¶ … Business
Categories of risk associated with sourcing of IT/IS services
Performance Risk
Delays at third parties may lead to a decline in end customer performance levels and timely delivery. As a product/service is outsourced, this risk gets heightened severely. Several factors can cause delays such as factors that are not within the outsourcing company's control. For instance, delays at the port/custom, weather, labor disputes, and political crisis. More severe examples are delays caused by terrorist activities and uncertainties and interruptions from outbreaks of deadly and contagious diseases like SARS or Ebola. As variability and lead-time increase, the need for greater stock levels and all other expensive buffers also increases, whereas generally, supply chain confidence reduces.
Operational Risk
Also, the outsourcing alteration phase may not succeed if budgets and schedules are not actualized as a result of lack of resources or adequate planning. It is possible to run an outsourcing using the same planning and discipline as an implementation for an efficiently-run large-scale system. Outsourcing is all about replacing service or production functions, and such functions have direct effects on the ability of the company to meet every of its responsibilities to shareholders and customers. The quality of products or services can equally be affected during outsourcing, which in turn affects the satisfaction of the customers. Companies are expected to be careful in selecting, qualifying, contracting with, and effectively working with their outsourcing partners to make sure there is no deterioration of quality. This mostly requires effective periods of transition or parallel manufacturing as well as efficient cross-training among different companies. Cost savings efforts are often responsible for the neglect of these aspects.
Financial Risk
It is possible that the suppliers are not financially stable, which puts the company at the risk of supply interruptions. Unpredictably, the financial stability effectiveness basis scored a much lower mark below the others in the results from the survey, which indicates that a large number of companies stand the risk of facing supply interruptions or other related problems due to the lack of financial resources on the side of the supplier (O'Keeffe & Vanlandingham, 2004).
2a. Why Organizations Outsource IT/IS Activities
Need for Specialized Capability from a Supplier
More companies are beginning to realize that outsourcing some decisions should be tied directly to business strategy as well as good knowledge of major competencies. Third-party suppliers are also able to raise the entire value chain performance once every participant in that chain has the right understanding and pays attention to their individual major competencies. Major competencies can equally involve abilities like technical innovation or rapid flexibility/response. The production industry most times graded the need for special ability from suppliers to be a bit lower than every other option. Most often, functional management graded the need for special ability from the suppliers as very vital. Companies whose revenues ranged between $500M and $1B graded special supplier abilities as more essential than every other company.
Maximize Restructuring Benefits
When the company is restructured to increase quality, costs, speed, or service, business functions that are not regarded as core may be pushed aside. However, they still require handling, and outsourcing is the best way to do this.
2b. Why organizations might choose to keep all IT/IS activities in house.
It is difficult to outsource certain IT functions. The effects of IT are felt all over the organization, from the daily simple tasks done by employees to complex automated tasks. Therefore, these are very essential systems for which the company may make such functions in-house. This is as a result of the risk of losing control. An outside salesperson may not be as efficient as the full-time company worker who is under the same administration with every other employee. Other concerns are data confidentiality and recovery. However, there will be the need for a supervisor with the knowledge of how to handle IT staff members.
It is possible for organizations to get locked in. Once the vendor fails to get their work documented on the company system or network, or if the firm is forced to buy their proprietary software, it is easy for them to end up feeling like they can't possibly go anywhere else or take its network back. Most outsourced companies need organizations to sign yearly contract, which places a limitation on their flexibility (CCS, 2016).
3, Criteria used to identify articles as being authoritative in academic terms
What qualifications does the author have? Academic authors are expected to emerge from institutes or universities, and a university press often handles the publication of each academic writing work.
Are all the sources mentioned? Search for a reference list of bibliography.
Is the writing...
And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003) 5. What should Tim do now? After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either
For example, it is no longer advisable to use a paper-based payroll, as apart from being more likely to become subject to fraud, it is an environmental hazard. Imagine the filing needs for a payroll for 100 people in one year only. Also, there's the consideration that almost everyone has and uses email. Electronic mail enables immediate correspondence between separate entities and quicker responses to urgent matters. More than this,
Information Technology The reference company is the oil giant Chevron. Because there is a growing demand for the development of Internet, intranet, and extranet business-to-business (B2B) transaction capabilities, the Stamford, Connecticut -- based Gartner Group predicts that by the year 2004 more than 50% of all enterprises will use the Internet for more than 80% of their external procurement activities. Meanwhile, almost every company offering products and/or services has developed or
Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized
Hence the development of the Open Systems Interconnect (OSI) Model which lead to the development of the Internet and the Ethernet standard and the TCP/IP protocol, both of which nearly the entire Internet runs on today. #9, in what way have phones and computers converged? Why is this convergence occurring? The personal productivity tasks of communication as it relates to the use of telephones and computer systems has long been an
The company's consistent top line revenue growth also illustrates it has been successful in transforming its supplier network into one that operates more on knowledge, less on purely price or product decisions. As a result the company is capable of competing more at the process level and less at the purely price-driven one (Reese, 2007). In terms of the company's factors for success, the greater opportunities is to move into
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now