IT OUTSOURCING PROJECT RISKS: FROM CLIENT AND VENDOR PERSPECTIVES
|
|
- Byron Snow
- 7 years ago
- Views:
Transcription
1 IT OUTSOURCING PROJECT RISKS: FROM CLIENT AND VENDOR PERSPECTIVES Abstract This study examines the risk factors of IT outsourcing projects from client and vendor perspective, and compares their difference. The quasi-delphi study which consisted of three ranking rounds was conducted. A number of 41 client project managers and 21 vendor project managers were participated. This study identifies one of the top three risks ranked by the client has been considered to be of little importance by the vendor. The findings reveal that the client and vendor have different perceptions on project risks. Keywords: Delphi study, Risk identification, IT outsourcing; IT project risk. 1 INTRODUCTION Organizations have adopted IT outsourcing to develop its IT or raise its IT capacity for some beneficial reasons over the last two decades. However, despite the benefits that companies can achieve from IT outsourcing, outsourcing projects contend with numerous problems. IT outsourcing involves risks of undesirable outcomes; for example, the difficulty of management and IT control (Choudhury and Sabherwal, 2003), cost escalation (Bahli and Rivard, 2013), and ensuring IT security (Khalfan, 2004). IT outsourcing projects involve two types of organization: clients and vendors. The client desires a reliable product to be delivered on schedule, without defects and under budget. The vendor desires a high-profit project to be accomplished on time with no overrunning costs or surprises. Based on their agency relationship, the vendor may perceive project risks in ways that vary from those of the client (Taylor, 2007). The situation signifies the need for a comprehensive understanding of both the client s and vendor s perceptions of risk. This study explored the perception gaps regarding project risks between the client and the vendor. A quasi-delphi study was conducted to produce a rank-order list of risk factors. The results of the survey were subsequently compared to identify differences between the client and vendor perceptions of risk. The study revealed that the client and vendor have different perceptions on project risks. 2 BACKGROUND IT outsourcing involves the use of external technological or IT professional resources (Loh and Venkatraman, 1992). Studies seeking to help companies implement outsourcing have explored the
2 knowledge of selecting vendors (Barthelemy, 2001; Khan et al., 2011), managing relationships (Grover et al., 1996; Qi and Chau, 2012), and establishing contracts (Aubert et al., 2005; Osei-Bryson and Ngwenyama, 2006), and identifying potential risks (Natovich, 2003; Willcocks et al., 1999). Although IS researchers, such as Natovich (2003), Taylor (2007), Nakatsu and Iacovou (2009), and Aundhe and Mathew (2009), have extensively explored the risks of IT outsourcing projects, their investigations have been limited to a single perspective, of either the client or the vendor. Previous research has indicated a gap of expectations and perceptions of project outcomes among multiple stakeholders (Jiang et al., 2002). The gap leads to user dissatisfaction with project product or service. Different stakeholders may have different opinions regarding potential risk factors, and their opinion would influence the plan of risk control (Keil et al., 2002). Therefore, the perception gap of risks has drawn researchers' attention. Reconciling the stakeholders perceptions of project risks has become a common thread through much of the IT literature (Liu et al., 2010; Schmidt et al., 2001). To manage IT project successfully, project managers and users must have agreement on risks and threats, and reconcile their viewpoints on the risk assessment. Previous attempts to compare the perspectives of stakeholders have been limited to general IT projects. The current study is the first to examine the differences in how the client and vendor prioritize outsourced IT project risks. 3 DATA COLLECTION This study adopted a modified version of the Delphi method (Schmidt et al., 2001) because it has been used extensively in information systems (IS) research to yield reliable risk rankings. The panelists in this study were experienced IT project managers from organizations that have been involved in IT outsourcing activities for several years. The sampling frame was gathered from the members of the Project Management Institute (PMI) and multiple organizations from Taiwan and Indonesia. A total of 62 project managers initially agreed to participate in the first round: 41 on the client panel and 21 on the vendor panel. Table 1 shows the demographical characteristics of the sample. Three indicators are used to assess their experience: years of IT experience, the total number of projects, and the total number of outsourced IT projects that have been managed by the panelist over their career. On average, panelists have 8 years of IT experience and have managed at least two outsourced IT projects. The panelists work in different organizations which include a wide range of industries. Client panel Vendor panel Mean Max Min Mean Max Min Work experience (years) No. of project a No. of outsourced project IS employees in company
