IT OUTSOURCING PROJECT RISKS: FROM CLIENT AND VENDOR PERSPECTIVES
|
|
|
- Byron Snow
- 9 years ago
- Views:
Transcription
1 IT OUTSOURCING PROJECT RISKS: FROM CLIENT AND VENDOR PERSPECTIVES Abstract This study examines the risk factors of IT outsourcing projects from client and vendor perspective, and compares their difference. The quasi-delphi study which consisted of three ranking rounds was conducted. A number of 41 client project managers and 21 vendor project managers were participated. This study identifies one of the top three risks ranked by the client has been considered to be of little importance by the vendor. The findings reveal that the client and vendor have different perceptions on project risks. Keywords: Delphi study, Risk identification, IT outsourcing; IT project risk. 1 INTRODUCTION Organizations have adopted IT outsourcing to develop its IT or raise its IT capacity for some beneficial reasons over the last two decades. However, despite the benefits that companies can achieve from IT outsourcing, outsourcing projects contend with numerous problems. IT outsourcing involves risks of undesirable outcomes; for example, the difficulty of management and IT control (Choudhury and Sabherwal, 2003), cost escalation (Bahli and Rivard, 2013), and ensuring IT security (Khalfan, 2004). IT outsourcing projects involve two types of organization: clients and vendors. The client desires a reliable product to be delivered on schedule, without defects and under budget. The vendor desires a high-profit project to be accomplished on time with no overrunning costs or surprises. Based on their agency relationship, the vendor may perceive project risks in ways that vary from those of the client (Taylor, 2007). The situation signifies the need for a comprehensive understanding of both the client s and vendor s perceptions of risk. This study explored the perception gaps regarding project risks between the client and the vendor. A quasi-delphi study was conducted to produce a rank-order list of risk factors. The results of the survey were subsequently compared to identify differences between the client and vendor perceptions of risk. The study revealed that the client and vendor have different perceptions on project risks. 2 BACKGROUND IT outsourcing involves the use of external technological or IT professional resources (Loh and Venkatraman, 1992). Studies seeking to help companies implement outsourcing have explored the
2 knowledge of selecting vendors (Barthelemy, 2001; Khan et al., 2011), managing relationships (Grover et al., 1996; Qi and Chau, 2012), and establishing contracts (Aubert et al., 2005; Osei-Bryson and Ngwenyama, 2006), and identifying potential risks (Natovich, 2003; Willcocks et al., 1999). Although IS researchers, such as Natovich (2003), Taylor (2007), Nakatsu and Iacovou (2009), and Aundhe and Mathew (2009), have extensively explored the risks of IT outsourcing projects, their investigations have been limited to a single perspective, of either the client or the vendor. Previous research has indicated a gap of expectations and perceptions of project outcomes among multiple stakeholders (Jiang et al., 2002). The gap leads to user dissatisfaction with project product or service. Different stakeholders may have different opinions regarding potential risk factors, and their opinion would influence the plan of risk control (Keil et al., 2002). Therefore, the perception gap of risks has drawn researchers' attention. Reconciling the stakeholders perceptions of project risks has become a common thread through much of the IT literature (Liu et al., 2010; Schmidt et al., 2001). To manage IT project successfully, project managers and users must have agreement on risks and threats, and reconcile their viewpoints on the risk assessment. Previous attempts to compare the perspectives of stakeholders have been limited to general IT projects. The current study is the first to examine the differences in how the client and vendor prioritize outsourced IT project risks. 3 DATA COLLECTION This study adopted a modified version of the Delphi method (Schmidt et al., 2001) because it has been used extensively in information systems (IS) research to yield reliable risk rankings. The panelists in this study were experienced IT project managers from organizations that have been involved in IT outsourcing activities for several years. The sampling frame was gathered from the members of the Project Management Institute (PMI) and multiple organizations from Taiwan and Indonesia. A total of 62 project managers initially agreed to participate in the first round: 41 on the client panel and 21 on the vendor panel. Table 1 shows the demographical characteristics of the sample. Three indicators are used to assess their experience: years of IT experience, the total number of projects, and the total number of outsourced IT projects that have been managed by the panelist over their career. On average, panelists have 8 years of IT experience and have managed at least two outsourced IT projects. The panelists work in different organizations which include a wide range of industries. Client panel Vendor panel Mean Max Min Mean Max Min Work experience (years) No. of project a No. of outsourced project IS employees in company
