5 research outputs found

    Information and Communications Technology Strategies for Improving Global Virtual Teams\u27 Success Rates

    Get PDF
    Ineffective strategies to integrate information and communication technology (ICT) to support global virtual teams (GVTs) have adversely affected organizations\u27 performance. The purpose of this multiple case study was to explore the effective strategies participating GVT managers in 2 organizations in the United States used to integrate ICT to support teams\u27 success. The population comprised managers in New York with at least 3 years of service integrating successful strategies in ICT to support GVT success. Transformational leadership theory was used as the conceptual framework for this study. The data collection process included asking 4 participants semistructured interview questions as well as reviewing archival data from the organizations. Data analysis using mind mapping analysis resulted in 5 major themes: forms of communication, redundancy, inclusion, accessibility, and infrastructure. The implications of this study for positive social change include the potential to create economic opportunities in developed and underdeveloped countries by incorporating or adapting some or all these strategies to improve efficiencies using ICT to support the success of GVTs. Improving GVT success rates could enable organizations to maintain and grow jobs benefiting employees, families, and communities

    Analysis of Risks Faced by Information Technology Offshore Outsourcing Service Providers

    No full text
    To gain competitive advantage, organisations are considering information technology (IT) outsourcing as a strategic option by concentrating on their core operations and by reducing their operating costs. Many organisations are offering outsourcing services from various parts of the world. There are certain risks factors which IT outsourcing service providers come across while managing their service operations. Risk-related data from 50 Indian IT outsourcing service providers about their risks and concerns have been collected and archived. This study identifies risks from the providers’ perspective in regard to offshore outsourcing and put forward some guidelines to mitigate such risks

    Relationship between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, and IT Outsourcing Project Outcomes

    Get PDF
    Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client complementarity was the only significant contributor (t = 2.551, p = .013, ß = .362). The key recommendation for business and IT leaders is to factor in vendor/client complementarity to improve ITO success during the vendor selection process. Incorporating complementarity may foster positive social change by allowing financial services firms to create shared values for themselves, their vendors, and the communities in which they operate

    Managing security and compliance risks of outsourced IT projects

    Get PDF
    PhD ThesisSeveral sources of constraints, such as business, financial and legal, can lead organisations to outsource some of their IT services. As a consequence, different security risks may be introduced, such as confidentiality, integrity and availability risks. Analysing and managing the potential security risks in the early stages of project execution allow organisations to avoid or mitigate the impact of these security risks. Several organisations have adopted ISMS standards and frameworks in an endeavour to manage outsourced IT project security risks. In this thesis, existing ISMS standards and frameworks have been reviewed and analysed to assess their ability to effectively manage the security and compliance risks of outsourced IT projects and satisfy their security needs. The review reveals that existing ISMS standards and frameworks represent only general security recommendations and do not consider variation in security requirements from one organisation to another. There is also a lack of adequate guidance for implementing or complying with these standards and frameworks, and they are not designed to manage the security and compliance risks of outsourced IT projects. To overcome these weaknesses, a new framework has been introduced. The framework is a structured approach that is designed to manage variation in security requirements, as well as provide a methodology to guide organisations for the purpose of security management and implementation. The framework was evaluated using different evaluation methods including a focus group, questionnaire, and case study, which were also used to generate recommendations and suggestions for improvements. The evaluation results confirmed that the framework provided the participants with an effective approach for managing security and compliance risks in the outsourcing context. It was understandable, easy to use, and independent from different constraints such as project size, cost or execution time. The framework is now ready to be put into practice by organisations that intend to outsource their IT services partially or totally
    corecore