic Dependencies in IS Outsourcing Relationships – Development of Two Multidimensional Constructs

    Get PDF
    While dependence is seen as a major risk in IS outsourcing relationships, to date little attention has been paid to fully and unambiguously capturing the complex nature of this phenomenon and specifying how to measure it. Research in reference disciplines has shown that dependence is a dyadic concept, i.e., studies should assess both the client’s and the supplier’s dependence in order to draw adequate conclusions. Hence, to provide a thorough basis for future IS outsourcing studies, this research-in-progress paper follows a multi-method approach (extensive literature review, case study interviews, Q-sorting, questionnaire pretests, two-sided pre-study with 44 responses from 367 companies) to develop two multidimensional “dependence” constructs, reflecting both sides of an IS outsourcing dyad, i.e., client and supplier dependence. Our research efforts aim to contribute to and extend inter-organizational IS studies and to support client and supplier firms in monitoring and influencing dyadic dependence structures
    corecore