ABSTRACT Informationtechnologyhasbecomeoneofthefastest-growing,fastest-changing

Size: px
Start display at page:

Download "ABSTRACT Informationtechnologyhasbecomeoneofthefastest-growing,fastest-changing"

Transcription

1 APPLICATIONSDEVELOPMENT: OUTSOURCINGSOFTWARE ISSUES,IMPLICATIONS, EdKazmierczakFergusO'Brien RashaAbbasPhilipDart TechnicalReport97/27 ANDIMPACT DepartmentofComputerScience TheUniversityofMelbourne Parkville3052,Australia December1997

2 DEVELOPMENT:ISSUES,IMPLICATIONS,AND OUTSOURCINGSOFTWAREAPPLICATIONS EricssonAustralia 723SwanstonSt RashaAbbasIMPACT Carlton,3053 TheUniversityOfMelbourne ComputerScience Parkville3052 PhilipDart TheUniversityOfMelbourne EdKazmierczak ComputerScience Parkville Australia Australia FergusO'Brien 723SwanstonSt Carlton3053 Australia SERC

3 ABSTRACT Informationtechnologyhasbecomeoneofthefastest-growing,fastest-changing marketsintheworld.thehighdemandonsoftwareapplicationsandservicesisforcingmorecompaniestoturntooutsourcingtomeettheircustomer Boththetechnicalandmanagementaspectsoftheseissuesareaddressed. sourcingsoftwaredevelopment,weexaminetheissuesandconcernswhich operations,productsordevelopmentofapplications. Further,theimpactofoutsourcingonsoftwaredevelopmentprocessesisdiscussed.Weconcludebydrawingattentiontotheissuesandtechnicalfactors whichinuencetheoutsourcingdecision. Inparticular,weattempttoisolatesomeofthemotivatingfactorsforout- needs.wedenesoftwareoutsourcingascontractingoutsoftwareservices, arisefromoutsourcingsoftwaredevelopmentanddiscusstheirimplications. Thispaperpresentsanoverviewofoutsourcinginsoftwaredevelopment.

4 2DriversforOutsourcing Contents 1Introduction 2.1GlobalisationandGlobalSoftwareOutsourcing SpecialisationandSoftwareOutsourcing AimsofthePaper FacetsofSoftwareOutsourcing SoftwareOutsourcing SoftwareDevelopmentOutsourcing:IssuesandImpact8 3ApplicationDevelopmentOutsourcing 3.2OutsourcingPhasesofApplicationDevelopment OutsourcingComponentsOftheSoftwareApplication KeyBenetsOfOutsourcing ImpactOfOutsourcingonSoftwareDevelopment IssuesinSoftwareDevelopmentOutsourcing DegreeandCategoryofOutsourcing SummaryandFurtherWork 4.3TheOutsourcingDecision i

5 ListofFigures 6Decisiontreeforoutsourcing Analysingtheoutsourcingdecision Impactofoutsourcingonsoftwaredevelopmentmodels Examplesofdevelopmenttasks...7 4Focusoncorebusiness...8 2Contractingoutpartofasoftwaresystem...5 1Facetsofsoftwareoutsourcing...2 ii

6 ListofTables 1IssuesinOutsourcing...9 iii

7 1Introduction Informationtechnology(IT)hasbecomeoneofthefastest-growing,fastestchangingmarketsintheworld.Thedemandtoproduceneworspecialised softwareforspecialisedmarkets,business,governmentordomesticuseis everincreasing.forexamplethetelecommunicationsindustry,whichwas valueofaswitchinitssoftware[20].inaddition,thedemandfornew foundedonelectro-mechanicalgenius,nowplacesmorethan80%ofthe telecommunicationsservices,primarilybasedonsoftware,orsupportedor technologyworldandthedemandsimposedonthem. tructuresandstaexpertisetokeepupwiththechangesintheinformation customisedbysoftware,isincreasingandgrowingmorevital. inabilityoforganisationstodevelopcodefastenoughorchangetheirinfras- itsabilitytodeliver[18].indeed,theneedforoutsourcingisdrivenbythe ingthepaceofchange,theindustryisseeingcustomerneedsoutstripping grow,manyoftheopportunitiesareturningintothreats.farfrommaintain- However,asthescaleandcomplexityofthemarketplacecontinuesto Outsourcingisanewtermforanoldpracticeandisnotlimitedtothe 1.1SoftwareOutsourcing informationtechnologyworld;itmeanscontractingoutwork[5,13].we denesoftwareoutsourcingascontractingoutthedevelopment,planning, management,training,maintenance,oroperationofsoftwareservices,skills, products,orapplications. isted,butwhatrenewsinterestinsoftwareoutsourcinganddemandsour attentiontodayisthedramaticchangeinscope.softwareoutsourcingin thepastwaslimitedtosub-contractingandsmall-scalecontracts.however,itisbecomingamulti-billiondollarglobalindustry,andasizeable InternationalTradeCommissionreport,theglobaloutsourcingmarketisexpectedtoreach$99billioninrevenuesby1998[9].Asaresult,vendorsthat Enterpriseshavebeencontractingoutforaslongasbusinesshaveex- proportionofallitresourcesarespentonoutsourcing.accordingtoau.s. andglobalandlarge-scaleoutsourcingisbecomingmoreprevalent. specialiseinoutsourcingservicesoroutsourcingmanagementaregrowing expertise,sharingrisksandcosts,andre-usingproductsandexperiences. achievedthroughimprovingcompanyfocus,gainingaccesstotheneeded productsandservices,speeddeliverytimes,andreducecosts.thisis thedevelopmentdemands[13,23]. tools,makingalliancesandusingexternalexpertisetohelpkeepupwith demands.moreorganisationsareusingnewbutnotnecessarilyhomegrown Withoutsourcing,organisationsaimtoimprovequalitiesofsoftware Organisationsareengaginginoutsourcinginanattempttomeetmarket Fortheremainderofthepaper,wewillusethefollowingdenitions: 1

8 Outsourcer:Thepartythatusestheexternalproviderfortheoutsourced In-house:Useofinternalresources. Outsourcing:Useofexternalagents. Outsourcingvendor:Thecontractororexternalproviderdeliveringthe service. 1.2FacetsofSoftwareOutsourcing Collaborativesoftwaredevelopment:Useofbothin-houseandcontracted laborativeoutsourcingisalsoknownasallianceoutsourcing[16]. servicestoaccomplishasoftwaredevelopmenttask.thistypeofcol- outsourcingservicetotheoutsourcer. orprocessdependingontheorganisation'ssituationandneeds. cernusherearepeople,technologyandprocessasrepresentedinfigure1. Outsourcingcantakeplaceinanyoneoftheareasofpersonnel,technology Softwareoutsourcinghasmanyfacets,butthethreemainonesthatcon- neededexpertise.withshortagesinqualiedpeople,resourcingisbecoming amajordrivingfactorforoutsourcing.outsourcingpeoplealsosavesthe pathsneededtoattractandkeeptalentedpeopleandsavesontrainingcosts organisationfromthetroubleofprovidingthevarietyofworkandcareer forstaintherapidlychangingitindustry. Theoutsourcingofpeopletakesplacetoprovidetheorganisationwith Figure1:Facetsofsoftwareoutsourcing. outsourcingthetaskofauditingcompliancetoastandard,oroutsourcing anyprocedureorprocessassociatedwithit.thismaycover,forexample, outsourcepartsofthesoftwaredevelopmentprocessinordertoimproveef- partsoftheapplicationdevelopmentprocess.organisationsmaydecideto ciencyandqualityoftheiroveralldevelopmentprocess.alternatively,the Processoutsourcingisanotherfacetofsoftwareoutsourcingthatcovers 2 People Process Outsourcing Technology

