51,106 research outputs found

    Outsourcing Back Office Services in Small Nonprofits: Pitfalls and Possibilities

    Get PDF
    Presents findings on small nonprofits' administrative, finance, and other office support needs; reasons and conditions for outsourcing as well as barriers; methods for evaluating options; and guiding principles. Examines three business models

    An exploratory study of factors influencing make-or-buy of sales activities

    Get PDF
    Purpose This paper aims to explore how sales managers make resourcing decisions with particular focus on their perceptions of outsourcing. Design/methodology/approach This paper is based on in-depth interviews with 29 senior sales managers from a variety of industry sectors based in the UK. All had more than five years’ experience of making resourcing decisions. Findings The findings are that resourcing decisions are prompted by cost pressure, the need to access skills or to improve flexibility. Outsourcing preferences are strongly moderated by perceived reputational risk. Availability of suitable suppliers and the ability to manage outsourcing are also practical moderators. Research limitations/implications The sample was purposeful in identifying and accessing senior respondents in substantial companies with extensive experience, but it was not random. Practical implications Respondents reported a lack of information available when making resourcing decisions; the model proposed provides a framework by which sales managers can identify the factors which should be taken into account and the information they need to make objective evaluations of resourcing options. Originality/value It has been acknowledged in prior literature that there is relatively little outsourcing of sales activities. This is the first exploratory study of the perceptions of sales managers about resourcing options and the first conceptualisation of how sales resourcing decisions are made

    Fostering Chinese firms through entrepreneurship, globalisation and international finance

    Get PDF
    The success of ventures that have pursued non traditional marketing approaches may be attributed to a range of forward thinking practices which it is argued here, should be the starting and finishing points for Chinese companies. Chinese multinationals need to develop entrepreneurial ability more compatible with their growth in the international markets. Chinas educational framework is still largely based on rote learning, which is a method typically seen as ill suited to modern needs. Many Chinese high tech sectors are still dominated by overseas know-how and the ongoing strength of wholly foreign- owned enterprises

    To outsource or not to outsource!

    Get PDF
    In this article we will take a look at the phenomena of outsourcing as an overarching business concept that is, in short, about contracting of a specific bit of our business to a third part organisation. Consequently, outsourcing is a natural part of the make, share or buy continuum, as illustrated in Figure 1. We would, therefore, argue that outsourcing is not a new business phenomena as it has been commonly practiced since the early times of industrialisation, even though recently it has been enjoying renewed attention fuelled by the globalising forces

    Managing the outsourcing of information security processes: the 'cloud' solution

    Get PDF
    Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT). Cloud computing (i.e., externalization of one or more IT services) might be a solution for organizations keen to maintain a good level of security. In this paper we discuss whether cloud computing is a valid alternative to in-house security processes and systems drawing on four mini-case studies of higher education institutions in New England, US. Our findings show that the organization’s IT spending capacity affects the choice to move to the cloud; however, the perceived security of the cloud and the perceived in-house capacity to provide high quality IT (and security) services moderate this relationship. Moreover, other variables such as (low) quality of technical support, relatively incomplete contracts, poor defined Service License Agreements (SLA), and ambiguities over data ownership affect the choice to outsource IT (and security) using the cloud. We suggest that, while cloud computing could be a useful means of IT outsourcing, there needs to be a number of changes and improvements to how the service is currently delivered

    Outsourcing and acquisition models comparison related to IT supplier selection decision analysis

    Get PDF
    This paper presents a comparison of acquisition models related to decision analysis of IT supplier selection. The main standards are: Capability Maturity Model Integration for Acquisition (CMMI-ACQ), ISO / IEC 12207 Information Technology / Software Life Cycle Processes, IEEE 1062 Recommended Practice for Software Acquisition, the IT Infrastructure Library (ITIL) and the Project Management Body of Knowledge (PMBOK) guide. The objective of this paper is to compare the previous models to find the advantages and disadvantages of them for the future development of a decision model for IT supplier selection

    Governance of Offshore IT Outsourcing at Shell Global Functions IT-BAM Development and Application of a Governance Framework to Improve Outsourcing Relationships

