共查询到20条相似文献,搜索用时 0 毫秒
1.
Wendell Jones 《Information Systems Management》1997,14(1):66-69
Outsourcing has the potential to reduce costs, infuse cash into an organization, increase customer satisfaction, and provide other effectiveness and efficiency improvements. Yet a hasty or incomplete evaluation of the outsourcing decision can also result in contractual battles and worsened services. IS managers who enhance their knowledge of the components of a sound outsourcing evaluation help ensure that the decision to outsource yields the former, not the latter. 相似文献
2.
As a process that must be planned, managed, and controlled, outsourcing presents quality challenges in the areas of vendor selection and products and services received. Achieving success in the first area depends on establishing procedures to thoroughly assess the vendor's competency and process discipline; in the second, quality is ensured through the requirements definition process, implementation of a formal change management system, and the linking of outsourcer milestones with quality reviews. 相似文献
3.
Ralph Herkenhöner Harald Fischer Hermann de Meer 《Datenschutz und Datensicherheit - DuD》2011,35(12):870-874
Pflegekunden vertrauen den Pflegediensten sensible Gesundheitsdaten an. Doch dieses rechtlich geschützte Vertrauen ist durch
wirtschaftliche Zw?nge gef?hrdet. Viele Pflegedienste binden IT-Dienstleister in Ihre Datenverarbeitung ein und machen diese
somit zu Mitwissern. Dabei gibt es einen Weg zwischen rechtlichen und wirtschaftlichen Zw?ngen. 相似文献
4.
Christine B. Tayntor 《Information Systems Management》1997,14(2):66-69
Effective management, communication with external customers, and performance tracking help ensure that an outsourcing experience has a happy and productive ending. 相似文献
5.
Narender Ramarapu Monica J. Parzinger Augustine A. Lado 《Information Systems Management》1997,14(2):27-31
The decision to outsource applications development and support to a foreign vendor involves not only the myriad issues pertinent to outsourcing in general, but a host of additional risks and challenges unique to firms operating in different legal and cultural environments. Careful assessment of these issues helps determine whether offshore outsourcing will realize its potential to reduce costs, improve software quality, and achieve economies of scale in skills acquisition. 相似文献
6.
Outsourcing-a practice once considered controversial-has become widespread, not only with technology companies but also with the IT departments of firms in other industries. The volume of tech offshore outsourcing-in which companies in economically advanced countries send work to businesses in developing nations-has increased since the approach became popular during the economic boom of the mid-1990s. During that time, the nature of the practice stayed largely the same. 相似文献
7.
8.
9.
规模为19.7亿美元2007-2012年间的复合增长率将达35.3%近年来,离岸服务外包市场的规模和成熟度均保持强劲增长态势。2007年中国离岸软件外包市场规模达19.7亿美元,比2006年增长42.4%(人民币收入依据2007年人民币兑美元平均汇率进行折算)。到2012年市场规模将达到89.5亿美元,五年复合增长牢达到35.3%。 相似文献
10.
《Computer》2009,42(5):18-21
Topics include changes to global outsourcing trends, increases in North American computer-science-related university enrollments, a new technique to combat denial-of-service attacks, and smart-bathroom technology. 相似文献
11.
Joseph A. Yesulatitis 《Information Systems Management》1997,14(2):80-82
Leveraging the advantages of outsourcing in the area of new technology adoption depends not only on selecting the right vendor, but on developing a comprehensive strategy that assesses the internal technology environment and meets organizational needs. 相似文献
12.
13.
14.
Saint Louis University created a 24/7 remotely accessible "computer laboratory" where students receive full server administration privileges to use in developing their server, networking, security, and database administration skills using the Linux operating system. The university's decision to outsource the computer lab to MDK was simple. The resulting partnership provided each student in a senior-level undergraduate Web Applications and Architectures course with a virtual Linux server as well as full administrative rights. 相似文献
15.
Fritz H. Grupe 《Information Systems Management》1997,14(2):15-22
Cost, performance, and service demands are just some of the issues driving organizations to outsource all or part of their help desk functions. Selecting an appropriate vendor and preparing a detailed contract are key to forming a cost-effective and productive relationship that gives both the organization and the vendor a competitive advantage. A six-step approach helps IS managers delineate the goals, requirements, and terms on which such a relationship is based. 相似文献
16.
Howard A. Rubin 《Information Systems Management》1997,14(2):7-14
Successful outsourcing experiences are not based on the levying of penalties for failure but on the accrual of expected benefits by both parties involved in the outsourcing agreement. For these benefits to accrue, IS managers must implement a proactive, forward-looking oversight mechanism designed to ensure that the outsourcing provider operates in a performance zone that provides the expected business value. Outsourcing oversight metrics—key performance-monitoring parameters built into the outsourcing agreement and assessed on an on-going basis—form the basis of such a mechanism. 相似文献
17.
This paper considers ‘two-stage’ call centers where some incoming calls are completed by first service while others require an additional second service. Although this type of call center is not uncommon, it has not been dealt with, if any, in the call center literature. In this paper, we introduce the concept of the ‘two-stage’ call center and discuss its features. Furthermore, we develop an effective outsourcing strategy in ‘two-stage’ call centers. To this end, we model ‘two-stage’ service system and propose several call routing structures. The structures are compared through numerical test and conventional queueing theories form the theoretical basis of our study. 相似文献
18.
Outsourcing and the Future of It 总被引:1,自引:0,他引:1
William R. King 《Information Systems Management》2004,21(4):83-84
MORE THAN 50 PERCENT OF firms are expected to use IT outsourcing in 2006. the sourcing issue is among the top five agenda items for IT executives, as the amount of such outsourcing grows, its impact on the economies of companies and nations increases and political controversy over the consequent jobs lost to off-shore outsourcing heightens. Thus, outsourcing is, and will likely continue to be, a hot professional and political topic and a major determinant of the future of IT. 相似文献
19.
Managing the Risks of Outsourcing Agreements 总被引:3,自引:0,他引:3
Ralph L. Kliem 《Information Systems Management》1999,16(3):91-93
Outsourcing relieves an organization from the burden of carrying out complex activities. It also relieves an organization over its control of those activities. An organization can minimize this loss of control by managing certain risks associated with outsourcing before it enters into an outsourcing agreement. 相似文献
20.
属性基加密(attribute-based encryption, ABE)体制是身份基加密(identity-based encryption, IBE)体制的一种扩展,在ABE体制中,密钥产生中心根据用户拥有的属性为用户颁发密钥,加密者可以针对某个访问策略对消息进行加密,当且仅当用户拥有的属性满足相应的访问策略时,能够成功解密. 由于ABE体制可以实现对密文灵活的访问控制,因此有着良好的应用前景,尤其适用于保障云存储环境中信息的机密性. 然而,计算效率较低却一直是阻碍各类ABE方案被实际应用的主要问题. 针对这一问题,研究了借助外部资源降低ABE方案本地计算量的思想和方法,给出了外包ABE方案的形式化定义,并根据实际的敌手环境、安全目标制定了相应的安全模型. 随后,利用合数阶双线性群构造了一个具体的外包密文策略属性基加密(ciphertext-policy ABE, CP-ABE)方案,并利用双系统加密技术在标准模型下证明其满足自适应安全性. 相似文献