3 Number % Number % Size of panel Gender: Male Female Org. industry : IT Service Manufacturing Distribution Government Financial services Medical Others Table 1. Panel demographics a = all IT projects, including in-house and outsourced projects This study employed a variation of the Delphi survey method developed by Schmidt (1997). The quasi-delphi survey consisted of two phases. The first phase was designed to assemble a list of risks in IT outsourcing projects from IS literature. The second phase, consisting of three rounds, was designed to rank the identified risks. Data were distributed using paper-based questionnaires, electronic mail, and online survey tools. In Phase 1, a list of 34 risk items assembled from the literature was presented to several panelists. The risks occurred at a frequency of 50% or higher were retained for the next phase. As a result, all 34 risk factors were remained. In Phase 2, the panels were separated into clients and vendors, allowing each panel to participate in three ranking rounds independently. The ranking rounds were complete when an acceptable level of consensus (Kendall s W > 0.5) was reached following (Schmidt, 1997). In addition, the inversion to the ranking of risk factors is performed to compute Kendall s W. In this phase, the panelists were also asked to add extra critical risk items but none provided additional ones. In the first round, each panel was presented a list of 34 risk factors derived from Phase 1. Panelists were asked to rank and rate each risk factor on a 7-point Likert scale (1=not important, 7=most important). The rating was used in separate analysis, that is, to show the rating differences between the vendor and client. A mean rank for each risk factor was computed at the end of each round (round 1 to round 3). Subsequently, the 20 risk factors with higher mean rank were selected for each panel. In the second round, each panel was presented a list of 20 risk factors derived from the first round. The results were summarized and subsequently sent to the panelists as part of round 3 s questionnaire. In the third round, the panelists were asked to rank their top 10 risk factors from a list of RESULT AND ANALYSIS The quasi-delphi survey resulted in a moderate level of consensus among panelists (Kendall s W > 0.5). The final round resulted in a Kendall s W of on the client side, and a Kendall s W of on the vendor side. According to Schmidt (1997), Kendall s rank-order correlation coefficient (T) was
4 computed to test the agreement between the two panels, and T =.289 was obtained. Consulting a table of exact probabilities for T (Siegel and Castellan (1988), p. 362) show that the one-tailed probability is p =.146, suggesting that the two panels viewed risk perception differently. The analysis results indicate that there are regions of consistency and inconsistency among the client and vendor perceptions of risk factors. Table 2 lists the comparison between risks ranked as most important by the client and the vendor. Risk factors Client Vendor A. Lack of communication between client-vendor 1 2 B. Incomplete contracting 2 1 C. Lack of vendor commitment 3 10 D. Lack of top management support 4 5 E. Lack of schedule and budget management 5 4 F. Inadequate planning 6 9 G. Vendor financial instability 7 H. Poor vendor selection criteria and process by client 8 8 I. Requirements misunderstanding (or unclear) 9 6 J. Lack of experience and expertise with project activities 10 3 K. Inadequate staffing L. Failure to consider all costs M. Poor change management 13 7 N. Lack of active management of the vendor on contract and relationship O. Lack of knowledge transfer 15 P. Biased portrayal by vendor 16 Q. Customization of product 17 R. Lack of documentation management S. Lack of project management know-how T. Lack of audit and control from client 20 U. Lack of effective development methodology 11 V. Client readiness 13 W. Improper definition of roles and responsibilities 14 X. Lack of team morale 15 Y. Conflict between client and vendor 18 Table 2. Comparison of the client and vendor rankings The analysis results show that the clients and vendors agreed that only five of the same risk factors were important (score > 3 on average). These risks include: lack of communication between the client and the vendor, incomplete outsourcing contract, lack of top management support of the project, lack of schedule and budget management and inadequate project planning. In addition to the consistency, the results also reveal that there were disagreements between the clients and vendors. The clients ranked two important risk factors that are not considered important by the vendor: lack of vendor commitment to the project, and poor vendor selection criteria and process. The vendors perceived two risk factors as important that the clients did not: unclear requirements (or requirement misunderstanding), and lack of experience and expertise with project activities. Lack of vendor commitment is the third most important risk factor from the client s perspective.
5 5 CONCLUSION This study emphasizes the similarities and differences in the perceptions of two groups, clients and vendors, regarding the importance of outsourced IT project risks. Based on a literature review, we assembled 34 risk factors of outsourced IT projects. By conducting a quasi-delphi study, we analysed data from the separate perspectives of client panelists and vendor panelists, comparing the findings from both panels. We subsequently identified a consistent zone containing risk factors on which the two panels agreed, as well as inconsistent zones representing risk factors that were ranked as important by the clients but not by the vendors (or vice versa). The results indicate five important risk factors on which both clients and vendors agree. However, two of the seven important risks ranked by the client panel were not considered important (average score of less than 3) by the vendor panel. The study results provide the evidence that the clients and vendors perceived the importance of project risks differently, particularly those that stem from the opposite side. The results of identifying and comparing risk perceptions broaden the understanding of IT outsourcing project risk, and provide insights that may help facilitate the success of IT outsourcing. Acknowledgment This study is supported by NSC H MY2 References Choudhury, V. and Sabherwal, R. (2003). Portfolios of control in outsourced software development projects. Information Systems Research, 14 (3), Natovich, J. (2003). Vendor related risks in IT development: A chronology of an outsourced project failure. Technology Analysis & Strategic Management, 15 (4), Bahli, B. and Rivard, S. (2013). Cost escalation in information technology outsourcing: A moderated mediation study. Decision Support Systems, 56, Khalfan, A.M. (2004). Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors. International Journal of Information Management, 24 (1), Taylor, H. (2007). Outsourced IT projects from the vendor perspective: different goals, different risks. Journal of Global Information Management (JGIM), 15 (2), Loh, L. and Venkatraman, N. (1992). Determinants of information technology outsourcing: a crosssectional analysis. International Financial Services Research Center, Sloan School of Management, Massachusetts Institute of Technology. Barthelemy, J. (2001). The hidden costs of IT outsourcing. Sloan management review, 42 (3),
6 Khan, S.U., Niazi, M. and Ahmad, R. (2011). Barriers in the selection of offshore software development outsourcing vendors: An exploratory study using a systematic literature review. Information and Software Technology, 53 (7), Grover, V., Cheon, M.J. and Teng, J.T. (1996). The effect of service quality and partnership on the outsourcing of information systems functions. Journal of Management Information Systems, 12 (4), Qi, C. and Chau, P.Y. (2012). Relationship, contract and IT outsourcing success: Evidence from two descriptive case studies. Decision Support Systems, 53 (4), Aubert, B.A., Patry, M. and Rivard, S. (2005). A framework for information technology outsourcing risk management. ACM SIGMIS Database, 36 (4), Osei-Bryson, K.-M. and Ngwenyama, O.K. (2006). Managing risks in information systems outsourcing: An approach to analyzing outsourcing risks and structuring incentive contracts. European Journal of Operational Research, 174 (1), Willcocks, L.P., Lacity, M.C. and Kern, T. (1999). Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA. The Journal of Strategic Information Systems, 8 (3), Nakatsu, R.T. and Iacovou, C.L. (2009). A comparative study of important risk factors involved in offshore and domestic outsourcing of software development projects: A two-panel Delphi study. Information & Management, 46 (1), Aundhe, M.D. and Mathew, S.K. (2009). Risks in offshore IT outsourcing: A service provider perspective. European Management Journal, 27 (6), Jiang, J.J., Klein, G. and Discenza, R. (2002). Perception differences of software success: provider and user views of system metrics. Journal of systems and software, 63 (1), Keil, M., Tiwana, A. and Bush, A. (2002). Reconciling user and project manager perceptions of IT project risk: a Delphi study1. Information Systems Journal, 12 (2), Liu, S., Zhang, J., Keil, M. and Chen, T. (2010). Comparing senior executive and project manager perceptions of IT project risk: a Chinese Delphi study. Information Systems Journal, 20 (4), Schmidt, R., Lyytinen, K., Keil, M. and Cule, P. (2001). Identifying software project risks: an international Delphi study. Journal of management information systems, 17 (4), Schmidt, R.C. (1997). Managing Delphi Surveys Using Nonparametric Statistical Techniques. Decision Sciences, 28 (3), Siegel, S. and Castellan, N. (1988). Nonparametric statistics for the behavioral sciences McGraw-Hill, New York.
A Proposal Framework for Evaluating Risks of Information Technology Outsourcing
Proceedings of the 2011 International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, January 22 24, 2011 A Proposal Framework for Evaluating Risks of Information
More informationInformation & Management
Information & Management 46 (2009) 57 68 Contents lists available at ScienceDirect Information & Management journal homepage: www.elsevier.com/locate/im A comparative study of important risk factors involved
More informationReconciling user and project manager perceptions of IT project risk: a Delphi study 1
Info Systems J (2002) 12, 103 119 103 Reconciling user and project manager perceptions of IT project risk: a Delphi study 1 Mark Keil*, Amrit Tiwana & Ashley Bush * Department of Computer Information Systems,
More informationRisks and Audit Objectives for IT Outsourcing
Informatica Economică vol. 14, no. 1/2010 113 Risks and Audit Objectives for IT Outsourcing Claudiu BRÂNDAŞ West University of Timisoara, Faculty of Economics and Business Administration claudiu.brandas@feaa.uvt.ro
More informationMark Keil, Paul E. Cule, Kalle Lyytinen, androy C. Schmidt
We ve all heard tales of multimillion dollar mistakes that somehow ran off course. Are software projects that risky or do managers need to take a fresh approach when preparing for such critical expeditions?
More informationInfluence of service quality of Application Development Outsourcing that effect the acceptance of employment
Influence of service quality of Application Development that effect the acceptance of employment Jureeporn Thongthawai and Dr.Waraporn Jirachiefpattana has grown rapidly and has to play their role in small
More informationDulacha G. Barako Curtin University of Technology, Australia Dulacha.Barako@cbs.curtin.edu.au. Peter K. Gatere Central Bank of Kenya, Kenya
OUTSOURCING PRACTICES OF THE KENYAN BANKING SECTOR Dulacha G. Barako Curtin University of Technology, Australia Dulacha.Barako@cbs.curtin.edu.au Peter K. Gatere Central Bank of Kenya, Kenya ABSTRACT This
More informationInformation Systems Outsourcing Success: A Review
