Aspects of Client Vendor Relationship and the Risks Therein

Author(s):  
Daisy Mathur Jain

Information Technology (IT) is an ever-growing industry. It, therefore, becomes imperative to understand what it entails, the key parties involved, and their relationship, along with the various risks involved. This chapter aims to delve into the underlying concept of service in the IT industry, the service receiver (client) and the service provider (vendor), which are the key parties, and the risks involved by taking a look at the main prevalent outsourcing models. Further, it nails out the major factors that can contribute in building a lasting relationship between the client and vendor. Through extensive literature review, it is observed that several studies have focused on the risks faced by service receivers, but there are very few that mention the risks that service providers also face. This chapter examines both aspects and aims to uncover the risks that service receivers and service providers face in outsourcing engagements. In addition, many articles talk about factors involved in building client-vendor relationship; however, they lack a comprehensive list of factors that, if taken care of, can lead to successful client vendor engagements. This chapter gives a comprehensive view of the main aspects of the IT industry covering the concept of service in IT Industry, the key parties, and the risks along with aspects that build into successful client vendor relationships.

Author(s):  
Lyle Weber ◽  
Riaan J. Rudman

Bring Your Own Device (BYOD) involves allowing employees to use their own mobile devices to access their organisations’ networks. Many organisations are embracing this trend as a means to cut information technology (IT) expenditure, enhance employee satisfaction, etc. However, these and other benefits come at a cost in the form of exposing an organisation to new risks. The aim of this research was to assist organisations to identify the incremental risks they could potentially encounter if they implement a BYOD programme and how they can reduce the risks directly related to BYOD to an acceptable level. An extensive literature review was performed to identify the risks which arise as a result of the adoption of a BYOD programme. COBIT 5 was identified as the most appropriate framework which could be used to develop possible safeguards to mitigate the incremental risks associated with a BYOD programme to an acceptable level. Safeguards were developed to address the risks.


Author(s):  
Donald Murphy ◽  
Manish Gupta ◽  
H.R. Rao

We present five emerging areas in information security that are poised to bring the radical benefits to the information security practice and research. We have selected these five areas based on extensive literature review and emerging trends in information technology and security. This is a theoretical discourse, which considers a number of research issues and paradigms and explores the relevance of some interesting research areas that have far-reaching implications for IS research. The chapter aims to stimulate discussions about the five covered research areas and in doing so responds to the call for information security researchers to be more aware of the research methodological options available to them. For each area, we have provided background and existing research along side rationale on why this area is becoming important and vital in the field of information security research. The chapter introduces five key areas of information security research that are gaining recognition and credibility to significantly aid information security practice.


Information ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 111
Author(s):  
João Serrano ◽  
João Faustino ◽  
Daniel Adriano ◽  
Rúben Pereira ◽  
Miguel Mira da Silva

Information technology (IT) service management is considered a collection of frameworks that support organizations managing services. The implementation of these kinds of frameworks is constantly increasing in the IT service provider domain. The main objective is to define and manage IT services through its life cycle. However, from observing the literature, scarcely any research exists describing the main concepts of ITSM. Many organizations still struggle in several contexts in this domain, mainly during implementation. This research aims to develop a reference study detailing the main concepts related with ITSM. Thus, a systematic literature review is performed. In total, 47 articles were selected from top journals and conferences. The benefits, challenges, opportunities, and practices for ITSM implementation were extracted, critically analysed, and then discussed.


2021 ◽  
Author(s):  
Miriam Lohrmann

Customer cognitive legitimacy is an important factor in a new business venture’s survival. Based on an extensive literature review of customer cognitive legitimacy, this book examines the consistent conceptualisation of the concept and its dimensional structure. This consistent conceptualisation facilitates the development of the reliable and valid three-dimensional customer cognitive legitimacy scale in 10 studies. The scale is based on potential customers’ interest in acquiring knowledge about a product and the company responsible for it, their perception of the company’s and the product’s future, and their perception of how competent the company’s managers are.


Humaniora ◽  
2012 ◽  
Vol 3 (2) ◽  
pp. 455
Author(s):  
Anak Agung Ayu Wulandari

Cultural display in an open space or known as cultural parks appears rapidly as a worldwide phenomenon. From the European model which has a strong educational value, to the Asian parks which not only has educational function, but also has recreational purposes. So many types and characteristics of these parks, researches give them different names, thodse are Open-air museums, Ethnographic Theme Parks or even Theme Parks. Taman Mini Indonesia Indah as a part of this phenomenon was built first and foremost for educational purposes, therefore Taman Mini can be considered as an open-air museum. However, since Taman Mini also has recreational purposes, others can argue that Taman Mini is a theme park. Qualitative method will be used for this research, through observation to Taman Mini Indonesia Indah, followed by extensive literature review. With these data along with a table which points out the distinction between museum and theme parks. It can  be concluded that Taman Mini is a Theme Park.   


Author(s):  
Christopher Rosenmeier

This chapter provides an introduction to Xu Xu and Wumingshi and covers the book’s structure and methodology. It critiques the various terms that are used in both English and Chinese studies to categorise popular Chinese literature in the Republican period and it discusses the basis of the established divide between elite “new literature” (xin wenxue) and the much-castigated popular literature in China. It is argued that the term “Shanghai School” (haipai), a concept covering Shanghai popular literature from the 1920s to the 1940s, is too broad to be useful in analysing literature from this period or distinguishing between literary trends. The chapter also contains an extensive literature review, covering both English and Chinese works as they pertain to this study.


2020 ◽  
Vol 13 (3) ◽  
pp. 61 ◽  
Author(s):  
Pauline Deschryver ◽  
Frederic de Mariz

The green bond market is attracting new issuers and a more diversified base of investors. However, the size of the green bond market remains small compared to the challenges it is meant to address and to the overall traditional bond market. This paper is based on a unique methodology combining an extensive literature review, market data analysis, and interviews with a large spectrum of green bond market participants. We identify the current barriers explaining the lack of scalability of the green bond market: a deficit of harmonized global standards; risks of greenwashing; the perception of higher costs for issuers; the lack of supply of green bonds for investors; and the overall infancy of the market. This paper makes several recommendations to overcome these obstacles and unlock the full potential of green bonds to finance sustainability goals.


Sign in / Sign up

Export Citation Format

Share Document