IT outsourcing development trends Fedorova, Svetlana
SHS Web of Conferences,
2021, Letnik:
106
Journal Article, Conference Proceeding
Recenzirano
Odprti dostop
IT outsourcing is one of the new types of outsourcing. One of the current trends is the use of IT instead of other types of outsourcing. IT outsourcing implies the maintenance of the entire ...information infrastructure of a company (or individual components) by a third-party company, which specializes in these processes. This is a refusal to hire information technology specialists. There is no universal classification of IT outsourcing services. Several types of IT outsourcing can be distinguished: external and internal; resource and functional; outsourcing of IT infrastructure, IT processes or full outsourcing; disposable and long-term; main and additional. The IT outsourcing has a number of advantages: financial savings, the ability to engage in specialized activities, professional services, promptness of implementation of new technologies. IT outsourcing has some disadvantages: data security, trade secrets, and poor-quality services. Before using IT outsourcing services, a company should analyze business processes, determine the economic efficiency, and conclude a contract.
In recent years, governments are increasingly interested in developing public–private partnerships such as outsourcing logistics to service providers to benefit from better performance. A major ...obstacle to developing such partnerships is the lack of decision-support tools to investigate supply chain and outsourcing decisions, taking into account perceived risk that arises from such partnerships. This paper develops a decision-support tool for policy makers to quantify perceived risk and jointly optimize network design and logistics outsourcing. It is based on a multi-phase approach which quantifies perceived risk as a function of outsourcing decisions using policy makers judgment, solves a multi-objective optimization problem, and constructs efficient frontiers that balance total supply chain cost and perceived risk. The proposed approach is applied to the real case study of the Moroccan supply chain of pharmaceuticals. Several outsourcing strategies are investigated and corresponding efficient frontiers are constructed. Our analysis shows that outsourcing cost-efficiency and the degree of perceived risk have a great impact on the optimal distribution network design and outsourcing strategies.
•A decision-support tool for network design and outsourcing in healthcare is developed.•Policy maker’s perceived outsourcing risk is quantified and evaluated.•A mathematical model for balancing cost-efficiency and perceived risk is formulated.•Efficient frontiers for a public pharmaceuticals’ supply chain are constructed.
Terceirizacao: um conceito in contexto Firmo, Fernando
Interseções : revista de estudos interdisciplinares,
06/2012, Letnik:
14, Številka:
1
Journal Article
Recenzirano
The world of work in general and outsourcing in particular will be the focus of this article. I intend to unfold different viewpoints and considerations to contextualize the concept of outsourcing ...taking into account two distinct groups of workers (regular employees and outsourced employees) of the former itabira Special Steels Company (Companhia de Acos Especiais itabira), ACESUTA, nowadays known as Aperam, whose plant is located in the city of Timoteo, Minas Gerais State. 0 mundo do trabalho, especialmente, a terceirizacao, sera o foco do presente artigo. A partir de dois grupos operarios (funcionarios do quadro fixo e funcionarios terceirizados) da antiga companhia de Acos Especiais Itabira, ACESITA, atual Aperam, cuja planta industrial esta localizada na cidade de Timoteo-MG, explicito distintos pontos de vistas e consideracoes para contextualizar o conceito de terceirizacao. Palavras-chave Trabalho. Terceirizacao. Acesita. Etnografia. Keywords Work. Outsourcing. Acesita. Ethnography.
Terceirizacao: um conceito in contexto Firmo, Fernando
Interseções : revista de estudos interdisciplinares,
06/2012, Letnik:
14, Številka:
1
Journal Article
Recenzirano
The world of work in general and outsourcing in particular will be the focus of this article. I intend to unfold different viewpoints and considerations to contextualize the concept of outsourcing ...taking into account two distinct groups of workers (regular employees and outsourced employees) of the former itabira Special Steels Company (Companhia de Acos Especiais itabira), ACESUTA, nowadays known as Aperam, whose plant is located in the city of Timoteo, Minas Gerais State.
Maximizing returns on software development costs have been a prime objective of product organizations. As the products mature, the organization explores alternatives to extend an existing product's ...life or retire it from its product portfolio. This article examines the changing trends of the outsourcing model for software product organizations based on a product's lifecycle and technology maturity. Adopting an ethnographic action research methodology, we study the journey of a software product's (re)aligning outsourcing strategy while evolving a parallel strategy for retiring products by either shifting focus from fixed to variable costs or monetizing them as "software assets." As part of the conclusion, a software life-extending outsourcing model has been proposed based on the specific phase of product development and technology maturity. The article includes research implications for practice and academia in strategizing outsourcing based on a product's development phase.
As a milestone in the development of outsourcing services, cloud computing enables an increasing number of individuals and enterprises to enjoy the most advanced services from outsourcing service ...providers. Because online payment and data security issues are involved in outsourcing services, the mutual distrust between users and service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing solutions only consider a specific type of services and rely on a trusted third-party to realize fair payment. In this paper, to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BPay, an outsourcing service fair payment framework based on blockchain in cloud computing. We first propose the system architecture, adversary model and design goals of BPay, then describe the design details. Our security and compatibility analysis indicates that BPay achieves soundness and robust fairness and it is compatible with the Bitcoin blockchain and the Ethereum blockchain. The key to the robust fairness and compatibility lies in an all-or-nothing checking-proof protocol and a top-down checking method. In addition, our experimental results show that BPay is computationally efficient. Finally, we present the applications of BPay in outsourcing services.
Some of the most challenging issues in data outsourcing scenario are the enforcement of authorization policies and the support of policy updates. Ciphertext-policy attribute-based encryption is a ...promising cryptographic solution to these issues for enforcing access control policies defined by a data owner on outsourced data. However, the problem of applying the attribute-based encryption in an outsourced architecture introduces several challenges with regard to the attribute and user revocation. In this paper, we propose an access control mechanism using ciphertext-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation capability. The fine-grained access control can be achieved by dual encryption mechanism which takes advantage of the attribute-based encryption and selective group key distribution in each attribute group. We demonstrate how to apply the proposed mechanism to securely manage the outsourced data. The analysis results indicate that the proposed scheme is efficient and secure in the data outsourcing systems.
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the ...computational complexities of ABE key-issuing and decryption are getting prohibitively high. Despite that the existing Outsourced ABE solutions are able to offload some intensive computing tasks to a third party, the verifiability of results returned from the third party has yet to be addressed. Aiming at tackling the challenge above, we propose a new Secure Outsourced ABE system, which supports both secure outsourced key-issuing and decryption. Our new method offloads all access policy and attribute related operations in the key-issuing process or decryption to a Key Generation Service Provider (KGSP) and a Decryption Service Provider (DSP), respectively, leaving only a constant number of simple operations for the attribute authority and eligible users to perform locally. In addition, for the first time, we propose an outsourced ABE construction which provides checkability of the outsourced computation results in an efficient way. Extensive security and performance analysis show that the proposed schemes are proven secure and practical.