4 research outputs found

    NEWS IN THE IT OUTSOURCING AND TRENDS IN ITS DEVELOPMENT

    Get PDF
    The aim of the article is to show new trends in the development of IT outsourcing (ITO) and indicate possible directions of the development of the branch. The methods used in the study are: desk research, analysis and synthesis, case study novelties in the ITO branch. Outsourcing as a concept of business management focused on slimming organization appeared at the end of the twentieth century and is currently undergoing intensive development. The value of the outsourcing market, especially IT outsourcing is increasing. The number of companies using this form of service, as well as the number of companies – service providers – are growing rapidly. Both theoreticians and practitioners are seeking management methods and techniques for improving this form of service. What adds to the news of ITO are: the use of cloud computing, automation and robotics, the use of artificial intelligence, crowdsourcing, reverse outsourcing, new forms of employment, new professions and next countries – the ITO service provider. Directions of development of the branch are related to social, organizational and technology areas, and focus on these news of ITO. In the social area one should note a growing importance of Asian countries and Central and Eastern Europe countries, including Poland as a country with great potential to provide IT outsourcing.

    A Study of Information Systems Outsourcing Risks

    Get PDF
    Despite the considerable growth of Information Systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the main risks computer outsourcing entails for the largest Spanish firms. In order to achieve that aim, we have reviewed the previous literature on this topic and later analysed the results of a survey covering 5,000 firms. According to the firms under analysis, the main concern in relation to IS outsourcing is the excessive dependence on the provider this type of contract may generate. Nevertheless, some characteristics of firms (mainly their size) somehow determine what risks are seen as the most relevant. The conclusions also suggest that total outsourcing can turn out to be a very dangerous strategy, mainly due to the dependence it creates. This is why IS managers should consider other alternatives such as having multiple providers or resorting to selective outsourcing

    The Derivation of a Conceptual Model for Outsourcing IT Security

    Get PDF
    IT security outsourcing is the establishment of a contractual relationship between an organization with an outside vendor which assumes responsibility for the organisation’s security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making process leads to a substantial degree of uncertainty. This is especially so in the realm of IS security since the protection of both hardware and software systems is placed in the hands of an external provider. This paper is a fuller and more comprehensive paper of a previous paper outlining the effectiveness of the decision making process by means of a conceptual model using Soft System Methodology techniques that integrates security benefits, costs and their respective performance measures. In this paper the methodology used to develop the model is discussed in detail

    Information systems outsourcing risks: a study of large firms

    Get PDF
    Purpose – Despite the considerable growth of information systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the main risks computer outsourcing entails in the case of the largest Spanish firms. Design/methodology/approach – In order to achieve that aim, reviews the previous literature on this topic and later analyses the results of a survey carried out using a questionnaire that was answered by 357 firms. Findings – According to the firms under analysis, the main concern in relation to IS outsourcing is the excessive dependence on the provider this type of contract can generate. Nevertheless, some characteristics of firms (mainly their size) determine to some extent what risks are seen as the most relevant. Originality/value – The conclusions suggest that total outsourcing can turn out to be a very dangerous strategy, mainly due to the dependence it creates. This is why IS managers should consider other alternatives such as having multiple providers or resorting to selective outsourcing
    corecore