Managing the Risks of IT Outsourcing

Managing the Risks of IT Outsourcing

Author: Ian Tho

Publisher: Routledge

Published: 2005

Total Pages: 226

ISBN-13: 0750665742

DOWNLOAD EBOOK

This book shows IT managers how to identify, mitigate and manage risks in an IT outsourcing exercise. The book explores current trends and highlights key issues and changes that are taking place within outsourcing. Attention is given to identifying the drivers and related risks of outsourcing by examining recently published and existing concepts of IT outsourcing. Founded on academic theory and empirical and quantitative information, this book: * Incorporates the complete risk identification and mitigation life cycle * Highlights the concept of core competency * Looks at motivating factors and working relationships of the buyer and supplier * Provides background to understand the risks as a result of 'human factors' as defined by the agency theory * Reviews the areas of risk that influence the decision to outsource the IT function * Examines the forces that determine the equilibrium in the risk profiles for the buyer and supplier


Outsourcing

Outsourcing

Author: Chris Lonsdale

Publisher:

Published: 1998

Total Pages: 240

ISBN-13:

DOWNLOAD EBOOK

Key texts in managing outsourcing risks are outlined in this study along with a critical analysis of the operational tools and techniques which dominate academic/practitioner thinking.


Information Technology Outsourcing

Information Technology Outsourcing

Author: Suzanne Rivard

Publisher: Routledge

Published: 2015-03-26

Total Pages: 425

ISBN-13: 1317467922

DOWNLOAD EBOOK

This new volume in the "Advances in Management Information Systems" series presents the latest cutting-edge knowledge in IT outsourcing. As part of the growing business trend to outsourcing various operations, IT outsourcing both determines the governance of a vital organizational function and influences the processes of exploitation and exploration in all other functions of an enterprise. In keeping with the mission of the "AMIS" series, the editors of this volume have framed the domain of research and practice broadly. "Information Technology Outsourcing" provides leading edge research on both the variety of decisions regarding the outsourcing of IS services and the management of the relationship with service suppliers.


Successful IT Outsourcing

Successful IT Outsourcing

Author: Elizabeth Sparrow

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 282

ISBN-13: 1447100611

DOWNLOAD EBOOK

The first book to provide practical guidance on how to get the most from an outsourced IS service and written specifically for IS and IT professionals and not senior business managers.


Managing Information Security Risks

Managing Information Security Risks

Author: Christopher J. Alberts

Publisher: Addison-Wesley Professional

Published: 2003

Total Pages: 516

ISBN-13: 9780321118868

DOWNLOAD EBOOK

Describing OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation), a method of evaluating information security risk, this text should be of interest to risk managers.


Outsourcing Energy Management

Outsourcing Energy Management

Author: Steven Fawkes

Publisher: Routledge

Published: 2017-05-15

Total Pages: 164

ISBN-13: 1317084543

DOWNLOAD EBOOK

This book describes energy management outsourcing as a way of addressing the current energy challenges facing all organizations, namely high and volatile energy prices, the need to mitigate climate change and potential supply constraints as oil production peaks. These problems are likely to intensify in the coming years, yet most organizations have reduced in-house capability to address them, thus outsourcing is increasingly seen as an essential part of any strategy to reduce energy use and carbon emissions. The author describes the basic processes of energy management and how to outsource them in a strategic way to achieve maximum results. The process is based on a new model of energy management looking at total costs, which is presented in the book. The book offers a comprehensive guide to outsourcing energy management, discussing the risks and benefits and taking managers through the process of deciding whether to outsource or not, and finding and assessing an outsourcing partner. Managers looking to reduce energy consumption and carbon emissions through the use of external service providers will find Outsourcing Energy Management an ideal 'how to do it' guide.


Managing Risk in Virtual Enterprise Networks: Implementing Supply Chain Principles

Managing Risk in Virtual Enterprise Networks: Implementing Supply Chain Principles

Author: Ponis, Stavros

Publisher: IGI Global

Published: 2010-03-31

Total Pages: 407

ISBN-13: 1615206086

DOWNLOAD EBOOK

"This book deals with risk management in enterprise network formations, stressing the importance of risk management in enterprises organized in networks followed by the presentation of the researcher suggested approaches which most of the time emphasizes in a supply chain"--Provided by publisher.


Managing Risk and Security in Outsourcing IT Services

Managing Risk and Security in Outsourcing IT Services

Author: Frank Siepmann

Publisher: CRC Press

Published: 2013-12-09

Total Pages: 246

ISBN-13: 0429838042

DOWNLOAD EBOOK

With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and


Security Risk Management

Security Risk Management

Author: Evan Wheeler

Publisher: Elsevier

Published: 2011-04-20

Total Pages: 361

ISBN-13: 1597496162

DOWNLOAD EBOOK

Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks. This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program. This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs. - Named a 2011 Best Governance and ISMS Book by InfoSec Reviews - Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment - Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk - Presents a roadmap for designing and implementing a security risk management program


Managing IT Outsourcing Performance

Managing IT Outsourcing Performance

Author: Hans Solli-Saether

Publisher: IGI Global Snippet

Published: 2010

Total Pages: 256

ISBN-13: 9781605667966

DOWNLOAD EBOOK

"This book provides a collection of methodologies and tools that can be used in managing relationships and performance of IT outsourcing"--Provided by publisher.