To see the other types of publications on this topic, follow the link: Information technology Contracting out.

Dissertations / Theses on the topic 'Information technology Contracting out'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 44 dissertations / theses for your research on the topic 'Information technology Contracting out.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

De, Jongh Henk. "Information technology outsourcing." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53467.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: The study project examines the concept of information technology (IT) outsourcing to external service providers. It is a relatively new concept in the South African scenario and there are many risks associated with the process that can cause a company to loose large amounts of money if outsourcing is not done right. The study project will aim to examine the most important aspects regarding IT outsourcing in order to reduce the risks associated with the process. The definition of IT outsourcing is the practice of transferring an organisation's computer centre operations, telecommunications networks, or applications development to external vendors of these services. There are different variations of outsourcing applicable to IT, for example: contracting out, outsourcing, in sourcing and co-sourcing. Companies have different reasons for outsourcing and the risks associated with the process have to be taken into account when embarking on an outsourcing initiative. With IT outsourcing there are different services that can be outsourced, for example: mainframe services, desktop computer services, security services and different application services. The decision to outsource a specific area of IT is a strategic issue and the risks, costs, and selection of the service provider are all very important factors to take into account. One of the main factors that any company should take into account when embarking on a big initiative is of course costs. The aim is the reduction of costs of the specific outsourced area. Therefore the necessary measures need to be in place to measure costs before and after the outsourcing process. It could happen that the outsourcing process do not provide the reduced cost benefits envisaged initially. This could be due to hidden costs that were not taken into account when the outsourcing initiative was planned. Normally the outsourcing process is driven by a structured project and numerous important factors need to be taken into account when managing the whole process. The factors include: the vendor evaluation process, setup of the service level agreement, the request for proposal, relationship with the supplier, communication of the whole process inside the company, the contract between the two parties, and the transition period with the measuring of results thereafter. The current IT skills shortage in South Africa is causing companies to rethink their IT strategies and make use of external service providers to supply them with the necessary skills to get the job done. The research illustrates this fact that IT consulting has one of the highest adoption rates currently and with regard to the future. Full blown outsourcing is still a relatively new concept in South Africa and companies will only adopt the concept as soon as it has proved to be successful and cost effective. As mentioned it is important that a structured methodology should be used to drive an outsourcing process. It is important that the approach is structured around proven project management principles with the correct measures in place to support and sustain the whole process. Outsourcing of IT services is a strategic decision that a company must take and the risks associated with the process mean that it must be planned and executed very carefully. Outsourcing has various risks associated with it like the appointment of the wrong service provider. However, the outsourcing process can also have its merits and the most important of these are most probably lower costs, new IT skills, and better service. The shortage of IT skills in South Africa makes the idea of outsourcing more and more attractive because of the fact that companies can now "buy" the skills without having to commit to long term permanent employment contracts for permanent staff.
AFRIKAANSE OPSOMMING: Die navorsingsverslag handel oor die konsep van uitkontraktering van inligtingstegnologie(IT) dienste aan eksterne diensverskaffers. Aangesien dit 'n relatiewe nuwe tendens in Suid Afrika se IT bedryf is, en die risiko bestaan dat 'n maatskappy groot geldelike verliese kan ly indien dit nie reg aangepak word nie, word daar gepoog om na die belangrikste aspekte van uitkontraktering te kyk om die risikos daaraan verbonde so laag as moontlik te hou. Die definisie van IT uitkontraktering is die oordrag van 'n organisasie se rekenaar sentrum operasies, telekommunikasie netwerk, of toepassing ontwikkeling na 'n eksterne verskaffer van hierdie dienste. Daar is verskillende variasies van uitkontraktering van toepassing op IT soos byvoorbeeld: uitkontraktering, inkontraktering, en gesamentlike kontraktering. Maatskappye het verskillende redes om 'n diens uit te kontrakteer en die risikos verbonde aan die proses moet sorgvuldig in gedagte gehou word wanneer die uitkontrakteringsproses aangepak word. Met IT uitkontraktering is daar verskillende dienste wat uitgekontrakteer kan word soos byvoorbeeld: hoofraam dienste, persoonlike rekenaar dienste, sekuriteitsdienste en verskeie rekenaar applikasie dienste. Die besluit om 'n spesifieke area van IT uit te kontrakteer is 'n strategiese kwessie vir die maatskappy en die risikos, kostes en keuse van eksterne diensverskaffer is almal baie belangrike faktore wat in gedagte gehou moet word. Een van die vernaamste faktore wat enige maatskappy in ag behoort te neem wanneer 'n groot inisiatief aangepak word, is natuurlik kostes. Die doel van uitkontraktering is om die kostes van die spesifieke area te verlaag. Daarom moet die nodige maatreëls in plek wees om die kostes vooraf en na die uitkontrakteringsproses te meet. Die uitkontraktering inisiatief kan die maatskappy egter baie duur te staan kom en glad nie die koste voordele bied wat aanvanklik beplan is nie. Dit kan wees as gevolg van verskuilde kostes wat nie met die beplanning van die proses in ag geneem is nie. Gewoonlik word die uitkontrakteringsproses gedryf deur 'n gestruktureerde projek en verskeie belangrike faktore moet in ag geneem word vir die hele proses. Die faktore sluit in: die evaluasieproses om die regte diensverskaffer aan te stel, die opstel van die regte dokumentasie in terme van die diensvoorstel voorlegging, verhouding met die diensverskaffer, die opstel van die diensvlak ooreenkoms, kommunikasie oor die hele proses binne die maatskappy, die kontrak tussen die twee partye, oorgangstadium en die meting van voordele daarna. Die huidige tekort aan IT vaardighede in Suid Afrika veroorsaak dat maatskappye hul IT strategie moet herdink en die opsie van eksterna diensverskaffers wat die nodige vaardighede kan verskaf, oorweeg word. Die studie illustreer hierdie feit dat IT konsultasie een van die hoogste vlakke van ingebruikneming tans en vir die toekoms het. Volledige IT funksie uitkontraktering is nog 'n relatiewe nuwe konsep in Suid Afrika en maatskappye sal slegs die idee aanneem sodra uitkontraktering as suksesvol en koste effektief bewys is. Soos reeds genoem is dit belangrik dat 'n gestruktureerde metodologie gebruik word om 'n uitkontrakteringsinisiatief te dryf. Dit is belangrik dat die aanslag geskoei is rondom bewese projekbestuursbeginsels en dat die regte maatreëls getref is om die proses te ondersteun. Uitkontraktering van IT dienste is 'n strategiese besluit wat 'n maatskappy moet neem. Die risikos daaraan verbonde veroorsaak dat die beplanning en aanpak van die proses baie deeglik en noukeurig gedoen moet word. Uitkontraktering het verskeie risikos soos om die verkeerde eksterne diensverskaffer te kies, maar kan ook voordelig vir die maatskappy wees en die grootste voordele wat 'n maatskappy kan verwag is verlaagde kostes en nuwe IT vaardighede. Die probleem van 'n tekort aan goed opgeleide IT personeel in Suid Afrika maak die idee van uitkontraktering al meer aanlokliker omdat dit 'n goeie manier is om goeie vaardighede in te "koop".
APA, Harvard, Vancouver, ISO, and other styles
2

Qu, Wen Guang. "Three essays on information technology sourcing : a multi-level perspective." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=115614.

Full text
Abstract:
Despite the amount of literature on the antecedents and outcomes of IT outsourcing, the vast majority of this research has focused on factors at the firm level. Environmental factors such as industry and country characteristics have received little attention. Environmental factors should be taken into account in IT outsourcing research because firms are open systems and their behaviors are significantly influenced by material-resource and institutional environments. Moreover, previous research at the firm level has not evaluated the effectiveness of IT outsourcing and insourcing in terms of how they create value for firms. To address the paucity of macro-level research in IT outsourcing as well as to augment our knowledge at the firm level, this thesis investigates IT outsourcing issues at three levels, namely, at the firm, industry, and country level. More specifically, I expand firm-level research by jointly examining the impacts of IT outsourcing and insourcing on IT-enabled organizational capabilities and firm performance (Essay #1). I also investigate the roles of industry-level factors such as munificence, dynamism, concentration, and capital intensity (Essay #2) and country-level variables such as the maturity of the IT-related legal system, generalized trust, uncertainty avoidance, Internet penetration, and the maturity of the IT outsourcing market of a country (Essay #3) in the diffusion of IT outsourcing practice.
APA, Harvard, Vancouver, ISO, and other styles
3

Qi, Cong. "Exploring the effects of relationship and contract issues on the success of IT outsourcing : an exploratory study in China /." View the Table of Contents & Abstract, 2008. http://sunzi.lib.hku.hk/hkuto/record/B40708731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Michael Alan. "An empirical investigation of the determinants of information systems outsourcing." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/29455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Makka, Ferrandi W. "A critical analysis of the information technology infrastructure outsource deal between Trans Hex Operations and Commsco." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/1595.

