scholarly journals IT /IS Outsourcing from Omani Organizations' Perspective: Motivations and Reservations

2009 ◽  
Vol 1 (1) ◽  
Author(s):  
Khamis Al-Ghrabi

In recent years outsourcing has become one of the strategies pursued by organizations in order to manage their Information Technology/ Information Systems (IT/IS) (Gonzalez et al., 2006).Organizations turn to outsource their IT/IS for a number of reasons. Many Omani organizations outsourced part or all of their IT/IS while others are conservative and following 'wait and see' strategy.  The aim of this paper is to explore the main motivations for or against outsourcing IS/IT within the Omani private and public sectors. With this aim in mind, a questionnaire survey was used as the main method to collect data from Omani private and public organizations. In addition two semi structured interviews were conducted to detect some issues that were not possible otherwise. The results of the analysis of the data show that the main drive behind IS/IT outsourcing is the need to obtain the required skills which are not available otherwise. The study also shows that security issues and concerns are among the top reasons preventing some Omani organizations from outsourcing.

2009 ◽  
Vol 34 (2) ◽  
pp. 25-40 ◽  
Author(s):  
Umesh Gulla ◽  
M P Gupta

Attracted by the desire to cut cost and improve performance continuously, managers across the continents are showing interest in outsourcing their Information Systems. Influenced by this global trend, Indian firms, e.g., Bharti Telecom, Ballarpur Industries, Bank of India and many others have followed the path of extensive outsourcing of their IS services. However, while there is optimism regarding the benefits of outsourcing, there are also concerns regarding security issues, technological obsolescence, vendor captivity, risk assessment in IS outsourcing relationship and so on which require serious consideration in deciding on IS outsourcing, Outsourcing is a complex decision process, which is the interplay of various internal as well as external environmental factors. The concerned manager has to factor various dimensions, both short term and long term. Strategic alignment of business and information technology dimensions influence IS outsourcing strategy. Further, outsourcing drivers would also influence the IS outsourcing decisions in any organization. The manager therefore needs to identify various factors and also measure the intensity of each factor influencing the outsourcing decision. In this paper, Analytical Hierarchy Process (AHP)—that has been used extensively in complex decisions and situations where hierarchical structure in factors are involved in decision goals—has been applied for analysing the IS outsourcing decisions. The.key outcome of the study are as follows: High IS outsourcing is the preferred strategy over low and selective IS outsourcing strategy. Strategic alignment of business and information technology emerges as the most important factor followed by the medium-term impact of outsourcing in deciding the degree of IS outsourcing. Among the sub-factors, business strategy is the most important factor in deciding the IS outsourcing degree, and its role is maximum in high IS outsourcing option. The second most important decision element emerges to be outcome-based performance. Among the business drivers, focus on core operations comes out to be the most important outsourcing driver. While the illustration in this paper tries to cover broad factors, it gives flexibility to practitioners to account for different sub-factors under these factors. The application of AHP using these broad array of sub-factors would lead to a decision model and customized solutions for the IS outsourcing in the particular situations.


Author(s):  
Felix R. Doldán Tie ◽  
Paula Luna Huertas ◽  
Francisco Jose Martínez Lopez ◽  
Carlos Piñeiro Sanchez

The practice of information systems/information technology (IS/IT) outsourcing is a major issue which has received much attention, as shown by the extensive literature on the topic. However, most works on outsourcing have focused on theoretical topics, and there are but a few empirical, quantitative studies. This chapter presents an empirical study of IS/IT outsourcing in Spain, which has been conducted along the lines of prior research carried out in different countries, and which focuses on the types, functions and targets of outsourcing contracts. We also attempt to examine the influence that this practice may have on the organizations’ management structure. A survey carried out on 530 Spanish firms has shown that 50% of Spanish large firms have outsourced part of their IS/IT, whereas outsourcing is practiced by 20% of medium-sized enterprises. Finally, it has been observed that the most frequently outsourced activities in Spain are hosting and Internet-related services.


Author(s):  
Pamela R. McCauley-Bell ◽  
Lesia L. Crumpton

The information technology field has been increasingly plagued by threats to the security of information systems, networks, and communication media. The solutions to these problems have primarily focused on the techniques to more closely safeguard networks (i.e. firewalls) with similar efforts being put into assessing the vulnerabilities of the hardware and software aspects of the systems. With the exception of discussions into more creative password selection, discussion pertaining to the role of the user, can play in reducing the risk of human error and thus promoting system security has been extremely limited. This lecture will present an overview of information security issues impacted by human interaction that may or may not play a role in promoting system security. Understanding that information systems are in fact composed of hardware and software components which must be addressed using traditional information security protocol, this lecture will provide an understanding of the possible risk that the human/user poses to an information system. Once the risks or factors associated with the human in the security of the system are identified, the next question is do the factors matter? The objective of this lecture is to present an intellectual discussion of human factors issues and their impact on information security. This is an important discussion topic that the information technology field can not afford to ignore.