9 ample,softwaredevelopmentforspecialisedrequirements,suchassecurity orsafety,requiresspecialprocessestobefollowedandspecialisedanalyses organisationmayneedtoimplementnewlyevolvingprocesses,improveprocessspeedandtimetodelivery,reduceprocessrisk,ortofollowaspecied process,withspeciedtasks,ofwhichithaslittleornoexperience.forex- andtestingofnewtechnologies,ortechnologyadviceandsupportservices. tobeundertaken[3,6]. nology[19].examplesofoutsourcingwhicharemotivatedbytechnology Thisgivestheorganisationincreasingexibilityandaccesstomoderntechtionsresorttooutsourcingfortechnologyeducationservices,identication aimingtoreducetheriskinvolvedininvestinginnewtechnologies,organisagies.lackingexpertiseorknowledgeofthesenewtechnologiesin-houseand competitive,organisationsoftenneedtoembraceawidevarietyoftechnolo- Neworemergingtechnologiesarethethirdfacetofoutsourcing.Tobe aremakinguseofcuttingedgeprogramminglanguages,operatingsystems, opmentraisesomeinterestingproblemsandissueswhichmustbeaddressed. outsourcing.however,thetechnicalaspectsofoutsourcingsoftwaredevelcialiseddevelopmenttools. 1.3AimsofthePaper hardwareandsoftwareplatforms,emergingnetworktechnologiesandspe- Manyorganisationshaverecordedfailuresanddisappointmentsbecauseof TheincreasingcomplexityoftheITworlddrivesmoreorganisationstoward alackofproceduresandclaritypriortoembarkingonoutsourcingventures. problemisthatthefearofgivingtoogreatamonopolytothesupplier analysetheissuesthatarisewithsoftwaredevelopmentoutsourcingandto establishframeworksandmodelswhichallowtheorganisationstooutsource withtoofewwaysofmeasuringvalueformoneyisstillpreventingsome organisationsfrommakingfulluseofoutsourcing[15].thereisaneedto aspectsoftheirsoftwaredevelopmentwithoutlosingcontrol. Further,outsourcinginsoftwaredevelopmentisagrowingarea.The Furthermore,wecomparekeymanagementandtechnicaldecisionsthatin- fromoutsourcinginsoftwaredevelopmentanddiscusstheirimplications. uenceoutsourcinginsoftwaredevelopment.finallywediscusstheeect opmentinanattempttoidentifythetechnicalandmanagerialissuesthat ofoutsourcingoncurrentsoftwaredevelopmentprocesses. toisolatesomeofitsmotivatingfactors.weexaminetheissueswhicharise Theaimofthispaperistoshedlightonoutsourcingsoftwaredevel- Inthispaperwelookatoutsourcingsoftwaredevelopmentandattempt inuenceoutsourcingdecisions. aswellaslessonsdrawnfromoutsourcingprojectswithinericssonaustralia. Ourpaperdrawsonexperiencesthathavebeenrecordedintheliterature 3

10 Inthefollowingsections,wediscusssomeofthetrendsandthekeybenets 2DriversforOutsourcing villageandthistrendisoftenreferredtoasglobalisation.globalisation thatcompaniesarenotboundbytheirlocalexpertisebecauseinternational providesnewopportunitiesinternationallyformanycompanies.itmeans Withthefastadvancesincommunication,ourworldisbecomingaglobal ofoutsourcingandcollaborativesoftwaredevelopment. resourcesarenowwithinreach.thistrendisencouragingcollaborativesoftwaredevelopmentandglobalsoftwareoutsourcingbecauseunlikematerial goods,digitalinformationcanbetransportedquicklyandcheaply.software 2.1GlobalisationandGlobalSoftwareOutsourcing Manyorganisationsarenowturningtooutsourcingtohelpthemcutcosts, countriesforafractionofthecostofdevelopingtheproductlocally[13]. 2.2SpecialisationandSoftwareOutsourcing technologicalexpertiseorforareductionincostoverlocalcompetitors.indeed,softwareprogrammingcan,andhas,beenoutsourcedtothirdworld developmenttaskscanberelocatedtoanothercountryfortheiradvanced andleavetheresttosomebodyelse.astheitworldischangingsofastand organisationsconcentrateonwhattheyaregoodat theircorebusiness needtospecialiseinspecicareas.outsourcingtendstobecoupledwith personororganisationcancaptureeverythinginitandthenkeepupwith theupdates,upgrades,changes,andadditions.peopleandorganisations improveservices,andfocusontheircorebusinessactivities[13].thishelps growingincreasinglymorecomplex,specialisationisbecomingvital.noone specialisation.asapartybecomesspecialised,workcanbedonemore reusesolutionsthathaveworkedfortheminthepast.whentheynda eciently.ratherthansolvingeveryproblemfromrstprinciples,they software[10]. concentrateonitsexistingexpertiseinhigh-availabilitytelecommunications nology,ratherthandevelopingitsown.theaimistoallowthecompanyto cusedstrategies,forexample,sunmicrosystemsfocusesinternaloperations onsmallsetofcriticalcoreactivitiesandoutsourcenearlyeverythingelsein itsvaluechain[16].alcatelhasdecidedtobuy-indigital'scomputertech- goodsolution,theyuseitrepeatedlywithdierentcustomers. ITrmshavebeenpioneersindevelopingpartneredrelationshipsandfo- 2.3KeyBenetsOfOutsourcing Initially,outsourcingwasusedasameansforcuttingcosts.However,itwas realisedthatitisnotjustaboutcuttingcosts,butmoreaboutimproving 4

11 servicesandfocusingoncorebusinessactivities,aswellascopingwithinternalandexternaldemands.marketleadersinallindustriesareincreasingly usingoutsourcingasawaytobuildandsustaincompetitiveadvantage[21]. Outsourcingalsohelpsorganisationstoimprovefocus,capitaliseonglobal opportunitiesandfreeupin-houseresourcesformorestrategictasks.further,outsourcingprovidesameansofkeepingpacewithchangesintheit industrywithouttheoverheadofconstantlytrainingstafornewtechnologies[4]. Anotherlessobvious,yetequallyimportant,benetofoutsourcingisin breakingawayfromanorganisation'sparadigm,whichincludesitsprocesses, technologyandpersonnel.softwaredevelopmentcanbecarriedoutby peoplethatarenotfromthesameorganisationorinthesamegeographical locationandconsequentlybringadierentapproachtothedevelopment. Recentresearchindicatesthatcrossingparadigmshelpstounlockcreativity andtocultivateideasandafreshwayoflookingatanddoingthings[12,17]. Foroutsourcingvendorsthereisabenetduetotheeconomiesofscale. Outsourcingvendorscanreusematerialforcommonapplicationsandspread theirsoftwaredevelopmentcostsamonganumberofcustomers In-House Outsourced Software Application Figure2:Contractingoutpartofasoftwaresystem. 3ApplicationDevelopmentOutsourcing Byapplicationdevelopmentoutsourcingwemeancontractingoutthedevelopmentofanapplication.Itcantaketheformofcontractingouttheentire application,totaloutsourcing,orcontractingoutonlysomecomponentsof thedevelopmentoftheapplication,selectiveoutsourcing.selectiveoutsourcingcanoccurinoneoftwoforms:outsourcingtheproductsrequired 5