2010 International Conference on E-business, Management and Economics IPEDR vol.3 (2011) (2011) IACSIT Press, Hong Kong Information Systems Outsourcing : A Review Narasimhaiah Gorla Department of Management
More informationA Review of Risk Management for Information Systems Outsourcing
International Journal of Business, Humanities and Technology Vol. 5, No. 4; August 2015 A Review of Risk Management for Information Systems Outsourcing Philbert Nduwimfura Glorious Sun School of Business
More informationTop Ten Lists of Software Project Risks : Evidence from the Literature Survey. Tharwon Arnuphaptrairong
Top Ten Lists of Software Project Risks : Evidence from the Literature Survey Tharwon Arnuphaptrairong Abstract Software risk management is crucial for the software development s. It is used for planning
More informationINTERACT INTEGRATE IMPACT
INTERACT INTEGRATE IMPACT Proceedings of the 20th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE) Adelaide, Australia 7 10 December 2003 Editors
More informationFactors related to IT outsourcing result
IBIMA Publishing Journal of Outscoring and Organizational Information Management http://www.ibimapublishing.com/journals/jooim/jooim.html Vol. 2009 (2009), Article ID 102113, 9 pages Factors related to
More informationLeadership Development in Korea: A Delphi Study Headings must be in bold. 6th edition guidelines prior to Ed manual for more
Research and Theory Abstract ~Sample Paper~ Insert page number. 1 Leadership Development in Korea: A Delphi Study Headings must be in bold. Refer pp. 62-63 in the APA 6 th Myungweon Choi, University of
More informationSOFTWARE PROJECT RISKS AND THEIR EFFECT ON OUTCOMES
By Linda Wallace and Mark Keil SOFTWARE PROJECT RISKS AND THEIR EFFECT ON OUTCOMES How to identify the risks that interact to pose the most significant threats to successful project outcomes. While many
More informationReport on the Ontario Principals Council Leadership Study
Report on the Ontario Principals Council Leadership Study (February 2005) Howard Stone 1, James D. A. Parker 2, and Laura M. Wood 2 1 Learning Ways Inc., Ontario 2 Department of Psychology, Trent University,
More informationLean Six Sigma Training The DMAIC Story. Unit 6: Glossary Page 6-1
Unit 6: Glossary Page 6-1 Glossary of Terms Unit 6: Glossary Page 6-2 Action Plan A technique that documents everything that must be done to ensure effective implementation of a countermeasure or improvement
More informationRevisiting the Risks of Software Development Outsourcing Project
Revisiting the Risks of Software Development Outsourcing Project Haeng-Nam Sung 1, Dong-Hwan Cho 2 * 1 Management Information System, Gyeongsang National University, 900, Gazwa-dong, Jinju, Gyeongsangnam-do,
More informationInformation and Software Technology
Information and Software Technology 53 (2011) 693 706 Contents lists available at ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Barriers in the selection
More informationINFORMATION SYSTEMS OUTSOURCING: EXPLORATION ON THE IMPACT OF OUTSOURCING SERVICE PROVIDERS SERVICE QUALITY
INFORMATION SYSTEMS OUTSOURCING: EXPLORATION ON THE IMPACT OF OUTSOURCING SERVICE PROVIDERS SERVICE QUALITY Dr. Dae R. Kim, Delaware State University, dkim@desu.edu Dr. Myun J. Cheon, University of Ulsan,
More informationObstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain
6-8 June 204, Nippon Hotel, Istanbul, Turkey, ISBN: 978--922069-54-2 Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain Abdullah Al-Hadrami * and Sutan Hidayat
More informationINFORMATION TECHNOLOGY OUTSOURCING AS ORGANIZATIONAL SENSE- MAKING IN CITY GOVERNMENTS
INFORMATION TECHNOLOGY OUTSOURCING AS ORGANIZATIONAL SENSE- MAKING IN CITY GOVERNMENTS YONG-MI KIM Information Technology and Operations Management Florida Atlantic University Boca Raton, FL 33431 SHAILA
More informationThe effects of project uncertainty and risk management on IS development project performance: A vendor perspective
Available online at www.sciencedirect.com International Journal of Project Management 29 (2011) 923 933 www.elsevier.com/locate/ijproman The effects of project uncertainty and risk management on IS development
More informationThe gap between e-learning managers and users on satisfaction of e-learning in the accounting industry
ABSTRACT The gap between e-learning managers and users on satisfaction of e-learning in the accounting industry Kai Wen Cheng National Kaohsiung University of Hospitality and Tourism This paper conducted
More informationINSY 707 Winter 2007
STRATEGIC MANAGEMENT OF IT INSY 707 Winter 2007 PROFESSOR Name: Prof. Geneviève Bassellier Office: Bronfman 587 Office Hours: By appointment only E-Mail: genevieve.bassellier@mcgill.ca Office Phone: (514)
More informationAccepted Manuscript. Siffat Ullah Khan, Mahmood Niazi, Rashid Ahmad. S0950-5849(10)00152-7 10.1016/j.infsof.2010.08.003 Reference: INFSOF 5042
Accepted Manuscript Barriers in the selection of offshore software development outsourcing vendors: an exploratory study using a systematic literature review Siffat Ullah Khan, Mahmood Niazi, Rashid Ahmad
More informationOutsourcing Tools for IT
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2001 Outsourcing Tools for IT Wai-Ho Au Hareton Leung
More informationGoal and Risk Factors in Offshore Outsourced Software Development From Vendor's Viewpoint
2009 Fourth IEEE International Conference on Global Software Engineering Goal and Risk Factors in Offshore Outsourced Software Development From Vendor's Viewpoint Shareeful Islam 1, Md. Mahbubul Alam Joarder
More informationStakeholder Analysis: The Key to Balanced Performance Measures
Stakeholder Analysis: The Key to Balanced Performance Measures Robert M. Curtice Vice President, Performance Improvement Associates The Need for Balanced Performance Measures Traditional business performance