2017 ◽  
Vol 23 (2) ◽  
pp. 95-100
Author(s):  
Marius Milandru ◽  
Daniel Sorin Constantin

Abstract As part of the general effort to modernize the financial-economic system, in both private and public sectors, the concept of internal auditing is fairly recent. The development of information technology has significantly contributed to the integration of information systems into management related activities (economy, logistics, finance and accountancy, etc.). The integration of new information technology into the practice of processing, transferring and storing information has brought about a series of threats and vulnerabilities of the information system. Thus, auditing information systems has become a vital element for all domains and activities of organizations, including the military one.


Author(s):  
Hans Solli-Sæther ◽  
Petter Gottschalk

In this chapter on outsourcing opportunities, a common conceptual understanding of important issues of the business practice of our interest is established. First, we take a look at how researchers have defined the term outsourcing. An updated outsourcing definition will serve as a common platform for understanding the sourcing universe presented in the following section. Next, we describe in more detail the building blocks of the sourcing universe – insourcing, information technology (IT) and information systems (IS) outsourcing, business process outsourcing, transformational outsourcing, and global outsourcing. At the end of the chapter, we discuss some key aspects of the important outsourcing decision.


2010 ◽  
pp. 1333-1359
Author(s):  
Felix Doldan Tie ◽  
Paula Luna Huertas ◽  
Francisco Jose Martinez Lopez ◽  
Carlos Pineiro Sanchez

The practice of information systems/information technology (IS/IT) outsourcing is a major issue which has received much attention, as shown by the extensive literature on the topic. However, most works on outsourcing have focused on theoretical topics, and there are but a few empirical, quantitative studies. This chapter presents an empirical study of IS/IT outsourcing in Spain, which has been conducted along the lines of prior research carried out in different countries, and which focuses on the types, functions and targets of outsourcing contracts. We also attempt to examine the influence that this practice may have on the organizations’ management structure. A survey carried out on 530 Spanish firms has shown that 50% of Spanish large firms have outsourced part of their IS/IT, whereas outsourcing is practiced by 20% of medium-sized enterprises. Finally, it has been observed that the most frequently outsourced activities in Spain are hosting and Internet-related services.


Author(s):  
Sunghun Chung

This review surveys recent study on the business value of Information Systems (IS). The topics covered include theoretical and empirical evidence on the business value of IS, the productivity using Information Technology (IT), the firm value with IT, IT and firm boundaries, IT outsourcing, and supply chain with IT. This work critically reviews the growing literature on improving market performance through IS, discusses various perspectives, raises conceptual and empirical concerns, underscores challenges for further development of this literature, and provides directions for future research.


Author(s):  
Petter Gottschalk

Information technology outsourcing—the practice of transferring IT assets, leases, staff, and management responsibility for delivery of services from internal IT functions to third party vendors—has become an undeniable trend ever since Kodak’s 1989 landmark decision. In recent years, private and public sector organizations worldwide have outsourced significant portions of their IT functions, among them British Aerospace, British Petroleum, Canadian Post Office, Chase Manhattan Bank, Continental Airlines, Continental Bank, First City, General Dynamics, Inland Revenue, JP Morgan, Kodak, Lufthansa, McDonnell Douglas, South Australian Government, Swiss Bank, Xerox, and Commonwealth Bank of Australia (Hirsheim & Lacity, 2000). How should firms organize their enterprise-wide activities related to the acquisition, deployment, and management of information technology? During the 1980s, IT professionals devoted considerable attention to this issue, primarily debating the virtues of centralized, decentralized, and federal modes of governance. Throughout the 1980s and 1990s, IT researchers anticipated and followed these debates, eventually reaching considerable consensus regarding the influence of different contingency factors on an enterprise’s choice of a particular governance mode (Sambamurthy & Zmud, 2000).


10.12737/162 ◽  
2012 ◽  
Vol 1 (6) ◽  
pp. 70-73
Author(s):  
Лихачева ◽  
G. Likhacheva

Security issues of individual and society from new types of threats created by Internet information systems and technologies are considered in this article. Globalization has created conditions for emergence of information weapon that has generated not only information wars, but also evolutionary confrontations — creation of planetary system of mankind monitoring and management that will lead the mankind to the involution. Fight has moved to intellectual space. Security is provided with knowledge of main sleights and technologies of information weapon, means of its recognition, and protection methods against it. Knowledge of universe laws provides the evolutionary development of mankind.


1997 ◽  
Vol 12 (3) ◽  
pp. 223-237 ◽  
Author(s):  
Vaughan Michell ◽  
Guy Fitzgerald

This paper focuses on outsourcing vendors, their characteristics and the vendor selection process. It draws on current research and two research studies, one specifically examining outsourcing vendors and the other examining vendor-client issues. We first outline the development of the market for the outsourcing of information technology/information systems services and activities, then detail the characteristics of different types of vendor companies and their competitive positions, before providing a client perspective to the issue of vendor selection.


Sign in / Sign up

Export Citation Format

Share Document