Global partnerships are forming to take advantage of the cost savings associated with offshoring as well as other strategic benefits. Not all information technology offshoring projects, however, are ...successful. Cost overruns, increased complexity and defective code cause organizations to rethink their offshoring strategy and their methods for managing these projects. In this paper, project management issues associated with offshore information technology outsourcing projects are identified and specific recommendations for addressing these issues are presented.
Hospitals have increasingly employed outsourcing to lower the cost of healthcare delivery and improve efficiency and quality, thereby, enabling more focus on core competencies of patient care, ...teaching, and research. Outsourcing presents a challenge for protecting patient information when new services are implemented or integrated into an existing healthcare information system. Enabling new outsourced telehealth services often requires “bolting on” security to legacy systems rather than “baking” it into the system. This article addresses security practices necessary for healthcare organizations implementing new telehealth services as part of an outsourced relationship. While a number of recommendations are available for security readiness assessments pursuant to HIPAA compliance, none directly addresses the challenge of implementing security for outsourced clinical services. A case study is presented for a recent implementation of teleradiology services within a large regional hospital. Using the case, system vulnerabilities are demonstrated and relevant best practices to mitigate exposing patient information are discussed.
This article is concerned with methodological issues. In particular, it addresses the question of how it is possible to align the design of management information systems with the structure of an ...organization. The method proposed is built upon the Cybersin method developed by Stafford Beer (1975) and Raul Espejo (1992). The article shows a way to intersect three complementary organizational fields: management information systems, management control systems, and organizational learning when studied from a systemic perspective, in this case from the point of view of management cybernetics (Beer, 1959, 1979, 1981, 1985).
The Telecommunications Act of 1996 opened competition in the telecommunications market in the U.S. and forced the incumbent telecommunications companies to open both their physical and logical ...infrastructure for Competitive Local Exchange Carriers (CLECs). In this case study we focus on the problems that face a CLEC with regard to designing an information system and getting a back office system, called an Operations Support Systems (OSS), operational in a highly competitive, complex, fast-paced market in a compressed time frame when a change in a critical telecommunications network component, namely the central office switch, is made after 75% of the system implementation was completed. This case deals with the factors that led to this change in central office switches, its impact on the IT department, its impact on the company, and the alternatives considered by the IT department as possible solutions to the many problems created by this change.
This article develops an analytical framework for new forms of information warfare that may threaten commercial and government computing systems by using e-collaboration in new ways. The framework ...covers (1) strategic model, (2) strategic arena, (3) e-collaboration, and (4) ethics and law. The framework then is used to compare two recorded instances of major hacker wars that erupted in the shadow of kinetic conflicts. In both cases, the hacker war appears to have been a grassroots collaborative enterprise by loosely organized civilians with neither government control nor permission. Collaborating across networks to coordinate their attacks, such hacker wars can attack both government and commercial computer networks without warning. The analysis shows how hacker wars demonstrate characteristics found in the frameworks and that there are forms of e-collaboration that represent a potentially difficult new source of threat for globalized information systems.
The Telecommunications Act of 1996 opened competition in the telecommunications market in the U.S. and forced the incumbent telecommunications companies to open both their physical and logical ...infrastructure for Competitive Local Exchange Carriers (CLECs). In this case study we focus on the problems that face a CLEC with regard to designing an information system and getting a back office system, called an Operations Support Systems (OSS), operational in a highly competitive, complex, fast-paced market in a compressed time frame when a change in a critical telecommunications network component, namely the central office switch, is made after 75% of the system implementation was completed. This case deals with the factors that led to this change in central office switches, its impact on the IT department, its impact on the company, and the alternatives considered by the IT department as possible solutions to the many problems created by this change.
Provider: - Institution: - Data provided by Europeana Collections- Zarządzanie ryzykiem to proces ograniczania ryzyka poprzez stosowanie odpowiednich środków bezpieczeństwa. Efektywne zarządzanie ...ryzykiem w organizacji wymaga systemowego podejścia do analizy ryzyka. Na podstawie jej wyników dobiera się zabezpieczenia, które powinny być efektywne kosztowo i uwzględniać wymagania wynikające z przepisów prawa, wymagania biznesowe i wynikające z przeprowadzonej analizy ryzyka zasobów mających wartość dla funkcjonowania organizacji. Efektywność ekonomiczną w tym przypadku można określić jako dążenie do minimalizacji całkowitych kosztów związanych z zarządzaniem ryzykiem. Artykuł przedstawia wybrane modele, metody i wskaźniki mogące znaleźć zastosowanie w ocenie efektywności inwestycji w obszarze bezpieczeństwa systemów informatycznych. (abstrakt oryginalny)- All metadata published by Europeana are available free of restriction under the Creative Commons CC0 1.0 Universal Public Domain Dedication. However, Europeana requests that you actively acknowledge and give attribution to all metadata sources including Europeana
This chapter contains sections titled:
Introduction
Technological Risks
Future Technology
Dealing with Technological Uncertainty
How Special Is Technology?
References and Further Reading
This document takes stock from several studies on outsourcing risk. A definition of risk is offered and illustration from many case studies is used to show how risk can be managed. Results show that ...an active risk management approach can reduce risk exposure subtantially while enabling the organizations to still reap the benefits associated with outsourcing. Cet article fait un constat des leçons tirées de récentes analyses du risque d'impartition. Une définition opérationnelle du risque d'impartition est donnée. Les mécanismes de gestion de risque sont également discutés. Les résultats de différentes études démontrent qu'une gestion active du risque permet de réduire sensiblement les niveaux d'exposition au risque, notamment dans le cas de contrats d'impartition des technologies de l'information.
This paper reports the results of a study of three successive IT outsourcing contracts at British Petroleum (BP). We offer an operational definition of IT outsourcing risk and use it to assess the ...risk exposure associated with each contract. We then examine how the management at BP dealt with outsourcing risk. Our results show that careful and deliberate risk management can substantially attenuate the level of risk exposure, and that IT outsourcing risks can be managed. Ce document présente les résultats d'une étude de trois contrats d'impartition successifs. L'étude fut conduite chez British Petroleum. Une définition opérationnelle du risque d'impartition est donnée. Cette définition est ensuite utilisée pour déterminer le niveau de risque associé à chacun des contrats. Les mécanismes de gestion de risque sont également identifiés. Les résultats démontrent qu'une gestion active du risque permet de réduire sensiblement les niveau d'exposition au risque, notamment dans le cas de contrats d'impartition des technologies de l'information.