More informationStatistical Analysis on Relation between Workers Information Security Awareness and the Behaviors in Japan
Statistical Analysis on Relation between Workers Information Security Awareness and the Behaviors in Japan Toshihiko Takemura Kansai University This paper discusses the relationship between information
More informationDimensions for describing and explaining the successful outcome of the IS outsourcing process emphasising the relationship perspective
Dimensions for describing and explaining the successful outcome of the IS outsourcing process emphasising the relationship perspective Linda Bergkvist * Department of Information Systems Karlstad University
More informationThe Implementation of e-procurement System in Health Sector in Greece: Attitudes of Potential Users and Implications for Hospital Management
International Journal of Health Research and Innovation, vol. 1, no. 1, 2013, 15-23 ISSN: 2051-5057 (print version), 2051-5065 (online) Scienpress, 2013 The Implementation of e-procurement System in Health
More informationObstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain
Global Review of Accounting and Finance Vol. 6. No. 1. March 2015 Issue. Pp. 165 175 Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain Abdullah Al-Hadrami *
More informationIncluding Technical and Security Risks in the Development of Information Systems: A Programmatic Risk Management Model
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2003 Proceedings International Conference on Information Systems (ICIS) 12-31-2003 Including Technical and Security Risks in the
More informationA Success Measurement Model for Construction Projects
2011 International Conference on Financial Management and Economics IPEDR vol.11 (2011) (2011) IACSIT Press, Singapore A Success Measurement Model for Construction Projects Shahrzad Khosravi 1 + and Hamidreza
More informationAnalyzing and interpreting data Evaluation resources from Wilder Research
Wilder Research Analyzing and interpreting data Evaluation resources from Wilder Research Once data are collected, the next step is to analyze the data. A plan for analyzing your data should be developed
More informationTransformational leadership perceptions of Finnish nursing staff
Tarja Kvist, PhD, RN, University Researcher¹ Katri Vehviläinen-Julkunen, PhD, RN, Professor¹ ² Merja Miettinen, PhD, RN, Chief Nursing Officer² 1 Department of Nursing Science, University of Eastern Finland,
More informationUNC Leadership Survey 2012: Women in Business
UNC Leadership Survey 2012: Women in Business Quantitative Report UNC Kenan-Flagler Business School Executive Development 2013 Table of Contents Introduction 3 How to Read This Report 4 Key Findings 5
More informationProject Manager Interview Questions - Female vs. Male
Lessons Learned from Interviewing Project Managers R. Anthony (Tony) MAI The Dow Chemical Company P.O. Box 8361 South Charleston, WV 25303 Eldon R. LARSEN Engineering and Computer Science Division College
More informationColoradoFIRST Impact on Participant Future Education and Career Choices
1475 LAWRENCE STREET SUITE LC-2401 DENVER, CO 80202 Executive Summary ColoradoFIRST Impact on Participant Future Education and Career Choices ColoradoFIRST and FIRST Robotics Competition (FRC ) have certainly
More informationREQUIREMENTS MANAGEMENT: HOW IT BENEFITS YOUR BUSINESS
REQUIREMENTS MANAGEMENT: HOW IT BENEFITS YOUR BUSINESS TERRA FIRMA JULY 2013 In 2001, a group of researchers set out to develop a definitive list of risk factors as a reference tool for project managers
More informationTurnover on Information Security Professionals: Findings from Korea
HyeWon Yoo, TaeSung Kim 169 Turnover on Information Security Professionals: Findings from Korea HyeWon Yoo *, TaeSung Kim Department of Management Information Systems College of Business, Chungbuk National
More informationJournal of Business & Economics Research November, 2004 Volume 2, Number 11
Service Quality In Accounting Firms: The Relationship Of Service Quality To Client Satisfaction And Firm/Client Conflict Carl L. Saxby, (E-mail: csaxby@usi.edu), University of Southern Indiana Craig R.
More informationA Survey on the Need to Offer Forensic Accounting Education in the Kingdom of Bahrain
International Journal of Pedagogical Innovations ISSN 2210-1543 Int. J. Ped. Inn. 2, No. 2 (July 2014) A Survey on the Need to Offer Forensic Accounting Education in the Kingdom of Bahrain Sutan Emir Hidayat
More informationBarriers & Incentives to Obtaining a Bachelor of Science Degree in Nursing
Southern Adventist Univeristy KnowledgeExchange@Southern Graduate Research Projects Nursing 4-2011 Barriers & Incentives to Obtaining a Bachelor of Science Degree in Nursing Tiffany Boring Brianna Burnette
More informationImpact of ICT Solutions: Outsourcing on Organizations Performance in Telecom Sector
2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Impact of ICT Solutions: Outsourcing on Organizations Performance in Telecom Sector Erum Naz
More informationCHAPTER FIVE CONCLUSIONS, DISCUSSIONS AND RECOMMENDATIONS
CHAPTER FIVE CONCLUSIONS, DISCUSSIONS AND RECOMMENDATIONS This chapter presents (1) summary of the study, (2) summary of the findings, (3) discussions of the results, (4) conclusions, and (5) recommendations
More informationThe impact of ITIL (information technology infrastructure library) recommended practices on the IT outsourcing relationship
Abstract The impact of ITIL (information technology infrastructure library) recommended practices on the IT outsourcing relationship Mohammed Alojail School of Business Information Technology and Logistics
More informationGlobal Software Development Projects in One of the Biggest Companies in Latvia: Is Geographical Distribution aproblem?
