SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
ITM OUTSOURCING
P a g e | 2 
Table of Contents 
Introduction........................................................................................................................................3 
Problem Statement.............................................................................................................................4 
Strategic Project Management...........................................................................................................4 
System Analysis and Design..............................................................................................................10 
System and Network.........................................................................................................................13 
IT Security.........................................................................................................................................14 
Definitions........................................................................................................................................17 
Outsourcing:.....................................................................................................................................17 
Knowledge Process Outsourcing:......................................................................................................19 
Recruitment Process Outsourcing (RPO):.........................................................................................20 
In Sourcing:.......................................................................................................................................21 
Strategic Management:....................................................................................................................21 
Offshore Outsourcing:......................................................................................................................21 
Near Shoring:....................................................................................................................................22 
Information Technology Management ............................................................................................23 
Impacts of Outsourcing.....................................................................................................................24 
Supply Chain Management...............................................................................................................26 
Supply Chain Technology..................................................................................................................27 
Impacts for IT Companies.................................................................................................................31 
Conclusion........................................................................................................................................32 
References........................................................................................................................................34
P a g e | 3 
Introduction 
It is a fact that technology has not only changed the way of thinking but has also changed the 
way of working and living of the people. The world in which we live is run by the technology 
which is a wide area that includes processes such as computer software, computer hardware, 
information systems, data constructs and programming languages. There are varieties of 
functions which IT professionals have to perform that range from installing applications to 
designing complex database. 
Sometimes, it becomes difficult for a business to perform all the functions by itself and if a 
company realized that it does not have sufficient resources to accomplish those tasks then it 
makes contact with others companies to accomplish the work and take services of any other 
organization through outsourcing. Cost reductions, improved operational efficiency, abundance 
of skill manpower, global best practices are some other drivers for outsourcing (Jenyns, 2011). 
Purpose 
This study is also intended to explore the fundamental motives behind this increasing trend of 
US and Western organizations in sub-letting the business functions to off shore countries like 
India and China. It will also help to figure out the reasonably explained suggestions for viable 
managerial decisions related to IT management.
P a g e | 4 
Problem Statement 
Outsourcing has become a hot topic for debate recently, especially in the developed countries. 
Its boom is seen in the press during the recent global economic crisis. Voices in favor and it are 
heard and raised from common public to the high valued decisions makers and politicians of the 
society. Some say it’s a savior in these hard times for their companies and some argue it to be a 
job-killing process, initiated by the management. Outsourcing has now become a common 
practice because it gives countless advantages to parties, both hiring and the hired. This paper 
shall shed light on various advantages disadvantages, implications and impacts of outsourcing 
on the IT industry in the world, especially for the U.S. 
Strategic Project Management 
Through our research, we have arrived at the conclusion that in undertaking our outsourcing 
process, it will entail a very vigorous exercise in project management. Some of the key aspects 
of this will include the following: 
The specification requirements will need to be very clearly reviewed. Chances of these 
requirements being misunderstood are quite high when a project is being outsourced. It would 
perhaps be wise to inculcate these into the contract. A comprehensive requirements statement 
will also enable us to guesstimate the amount of work involved with the project, and to compare 
whether the vendor’s own projection for the same is plausible or not.
P a g e | 5 
It would also be imperative to do a thorough cost-benefit analysis for the outsourcing project. If 
the merits of outsourcing aren’t substantial enough, we may consider reversing our decision 
altogether. We will be sure to ascertain that all the relevant stake holders understand our 
decision and the factors that can cause it, including invisibility of operations, knowledge drain, 
and proprietary information being leaked outside our company. 
ITM is the perpective of strategic mananagemt , all resoures and parameter of organizational 
value chain are to be aligned, with emphasis on managing the information systems to facilitate 
th management of its decision making, based on the relevant management if ots information 
systm. To enable this a comprehensive ‘Management of informatuin system (MIS) plays the 
crucial part in collecting, organizing, filtering and dissemination of tailored (to specific needs) 
of the management is provided, which in turn assist in producing performance reports in 
‘concise’ form to guage the ongoing strategic health of the organization. And, to make accurate 
changes its process, planning, modifying to revisit the organization’s deciosns making process 
and upgrading where neceaasy.
P a g e | 6 
In context of strategic management the role of IT is very crucial in producing ‘Balance Score 
Cards(BSC), stategy canvas and business modeling and keep up with the constant change in 
‘Delta’, the rate of change in yhe external environment, and makes its simpler to induct relevant 
changes in oits processes in the right direction. 
The main focus of use of IT is to create value generation through the use of information 
technology ,with an intent of using it as a strong viable source in the strategic process. The It 
infrastructure has to be higly integerative to be able create ‘synergy’ across the board of the 
organzational value chain as a team effort, to be useful. 
The management needs to design, use its IT strength to build a collaborative, integrated and 
focused infracture which is more customer and product centric and get in involved in 
establishing relationships in terms of its both internal and external enviromnents., with a
P a g e | 7 
network of servers, storage of data, security network and its application management with 
agility, accuracy nas timeliness. 
We will also post a request for proposal or an RFP for our project. This will consist of all the 
details of our needs, management methods, etc. If necessary, we will employ an external 
consultant to secure the best outsourcing deal for us. The consultant may also be able to aid us in 
selecting the appropriate vendor, making sure that we have written a thorough request for 
proposal, and appraise any perspective vendor as well. 
An experienced, trustworthy manager will be assigned to oversee the execution of the entire IT 
outsourcing project. Our research has indicated to us that outsourcing demands an intricate set of 
management skills, and we will be very selective in who is chosen to be the manager for this 
project. Amongst the criteria for this selection will be the manager’s ability to appreciate 
cultural difference in working styles and communication. 
Very strong lines of communication and communication will be established with the party that 
we choose to outsource our project to. It will be enough to just review matters and take 
decisions at periodic meetings, or through perusing documents.
P a g e | 8 
We will need to be wary of vendors who bid at comparatively lower rates that what we expect. 
This could mean that they have either not grasped our requirements well enough, or are not 
giving much importance to our project. Concurrently, we will also ask for references from our 
vendors and also consider whether they have had long-term clients in the past. 
We will ask of our chosen vendor to provide a comprehensive project plan that encompasses all 
aspects of the project. Subsequently we will use Key Performance Indicators (KPI’s) to monitor 
the vendor’s performance and analyze it with the Key Success Factors of the industry similar to 
our design and structure. The importance of value relevancy is the key, when comparing and 
assessing the potential to the short listed vendor’s capacity to produce and provide ‘requirement 
specific model’ tailored to our exclusive needs. A framework will be asked as plan will be 
sought from the vendor. 
A comprehensive timeline and task design, execution, according to the established timeline will 
come under the ‘compliance’ clause of the proposal. 
We will approach this initiative through creating a ‘Matrix’ first to enable us the clarity needed, 
to what do we want, how we want and expectations from outsourcing and selecting the vendor. 
 Strategic enterprise architecture must have the requisites for turning around the 
project parameters to meet strategic intents 
 How would it change our prevailing set of processes 
 How we and the outsourcing medium will help in induction of exclusive Information 
technology, and risks involved.
P a g e | 9 
This would help us in defining what particular nomenclature will suit us to be inducted and 
executed in our structural design with minimum risk and cost-value effective at the same time in 
the long run. 
An important aspect to consider will be the transmission of knowledge to the vendor, and the 
time that this will consume. Additionally, we will also consider how our project may be 
impacted owing to a high rate of employee turnover at the vendor’s end. 
It wouldn’t be realistic on our part to expect cost efficiencies in the short run. There may be 
several related costs (travel etc) that will be incurred while the project is completely established 
as an outsourced venture. 
We will retain the original intellectual property rights and also conduct a full assessment, as 
discussed above of the vendor before signing off on the outsourcing project contract. 
Particularly, when any business decides to employ outsourcing project management services, 
that particular business must take services from a reliable advisor who can focus clearly on the 
bottom line. It must always be remembered that Return on Investment (ROI) is very important, 
and the same is the case with outsourcing projects. Hence, before initiating any project, it is 
always suggested to properly plan and make a rough sketch of the resources required. “We field 
a lot of questions about cost management and project management but sometimes it’s not easy 
to calculate ROI or to do it precisely. Companies want to know ROI even if it’s calculated under 
a rough-case scenario.” 
The vendor will be hired to design and implement the system and will be responsible to show 
the figures of improvement in the inducted processes and the cost benefit bench marks which
P a g e | 10 
were agreed upon. Any marked deviations from the outcomes, the vendor will compensate on 
free cost and time from his own resources or according to the mutually agreed clauses made 
during signing of the contract. 
System Analysis and Design 
IT is an ever expanding and developing industry for almost the last two decades. It has its own 
limitations and implications. In this industry, the outsourcing process exists with all of its 
complexities. It offers its advantages like the cost saving , better management of the available 
resources, improved quality of services, access and induction of proven intellectual, access to 
the well trained talents, risk mitigation and most importantly the ‘evidence based’ expertise. On 
the other hand, it has its disadvantages too, like the loss of managerial control, security issues, 
resistance from the local communities and sometimes quality problems. 
This paper shall shed light on various advantages, disadvantages, implications and impacts of 
outsourcing on the IT industry in the world especially in the U.S. The situation at present, its 
loopholes and positives shall be a part of this paper. After analyzing all the aspects of this issue / 
phenomenon, recommendations shall be given so as to best utilize the services of the officials in 
the best interest of the institution at the same time. 
As we conducted our research for outsourcing the IT project, we realized that we simply could 
not underestimate the significance of system analysis and design. In this day and age of when 
information is so widely available, all business organizations requires IT based solutions and 
systems it to function effectively and sustain growth.
P a g e | 11 
System Analysis and design is the method of designing information systems that make leverage 
the tools of information technology to provide support to the goals and objectives of an 
organization. There is usually a systems analyst whose function it is to work alongside the 
managers of the organizational value chain. There is a significant team work involved in system 
analysis, and this team comprises skilled people from both the IT as well as other departments 
who are relevant to organizational performance invariably. 
The vendor-organization interface would be developed to work with the different 
workers/managers on the issues of problem solving through creating and implementing cross 
organizational collaborative efforts to bind the vendor’s expertise with the organizational human 
capital. Cross collaboration is extremely important in order to decrease resistant level of the 
organizational workforce involved in this exercise, add clarity, interest and urgency to adapt 
while designing and implementing the system alongside the outsourced experts. 
It makes the whole exercise as the most viable learning tool as training & development, and also 
inculcate and develop in-house human minds with enough insights in developing newer system 
‘in house’ for future needs of the organization, generating a workable and strategic value to the 
organization’s future requirements. 
The business can eventually develop and increase its own in-house project management 
competency with skillful outsourcing. If the development lies inside developed and acquired 
core competencies, then you can outsource only the more diverse technological aspect to project 
management as per new requirements.
P a g e | 12 
Our team of system analysts will concentrate on providing complete solutions that meet the 
client’s needs adequately and effectively as possible. Considerable emphasis will be laid on the 
significance of planning, analyzing, and developing solutions while the project infrastructure is 
being procured and laid out. At first, it would be critical to conduct a client needs analysis, 
following which, data will be gathered and analyzed to gauge the present day business set up as 
well as the way our resources are deployed. In developing solutions, a process map and blue 
print will be designed, based on the findings of the above exercises. The objective here would be 
to identify any possible bottle necks or issues that could arise in the future with our outsourcing 
project. 
Once the finalized decision is made for moving and handing over to outsource project 
management, it is essential to remain cautious regarding in-house project managers and properly 
ensure that the suitable internal links are recognized early with the external consultant leading 
the effort. There is always a heavy amount of leveraging possible which can be achieved if 
planned and executed properly. A bridge or link between the outside provider and within the 
project guides the company in its own project management competency and also augments other 
competencies.
P a g e | 13 
System and Network 
Here is another area which we have to consider with a great deal of thought, foresight, and 
intelligence. Employing the right people in the area of IT can be a daunting task. There are at 
least three important aspects that we will need to heed carefully. 
 There will need to have experienced director of IT, who should have requisite 
knowledge of information technology to be compensated well for the performing the 
tasks that are assigned to him. Similarly, the systems administrator or technical support 
staff will need to be assigned challenging tasks with more financial and motivational 
rewards, otherwise we may risk losing people with company secrets and also a human 
capital waste. 
 The IT personnel will also need to be managed properly. Good system administrators are 
often averse to looking after end-user technical support issues, while the end-user 
technical support staff often want to dabble into server maintenance and work with other, 
more sophisticated technology, but they are not knowledgeable enough to be allowed to 
do so. 
 System administrators and other IT staff are either overly occupied with work, or at 
times, simply have nothing more to do than just be there to address any IT issues that 
may arise. The organization nevertheless ends up paying them a consistent salary. In 
order to reconcile the risk of IT personnel turn over as well as the cost of keeping them, 
we will have to do some very careful financial planning. 
The IT infrasture has to be adopted which has the potential to provide our organization;
P a g e | 14 
 Lower IT cost structure 
 Improve IT services relative to the best practice of ITM 
 Upgraded and continuous improvement centic and concentric 
 High deliverable standards for productivity improvement 
 High quality deliverables with respect to ‘out sourcing’- third party 
arrangements, most likely associated with ‘BS 15000 / ITIL standards. Also 
see. BSI Group, and (Information Technology Infrastructure Library) 
IT Security 
In order to ensure absolute security with outsourcing our IT project, we will take the following 
main measures: 
 Establish a solid security policy 
We will make sure primarily that our own business is in order, and that its security policy is 
strong and stringent based on modern security tools and methods and must to change 
periodically, including the key staff members and which excellent. The hardware and security 
software and allied equipment be based on excellent portability functions to interface other 
equipment and apt for further up gradation periodically.. There will be a data categorization that 
will separate the more sensitive data from the more routine information. As well, there will be
P a g e | 15 
standards and criteria in place that will be established with the consent of all the stakeholders, 
managers, and employees of our organization. 
 Choose The Right Outsourcing Vendor 
This will be a critical step in order for us to ensure that our chosen vendor strictly adheres to our 
stipulated security policy. We will also require of our vendor to have security rules and 
regulations established in his own company, in order to make sure that our data is well 
protected. 
Te organization should opt for vendors for outsourcing with who has the capacity to work under 
the principles and domain of ‘Infirmation-Technology and Research Advisory Services and 
Management. (ITSM). There are large number of registered vendors who operates in this 
domain. Making the choice, it is advisable to verify using the’ PinkVerify Tool set, version 3.1 
or V- 2011 certication and authentication of the products, which meets the comatiability criteria 
if ITIL, pertaining to its overall and core suitability and integrative sustainability requirements. 
 Establish A Strong Privacy And Intellectual Policy 
We will be very clear with our vendor about this policy in order to avoid the risk of any 
misunderstanding arising at a late stage, by clearly defining our system’s requirement’s 
accessibility policy, rules and regulations. The intellectual information and data privacy and 
protection is a serious issue, especially where outsourcing and off sourcing takes place.
P a g e | 16 
The organization’s data may be very confidential, may have business growth secrets and other 
discreet nature of the information. The World Intellectual Property Organization ( WIPO), 
strongly suggests that before getting into a contract of such nature, a thorough and exhaustive 
audit and investigative process should take pace relating to ‘IP due diligence along with its 
attached risk evaluation. 
It will help the institution to assess in taking its decision on which information and sources of 
data should be kept in house and what to outsource? For this process a critical in house review 
should take place. It needs to define and explore parameters of ‘Due Diligence of IP, and then 
decide on the best courses of actions. This is a ‘loop’ step’, towards vendor selection as 
discussed above at the same time in relative terms. 
 Data protection 
Before we outsource our IT project, we will start using databases to invigilate gateways and 
application layer firewalls in order to establish the policies with regards to their usage. These 
devices can also avert any abuse and exploitation of our data and intellectual policy. 
Other measures to ensure that our privacy policy is strictly abided by will include educating 
personnel on data management, establishing the rule of minimal privilege, to access data by a 
single authority, developing a method to ensure leak-proof traffic, and making sure that 
application and network security audits are conducted on a regular basis.
P a g e | 17 
Definitions 
Some of the important terminologies are briefly defined here. 
Outsourcing: 
It is a process of contracting to a third-party or external provider for some business function or 
services. Outsourcing or sub-servicing often refers to the process of contracting to a third-party a
P a g e | 18 
specific job/s which may not be feasible to do in house or where there is lack of expertise is 
lacking to perform such tasks. Also, it is done to save costs by giving a portion of the project to 
a party to have better expertise in economies of scales as its strength. 
In Information technology this trend is becoming popular with passage of time by sub letting the 
components of job to different experts in their own field, which enables additional manpower 
hiring with added cost and more time spent on the project as a whole. It can be in the shape of 
large contracts covering many aspects of particular job, or even a full job to another company or 
even small information management and retrieval such surveys, emails, social media and blogs.
P a g e | 19 
Knowledge Process Outsourcing: 
In this form of outsourcing, knowledge and information-related work is done by third-party 
workers who are highly skilled and trained in their field. It is also called KPO, where crucial 
business or process information has a core value to the entire value chain of the organization. 
And, it has critical importance for the organization success. 
Where there is a dire need of specialized, highly analytical skill based experts can only perform 
such activities. It becomes imperative for the organization to outsource critical task to such 
professionals. Such practice can become to gain competitive advantage through such highly 
skilled and knowledge based professional’s comparative advantage of their expertise. 
Since this exercise is expensive, therefore, certain degree of risk is also attached with it, in case 
of failure to achieve desired results. Not, only the heavy amount will be lost, but it will create 
tremendous loss and destructions to the entire organizational value chain, and may lead to a 
collapse. 
Therefore, getting into it, a thorough instigative process and methodology be designed and 
strictly followed before KPO decision making. Following diagram sows an example of design 
structure and flow of the intended outcome which has a low probability of systematic risk 
occurrence. 
The people in charge should have an adequate knowledge behind the mechanics of KPO process 
and intellectually equipped to make in-depth scrutiny of adopting KPO and overseeing it by 
developing a real time monitoring and 360 feedback system for effective ᵒ control, along with 
personal involvement.
P a g e | 20 
by Carlos Sanchez Ivy business journal 
Strategy | May / June 2010 
Recruitment Process Outsourcing (RPO): 
It is a form of outsourcing in which a company or organizations assigns all or some part of its 
recruitment activities to an external service provider. In this case, the RPO acts as seeker, 
recruiter and provider through entire recruitment and creating the job profiles, including 
technology based staffing and reporting. 
RPO enacts and enables organization’s the quality of hired staff, saves times to add value by 
selecting the most suitable talent pool through rigorous and comprehensive investigative tools, 
including ‘Raters Model’ based on quantitative and qualitative metrics with stringent 
compliance criteria.
P a g e | 21 
In Sourcing: 
It is the process of allocating tasks or jobs to an internal entity that is dedicated for that function 
and operation, in a manner that its value should supplement other tasks jobs and related 
objectives. It is relatively a new concept, and it emphasizes its conceptual design, as it pertains 
to using in house experts and specialists to fill in gaps in the current needs of the organization to 
perform certain tasks on temporary basis, before any other permanent arrangements becomes 
necessary. 
Strategic Management: 
Strategic means ‘long term’, and strategic management is set of leadership (including Board of 
Governors) intent starting from the organizational vision, mission, and set of processes aligned 
together to achieve instructional goals. The processes is designed to evolve a workable structure 
which is capable of functioning as a cohesive unit of inter-organizational ‘softer and harder’ 
competencies and capacity to formulate goal plans, planning, formulating action plans into set of 
interlinked change adaptive objectives to form a ‘strategy’. Implementation of strategy with 
effective system control systems to attain its goals. 
Offshore Outsourcing: 
It is the practice of assigning some business functions of organizational value chain to an 
external organization that is located in a country other than the country of the outsourcing
P a g e | 22 
organization, with an objective of transfer of technology at a lesser cost to gain comparative 
advantage and improve cost-efficiency ratio. This is usually done by hiring the services from 
another firm’s expertise from another country to supplement the hiring company’s business 
operations. 
With the advent of internet, it has become easier to hire the services of individuals as freelancers 
to provide the skills and expertise from all over the world. It reduces the cost o operations and 
also develops a large data base source for the organization. It has a tremendous value of having 
large labor at considerable lower costs, irrespective to the size and functions of the company¹. 
This type of planning model is also known as’ Remote In-Sourcing’, which help companies to 
seek and acquire required resources which are available in different geographical environments. 
This helps creating in house specific indentified by workforce working for the client in 
collaboration with the client’s chosen workers, which creates an atmosphere of ‘on job 
consultancy and training environment’. 
Near Shoring: 
It is the practice of outsourcing some business function to nearby country often that shares the 
border with country of the outsourcing organization in case it has the required technology, 
expertise and manpower with a lower cost structure.
P a g e | 23 
However, this concept is based on placements of business operations near to the locations where 
suppliers and small manufactures are located with adequate technology to manufacture specific 
components which the organization does not want to expand its manufacturing facilities. 
Near shoring trend is on the increase in recent times, as more and more organizations has started 
to increase their production and manufacturing in U.S, relying lesser on foreign producers, The 
prime examples are GM, caterpillar, Apple ad Ford. Main assessment parameters to evaluate in 
this scenario are the ‘type of delivery needs, like agility, which is customer centric and 
switching costs pertaining to technology, fuel, quality in contrast to organization’s own cost-benefit 