12 ofasoftwaredevelopmentphaseoroutsourcingtheproductionofadened componentofthesoftwareapplication. isrequiredtomeettherequirementsandcommunicatethroughtheinterfaces,butmaybefreebeyondthattoadoptanyparadigmorpracticeto beoutsourcedaswellasitsinterfacesordrivers.theoutsourcingvendor totheserequirementsneedtobecommunicatedandagreeduponandmay besubjecttocollaborativecongurationmanagementorcollaborativerisk fullthem.anychangesfromtheoutsourcerortheoutsourcingvendor Figure2isintendedtoindicatethedegreesoffreedomintheoutsourcing 3.1OutsourcingComponentsOftheSoftwareApplication arrangement.theoutsourcerdenestherequirementsofthecomponentto asoftwareapplication. Applicationcomponentoutsourcingmeanscontractingoutacomponentof carryoutoneormoreofthesoftwaredevelopmentphases,forexample, Outsourcingsoftwaredevelopmentphasesmeanscontractingavendorto management. outsourcetheprogrammingtaskswhileretainingtheanalysisanddesign externalexpertisemayberequiredduringtherequirementsanalysis,design,coding,testing,ormaintenancephases.moretypically,organisations 3.2OutsourcingPhasesofApplicationDevelopment phases.notethatdevelopmentphasescanbecompletelyoutsourcedor Outsourcingcanlieonaspectrumwithcontractingouttheentiredevelopmentatoneend(totaloutsourcing)andoutsourcingnoneofitattheother 3.3DegreeandCategoryofOutsourcing theycanbecarriedoutcollaboratively. arecommonknowledgetopeopleintheindustryorroutinetasks.these tasks.further,thesetaskscanbeassociatedwiththeprocessorcomponent (totalin-house). (seefigure3forsomeexamplesofsuchtasks).commontasksaretasksthat cationschemeclassiestasksascontroltasks,specialisedtasksorcommon experiencetodothem.specialisedtasksaretasksthatneedspecialised taskscouldberesourceintensiveortimeconsumingbutrequirelessdomain moredetailatthekindsoftaskswhicharebeingoutsourced.ourclassi- Inthispaperweuseasimpleclassicationschemeinordertolookin mon,specialised,orcontrol)mayfallintooroutsidethecorecompetencies agementtasks)ortasksthatcontroltheapplication(forexampleaccessto lesystem,memoryaccess,orprocessspawning).further,thesetasks(com- knowledgeandhighdomainexperiencetobedoneeciently.controltasks arethetasksthatcontrolthedevelopmentprocess(forexampleprojectman- 6

13 Common Tasks Common Tasks - Programming - Glue Code Specialised Tasks Specialised Tasks oftheorganisation.corecompetenciesarecriticalactivities,skillservices, Figure3:Examplesofdevelopmenttasks. - Application Design - Data & Information Management - Test Plans - Education & Training - Legacy Transformation Control Tasks Control Tasks - Project Management - Access to Memory - Formal Reviews - Security Manager - Change Request Signatory estedinacquiringorcannotacquireintheneededtimeframe.anexample andknowledgebasesthatcreatecontinuousaddedvalueandcompetitive portantbutneedveryspecialisedresourcesthattheoutsourcerisnotinter- advantagetotheorganisationanddistinguishitfromitscompetitors[5]. partoftheircorestrategiccompetencies. outsourcingmainlycommontasksandsomespecialisedtasksthatarenot Specialisedtaskswhichareoutsourcedcouldbehighlycriticalandim- Thecasestudiesin[5,,15,22]seemtoindicatethatorganisationsare PROCESS PRODUCT ofoutsourcedspecialisedtasksissoftwarepackagesfordealingwithtaxation.theseareessentialtoorganisationsbutareprobablyonlyneededonce ayear,butiftheyweredevelopedin-housethentheywouldneedhighlyspecialisedpersonneltobeallocatedallyeararoundtomonitorandmaintain changesintaxationlaw.vendors,typicallyrelieveorganisationsofthis requirement. lesscreativetasksorveryspecialisedtasksrequiringexpertisenotworth developingin-house. categoriesandtheideaoffocusingoncorebusinesswhilelettingothersdo oflearningandgainingtheexperienceinternally.figure4depictsthetask theneededexpertiseinternally.inthiscasetheoutsourcingrelationshipis eitherapartnershiporastronglycoupledrelationshipwiththeintention Organisationsalsooutsourcesomeoftheircoretasksiftheydon'thave 7

14 In-House Development Outsourced Tasks 4SoftwareDevelopmentOutsourcing:Issuesand Common Tasks Common Tasks Not part core competencies Specialised Tasks Core Competency (Expertise not available in-house) 4.1IssuesinSoftwareDevelopmentOutsourcing Figure4:Focusoncorebusiness. Outsourcingsoftwareapplicationdevelopmentraisessometechnicaland Control Tasks Specialised Tasks managerialissueswhicharedierentfromtheissuesassociatedwithpure Impact Not part desired Core competencies competencies in-housedevelopment.thiscausesenoughconcerninsomeorganisationsto preventthemfromtakingfulladvantageoftheopportunitiesandadvantages waysofresolvingthem.table1listssomeofthemanagementandtechnical issueswhichinuencethenatureofoutsourcinginsoftwaredevelopment.it oeredbyoutsourcing. isimportanttonotethatmanagementandtechnicalissuesinoutsourcing arestronglyinterdependent.wediscusssomeoftheseissuesbelow. Control Thereisaneedtoexaminetheseissuesasarststeptowardsnding Thiscoverscontroloverthesoftwareengineeringprocessandcontrol overthenalproduct.controloverthesoftwaredevelopmentprocess isessentialtomaintainingcontroloverthequalityandotherdesirable product,andconsequentlysurrenderingsomecontroloveritsdevelopment,theoutsourcercannolongerguaranteepropertiessuchas security,qualityandcondentiality[,15].agreementsandcontract propertiesoftheproduct.thereisadangerthatbyoutsourcinga 8

15 Outsourcingdecision (who,when) Vendorcapacity andavailability Outsourcingscale/sizeOutsourcingscale/size (total/selective) Management Trust(safety,security, reliability) Vendorcapability (total/selective) Technical Contract Ownership/IP/ Location Frequencyofuse Liability/ResponsibilityTechnology Cost RelationshipwithvendorConformancemeasures/ Paradigms Criticality/Control (strategic/short-term)quality Systemdecomposition Resourcing &Interface RiskManagement Privacy Processvisibility Managingtheprocess/Maintenance Coordinatingvendors Systemevolvability Table1:IssuesinOutsourcing. Verication&Validation Conguration &Re-usability Management thatgivethemmarketadvantageandfuturecontroloverthenal termsneedtoclearlyaddressthisissuebutadditionalassurancemay productneedtobekeptinhouseorprotectedinthecontract.during canbeoutsourced.criticalaspectsofthesystemalongwithaspects assafety,aremet. Further,issuesofcontrolneedtoberaisedwhendecomposingthe systemintosubmodulesandidentifyingwhataspectsofthesystem berequiredbytheoutsourcerthattargetsforsystemproperties,such Responsibilitiesandownership beclearlystatedinthecontract.further,ownershipofintermediate products,suchasdesigns,scenariosortestdataneedstobeconsidered.thisisespeciallyimportantwhentheseproductsofthesoftware systemneedtobeidentied,classied,andaggedformanagement. outsourcingventureandtheownershipofthenalproductshaveto Theduties,responsibilitiesandliabilitiesofeachofthepartiesinan systemanalysisanddesign,thesecriticalandcontrollingaspectsofthe 9

16 torequirements,changestoschedulesorchangestodesignsoncecollaborativedevelopmentisunderway. ofthechangingnatureofprojects,forexample,theremaybechanges protectallpartiesinvolved.theneedforexibilityisaconsequence tobeexibleenoughtoallowroomforchanges,yetstrongenoughto maintenanceorevolution. Anyoutsourcingagreementforcooperativesoftwaredevelopmentneeds engineeringprocessareneededbytheoutsourcerforongoingsystem Managingandcoordinatingoutsourcingvendors oftheparticipantsandactivitieswithinthesoftwarelife-cycle.the theoutsourcerwhichinturnmayraiseprivacyandsecurityconcerns. Manyrisksinsoftwaredevelopmentareassociatedwiththediversity Finally,informationmayneedtobeexchangedbetweenthevendorand impactofoutsourcingontheseriskscanbevariable[13].theissues hereare: toensuretheavailabilityandcapacityofthevendortocarryout thecollaborativedevelopmentatthecriticaltimesintheoverall Inadditiontothecoordinationandmonitoringeortsneeded,the tomonitorthestatusoftheproject,andalloftheoutsourced toplandependenciesintheprojectplan; or,ifneeded,correctiveactioncanbetaken. components,sothatadjustmentstotheprojectplancanbemade projectplan; Developmentparadigms potentialdiversityoftechnologyplatforms,architecturesanddevelopmentparadigmscanraiseissuesofcompatibilityandportabilityacrosnentsarecompatibleandcanbeintegratedintotheoverallsystem. theproject.theproblemhereistoensurethatthevariouscompoopmentparadigmsneedtoconsidered.thisisespeciallycriticalif Issuesofcompatibility,integrationandcommunicationacrossdevel- dier.theoutsourcerandthevendormayusedierentsoftwareengineeringprocessesordierentanalysisanddesignmethodologiesand consequentlydierentdevelopmenttools. theyarerequiredtofollow,perhapsaspartoftheoutsourcer'scontract,arealsofollowedbythevendor. Ifdierentanalysisanddesignmethodsareusedthen,atthevery least,thereisariskofconfusionincommunicationbetweenoutsourcer thedevelopmentparadigmsusedbytheoutsourcerandthevendor Theoutsourcermustensurethatanystandardsorprocesseswhich 10

17 waredesignsandotherprojectrelatedmaterials.ingeneral,strategies forintegratingoutsourcedproducts,whichhavebeendevelopedusing methodsandtechnologiesdierenttotheoutsourcer'smethodsand andvendor.ifthemethodsaresupportedbydierenttoolsetsthen technologiesmayneedtobeputinplace,forexample,astrategyfor theremaywellbeaproblemwhenexchangingdocuments,code,soft- Trustandassurance jointcongurationmanagement(seesection4.2)whichtakesintoaccountdierentcongurationmanagementtools. outsourcedthentheoutsourcermaywishtoseekassurancethatthe Projectsmayrequiretrustedcomponents,forexample,aprojectmay requireasecureorasafetyrelatedcomponent.ifsuchacomponentis componentmeetsitssafetyorsecurityrequirements.theproblemfor thesystemasawholemeetsitssafetyorsecurityrequirements.a theoutsourceristoobtainassurancethattheoutsourcedcomponent safetyorsecurityrequirementsthesystemasawholemayfailtomeet technicalissueisthateveniftheoutsourcedcomponentmeetsits Theproblemforbothpartiesistogainthenecessaryassurancethat meetstherequiredleveloftrustworthiness. Systemdecomposition,integrationandinterfaces itssafetyorsecurityrequirements.thereasonforthisisthatsystem properties,likesafetyorsecurity,arepropertiesofthewholesystem and,ingeneral,notjustcomponents. Ifthedevelopmentofsubsystemsistobeoutsourced(componentoutsourcing),thenthecriteriafordecomposingthesystemwillbedierent tototalin-housedevelopment.theorganisationofthearchitectural becarefullyconsideredtominimizedependenciesandside-eectsof change.however,therewillalwaysbetheneedtohandlechange. Anysubsystemwhichisoutsourcedwillhavetobeintegratedintothe tembehaviourmeetsitsrequirementsafterintegrationintothewhole Oneoftheproblemsthatmayneedtobefacedisthatastheproject progressestheinterfaceswillchange.thismaybeasaresultofchang- wholeatalaterstage.thereisaneedtoensurethatthesubsysingclientrequirementsoritmayresultfromabetterunderstanding system. oftheproblemtobesolvedbytheoutsourcer,thevendororboth. componentsofthesystemandtheinterfacesbetweenthemneedto

18 PLANNING - Vendor selection and capacity - Project plan - Development processes & paradigms - Identify core strategic specialities - Resolve Ownership, IP, and liabilities CONFIGURATION MANAGEMENT PLANNING - Availability - Project plan - Development processes & paradigms - Specialities and expertise needed - Resolve Ownership, IP, and liabilities CONFIGURATION MANAGEMENT - Lines of authority for accepting changes - Lines of authority for accepting changes - change impact and propagation procedures Instigate and Manage - change impact and propagation procedures Outsourcing Relationship VERIFICATION & VALIDATION VERIFICATION & VALIDATION - Bonding - Assurance that components meets technical - Components function correctly - Monitoring and operational requirements - Blending Efforts, - Components function correctly within their intended operating environment - Benchmarks RISK MANAGEMENT RISK MANAGEMENT - Relationship - Availability required skills - Control - Withdrawal outsourcer - Withdrawal from decision leastthefollowingareaswhichwillbeinuencedbyoutsourcing: Insection4.1wehavetriedtoidentifysomeoftheissuesassociatedwith thatthoseissueshaveonsoftwareengineeringprocesses.wecanidentifyat 4.2ImpactOfOutsourcingonSoftwareDevelopment outsourcingsoftwaredevelopment.inthissectionweexaminetheimpact Figure5:Impactofoutsourcingonsoftwaredevelopmentmodels. - Skills & capacity vendor - Changing requirements & environment - Delays delivery time - Penalties - Changing requirements & environment - Privacy and security ongoingprojectmanagement; projectplanning; Outsourcer Outsourcing Relationship Outsourcing Vendor ThesekeyactivitieshavebeensummarisedinFigure5. vericationandvalidation; riskmanagement; congurationmanagement; theneedtoevaluate,chooseandnegotiatewithpotentialoutsourcing Theissueswhichinuenceprojectplanningare: vendors; 12

19 theneedtoschedule,monitorandintegrateoutsourcedtasks; theneedtoplanandbudgetforjointsoftwareengineeringactivities, thenatureoftheoutsourcingrelationship; development.foroutsourcing,organisationsalsoneedtoidentifytheircore ofplanningactivitieswhichmusttakeplacewhenoutsourcingpartsofthe atanytimeinthedevelopmentprocess.whetherthisisfeasible,orindeedpractical,remainstobeseen.attheveryleastthereareanumber Intheoryorganisationscandecidetooutsourceaproductorservice forexample,jointcongurationmanagement,jointvalidationandvericationorteamriskmanagement[8,7]. strategicspecialtiesanddecidewhichaspectsoftheprojectcanbeoutsourcedandwhichaspectsoftheprojectarebestkeptin-house.thismay onprojectplanning,oritmaybedecidedonacasebycasebasisinwhich beamatteroforganisationalpolicy,inwhichcasetheremaybelittleimpact casethedecisionprocesswillneedtobescheduled. dealtwithearlyintheprojectbecausethetimeinvolvedinestablishingthe tondandevaluatevendorswhocouldmeettherequirements.thisisbest criticaltimesintheprojectplan.intheabsenceofastrategicalliancewith avendorwhocansatisfytheprojectrequirements,theoutsourcermayneed requiredexpertiseareavailableandhavethecapacitytodotheworkatthe criticaltimesinprojectsinuencesplanning.ifthedecisionhasbeenmade tooutsourcepartsofthedevelopmentthenitiscriticalthatvendorswiththe Thenatureofrelationshipswithvendorsandtheiravailabilityatthe ofproductswillneedtobetakenintoaccountintheoverallprojectplan.we consideration,butratherthattheoutsourcingdecisiondependsonboththe projectplanandtheavailabilityofdevelopersatthecriticaltimes. andthatndingadevelopertocarryouttherequiredtasksisasecondary donotwishtosuggestthatestablishingtheprojectplantakesprecedence outsourcingagreement,theavailabilityofresourcesandthetimelydelivery benchmarkingneedtobecontinuouslypracticed.[16].bonding,inthe contextofprojectmanagement,referstoeortsof: velopmentoftheoutsourcedcomponents,thenbonding,monitoringand deningthecommunicationandcontrolchannels; establishingtherelationshipwiththeoutsourcingvendor; Inorderfortheoutsourcertoexercisealevelofcontroloverthederectedtowardsverifyingtheprocesscontrolsandensuringstandardpractices acrosstheboard[16].inpracticethiscouldmeanensuring, structuringtheinternalpersonneltooverseetheoutsourcingwork; makingtheongoingadjustmentsintheoutsourcingrelationship. Monitoringeorts,inthecontextofongoingprojectmanagement,isdi- 13

20 thatvericationandvalidationprocessesfortheoutsourcedcomponentsmeettheprojectstandards; compliancewithstandards; thatthereissucientprogressagainsttheoverallprojectplan. thatproperriskmanagementproceduresarebeingfollowed; thatpropercongurationmanagementprocessesarebeingfollowed; Further,theoutsourcingvendors'performance,expertise,cost,andqualmarkmeasuresneedtobeagreedonandreectedinthecontractityneedtobecontinuouslybenchmarkedagainstcompetitors.Thesebench- toevolvingcomponents[14,1].fromtheprojectmanagementperspective, propercongurationmanagementallowsthecurrentstatusofcomponents agementallowsustocontrolandcoordinatechanges,determinetheimpact mentationactivities[1].fromthetechnicalperspective,congurationman- tobedeterminedandusedtocoordinatetheprojectplanningandimple- ofthosechangesandpropagatethosechangestotherequireditems. Congurationmanagementdealswiththetrackingandcontrolofchanges ofcongurationmanagementmayneedtobeputinplacetodene: duresinplace,butoncecongurationitemsaresharedthenanotherlayer outsourcingvendormayhaveestablishedcongurationmanagementproce- changeneedstobecontrolledacrossallparties.boththeoutsourcerandthe thechangingnatureofprojectsmeansthatthecongurationitemsshared betweenoutsourcerandoutsourcingvendoraresubjecttochangeandsuch betweentheoutsourcerandtheoutsourcingvendor.theproblemisthat Inanoutsourcingsituation,congurationitemswillhavetobeshared changeimpactandpropagationprocedures. properlinesofauthorityforchangecontrol; properchannelsofcommunication; baselinesforitemswhichneedtobesharedbetweenoutsourcerand Anotherareawheretheoutsourcingdecisionhasanimpactisinthe outsourcingvendor; requirementfromanyserviceagreementsorcontractswhichmaybeinplace. itstechnicalandoperationalspecications.notethatthisisadierent thentheoutsourcermayrequireassurancethattheproductactuallymeets meantakingintoaccountsuchnon-functionalfactorsas: areaofvericationandvalidation.onceaproducthasbeenoutsourced assurancethatthecomponentnotonlyfunctionscorrectly,butthatitfunctionscorrectlywithinitsintendedoperatingenvironment,andthiscould Inthecaseofoutsourcingasystemcomponent,theoutsourcerneeds 14

21 systemuseability; systemsafetyorreliability; systemperformance; ticesislikelytobeinthedegreeofdicultyratherthaninthepractices suchasdierentvericationandvalidationpracticesacrossorganisations. Consequently,theimpactofoutsourcingonvericationandvalidationpracmentsisalreadyadiculttask.Inthepresenceofoutsourcing,thevericationandvalidationtasksarelikelytobemoredicultbecauseoffactors systemsecurity. themselves. Outsourcinginvolvesbothbusinessriskandprojectmanagementrisk. Verifyingthatasystemexhibitsthesepropertiesandmeetsitsrequire- Someofthebusinessrisksincludethefollowing. Establishingandmaintainingtherelationshipsrequiredforsuccessful Someoftheprojectriskswhicharerelatedtooutsourcingarethefollowing. Therearesubstantialimpedimentstowithdrawingfromtheoutsourcingdecision,onceithasbeenmadeandimplemented. outsourcingcanbecomplexandresourceintensive[13]. losingcontroloverkeyaspectsofthesystemcancausetheoutsourcer Therequiredskillsandabilitiesneededtodothejobmaynotbe availableoraccessible. tobecomestrategicallydependentontheoutsourcingvendor. Delayswhencoordinatingmultiplevendorswillhavehighconsequences, Therisksassociatedwithintegratingpotentiallydiversetechnologies Theoutsourcingvendorslackthecapacitytodelivertheoutsourced intoaworkingoverallsystem. especiallyiftheworkorproductisonacriticalpathwithhighdependencies. productsinaccordancewithoverallprojectplan. Spiral[2]model,maynotbesuitableinamulti-vendorsituation.Procedures processmodelswhichtakeprojectriskintoaccount,forexampleboehm's Thisalongwiththeknownrisksofanysoftwaredevelopmentprojectmakes recognisingriskandmanagingriskmoreimportant.further,wellknown Changingrequirementsandenvironmentswhichmayimpactonthe TeamRiskmanagementprocedures,maytakeongreaterimportance. formanagingriskinthecontextofnumerousstakeholders,suchasthesei's cost,deliverytimes,andqualityofwork. 15

22 willbebenecialfortakingintoaccountthenumerousfactorswhichinuencethesuccessorotherwiseofanoutsourcingventure. todescribetheirimpactonsoftwareengineeringprocesses.theoutsourcing decisionisusuallymadeinabroadercontextwhichweoutlinebelow. Organisation'ssituation Wehaveexaminedsomeoftheissuesinvolvedinoutsourcingandtried lemareas.theyneedtoevaluatetheorganisation'spositionamong Organisationsneedtoanalysetheircurrentsituationtoidentifyprob- 4.3TheOutsourcingDecision Outsourcingoersorganisationsnewopportunitiesaswellasnewchallenges. Webelievethatastructuredapproachtomakingtheoutsourcingdecision Driverstooutsourcing andexternalalternativesandwithrespecttothepeople,processesand technologyrequiredfortheproject. Akeypointinanalysingtheoutsourcingdecisionisanassessment needtoidentifytheorganisation'scorebusiness,skillsandcompetencies.further,theorganisationneedstoevaluatetheavailableinternal competitorsandtheorganisation'sstrengthsandweaknesses.they Outsourcingissues alsoguidethedegreeofoutsourcing(ascalerangingfromtotalinhouse,selectiveoutsourcing,ortotaloutsourcing). Issuesraisedinthispaperalongwithotherissuesspecictotheorganisationneedstobeevaluatedandresolved.Wehavetriedtoshowthat selectionandtherelationshipwiththeoutsourcingvendor.thiswould oftheorganisation'sdriverstooutsourcing.thisshouldguidethe thereareanumberoftechnicalfactorswhichneedtobeconsideredin Makingthedecision additiontothemanagerialandeconomicfactorsusuallyconsidered. Adecisiontreecanbeusedtomodelthedierentalternatives,andto helpinanalysingandevaluatingthedierentpossibilities.anexampledecisiontreeforthescaleofoutsourcinghasbeengiveninfigure6. Itshowssomeofthetechnicalfactorsneededasinputformakingthe fromtotalin-house,selectiveoutsourcing,ortotaloutsourcing).after assessingthesituation,identifyingthedriversandevaluatingallissues, outsourcingdecision. Withtheoutsourcingdecision,theorganisationneedstodecidewhatis beingoutsourced,whothepotentialvendorsare,whenthepropertime organisationscanmakeadecisionwhethertogowithoutsourcing.as tooutsourcewillbe,andthedegreeofoutsourcing(ascaleranging 16

23 Strongly Coupled - Expertise Selective Outsourcing - Time core - Technology - Control analcriteria,organisationsneedtoevaluatewhether:outsourcing Figure6:Decisiontreeforoutsourcing. - Trust - Safety - Cost - Technical people Application support In-house Development - Market survey - Feasibility study Total Outsourcing - Expertise - Interest non - Technology core - Time Selective Outsourcing - Cost Alternative (points inside reflect technical inputs needed) In-house infigure7.thequestionsandissuesinfigure7aremeanttoserveas beaddressedbeforetakingthedecisiontooutsourcehavebeensummarised Someoftheissues,driverstooutsourcing,andkeyquestionsthatneedto ismotivatinganddrivingtheorganisationtooutsource. therequirementsandcriteria,andoutsourcingachievethegoalsthat tstheorganisation'sstrategyandsituation,theinternalalternatives havebeenevaluated,thereareoutsourcingvendorsavailablethatmeet Uncertain criteriaforthenaldecisiononoutsourcing. 5SummaryandFurtherWork Outsourcingbringsalongnewopportunitiesandchallenges.Throughoutsourcing,organisationsaimtofocusoncorebusiness,improvequalitiesof aguide,andeachorganisationmayneedtocomeupwithitsownsetof toresolveissuessuchasparadigms,boundaries,specications,design,insuesthatneedtobeaddressedandresolved.furtherworkisstillneedeterfaces,riskmanagement,measurements,andoutsourcingprojectmanagement.organisationsneedtoadapttheirprocessmodelstoaccommodatethe isachievedthroughimprovingcompanyfocus,gainingaccesstotheneeded re-usingproductsandexperiences. expertiseandtechnologies,improvingprocesses,sharingrisksandcosts,and softwareproductsandservices,speeddeliverytimes,andreducecosts.this outsourcingactivities.thisalongwiththelargenumberofoptionsavailable makestakingtheoutsourcingdecisionsmorecomplex.itisimportanttoassesstheorganisation'ssituationanddriverstooutsourcingandaddressthe Outsourcing,however,bringsalongkeytechnicalandmanagementis- 17