SOFTWARE PROCESS IMPROVEMENT AND PRACTICE Softw. Process Improve. Pract. 2006; 11: 61 76 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/spip.252 Global Software Development
More informationEvaluating the Factors Affecting on Intension to Use of E-Recruitment
American Journal of Information Science and Computer Engineering Vol., No. 5, 205, pp. 324-33 http://www.aiscience.org/journal/ajisce Evaluating the Factors Affecting on Intension to Use of E-Recruitment
More informationAttitudes and Beliefs of Job Development Professionals toward Employers
Attitudes and Beliefs of Job Development Professionals toward Employers August 2011 prepared by Ellen S. Fabian, Ph.D. Monica Simonsen, Ph. D. LaVerne Buchanan, Ed.D. Richard G. Luecking, Ed.D. This technical
More informationA NEEDS ASSESSMENT FOR GRADUATE PROGRAMS IN EDUCATION FACULTIES
A NEEDS ASSESSMENT FOR GRADUATE PROGRAMS IN EDUCATION FACULTIES Assist. Prof. Dr. Mustafa Cansiz Artvin Çoruh University Education Faculty Artvin - TURKEY mustafacansiz@gmail.com Dr. Nurcan Cansiz Atatürk
More informationTHE NECESSARY SOFTWARE MEASUREMENT KNOWLEDGE IN SOFTWARE ENGINEERING EDUCATION FROM THE PRACTITIONERS POINT OF VIEW
THE NECESSARY SOFTWARE MEASUREMENT KNOWLEDGE IN SOFTWARE ENGINEERING EDUCATION FROM THE PRACTITIONERS POINT OF VIEW Monica Villavicencio 1,2, Alain Abran 1 1 École de technologie supérieure, Montréal,
More informationCulinary Graduates Career Decisions and Expectations
Culinary Graduates Career Decisions and Expectations Chih-Lun (Alan) Yen Department of Hospitality and Tourism Management Pamplin College of Business Virginia Polytechnic Institute and State University
More informationAPPLYING HIERCARCHIAL SERVICE QUALITY MODEL IN MEASURING MOBILE PHONE SERVICE QUALITY IN ALGERIA
APPLYING HIERCARCHIAL SERVICE QUALITY MODEL IN MEASURING MOBILE PHONE SERVICE QUALITY IN ALGERIA Mr Ameur Bensalem 1, Dr Rahima Houalef 2 1. University Assistant Lecturer, The University of Bechar, Bechar,
More informationThe Relationship between the Fundamental Attribution Bias, Relationship Quality, and Performance Appraisal
The Relationship between the Fundamental Attribution Bias, Relationship Quality, and Performance Appraisal Executive Summary Abstract The ability to make quality decisions that influence people to exemplary
More informationImpact of Rationality in Creating Consumer Motivation (A Study of State Life Insurance Corporation Peshawar - Pakistan) Shahzad Khan
(A Study of State Life Insurance Corporation Peshawar - Pakistan) Shahzad Khan Abstract This study primarily attempts to investigate the relationship among the variable to create rational motivation in
More informationTable of Contents. Excutive Summary
Presented by: 1 Table of Contents Excutive Summary I. Introduction II. Methodology III. Results of the Graduate Impact Survey IV. Implications and Outlook V. Literature 2 Executive Summary The Graduate
More informationWorkforce Insights Employee Satisfaction Surveying
Workforce Insights Employee Satisfaction Surveying Overview One significant factor in your call center s success is how happy and satisfied the employees are. Employee satisfaction has an extremely high
More informationProject Management for Process Improvement Efforts. Jeanette M Lynch CLSSBB Missouri Quality Award Examiner Certified Facilitator
Project Management for Process Improvement Efforts Jeanette M Lynch CLSSBB Missouri Quality Award Examiner Certified Facilitator 2 Project and Process Due to the nature of continuous improvement, improvement
More informationIT projects have an unenviable reputation for their high failure rate. Successful
RISK MANAGEMENT AND PROBLEM RESOLUTION STRATEGIES FOR IT PROJECTS: PRESCRIPTION AND PRACTICE HAZEL TAYLOR, University of Washington ABSTRACT This study reports findings from an exploratory field study
More informationThe Concept of Project Success What 150 Australian project managers think D Baccarini 1, A Collins 2
The Concept of Project Success What 150 Australian project managers think D Baccarini 1, A Collins 2 1 Curtin University of Technology, Perth, Western Australia 2 Broad Construction Services, Perth, Western
More informationInnovative IT Staffing Solutions
Innovative IT Staffing Solutions.......... New Hire Training Programs can produce qualified IT Staff at discount rates By: Joseph W. Fisher, President Fisher Associates, Inc. Copyright 2006 Fisher Associates,
More informationCopyright 2004.Pamela Cole. All rights reserved.