ratio in correlations with cost differentials 
Organizations tends to locate some their operations where the end users are close by and also 
have better logistics and distribution system to cover the nearby markets. The main objective is 
to save supply chain and logistic costs². 
Information Technology Management 
It is a process of managing IT resources like hardware, software, data, networks and the staff 
related to an organization in conjunction with the established organization’s priorities for the 
better utilization and betterment of the concerned organization. 
The objective behind ITM is the generation of different set of values needed for the formulation 
and execution of organization’s action plans and strategies. ITM to be successful, it needs a 
perfect and harmonized alignment with organizational planning, strategy formulation, execution
P a g e | 24 
and control systems. The quality of ITM has a direct bearing n the system dynamics of the 
organization. In designing ITM methodologies, the models based of ‘system thinking’ should 
be mostly used. 
Impacts of Outsourcing 
There are many reasons, due to which an IT company would opt for outsourcing. Both the 
hiring and the hired countries benefit from it. The company hired earns money while the hiring 
company gets the work done in much less cost. Thus, many think that it is a win-win process. 
Outsourcing does help to reduce the burden and the huge stack of work on any company. Now, 
the company can give some IT work to another company and thus can focus more productively 
on the other core issues (wisegeek, 2011). 
Outsourcing has made available to the companies a world-wide pool of professionals and 
experts of IT. They now can choose the one with most skills and lowest costs. In such 
competition bargaining is also not a big problem. Professionals lower their demanded costs 
to get the job. For example, DuPont is an American IT based company that was able to 
complete the project within deadline, only because it had outsourced with China. It also saved a 
lot of cost on the 24 hour application, for DuPont. Thus, outsourcing has positively impacted the 
IT industry because when companies manage to get work done at lower cost, the chances 
increases that most of the people will be able to afford IT products due to their reasonable cost. 
The trend of outsourcing has increased in the U.S. because the IT talent is depleting there. So 
there is a bad need for IT related skills in the U.S. for which the companies have to hire
P a g e | 25 
other companies to get the quality work done related to Information Technology (Jenyns, 
2011). 
There are also some gaps which have been created in the IT industry due to outsourcing. 
However, there are some proponents of outsourcing. An Increase in outsourcing in the IT 
department is results in frustration in for those who do not have requisite competencies t 
remain employed. Episodes where unions have also formed against this model, strikes and 
riots have also resulted to reduce this practice because the workforce saw it as a threat. 
They feel that their country is no more loyal to them or else they would not have to reach 
out to hire people for the work. The country gets dependent on some other country to get 
the task performed. The new and talented IT people of their own country are not given a 
chance to be innovative or creative either. This is a big handicap for the IT graduates or 
with adequate knowhow. IT problems are usually generic and there may be a new answer 
to every next query (Doerken, 2005). 
The trade balances of the countries also get affected by outsourcing, due to the economical, 
political and social negative impacts. President Barack Obama is totally against 
outsourcing and has tried many times to put an end to it in the U.S. On Sept 10, 2010 he 
started a campaign and announced that he would be giving tax compensations to only 
those companies who will provide jobs to U.S. citizens. He said that, “All firms that would 
innovate in the US would get tax breaks”. He also told that outsourcing is the reason for 
unemployment and economic recession in the country (Times of India, 2010). This clearly 
shows how harmful outsourcing has been to USA when extensively used.
P a g e | 26 
Supply Chain Management 
With the tremendous surge in outsourcing, a large amount of functions are deployed with 
external, third party organizations. This is perceived as a strategic method to synchronize the 
supply chain with the company’s growth path, as well as a smart way to contain service delivery 
and other costs. 
Outsourcing projects to overseas companies has gained particularly in prominence. Supply chain 
management has thus developed as a global operation. We are well aware that offshore 
outsourcing is a very competitive need for our organization. Accordingly, it is imperative for us 
to be successful that we manage the extended supply chain meticulously. This would take into 
account time and distance, the demands and methodologies of our vendor, and managing the 
supply chain with regards to various other costs, transparency, co-ordination, communication, 
integration, and flexibility. 
In order to appropriately manage our outsourced project, we will have to consider availing the 
services of outsourced logistics providers. This may serve to our completely transform our 
supply chain, but on a positive note, this may also result in a more efficient usage of time and 
inventory. Alternatively, we may concentrate on the transportation of our project as the only 
requirement. The bottom line is that supply chain management will become a distinct area of 
management, which is the backbone of production and delivery process and most crucial factor
P a g e | 27 
(if done with innovation) in creating financial leverage between one organization and others in 
the industry. And, that leverage provides the biggest competitive advantage to the organization. 
It has to will to be very carefully re-assed and revamped qualitatively to ensure that the way it 
operates to reduce cost and add value to the end product, up to its delivery to the end user. This 
is a point of creating value advantage which can be spread across the board at all functions of 
the organization’s intent and organization-customer value proposition. 
Supply Chain Technology 
It is a fact that technology has not only changed the way of thinking but has also changed the 
way of people’s working and living. The world in which we live is run by the technology which 
is a wide area including processes such as computer software, computer hardware, information 
systems, data constructs and programming languages. There are varieties of functions which IT 
professionals have to perform that ranges from installing applications to designing complex 
database. 
The use of ITM is very crucial in management of supply operations and fuctions, and we need to 
have spscific design and structure which can add value in Cost-Value tradeoffs and lean 
processes.
P a g e | 28 
It needs to be done primarairly though; 
 Better planning to find out the best available concentration of sources of information on 
aggregate basis 
 Source relative to the core needs of processes in relation to its products needed design 
 Create methodogies and chosing production sites and locations. 
 Delivery of logistical channels, stock control, inventory and product deployment system. 
 Return of items, creating methodologies and suitable locations.
P a g e | 29 
The IT system will provide us real time analysis of comparisions of such supply chain 
parameters, interal vs the the external practices, outcomes, and generate reliable information to 
make timely amendments in our supply chain matrix. The system will run on producing 
advantages and comparative values-leverage through; 
· Agility 
· Responsive quality 
· Asset Costs 
· Relibilty 
· Forecasting capacity 
· Processes evalution and review resultants. 
· Reducing distribution cost, time and enhancing logistics productivity.
P a g e | 30 
Other than outsourcing, another way for IT industry to substitute a service from any foreign 
source is off shoring. It can either be production off shoring or service off shoring. Furthermore, 
companies also opt for out tasking approach to drive down information technology cost which 
allows the business to turn over a specific IT operation to another organization, instead of entire 
IT function in contrast to outsourcing. 
Only the supply chain processes which are or cannot be cost-time-value efficient in most cases 
should need to be out sourced. Global evidence shows that inefficient supply chain costs 
incurred can be between 50 to 70 percent f the total processes, and using expert systems 
including IT based system can cut 25 to 35 percent of these cost, which can be added to the 
products value and pass it in to the customers. The end value can be seen between the 
manufacturing process and what cost the end user is willing to pay for its purchase as a
P a g e | 31 
‘transaction cost’? The efficacy of this multidirectional relationship between two or entities must 
have common economic parameters with interdependent investments and coordinated interests 
to be successful (Harold Malmgren (1961). At present time it has become an international 
standard to adapt to this concept. Globalization has done much for such concepts and models to 
be built around the cost-value and timeline relationship. 
Impacts for IT Companies 
Outsourcing has now become a common practice because it gives countless advantages to 
parties, both hiring and the hired. The major benefits of outsourcing are stated below: 
1) The cost of labor is less in the developing countries. The developed countries take 
advantage from it and instead of using their expensive labor they hire equally, or 
even more, talented people of the third world countries, like India. 
2) The increase in global and local market shares has brought the whole world under 
great competition. The companies think that if their rivals are benefiting from 
outsourcing then they should also get the benefit from it. 
3) More time can be spent on the core strategic issues of the company, if some tasks 
are outsourced. 
The outsourcing provides many benefits, but there are also some weaknesses which cannot be 
ignored at the same time. In outsourcing the company completely put its trust and confidence in 
the hired company and expects them to complete the task in the expected time. This may not
P a g e | 32 
always be the case; the company may not even get satisfactory results. It is the hiring company 
that will lose customers and will be questioned. Their reputation will be at stake, for trusting the 
wrong people. The company will also lose control of the department they have given someone 
else to manage. But in the end, a business has to take some effective measures including risks to 
prosper, and also, more and more IT security systems are developed each day to offset or 
minimize such risks. Internal risks are also there for unethical access of data and information, 
therefore, one should apply the best security practices to secure its ITM and look forward to 
growth. 
Hackers all over the world can hack almost any system for their malicious intents and nobody 
can stop them, except to be more vigilant and keep on developing more secure IT protocols. 
Conclusion 
Every model has its own advantages and disadvantages. It is up to the company to choose how 
they want to reduce the workload on them and take help from some other company or 
workforce. A new IT project should be thoroughly analyzed and then decision should be taken, 
whether it should be outsourced, off shored or out tasked. The company should not only think 
about their profits, but should also consider the betterment of the people and their country. The 
world has now become a global village and technology is what is running our lives, so better 
technology can help people to spend better life. Outsourcing, off shoring and out tasking has no 
doubt benefited the third world countries, but the negative impact which it had on the first world 
nations cannot be ignored as well. The people of these countries have become restless and
P a g e | 33 
displeasing about their lost jobs. But the blame does not go on these approaches, but on the 
policies which have created the false image of these practices and caused outsourcing failure 
and heavy losses. Poor governance, lack of communication, lack of cultural misfit, lack of good 
policies are some of the reasons due to which many companies has burned their feet due to 
outsourcing. There is a need to create more awareness about the limitations on outsourcing, off 
shoring and out tasking. 
After conducting this research what we have found is that there are various limitations 
associated with the process of outsourcing and it has its own advantages and disadvantages 
associated at the same time. The basic limitation faced is the access to the actual current figures 
in this regard. As this process involves different companies situated within countries, it has 
made it harder to fully grasp the situation and discuss it in detail in this regard, but with the help 
of current available literature through book and online resources I have tried my level best to 
discuss major aspects in detail for evaluation.
P a g e | 34 
References 
Barack Obama targets outsourcing again. (Sep 10, 2010). The Times of India . 
¹ Gartner Outlines the Top 10 Forces to Impact Outsourcing and IT Services Industry. Sep. 
2010. http://www.gartner.com/newsroom/id/1433214 
Delen, G. (2009). IT Outsourcing: An Introduction . Van Haren Publishing. 
Doerken (2005). Offshoring ... benefits the consumer. Retrieved from: 
http://www.usatoday.com/tech/techinvestor/industry/2005-01-16-dhl-advice_x.htm. 
Engardio, P. (2006, January 30). The Future Of Outsourcing . Retrieved from Business Week: 
http://www.businessweek.com/magazine/content/06_05/b3969401.htm 
Impact of Outsourcing. Retrieved from: http://www.wisegeek.com/what-is-outsourcing.htm 
Jenyns.(2011). 5 Top Reasons To Out-Task Your Business. Retrieved from: 
http://www.melbourneseoservices.com/out-task/. 
http://www.intetics.com/the-search-for-a-better-outsourcing-model-benefits-of-remote-insourcing/
P a g e | 35 
Veen, Annelies van der; Jan van Bon (2007). Foundations of ITIL V3. Van Haren Publishing. ISBN 978- 
90-8753-057-0 
Bird, M. (2010). Modern Management Guide to Information Technology. Create Space 
http://www.pinkelephant.com/PinkVERIFY/PinkVERIFY_2011_Toolsets.htm 
"PinkVERIFY 2011 Toolsets". Pink Elephant. April 2014 
Malcolm Fry (2010). ITIL Lite. The Stationery Office. ISBN 978-0-11-331212-2. 
HROA Special Interest Group Publishes Definition of RPO, Feb. 19, 2009 
BSI Group Fast Facts 
Sahay,S (2003). Global IT outsourcing: software development across borders . Cambridge 
University Press. 
Wijers, G. (2009). It Outsourcing: Contracting the Partner. Van Haren Publishing. 
²April 2013 article in Entrepreneur Magazine (More Businesses Turn to 'Near-Sourcing' to Save 
Time and Money)