Full text
Abstract:
The outsourcing market for information technology services has been transformed over the last few years. Outsourcing, once inspired primarily by cost reductions, now forms part of overall company strategies in order to improve focus. Intent: The purpose of this research project is to conduct a critical analysis of the outsourcing of information technology infrastructure. In particular, this paper will focus on the process followed and on adherence to good corporate governance and business ethics. This dissertation addresses (i) the strategic reasons for outsourcing, (ii) reasons for not outsourcing, (iii) the different types of models available, (iv) the outsourcing process to follow, and (v) the risks associated with outsourcing. These five aspects were all empirically tested in Trans Hex. Findings: The main findings were that (i) no recognized formal process had been followed; (ii) the risk profile of the outsourcing company changed and (iii) a post-outsourcing review is required to determine whether the process is working as planned and to identify opportunities for improvement. Conclusion: A new approach is needed to improve the viability and success of outsourcing information technology infrastructure. Based on the present findings it is argued that a holistic approach to information technology infrastructure outsourcing should be adopted which combines several outsourcing processes into a company-specific outsourcing process framework.
APA, Harvard, Vancouver, ISO, and other styles
6

Qi, Cong, and 亓聰. "Exploring the effects of relationship and contract issues on the success of IT outsourcing: an exploratorystudy in China." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40987619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Netterville, Ross Neil. "Information system outsourcing and strategic decision making : a meta-theoretic review of the literature." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80097.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2013.
ENGLISH ABSTRACT: Given the ubiquity of information systems and their importance for the functioning of organisations; understanding information systems and their impact on organisations has become critical for organisational success. The ability to effectively use information systems plays an increasing role in the success of organisations. There are many facets to understanding information systems in organisations, this thesis will assess the relationship between outsourcing an information system, and the strategic processes which lead to and are impacted by the outsourcing decision. The aim of this thesis is to deepen the understanding of decision making in the Information System Outsourcing literature by reflecting on the state of the literature from a research point of view. This thesis therefore undertakes a meta-theoretic review of the Information System Outsourcing literature, using journal articles, to get a general picture of the literature which will then be assessed in terms of the breadth of decision making perspectives which have been researched and the depth to which each perspective has been explored. First, the extent to which the development of the field of information system outsourcing resembles the development of the Information System Theory in general will be determined. This will be done by examining the history and development of the Information System Theory field, and examining the consequences of the fields’ rapid development for the legitimacy of the field. Next, criticisms which have been raised against the Information System Outsourcing literature will be identified and discussed, the primary criticism being the charge that the Information System Outsourcing field is broad in scope but shallow in its depth of understanding of decision making in the outsourcing processes. These criticisms, which are shared with the field of Information System Theory, are argued to arise from the history of rapid development of Information System Outsourcing. The potential consequences of these criticisms for Information System Outsourcing practitioners and researchers will also be discussed in order to establish the importance of evaluating the theme of Information System Outsourcing. Thirdly, a framework with which to test the criticism against the Information System Outsourcing literature will be developed. This framework will combine insights from decision theory with those of organisation theory. Finally; the framework will be used to analyse the Information System Outsourcing literature in order to verify or disprove the allegation of a broad but shallow understanding of decision making in Information System Outsourcing. This allegation will be addressed primarily through an analysis of the information system outsourcing literature in order to evaluate its depth. The analysis shows that the literature on Information System Outsourcing, whilst showing positive development, is not yet mature. The danger of the theme of Information System Outsourcing falling into an identity crisis like that faced by its parent field of Information Systems Theory still exists. The analysis also shows the areas in which the literature must develop in order to avoid an identity crisis. On meta-theoretical level, the value of returning to fundamental issues in Information Systems Outsourcing is shown through the use of decision theory and organisation theory.
AFRIKAANSE OPSOMMING: Gegewe die alomteenwoordigheid van inligtingstelsels en hul belang vir die funksionering van organisasies, het insig in inligtingstelsels en hul impak op organisasies van kritieke belang geword vir organisatoriese sukses. Die vermoë om inligtingstelsels effektief te gebruik, speel derhalwe ’n toenemende rol in die sukses van organisasies. Daar is egter baie dimensies van inligtingstelsels in organisasies. Hierdie tesis assesseer die verhouding tussen die uitkontraktering van 'n inligtingstelsel en die strategiese prosesse wat lei tot, en wat beïnvloed word deur, die besluit van die uitkontraktering. Die doel van hierdie tesis is om insig in die veld van inligtingstelseluitkontraktering te verdiep deur besinning oor die toestand van die veld vanuit 'n navorsing-oogpunt. Hierdie tesis onderneem dus 'n meta-teoretiese oorsig van die veld van Inligtingstelseluitkontraktering deur gebruik te maak van joernaalartikels. Die doel is om daarmee ’n algemene beeld te kry van die literatuur. Die literatuur word dan beoordeel in terme van die omvang van die onderwerpe wat nagevors is en die diepte waarop elke onderwerp ondersoek is. Eerstens word die mate van ooreenstemming tussen die ontwikkeling van die gebied van die Inligtingstelseluitkontraktering en die van algemene Inligtingsisteem Teorie bepaal. Dit sal gedoen word deur die geskiedenis en ontwikkeling van die Inligtingsisteem Teorie veld te ondersoek. Daarmee saam word konsekwensies van die gebied se snelle ontwikkeling vir die legitimiteit van die veld, ondersoek. Hierna word kritiek wat geopper is op die veld van Inligtingstelseluitkontraktering geïdentifiseer en bespreek. Die belangrikste kritiek is die klag dat die Inligtingstelseluitkontraktering veld wyd in omvang, maar vlak in sy diepte van begrip is. Dit word aangevoer dat hierdie kritiek, wat ook geld vir die veld van Inligtingsisteemteorie, die resultaat is van die geskiedenis van die snelle ontwikkeling van die gebied van Inligtingsisteemuitkontraktering. Die moontlike gevolge van hierdie kritiek vir praktisyns en navorsers in Inligtingsisteemuitkontraktering sal ook bespreek word ten einde die belang van die volgehoue evaluasie van die gebied van Inligtingsisteemuitkontraktering te verduidelik. Derdens word 'n raamwerk ontwikkel waarmee die kritiek teen die Inligtingsisteemuitkontraktering veld getoets kan word. Hierdie raamwerk kombineer insigte uit besluitnemingteorie met dié van organisasieteorie. Ten slotte sal die raamwerk gebruik word om die Inligtingsisteemuitkontraktering literatuur te ontleed ten einde die bewering van die breë maar vlak karakter daarvan te verifieer of te weerlê. Hierdie bewering sal hoofsaaklik deur middel van 'n analise van die Inligtingsisteemuitkontraktering literatuur aangespreek word ten einde die diepte daarvan te evalueer. Die ontleding van die Inligtingsisteemuitkontraktering veld toon positiewe ontwikkeling, ofskoon nie volwassenheid nie. Die gevaar dat die veld in 'n identiteitskrisis val, soos dié van die breër veld van Informasiesisteemteorie, bestaan steeds. Die analise toon ook die gebiede aan waarin die veld moet ontwikkel ten einde 'n identiteitskrisis te vermy. Op meta-teoretiese vlak word die waarde van ʼn terugkeer na fundamentele kwessies in Inligtingsisteemuitkontraktering getoon deur die gebruik van die besluitnemingsteorie en organisasieteorie.
APA, Harvard, Vancouver, ISO, and other styles
8

Basson, Delton Jade. "Managing infrastructure risks in information communication technology outsourced projects : a case study at Transnet, South Africa." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2535.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2017.
The balance between the dependency on Information and Communications Technology (ICT) and reducing costs has led to an increase in ICT outsourcing in many organisations. ICT outsourcing has benefits, but organisations have limited knowledge on information security and risks when outsourcing these functions. A lack of information security knowledge or a poor organisational risk culture carries the risk of project failure and security breaches. It is unclear how to manage information risks through the usage of ICT infrastructure risk management when outsourcing ICT projects, and this exposes organisations to ICT security risks. The aim of the study is to explore how a selected transport organisation can manage information risks through the usage of infrastructure risk management when outsourcing ICT projects. Two primary research questions are posed namely, “what information risks does the ICT department manage when outsourcing ICT projects?”, and “how can the ICT department protect their information through the usage of infrastructure risk management against ICT security threats when outsourcing ICT?” To answer these two questions, a study was conducted at a transport organisation in South Africa. A subjective ontological and interpretivist epistemological stance has been adopted and an inductive research approach was followed. The research strategy was a case study. Data for this study was gathered through interviews (17 in total) using semi-structured questionnaires. Data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, forty findings and eight themes were identified. The themes are ICT outsourcing, information risks, costs, ICT vendor dependency, vendor access and management, risk management, user awareness, and frameworks. Guidelines are proposed, comprising six primary components. The results point to gaps that need to be addressed to ensure that information is protected when outsourcing ICT projects. Measures need to be put in place and communication has to be improved among operating divisions. The findings lead to questions such as, ““how does business create an ICT security culture to ensure that information is protected at all times”, and “does vendor access management really get the necessary attention it requires?” Further studies on human behaviour towards ICT security is needed to ensure the protection of organisations against security risks.
APA, Harvard, Vancouver, ISO, and other styles
9

Makhubela, Sello. "SITA IT outsourcing framework." Thesis, Stellenbosch : Stellenbosch University, 2010. http://hdl.handle.net/10019.1/6400.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2010.
Purpose: The aim of this research is to establish an IT outsourcing framework to enable SITA to consider key IT outsourcing elements to provide the required IT outsourcing or similar services to its customers to better fulfil its mandate as outlined in the SITA Act and other related legislation. Design/methodology/approach: The information gathered from various literature sources was analysed, evaluated and assessed to determine trends, lessons learnt and pitfalls of IT outsourcing, and IT mergers and acquisitions to develop an IT outsourcing framework and approach. Findings: The IT outsourcing framework for SITA consists of customer value drivers (motivating factors), governance model, engagement and supplier management model, and business model as the key IT outsourcing elements that SITA must consider to successfully provide the required IT outsourcing or similar services to its customers to improve its credibility. Research limitations/implications: To extend this research, more work is necessary to assess each element of the framework to determine specific actions that must be taken to leverage on economies of scale, improve productivity and IT capability within Government departments. Practical implications: This framework is intended to provide SITA with guidelines and an approach that may be used to successfully respond to the customers requests respond to the IT operations of its customers or to collaborate with the customer in providing its IT outsourcing services. Originality/value: This research will contribute towards establishing the best practices for agencies like SITA to successfully provide IT outsourcing services to Government.
APA, Harvard, Vancouver, ISO, and other styles
10

Faoro, Roberta Rodrigues. "O compartilhamento do conhecimento, a capacidade absortiva e a inovação nos relacionamentos interorganizacionais do tipo de terceirização de tecnologia da informação." reponame:Repositório Institucional da UCS, 2015. https://repositorio.ucs.br/handle/11338/920.

Full text
Abstract:
Esta tese apresenta uma análise do compartilhamento do conhecimento, da capacidade absortiva e da inovação nos relacionamentos interorganizacionais do tipo terceirização de Tecnologia da Informação. Assim sendo, o objetivo desta tese é propor um framework que relacione o compartilhamento do conhecimento, a capacidade absortiva e a inovação nos relacionamentos interorganizacionais do tipo terceirização de tecnologia da informação. Para responder a seguinte questão de pesquisa: Como se caracteriza a relação entre o compartilhamento do conhecimento, a capacidade absortiva e a inovação nos relacionamentos interorganizacionais do tipo terceirização de tecnologia da informação. Esta pesquisa é exploratória, de natureza qualitativa e utilizando como estratégia o estudo de casos múltiplos, onde foram analisadas 12 empresas em ambientes de terceirização de TI, sendo 4 empresas fornecedoras de TI e 8 empresas clientes de TI. Os critérios para a seleção das empresas foram: em primeiro lugar, as empresas deveriam ter relacionamentos interorganizacionais do tipo terceirização de ERPs, em que os processos de compartilhamento do conhecimento estejam presentes. Outro critério para a seleção dos casos foi a diversidade de segmentos de atuação das empresas clientes de ERPs para, com isso, tentar evitar a contaminação pelas características especiais de cada segmento de atuação, ou seja, tentou-se reduzir algum viés relacionado aos segmentos de atuação das empresas. Associado a isso, o último critério utilizado para a seleção das empresas clientes de ERPs foi a existência de alguma dependência destas empresas em relação ao software ERP para a implementação de suas estratégias e operações. Os dados foram coletados através de entrevistas semiestruturadas, documentos e observação direta. Após a coleta dos dados, os casos foram analisados individualmente, e posteriormente comparados, buscando convergências e divergências, tentando estabelecer um perfil de comportamento quanto ao compartilhamento do conhecimento, a capacidade absortiva e a inovação nos relacionamentos interorganizacionais, para operacionalização do tratamento dos dados foi utilizado o software de análise qualitativa dos dados chamado MAXQDA® for Mac. Ainda, com a intenção de sanar eventuais problemas na realização da pesquisa, foram tomados alguns cuidados e procedimentos que aumentarão a validade e a confiabilidade da pesquisa. Foram utilizados os critérios de validade do constructo, validade externa e confiabilidade. Os principais resultados encontrados na pesquisa foram, a relação entre o compartilhamento do conhecimento e da capacidade absortiva mostrou estar relacionado positivamente para a existência de inovação no ambiente de terceirização de TI, dizendo de outra forma, quanto maior for a capacidade da empresa de absorver o conhecimento compartilhado através da terceirização de TI, maior a possibilidade de inovação neste ambiente. Outro achado, foi em relação à decisão da terceirização do ERP, ou seja, pôde-se perceber que os motivos das “empresas clientes” terceirizarem seus ERPs, podem estar relacionados com o compartilhamento do conhecimento, a capacidade absortiva e a inovação. Por fim, esta pesquisa fornece compreensões acerca dos fenômenos compartilhamento de conhecimento, capacidade absortiva e inovação em ambientes de terceirização da TI, pois estes fenômenos foram compreendidos a partir de uma nova perspectiva, ou seja, analisados em conjunto e num ambiente próprio, o da terceirização da TI.
Submitted by Ana Guimarães Pereira (agpereir@ucs.br) on 2015-04-01T13:48:09Z No. of bitstreams: 1 Tese Roberta Rodrigues Faoro.pdf: 2638943 bytes, checksum: f1c1fc15efd4e7aefb9530e52878c32c (MD5)
Made available in DSpace on 2015-04-01T13:48:09Z (GMT). No. of bitstreams: 1 Tese Roberta Rodrigues Faoro.pdf: 2638943 bytes, checksum: f1c1fc15efd4e7aefb9530e52878c32c (MD5)
This thesis presents an analysis of the sharing of knowledge, absorptive capacity and innovation in the inter-relationships of the type outsourcing information technology. Therefore, the objective of this thesis is to propose a framework that links knowledge sharing, absorptive capacity and innovation in interorganizational relationships of the type of outsourcing information technology. To answer the following research question: How do you characterize the relationship between knowledge sharing, absorptive capacity and innovation in interorganizational relationships of the type of outsourcing information technology. This research is exploratory, qualitative and using as a strategy the multiple case study, where 12 companies were analyzed in IT outsourcing environments, 4 suppliers of IT and IT 8 client companies. The criteria for the selection of companies were: first, the companies should have inter-relationships of the type outsourcing ERP, in which knowledge sharing processes are present. Another criterion for the selection of cases was the diversity of business segments of ERP customers to companies, therefore, try to avoid contamination by the special characteristics of each business segment, ie, we attempted to reduce any bias related to the segments of performance of companies. Associated with this, the last criterion for the selection of ERP business customers was the existence of any dependency on these companies in relation to ERP software for the implementation of their strategies and operations. Data were collected through semi-structured interviews, documents and direct observation. After collecting the data, the cases were analyzed individually and then compared, looking for similarities and differences, trying to establish a profile of behavior regarding the sharing of knowledge, absorptive capacity and innovation in interorganizational relationships, for operationalization of data treatment was used a software of analysis of data qualitative called MAXQDA® for Mac. Still, with the intention to re medy any problems conducting the survey, were taken some precautions and procedures that increase the validity and reliability of the research. We used the construct validity criteria, external validity and reliability. The main results found in the survey were, the relationship between knowledge sharing and absorptive capacity shown to be positively related existence of innovation in IT outsourcing environment, to put it another way, the greater is company ability to absorb knowledge shared by IT outsourcing, the greater the likelihood of innovation in this environment. Another finding was related to the ERP outsourcing decision, ie, we could realize that the reasons for the "client companies" outsource their ERPs, may be related to the sharing of knowledge, absorptive capacity and innovation. Finally, this research provides understandings about knowledge sharing phenomena, absorptive capacity and innovation in the IT outsourcing environments, as these phenomena are understood from a new perspective, that is, taken together and in own environment, the IT outsourcing.
APA, Harvard, Vancouver, ISO, and other styles
11

Nagpal, Pankaj. "Towards a Theory of Controls in Information Technology Outsourcing Success: A Multimethod Study." Cleveland, Ohio : Case Western Reserve University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244230836.

Full text
Abstract:
Thesis (Ph.D.)--Case Western Reserve University, 2009
Department of Information Systems Weatherhead School of Management Includes abstract Includes bibliographical references Available online via the OhioLINK ETD Center
APA, Harvard, Vancouver, ISO, and other styles
12

Yun, Sungho. "Essays on information management and supervisory opportunism /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/7474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Randall, Derek A. Seaberry Charles M. "Contingency contracting and the it manager today's challenges and future implications /." Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FRandall.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2009. Thesis (M.B.A.)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Barreto, Albert. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Contingency, Contracting, Information Technology, Information Technology Management, Defense Contracting, Case Study, Interview, Survey, Procurement, Contract Management, Contractor, Iraq, Army, Gansler. Includes bibliographical references (p. 117-120). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
14

Tong, Shilu. "Contracting and information sharing under supply chain competition /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ISMT%202007%20TONG.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Peak, Daniel Alan. "The Risks and Effects of Outsourcing on the Information Systems Function and the Firm." Thesis, University of North Texas, 1994. https://digital.library.unt.edu/ark:/67531/metadc279257/.

Full text
Abstract:
IS outsourcing, especially large-scale IS outsourcing, is a comparatively recent and rapidly growing IS phenomenon, but it is also an inherently risky activity. In an IS outsourcing arrangement, the outsourcing vendor accepts responsibility for IS resources and functions formerly controlled directly by the firm. This research examines IS outsourcing from two perspectives. (1) From an IS perspective, it examines the risk perceptions of IS managers of fourteen Fortune-500 firms who had recently conducted an outsourcing evaluation. (2) From a financial perspective, it examines the theoretical relationship of IS outsourcing with financial performance, and investigates the empirical effects of IS outsourcing on the firm's market value and market risk. This research views IS outsourcing as an independent variable whose effects on the firm may be measured as changes in security returns, changes in asset risk, changes in capital structure, and long-term changes in profitability. To accomplish this, it characterizes IS outsourcing as a sale-and-leaseback transaction.
APA, Harvard, Vancouver, ISO, and other styles
16

Lewis, Angela (Tidwell). "The effects of information sharing, organizational capability and relationship characteristics on outsourcing performance in the supply chain an empirical study /." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1154620550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Merryman, Walter Emerson. "Bodies In and Out of Information: Consumption and Life in the Virtual." Bowling Green State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1404483340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Mui, Angela Koh Ser. "Investigation of IT/IS Outsourcing in Singapore." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4123.

Full text
Abstract:
The concept of outsourcing information technology (IT) or systems (IS) has been around since mid 1960s. Today, outsourcing has become a potentially viable business solution that many IT managers are looking into in order to remain competitive in the current dynamic business and technological environment. In Singapore, the recent IT outsourcing by DBS Bank has raised the awareness and sparked off the interest to conduct this study. The purpose of this thesis is therefore to investigate this latest IT trend and to look into the concepts and practice of outsourcing in Singapore. An intensive literature review and an empirical survey based on questionnaire technique were conducted to learn about outsourcing concepts and practices. In the literature review, the concepts of outsourcing were explored. The different types of outsourcing practices and trends, categories of outsourcing services, drivers, benefits, risks, challenges and critical success factors of outsourcing based on the lessons learnt from past outsourcing experiences were discussed while the survey assessed the IT/IS outsourcing trend in Singapore. The survey revealed that outsourcing has been a positive experience. Generally, there are differences in views between people of different roles and there is a gap in the understanding and practice of IT/IS outsourcing in Singapore in comparison to the literature.It is learnt in this study that outsourcing is not a perfect and workable solution for everyone. Organizations should always stand back and examine the outsourcing option. The bottom line is outsourcing should always be backed by an objective business case. It should be not a decision that blindly follows the market trend. Organizations should not simply jump into the outsourcing bandwagon without fully comprehending the outsourcing concept. Thorough evaluation of the feasibility of such business venture is necessary.
APA, Harvard, Vancouver, ISO, and other styles
19

Margetts, Helen Zerlina. "Computerisation in American and British central government 1975-95 : policy-making, internal regulation and contracting in information technology." Thesis, London School of Economics and Political Science (University of London), 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.339148.

Full text
Abstract:
This study explores twenty years of computerisation in central government in the USA and Britain. Information systems now lie deep in the heart of the 'tools' of government, dispensing treasure, authority and information, replacing organisational functions and creating new requirements for technical expertise. Traditional Public Administration pays little attention to the implications of this change, while approaches based on modernism attribute radical transformational powers to information technology. This study synthesises elements of postmodern and critical modern approaches, challenging assumptions of previous work. The US and Britain provide a fruitful site for comparison, with similar cultures, agency structure and contract providers, but contrasting legal systems, contracting traditions and regulatory approaches. Since the 1 970s, both governments have ceased direct involvement in producing information systems at the forefront of available technologies; in 1 995, both stand outside a contractor driven process. In the US spiralling regulations and competing oversight agencies have periodically threatened to strangle information technology development; in Britain absence of central guidance has led to potential loss of administrative and policy control. The computerisation of benefits delivery and tax collection in the two governments throughout the 1 980s illustrates the range of risks involved when central bureaucracies embarkon large-scale technology-based projects: problemsfor central oversight, difficulties in retaining policy flexibility and the dangers inherent in grand scheme designs. Information technology in the 1 990s provides increasing possibilities for policy innovation through systems integration and technological development. Decisions made in response to information technology problems during the last twenty years of computerisation in central government will dictate pathways available for policy in the future. Yet debate over crucial information technology issues currently takes place on the fringe of policy-related fields. This study provides a framework for resituating information technology policy on the centre stage of public policy and management.
APA, Harvard, Vancouver, ISO, and other styles
20

Rörsch, Jonatan, and Mikael Johansson. "Social Networks : Creating Organizational Benefits out of an Online Conversation." Thesis, Uppsala universitet, Industriell teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-207086.

Full text
Abstract:
Scania is increasing its production by improving its efficiency. The company is striving to achieve its new productivity goals without making large investments. In large organizations such as Scania there are many competent and skilled employees. However, since many of their offices are located worldwide communication is not always efficient and optimal. The purpose of this thesis is to show the potential benefits when implementing and operating online social networks within global organizations including Scania. Through empirical studies of global organizations which have utilized online social networks for a relatively long period this study intends to collect information which can help generate knowledge about the implementation and operation of online social networks. Our research revealed that important aspects of the implementation of an organization's online social network are knowledge management, dissemination, social ties and links between micro-and macro-networks. Thereby we concluded that online social networks lead to the creation of benefits for the individual as well as for the organization. Based on the theoretical framework and empirical evidence gathered in this study, we have concluded that an implemented model of an online social network fosters such benefits as improved communication channels and increased efficiency in the workplace.
APA, Harvard, Vancouver, ISO, and other styles
21

Sullivan, Joe. "How effective are UK policies at addressing factors affecting consumer decisions to carry out energy efficient renovation?" Thesis, Linnéuniversitetet, Institutionen för skog och träteknik (SOT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-66128.