Key concepts for working with the Role Behavior Analysis The Role Behavior Analysis (RBA), the companion instrument to the Personal Profile System (PPS), uses specific DiSC behavioral statements for defining,
More informationPMI Risk Management Professional (PMI-RMP) Exam Content Outline
PMI Risk Management Professional (PMI-RMP) Exam Content Outline Project Management Institute PMI Risk Management Professional (PMI-RMP) Exam Content Outline Published by: Project Management Institute,
More informationOutsourcing Life Cycle: Integrating DMAIC Controls. WCQI Concurrent Session: M09 Monday May 21, 1:30 2:30 PM Presenter: Daniel Zrymiak
Outsourcing Life Cycle: Integrating DMAIC Controls WCQI Concurrent Session: M09 Monday May 21, 1:30 2:30 PM Presenter: Daniel Zrymiak Introduction This presentation combines knowledge of an Outsourcing
More informationDevelopment and Implementation of a Web-Based Biodata Inventory for Food Inspectors
Development and Implementation of a Web-Based Biodata Inventory for Food Inspectors Henry F. Thibodeaux, PhD Jeffrey M. Cucina Alix L. Roberts, MA UNITED STATES OFFICE OF PERSONNEL MANAGEMENT ... I hope
More informationAnalysis of the perceptions of accounting students and practitioners regarding the ethnicity of earnings management post Sarbanes-Oxley
Analysis of the perceptions of accounting students and practitioners regarding the ethnicity of earnings management post Sarbanes-Oxley ABSTRACT Deborah M. Pendarvis University of Tampa David E. Morris,
More informationDETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING
Proceedings of the International Conference for Education, 2005 World Scientific Publishing Company DETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING SHOW-HUI HUANG International Business & Trade, Shu-Te
More informationWe begin by presenting the current situation of women s representation in physics departments. Next, we present the results of simulations that
Report A publication of the AIP Statistical Research Center One Physics Ellipse College Park, MD 20740 301.209.3070 stats@aip.org July 2013 Number of Women in Physics Departments: A Simulation Analysis
More informationMARKETING: THE NEXT GROWTH AREA FOR OUTSOURCING IN HIGH TECHNOLOGY COMPANIES
MARKETING: THE NEXT GROWTH AREA FOR OUTSOURCING IN HIGH TECHNOLOGY COMPANIES Created by: Stage 4 Solutions, Inc. Tel: (408) 868-9739 Web site: www.stage4solutions.com August 2006 Copyright 2006 Stage 4
More informationTechnology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia
International Review of Business Research Papers Vol.4 No.5. October-November 2008. PP.1-10 Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In
More informationMOTIVATION IN PROJECT MANAGEMENT: THE PROJECT MANAGER S PERSPECTIVE
MOTIVATION IN PROJECT MANAGEMENT: THE PROJECT MANAGER S PERSPECTIVE March, 2007 Bernhard Schmid, MS, PMP Department of Communication The Florida State University bernhard@comm.fsu.edu Dr. Jonathan Adams
More informationThe Role and the Effects of Risk Management in IT Projects Success
86 DOI: 10.12948/issn14531305/17.1.2013.08 Informatica Economică vol. 17, no. 1/2013 The Role and the Effects of Risk Management in IT Projects Success Otniel DIDRAGA West University of Timisoara, Faculty
More information3-Step Competency Prioritization Sequence
3-Step Competency Prioritization Sequence The Core Competencies for Public Health Professionals (Core Competencies), a consensus set of competencies developed by the Council on Linkages Between Academia
More informationOnline International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN 2249-9598, Volume-V, Issue-V, Sept-Oct 2015 Issue
Study of Employee Perception towards Performance Appraisal System with Special Reference to Education Sector in Pune City Sunanda Navale Founder Secretary, Sinhgad Technical Education Society, Ambegaon
More informationWell-Defined Processes and Their Effects on Business Process Outsourcing Vendor s Success: an Integrated Framework
Well-Defined Processes and Their Effects on Business Process Outsourcing Vendor s Success: an Integrated Framework Zhanhe Du 1, 2 Xiuwu Liao 1 1 School of Management, Xi an Jiao Tong University, Xi an,
More informationInvestment Governance Practices for Foundations & Endowments
Non-Profit Management Research Panel Investment Governance Practices for Foundations & Endowments In September 2013, the Non-Profit Management Research Panel conducted a poll to explore current investment
More informationIS PLANNING IN NON-PROFIT ORGANIZATIONS: AN EXPLORATORY STUDY
IS PLANNING IN NON-PROFIT ORGANIZATIONS: AN EXPLORATORY STUDY Janice Klemz, The University of Wisconsin-Whitewater Gerry Simon, The University of Wisconsin-Whitewater Anil Kumar, Central Michigan University,
More informationSTANDARD FOR AUDITING PROJECTS DEFINITIONS AND RULES
Deutsches Institut für Interne Revision e.v. (German Institute for Internal Auditing) DIIR Audit Standard No. 4 STANDARD FOR AUDITING S DEFINITIONS AND RULES DIIR Project Management Audit Project Group
More informationOffshore Country Selection Risk Management Model: Systematic Literature Review Protocol
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 4 (July-Aug. 2012), PP 46-55 Offshore Country Selection Risk Management Model: Systematic Literature Review Protocol Nasir
More informationA Decision-Making Framework for IT Outsourcing using the Analytic Hierarchy Process
A Decision-Making Framework for IT Outsourcing using the Analytic Hierarchy Process Vivek Pandey and Veena Bansal October 14, 2003 Abstract Information Technology Outsourcing (ITO) has generated considerable
More informationHow To Find Out What Type Of Student Is Successful Online
Learning Orientations, Tactics, Group Desirability, and Success in Online Learning Diane D. Chapman, Ed.D. Teaching Assistant Professor North Carolina State University Since the inception of Web-based
More informationWhy is the Governance of Business Intelligence so Difficult? Mark Peco, CBIP mark.peco@inqvis.com
Why is the Governance of Business Intelligence so Difficult? Mark Peco, CBIP mark.peco@inqvis.com Seminar Introduction A Quick Answer Unclear Expectations Trust and Confidence Narrow Thinking Politics
More informationThe perceptions of business students regarding management information systems (MIS) programs
Abstract The perceptions of business students regarding management information systems (MIS) programs Patrick Hogan Turner College of Business and Computer Science Lei Li Turner College of Business and
More informationIdentifying and Prioritizing Research Gaps. Tim Carey, M.D., M.P.H. Amica Yon, Pharm.D. Chris Beadles, M.D. Roberta Wines, M.P.H.