Contenu connexe

Tendances

3gamma insights - Managing techonlogy in an ever-changing environment
3gamma insights - Managing techonlogy in an ever-changing environment3gamma insights - Managing techonlogy in an ever-changing environment
3gamma insights - Managing techonlogy in an ever-changing environmentJens Ekberg
 
Fostering Best Financial Strategies and Practices for Enterprise IT
Fostering Best Financial Strategies and Practices for Enterprise ITFostering Best Financial Strategies and Practices for Enterprise IT
Fostering Best Financial Strategies and Practices for Enterprise ITIBM India Smarter Computing
 
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...Cognizant
 
Competing with information technology
Competing with information technologyCompeting with information technology
Competing with information technologyAmrit Banstola
 
Technology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
Technology Cost Management 4D Framework: A Smarter Way to Manage IT CostsTechnology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
Technology Cost Management 4D Framework: A Smarter Way to Manage IT CostsCognizant
 
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...David Cunningham
 
Management Imperatives To Make IT Business-Smart
Management Imperatives To Make IT Business-SmartManagement Imperatives To Make IT Business-Smart
Management Imperatives To Make IT Business-Smartvinaya.hs
 
The Application TCO Journey
The Application TCO JourneyThe Application TCO Journey
The Application TCO JourneyPete Hidalgo
 
17 Must-Do's to Create a Product-Centric IT Organization
17 Must-Do's to Create a Product-Centric IT Organization17 Must-Do's to Create a Product-Centric IT Organization
17 Must-Do's to Create a Product-Centric IT OrganizationCognizant
 
Module 4 ERP and Selling Chain Management
Module 4 ERP and Selling Chain ManagementModule 4 ERP and Selling Chain Management
Module 4 ERP and Selling Chain ManagementJitendra Tomar
 
Strategic Alignment
Strategic AlignmentStrategic Alignment
Strategic AlignmentNor Fadzleen
 
Digital procurement transformation_roadmap_2020
Digital procurement transformation_roadmap_2020Digital procurement transformation_roadmap_2020
Digital procurement transformation_roadmap_2020Peter Soetevent
 
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
 
Digital Fuel- Achieving IT cost visibility-Id gresearch cio_study_1009
Digital Fuel- Achieving IT cost visibility-Id gresearch cio_study_1009Digital Fuel- Achieving IT cost visibility-Id gresearch cio_study_1009
Digital Fuel- Achieving IT cost visibility-Id gresearch cio_study_1009yisbat
 
MANAGEMENT SCIENCE VIII UNIT PPT CONTEMPORARY ISSUES OF MANAGEMENT
MANAGEMENT SCIENCE VIII UNIT PPT CONTEMPORARY ISSUES OF MANAGEMENTMANAGEMENT SCIENCE VIII UNIT PPT CONTEMPORARY ISSUES OF MANAGEMENT
MANAGEMENT SCIENCE VIII UNIT PPT CONTEMPORARY ISSUES OF MANAGEMENTDr. Durgaprasad Navulla
 
Understanding_IT_Assets_Today
Understanding_IT_Assets_TodayUnderstanding_IT_Assets_Today
Understanding_IT_Assets_TodayDavid Messineo
 
IT Financial Management (ITFM) as a Service
IT Financial Management (ITFM) as a ServiceIT Financial Management (ITFM) as a Service
IT Financial Management (ITFM) as a ServicePete Hidalgo
 
First Peoples Plus Green Forms And Adobe Live Cycle
First Peoples Plus   Green Forms And Adobe Live CycleFirst Peoples Plus   Green Forms And Adobe Live Cycle
First Peoples Plus Green Forms And Adobe Live CycleFirst Peoples Plus
 

Tendances (20)

3gamma insights - Managing techonlogy in an ever-changing environment
3gamma insights - Managing techonlogy in an ever-changing environment3gamma insights - Managing techonlogy in an ever-changing environment
3gamma insights - Managing techonlogy in an ever-changing environment
 
4. mba 204 management information systems assignment 2nd semester
4. mba 204 management information systems assignment 2nd semester4. mba 204 management information systems assignment 2nd semester
4. mba 204 management information systems assignment 2nd semester
 
Fostering Best Financial Strategies and Practices for Enterprise IT
Fostering Best Financial Strategies and Practices for Enterprise ITFostering Best Financial Strategies and Practices for Enterprise IT
Fostering Best Financial Strategies and Practices for Enterprise IT
 
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
 
Competing with information technology
Competing with information technologyCompeting with information technology
Competing with information technology
 
Technology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
Technology Cost Management 4D Framework: A Smarter Way to Manage IT CostsTechnology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
Technology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
 
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
 
Management Imperatives To Make IT Business-Smart
Management Imperatives To Make IT Business-SmartManagement Imperatives To Make IT Business-Smart
Management Imperatives To Make IT Business-Smart
 
The Application TCO Journey
The Application TCO JourneyThe Application TCO Journey
The Application TCO Journey
 
17 Must-Do's to Create a Product-Centric IT Organization
17 Must-Do's to Create a Product-Centric IT Organization17 Must-Do's to Create a Product-Centric IT Organization
17 Must-Do's to Create a Product-Centric IT Organization
 
Module 4 ERP and Selling Chain Management
Module 4 ERP and Selling Chain ManagementModule 4 ERP and Selling Chain Management
Module 4 ERP and Selling Chain Management
 
Strategic Alignment
Strategic AlignmentStrategic Alignment
Strategic Alignment
 
Digital procurement transformation_roadmap_2020
Digital procurement transformation_roadmap_2020Digital procurement transformation_roadmap_2020
Digital procurement transformation_roadmap_2020
 
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
 
Benefits
BenefitsBenefits
Benefits
 
Digital Fuel- Achieving IT cost visibility-Id gresearch cio_study_1009
Digital Fuel- Achieving IT cost visibility-Id gresearch cio_study_1009Digital Fuel- Achieving IT cost visibility-Id gresearch cio_study_1009
Digital Fuel- Achieving IT cost visibility-Id gresearch cio_study_1009
 
MANAGEMENT SCIENCE VIII UNIT PPT CONTEMPORARY ISSUES OF MANAGEMENT
MANAGEMENT SCIENCE VIII UNIT PPT CONTEMPORARY ISSUES OF MANAGEMENTMANAGEMENT SCIENCE VIII UNIT PPT CONTEMPORARY ISSUES OF MANAGEMENT
MANAGEMENT SCIENCE VIII UNIT PPT CONTEMPORARY ISSUES OF MANAGEMENT
 
Understanding_IT_Assets_Today
Understanding_IT_Assets_TodayUnderstanding_IT_Assets_Today
Understanding_IT_Assets_Today
 
IT Financial Management (ITFM) as a Service
IT Financial Management (ITFM) as a ServiceIT Financial Management (ITFM) as a Service
IT Financial Management (ITFM) as a Service
 
First Peoples Plus Green Forms And Adobe Live Cycle
First Peoples Plus   Green Forms And Adobe Live CycleFirst Peoples Plus   Green Forms And Adobe Live Cycle
First Peoples Plus Green Forms And Adobe Live Cycle
 

En vedette

Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)MShuibMJ
 
Risk Management
Risk ManagementRisk Management
Risk Managementrajuinstru
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programshaider ali
 
Strategic Knowledge Management
Strategic Knowledge ManagementStrategic Knowledge Management
Strategic Knowledge ManagementApoorva Rashmi
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Technology in scm
Technology in scmTechnology in scm
Technology in scmpartha247
 
Role of IT in Supply Chain Management
Role of IT in Supply Chain ManagementRole of IT in Supply Chain Management
Role of IT in Supply Chain ManagementSindoor Naik
 
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...Alan McSweeney
 
Role of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain ManageentRole of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain ManageentAnand Jha
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategyNorazila Mat
 
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING pter 007 instru...
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING  pter 007 instru...PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING  pter 007 instru...
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING pter 007 instru...Zamri Yahya
 
Strategic management and strategic planning
Strategic management and strategic planningStrategic management and strategic planning
Strategic management and strategic planningOvidijus Jurevicius
 
Business policy & Strategic Management for MBA
Business policy & Strategic Management for MBABusiness policy & Strategic Management for MBA
Business policy & Strategic Management for MBAUlhas Wadivkar
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1adpafit
 
Knowledge Management System & Technology
Knowledge Management System & TechnologyKnowledge Management System & Technology
Knowledge Management System & TechnologyElijah Ezendu
 

En vedette (20)

Chapter 03 it-8ed-volonino
Chapter 03 it-8ed-voloninoChapter 03 it-8ed-volonino
Chapter 03 it-8ed-volonino
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
 
Chapter 04 it-8ed-volonino
Chapter 04 it-8ed-voloninoChapter 04 it-8ed-volonino
Chapter 04 it-8ed-volonino
 
Strategic Knowledge Management
Strategic Knowledge ManagementStrategic Knowledge Management
Strategic Knowledge Management
 
Order processing
Order processingOrder processing
Order processing
 
Information system
Information systemInformation system
Information system
 
Technology in scm
Technology in scmTechnology in scm
Technology in scm
 
Role of IT in Supply Chain Management
Role of IT in Supply Chain ManagementRole of IT in Supply Chain Management
Role of IT in Supply Chain Management
 
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
 
Retrenchment Strategies
Retrenchment StrategiesRetrenchment Strategies
Retrenchment Strategies
 
Role of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain ManageentRole of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain Manageent
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategy
 
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING pter 007 instru...
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING  pter 007 instru...PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING  pter 007 instru...
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING pter 007 instru...
 
Strategic management and strategic planning
Strategic management and strategic planningStrategic management and strategic planning
Strategic management and strategic planning
 
Windows 10
Windows 10Windows 10
Windows 10
 
Business policy & Strategic Management for MBA
Business policy & Strategic Management for MBABusiness policy & Strategic Management for MBA
Business policy & Strategic Management for MBA
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
 
Knowledge Management System & Technology
Knowledge Management System & TechnologyKnowledge Management System & Technology
Knowledge Management System & Technology
 

Similaire à Strategic Management and Information Technology Outsourcing

Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom LineKeep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom LineCognizant
 
IT Outsourcing - Real Journey of Fortune 500 Company
IT Outsourcing - Real Journey of Fortune 500 CompanyIT Outsourcing - Real Journey of Fortune 500 Company
IT Outsourcing - Real Journey of Fortune 500 CompanyLokesh Grover
 
3gamma insights - Idea in brief - IT outsourcing in an ever-changing environment
3gamma insights - Idea in brief - IT outsourcing in an ever-changing environment3gamma insights - Idea in brief - IT outsourcing in an ever-changing environment
3gamma insights - Idea in brief - IT outsourcing in an ever-changing environment3gamma
 
P G 0 - 0 0 4 M A Y 0 6 , 2 0 1 1
 P G 0 - 0 0 4                 M A Y  0 6 ,  2 0 1 1   P G 0 - 0 0 4                 M A Y  0 6 ,  2 0 1 1
P G 0 - 0 0 4 M A Y 0 6 , 2 0 1 1 MoseStaton39
 
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
 P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1   P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1
P g 0 0 0 4 m a y 0 6 , 2 0 1 1 jasmin849794
 
Future of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paperFuture of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paperIBM
 
Key drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing DecisionKey drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing DecisionMindfire LLC
 
5 Steps to defining an effective IT strategy
5 Steps to defining an effective IT strategy5 Steps to defining an effective IT strategy
5 Steps to defining an effective IT strategyBarbara Briggs-Davies
 
The Role of IT in Supporting Mergers and Acquisitions
The Role of IT in Supporting Mergers and AcquisitionsThe Role of IT in Supporting Mergers and Acquisitions
The Role of IT in Supporting Mergers and AcquisitionsCognizant
 
FuturePMO 2018 - Michael Cooch PwC - The Future of Work - A Closer Look at Ar...
FuturePMO 2018 - Michael Cooch PwC - The Future of Work - A Closer Look at Ar...FuturePMO 2018 - Michael Cooch PwC - The Future of Work - A Closer Look at Ar...
FuturePMO 2018 - Michael Cooch PwC - The Future of Work - A Closer Look at Ar...Wellingtone
 
Literature Review On 3P Service
Literature Review On 3P ServiceLiterature Review On 3P Service
Literature Review On 3P ServiceNicole Stewart
 
Strategic Business IT alignment
Strategic Business IT alignmentStrategic Business IT alignment
Strategic Business IT alignmentJulen Mohanty
 
Whitepaper - Effective Business Analysis
Whitepaper - Effective Business AnalysisWhitepaper - Effective Business Analysis
Whitepaper - Effective Business AnalysisPeter Bricknell
 
259881368-Gartner-Research-ERP
259881368-Gartner-Research-ERP259881368-Gartner-Research-ERP
259881368-Gartner-Research-ERPGaurav Ahluwalia
 
IT outsourcing is not about cost savings
IT outsourcing is not about cost savingsIT outsourcing is not about cost savings
IT outsourcing is not about cost savingsWGroup
 
IT Portfolio Management Whitepaper FINAL
IT Portfolio Management Whitepaper FINALIT Portfolio Management Whitepaper FINAL
IT Portfolio Management Whitepaper FINALSteven Palmer
 
Business transformation and the cio role
Business transformation and the cio roleBusiness transformation and the cio role
Business transformation and the cio roleSalisu Borodo
 

Similaire à Strategic Management and Information Technology Outsourcing (20)

Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom LineKeep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
Keep on SMACking: Taking Social, Mobile, Analytics and Cloud to the Bottom Line
 
IT Outsourcing - Real Journey of Fortune 500 Company
IT Outsourcing - Real Journey of Fortune 500 CompanyIT Outsourcing - Real Journey of Fortune 500 Company
IT Outsourcing - Real Journey of Fortune 500 Company
 
3gamma insights - Idea in brief - IT outsourcing in an ever-changing environment
3gamma insights - Idea in brief - IT outsourcing in an ever-changing environment3gamma insights - Idea in brief - IT outsourcing in an ever-changing environment
3gamma insights - Idea in brief - IT outsourcing in an ever-changing environment
 
P G 0 - 0 0 4 M A Y 0 6 , 2 0 1 1
 P G 0 - 0 0 4                 M A Y  0 6 ,  2 0 1 1   P G 0 - 0 0 4                 M A Y  0 6 ,  2 0 1 1
P G 0 - 0 0 4 M A Y 0 6 , 2 0 1 1
 
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
 P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1   P g 0   0 0 4                 m a y  0 6 ,  2 0 1 1
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
 
Future of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paperFuture of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paper
 
Top 10 Pitfalls Of Am
Top 10 Pitfalls Of AmTop 10 Pitfalls Of Am
Top 10 Pitfalls Of Am
 
Key drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing DecisionKey drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing Decision
 
5 Steps to defining an effective IT strategy
5 Steps to defining an effective IT strategy5 Steps to defining an effective IT strategy
5 Steps to defining an effective IT strategy
 
The Role of IT in Supporting Mergers and Acquisitions
The Role of IT in Supporting Mergers and AcquisitionsThe Role of IT in Supporting Mergers and Acquisitions
The Role of IT in Supporting Mergers and Acquisitions
 
FuturePMO 2018 - Michael Cooch PwC - The Future of Work - A Closer Look at Ar...
FuturePMO 2018 - Michael Cooch PwC - The Future of Work - A Closer Look at Ar...FuturePMO 2018 - Michael Cooch PwC - The Future of Work - A Closer Look at Ar...
FuturePMO 2018 - Michael Cooch PwC - The Future of Work - A Closer Look at Ar...
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industry
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industry
 
Literature Review On 3P Service
Literature Review On 3P ServiceLiterature Review On 3P Service
Literature Review On 3P Service
 
Strategic Business IT alignment
Strategic Business IT alignmentStrategic Business IT alignment
Strategic Business IT alignment
 
Whitepaper - Effective Business Analysis
Whitepaper - Effective Business AnalysisWhitepaper - Effective Business Analysis
Whitepaper - Effective Business Analysis
 
259881368-Gartner-Research-ERP
259881368-Gartner-Research-ERP259881368-Gartner-Research-ERP
259881368-Gartner-Research-ERP
 
IT outsourcing is not about cost savings
IT outsourcing is not about cost savingsIT outsourcing is not about cost savings
IT outsourcing is not about cost savings
 
IT Portfolio Management Whitepaper FINAL
IT Portfolio Management Whitepaper FINALIT Portfolio Management Whitepaper FINAL
IT Portfolio Management Whitepaper FINAL
 
Business transformation and the cio role
Business transformation and the cio roleBusiness transformation and the cio role
Business transformation and the cio role
 

Plus de Farooq Omar

E-BOOK GUIDE FOR TRANSFORMATION MANAGERS.
E-BOOK GUIDE FOR TRANSFORMATION MANAGERS.E-BOOK GUIDE FOR TRANSFORMATION MANAGERS.
E-BOOK GUIDE FOR TRANSFORMATION MANAGERS.Farooq Omar
 
Creative destruction Economics, Business and Values
Creative destruction Economics, Business and ValuesCreative destruction Economics, Business and Values
Creative destruction Economics, Business and ValuesFarooq Omar
 
HR- Strategic Mandate
HR- Strategic MandateHR- Strategic Mandate
HR- Strategic MandateFarooq Omar
 
Leadership collective genius f (3)
Leadership collective genius f (3)Leadership collective genius f (3)
Leadership collective genius f (3)Farooq Omar
 
Injustice, betrayal, ropes and chains
Injustice, betrayal, ropes and chainsInjustice, betrayal, ropes and chains
Injustice, betrayal, ropes and chainsFarooq Omar
 
Artificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceArtificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceFarooq Omar
 
KPI Calculus for BSC Performance & Progress Estimation
KPI Calculus for BSC Performance & Progress EstimationKPI Calculus for BSC Performance & Progress Estimation
KPI Calculus for BSC Performance & Progress EstimationFarooq Omar
 
Situations and marketing interface
Situations and marketing interfaceSituations and marketing interface
Situations and marketing interfaceFarooq Omar
 
Strategic alignment with Bi and ROI Affect
Strategic alignment with Bi and ROI AffectStrategic alignment with Bi and ROI Affect
Strategic alignment with Bi and ROI AffectFarooq Omar
 
Scenario Analysis – Predictive Analytic Approach and Crafting Options
Scenario Analysis – Predictive Analytic Approach and Crafting OptionsScenario Analysis – Predictive Analytic Approach and Crafting Options
Scenario Analysis – Predictive Analytic Approach and Crafting OptionsFarooq Omar
 
Strategic alignment with bi and ROI Affect
Strategic alignment with bi and ROI AffectStrategic alignment with bi and ROI Affect
Strategic alignment with bi and ROI AffectFarooq Omar
 
Corporate turnaround in turbulent times fff
Corporate turnaround in turbulent times fffCorporate turnaround in turbulent times fff
Corporate turnaround in turbulent times fffFarooq Omar
 
Kpi optimization
Kpi optimizationKpi optimization
Kpi optimizationFarooq Omar
 
Artificial Intelligence Impacts
Artificial Intelligence ImpactsArtificial Intelligence Impacts
Artificial Intelligence ImpactsFarooq Omar
 
Strategy value ff
Strategy value  ffStrategy value  ff
Strategy value ffFarooq Omar
 
Business strategy value creation f_pdf
Business strategy value creation  f_pdfBusiness strategy value creation  f_pdf
Business strategy value creation f_pdfFarooq Omar
 
Some thoughts on economic activity and predictions farooq 2019 2
Some thoughts on economic activity and predictions farooq 2019 2Some thoughts on economic activity and predictions farooq 2019 2
Some thoughts on economic activity and predictions farooq 2019 2Farooq Omar
 
Farooq omar profile final -riz
Farooq  omar profile final -rizFarooq  omar profile final -riz
Farooq omar profile final -rizFarooq Omar
 
Farooq omar brief pro pdf
Farooq omar brief pro pdfFarooq omar brief pro pdf
Farooq omar brief pro pdfFarooq Omar
 
Strategy modeling from nature - contemplative study. Farooq Omar
Strategy modeling from nature  - contemplative study. Farooq OmarStrategy modeling from nature  - contemplative study. Farooq Omar
Strategy modeling from nature - contemplative study. Farooq OmarFarooq Omar
 

Plus de Farooq Omar (20)

E-BOOK GUIDE FOR TRANSFORMATION MANAGERS.
E-BOOK GUIDE FOR TRANSFORMATION MANAGERS.E-BOOK GUIDE FOR TRANSFORMATION MANAGERS.
E-BOOK GUIDE FOR TRANSFORMATION MANAGERS.
 
Creative destruction Economics, Business and Values
Creative destruction Economics, Business and ValuesCreative destruction Economics, Business and Values
Creative destruction Economics, Business and Values
 
HR- Strategic Mandate
HR- Strategic MandateHR- Strategic Mandate
HR- Strategic Mandate
 
Leadership collective genius f (3)
Leadership collective genius f (3)Leadership collective genius f (3)
Leadership collective genius f (3)
 
Injustice, betrayal, ropes and chains
Injustice, betrayal, ropes and chainsInjustice, betrayal, ropes and chains
Injustice, betrayal, ropes and chains
 
Artificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceArtificial intel impacts on organizational performance
Artificial intel impacts on organizational performance
 
KPI Calculus for BSC Performance & Progress Estimation
KPI Calculus for BSC Performance & Progress EstimationKPI Calculus for BSC Performance & Progress Estimation
KPI Calculus for BSC Performance & Progress Estimation
 
Situations and marketing interface
Situations and marketing interfaceSituations and marketing interface
Situations and marketing interface
 
Strategic alignment with Bi and ROI Affect
Strategic alignment with Bi and ROI AffectStrategic alignment with Bi and ROI Affect
Strategic alignment with Bi and ROI Affect
 
Scenario Analysis – Predictive Analytic Approach and Crafting Options
Scenario Analysis – Predictive Analytic Approach and Crafting OptionsScenario Analysis – Predictive Analytic Approach and Crafting Options
Scenario Analysis – Predictive Analytic Approach and Crafting Options
 
Strategic alignment with bi and ROI Affect
Strategic alignment with bi and ROI AffectStrategic alignment with bi and ROI Affect
Strategic alignment with bi and ROI Affect
 
Corporate turnaround in turbulent times fff
Corporate turnaround in turbulent times fffCorporate turnaround in turbulent times fff
Corporate turnaround in turbulent times fff
 
Kpi optimization
Kpi optimizationKpi optimization
Kpi optimization
 
Artificial Intelligence Impacts
Artificial Intelligence ImpactsArtificial Intelligence Impacts
Artificial Intelligence Impacts
 
Strategy value ff
Strategy value  ffStrategy value  ff
Strategy value ff
 
Business strategy value creation f_pdf
Business strategy value creation  f_pdfBusiness strategy value creation  f_pdf
Business strategy value creation f_pdf
 
Some thoughts on economic activity and predictions farooq 2019 2
Some thoughts on economic activity and predictions farooq 2019 2Some thoughts on economic activity and predictions farooq 2019 2
Some thoughts on economic activity and predictions farooq 2019 2
 
Farooq omar profile final -riz
Farooq  omar profile final -rizFarooq  omar profile final -riz
Farooq omar profile final -riz
 
Farooq omar brief pro pdf
Farooq omar brief pro pdfFarooq omar brief pro pdf
Farooq omar brief pro pdf
 
Strategy modeling from nature - contemplative study. Farooq Omar
Strategy modeling from nature  - contemplative study. Farooq OmarStrategy modeling from nature  - contemplative study. Farooq Omar
Strategy modeling from nature - contemplative study. Farooq Omar
 

Dernier

Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsyasinnathani
 
Entrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsEntrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsP&CO
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView
 
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptxHELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptxHelene Heckrotte
 
MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhangmcgroupjeya
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfHajeJanKamps
 
Upgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking ApplicationsUpgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking ApplicationsIntellect Design Arena Ltd
 
Anyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agencyAnyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agencyHanna Klim
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access
 
Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..dlewis191
 
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdf
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdfGraham and Doddsville - Issue 1 - Winter 2006 (1).pdf
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdfAnhNguyen97152
 
Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)Lviv Startup Club
 
NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023Steve Rader
 
Plano de marketing- inglês em formato ppt
Plano de marketing- inglês  em formato pptPlano de marketing- inglês  em formato ppt
Plano de marketing- inglês em formato pptElizangelaSoaresdaCo
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBBPMedia1
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessAPCO
 
Lecture_6.pptx English speaking easyb to
Lecture_6.pptx English speaking easyb toLecture_6.pptx English speaking easyb to
Lecture_6.pptx English speaking easyb toumarfarooquejamali32
 

Dernier (20)

Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story points
 
Entrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsEntrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizations
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
 
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptxHELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
 
MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhang
 
WAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdfWAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdf
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 
Upgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking ApplicationsUpgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking Applications
 
Anyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agencyAnyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agency
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024
 
Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..
 
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdf
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdfGraham and Doddsville - Issue 1 - Winter 2006 (1).pdf
Graham and Doddsville - Issue 1 - Winter 2006 (1).pdf
 
Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)
 
NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023
 
Plano de marketing- inglês em formato ppt
Plano de marketing- inglês  em formato pptPlano de marketing- inglês  em formato ppt
Plano de marketing- inglês em formato ppt
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
 
Lecture_6.pptx English speaking easyb to
Lecture_6.pptx English speaking easyb toLecture_6.pptx English speaking easyb to
Lecture_6.pptx English speaking easyb to
 