Full text
Abstract:
The UK’s housing stock is among the oldest and least efficient in Europe. 85% of the UK’s existing homes will still be standing and in use in 2050. Improving the energy efficiency of UK housing stock is an essential requirement in order for the UK to meet its 2008 Climate Change Act obligations. Energy efficiency in buildings is the focus of European (EU) policies with the intention of creating a low-carbon economy by 2020. Reducing energy consumption in existing buildings is essential to achieving this. Government policies are the primary mechanism for lowering energy consumption through changing consumer behaviour, promoting low carbon technology and energy efficient renovations of old building stock.The objective of this thesis is to investigate the effectiveness of UK policies at addressing factors affecting consumer decisions to carry out energy efficient renovations. This is with the intention of determining if UK policies are effectively contributing to the government’s long term climate change commitments.Using a theory developed by Parker (2000) as a conceptual framing of policy compliance, this study conducts interviews with consumers in order to analyse their awareness, understanding and perception of UK energy efficiency policies. Therefore, it can be determined how effective policies are at affecting consumer decisions to carry out energy efficient renovations.The thesis informs that consumers are motivated and willing to comply with policies but there are several key barriers preventing them from complying with these policies and therefore adopting energy efficient renovations. Policies are deemed to be somewhat ineffective at affecting consumer decisions to carry out energy efficient renovations.
APA, Harvard, Vancouver, ISO, and other styles
22

Mcphail, Lyndsey. "'On being locked out' : the lived experience of mature, female student nurses and their use of Information, Communication, Technology (ICT) in one undergraduate Pre-Registration Nursing Programme." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/on-being-locked-out-the-lived-experience-of-mature-female-student-nurses-and-their-use-of-information-communication-technology-ict-in-one-undergraduate-preregistration-nursing-programme(c76281ee-4521-4064-87b1-ee27f356f8fb).html.

Full text
Abstract:
The explosion of Information, Communication and Technology (ICT) use over the last 10 years within healthcare, and particularly within nursing practice, is changing the ways in which patient care is delivered. However a concern highlighted by various policy review and research evidence is that barriers to ICT usage are experienced by some groups of student nurses, particularly those who are mature and female, in a way that constrains potential impact on their professional development. This research adds to and develops the research evidence in the field by examining in what ways, and the extent to which, a group of mature, female, nursing students utilise ICT within the boundaries of one pre-registration nursing programme based on partnership working between a School of Health situated within a large university and its related NHS Trusts. By way of a qualitative, case study approach this study examines the biographical, university and clinical placement use of ICT for this group of student nurses. Consideration is given to the interconnectedness of these experiences as these students begin to develop their professional identities and learning as nurses. The experiences of this group of students are determined through interviews and observation of clinical practice. Three research questions define the parameters of the research. These are: 1) How are mature, female nursing students accessing and using ICT within nursing education? 2) What are the barriers that may prevent mature, female students from accessing and using ICT within nursing education? 3) What actions do mature, female nursing students consider may be taken to improve their knowledge and subsequent use of ICT in both their academic studies and clinical placement work? Findings from the research suggest that experiences of ICT relate to biographical history and the extent to which student nurses are supported and encouraged to engage with ICT in their university programme and on clinical placement. In particular the data suggests that for many student nurses the feeling and experiences of being generationally, emotionally and hierarchically 'locked out' of using ICT raises real challenges for the extent to which government and regulatory policy is being effectively enacted for particular groups of student nurses. This study, therefore, contributes to knowledge in and around pedagogical practice for pre-registration nurse education programmes. In particular it raises the importance of locating policy development in this area around the explicit privileging and enabling of ICT usage in all practice situations. In other words the development of a collective efficacy in nurse pre-registration programmes that is suggestive of notions of being ICT 'logged in' rather than being 'locked out' for mature, female student nurses.
APA, Harvard, Vancouver, ISO, and other styles
23

Steele, Aaron. "Ontological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/946.

Full text
Abstract:
In order to keep shared access computers secure and stable system administrators resort to locking down the computing environment in order to prevent intentional and unintentional damage by users. Skilled attackers are often able to break out of locked down computing environments and intentionally misuse shared access computers. This misuse has resulted in cases of mass identity theft and fraud, some of which have had an estimated cost ranging in millions. In order to determine if it is possible to break out of locked down computing environments an assessment method is required. Although a number of vulnerability assessment techniques exist, none of the existing techniques are sufficient for assessing locked down shared access computers. This is due to the existing techniques focusing on traditional, application specific, software vulnerabilities. Break out path vulnerabilities (which are exploited by attackers in order to break out of locked down environments) differ substantially from traditional vulnerabilities, and as a consequence are not easily discovered using existing techniques. Ontologies can be thought of as a modelling technique that can be used to capture expert knowledge about a domain of interest. The method for discovering break out paths in locked down computers can be considered expert knowledge in the domain of shared access computer security. This research proposes an ontology based assessment process for discovering break out path vulnerabilities in locked down shared access computers. The proposed approach is called the ontological lockdown assessment process. The ontological lockdown assessment process is implemented against a real world system and successfully identifies numerous break out path vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
24

Reindl, Katharina. "Implementing energy measures in renovations for multi-family dwellings : Influence and practice of professionals." Doctoral thesis, Linköpings universitet, Tema teknik och social förändring, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139892.

Full text
Abstract:
Aging buildings will sooner or later be in need of renovation, which opens opportunities to reduce energy use. Even if economically feasible energy measures or technologies exist, they are not always implemented, leading to an energy efficiency gap. This dissertation deals with how energy measures are handled and why they are enabled or disabled during the planning and design of renovations. During renovations, different kinds of building professionals are engaged, here referred to as middle professionals. The meeting practice of the professionals is investigated, with a focus on how the middle professionals exert influence from the middle-out and to the top and bottom, and how and why they enable or disable measures aimed at energy efficiency or reduction. Three renovation projects are followed in the municipality-owned housing company Stångåstaden, in Linköping, Sweden. The housing company’s goal is to reduce the amount of purchased energy by 25% by 2025. Methods applied during the research are semi-structured interviews, participant observations and document analysis. The conclusions show that energy measures were implemented, but more can be done in renovations. Predefined meeting agendas make the process efficient but not flexible, thus it can be difficult to introduce innovations and alternative ways of thinking into the process. The professionals usually selected measures they had used before. Energy calculations attracted little interest compared to the aggregated knowledge from previous projects, and experience and tacit knowledge were highly valued. This and more lead to a renovation process where it is difficult for energy to enter the current meeting practice.
Byggnader behöver förr eller senare renoveras, vilket ger möjligheter att minska energianvändningen. Existerande energieffektiva och lönsamma åtgärder genomförs emellertid inte i tillräcklig utsträckning, det så kallade energieffektiviseringsgapet. Avhandlingen handlar om implementering av energieffektiviseringsåtgärder vid renovering av flerfamiljshus och varför vissa åtgärder genomförs medan andra väljs bort. I avhandlingen undersöks hur de professionella i mitten av beslutshierarkin, kan påverka implementeringen av energieffektiva åtgärder uppåt och nedåt i en organisation men även utåt, i en horisontell riktning. Undersökningen rör de professionella aktörernas inflytande i planerings- och designfasen, och hur de fattar beslut om att inkludera eller exkludera energieffektiva åtgärder. Studien omfattar tre renoveringsprojekt i det kommunägda bostadsbolaget Stångåstaden i Linköping. Bostadsbolagets mål är att minska mängden köpt energi med 25% till år 2025. Studien bygger på semistrukturerade intervjuer, deltagande observationer och dokumentanalys. Slutsatserna är att även om bostadsföretaget genomför energiåtgärder, kan mer göras i renoveringsprocesser för att förbättra energieffektiviteten. Förbestämda agendor på projektgruppsmötena gör processen effektiv men inte flexibel, och det kan vara svårt att introducera innovationer och alternativa sätt att tänka kring energi. De professionella i mitten valde oftast åtgärder som de tidigare hade använt, energiberäkningar spelade en liten roll och erfarenhetsbaserad kunskap värderades högt. Allt detta och mer leder till en renoveringsprocess där det är svårt att föra in energi i dagens mötespraktik.
APA, Harvard, Vancouver, ISO, and other styles
25

"Information technology : the outsourcing advantage." Thesis, 2012. http://hdl.handle.net/10210/5490.

