47,808 research outputs found

    Network sharing through service outsourcing in inter-domain IMS frameworks

    Get PDF
    Includes abstract.Includes bibliographical references (leaves 161-167).Resource sharing can be used as a short-term solution to the imbalance between the supply and demand of network resources. Resources sharing enables operators to provide services to their subscribers using networks belonging to other operators. Resource sharing in mobile networks is increasingly becoming an option for operators to provide service to their subscribers. In this thesis we explore a mechanism for sharing access network resources that utilises negotiable short-term Service Level Agreements (SLA) that can easily adapt to changing network conditions. Through this mechanism operators of resource constrained networks may use near real time dynamic SLAs to negotiate network access services for their subscribers. We refer to this form of resource sharing as 'Service Outsourcing'

    Managing the outsourcing of information security processes: the 'cloud' solution

    Get PDF
    Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT). Cloud computing (i.e., externalization of one or more IT services) might be a solution for organizations keen to maintain a good level of security. In this paper we discuss whether cloud computing is a valid alternative to in-house security processes and systems drawing on four mini-case studies of higher education institutions in New England, US. Our findings show that the organization’s IT spending capacity affects the choice to move to the cloud; however, the perceived security of the cloud and the perceived in-house capacity to provide high quality IT (and security) services moderate this relationship. Moreover, other variables such as (low) quality of technical support, relatively incomplete contracts, poor defined Service License Agreements (SLA), and ambiguities over data ownership affect the choice to outsource IT (and security) using the cloud. We suggest that, while cloud computing could be a useful means of IT outsourcing, there needs to be a number of changes and improvements to how the service is currently delivered

    Virtual HR Departments: Getting Out of the Middle

    Get PDF
    In this chapter, we explore the notion of virtual HR departments: a network-based organization built on partnerships and mediated by information technologies in order to be simultaneously strategic, flexible, cost-efficient, and service-oriented. We draw on experiences and initiatives at Merck Pharmaceuticals in order to show how information technology in establishing an infrastructure for virtual HR. Then, we present a model for mapping the architecture of HR activities that includes both internal and external sourcing options. We conclude by offering some recommendations for management practice as well as future research

    Outsourcing Back Office Services in Small Nonprofits: Pitfalls and Possibilities

    Get PDF
    Presents findings on small nonprofits' administrative, finance, and other office support needs; reasons and conditions for outsourcing as well as barriers; methods for evaluating options; and guiding principles. Examines three business models

    Inter Organizational Relationships Performance in Third Party Logistics: conceptual framework and case study

    Get PDF
    Supplier relationship management is an important challenge for shippers in logistics outsourcing. This paper attempts to understand the factors which affect inter organizational relationships performance in third party logistics and proposes a conceptual framework specifically for inter organizational relationship performance in third party logistics. We also draw a set of propositions from published research and exploratory inter-views with practitioners to explain inter organizational relationships performance in third party logistic net-works. Five main dimensions of inter organizational relationships are identified which affect performance in third party logistics: commitment, supplier adaptation, conflict resolution, partner fit and communication. In order to assess the validity of our conceptual model we include a case study in this paper. The case study is based on Shell Chemicals Europe and their portfolio of seventeen third party logistic service suppliers

    The Internet's Effects on Global Production Networks: Challenges and Opportunities for Managing in Developing Asia

    Get PDF
    Placing global production networks (GPN) on the Internet poses a fundamental challenge, but also creates new opportunities for managing in Developing Asia. Network flagships can now select best-performing suppliers on a global scale, increasing the pressure on Asian suppliers. But the transition form EDI to the Internet may also provide new opportunities for Asian suppliers, by reducing barriers to network entry, and by enhancing knowledge diffusion. A conceptual framework is introduced to assess how the Internet reshapes business organization and GPN. That framework is applied to one of the role models of managing in Asia, Taiwan's Acer Group. The paper highlights a vicious circle that must be broken to reap the benefits of the Internet: Asian firms must reduce a huge efficiency gap between manufacturing and the management of supporting digital information systems (DIS). The challenge is to embrace the Internet as flexible infrastructures that support not only information exchange, but also knowledge sharing, creation and utilization. The Internet facilities this task: it provides new opportunities for the outsourcing of mission-critical support services.

    THE MEASURING FRAMEWORK OF OUTSOURCING SUCCESS: A SOCIAL EXCHANGE PERSPECTIVE

    Get PDF
    Outsourcing has become a buzz word in strategic management as the competition of modern business is the competition among business networks. The reviews on the measure of outsourcing success are conceptually fragmented due to different theories that have been applied in different studies. The overall aim of this paper is to develop an integrated framework in measuring the performance of services outsourcing. The framework is derived from Social Exchange Theory. Each party responsibility in dyadic relationship over outsourcing success is examined. This is followed by the identification of the mediating effect of compatibility between partners, and moderating effect of partnership quality to the aforementioned relationship. Outsourcing performance is proposed to be evaluated from the perspectives of tactical, strategic and behavioral dimensionsBuyer related factors, Compatibility, Outsourcing, and Partnership quality, Services ,Supplier related factors

    Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach

    Get PDF
    Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for multiuser databases. Users, however, are very diffident for not having full control over their sensitive data. Untrusted database-as-a-server techniques are neither readily extendable to the cloud environment nor easily understandable by non-technical users. To solve this problem, we present an approach where agents share reserved data in a secure manner by the use of simple grant-and-revoke permissions on shared data.Comment: 7 pages, 9 figures, Cloud Computing 201
    corecore