24 Company s Situation Outsourcing Issues Key Questions Management * What are the company s strengths, weaknesses, opportunities, and threats? * Capacity, availability, capability of outsourcing vendors * How strong is the company s competitive position? * Scale/size of outsourcing (total/selective) * What are the company s key * Vendor Relationship competencies? (strategic/ short term) Taking The Decision [ Yes/No, Who, When, What, Degree] * How far does change is the industry * Contract and conformance affect the company s business? * Ownership, IP, & location of source Key Criteria *What are the industry s dominant traits? * Frequency of use * Which company s are in strongest/ * Bonding, monitoring, and coordination * Does outsourcing have good fit with weakest competitive positions? efforts and resources company s strategy and situation? issuesandrisksbeforetakingthedecision.asoftwaredevelopmentoutsourcingframeworkcouldbedevelopedtoassistthosemakingoutsourcing * Liability/ responsibility * Is there vendor/s that meet company * Flexibility control requirements? Drivers Outsourcing * Cost * Will it help build a copetitive advantage? decisionsinsystematicallyworkingthroughtheissuesandoptions. Key Factors Technical * Will it improve performance/ time/ cost? * Cost saving * Trust/ assurance * Is it feasible? * Time * Technology (Platform, OS, (meeting deadlines, first market,..) * Have all internal alternatives been tiononoutsourcingdevelopmentprojects,togetherwiththeincreasedpo- tentialformulti-paradigmdevelopmentontheseprojects,invitesresearch Figure7:Analysingtheoutsourcingdecision. development tools, programming lang.) evaluated? * Human Resources expertise * System decomposition interfaces * Alliances partenrships * paradigms * Technology * Process * Process visibility (documentation, intotechnicaldevelopmentstosupportforoutsourcing.suchresearchwould * Capability reports, configuration mangement) needtoaddressissuessuchasdesignmethodologiesandtoolsthatsupport * Specialisation focus * Maintenance & system maintenability * Globalisation * Performance measures multipleparadigms,ordistributedcongurationmanagementsystemsthat Further,theincreasedimportanceofsystemdecompositionandintegra- * Competition * Change, CM, evolvability tributedsites. canbetailoredtosupportdierentdevelopmentpracticesatdierentdis- formuchofourfutureresearch.18 mentoutsourcinghasledustothepositionthatmanagementofoutsourcing projectsandsoftwareengineeringtechniquesandtoolsareinterdependent. Managementdecisionsimpactoncollaborativesoftwareengineeringpracticesandtheavailabilityorexpertiseoforganisationsinvarioustechniques andtechnologiesinuencethedecisionsthatcanbemade.thisrelationship betweenprojectmanagementandsoftwareengineeringwillformthecontext Finally,ourexaminationofsomeoftheissuesrelatedtosoftwaredevelop-

25 References [1]ANSI/IEEEStd IEEEGuidetoSoftwareConguration [3]CommisionoftheEuropeanCommunities.InformationTechnologySecurityEvaluationCriteria.June1991. [2]B.Boehm.SoftwareEngineeringEconomics.PrenticeHall,1981. Management.InIEEESoftwareEngineeringStandards.IEEE,New York,1994. [6]DraftStandard1508.FunctionalSafety:SafetyRelatedSystems.InternationalElectro-TechnicalCommision,June1995. riskmanagement:anewmodelforcustomersupplierrelationships. TechnicalReportCMU/SEI-94-SR-5,SoftwareEngineeringInstitute, July1994. [5]LeondeLoo.InformationSystemsOutsourcingDecisionMaking:A [4]JohnDavidson.OutsourcingisFutureofIT.TheAustralianFinancial managerialapproach.ideagrouppublishing,1997. Review,page26,July [7]R.PHiguera,A.J.Dorofee,J.A.Walker,andR.C.Williams.Team [8]R.PHiguera,D.P.Gluch,A.J.Dorofee,R.L.Murphy,J.A.Walker, [10]IntelligentNetworkNewsletter.AlacatelTakesDecisionToGoWith [9]IBMGlobalServices. June1997. andr.c.williams.anintroductiontoteamriskmanagement.technicalreportcmu/sei-94-sr-1,softwareengineeringinstitute,may DigitalAlphaPlatform.IntelligentNetworkNewsletter,page13,May [12]ElspethMcFadzean.Theclassicationofcreativeproblemsolvingtechniques.TechnicalReportHWP9632,HenleyManagementCollege, tionaljournalofinformationmanagement,pages449{459,december [13]DanielMinoli.AnalyzingOutsourcing:ReengineeringInformationand CommunicationSystems.McGraw-Hill,Inc.,1995. []KarenKetlerandJohnWalstrom.Theoutsourcingdecision.Interna-

26 [14]R.Pressman.SoftwareEngineering:APractitioner'sApproach. [16]DetmarStraub.EectiveOutsourcingofITServices:MythsVersus [15]BrianRotheryandIanRobertson.TheTruthAboutOutsourcing. Realities.Coursenotes,MelbourneBusinessSchool,TheUniversityof Melbourne,July1997. Gower,1995. McGraw-Hill,fourthedition,1997. [18]TelecommunicationInformationNetworkingArchitectureConsortium. [17]KatherineSweetman.CultivatingCreativity.HarvardBusinessReview, [19]TelecomsWorld.Outsourcing:Buyingfreedomorlosingcontrol?TelecomsWorld,pages50{56,September1997. TheTINAReport.AvailablefromTINA-CGeneralManager,Tel:+1 pages10{12,march-april1997. [20]TelefonaktiebolagetLMEricsson. [21]TheOutsourcingInstitute ,Fax: [22]RobertWhiteandBarryJames.TheOutsourcingManual.Brookeld, June IndustryLeadersAreReshapingtheAmerican Corporation. How [23]StaordWilliamson.IfYesterdayIsTomorrow,ThisMustbeToronto. InProceedingsofIEEEInternationalSymposiumonAssessmentof SoftwareTools,Toronto,Canada.IEEE,

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Key Success Factors for Delivering Application Services

Key Success Factors for Delivering Application Services Key Success Factors for Delivering Application Services George Feuerlicht University of Technology, Sydney [email protected] Jiri Vorisek Prague University of Economics [email protected] Keywords: ASP, Application

More information

Company Overview. accredited online training

Company Overview. accredited online training accredited online training Company Overview Accredited Online Training Pty Ltd > ABN 84 105 938 476 > RTO #31102 > 283-289 Draper St > PO Box 7575 Cairns QLD 4870 > p 1300 72 66 34 > int +61 7 4041 3198

More information

Third Party Relationships

Third Party Relationships 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 A B D INTRODUCTION AND PURPOSE Background Yes/No Comments 1. Does the credit union maintain a list of the third party

More information

Outsourcing Manufacturing: A 20/20 view

Outsourcing Manufacturing: A 20/20 view Outsourcing Manufacturing: A 20/20 view OUTSOURCING MANUFACTURING is becoming a well-established approach for companies that want to strategically manage materials in today s fast-paced business environment.

