Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing Successful IT Outsourcing Relationships

Buy
Even though the IT outsourcing market has grown tremendously over the past years, many organizations do not have a reflective understanding of the complex process of IT outsourcing. The process does affect both technological and business goals and activities, and companies must establish both strategies and structures adjusted to their degree of outsourcing. Several critical success factors arise, and they touch upon the relationship with internal and external stakeholders.

The overall objective of this book is focus on the important issues of strategy, structure, and management of IT outsourcing relationships. Using well-known theoretical perspectives and experiences earned from several business cases, our mission is to develop models and guidelines for the complex IT outsourcing process and emerging relationships.

The intended audience of this book includes undergraduate and graduate students, as well as practitioners, both on the customer and vendor sides. Undergraduate students in management IS will learn how future IT organizations will be restructured from a resource-based perspective. Graduate students will learn how strategy will shape future sourcing, and how management roles change as sourcing strategies evolve. Vendors will appreciate insights into value propositions, formal agreements, and relationships from this book. Customers will appreciate insights into strategic choices and relationship management from this book.

Managing Successful IT Outsourcing Relationships is a comprehensive guide on all the aspects of IT outsourcing, and is highly commendable for practitioners, researchers, policy makers and consultants alike. This book uses well-known theoretical perspectives and experiences learned from several business cases to develop models and guidelines for the complex IT outsourcing process and emerging relationships. It focuses on the important issues of strategy, structure, and management of IT outsourcing relationships and answers the what, where, when and how to outsource and manage outsourcing contracts.

About the Author
Dr. Petter Gottschalk is Professor of Information Management at the Norwegian School of Management. He is teaching strategic knowledge management and technology management strategy to undergraduate and graduate students in Norway, China and Egypt. He is the author of several books on these topics, and he has published in major journals. Professor Gottschalk earned his MBA at the Technical University Berlin, Germany, his MSc at Dartmouth College and Sloan School, MIT and his DBA at Henley Management College, Brunel University, UK. His executive experience includes CIO at ABB and CEO at ABB Datacables.

Hans Solli-Sæther has a Master of Science degree from University of Oslo and a Business Candidate degree from Norwegian School of Management. He has been the CIO of Norway Post and has several years of experience with IT outsourcing. Solli-Sæther is now a doctoral student at the Norwegian School of Management, and his dissertation research is focused on managerial expectations in IT outsourcing.

(HTML tags aren't allowed.)

Kalman Filter Recent Advances and Applications
Kalman Filter Recent Advances and Applications
The discussion about the manned spacecraft program was initiated at NASA in 1959. Only one year later, Dr. Kalman and Dr. Schmidt linked the linear Kalman filter and the perturbation theory in order to obtain the Kalman-Schmidt filter, currently known as the extended Kalman filter. This approach would be implemented in 1961 using an...
Too Soon To Tell: Essays for the End of The Computer Revolution (Perspectives)
Too Soon To Tell: Essays for the End of The Computer Revolution (Perspectives)
Based on author David A. Grier's column "In Our Time," which runs monthly in Computer magazine, Too Soon To Tell presents a collection of essays skillfully written about the computer age, an era that began February 1946. Examining ideas that are both contemporary and timeless, these chronological essays examine the revolutionary nature of...
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the...


Neuroanatomical Tract-Tracing: Molecules, Neurons, and Systems
Neuroanatomical Tract-Tracing: Molecules, Neurons, and Systems
Having been available for 70 years, it seems reasonable to ask what transmission electron microscopy (TEM) can add to the investigation of the nervous system in the new millennium. Today, the basic synaptic organization of most brain regions is known, as is the morphological detail of most neurons and support cells. Chapters in...
Continuous Delivery with Visual Studio ALM  2015
Continuous Delivery with Visual Studio ALM 2015

This book is the authoritative source on implementing Continuous Delivery practices using Microsoft’s Visual Studio and TFS 2015. Microsoft MVP authors Mathias Olausson and Jakob Ehn translate the theory behind this methodology and show step by step how to implement Continuous Delivery in a real world environment.

Building...

Peers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates
Peers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates
PEERS, PIRATES, AND PERSUASION: RHETORIC IN THE PEER-TO-PEER DEBATES investigates the role of rhetoric in shaping public perceptions about a novel technology: peer-to-peer file-sharing networks. While broadband Internet services now allow speedy transfers of complex media files, Americans face real uncertainty about whether peer-to-peer file...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy