160 resultados para Outsourced
Resumo:
The target of the thesis was to find out has the decision to outsource part of Filtronic LK warehouse function been profitable. Furthermore, another thesis target was to demonstrate current logistics processes between TPLP and company and find out the targets for developing these processes. The decision to outsource part of logistical funtions have been profitable during the first business year. Partnership includes always business risks. Risk increases high asset specific investments. In the other hand investment to partnership increases mutual trust and commitment between parties. By developing partnership risks and opportunitic behaviour can be decreased. The potential of managing material and data flows between logistic service provider and company observed. By analyzing inventory effiency were highlighted the need for decreasing the capital invested to inventories. The recommendations for managing outsourced logistical funtions were established such as improving partnership, process development, performance measurement and invoice checking.
Resumo:
The Finnish IT service market can be described to be at a turning point. The clients are ever more interested on services delivered from offshore but certain issues keep them cautious. There is a lack of knowledge on what implications different degrees of offshoring have on service quality. Although there has been significant amount of research related to both service quality and offshoring, several questions are unanswered, terminology remains ambivalent and research findings are inconsistent. The study focuses on the interception of these two fields. The purpose of the study is to learn more about service quality in different degrees of offshoring. At the same time it aims to contribute in narrowing the research gaps. The degree of offshoring can be divided to three delivery modes: onshore, collaboration and offshore. The study takes a mixed method approach where the quantitative and qualitative phases are executed sequentially. First data was gathered from incident management system. Resolution time in different degrees of offshoring was analyzed with Kruskal-Wallis and Jonckheere-Terpstra tests. In addition, the compliance to Service Level Agreement (SLA) in different degrees of offshoring was examined with cross tabulation. The findings from the quantitative analysis suggested that the services with offshore delivery mode perform the best in terms of promptness and SLA compliance. However, several issues were found related to the data and for that reason, the findings should be considered with prudence. After the quantitative analysis, the study moved on to qualitative data collection and analysis. Four semi-structured interviews were held. The interviewees represented different organizational roles and had experiences from different delivery modes. Several themes were covered in the interviews, including: the concept of quality, the subjectivity or objectivity of service quality, expectations and prejudices towards offshore deliveries, quality produced in India, proactiveness of offshore resources, quality indicators and the scarcity of collaborative deliveries. Several conclusions can be made from the empirical research. Firstly, the quality in different delivery modes was found to be controversial topic. Secondly, in the collaborative delivery covered in the study, the way tasks and resources are allocated seem to cause issues. On the other hand inexperienced offshore resources are assigned to the delivery and on the other hand only routine tasks are assigned to the resources. This creates a self-enforcing loop that results in low motivation, low ownership and high employee turnover in offshore. Nevertheless, this issue is not characteristic only to collaborative deliveries but rather allocation of tasks and resources. Moreover, prejudices were identified to affect the perceived service quality in non-predictable way. The research also demonstrated that there is a need in focal company for further data gathering and analysis.
Resumo:
Étude de cas / Case study
Resumo:
Outsourced workers in information technologies (IT) generally have high skills and a high value on the job market. Their IT outsourcing organizations are likely to provide them with training, in the first place for skill development, but perhaps also as a way to bind the workers to them. This can be understood along the role of the psychological contract. Outsourced IT workers may see training as a fulfillment of their psychological contract. Accordingly, we hypothesize that psychological contract fulfillment mediates the relationship between training and affective commitment to the IT outsourcer. This was tested in a sample of 158 Portuguese outsourced IT workers. The results showed that employees who considered that they were receiving good training opportunities felt a greater affective commitment to their IT outsourcers. This relationship was mediated by the fulfillment of the relational psychological contract.
Resumo:
Purpose – Outsourced information technology (IT) workers establish two different employment relationships: one with the outsourcing company that hires them and another with the client organization where they work daily. The attitudes that an employee has towards both organisations may be influenced by the interpretations or attributions that employees make about the reasons behind the human resource (HR) management practices implemented by the outsourcing company. This paper aims to propose that commitment‐focused HR attributions are positively and control‐focused HR attributions are negatively related to the affective commitment to the client organization, through the affective commitment to the outsourcing company. Design/methodology/approach – These hypotheses were tested with a sample of 158 highly skilled outsourced employees from the IT sector. Data were analyzed with structural equation modeling (SEM). Findings – The paper's hypotheses were supported. It can conclude that, if an employee interprets the HR practices as part of a commitment‐focused strategy of the outsourcing company, it has clear attitudinal benefits. The study found that the relationship between HR attributions and the commitment to the client organization is mediated by the commitment to the outsourcing company. Practical implications – These findings hint at the critical role of outsourcing companies in managing the careers of these highly marketable employees. Originality/value – This paper is the first to apply the concept of HR attributions to contingent employment literature in general and to outsourced IT workers in particular.
Resumo:
This paper presents a proposal of a model to measure the efficiency of outsourced companies in the aeronautical industry applying the methods DEA and AHP. It also proposes an evaluation in the relation between the variables of the process and the value obtained for the effiiency. The criteria of Quality, Time and Cost were considered the outputs of the process, and those criteria were quantified by AHP for DEA matrix.The number of technical documents received by those outsorced companies were considered the input of the process. The other purpose is to separate the companies in groups considered able to receive an investment to improve their process. Copyright © 2008 SAE International.
Resumo:
Given the centrality of control for achieving success in outsourced software projects, past research has identified key exogenous factors that determine the choice of controls. This view of exogenously driven control choice is based on a number of assumptions; particularly, clients and vendors are seen as separate cognitive entities that combat opportunistic threats under environmental uncertainty by one-off choices or infrequent revisions of controls. In this paper we complement this perspective by acknowledging that an outsourced software project may be characterized as a collective, evolving process faced with the challenge of coping with cognitive limitations of both client and vendor through a continuous process of learning. We argue that if viewed in this way, controls are less subject of a deliberate choice but rather are subject of endogenously driven change, i.e. controls evolve in close interaction with the evolving software project. Accordingly, we suggest a complementary model of endogenous control, where controls mediate individual and collective learning processes. Our research contributes to a better understanding of the dynamics in outsourced software projects. It also spells out methodological implications that may help improve cross-section control research.
Resumo:
In the UK public sector, procurement decisions for outsourced services are usually taken at a local level, for example by a hospital trust or a local government authority. Cumulatively, these fragmented decisions can lead to ‘imbalanced’ supply markets (too few or too many suppliers), to the detriment of both suppliers and purchasers. This paper considers what can be done to manage imbalanced supply markets resulting from the fragmented procurement of outsourced services across a sector, using the case of the English National Health Service. The types and levels of action available within the health sector are explored.
Resumo:
This project is about retrieving data in range without allowing the server to read it, when the database is stored in the server. Basically, our goal is to build a database that allows the client to maintain the confidentiality of the data stored, despite all the data is stored in a different location from the client's hard disk. This means that all the information written on the hard disk can be easily read by another person who can do anything with it. Given that, we need to encrypt that data from eavesdroppers or other people. This is because they could sell it or log into accounts and use them for stealing money or identities. In order to achieve this, we need to encrypt the data stored in the hard drive, so that only the possessor of the key can easily read the information stored, while all the others are going to read only encrypted data. Obviously, according to that, all the data management must be done by the client, otherwise any malicious person can easily retrieve it and use it for any malicious intention. All the methods analysed here relies on encrypting data in transit. In the end of this project we analyse 2 theoretical and practical methods for the creation of the above databases and then we tests them with 3 datasets and with 10, 100 and 1000 queries. The scope of this work is to retrieve a trend that can be useful for future works based on this project.