Full text
Abstract:
M.Comm.
Changes occur rapidly in the Information Technology (IT) environment. It can be very costly to keep up with these rapid changes and at the same time specialist IT skills are hard to come by. Companies have to re-strategize to maintain their competitive advantages. This strategic business concept suggests that management must focus on specialisation, expertise and excellence. In an increasingly competitive and technological advanced world, business focus has shifted from simply minimising costs to maximising revenue. Companies are now focussing on their core competencies and are sourcing their non-core competencies to external providers (vendors). By distancing themselves from these non-core competencies, companies can focus their energy on areas where they have a competitive advantage. Companies enter into outsourcing arrangement's because they believe a vendor is better equipped to perform their IT functions. Outsourcing has become one of the most powerful, organisation-shaping management tools. For the customer outsourcing involves a proper definition of requirements, a detailed analysis and evaluation of potential vendors, developing the pricing structure and managing the outsourcing arrangement. The vendor needs to deliver a service according to specified service levels to which penalties and rewards are tied. An interdependency exists between the customer and the vendor. Change in the one affects the other. One of the key components for a successful outsourcing arrangement is that a company must never outsource the management of their Information Technology processes.
APA, Harvard, Vancouver, ISO, and other styles
26

Coetzee, Dirkie. "Information technology: management issues in outsource contracts." Thesis, 2008. http://hdl.handle.net/10210/266.

Full text
Abstract:
This study concerns the investigation of management issues within information technology outsourcing contracts. The information technology outsourcing life cycle is used as the flow structure for the investigation. The associated user expectations that occur in each of the phases of the information technology outsourcing life cycle are identified. Following the identification of the management and user expectation issues in each phase of the outsource life cycle, the “Coetzee solution framework” is introduced to ensure that the identified management problems are addressed in a structured approach. The solution framework is described in the context of each phase of the information technology outsourcing life cycle. As business process outsourcing is emerging as a long term business solution, the trends in business process outsourcing with the related factors that are contributing to the growth of business process outsourcing are investigated. The inhibitors that slow down the progress of acceptance for business process outsourcing are also investigated. The interdependence of information technology outsourcing and business process outsourcing is also shortly reviewed.
Prof. N. Lessing
APA, Harvard, Vancouver, ISO, and other styles
27

Hlawu-Chihwenga, Francis. "A study of information technology outsourcing practices." Thesis, 2013. http://hdl.handle.net/10210/8722.

Full text
Abstract:
M.Comm. (Computer Auditing)
It is undeniable that over the last couple of years information technology outsourcing has witnessed considerable success and growth in South Africa and the world at large. However, there have been a number of IT outsourcing failures as evidenced by the substantial number of organizations that outsourced their IT systems and then moved them back in-house, or outsourced to another service provider. This is proof that some of the practices inherent in IT outsourcing are flawed. In order to find out why IT outsourcing was failing in South Africa, the study investigated the current practices in IT outsourcing against the best practices. A comprehensive literature study on IT outsourcing best practices and an empirical study on outsourcing organizations employing the services of top IT outsourcing service providers in South Africa was done. The research study revealed strong evidence that organizations are experimenting with different types of IT outsourcing that consequently have different benefits and risks. The empirical findings also proved that there was no ‘one size fits all’ when it came to the reasons for justifying outsourcing IT by organizations. It was also clear that no organization would openly admit to having hidden agendas that informed why and how they outsourced their IT. The study also found strong evidence of critical success factors that are significant and are embraced by IT outsourcing organizations. Also revealed, there were control considerations in IT outsourcing that showed strong evidence of applicable risks and the governance mechanisms employed.
APA, Harvard, Vancouver, ISO, and other styles
28

Mapetla, Palesa. "Specific selective outsourcing services in the information technology (IT) industry in South Africa." Thesis, 2009. http://hdl.handle.net/10210/2398.

Full text
Abstract:
M.B.A.
In the current decade, "whole of IT" outsourcing appears to be losing ground, and other options are being considered and sought, such as selective outsourcing. Every product, service, or technology has a life cycle, and although the outsourcing industry is at its maturity level, at the same time it is also going through various growth stages and still evolving with best practices. Wholesale or comprehensive outsourcing clearly seems to be on the decline. Highlights of this analysis are as follows: The whole of IT" outsourcing can be seen as a contract service agreement in which an organisation hands over the majority of IT responsibilities to an external company. These contracts are long-term agreements designed to give higher control and transparency on costs, generally with a fixed price arrangement. In the selective outsourcing model, organisations may choose to outsource part of their IT. For example, the IT infrastructure could be broken down into separate agreements for the IT network, desktop, applications, and help desk. Depending upon the spread and competencies of internal resources, the organisation may choose to outsource one or all of the components. Outsourcing has become one of today’s most powerful, organization shaping management tools and also more so in South Africa. Chapter Two covers the fact that companies experience growth based on specialization, expertise and excellence. It is growth based on focusing on those areas that most directly contribute to a company’s success. Outsourcing has become the new frontier for the modern business. When a decision is made to outsource, the company needs to decide which of the activities or services currently done in-house can be defined as being non-core to the business. It is very important that the management of these non-core functions is not outsourced. “The decision to outsource the IT function is primarily based on the need to get rid of an operational problem. IT can become a very expensive cost centre with all the difficulties associated with managing a technology intensive infrastructure” says Rose (1999:24). Outsourcing provides the opportunity to redesign the IT function, and the potential to access highly specialized skills to extend capability. The purpose of this research is to address the following problem statement: What percentage of the budget in the South African IT market by sector is spent on the specific mentioned selective outsourcing services? The author looks at this problem statement and uses available literature to do an in depth study to reach an understanding of the researched subject. In Chapter three, an appropriate research approach that is inductive has been followed. The telephone interview was chosen for data collection as the most suitable and cost effective method. A questionnaire was designed with undisguised questions to ensure consistency and relevance of the responses. The question construction that followed took into consideration question content, question wording, response structure, and question sequence. Finally, pre-testing of the measurement tool was done to ensure validity and reliability, thereby ensuring that a foundation was laid for Chapter Four in which presentation and analysis of the results are given. Chapter four presents the analyses and interprets the results of the study as supplied by respondents through the questionnaire. The results are presented in tables showing percentage figures and numbers for individual response categories, totals and averages to present a clear picture. Finally there is the analysis and interpretation of each section as presented in the tables. The researcher applies the literature discussed in Chapter Two to support and justify the use of the questions asked, and the application thereof to the concepts of the outsourcing and the specified selective outsourcing services business in South Africa. The research was conducted to address the problem and subproblems discussed in Chapter One. In conclusion in response to these problems, the investigated selective IT services which are mentioned in detail in chapter one model has emerged as an attractive alternative to the single-vendor approach. Essentially, a selective approach involves choosing best-of-breed vendors to administer various business services or business functions, leading to either a total or limited solution. However, although selective outsourcing may indeed address some longstanding outsourcing challenges, it also presents some new management issues.
APA, Harvard, Vancouver, ISO, and other styles
29

"An analysis of purchasing practice of information technology goods and services." 1999. http://library.cuhk.edu.hk/record=b5889459.

Full text
Abstract:
by Cheung Hong Keung Alfred.
Thesis (M.B.A.)--Chinese University of Hong Kong, 1999.
Includes bibliographical references (leaves 39-42).
ABSTRACT --- p.ii
TABLE OF CONTENTS --- p.iv
ACKNOWLEDGEMENTS --- p.vii
Chapter
Chapter I. --- INTRODUCTION --- p.1
Importance of Information Technology Purchasing --- p.1
Information Technology Purchasing Life Cycle --- p.2
Problems with Information Technology Purchasing --- p.3
Scope of the Project --- p.5
Methodologies --- p.6
Chapter II. --- INFORMATION TECHNOLOGY PURCHASING STRATEGIES --- p.7
Characteristics of Information Technology Industry --- p.7
Strategic Management of Supply Chain --- p.9
Models of Decision-Making --- p.14
Total Cost of Ownership --- p.18
Chapter III. --- SURVEY OF PURCHASING PRACTICES --- p.20
Purchasing Tools and Techniques --- p.20
Commercial Purchasing Practices --- p.21
Government Purchasing Practices --- p.24
Analysis of Survey --- p.28
Chapter IV. --- CASE STUDIES --- p.30
Purpose of Case Studies --- p.30
Case Studies Procedure --- p.30
Findings and Discussions --- p.31
Chapter V. --- CONCLUSIONS AND RECOMMENDATIONS --- p.34
Conclusions --- p.34
Recommendations --- p.36
APPENDIX --- p.37
BIBLIOGRAPHY --- p.39
APA, Harvard, Vancouver, ISO, and other styles
30

Rouse, Anne C. "Information technology outsourcing revisited: success factors and risks." 2002. http://repository.unimelb.edu.au/10187/7148.

Full text
Abstract:
This thesis investigates success factors, risks and trade offs in Information Technology (IT) outsourcing arrangements, and also examines the impact of certain recommended practices on outsourcing success.
Four research components contribute to the investigation: 1) a critical review of ten years' literature on IT outsourcing, paying particular attention to the evidence for success rates and the impact of practices on IT outsourcing success; 2) statistical analysis of a survey of government and non-government organisations (n = 240) taken from the largest 1000 organisations in Australia; 3) a detailed case study into the Australian Federal Government's "Whole of Government IT Infrastructure Outsourcing Initiative" and 4) qualitative analysis of 16 focus groups involving vendor and purchaser informants.
Using confirmatory factor analysis on the survey data, the study validated seven dimensions of IT outsourcing success proposed in the literature. Only two of these factors had been rated positively by most survey respondents, and only a minority of respondents had rated the other five success dimensions positively. Further statistical investigations looked at the relationship between various recommended practices in IT outsourcing and certain success measures, and at relationships between success measures. Particular attention was paid to the notion of selective outsourcing, a notion that has received much attention in the literature and that is explored further in the case study of the Federal Government initiative. The focus group analysis enabled the teasing out of other factors, not easily identified in the other research.
Drawing on all four research components, the thesis proposes that "information impactedness" associated with post-Internet technologies and skills shortages, and unacknowledged inherent trade-offs, contribute to generally poor risks and returns for IT outsourcing. The thesis concludes with recommendations for decision-makers.
APA, Harvard, Vancouver, ISO, and other styles
31

"Impacts of Selective Outsourcing Of Information Technology And Information Services." University of Technology, Sydney. School of Computing Sciences, 1998. http://hdl.handle.net/2100/291.

Full text
Abstract:
This study identifies the impacts to the internal Information Technology (IT) department's policies and procedures caused by outsourcing selective IT functions and assesses the threats and opportunities to an internal IT group, presented by outsourcing selective IT functions. The trend to selectively outsource IT functions implies that this can be done with minimal disruption and risk to the IT departments policies and processes. This research investigates whether this assertion is valid and develops a model for internal IT departments to respond to the challenges presented by selective outsourcing. Existing models of outsourcing currently in use and available to organizations are reviewed to assess their suitability or adaptability for `selective outsourcing' and from this identifies which areas of internal IT policy and procedures are most impacted. An analysis of the threats and opportunities presented to the internal IT department is also provided. Research was conducted into one organization's experience with selective outsourcing to investigate how internal IT departments could approach selective outsourcing of internal IT functions and how internal IT departments could develop strategies for responding to the challenges posed by selective outsourcing. A case study was conducted of a recent selective outsourcing arrangement within the IT group of the target organization. The personal interview method was adopted to survey a cross section of management and staff from the work groups involved in the selective outsourcing arrangement. The results obtained revolved around the major themes of: 1. Planning (identified as time constraints, resource constraints and work load). 2. Management control (which encompasses the structuring of the outsourcing relationship, human resource concerns, level of ownership, communication, structure of the internal IT group and inter-departmental concerns). 3. Process (which applies to the quality of the procedures, inherent internal knowledge required, the informality of the procedures and concerns over adherence to procedures). For an IT group to develop strategies to respond to the challenges of selective outsourcing it was identified that the IT group needs to remove internal barriers to process and strive to achieve single ownership of processes within functional work groups; nurture a shift in internal groups thinking to more planning rather than doing; improve the quality of internal IT procedures and implement appropriate project team structures for task specific selective outsourcing engagements and for ongoing vendor relationship management.
APA, Harvard, Vancouver, ISO, and other styles
32

Bugwandin, Roshelle. "Investigating vendor selection criteria in information technology outsourcing using multiple criteria decision making." Thesis, 2017. http://hdl.handle.net/10321/2929.

Full text
Abstract:
Submitted in fulfillment of the requirement for the degree of Master of Information and Communications Technology, Durban University of Technology, Durban, South Africa, 2017.
The selection of an appropriate vendor from a set of competing vendors in information technology outsourcing is an essential decision for the effective and efficient management of supply chain management in a fiercely competitive environment. Given the growing and intensive applications of information technology resources to improve process efficiency, achieve growth, foster innovation and transform service delivery, the need arises to outsource the major information technology operations of an organisation, as a strategy for organisations to concentrate on their core businesses. Information technology outsourcing is an important constituent in supply chain management, because it demands effective selection of an appropriate vendor, based on multiple conflicting criteria. Supply chain management places strong emphasis on effective evaluation and selection of vendors against usually conflicting multiple criteria, rather than on cost as a single criterion upon which to base a decision. Multiple criteria generally include both qualitative and quantitative attributes, some of which can be fuzzy in nature. The overarching purpose of this research is to screen the most important criteria of information technology outsourcing for vendor selection based on expert opinions. The experts are from institutions of higher education, health, inspection and testing, property, shipping, state own enterprise, local government and transportation, who share their views regarding criteria that influence their vendor selection decision. Since the vendor selection decision is characterised by a high degree of subjectivity, interdependency and conflicting criteria, the analytic hierarchy process is applied to determine the weights of the identified criteria, evaluate and rank the potential vendors that provide information technology outsourcing services to the sampled institutions. The sample size for this research comprises 16 respondents and the 11 criteria which are cost, quality, commitment, additional resources, additional expertise, prior work, contract terms, confidentiality, location, on supplier database and black economic empowerment. Results show that quality of product is the most important attribute for vendor selection in information technology outsourcing. In addition, the study found that the sampled institutions can categorise their information technology outsourcing vendors more effectively and select a more effective supply chain partner. Moreover, the sampled institutions can provide unsatisfactory vendors with valuable feedback that will help them improve and become good partners in the future.
M
APA, Harvard, Vancouver, ISO, and other styles
33

Kekana, Gavin. "Factors contributing to successful information technology outsourcing relationships : case of a Gauteng information technology company." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000582.

Full text
Abstract:
M.Tech. Business Administration. Business School.
The purpose of this research is to assess which factors are critical to realize success in an Information Technology (IT) outsourcing relationship. The study assessed the applicability of the Relationship Quality (RELQUAL) model dimensions as relevant constructs that leads to relationship success and relationship retention on an existing IT outsourcing relationship. Emphasis was placed on the intangible factors which are trust, commitment, communication, cultural understanding and interdependence. This research was conducted within the context of the South African business environment.
APA, Harvard, Vancouver, ISO, and other styles
34

Pengilly, William Richard. "Determining the level and extent of information technology outsourcing services in the South African higher education environment." Thesis, 2009. http://hdl.handle.net/10210/2392.

Full text
Abstract:
M.B.A.
The South African public Higher Education environment has been going through changes during the past five years. Thirty six institutions have been merged and consolidated into twenty three institutions. There is considerable financial pressure on these institutions, and this have an impact on the provision and maintenance of a world class technology environment. This study examines the extent of outsourcing in the public Higher Education environment in South Africa, and determines if the environment is unique. It also looks at the aspect of improving service delivery through outsourcing or co-sourcing. The research was conducted by means of a survey, consisting of two parts, sent to all twenty three institutions. A 70% response was received on the questionnaire. The research survey determined the technology environment, the attitude towards, and the extent of outsourcing within the environment, as provided by the Chief Information Officers / Information Technology directors. The findings indicate that there is an element of uniqueness within the higher education environment, and that the institutions face challenges, specifically with relation to skill shortages. Furthermore, it finds that there are areas where co-sourcing can provide a benefit and assist in alleviating the challenges. The study also identifies various areas of further study.
APA, Harvard, Vancouver, ISO, and other styles
35

Aliyu, Kabiru Mohammed. "Information and communication technology outsourcing : the determinacy of service level rating (SLR) on customer satisfaction rating (CSR)." Thesis, 2014. http://hdl.handle.net/10210/12458.

Full text
Abstract:
M.Com. (Business Management)
Its seems that Information and Communication Technology (ICT) Outsourcing is now a major business for Information Technology Outsourcing Providers (ITOPs) and all their focus is on client retention and new business acquisition. Variables like Employee Satisfaction, Customer Loyalty, and Financial Performance and how they relate to Customer Satisfaction seem to have received ample research attention. The way the client perceives and rates the service, can be influenced by a couple of factors and Service Level Rating (SLR) is one of the factors under study. The main aim of the research was to investigate the relationship between Service Level Rating and Customer Satisfaction Rating (CSR) in Information and Communication Technology Outsourcing. Other variables like competency of the engineer, size of company and type of industry were also used to see if this relationship between SLR and CSR depends on these variables. A quantitative research approach is followed. Secondary data is used in the study as it is considered the most suitable given the variables under investigation. The main variables are Service Level Rating (SLR) and Customer Satisfaction Rating (CSR). Pre-testing was done to ensure reliability which solidifies the foundation for the analysis and results. The research showed that there is a strong negative relationship between Service Level Rating (SLR) and Customer Satisfaction Rating (CSR). However the results showed that client rates do not depend on the level of competency of the engineer providing the service. During SLA negotiations, managers need to be able to balance the effect of Customer Satisfaction and at the same time save the client on cost of delivery at a high Service Level after careful considerations of the factors that influence Customer Satisfaction. Although it is important to maintain customer satisfaction ratings, managers must understand the implications of the human elements of customer satisfaction. The results may not be generalised but are limited to the organisation under study. This research can open further areas of research in future across the ICT sector. More avenues need to be researched on the relationship between the two variables. In future the research could further investigate if the relationship between SLR and CSR is affected by level of the client within the organisation. The research could be extended across the ICT industries in South Africa, the developing and developed economies.
APA, Harvard, Vancouver, ISO, and other styles
36

Wilkins, Jacques. "Management opportunities or dilemmas in IT offshoring : a case study." Thesis, 2014. http://hdl.handle.net/10210/11043.

Full text
Abstract:
M.Com. (Business Management)
The opportunity to create a case where students can apply their knowledge and insight pose a number of challenges. The purpose of this study was to create a case study that encapsulates various management opportunities and dilemmas that businesses face on a daily basis and explore possible questions and solutions, as well as reflect on the output ofthe process. This mini-dissertation starts by orientating the reader regarding the objective of the study, method followed and academic overview. It includes an overview of the evaluation criteria required to test the use and applicability of the case study. The case study "SwisslT: New horizons in stormy waters" is presented with a number of critical questions. A facilitation manual follows the case study and provides a structured grouping of the questions, an overview of didactic principles and discusses possible answers. The dissertation concludes with an evaluation of the case study and the answers by summarising the input received from facilitators, practicing managers and a management consultant. The conclusion drawn from this study is that the utilisation ofcase studies and the case method is not limited to only being a teaching tool. The process ofcreating and evaluating a case has value in itself. It not only supports the constructivist approach to teaching, but it also creates a platform for the identification offuture research topics as incorporated at the end of this study.
APA, Harvard, Vancouver, ISO, and other styles
37

Collins, Tim. "Procurement outsourcing in large New Zealand organisations. A dissertation submitted in partial fulfilment of the requirements for the degree of Master of Project Management (MPM). UNITEC New Zealand Institute of Technology [i.e. Unitec New Zealand] /." Diss., 2007. http://www.coda.ac.nz/cgi/viewcontent.cgi?article=1001&context=unitec_bus_di.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Cardoso, Henrique Lopes. "Electronic Institutions with Normative Environments for Agent-based E-contracting." Tese, 2010. https://repositorio-aberto.up.pt/handle/10216/39342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Cardoso, Henrique Lopes. "Electronic Institutions with Normative Environments for Agent-based E-contracting." Doctoral thesis, 2010. https://repositorio-aberto.up.pt/handle/10216/39342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Mogashoa, Moloti Aaron. "Expected food service outputs in an outsourced catering outlet : a student perspective." 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001548.

Full text
Abstract:
M. Tech. Business Administration
Tshwane University of Technology (TUT) is an institution of higher learning that was established in 2004 as a result of merger of three independent institutions. TUT Directorate of Accommodation Residence Life and Catering has outsourced the entire university student catering division which includes its restaurants, dining halls, tuck-shops, kiosks and a sports bar. Due to the many and recent student protests against the services delivered by contracted firms, there is a need to gain a better understanding of what, specifically, the students are unhappy about. To this end it is sensible to assess this situation, by means of a survey, which is intended to investigate students' levels of satisfaction with various aspects of the catering division. This study intends therefore, to determine the impact of outsourcing on one university service area, namely, catering, by assessing levels of student satisfaction in this area.
APA, Harvard, Vancouver, ISO, and other styles
41

Cruz, Luiz Fernando Vilela. ""Out of band" authentication using an Android device." Dissertação, 2016. https://repositorio-aberto.up.pt/handle/10216/85951.

Full text
Abstract:
The focus of this thesis is to address the fact that people have very little control of the process when authenticating themselves to an electronic device. Usually a username and a password have to be provided during the process, and the user has no choice but to trust that this information will not be stolen or abused. One of the solutions to this problem is to use a device like a smartphone, which a user could employ to authenticate itself to any other device with internet access, without having to supply it with any personal information. This thesis analyses the solutions that employ this method, comparing them to my own implementation which uses an Android application to read a QR code and login.
APA, Harvard, Vancouver, ISO, and other styles
42

Cruz, Luiz Fernando Vilela. ""Out of band" authentication using an Android device." Master's thesis, 2016. https://repositorio-aberto.up.pt/handle/10216/85951.

Full text
Abstract:
The focus of this thesis is to address the fact that people have very little control of the process when authenticating themselves to an electronic device. Usually a username and a password have to be provided during the process, and the user has no choice but to trust that this information will not be stolen or abused. One of the solutions to this problem is to use a device like a smartphone, which a user could employ to authenticate itself to any other device with internet access, without having to supply it with any personal information. This thesis analyses the solutions that employ this method, comparing them to my own implementation which uses an Android application to read a QR code and login.
APA, Harvard, Vancouver, ISO, and other styles
43

Barclay, Belinda J. M. "Inside out : mapping media : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Arts in Sociology [at the] University of Canterbury /." 2007. http://library.canterbury.ac.nz/etd/adt-NZCU20080626.120810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

"The relationship between the introduction of information technology and job stress among teachers in Hong Kong: a structural equation modeling approach." 2001. http://library.cuhk.edu.hk/record=b5890723.

Full text
Abstract:
Lee Wing-Sze Wincy.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2001.
Includes bibliographical references (leaves 39-47).
Abstracts in English and Chinese.
ABSTRACT --- p.2
ACKNOWLEDEGEMENT --- p.4
TABLE OF CONTENTS --- p.5
INTRODUCTION OF RESEARCH TOPIC --- p.7
THEORETICAL OVERVIEW --- p.9
To be or not to be: Cognitive appraisal of stressful event --- p.9
Psychological Vulnerability: Attitude towards using computer and computer anxiety --- p.13
Burnout as the manifestation of occupational strain --- p.15
Social Support --- p.17
"The consequences of ""burning out"": Intention to Leave" --- p.19
PRESENT INVESTIGATION --- p.19
Confirmatory Analysis --- p.19
Model specification and model testing --- p.20
METHOD --- p.22
Sample --- p.22
Measurement of theoretical constructs --- p.23
Pilot Study --- p.26
RESULTS --- p.27
Item level confirmatory analysis --- p.27
Testing of measurement model --- p.30
Evaluating the structural model --- p.32
DISCUSSION --- p.34
Implication of findings --- p.34
Limitations and future studies --- p.37
REFERENCES --- p.40
APPENDIX A --- p.49
APPENDIX B --- p.50
APPENDIX C --- p.51
TABLE 1 TO TABLE4 --- p.58
FIGURE CAPTION --- p.61
FIGURE1 --- p.62
FIGURE2 --- p.63
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography