34 resultados para outsourcing (make or buy)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Deciding which technology to invest in is a recurring issue for technology managers, and the ability to successfully identify the right technology can be a make or break decision for a company. The effects of globalisation have made this issue even more imperative. Not only do companies have to be competitive by global standards but increasingly they have to source technological capabilities from overseas as well. Technology managers already have a variety of decision aids to draw upon, including valuation tools, for example DCF and real options; decision trees; and technology roadmapping. However little theory exists on when, where, why or even how to best apply particular decision aids. Rather than developing further techniques, this paper reviews the relevance and limitations of existing techniques. This is drawn from an on going research project which seeks to support technology managers in selecting and applying existing decision aids and potentially in the design of future decision aids. It is intended that through improving the selection of decision aids, decision performance can be increased, leading to more effective allocation of resources and hence competitive advantage. (c) 2006 PICMET.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Data in an organisation often contains business secrets that organisations do not want to release. However, there are occasions when it is necessary for an organisation to release its data such as when outsourcing work or using the cloud for Data Quality (DQ) related tasks like data cleansing. Currently, there is no mechanism that allows organisations to release their data for DQ tasks while ensuring that it is suitably protected from releasing business related secrets. The aim of this paper is therefore to present our current progress on determining which methods are able to modify secret data and retain DQ problems. So far we have identified the ways in which data swapping and the SHA-2 hash function alterations methods can be used to preserve missing data, incorrectly formatted values, and domain violations DQ problems while minimising the risk of disclosing secrets. © (2012) by the AIS/ICIS Administrative Office All rights reserved.

Relevância:

30.00% 30.00%

Publicador: