47,808 research outputs found
Network sharing through service outsourcing in inter-domain IMS frameworks
Includes abstract.Includes bibliographical references (leaves 161-167).Resource sharing can be used as a short-term solution to the imbalance between the supply and demand of network resources. Resources sharing enables operators to provide services to their subscribers using networks belonging to other operators. Resource sharing in mobile networks is increasingly becoming an option for operators to provide service to their subscribers. In this thesis we explore a mechanism for sharing access network resources that utilises negotiable short-term Service Level Agreements (SLA) that can easily adapt to changing network conditions. Through this mechanism operators of resource constrained networks may use near real time dynamic SLAs to negotiate network access services for their subscribers. We refer to this form of resource sharing as 'Service Outsourcing'
Managing the outsourcing of information security processes: the 'cloud' solution
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT). Cloud computing (i.e., externalization of one or more IT services) might be a solution for organizations keen to maintain a good level of security. In this paper we discuss whether cloud computing is a valid alternative to in-house security processes and systems drawing on four mini-case studies of higher education institutions in New England, US. Our findings show that the organization’s IT spending capacity affects the choice to move to the cloud; however, the perceived security of the cloud and the perceived in-house capacity to provide high quality IT (and security) services moderate this relationship. Moreover, other variables such as (low) quality of technical support, relatively incomplete contracts, poor defined Service License Agreements (SLA), and ambiguities over data ownership affect the choice to outsource IT (and security) using the cloud. We suggest that, while cloud computing could be a useful means of IT outsourcing, there needs to be a number of changes and improvements to how the service is currently delivered
Virtual HR Departments: Getting Out of the Middle
In this chapter, we explore the notion of virtual HR departments: a network-based organization built on partnerships and mediated by information technologies in order to be simultaneously strategic, flexible, cost-efficient, and service-oriented. We draw on experiences and initiatives at Merck Pharmaceuticals in order to show how information technology in establishing an infrastructure for virtual HR. Then, we present a model for mapping the architecture of HR activities that includes both internal and external sourcing options. We conclude by offering some recommendations for management practice as well as future research
Outsourcing Back Office Services in Small Nonprofits: Pitfalls and Possibilities
Presents findings on small nonprofits' administrative, finance, and other office support needs; reasons and conditions for outsourcing as well as barriers; methods for evaluating options; and guiding principles. Examines three business models
Inter Organizational Relationships Performance in Third Party Logistics: conceptual framework and case study
Supplier relationship management is an important challenge for shippers in logistics outsourcing. This paper attempts to understand the factors which affect inter organizational relationships performance in third party logistics and proposes a conceptual framework specifically for inter organizational relationship performance in third party logistics. We also draw a set of propositions from published research and exploratory inter-views with practitioners to explain inter organizational relationships performance in third party logistic net-works. Five main dimensions of inter organizational relationships are identified which affect performance in third party logistics: commitment, supplier adaptation, conflict resolution, partner fit and communication. In order to assess the validity of our conceptual model we include a case study in this paper. The case study is based on Shell Chemicals Europe and their portfolio of seventeen third party logistic service suppliers
The Internet's Effects on Global Production Networks: Challenges and Opportunities for Managing in Developing Asia
Placing global production networks (GPN) on the Internet poses a fundamental challenge, but also creates new opportunities for managing in Developing Asia. Network flagships can now select best-performing suppliers on a global scale, increasing the pressure on Asian suppliers. But the transition form EDI to the Internet may also provide new opportunities for Asian suppliers, by reducing barriers to network entry, and by enhancing knowledge diffusion. A conceptual framework is introduced to assess how the Internet reshapes business organization and GPN. That framework is applied to one of the role models of managing in Asia, Taiwan's Acer Group. The paper highlights a vicious circle that must be broken to reap the benefits of the Internet: Asian firms must reduce a huge efficiency gap between manufacturing and the management of supporting digital information systems (DIS). The challenge is to embrace the Internet as flexible infrastructures that support not only information exchange, but also knowledge sharing, creation and utilization. The Internet facilities this task: it provides new opportunities for the outsourcing of mission-critical support services.
THE MEASURING FRAMEWORK OF OUTSOURCING SUCCESS: A SOCIAL EXCHANGE PERSPECTIVE
Outsourcing has become a buzz word in strategic management as the competition of modern business is the competition among business networks. The reviews on the measure of outsourcing success are conceptually fragmented due to different theories that have been applied in different studies. The overall aim of this paper is to develop an integrated framework in measuring the performance of services outsourcing. The framework is derived from Social Exchange Theory. Each party responsibility in dyadic relationship over outsourcing success is examined. This is followed by the identification of the mediating effect of compatibility between partners, and moderating effect of partnership quality to the aforementioned relationship. Outsourcing performance is proposed to be evaluated from the perspectives of tactical, strategic and behavioral dimensionsBuyer related factors, Compatibility, Outsourcing, and Partnership quality, Services ,Supplier related factors
Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach
Cloud computing allows shared computer and storage facilities to be used by a
multitude of clients. While cloud management is centralized, the information
resides in the cloud and information sharing can be implemented via
off-the-shelf techniques for multiuser databases. Users, however, are very
diffident for not having full control over their sensitive data. Untrusted
database-as-a-server techniques are neither readily extendable to the cloud
environment nor easily understandable by non-technical users. To solve this
problem, we present an approach where agents share reserved data in a secure
manner by the use of simple grant-and-revoke permissions on shared data.Comment: 7 pages, 9 figures, Cloud Computing 201
- …