    Get PDF
    The lack of effective IT governance is widely recognized as a key inhibitor to successful global IT outsourcing relationships. In this study we present the development and application of a governance framework to improve outsourcing relationships. The approach used to developing an IT governance framework includes a meta model and a customization process to fit the framework to the target organization. The IT governance framework consists of four different elements (1) organisational structures, (2) joint processes between in- and outsourcer, (3) responsibilities that link roles to processes and (4) a diverse set of control indicators to measure the success of the relationship. The IT governance framework is put in practice in Shell GFIT BAM, a part of Shell that concluded to have a lack of management control over at least one of their outsourcing relationships. In a workshop the governance framework was used to perform a gap analysis between the current and desired governance. Several gaps were identified in the way roles and responsibilities are assigned and joint processes are set-up. Moreover, this workshop also showed the usefulness and usability of the IT governance framework in structuring, providing input and managing stakeholders in the discussions around IT governance

    Value-driven Security Agreements in Extended Enterprises

    Get PDF
    Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third parties. Although this gives competitive advantage by reducing cost and increasing flexibility, it increases security risks by eroding security perimeters that used to separate insiders with security privileges from outsiders without security privileges. The classical security distinction between insiders and outsiders is supplemented with a third category of threat agents, namely external insiders, who are not subject to the internal control of an organization but yet have some access privileges to its resources that normal outsiders do not have. Protection against external insiders requires security agreements between organizations in an extended enterprise. Currently, there is no practical method that allows security officers to specify such requirements. In this paper we provide a method for modeling an extended enterprise architecture, identifying external insider roles, and for specifying security requirements that mitigate security threats posed by these roles. We illustrate our method with a realistic example

    Human Resource Management Outsourcing in Spanish firms: Evolution over time and implication for devolution

    Get PDF
    Purpose: The paper aim to explore the evolution in the use of HRO in Spanish firms, and determine the differences in the degree of implementation of HRO since 1999 until 2014, and also analyze the relationship between HR outsourcing and devolution of HR responsibilities to line managers in Spanish organizations. Design/methodology: This paper combines quantitative and qualitative methods. Namely the article is based on international Cranet HRM survey data collected from private and public organizations and also interviews with HR external providers. Findings: The analysis of developments, based on the Cranet surveys and interviews with HR external providers shows that during the past few years there has been an increasing use of HRO in parallel with the tendency to devolve more HR responsibility to line managers. Research limitations/implications: The main limitation of this research is the limitation of data about reasons for devolution that the CRANET questionnaire provides. However, the interviews carried out enrich the survey data with qualitative results. Practical implications: The findings can be used to guide management teams in outsourcing and devolution decisions to maximize benefits to their organizations. Originality/value: This paper is about the evolution of HRO in Spain as a European Union country where published research on HRO and also its implications is relatively limited. The originality of this paper is mainly the involvement of line manager in the outsourcing process which have been poorly analyzed until now.Peer Reviewe

    Beyond product architecture: Division of labour and competence accumulation in complex product development

    Get PDF
    This paper considers the trade-off between leveraging external sources of innovation by outsourcing design and engineering activities and the ability to develop internal product development competences. The trade-off arises because the division of labor within and across firms' boundaries has a crucial role in shaping competence development processes, especially because the division of labor also influences opportunities for learning by doing. In new product development projects, learning by doing appears to be both a key determinant of competence development and a difficult-to-substitute form of learning. While the division of development tasks is often considered as guided by product architecture, we show that by decoupling the decisions concerning the product architecture and the allocation of development tasks, firms can realize the benefits of outsourcing such tasks while developing new internal competences. Drawing on a longitudinal case study in the automotive industry, we also identify a new organizational lever for shaping competence development paths and for designing firm boundaries. This lever consists in alternating different task allocation schemes over time for different types of development projects. We show why this is a novel solution, what its underlying logic is, and how it enables alleviating the trade-off between the benefits of leveraging external sources of innovation and the opportunities for competence development provided by in-house design and engineering. We discuss implications for theories of organizational boundary design and innovation management.innovation management; organizational boundaries; outsourcing; product architecture; modularity; new product development; template process; automotive industry; Fiat
    corecore