3 Number % Number % Size of panel Gender: Male Female Org. industry : IT Service Manufacturing Distribution Government Financial services Medical Others Table 1. Panel demographics a = all IT projects, including in-house and outsourced projects This study employed a variation of the Delphi survey method developed by Schmidt (1997). The quasi-delphi survey consisted of two phases. The first phase was designed to assemble a list of risks in IT outsourcing projects from IS literature. The second phase, consisting of three rounds, was designed to rank the identified risks. Data were distributed using paper-based questionnaires, electronic mail, and online survey tools. In Phase 1, a list of 34 risk items assembled from the literature was presented to several panelists. The risks occurred at a frequency of 50% or higher were retained for the next phase. As a result, all 34 risk factors were remained. In Phase 2, the panels were separated into clients and vendors, allowing each panel to participate in three ranking rounds independently. The ranking rounds were complete when an acceptable level of consensus (Kendall s W > 0.5) was reached following (Schmidt, 1997). In addition, the inversion to the ranking of risk factors is performed to compute Kendall s W. In this phase, the panelists were also asked to add extra critical risk items but none provided additional ones. In the first round, each panel was presented a list of 34 risk factors derived from Phase 1. Panelists were asked to rank and rate each risk factor on a 7-point Likert scale (1=not important, 7=most important). The rating was used in separate analysis, that is, to show the rating differences between the vendor and client. A mean rank for each risk factor was computed at the end of each round (round 1 to round 3). Subsequently, the 20 risk factors with higher mean rank were selected for each panel. In the second round, each panel was presented a list of 20 risk factors derived from the first round. The results were summarized and subsequently sent to the panelists as part of round 3 s questionnaire. In the third round, the panelists were asked to rank their top 10 risk factors from a list of RESULT AND ANALYSIS The quasi-delphi survey resulted in a moderate level of consensus among panelists (Kendall s W > 0.5). The final round resulted in a Kendall s W of on the client side, and a Kendall s W of on the vendor side. According to Schmidt (1997), Kendall s rank-order correlation coefficient (T) was
4 computed to test the agreement between the two panels, and T =.289 was obtained. Consulting a table of exact probabilities for T (Siegel and Castellan (1988), p. 362) show that the one-tailed probability is p =.146, suggesting that the two panels viewed risk perception differently. The analysis results indicate that there are regions of consistency and inconsistency among the client and vendor perceptions of risk factors. Table 2 lists the comparison between risks ranked as most important by the client and the vendor. Risk factors Client Vendor A. Lack of communication between client-vendor 1 2 B. Incomplete contracting 2 1 C. Lack of vendor commitment 3 10 D. Lack of top management support 4 5 E. Lack of schedule and budget management 5 4 F. Inadequate planning 6 9 G. Vendor financial instability 7 H. Poor vendor selection criteria and process by client 8 8 I. Requirements misunderstanding (or unclear) 9 6 J. Lack of experience and expertise with project activities 10 3 K. Inadequate staffing L. Failure to consider all costs M. Poor change management 13 7 N. Lack of active management of the vendor on contract and relationship O. Lack of knowledge transfer 15 P. Biased portrayal by vendor 16 Q. Customization of product 17 R. Lack of documentation management S. Lack of project management know-how T. Lack of audit and control from client 20 U. Lack of effective development methodology 11 V. Client readiness 13 W. Improper definition of roles and responsibilities 14 X. Lack of team morale 15 Y. Conflict between client and vendor 18 Table 2. Comparison of the client and vendor rankings The analysis results show that the clients and vendors agreed that only five of the same risk factors were important (score > 3 on average). These risks include: lack of communication between the client and the vendor, incomplete outsourcing contract, lack of top management support of the project, lack of schedule and budget management and inadequate project planning. In addition to the consistency, the results also reveal that there were disagreements between the clients and vendors. The clients ranked two important risk factors that are not considered important by the vendor: lack of vendor commitment to the project, and poor vendor selection criteria and process. The vendors perceived two risk factors as important that the clients did not: unclear requirements (or requirement misunderstanding), and lack of experience and expertise with project activities. Lack of vendor commitment is the third most important risk factor from the client s perspective.
5 5 CONCLUSION This study emphasizes the similarities and differences in the perceptions of two groups, clients and vendors, regarding the importance of outsourced IT project risks. Based on a literature review, we assembled 34 risk factors of outsourced IT projects. By conducting a quasi-delphi study, we analysed data from the separate perspectives of client panelists and vendor panelists, comparing the findings from both panels. We subsequently identified a consistent zone containing risk factors on which the two panels agreed, as well as inconsistent zones representing risk factors that were ranked as important by the clients but not by the vendors (or vice versa). The results indicate five important risk factors on which both clients and vendors agree. However, two of the seven important risks ranked by the client panel were not considered important (average score of less than 3) by the vendor panel. The study results provide the evidence that the clients and vendors perceived the importance of project risks differently, particularly those that stem from the opposite side. The results of identifying and comparing risk perceptions broaden the understanding of IT outsourcing project risk, and provide insights that may help facilitate the success of IT outsourcing. Acknowledgment This study is supported by NSC H MY2 References Choudhury, V. and Sabherwal, R. (2003). Portfolios of control in outsourced software development projects. Information Systems Research, 14 (3), Natovich, J. (2003). Vendor related risks in IT development: A chronology of an outsourced project failure. Technology Analysis & Strategic Management, 15 (4), Bahli, B. and Rivard, S. (2013). Cost escalation in information technology outsourcing: A moderated mediation study. Decision Support Systems, 56, Khalfan, A.M. (2004). Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors. International Journal of Information Management, 24 (1), Taylor, H. (2007). Outsourced IT projects from the vendor perspective: different goals, different risks. Journal of Global Information Management (JGIM), 15 (2), Loh, L. and Venkatraman, N. (1992). Determinants of information technology outsourcing: a crosssectional analysis. International Financial Services Research Center, Sloan School of Management, Massachusetts Institute of Technology. Barthelemy, J. (2001). The hidden costs of IT outsourcing. Sloan management review, 42 (3),
6 Khan, S.U., Niazi, M. and Ahmad, R. (2011). Barriers in the selection of offshore software development outsourcing vendors: An exploratory study using a systematic literature review. Information and Software Technology, 53 (7), Grover, V., Cheon, M.J. and Teng, J.T. (1996). The effect of service quality and partnership on the outsourcing of information systems functions. Journal of Management Information Systems, 12 (4), Qi, C. and Chau, P.Y. (2012). Relationship, contract and IT outsourcing success: Evidence from two descriptive case studies. Decision Support Systems, 53 (4), Aubert, B.A., Patry, M. and Rivard, S. (2005). A framework for information technology outsourcing risk management. ACM SIGMIS Database, 36 (4), Osei-Bryson, K.-M. and Ngwenyama, O.K. (2006). Managing risks in information systems outsourcing: An approach to analyzing outsourcing risks and structuring incentive contracts. European Journal of Operational Research, 174 (1), Willcocks, L.P., Lacity, M.C. and Kern, T. (1999). Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA. The Journal of Strategic Information Systems, 8 (3), Nakatsu, R.T. and Iacovou, C.L. (2009). A comparative study of important risk factors involved in offshore and domestic outsourcing of software development projects: A two-panel Delphi study. Information & Management, 46 (1), Aundhe, M.D. and Mathew, S.K. (2009). Risks in offshore IT outsourcing: A service provider perspective. European Management Journal, 27 (6), Jiang, J.J., Klein, G. and Discenza, R. (2002). Perception differences of software success: provider and user views of system metrics. Journal of systems and software, 63 (1), Keil, M., Tiwana, A. and Bush, A. (2002). Reconciling user and project manager perceptions of IT project risk: a Delphi study1. Information Systems Journal, 12 (2), Liu, S., Zhang, J., Keil, M. and Chen, T. (2010). Comparing senior executive and project manager perceptions of IT project risk: a Chinese Delphi study. Information Systems Journal, 20 (4), Schmidt, R., Lyytinen, K., Keil, M. and Cule, P. (2001). Identifying software project risks: an international Delphi study. Journal of management information systems, 17 (4), Schmidt, R.C. (1997). Managing Delphi Surveys Using Nonparametric Statistical Techniques. Decision Sciences, 28 (3), Siegel, S. and Castellan, N. (1988). Nonparametric statistics for the behavioral sciences McGraw-Hill, New York.
A Proposal Framework for Evaluating Risks of Information Technology Outsourcing
Proceedings of the 2011 International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, January 22 24, 2011 A Proposal Framework for Evaluating Risks of Information
Reconciling user and project manager perceptions of IT project risk: a Delphi study 1
Info Systems J (2002) 12, 103 119 103 Reconciling user and project manager perceptions of IT project risk: a Delphi study 1 Mark Keil*, Amrit Tiwana & Ashley Bush * Department of Computer Information Systems,
Risks and Audit Objectives for IT Outsourcing
Informatica Economică vol. 14, no. 1/2010 113 Risks and Audit Objectives for IT Outsourcing Claudiu BRÂNDAŞ West University of Timisoara, Faculty of Economics and Business Administration [email protected]
Influence of service quality of Application Development Outsourcing that effect the acceptance of employment
Influence of service quality of Application Development that effect the acceptance of employment Jureeporn Thongthawai and Dr.Waraporn Jirachiefpattana has grown rapidly and has to play their role in small
A Review of Risk Management for Information Systems Outsourcing
International Journal of Business, Humanities and Technology Vol. 5, No. 4; August 2015 A Review of Risk Management for Information Systems Outsourcing Philbert Nduwimfura Glorious Sun School of Business
Top Ten Lists of Software Project Risks : Evidence from the Literature Survey. Tharwon Arnuphaptrairong
Top Ten Lists of Software Project Risks : Evidence from the Literature Survey Tharwon Arnuphaptrairong Abstract Software risk management is crucial for the software development s. It is used for planning
SOFTWARE PROJECT RISKS AND THEIR EFFECT ON OUTCOMES
By Linda Wallace and Mark Keil SOFTWARE PROJECT RISKS AND THEIR EFFECT ON OUTCOMES How to identify the risks that interact to pose the most significant threats to successful project outcomes. While many
Report on the Ontario Principals Council Leadership Study
Report on the Ontario Principals Council Leadership Study (February 2005) Howard Stone 1, James D. A. Parker 2, and Laura M. Wood 2 1 Learning Ways Inc., Ontario 2 Department of Psychology, Trent University,
Lean Six Sigma Training The DMAIC Story. Unit 6: Glossary Page 6-1
Unit 6: Glossary Page 6-1 Glossary of Terms Unit 6: Glossary Page 6-2 Action Plan A technique that documents everything that must be done to ensure effective implementation of a countermeasure or improvement
Revisiting the Risks of Software Development Outsourcing Project
Revisiting the Risks of Software Development Outsourcing Project Haeng-Nam Sung 1, Dong-Hwan Cho 2 * 1 Management Information System, Gyeongsang National University, 900, Gazwa-dong, Jinju, Gyeongsangnam-do,
Information and Software Technology
Information and Software Technology 53 (2011) 693 706 Contents lists available at ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Barriers in the selection
INFORMATION SYSTEMS OUTSOURCING: EXPLORATION ON THE IMPACT OF OUTSOURCING SERVICE PROVIDERS SERVICE QUALITY
INFORMATION SYSTEMS OUTSOURCING: EXPLORATION ON THE IMPACT OF OUTSOURCING SERVICE PROVIDERS SERVICE QUALITY Dr. Dae R. Kim, Delaware State University, [email protected] Dr. Myun J. Cheon, University of Ulsan,
Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain
6-8 June 204, Nippon Hotel, Istanbul, Turkey, ISBN: 978--922069-54-2 Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain Abdullah Al-Hadrami * and Sutan Hidayat
The effects of project uncertainty and risk management on IS development project performance: A vendor perspective
Available online at www.sciencedirect.com International Journal of Project Management 29 (2011) 923 933 www.elsevier.com/locate/ijproman The effects of project uncertainty and risk management on IS development
The gap between e-learning managers and users on satisfaction of e-learning in the accounting industry
ABSTRACT The gap between e-learning managers and users on satisfaction of e-learning in the accounting industry Kai Wen Cheng National Kaohsiung University of Hospitality and Tourism This paper conducted
Stakeholder Analysis: The Key to Balanced Performance Measures
Stakeholder Analysis: The Key to Balanced Performance Measures Robert M. Curtice Vice President, Performance Improvement Associates The Need for Balanced Performance Measures Traditional business performance
Statistical Analysis on Relation between Workers Information Security Awareness and the Behaviors in Japan
Statistical Analysis on Relation between Workers Information Security Awareness and the Behaviors in Japan Toshihiko Takemura Kansai University This paper discusses the relationship between information
Dimensions for describing and explaining the successful outcome of the IS outsourcing process emphasising the relationship perspective
Dimensions for describing and explaining the successful outcome of the IS outsourcing process emphasising the relationship perspective Linda Bergkvist * Department of Information Systems Karlstad University
The Implementation of e-procurement System in Health Sector in Greece: Attitudes of Potential Users and Implications for Hospital Management
International Journal of Health Research and Innovation, vol. 1, no. 1, 2013, 15-23 ISSN: 2051-5057 (print version), 2051-5065 (online) Scienpress, 2013 The Implementation of e-procurement System in Health
Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain
Global Review of Accounting and Finance Vol. 6. No. 1. March 2015 Issue. Pp. 165 175 Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain Abdullah Al-Hadrami *
Including Technical and Security Risks in the Development of Information Systems: A Programmatic Risk Management Model
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2003 Proceedings International Conference on Information Systems (ICIS) 12-31-2003 Including Technical and Security Risks in the
A Success Measurement Model for Construction Projects
2011 International Conference on Financial Management and Economics IPEDR vol.11 (2011) (2011) IACSIT Press, Singapore A Success Measurement Model for Construction Projects Shahrzad Khosravi 1 + and Hamidreza
Analyzing and interpreting data Evaluation resources from Wilder Research
Wilder Research Analyzing and interpreting data Evaluation resources from Wilder Research Once data are collected, the next step is to analyze the data. A plan for analyzing your data should be developed
UNC Leadership Survey 2012: Women in Business
UNC Leadership Survey 2012: Women in Business Quantitative Report UNC Kenan-Flagler Business School Executive Development 2013 Table of Contents Introduction 3 How to Read This Report 4 Key Findings 5
Project Manager Interview Questions - Female vs. Male
Lessons Learned from Interviewing Project Managers R. Anthony (Tony) MAI The Dow Chemical Company P.O. Box 8361 South Charleston, WV 25303 Eldon R. LARSEN Engineering and Computer Science Division College
Turnover on Information Security Professionals: Findings from Korea
HyeWon Yoo, TaeSung Kim 169 Turnover on Information Security Professionals: Findings from Korea HyeWon Yoo *, TaeSung Kim Department of Management Information Systems College of Business, Chungbuk National
Journal of Business & Economics Research November, 2004 Volume 2, Number 11
Service Quality In Accounting Firms: The Relationship Of Service Quality To Client Satisfaction And Firm/Client Conflict Carl L. Saxby, (E-mail: [email protected]), University of Southern Indiana Craig R.
A Survey on the Need to Offer Forensic Accounting Education in the Kingdom of Bahrain
International Journal of Pedagogical Innovations ISSN 2210-1543 Int. J. Ped. Inn. 2, No. 2 (July 2014) A Survey on the Need to Offer Forensic Accounting Education in the Kingdom of Bahrain Sutan Emir Hidayat
Barriers & Incentives to Obtaining a Bachelor of Science Degree in Nursing
Southern Adventist Univeristy KnowledgeExchange@Southern Graduate Research Projects Nursing 4-2011 Barriers & Incentives to Obtaining a Bachelor of Science Degree in Nursing Tiffany Boring Brianna Burnette
Impact of ICT Solutions: Outsourcing on Organizations Performance in Telecom Sector
2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Impact of ICT Solutions: Outsourcing on Organizations Performance in Telecom Sector Erum Naz
CHAPTER FIVE CONCLUSIONS, DISCUSSIONS AND RECOMMENDATIONS
CHAPTER FIVE CONCLUSIONS, DISCUSSIONS AND RECOMMENDATIONS This chapter presents (1) summary of the study, (2) summary of the findings, (3) discussions of the results, (4) conclusions, and (5) recommendations
The impact of ITIL (information technology infrastructure library) recommended practices on the IT outsourcing relationship
Abstract The impact of ITIL (information technology infrastructure library) recommended practices on the IT outsourcing relationship Mohammed Alojail School of Business Information Technology and Logistics
Evaluating the Factors Affecting on Intension to Use of E-Recruitment
American Journal of Information Science and Computer Engineering Vol., No. 5, 205, pp. 324-33 http://www.aiscience.org/journal/ajisce Evaluating the Factors Affecting on Intension to Use of E-Recruitment
A NEEDS ASSESSMENT FOR GRADUATE PROGRAMS IN EDUCATION FACULTIES
A NEEDS ASSESSMENT FOR GRADUATE PROGRAMS IN EDUCATION FACULTIES Assist. Prof. Dr. Mustafa Cansiz Artvin Çoruh University Education Faculty Artvin - TURKEY [email protected] Dr. Nurcan Cansiz Atatürk
Culinary Graduates Career Decisions and Expectations
Culinary Graduates Career Decisions and Expectations Chih-Lun (Alan) Yen Department of Hospitality and Tourism Management Pamplin College of Business Virginia Polytechnic Institute and State University
APPLYING HIERCARCHIAL SERVICE QUALITY MODEL IN MEASURING MOBILE PHONE SERVICE QUALITY IN ALGERIA
APPLYING HIERCARCHIAL SERVICE QUALITY MODEL IN MEASURING MOBILE PHONE SERVICE QUALITY IN ALGERIA Mr Ameur Bensalem 1, Dr Rahima Houalef 2 1. University Assistant Lecturer, The University of Bechar, Bechar,
The Relationship between the Fundamental Attribution Bias, Relationship Quality, and Performance Appraisal
The Relationship between the Fundamental Attribution Bias, Relationship Quality, and Performance Appraisal Executive Summary Abstract The ability to make quality decisions that influence people to exemplary
Impact of Rationality in Creating Consumer Motivation (A Study of State Life Insurance Corporation Peshawar - Pakistan) Shahzad Khan
(A Study of State Life Insurance Corporation Peshawar - Pakistan) Shahzad Khan Abstract This study primarily attempts to investigate the relationship among the variable to create rational motivation in
Table of Contents. Excutive Summary
Presented by: 1 Table of Contents Excutive Summary I. Introduction II. Methodology III. Results of the Graduate Impact Survey IV. Implications and Outlook V. Literature 2 Executive Summary The Graduate
Workforce Insights Employee Satisfaction Surveying
Workforce Insights Employee Satisfaction Surveying Overview One significant factor in your call center s success is how happy and satisfied the employees are. Employee satisfaction has an extremely high
Project Management for Process Improvement Efforts. Jeanette M Lynch CLSSBB Missouri Quality Award Examiner Certified Facilitator
Project Management for Process Improvement Efforts Jeanette M Lynch CLSSBB Missouri Quality Award Examiner Certified Facilitator 2 Project and Process Due to the nature of continuous improvement, improvement
IT projects have an unenviable reputation for their high failure rate. Successful
RISK MANAGEMENT AND PROBLEM RESOLUTION STRATEGIES FOR IT PROJECTS: PRESCRIPTION AND PRACTICE HAZEL TAYLOR, University of Washington ABSTRACT This study reports findings from an exploratory field study
The Concept of Project Success What 150 Australian project managers think D Baccarini 1, A Collins 2
The Concept of Project Success What 150 Australian project managers think D Baccarini 1, A Collins 2 1 Curtin University of Technology, Perth, Western Australia 2 Broad Construction Services, Perth, Western
Copyright 2004.Pamela Cole. All rights reserved.
Key concepts for working with the Role Behavior Analysis The Role Behavior Analysis (RBA), the companion instrument to the Personal Profile System (PPS), uses specific DiSC behavioral statements for defining,
PMI Risk Management Professional (PMI-RMP) Exam Content Outline
PMI Risk Management Professional (PMI-RMP) Exam Content Outline Project Management Institute PMI Risk Management Professional (PMI-RMP) Exam Content Outline Published by: Project Management Institute,
Development and Implementation of a Web-Based Biodata Inventory for Food Inspectors
Development and Implementation of a Web-Based Biodata Inventory for Food Inspectors Henry F. Thibodeaux, PhD Jeffrey M. Cucina Alix L. Roberts, MA UNITED STATES OFFICE OF PERSONNEL MANAGEMENT ... I hope
Analysis of the perceptions of accounting students and practitioners regarding the ethnicity of earnings management post Sarbanes-Oxley
Analysis of the perceptions of accounting students and practitioners regarding the ethnicity of earnings management post Sarbanes-Oxley ABSTRACT Deborah M. Pendarvis University of Tampa David E. Morris,
DETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING
Proceedings of the International Conference for Education, 2005 World Scientific Publishing Company DETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING SHOW-HUI HUANG International Business & Trade, Shu-Te
We begin by presenting the current situation of women s representation in physics departments. Next, we present the results of simulations that
Report A publication of the AIP Statistical Research Center One Physics Ellipse College Park, MD 20740 301.209.3070 [email protected] July 2013 Number of Women in Physics Departments: A Simulation Analysis
MARKETING: THE NEXT GROWTH AREA FOR OUTSOURCING IN HIGH TECHNOLOGY COMPANIES
MARKETING: THE NEXT GROWTH AREA FOR OUTSOURCING IN HIGH TECHNOLOGY COMPANIES Created by: Stage 4 Solutions, Inc. Tel: (408) 868-9739 Web site: www.stage4solutions.com August 2006 Copyright 2006 Stage 4
Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia
International Review of Business Research Papers Vol.4 No.5. October-November 2008. PP.1-10 Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In
MOTIVATION IN PROJECT MANAGEMENT: THE PROJECT MANAGER S PERSPECTIVE
MOTIVATION IN PROJECT MANAGEMENT: THE PROJECT MANAGER S PERSPECTIVE March, 2007 Bernhard Schmid, MS, PMP Department of Communication The Florida State University [email protected] Dr. Jonathan Adams
The Role and the Effects of Risk Management in IT Projects Success
86 DOI: 10.12948/issn14531305/17.1.2013.08 Informatica Economică vol. 17, no. 1/2013 The Role and the Effects of Risk Management in IT Projects Success Otniel DIDRAGA West University of Timisoara, Faculty
3-Step Competency Prioritization Sequence
3-Step Competency Prioritization Sequence The Core Competencies for Public Health Professionals (Core Competencies), a consensus set of competencies developed by the Council on Linkages Between Academia
Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN 2249-9598, Volume-V, Issue-V, Sept-Oct 2015 Issue
Study of Employee Perception towards Performance Appraisal System with Special Reference to Education Sector in Pune City Sunanda Navale Founder Secretary, Sinhgad Technical Education Society, Ambegaon
Investment Governance Practices for Foundations & Endowments
Non-Profit Management Research Panel Investment Governance Practices for Foundations & Endowments In September 2013, the Non-Profit Management Research Panel conducted a poll to explore current investment
IS PLANNING IN NON-PROFIT ORGANIZATIONS: AN EXPLORATORY STUDY