Identifying and Prioritizing Research Gaps Tim Carey, M.D., M.P.H. Amica Yon, Pharm.D. Chris Beadles, M.D. Roberta Wines, M.P.H. 1 Importance: Why We Need to Identify and Prioritize Research Gaps from
More informationEvaluation Of PMI s Risk Management Framework And Major Causes Of Software Development Failure In Software Industry
Evaluation Of PMI s Risk Management Framework And Major Causes Of Software Development Failure In Software Industry Kamran Khan, Salman Qadri, Shabir Ahmad, Abu Buker Siddique, Anam Ayoub, Shaista Saeed
More informationA Comparison of Training & Scoring in Distributed & Regional Contexts Writing
A Comparison of Training & Scoring in Distributed & Regional Contexts Writing Edward W. Wolfe Staci Matthews Daisy Vickers Pearson July 2009 Abstract This study examined the influence of rater training
More informationAnalysis of IT Multisourcing Practice in a Telecommunication Company
IBIMA Publishing Journal of Outsourcing & Organizational Information Management http://www.ibimapublishing.com/journals/jooim/jooim.html Vol. 2013 (2013), Article ID 302312, 10 pages Research Article Analysis
More informationAnalysis of the Risk in Information Technology (IT) outsourcing In Public Organisations
Analysis of the Risk in Information Technology (IT) outsourcing In Public Organisations Momoh A. Attai, Makoji Stephen & Alfa Patrick Innocent Federal Polytechnic, Idah - Kogi State. odogbas@yahoo.com,
More informationBrenau University Psychology Department Thesis Components Checklist
1 Brenau University Psychology Department Thesis Components Checklist Overview of Thesis Component Description/Purpose Comments/Feedback Abstract Summary of study in 150-200 words Chapter 1- Introduction
More informationThe automotive manufacturing sector is
BUILDING A SUSTAINABLE WORKFORCE: APPRENTICESHIP IN THE CANADIAN AUTOMOTIVE INDUSTRY The Canadian Automotive Manufacturing Industry at a Glance The automotive manufacturing sector is struggling in the
More informationPartnering for Project Success: Project Manager and Business Analyst Collaboration
Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,
More informationSoftware Risk Factors in Developing E-Governance Projects
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Software Risk Factors in Developing E-Governance Projects Ms. Harmeet Malhotra Associate Professor,
More informationMeeting the Challenges of Designing the Kauffman Firm Survey: Sampling Frame, Definitions, Questionnaire Development, and Respondent Burden
Meeting the Challenges of Designing the Kauffman Firm Survey: Sampling Frame, Definitions, Questionnaire Development, and Respondent Burden Janice Ballou 1, David DesRoches 1, Zhanyun Zhao 1, and Frank
More informationAudit Readiness Lessons Learned
Audit Readiness Lessons Learned Four Tips for Achieving a Smooth Audit It seems obvious: Prepare well and prepare ahead of time and the year-end audit does not have to be the painful experience most organizations
More informationEVALUATION METHODS TIP SHEET
EVALUATION METHODS TIP SHEET QUANTITATIVE METHODS: Quantitative data collection methods consist of counts or frequencies, rates or percentages, or other statistics that document the actual existence or
More informationIDG Connect DDoS Survey
KEY FINDINGS INTERACTIVE GUIDE 2016 IDG Connect DDoS Survey As Attacks Intensify DDoS Defenses Require New Strategies Introduction IDG (commissioned by A10 Networks ) conducted a survey of over 120 North
More informationAnalysis of risks faced by information technology offshore outsourcing service providers
Published in IET Software Received on 30th September 2013 Revised on 11th April 2014 Accepted on 26th May 2014 Analysis of risks faced by information technology offshore outsourcing service providers Faheem
More informationITOUTSOURCING. Outsourcing has been a key method A RELATIONSHIP PERSPECTIVE ON
A RELATIONSHIP PERSPECTIVE ON ITOUTSOURCING A longitudinal study at four companies provides valuable insights about the evolution of IT outsourcing relationships. Outsourcing has been a key method for
More informationMissing Data. A Typology Of Missing Data. Missing At Random Or Not Missing At Random
[Leeuw, Edith D. de, and Joop Hox. (2008). Missing Data. Encyclopedia of Survey Research Methods. Retrieved from http://sage-ereference.com/survey/article_n298.html] Missing Data An important indicator
More information