Top-Rated Free Essay
Preview

Session 23 Three IT Sourcing Cases Homework

Good Essays
402 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Session 23 Three IT Sourcing Cases Homework
1. What drove the sourcing decisions on the part of all three business organizations described in the case studies for this session?
Business
Reasons Behind Sourcing Decision
Southwest Bank - outsourcing
IT is a key enabler of the bank’s operational and management activities

Expansion business into the Southwestern United State, Mexico and Latin American countries.

Southwest is not able to run of a successful IT services organization

Need outsourced IT organization to do hardware and software upgrades in order to support business growth
Reliable Utilities - partnering
IT needs of the parent organization and all of its subsidiaries

Increased efficiency and cost management led the company to employ increasingly sophisticated and complex IT

Challenged to find, hire, and retain staff to deploy and maintain these systems, so they need a partner who provide technical personnel

Need a work-in-house partner, in order to maintain relationships with user community and to anticipate staffing and expertise requirements
State Retirement System - Insourcing
SRS members make payroll contributions to the system

Investment management also provided by the external third-party vendors.

Federal and State tax law changes, so that reprogramming is required

Increasing administrative costs and difficulties in modifying the payroll system to accommodate legislative changes

2. What were the risks associated with each of these undertakings?
Business
Risks with Sourcing Decision
Southwest Bank - outsourcing
Lack control over the financial information and confidential data as it stored in the vendor’s server

Risk of contracting with an unreliable firm

Loss of Personal Touch as the outsourcing company uses its own staffs

Reliable Utilities - partnering
Unreliability

Loss of control over information as partner executive operates as a member of the Reliable Utilities Inc.

Problem raise after expert leaving
State Retirement System - Insourcing
Incomplete requirements

Lack of planning

Budget creep

Unreliability

3. What actions on the part of each company mitigated these risks?
Business
Risk Mitigation Steps
Southwest Bank - outsourcing
Maintaining confidential data internally

Send request to candidate companies and wait for response

Make decision by evaluating and visiting the facilities of those who responded,

Sign contracts
Reliable Utilities - partnering
Request for proposal

Choose a final bidder after evaluating all responses and interviewing with key personnel,

The partner’s people will leave once the project is completed

“Technology Transfer”
State Retirement System - Insourcing
First developed the overall requirements for the new system

Developed a RFP

Required to define all kind of possible costs/ cost measurement

Sign separate agreement with each vendor

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Before approaching the project objectives, one must first understand a little background on the project. What is this company? Software Solutions started in Idaho as a small company, family owned. Through the 1980s, the company was able to provide reliable software solutions to its customers, creating one of the first user-friendly inventory tracking software solutions to the farmers. Each year, the need for this great inventory tracking software increased. Subsequently, new versions released each year. The company expanded its database software customizable to each of the users. The company was growing so fast that no longer could the small family support this software alone. After much thought the family decided it was time to rent an office space, hire outside help, and build a small help desk for software support. A successful project will ensure constant support for the product, reinforce customer confidence, and in return increase revenue.…

    • 3456 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    It Management Mgt2 Task 3

    • 4060 Words
    • 13 Pages

    Time is a risk for this project on several levels. 173 employees this will be affected as well as their customers. The company has agreed that this is a good move, however, if the process of setting up the equipment, managing the security and providing training goes on too long, then it will start to negatively affect the company over-all. Currently there is concern if the technology will be delivered due to an unforeseen fire, this set back will be costly in time and work. Also, a second part of time being a risk is managing faulty or dying equipment. Home offices will take longer to assess and fix in the long run. IT staff will either have travel to employee’s homes, or employees will be held up having to come into the home office for repairs.…

    • 4060 Words
    • 13 Pages
    Better Essays
  • Better Essays

    This will allow access only to those doing the accounting for the company. The company also needs to have written policies. Written policies will outline rules and regulations regarding the security of information. Written policies will also explain how to keep information secure and what to do if there is a security breach. Included in the policies should be consequences of not following the rules and regulations. The company needs to have backup procedures in case the system crashes. The system should be set to back up every other day or everyday to ensure not to lose too much information. To better protect confidential information from intrusion, the company should have some firewall protection. A firewall “guards against unauthorized access to sensitive file information from external internet users. On networked systems, firewalls are often standalone devices with built-in, protective software” (Bagranoff, Simkin & Strand, 2008, pg. 39). The company should also invest in anti-spyware and anti-virus protection to protect the system from any viruses. Following the above suggestions will help minimize any threats to the company’s current system.…

    • 1170 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    upgrade its IT infrastructure to ensure it is capable of handling the requirements of the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Select an organisation of your choice and identify who are the key suppliers and marketing intermediaries?…