IS PLANNING IN NON-PROFIT ORGANIZATIONS: AN EXPLORATORY STUDY Janice Klemz, The University of Wisconsin-Whitewater Gerry Simon, The University of Wisconsin-Whitewater Anil Kumar, Central Michigan University,
STANDARD FOR AUDITING PROJECTS DEFINITIONS AND RULES
Deutsches Institut für Interne Revision e.v. (German Institute for Internal Auditing) DIIR Audit Standard No. 4 STANDARD FOR AUDITING S DEFINITIONS AND RULES DIIR Project Management Audit Project Group
A Decision-Making Framework for IT Outsourcing using the Analytic Hierarchy Process
A Decision-Making Framework for IT Outsourcing using the Analytic Hierarchy Process Vivek Pandey and Veena Bansal October 14, 2003 Abstract Information Technology Outsourcing (ITO) has generated considerable
Why is the Governance of Business Intelligence so Difficult? Mark Peco, CBIP [email protected]
Why is the Governance of Business Intelligence so Difficult? Mark Peco, CBIP [email protected] Seminar Introduction A Quick Answer Unclear Expectations Trust and Confidence Narrow Thinking Politics
The perceptions of business students regarding management information systems (MIS) programs
Abstract The perceptions of business students regarding management information systems (MIS) programs Patrick Hogan Turner College of Business and Computer Science Lei Li Turner College of Business and
Identifying and Prioritizing Research Gaps. Tim Carey, M.D., M.P.H. Amica Yon, Pharm.D. Chris Beadles, M.D. Roberta Wines, M.P.H.
Identifying and Prioritizing Research Gaps Tim Carey, M.D., M.P.H. Amica Yon, Pharm.D. Chris Beadles, M.D. Roberta Wines, M.P.H. 1 Importance: Why We Need to Identify and Prioritize Research Gaps from
Analysis of the Risk in Information Technology (IT) outsourcing In Public Organisations
Analysis of the Risk in Information Technology (IT) outsourcing In Public Organisations Momoh A. Attai, Makoji Stephen & Alfa Patrick Innocent Federal Polytechnic, Idah - Kogi State. [email protected],
Brenau University Psychology Department Thesis Components Checklist
1 Brenau University Psychology Department Thesis Components Checklist Overview of Thesis Component Description/Purpose Comments/Feedback Abstract Summary of study in 150-200 words Chapter 1- Introduction
The automotive manufacturing sector is
BUILDING A SUSTAINABLE WORKFORCE: APPRENTICESHIP IN THE CANADIAN AUTOMOTIVE INDUSTRY The Canadian Automotive Manufacturing Industry at a Glance The automotive manufacturing sector is struggling in the
Partnering for Project Success: Project Manager and Business Analyst Collaboration
Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,
Software Risk Factors in Developing E-Governance Projects
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Software Risk Factors in Developing E-Governance Projects Ms. Harmeet Malhotra Associate Professor,
Audit Readiness Lessons Learned
Audit Readiness Lessons Learned Four Tips for Achieving a Smooth Audit It seems obvious: Prepare well and prepare ahead of time and the year-end audit does not have to be the painful experience most organizations
EVALUATION METHODS TIP SHEET
EVALUATION METHODS TIP SHEET QUANTITATIVE METHODS: Quantitative data collection methods consist of counts or frequencies, rates or percentages, or other statistics that document the actual existence or
IDG Connect DDoS Survey
KEY FINDINGS INTERACTIVE GUIDE 2016 IDG Connect DDoS Survey As Attacks Intensify DDoS Defenses Require New Strategies Introduction IDG (commissioned by A10 Networks ) conducted a survey of over 120 North
Missing Data. A Typology Of Missing Data. Missing At Random Or Not Missing At Random
[Leeuw, Edith D. de, and Joop Hox. (2008). Missing Data. Encyclopedia of Survey Research Methods. Retrieved from http://sage-ereference.com/survey/article_n298.html] Missing Data An important indicator