More information

Due Diligence and Effective Vendor Management. Corporate America Credit Union 30 th Annual Meeting May 1, 2012

Due Diligence and Effective Vendor Management. Corporate America Credit Union 30 th Annual Meeting May 1, 2012 Due Diligence and Effective Vendor Management Corporate America Credit Union 30 th Annual Meeting May 1, 2012 Your Speaker David A. Reed Attorney at Law [email protected] (703) 675-9578 Reed & Jolly,

More information

Legal Process Outsourcing. Market Analysis Abstract. April 2014 research.nelson-hall.com

Legal Process Outsourcing. Market Analysis Abstract. April 2014 research.nelson-hall.com Legal Process Outsourcing Market Analysis Abstract April 2014 research.nelson-hall.com Who Is This Report For? NelsonHall s Legal Process Outsourcing report is a comprehensive market assessment report

More information

Cost of Poor Quality:

Cost of Poor Quality: Cost of Poor Quality: Analysis for IT Service Management Software Software Concurrent Session: ISE 09 Wed. May 23, 8:00 AM 9:00 AM Presenter: Daniel Zrymiak Key Points: Use the Cost of Poor Quality: Failure

More information

UNLOCKING OUTSOURCING

UNLOCKING OUTSOURCING Four Keys to Preparing to Outsource Your Global Mobility Program Looking to create efficiencies in key areas of your value chain, and pushing to achieve maximum strategic financial value from your core

More information

Managed IT Services. Maintain, manage and report

Managed IT Services. Maintain, manage and report Managed IT Services Maintain, manage and report 1 2 Comunet was established in 1995 to provide professional Information Technology services to Australian businesses and organisations. Its vision now, as

More information

Prudential Practice Guide

Prudential Practice Guide Prudential Practice Guide PPG 231 Outsourcing October 2006 www.apra.gov.au Australian Prudential Regulation Authority Disclaimer and copyright This prudential practice guide is not legal advice and users

More information

Manag. Roles. Novemb. ber 20122

Manag. Roles. Novemb. ber 20122 Information Technology Manag gement Framework Roles and Respo onsibilities Version 1.2 Novemb ber 20122 ITM Roles and Version History Version ed By Revision Date Approved By Approval Date Description of

More information

Fundamentals of Information Systems, Fifth Edition. Chapter 8 Systems Development

Fundamentals of Information Systems, Fifth Edition. Chapter 8 Systems Development Fundamentals of Information Systems, Fifth Edition Chapter 8 Systems Development Principles and Learning Objectives Effective systems development requires a team effort of stakeholders, users, managers,

More information

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment

More information

Finance Effectiveness Efficiency

Finance Effectiveness Efficiency Business Unit Finance Effectiveness Efficiency An overview Agenda Page 1 Efficiency - An overview 1 2 Our services 7 3 Case study 14 Section 1 Efficiency - An overview 1 Section 1 Efficiency - An overview

More information

Customer contact solutions from Genesys and IBM: Improve your customers experience and reduce costs

Customer contact solutions from Genesys and IBM: Improve your customers experience and reduce costs Customer contact solutions from Genesys and IBM: Improve your customers experience and reduce costs Highlights Integrated contact centre solutions that help identify, acquire, develop and retain high

More information

Amdocs Customer Success Story. Amdocs Sets the Standard for Managed Service Business Transformation for a Leading Mobile Service Provider

Amdocs Customer Success Story. Amdocs Sets the Standard for Managed Service Business Transformation for a Leading Mobile Service Provider Amdocs Customer Success Story Amdocs Sets the Standard for Managed Service Business Transformation for a Leading Mobile Service Provider This mobile service provider is a leading communications business.

More information

TEST MANAGEMENT SOLUTION Buyer s Guide WHITEPAPER. Real-Time Test Management

TEST MANAGEMENT SOLUTION Buyer s Guide WHITEPAPER. Real-Time Test Management TEST MANAGEMENT SOLUTION Buyer s Guide WHITEPAPER Real-Time Test Management How to Select the Best Test Management Vendor? The implementation of a Test Management system to automate business processes

More information

PASB Information Technology Strategy 2015-2019. Information Technology Services (ITS) January 2015

PASB Information Technology Strategy 2015-2019. Information Technology Services (ITS) January 2015 PASB Information Technology Strategy 2015-2019 Information Technology Services (ITS) January 2015 Table of Contents Executive Summary The Need for a New IT Strategy Vision for IT in PAHO Vision Statement

More information

GUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY

GUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY GUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY INTENT: 1. To ensure due diligence and consistency is followed in the solicitation, selection, contract

More information

How much do you pay for your PKI solution?

How much do you pay for your PKI solution? Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.

More information

Managing Outsourcing Arrangements

Managing Outsourcing Arrangements Guidance Note GGN 221.1 Managing Outsourcing Arrangements 1. This Guidance Note provides further detail on the requirements for managing material outsourcing arrangements (refer Prudential Standard GPS

More information

Supply Chain Management: from a necessary evil to a core organisational competency

Supply Chain Management: from a necessary evil to a core organisational competency Supply Chain : from a necessary evil to a core organisational competency Dr Sinéad Roden Senior Lecturer in Operations & Supply Director of Studies for MSc in Global Supply Chain Percentage of world revenues

More information

1. Purpose and objectives

1. Purpose and objectives 1. Purpose and objectives Identify and establish the driving force Long-term business goals Establish central deliveries of the implementation project Prioritize and plan with interim targets Delimitations

More information

Certified Family Office & Family Business Advisor

Certified Family Office & Family Business Advisor Certified Family Office & Family Business Advisor Syllabus Level 1: Family Office Advisory 1. Introduction to the Family Office A Macro view of Global Wealth Purpose & Definition of Family Office Historical

More information

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing

More information

Misplaced Trust: Vendor Fraud. IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager

Misplaced Trust: Vendor Fraud. IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager Misplaced Trust: Vendor Fraud IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager April 17, 2015 Today s Discussion Summary Vendor fraud is a form of occupational fraud

More information

Trends in Tax Administration Outsourcing. Why tax administrations outsource?

Trends in Tax Administration Outsourcing. Why tax administrations outsource? Trends in Tax Administration Outsourcing The M Group, Inc. Federation of Tax Administrators August 13, 2003 Agenda Outsourcing and Out-tasking Why tax administrations outsource? Trends in outsourcing Making

More information

Information Technology

Information Technology Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level

More information

DIVISION OF INFORMATION SECURITY (DIS)

DIVISION OF INFORMATION SECURITY (DIS) DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

An Unbalanced Scorecard

An Unbalanced Scorecard An Unbalanced Scorecard Twelve New IT Metrics for an Era of Change CEB CIO Leadership Council A Framework for Member Conversations The mission of CEB Inc. and its affiliates is to unlock the potential

More information

ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk"

ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk American Society For Quality -Toronto Section ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk" Copyright: Coudenys Management Systems Inc. RISK DEFINED Occurrence of the event

More information

White paper Reaping Business Value from a Hybrid Cloud Strategy

White paper Reaping Business Value from a Hybrid Cloud Strategy White paper Fujitsu Hybrid Cloud Services White paper Reaping Business Value from a Hybrid Cloud Strategy How to embrace a hybrid cloud model to maximize the benefits of public and private cloud services

More information

Information Commissioner's Office

Information Commissioner's Office Information Commissioner's Office IT Procurement Review Ian Falconer Partner T: 0161 953 6480 E: [email protected] Last updated 18 June 2012 Will Simpson Senior Manager T: 0161 953 6486 E: [email protected]

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Bring Your Own Device (BYOD) A point of view

Bring Your Own Device (BYOD) A point of view Bring Your Own Device (BYOD) A point of view BYOD - Consumer driven IT Today, consumers possess powerful devices for their personal needs. Often, the computing power and features of the devices bought

More information

AN ENVOY WHITE PAPER TOTAL COST OF OWNERSHIP A SAAS B2B WHOLESALE ECOMMERCE PLATFORM

AN ENVOY WHITE PAPER TOTAL COST OF OWNERSHIP A SAAS B2B WHOLESALE ECOMMERCE PLATFORM AN ENVOY WHITE PAPER TOTAL COST OF OWNERSHIP A SAAS B2B WHOLESALE ECOMMERCE PLATFORM 02 Executive Summary There has been a great deal written about determining the total cost of ownership (TCO) of implementing

More information

Your Strategic Outsourcing Partner

Your Strategic Outsourcing Partner A Stone Forest Company Your Strategic Outsourcing Partner Finance & Accounting BPO Contract Accounting Services Recruitment Services Singapore China Malaysia Globally Connected International WE PROCESS

More information

Business Plan template

Business Plan template template If you re considering establishing or purchasing a small business, it s important that you have a Business Plan. This plan will help provide you with an essential road map for your new business.