    • 520 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 2: Case Study

    • 686 Words
    • 3 Pages

    Brett and Kathy’s filing status used to be married, filing jointly. Although both of Brett and Kathy want to get divorce, they have not divorced considering financial pressure and their three children. From 2014, Brett begins to contribute more than Kathy do to support the home and their children. Also they want to file income tax returns separately. Thus Brett believes he can claim head of household filing status.…

    • 686 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Final Paper Bsa/375

    • 2191 Words
    • 9 Pages

    The budget and the scope of the project will be for approximately 1 year. Overall, we as the BSA/375 Learning Team Corporation would have to begin the 1st phase no later than 3 weeks from the plan approval date. Upon approval, we will send in our experts for the initial evaluation. After receiving the service request, Riordan lists some requirements that we would have to agree upon before the start date. Our first task will be bringing in a Project Manager for the project. He or she will list the Statement of Scope and Goals and specify what functions will be included in the project. To accomplish this first task, we take the written daily report from the analysis and weekly survey from the End Users onsite to begin the development phase. As experts in the Information Technology field, we have to incorporate supporting measures in order for our project to be successful.…

    • 2191 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Without providing the service of safeguarding for children and young people who are not developed enough to do it for themselves, their future could be negatively affected. If they were to be affected by an event such as abuse, and there is no safeguarding in place, this could carry on and seriously affect their physical and emotional development. This could mean they fall behind with developmental milestones. Children need to be provided with a safe and happy environment to grow up in so they are happy to develop at a normal rate and sequence. This will help them achieve their full potential, through into adulthood.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pacific Systems Case

    • 4600 Words
    • 19 Pages

    1. What is your recommended sourcing strategy in this case? Please support your decision with quantitative and qualitative evidence gathered during the case analysis. Also, present your plan to reduce any risks associated with your sourcing decision.…

    • 4600 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Thankfully the customers are not being affected with the issues since the employees are still inputting the information one way or another. The main issue is that Michigan and Georgia still need to consolidate all their information and send it to the San Jose location. There are no ethical issues that arise to customers or suppliers. One of the few unethical issues is that the San Jose location needs to work harder and more diligently than the other locations to ensure Michigan and Georgia are sending the information on time. To resolve this issue of everything being inputted properly, it is recommended that the corporate office send employees out from different locations to help out with transferring information. This will help reduce the 15-20 days it takes to input everything after months end. The use of an auditor is extremely beneficial since there is some information that is being inputted twice. If information is tracked incorrectly it is unethical for Riordan. After research is completed, the employees should be able to all use the same software to ensure the…

    • 984 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    The Integrated Distributors Incorporated is a publically traded company that is facing many challenges. The company’s Information technology infrastructure has been ignored and many of its operating locations are running outdated hardware and software, which greatly increases the risk to the network in relations to confidentiality, integrity, and availability. Because of the outdated hardware and software, the company suffered some network compromises through their JV internet site and it led to disclosures of sensitive and strategic information.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    InsuraCorp Case Study

    • 1220 Words
    • 5 Pages

    InsuraCorp financial services companies existed as separate entities until, in 2005, its officers contemplated developing InsuraCorp into an enterprise system. The three primary business services at InsuraCorp, individual insurance, retirement services, and group insurance, had been operating autonomously. The idea was to cross-market across the three financial service divisions to create a company that could offer a synergistic financial product and services environment for their clients. When undertaking an enterprise project of this magnitude, InsuraCorp predicted there would be data governance issues. The predominant governance issues involved IT planning (strategy development), implementation (tactic), and the most critical, database viability. When attempting to merge the databases of their three primary financial businesses, several data integrity issues arose. From the beginning of the system merging initiative, InsuraCorp had decided that they would invest in purchased software to accomplish the task. This decision runs counter-intuitively to the plan for cross-marketing, sales, and financial management services InsuraCorp hoped to provide by the centralized database. Implementation of the plan was logistically difficult due to the personal nature of the data being transferred: addresses, common names, and birthdays that are prone to crosschecking problems within a data exchange. Knowing that some of the data was missing or incorrect, InsuraCorp’s project manager’s solution to the redundancy was to extract the data and move it to a “data warehouse” and “publish exception reports”. In other words, put the data in a closet and ignore the problem. Accountability and governance were not factors in the implementation of the system. Ultimately, the goal was to blend the companies to make sales and marketing easier, and supposedly better, for the client. What InsuraCorp attempted to do left their clients private financial information vulnerable with little…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Outsourcing

    • 791 Words
    • 4 Pages

    While some states, such as Tennessee. Have been quick to ban or limit international outsourcing of govt. activities. Other state govt. has sought to take advantages of low cost opportunities that international outsourcing cans offer.…

    • 791 Words
    • 4 Pages
    Good Essays