20 research outputs found

    Sourcing and Supplier Management - A digital perspective

    Get PDF
    Digital transformation is increasingly critical to an organization’s competitiveness [1]. It affects many IT management activities and requires organizations to adapt their business models, rethink their strategy, and collaborate with the business ecosystem to provide more innovative products and services. The way that the organization manages and engages with its suppliers is becoming an increasingly important strategic driver in digital transformation initiatives

    Portugal as a near shore destination for Information Technology and Business Processes Outsourcing. Factors influencing the location assessment

    Get PDF
    This research aims to define Portuguese positioning in the near shoring market for Information Technology and Business Processes Outsourcing. The TAVAAS methodology used throughout this work considers six factors, for which corresponding relative weights were assumed. A qualitative research methodology was conducted to identify the motivational drivers of companies whose transnational services are installed in Portugal. Its results challenged the initial assumption; therefore, they were re-applied to the framework. The deviation from the results achieved with the initial perceived weights was not significant; thus, the initial hypothesis was tested and its results accepted. As conclusion, the relative factor weights to consider when evaluating Portugal as a near shore destination for IT and BPO have been identified

    Global sourcing of information technology and business processes : 4th Global Sourcing Workshop 2010, Zermatt, Switzerland, March 22-25, 2010, Revised selected papers

    No full text
    This book contains 14 carefully reviewed and selected papers from the 4th Workshop on Global Sourcing, held in Zermatt, Switzerland, March 22-25, 2010. They have been gleaned from a vast empirical base brought together by leading researchers of outsourcing and off shoring. This volume is intended for use by students, academics and practitioners interested in the outsourcing and off shoring of information technology and business processes. It offers a review of the key topics in outsourcing and off shoring, populated with practical frameworks that serve as a tool kit to students and managers. The sourcing models available to client firms are discussed in great depth. Vendor capabilities as well as client capabilities are studied and links are offered to the various sourcing models. Issues pertaining to knowledge and expertise are also discussed. Last but not least, the book examines current and future trends in outsourcing and off shoring, paying particular attention to the role that CIOs will play in shaping their sourcing strategies

    Offshore Business Processing Outsourcing by Australian Enterprises to Service Providers Located in India

    Get PDF
    The primary research question for this PhD was: “What are the key factors that contribute to the success of offshore business process outsourcing (OBPO) by Australian and international organisations to service providers located in India and the Philippines?” A qualitative research design in the positivist paradigm was adopted, involving longitudinal case studies of five client companies. A primary contribution was identification of critical success factors for management of OBPO at the individual company level

    Managing IT outsourcing risks: the case of large organisations in South Africa.

    Get PDF
    Masters Degree. University of KwaZulu-Natal, Durban.Information technology (IT) is significant to achieving business objectives. Despite the significance of IT to the business, organisations are outsourcing the whole, or part thereof, of their IT department to reduce cost and focus on the core of their business. The outsourcing of IT, however, comes together with risks such as vendor lock-in, loss of control and information breaches that could lead to IT outsourcing (ITO) failure. If these risks are not properly identified and managed, organisations will remain vulnerable. While studies have been conducted on ITO and risk management, very few have conducted exploratory research to address how to manage the risks of ITO. Hence, using a qualitative approach, this study explored how large organisations manage the common risks of ITO. These risks are the operational risk, business continuity risk, data privacy risk and compliance risk of the IT Service Provider (ITSP). The study further explored the impact of these risks on large organisations and the mitigating controls organisations can have in place to reduce their impact and likelihood of occurrence. Interviews, which were recorded, was conducted with 12 experts from two large organisations in South Africa. The recorded interviews were transcribed, coded using NVivo software and analysed using thematic analysis. The main themes of this study were governance, develop ITO risk profile, ITSP audit, risk treatment, and assurance. Findings show that organisations need to constitute a Risk Management Committee with a substantial level of experience in the management of risks and ITO. This is to ensure the effective identification, assessment and treatment of ITO risks. Furthermore, the constituted Risk Committee must conduct verification exercises to identify the inherent risks of ITO. They must also conduct maturity assessment and business impact analysis (BIA) in assessing the probability of occurrence and impact of ITO risks. The Committee must establish technical and administrative controls in mitigating the risks of ITO. The findings further show that organisations must integrate risk governance and assurance polices in their ITO risk management strategy to continuously monitor residual risks and identify potentially new risks. A governance Framework for IT Service Provider Risk Management (ITSPRM) that may serve as a guide in the effective management of ITO risks was also developed and presented

    Building the knowledge base for environmental action and sustainability

    Get PDF

    Across Space and Time. Papers from the 41st Conference on Computer Applications and Quantitative Methods in Archaeology, Perth, 25-28 March 2013

    Get PDF
    This volume presents a selection of the best papers presented at the forty-first annual Conference on Computer Applications and Quantitative Methods in Archaeology. The theme for the conference was "Across Space and Time", and the papers explore a multitude of topics related to that concept, including databases, the semantic Web, geographical information systems, data collection and management, and more

    Understanding sponsorship involvement outcomes in partnership models

    Get PDF
    Today, sponsorship relations are evolving to a partnership model where sponsor and sponsee are interacting during the preparation and execution in the shared interest of both parties, and where sponsors are also cooperating with each other. These partnership models often result in additional value for the partners, and include benefits for visitors of the sponsored event or for a wider set of stakeholders. Frameworks include models to assess the outcome of corporate social responsibility (CSR) initiatives, as well as Porter and Kramer's (2011, 2014, 2019) work on creating shared value (CSV). Applying the concepts not only extends our understanding of sponsorship outcomes but also offers new insights into the applicability of the CSV approach and contributes to current academic debates on both CSV and CSR (most prominently in a California Management Review discussion between Crane, Palazzo, Spence and Matten [2012, 2014] on the one hand, and Porter and Kramer [2014] on the other). CSV includes a shareholder perspective that resonates with sponsorship stakeholders, pays attention to outcomes on both sides of the partnership and also offers a way to assess and value outcomes that are external to the partnership, including aspects traditionally viewed through the lens of philanthropy and CSR. Centrum Regionale Kennisontwikkelin

    Across Space and Time Papers from the 41st Conference on Computer Applications and Quantitative Methods in Archaeology, Perth, 25-28 March 2013

    Get PDF
    The present volume includes 50 selected peer-reviewed papers presented at the 41st Computer Applications and Quantitative Methods in Archaeology Across Space and Time (CAA2013) conference held in Perth (Western Australia) in March 2013 at the University Club of Western Australia and hosted by the recently established CAA Australia National Chapter. It also hosts a paper presented at the 40th Computer Applications and Quantitative Methods in Archaeology (CAA2012) conference held in Southampton
    corecore