More information

Presentation by BSI on the main changes to the IATF ISO/TS 16949 certification scheme

Presentation by BSI on the main changes to the IATF ISO/TS 16949 certification scheme Presentation by BSI on the main changes to the IATF ISO/TS 16949 certification scheme ISO/TS 16949 IATF Scheme rules 4 th edition areas that impact BSI Clients Copyright 2014 BSI. All rights reserved.

More information

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007 Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232

More information

Treasury Advisory Services Stability through effective financial risk and liquidity management. Audit. Tax. Consulting. Financial Advisory.

Treasury Advisory Services Stability through effective financial risk and liquidity management. Audit. Tax. Consulting. Financial Advisory. Treasury Advisory Services Stability through effective financial risk and liquidity management Audit. Tax. Consulting. Financial Advisory. Treasury Health Check Identify gaps and benchmark to make informed

More information

Managing a Global Business

Managing a Global Business Managing a Global Business Whitepaper from Global Drivers of Change: There are several driving forces in the global business landscape that will continue to shape the future of these organisations: Technological

More information

What If Your In-House Physician Recruiting is Not Working? The Benefits of Recruitment Process Outsourcing for Healthcare Organizations

What If Your In-House Physician Recruiting is Not Working? The Benefits of Recruitment Process Outsourcing for Healthcare Organizations What If Your In-House Physician Recruiting is Not Working? The Benefits of Recruitment Process Outsourcing for Healthcare Organizations www.practicematch.com What If Your In-House Physician Recruiting

More information

University Centre at Blackburn College. Abbreviated Programme Specification Containing Both Core + Supplementary Information

University Centre at Blackburn College. Abbreviated Programme Specification Containing Both Core + Supplementary Information Abbreviated Programme Specification Containing Both Core + Supplementary Information The Degree consistently involves both employers in all stages of the programme delivery including design, delivery,

More information

ELECTRONIC INVOICE PRESENTMENT AND PAYMENT FOR THE OCEAN FREIGHT INDUSTRY

ELECTRONIC INVOICE PRESENTMENT AND PAYMENT FOR THE OCEAN FREIGHT INDUSTRY White Paper ELECTRONIC INVOICE PRESENTMENT AND PAYMENT FOR THE OCEAN FREIGHT INDUSTRY 10 Questions You Should Ask an EIPP Provider 10 Questions You Should Ask an EIPP Provider 1. To what extent is the

More information

Development, Acquisition, Implementation, and Maintenance of Application Systems

Development, Acquisition, Implementation, and Maintenance of Application Systems Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of

More information

Vulnerability management lifecycle: defining vulnerability management

Vulnerability management lifecycle: defining vulnerability management Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By

More information

Improve Your Customer Experience: Design Your Quality Program to Link Directly to Customer Satisfaction. Overview WHITEPAPER

Improve Your Customer Experience: Design Your Quality Program to Link Directly to Customer Satisfaction. Overview WHITEPAPER WHITEPAPER Improve Your Customer Experience: Design Your Quality Program to Link Directly to Customer Satisfaction All of us who work in the customer contact industry have experienced this we have quality

More information

Content Protection & Security (CPS) Certification Program Overview

Content Protection & Security (CPS) Certification Program Overview Content Protection & Security (CPS) Certification Program Overview GOVERNANCE & SECURITY CULTURE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND AWARENESS BUSINESS RESILIENCE

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

STAFF REPORT. Approval of City Phone System Purchase to Provide Long-term Cost Savings

STAFF REPORT. Approval of City Phone System Purchase to Provide Long-term Cost Savings STAFF REPORT DATE: May 18, 2010 TO: FROM: SUBJECT: City Council Rick Guidara, Information Technology Administrator Susan Errington, IS Administrative Manager Brad Gonzalez, IT Manager Approval of City

More information

Benefits Administration: Should You Outsource or Manage In-House? As companies consider options, Health Care Reform may impact decisions

Benefits Administration: Should You Outsource or Manage In-House? As companies consider options, Health Care Reform may impact decisions Benefits Administration: Should You Outsource or Manage In-House? As companies consider options, Health Care Reform may impact decisions Contents Introduction 3 Findings 5 Which Areas of Benefits Administration

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level

More information

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Security. Security consulting and Integration: Definition and Deliverables. Introduction Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data

More information

Core Competencies in Association Professional Development

Core Competencies in Association Professional Development Core Competencies in Association Professional Development 2009 Update These competencies are general descriptions of the behavior or actions needed to successfully perform the association professional

More information

Engagement Name Cloud Services Category

Engagement Name Cloud Services Category APPENDIX D SAMPLE STATEMENT OF WORK (SOW) FOR CLOUD SERVICES Cloud Services Category DIR DATE 1 Introduction Describe the cloud services to be delivered to [Department/Agency] with regard to [Application

More information

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber Think STRENGTH. Think Chubb. Cyber Insurance Andrew Taylor Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber The World Has Changed Then Now 1992 first text message More txt s that the entire

More information

Network Security Platform MSSP Vendor Rankings

Network Security Platform MSSP Vendor Rankings Network Security Platform MSSP Vendor Rankings North America September 2014 Contents Section Slide Numbers Introduction 4 Definitions 5 Market Overview 8 MSSP Platforms Supported Comparisons 10 Security

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

Chapter 1 Exercises. 1. Why would a systems analyst have to act as a translator? What groups might be involved?

Chapter 1 Exercises. 1. Why would a systems analyst have to act as a translator? What groups might be involved? Hejazi 1 Mohammad Essam Hejazi MGMT 310-01 Chapter 1 & 2 01/22/2014 Chapter 1 Exercises 1. Why would a systems analyst have to act as a translator? What groups might be involved? A systems analyst should

More information

Software Testing Trends in Australia and Beyond

Software Testing Trends in Australia and Beyond Software Testing Trends in Australia and Beyond Jason Lee Dolby Laboratories Australia Mark Pedersen K.J. Ross & Associates Australia Abstract This presentation looks at trends in software testing within

More information

INTERNAL REVENUE SERVICE. Guidelines for Notices of Federal Tax Liens and Centralized Lien Processing

INTERNAL REVENUE SERVICE. Guidelines for Notices of Federal Tax Liens and Centralized Lien Processing INTERNAL REVENUE SERVICE Guidelines for Notices of s and Centralized Lien Processing CONTENTS IRS Contact Information... 2 Background of Centralized Lien Processing... 2 The Process... 3 Social Security

More information

Cisco Services for IPTV

Cisco Services for IPTV Cisco Services for IPTV Cisco Services for IPTV help service providers efficiently launch IPTV services while mitigating risk and providing service assurance. Opportunity The media services landscape is

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper ARRA HITECH Stimulus HIPAA Security Compliance Reporter White Paper ARRA HITECH AND ACR2 HIPAA SECURITY The healthcare industry is in a time of great transition, with a government mandate for EHR/EMR systems,

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Portland. Reducing Software Costs While Increasing Cost Predictability and Control. Abstract. Mikko Marttinen

Portland. Reducing Software Costs While Increasing Cost Predictability and Control. Abstract. Mikko Marttinen White paper Reducing Software Costs While Increasing Cost Predictability and Control Mikko Marttinen Abstract Effective software procurement addresses contractual and overall cost of ownership through

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Risk Management and Internal Controls

Risk Management and Internal Controls Risk Management and Internal Controls Internal control The Board meets regularly throughout the year and has adopted a schedule of matters which are required to be brought to it for decision. This procedure

More information

Outsourcing: key legal issues and contractual protections

Outsourcing: key legal issues and contractual protections Page 1 Outsourcing: key legal issues and contractual protections Paul Jones May 2009 Introduction As the economic climate becomes more challenging, organisations in all sectors are looking to drive efficiencies

More information