Strategic Management and Information Technology Outsourcing

  • 2. P a g e | 2 Table of Contents Introduction........................................................................................................................................3 Problem Statement.............................................................................................................................4 Strategic Project Management...........................................................................................................4 System Analysis and Design..............................................................................................................10 System and Network.........................................................................................................................13 IT Security.........................................................................................................................................14 Definitions........................................................................................................................................17 Outsourcing:.....................................................................................................................................17 Knowledge Process Outsourcing:......................................................................................................19 Recruitment Process Outsourcing (RPO):.........................................................................................20 In Sourcing:.......................................................................................................................................21 Strategic Management:....................................................................................................................21 Offshore Outsourcing:......................................................................................................................21 Near Shoring:....................................................................................................................................22 Information Technology Management ............................................................................................23 Impacts of Outsourcing.....................................................................................................................24 Supply Chain Management...............................................................................................................26 Supply Chain Technology..................................................................................................................27 Impacts for IT Companies.................................................................................................................31 Conclusion........................................................................................................................................32 References........................................................................................................................................34
  • 3. P a g e | 3 Introduction It is a fact that technology has not only changed the way of thinking but has also changed the way of working and living of the people. The world in which we live is run by the technology which is a wide area that includes processes such as computer software, computer hardware, information systems, data constructs and programming languages. There are varieties of functions which IT professionals have to perform that range from installing applications to designing complex database. Sometimes, it becomes difficult for a business to perform all the functions by itself and if a company realized that it does not have sufficient resources to accomplish those tasks then it makes contact with others companies to accomplish the work and take services of any other organization through outsourcing. Cost reductions, improved operational efficiency, abundance of skill manpower, global best practices are some other drivers for outsourcing (Jenyns, 2011). Purpose This study is also intended to explore the fundamental motives behind this increasing trend of US and Western organizations in sub-letting the business functions to off shore countries like India and China. It will also help to figure out the reasonably explained suggestions for viable managerial decisions related to IT management.
  • 4. P a g e | 4 Problem Statement Outsourcing has become a hot topic for debate recently, especially in the developed countries. Its boom is seen in the press during the recent global economic crisis. Voices in favor and it are heard and raised from common public to the high valued decisions makers and politicians of the society. Some say it’s a savior in these hard times for their companies and some argue it to be a job-killing process, initiated by the management. Outsourcing has now become a common practice because it gives countless advantages to parties, both hiring and the hired. This paper shall shed light on various advantages disadvantages, implications and impacts of outsourcing on the IT industry in the world, especially for the U.S. Strategic Project Management Through our research, we have arrived at the conclusion that in undertaking our outsourcing process, it will entail a very vigorous exercise in project management. Some of the key aspects of this will include the following: The specification requirements will need to be very clearly reviewed. Chances of these requirements being misunderstood are quite high when a project is being outsourced. It would perhaps be wise to inculcate these into the contract. A comprehensive requirements statement will also enable us to guesstimate the amount of work involved with the project, and to compare whether the vendor’s own projection for the same is plausible or not.
  • 5. P a g e | 5 It would also be imperative to do a thorough cost-benefit analysis for the outsourcing project. If the merits of outsourcing aren’t substantial enough, we may consider reversing our decision altogether. We will be sure to ascertain that all the relevant stake holders understand our decision and the factors that can cause it, including invisibility of operations, knowledge drain, and proprietary information being leaked outside our company. ITM is the perpective of strategic mananagemt , all resoures and parameter of organizational value chain are to be aligned, with emphasis on managing the information systems to facilitate th management of its decision making, based on the relevant management if ots information systm. To enable this a comprehensive ‘Management of informatuin system (MIS) plays the crucial part in collecting, organizing, filtering and dissemination of tailored (to specific needs) of the management is provided, which in turn assist in producing performance reports in ‘concise’ form to guage the ongoing strategic health of the organization. And, to make accurate changes its process, planning, modifying to revisit the organization’s deciosns making process and upgrading where neceaasy.
  • 6. P a g e | 6 In context of strategic management the role of IT is very crucial in producing ‘Balance Score Cards(BSC), stategy canvas and business modeling and keep up with the constant change in ‘Delta’, the rate of change in yhe external environment, and makes its simpler to induct relevant changes in oits processes in the right direction. The main focus of use of IT is to create value generation through the use of information technology ,with an intent of using it as a strong viable source in the strategic process. The It infrastructure has to be higly integerative to be able create ‘synergy’ across the board of the organzational value chain as a team effort, to be useful. The management needs to design, use its IT strength to build a collaborative, integrated and focused infracture which is more customer and product centric and get in involved in establishing relationships in terms of its both internal and external enviromnents., with a
  • 7. P a g e | 7 network of servers, storage of data, security network and its application management with agility, accuracy nas timeliness. We will also post a request for proposal or an RFP for our project. This will consist of all the details of our needs, management methods, etc. If necessary, we will employ an external consultant to secure the best outsourcing deal for us. The consultant may also be able to aid us in selecting the appropriate vendor, making sure that we have written a thorough request for proposal, and appraise any perspective vendor as well. An experienced, trustworthy manager will be assigned to oversee the execution of the entire IT outsourcing project. Our research has indicated to us that outsourcing demands an intricate set of management skills, and we will be very selective in who is chosen to be the manager for this project. Amongst the criteria for this selection will be the manager’s ability to appreciate cultural difference in working styles and communication. Very strong lines of communication and communication will be established with the party that we choose to outsource our project to. It will be enough to just review matters and take decisions at periodic meetings, or through perusing documents.
  • 8. P a g e | 8 We will need to be wary of vendors who bid at comparatively lower rates that what we expect. This could mean that they have either not grasped our requirements well enough, or are not giving much importance to our project. Concurrently, we will also ask for references from our vendors and also consider whether they have had long-term clients in the past. We will ask of our chosen vendor to provide a comprehensive project plan that encompasses all aspects of the project. Subsequently we will use Key Performance Indicators (KPI’s) to monitor the vendor’s performance and analyze it with the Key Success Factors of the industry similar to our design and structure. The importance of value relevancy is the key, when comparing and assessing the potential to the short listed vendor’s capacity to produce and provide ‘requirement specific model’ tailored to our exclusive needs. A framework will be asked as plan will be sought from the vendor. A comprehensive timeline and task design, execution, according to the established timeline will come under the ‘compliance’ clause of the proposal. We will approach this initiative through creating a ‘Matrix’ first to enable us the clarity needed, to what do we want, how we want and expectations from outsourcing and selecting the vendor.  Strategic enterprise architecture must have the requisites for turning around the project parameters to meet strategic intents  How would it change our prevailing set of processes  How we and the outsourcing medium will help in induction of exclusive Information technology, and risks involved.
  • 9. P a g e | 9 This would help us in defining what particular nomenclature will suit us to be inducted and executed in our structural design with minimum risk and cost-value effective at the same time in the long run. An important aspect to consider will be the transmission of knowledge to the vendor, and the time that this will consume. Additionally, we will also consider how our project may be impacted owing to a high rate of employee turnover at the vendor’s end. It wouldn’t be realistic on our part to expect cost efficiencies in the short run. There may be several related costs (travel etc) that will be incurred while the project is completely established as an outsourced venture. We will retain the original intellectual property rights and also conduct a full assessment, as discussed above of the vendor before signing off on the outsourcing project contract. Particularly, when any business decides to employ outsourcing project management services, that particular business must take services from a reliable advisor who can focus clearly on the bottom line. It must always be remembered that Return on Investment (ROI) is very important, and the same is the case with outsourcing projects. Hence, before initiating any project, it is always suggested to properly plan and make a rough sketch of the resources required. “We field a lot of questions about cost management and project management but sometimes it’s not easy to calculate ROI or to do it precisely. Companies want to know ROI even if it’s calculated under a rough-case scenario.” The vendor will be hired to design and implement the system and will be responsible to show the figures of improvement in the inducted processes and the cost benefit bench marks which
  • 10. P a g e | 10 were agreed upon. Any marked deviations from the outcomes, the vendor will compensate on free cost and time from his own resources or according to the mutually agreed clauses made during signing of the contract. System Analysis and Design IT is an ever expanding and developing industry for almost the last two decades. It has its own limitations and implications. In this industry, the outsourcing process exists with all of its complexities. It offers its advantages like the cost saving , better management of the available resources, improved quality of services, access and induction of proven intellectual, access to the well trained talents, risk mitigation and most importantly the ‘evidence based’ expertise. On the other hand, it has its disadvantages too, like the loss of managerial control, security issues, resistance from the local communities and sometimes quality problems. This paper shall shed light on various advantages, disadvantages, implications and impacts of outsourcing on the IT industry in the world especially in the U.S. The situation at present, its loopholes and positives shall be a part of this paper. After analyzing all the aspects of this issue / phenomenon, recommendations shall be given so as to best utilize the services of the officials in the best interest of the institution at the same time. As we conducted our research for outsourcing the IT project, we realized that we simply could not underestimate the significance of system analysis and design. In this day and age of when information is so widely available, all business organizations requires IT based solutions and systems it to function effectively and sustain growth.
  • 11. P a g e | 11 System Analysis and design is the method of designing information systems that make leverage the tools of information technology to provide support to the goals and objectives of an organization. There is usually a systems analyst whose function it is to work alongside the managers of the organizational value chain. There is a significant team work involved in system analysis, and this team comprises skilled people from both the IT as well as other departments who are relevant to organizational performance invariably. The vendor-organization interface would be developed to work with the different workers/managers on the issues of problem solving through creating and implementing cross organizational collaborative efforts to bind the vendor’s expertise with the organizational human capital. Cross collaboration is extremely important in order to decrease resistant level of the organizational workforce involved in this exercise, add clarity, interest and urgency to adapt while designing and implementing the system alongside the outsourced experts. It makes the whole exercise as the most viable learning tool as training & development, and also inculcate and develop in-house human minds with enough insights in developing newer system ‘in house’ for future needs of the organization, generating a workable and strategic value to the organization’s future requirements. The business can eventually develop and increase its own in-house project management competency with skillful outsourcing. If the development lies inside developed and acquired core competencies, then you can outsource only the more diverse technological aspect to project management as per new requirements.
  • 12. P a g e | 12 Our team of system analysts will concentrate on providing complete solutions that meet the client’s needs adequately and effectively as possible. Considerable emphasis will be laid on the significance of planning, analyzing, and developing solutions while the project infrastructure is being procured and laid out. At first, it would be critical to conduct a client needs analysis, following which, data will be gathered and analyzed to gauge the present day business set up as well as the way our resources are deployed. In developing solutions, a process map and blue print will be designed, based on the findings of the above exercises. The objective here would be to identify any possible bottle necks or issues that could arise in the future with our outsourcing project. Once the finalized decision is made for moving and handing over to outsource project management, it is essential to remain cautious regarding in-house project managers and properly ensure that the suitable internal links are recognized early with the external consultant leading the effort. There is always a heavy amount of leveraging possible which can be achieved if planned and executed properly. A bridge or link between the outside provider and within the project guides the company in its own project management competency and also augments other competencies.
  • 13. P a g e | 13 System and Network Here is another area which we have to consider with a great deal of thought, foresight, and intelligence. Employing the right people in the area of IT can be a daunting task. There are at least three important aspects that we will need to heed carefully.  There will need to have experienced director of IT, who should have requisite knowledge of information technology to be compensated well for the performing the tasks that are assigned to him. Similarly, the systems administrator or technical support staff will need to be assigned challenging tasks with more financial and motivational rewards, otherwise we may risk losing people with company secrets and also a human capital waste.  The IT personnel will also need to be managed properly. Good system administrators are often averse to looking after end-user technical support issues, while the end-user technical support staff often want to dabble into server maintenance and work with other, more sophisticated technology, but they are not knowledgeable enough to be allowed to do so.  System administrators and other IT staff are either overly occupied with work, or at times, simply have nothing more to do than just be there to address any IT issues that may arise. The organization nevertheless ends up paying them a consistent salary. In order to reconcile the risk of IT personnel turn over as well as the cost of keeping them, we will have to do some very careful financial planning. The IT infrasture has to be adopted which has the potential to provide our organization;
  • 14. P a g e | 14  Lower IT cost structure  Improve IT services relative to the best practice of ITM  Upgraded and continuous improvement centic and concentric  High deliverable standards for productivity improvement  High quality deliverables with respect to ‘out sourcing’- third party arrangements, most likely associated with ‘BS 15000 / ITIL standards. Also see. BSI Group, and (Information Technology Infrastructure Library) IT Security In order to ensure absolute security with outsourcing our IT project, we will take the following main measures:  Establish a solid security policy We will make sure primarily that our own business is in order, and that its security policy is strong and stringent based on modern security tools and methods and must to change periodically, including the key staff members and which excellent. The hardware and security software and allied equipment be based on excellent portability functions to interface other equipment and apt for further up gradation periodically.. There will be a data categorization that will separate the more sensitive data from the more routine information. As well, there will be
  • 15. P a g e | 15 standards and criteria in place that will be established with the consent of all the stakeholders, managers, and employees of our organization.  Choose The Right Outsourcing Vendor This will be a critical step in order for us to ensure that our chosen vendor strictly adheres to our stipulated security policy. We will also require of our vendor to have security rules and regulations established in his own company, in order to make sure that our data is well protected. Te organization should opt for vendors for outsourcing with who has the capacity to work under the principles and domain of ‘Infirmation-Technology and Research Advisory Services and Management. (ITSM). There are large number of registered vendors who operates in this domain. Making the choice, it is advisable to verify using the’ PinkVerify Tool set, version 3.1 or V- 2011 certication and authentication of the products, which meets the comatiability criteria if ITIL, pertaining to its overall and core suitability and integrative sustainability requirements.  Establish A Strong Privacy And Intellectual Policy We will be very clear with our vendor about this policy in order to avoid the risk of any misunderstanding arising at a late stage, by clearly defining our system’s requirement’s accessibility policy, rules and regulations. The intellectual information and data privacy and protection is a serious issue, especially where outsourcing and off sourcing takes place.
  • 16. P a g e | 16 The organization’s data may be very confidential, may have business growth secrets and other discreet nature of the information. The World Intellectual Property Organization ( WIPO), strongly suggests that before getting into a contract of such nature, a thorough and exhaustive audit and investigative process should take pace relating to ‘IP due diligence along with its attached risk evaluation. It will help the institution to assess in taking its decision on which information and sources of data should be kept in house and what to outsource? For this process a critical in house review should take place. It needs to define and explore parameters of ‘Due Diligence of IP, and then decide on the best courses of actions. This is a ‘loop’ step’, towards vendor selection as discussed above at the same time in relative terms.  Data protection Before we outsource our IT project, we will start using databases to invigilate gateways and application layer firewalls in order to establish the policies with regards to their usage. These devices can also avert any abuse and exploitation of our data and intellectual policy. Other measures to ensure that our privacy policy is strictly abided by will include educating personnel on data management, establishing the rule of minimal privilege, to access data by a single authority, developing a method to ensure leak-proof traffic, and making sure that application and network security audits are conducted on a regular basis.
