INTRODUCTION
This assignment was given by Madam Manaf as the subject of his assignment of Business Information Management Strategy to all degree students with international business information technology business (CU202). Based on this assignment students were required to make a case study on computer RBS failure ' Caused by inexperienced operative in India ‘. Based on the case study is also required to give an idea of comparative advantage of IS / IT outsourcing in the company. Then, based on the case study of this question me are required to describe the main Threats to take outsourcing IS / It to the company. Next, I need to make recommendations on measures to prevent the occurrence of a failure in the computer system. In addition, I also have an opinion on what I've learned from this assignment and I understand the issues case study RBS computer failure ' Caused by inexperienced operative in India’s.
RBS computer failure ' Caused by inexperienced operative in India ' is simply telling a Royal Bank of Scotland is experiencing huge problems for workers from outsourcing to help make the job of IS / IT in their companies , thus causing the system cannot be accessed by RBS customers who use the service . This problem stems from young technician who deliberate delete information during the process of upgrading the RBS system. This matter has resulted in millions of customers unable to access as well as a loss on the transaction made during the upgrade system is running. The company RBS cannot entirely blame this offense to young technicians but they blame the company for not being careful in a case like this and create a backup plan so that this problem is not widespread so take the time to fix it. Due to the company's failur...
... middle of paper ...
...ebf245c1baa8015cc6d9a21b/PSM%20COMBINE.htm
1.4 Erin Schreiner, Demand Media, 2013, Definition of Increased Productivity, http://smallbusiness.chron.com/definition-increased-productivity-10003.html
1.5 Kristi Holland, 2013, Is outsourcing a good for business?, http://www.thebeckon.com/outsourcing-good-for-business/
1.6 About.com, 2013, Top 6 Outsourcing Disadvantages, http://operationstech.about.com/od/outsourcing/tp/OutSrcDisadv.htm
1.7 Tim Crosby, 2013, How Outsourcing Works, http://money.howstuffworks.com/outsourcing1.htm
1.8 Margaret Rouse, November 2012, competitive advantage, http://searchcio.techtarget.com/definition/competitive-advantage
1.9 Sarah Tagliapietra, Peter Platan, Ng Seow Li, Ralph Schneider, May 1991, Gaining competitive advantage through outsourcing, http://www.peterplatan.com/other/files/outsourcing.pdf
APPENDICES
It is been observed that Tegan’s A/P system was very complex and they had to pay their bill at the appropriate time. The system was been brought to its breaking point as per the Tegan’s increase in its volumes as well as vendors. The system was been blocked as per its runtime errors as well as blocked records. These lead to create problem for Tegan’s team and it’s a/p system staff and employees. Where these lead to create a major problem of Tegan’s finance as well as IT department who thought that this might create a huge issue in th...
Outsourcing simply means acquiring services from an external organization instead of using internal resources (Butler, 2000). By using outsourced resources, organizations can gain a competitive advantage by utilizing contingent staff to accomplish strategic goals without incurring the fixed overhead. By focusing on the leading edge and highly specialized skill sets, outsourcing providers can often offer higher quality services, or at a lower price than the client organization. Typical reasons for outsourcing go beyond simple contingent staffing. Outsourcing providers are able to maintain economies of scale with regard to specialization (...
but the system was shot off for a few hours due to employee error. Corrective
The main problem, in this case, is involving Vermont Teddy Bear which was John Sortino in 1981 is that the companies point of sale system was severely lagging behind. In 2011, The company struggled with major surges in customer periods, for example, Valentine's day and Christmas Eve this occurred because of VTB's intricate middleware system. The issue may have happened because instead of revamping it's system during down periods the company attempted to do patch work jobs over time. This is quite alarming because a major retailer would not have these types of issues with the system when they need it most. Which leads to the next point of the IT supervisor being faced with a dilemma on what to improve prior to the next surge period(Mother's
... create an unhealthy, unbalanced market place for computer and computer software industry. The consequences are too dire to let Microsoft go on like it has in the past. In conclusion, something has to be done to create a more healthy business environment for all people affected by this case.
Kibbe, C. (2004, 07 09). Outsourcing: the good, the bad and the inevitable. New Hampshire Business Review, pp. 1A-21A.
The background of the project is that Flayton Electronics faced an eminent problem when it is discovered that there might be a possible breach in their security and the privileged customer information has been compromised. A bank informed the firm that credit card information of the several customers had been leaked and there have been possible fraudulent transactions taken place. The CEO of the firm, Bret Flayton is faced with the challenge of making a tough decision and deciding what to do next. The firm is exposed to various risks and needs to develop a risk management plan in order to manage and mitigate the potential risks that threaten the firm.
The competitive advantage that can be gained by the companies through IS/IT outsourcing is Improved business processes. IT outsourcing an identification method and rigor of IT resources that can help the business run smoothly. It can control the development of the project budget and expenditures. It also can promote information technology investment proposals from outside and provide skilled individuals in managing IT resources available in the company. Through these companies are able to provide appropriate information and report to the company. This can give competitive advantage to the company. For example, expenditures, progress, and issues the company can be viewed and controlled.
order to accomplish this goal, so it is fair to say if data was not
Flynn, Donal J.; "Information Systems Requirements: Determination and Analysis"; McGraw-Hill Book Company; 1992Parnas; 1985; taken from: Sherer, Susan A.; "Software Failure Risk – Measurement and Management"; Plenum Press; 1992Jones, Carpers; "Patterns of Software Systems Failure and Success"; Thomson computer press; 1996Neumann, Peter G.; "Computer Related Risks"; Addison-Wesley publishing company; 1995Petroski, Henry; "To Engineer is Human"; MacMillan Publishing; 1985Flowers, Stephen; "Software failure: management failure"; Chichester: John Wiley and Sons; 1996.Report of the Inquiry into the London Ambulance Service; February 1993. Simpson, Moira (1994); "999!: My computers stopped breathing !"; The Computer Law and Security Report, 10; March – April; pp 76-81Dr. Dobbs Journal; January 1997 edition<a href="http://catless.ncl.ac.uk/Risks">http://catless.ncl.ac.uk/Risks<a href="http://www.scit.wlv.ac.uk ">http://www.scit.wlv.ac.uk <a href="http://www.bbc.co.uk/news">http://www.bbc.co.uk/news<a href="http://abcnews.go.com/sections/travel">http://abcnews.go.com/sections/travel
[4] Gupta, Sachin. For a global software company, outsourcing began at inception . World Paper. April 19. 2004 http://www.worldpaper.com/2004/april/april4.html
The assignment research objectives were (a) to gain insight into securing strategic partnerships in the information technology (IT) arena; (b) to understand the choices made to reduce information and security risks by exploring the different outsourcing techniques, and; (c) to understand how business process associated with outsourcing will stimulate awareness on how the process is interlinked with human behaviors. The topics covered include an evaluation of the specifications of information security consultants to become strategic partners assisting in the reduction of information or security risks, an examination of four factors that were omitted in the specifications that add value to the selection process, and an explanation of the value of the four factors.
In this case study it was stated that there were a problem happen in the outsourcing for the Royal Bank of Scotland. What happen was there were an error that happen during the routine software upgrade that cause million of that bank customer cant access to their account. The error happen when one junior technician in India was accidently wiped all the information during the routine software upgrade. The member of staff that was working under the program for the Royal Bank of Scotland, NatWest and Ulster Bank and it was based in Hyderabad, India.
Solution: The organization should put in place a competent incident response team, continuously update their security
system that was 'top of the line' in 1991. That's why it is important for