  • 17. P a g e | 17 Definitions Some of the important terminologies are briefly defined here. Outsourcing: It is a process of contracting to a third-party or external provider for some business function or services. Outsourcing or sub-servicing often refers to the process of contracting to a third-party a
  • 18. P a g e | 18 specific job/s which may not be feasible to do in house or where there is lack of expertise is lacking to perform such tasks. Also, it is done to save costs by giving a portion of the project to a party to have better expertise in economies of scales as its strength. In Information technology this trend is becoming popular with passage of time by sub letting the components of job to different experts in their own field, which enables additional manpower hiring with added cost and more time spent on the project as a whole. It can be in the shape of large contracts covering many aspects of particular job, or even a full job to another company or even small information management and retrieval such surveys, emails, social media and blogs.
  • 19. P a g e | 19 Knowledge Process Outsourcing: In this form of outsourcing, knowledge and information-related work is done by third-party workers who are highly skilled and trained in their field. It is also called KPO, where crucial business or process information has a core value to the entire value chain of the organization. And, it has critical importance for the organization success. Where there is a dire need of specialized, highly analytical skill based experts can only perform such activities. It becomes imperative for the organization to outsource critical task to such professionals. Such practice can become to gain competitive advantage through such highly skilled and knowledge based professional’s comparative advantage of their expertise. Since this exercise is expensive, therefore, certain degree of risk is also attached with it, in case of failure to achieve desired results. Not, only the heavy amount will be lost, but it will create tremendous loss and destructions to the entire organizational value chain, and may lead to a collapse. Therefore, getting into it, a thorough instigative process and methodology be designed and strictly followed before KPO decision making. Following diagram sows an example of design structure and flow of the intended outcome which has a low probability of systematic risk occurrence. The people in charge should have an adequate knowledge behind the mechanics of KPO process and intellectually equipped to make in-depth scrutiny of adopting KPO and overseeing it by developing a real time monitoring and 360 feedback system for effective ᵒ control, along with personal involvement.
  • 20. P a g e | 20 by Carlos Sanchez Ivy business journal Strategy | May / June 2010 Recruitment Process Outsourcing (RPO): It is a form of outsourcing in which a company or organizations assigns all or some part of its recruitment activities to an external service provider. In this case, the RPO acts as seeker, recruiter and provider through entire recruitment and creating the job profiles, including technology based staffing and reporting. RPO enacts and enables organization’s the quality of hired staff, saves times to add value by selecting the most suitable talent pool through rigorous and comprehensive investigative tools, including ‘Raters Model’ based on quantitative and qualitative metrics with stringent compliance criteria.
  • 21. P a g e | 21 In Sourcing: It is the process of allocating tasks or jobs to an internal entity that is dedicated for that function and operation, in a manner that its value should supplement other tasks jobs and related objectives. It is relatively a new concept, and it emphasizes its conceptual design, as it pertains to using in house experts and specialists to fill in gaps in the current needs of the organization to perform certain tasks on temporary basis, before any other permanent arrangements becomes necessary. Strategic Management: Strategic means ‘long term’, and strategic management is set of leadership (including Board of Governors) intent starting from the organizational vision, mission, and set of processes aligned together to achieve instructional goals. The processes is designed to evolve a workable structure which is capable of functioning as a cohesive unit of inter-organizational ‘softer and harder’ competencies and capacity to formulate goal plans, planning, formulating action plans into set of interlinked change adaptive objectives to form a ‘strategy’. Implementation of strategy with effective system control systems to attain its goals. Offshore Outsourcing: It is the practice of assigning some business functions of organizational value chain to an external organization that is located in a country other than the country of the outsourcing
  • 22. P a g e | 22 organization, with an objective of transfer of technology at a lesser cost to gain comparative advantage and improve cost-efficiency ratio. This is usually done by hiring the services from another firm’s expertise from another country to supplement the hiring company’s business operations. With the advent of internet, it has become easier to hire the services of individuals as freelancers to provide the skills and expertise from all over the world. It reduces the cost o operations and also develops a large data base source for the organization. It has a tremendous value of having large labor at considerable lower costs, irrespective to the size and functions of the company¹. This type of planning model is also known as’ Remote In-Sourcing’, which help companies to seek and acquire required resources which are available in different geographical environments. This helps creating in house specific indentified by workforce working for the client in collaboration with the client’s chosen workers, which creates an atmosphere of ‘on job consultancy and training environment’. Near Shoring: It is the practice of outsourcing some business function to nearby country often that shares the border with country of the outsourcing organization in case it has the required technology, expertise and manpower with a lower cost structure.
  • 23. P a g e | 23 However, this concept is based on placements of business operations near to the locations where suppliers and small manufactures are located with adequate technology to manufacture specific components which the organization does not want to expand its manufacturing facilities. Near shoring trend is on the increase in recent times, as more and more organizations has started to increase their production and manufacturing in U.S, relying lesser on foreign producers, The prime examples are GM, caterpillar, Apple ad Ford. Main assessment parameters to evaluate in this scenario are the ‘type of delivery needs, like agility, which is customer centric and switching costs pertaining to technology, fuel, quality in contrast to organization’s own cost-benefit ratio in correlations with cost differentials Organizations tends to locate some their operations where the end users are close by and also have better logistics and distribution system to cover the nearby markets. The main objective is to save supply chain and logistic costs². Information Technology Management It is a process of managing IT resources like hardware, software, data, networks and the staff related to an organization in conjunction with the established organization’s priorities for the better utilization and betterment of the concerned organization. The objective behind ITM is the generation of different set of values needed for the formulation and execution of organization’s action plans and strategies. ITM to be successful, it needs a perfect and harmonized alignment with organizational planning, strategy formulation, execution
  • 24. P a g e | 24 and control systems. The quality of ITM has a direct bearing n the system dynamics of the organization. In designing ITM methodologies, the models based of ‘system thinking’ should be mostly used. Impacts of Outsourcing There are many reasons, due to which an IT company would opt for outsourcing. Both the hiring and the hired countries benefit from it. The company hired earns money while the hiring company gets the work done in much less cost. Thus, many think that it is a win-win process. Outsourcing does help to reduce the burden and the huge stack of work on any company. Now, the company can give some IT work to another company and thus can focus more productively on the other core issues (wisegeek, 2011). Outsourcing has made available to the companies a world-wide pool of professionals and experts of IT. They now can choose the one with most skills and lowest costs. In such competition bargaining is also not a big problem. Professionals lower their demanded costs to get the job. For example, DuPont is an American IT based company that was able to complete the project within deadline, only because it had outsourced with China. It also saved a lot of cost on the 24 hour application, for DuPont. Thus, outsourcing has positively impacted the IT industry because when companies manage to get work done at lower cost, the chances increases that most of the people will be able to afford IT products due to their reasonable cost. The trend of outsourcing has increased in the U.S. because the IT talent is depleting there. So there is a bad need for IT related skills in the U.S. for which the companies have to hire
  • 25. P a g e | 25 other companies to get the quality work done related to Information Technology (Jenyns, 2011). There are also some gaps which have been created in the IT industry due to outsourcing. However, there are some proponents of outsourcing. An Increase in outsourcing in the IT department is results in frustration in for those who do not have requisite competencies t remain employed. Episodes where unions have also formed against this model, strikes and riots have also resulted to reduce this practice because the workforce saw it as a threat. They feel that their country is no more loyal to them or else they would not have to reach out to hire people for the work. The country gets dependent on some other country to get the task performed. The new and talented IT people of their own country are not given a chance to be innovative or creative either. This is a big handicap for the IT graduates or with adequate knowhow. IT problems are usually generic and there may be a new answer to every next query (Doerken, 2005). The trade balances of the countries also get affected by outsourcing, due to the economical, political and social negative impacts. President Barack Obama is totally against outsourcing and has tried many times to put an end to it in the U.S. On Sept 10, 2010 he started a campaign and announced that he would be giving tax compensations to only those companies who will provide jobs to U.S. citizens. He said that, “All firms that would innovate in the US would get tax breaks”. He also told that outsourcing is the reason for unemployment and economic recession in the country (Times of India, 2010). This clearly shows how harmful outsourcing has been to USA when extensively used.
  • 26. P a g e | 26 Supply Chain Management With the tremendous surge in outsourcing, a large amount of functions are deployed with external, third party organizations. This is perceived as a strategic method to synchronize the supply chain with the company’s growth path, as well as a smart way to contain service delivery and other costs. Outsourcing projects to overseas companies has gained particularly in prominence. Supply chain management has thus developed as a global operation. We are well aware that offshore outsourcing is a very competitive need for our organization. Accordingly, it is imperative for us to be successful that we manage the extended supply chain meticulously. This would take into account time and distance, the demands and methodologies of our vendor, and managing the supply chain with regards to various other costs, transparency, co-ordination, communication, integration, and flexibility. In order to appropriately manage our outsourced project, we will have to consider availing the services of outsourced logistics providers. This may serve to our completely transform our supply chain, but on a positive note, this may also result in a more efficient usage of time and inventory. Alternatively, we may concentrate on the transportation of our project as the only requirement. The bottom line is that supply chain management will become a distinct area of management, which is the backbone of production and delivery process and most crucial factor
  • 27. P a g e | 27 (if done with innovation) in creating financial leverage between one organization and others in the industry. And, that leverage provides the biggest competitive advantage to the organization. It has to will to be very carefully re-assed and revamped qualitatively to ensure that the way it operates to reduce cost and add value to the end product, up to its delivery to the end user. This is a point of creating value advantage which can be spread across the board at all functions of the organization’s intent and organization-customer value proposition. Supply Chain Technology It is a fact that technology has not only changed the way of thinking but has also changed the way of people’s working and living. The world in which we live is run by the technology which is a wide area including processes such as computer software, computer hardware, information systems, data constructs and programming languages. There are varieties of functions which IT professionals have to perform that ranges from installing applications to designing complex database. The use of ITM is very crucial in management of supply operations and fuctions, and we need to have spscific design and structure which can add value in Cost-Value tradeoffs and lean processes.
  • 28. P a g e | 28 It needs to be done primarairly though;  Better planning to find out the best available concentration of sources of information on aggregate basis  Source relative to the core needs of processes in relation to its products needed design  Create methodogies and chosing production sites and locations.  Delivery of logistical channels, stock control, inventory and product deployment system.  Return of items, creating methodologies and suitable locations.
  • 29. P a g e | 29 The IT system will provide us real time analysis of comparisions of such supply chain parameters, interal vs the the external practices, outcomes, and generate reliable information to make timely amendments in our supply chain matrix. The system will run on producing advantages and comparative values-leverage through; · Agility · Responsive quality · Asset Costs · Relibilty · Forecasting capacity · Processes evalution and review resultants. · Reducing distribution cost, time and enhancing logistics productivity.
  • 30. P a g e | 30 Other than outsourcing, another way for IT industry to substitute a service from any foreign source is off shoring. It can either be production off shoring or service off shoring. Furthermore, companies also opt for out tasking approach to drive down information technology cost which allows the business to turn over a specific IT operation to another organization, instead of entire IT function in contrast to outsourcing. Only the supply chain processes which are or cannot be cost-time-value efficient in most cases should need to be out sourced. Global evidence shows that inefficient supply chain costs incurred can be between 50 to 70 percent f the total processes, and using expert systems including IT based system can cut 25 to 35 percent of these cost, which can be added to the products value and pass it in to the customers. The end value can be seen between the manufacturing process and what cost the end user is willing to pay for its purchase as a
  • 31. P a g e | 31 ‘transaction cost’? The efficacy of this multidirectional relationship between two or entities must have common economic parameters with interdependent investments and coordinated interests to be successful (Harold Malmgren (1961). At present time it has become an international standard to adapt to this concept. Globalization has done much for such concepts and models to be built around the cost-value and timeline relationship. Impacts for IT Companies Outsourcing has now become a common practice because it gives countless advantages to parties, both hiring and the hired. The major benefits of outsourcing are stated below: 1) The cost of labor is less in the developing countries. The developed countries take advantage from it and instead of using their expensive labor they hire equally, or even more, talented people of the third world countries, like India. 2) The increase in global and local market shares has brought the whole world under great competition. The companies think that if their rivals are benefiting from outsourcing then they should also get the benefit from it. 3) More time can be spent on the core strategic issues of the company, if some tasks are outsourced. The outsourcing provides many benefits, but there are also some weaknesses which cannot be ignored at the same time. In outsourcing the company completely put its trust and confidence in the hired company and expects them to complete the task in the expected time. This may not
  • 32. P a g e | 32 always be the case; the company may not even get satisfactory results. It is the hiring company that will lose customers and will be questioned. Their reputation will be at stake, for trusting the wrong people. The company will also lose control of the department they have given someone else to manage. But in the end, a business has to take some effective measures including risks to prosper, and also, more and more IT security systems are developed each day to offset or minimize such risks. Internal risks are also there for unethical access of data and information, therefore, one should apply the best security practices to secure its ITM and look forward to growth. Hackers all over the world can hack almost any system for their malicious intents and nobody can stop them, except to be more vigilant and keep on developing more secure IT protocols. Conclusion Every model has its own advantages and disadvantages. It is up to the company to choose how they want to reduce the workload on them and take help from some other company or workforce. A new IT project should be thoroughly analyzed and then decision should be taken, whether it should be outsourced, off shored or out tasked. The company should not only think about their profits, but should also consider the betterment of the people and their country. The world has now become a global village and technology is what is running our lives, so better technology can help people to spend better life. Outsourcing, off shoring and out tasking has no doubt benefited the third world countries, but the negative impact which it had on the first world nations cannot be ignored as well. The people of these countries have become restless and
  • 33. P a g e | 33 displeasing about their lost jobs. But the blame does not go on these approaches, but on the policies which have created the false image of these practices and caused outsourcing failure and heavy losses. Poor governance, lack of communication, lack of cultural misfit, lack of good policies are some of the reasons due to which many companies has burned their feet due to outsourcing. There is a need to create more awareness about the limitations on outsourcing, off shoring and out tasking. After conducting this research what we have found is that there are various limitations associated with the process of outsourcing and it has its own advantages and disadvantages associated at the same time. The basic limitation faced is the access to the actual current figures in this regard. As this process involves different companies situated within countries, it has made it harder to fully grasp the situation and discuss it in detail in this regard, but with the help of current available literature through book and online resources I have tried my level best to discuss major aspects in detail for evaluation.
  • 34. P a g e | 34 References Barack Obama targets outsourcing again. (Sep 10, 2010). The Times of India . ¹ Gartner Outlines the Top 10 Forces to Impact Outsourcing and IT Services Industry. Sep. 2010. http://www.gartner.com/newsroom/id/1433214 Delen, G. (2009). IT Outsourcing: An Introduction . Van Haren Publishing. Doerken (2005). Offshoring ... benefits the consumer. Retrieved from: http://www.usatoday.com/tech/techinvestor/industry/2005-01-16-dhl-advice_x.htm. Engardio, P. (2006, January 30). The Future Of Outsourcing . Retrieved from Business Week: http://www.businessweek.com/magazine/content/06_05/b3969401.htm Impact of Outsourcing. Retrieved from: http://www.wisegeek.com/what-is-outsourcing.htm Jenyns.(2011). 5 Top Reasons To Out-Task Your Business. Retrieved from: http://www.melbourneseoservices.com/out-task/. http://www.intetics.com/the-search-for-a-better-outsourcing-model-benefits-of-remote-insourcing/
  • 35. P a g e | 35 Veen, Annelies van der; Jan van Bon (2007). Foundations of ITIL V3. Van Haren Publishing. ISBN 978- 90-8753-057-0 Bird, M. (2010). Modern Management Guide to Information Technology. Create Space http://www.pinkelephant.com/PinkVERIFY/PinkVERIFY_2011_Toolsets.htm "PinkVERIFY 2011 Toolsets". Pink Elephant. April 2014 Malcolm Fry (2010). ITIL Lite. The Stationery Office. ISBN 978-0-11-331212-2. HROA Special Interest Group Publishes Definition of RPO, Feb. 19, 2009 BSI Group Fast Facts Sahay,S (2003). Global IT outsourcing: software development across borders . Cambridge University Press. Wijers, G. (2009). It Outsourcing: Contracting the Partner. Van Haren Publishing. ²April 2013 article in Entrepreneur Magazine (More Businesses Turn to 'Near-Sourcing' to Save Time and Money)