Академический Документы
Профессиональный Документы
Культура Документы
9-2
Outsourcing
» Not the same as subcontracting, joint venturing or
contract manufacturing
9-3
Outsourced activities
Source: Handley, S.M., The Evaluation Analysis and Management of the Business 5
Outsourcing process, Unpublished Dissertation, The Ohio State University, 2008
9-5
Reasons for
Outsourcing Business Processes
9-6
Outsourcing Business Processes
9-7
Specific Purposes & Benefits of
Outsourcing
1. To reduce and control operating costs
2. To improve quality
3. To change company focus
4. To acquire external capabilities
5. To refocus scarce resources for alternative uses
6. To reduce cycle time
7. To obtain cash infusion
8. To reduce risks
9. To gain flexibility
10. To turn fixed costs into variable costs
9-8
The Following are Important for Realizing
Expected Outsourcing Benefits
9-9
The Hidden Cost of Outsourcing
1. Quality Costs
˃ Preventative
˃ Appraisal
˃ Internal failure
˃ External failure
10
9-10
Detecting Quality Failures
The buying firm will need a proper mechanisms that are
capable of detecting quality failures by an external source.
11
9-11
The Hidden Cost of Outsourcing
2. Supplier or Vendor Relationship Management
The most effective external sourcing relationships involve
considerable management time and coordination
12
9-12
The Hidden Cost of Outsourcing
13
9-13
The Hidden Cost of Outsourcing
3. Internal Coordination
» Contrasted against the internal coordination and overhead
costs associated with internally sourcing (Vertically
integrate or Make)
14
9-14
Understanding Overhead Costs
15
9-15
The Hidden Cost of Outsourcing
4. Implementation of External Sourcing Model
16
9-16
Additional Hidden Costs Associated with the
Internal Workforce
17
9-17
The Hidden Cost of Outsourcing
18
9-18
A Need to Coordinate Sourcing Alternatives
19
9-19
The Hidden Cost of Outsourcing
20
9-20
The Hidden Cost of Outsourcing
21
9-21
Supply Chain Risk Management
22
9-22
The Hidden Cost of Outsourcing
23
9-23
Miscellaneous Financial Considerations
9-24
Core Competencies
9-25
Keys to Outsourcing Success in Today's
Economy
9-26
Elements of Strategic Outsourcing
9-27
Elements of Strategic Outsourcing
1. STRATEGIC EVALUATION
• Outsourcing is the act of reversing a previous decision
to “make” or perform a particular function internally.
9-28
Elements of Strategic Outsourcing
2. FINANCIAL EVALUATION
29
9-29
Elements of Strategic Outsourcing
30
9-30
Supplier Selection and
Contract Development
» Contract Development
˃ a minimum for an enforceable contract include:
9-31
Element of Outsourcing
4. TRANSITION TO EXTERNAL SOURCING MODEL
32
9-32
Elements of Outsourcing
33
9-33
Elements of Outsourcing
TRANSITION TO EXTERNAL SOURCING MODEL (continued)
» Communication Criteria
˃ About the process of communicating external initiatives to
the affected and unaffected employees
34
9-34
Elements of Outsourcing
9-35
Elements of Outsourcing
TRANSITION TO EXTERNAL SOURCING MODEL (continued)
Transition Criteria
1. The schedule involving the transfer of activities and
resources to the supplying organization
2. The list of activities to implement outlined in the
project management schedule should include:
– An organization meeting for employees being transferred to the
supplier’s organization.
– A meeting with the buying firm’s manager whose activities are
being outsourced conducted on-site at the new location.
+ A creation of a plan to address the issues involved in transferring
significant physical assets
– a specific third-party agreement in the contract
36
9-36
Relationship Management
» In order to effectively cultivate the relationship, the
buying firm must actively monitor and evaluate
performance. The buying firm must also solve
outsourcing related problems.
9-37
Relationship Management
1. Performance measurement is the cornerstone of the
buyer-supplier relationship.
• It establishes control which provides the ability to
manage the relationship
38
9-38
Performance report
Performance Performance 2009 2009 2008 2008 2007 2007
Measures Standard Actual Variance Actual Variance Actual Variance
Number of
outputs
Number of
errors
Number of
on-time
deliveries
Number of
day-cycle
time
Number of
outputs per
employee
9-39
Risk
» Outsourcing risks include:
˃ Breaches in intellectual property
˃ Provider shirking
˃ Opportunistic renegotiation
40
9-40
Performance Report
» Risk is the difference between risk and
uncertainty
» Risk as defined By Knight:
˃ Risk is measurable, but uncertainty cannot be measured
˃ Buyers outsourcing risks (BOR) = PA x NC
˃ PA = the probability that an adverse event will occur
˃ NC = negative consequences if the adverse event occurs, assuming
that each of the adverse events is independent
41
9-41
Forms of Governance
» Traditional theory
˃ Hierarchy (i.e. internal sourcing) v. Market (i.e.
external sources)
˃ Market: arm’s-length relationship between the
customer and supplier organization
42
9-42
Forms of Governance
» Hybrid governance theory
˃ From the observation of Japanese- style supply chain
relationships
˃ Neither purely hierarchical nor a purely arms- length
market mechanism.
˃ Seeks to realize the control, goal alignment, and
improved coordination associated with retaining an
activity internally, while also benefiting from the
potentially superior skills and cost position of specialized,
external organizations.
˃ The relationship is more of a long-term, collaborative
partnership 43
9-43
Long Term Relationships
» Benefits
˃ A reduction in transaction costs
˃ Improve learning and control opportunism
˃ Greater social capital
+ Improved dissemination of information and reduced motivation for
opportunistic behavior
+ Social capital: the sum of the actual and potential resources embedded
within, available through, and derived from the network of relationships
possessed by an individual or social unit.
44
9-44
Long-term relationships with service providers can
mitigate many of the traditional concerns with
external sourcing
45
9-45
Requirements for
Long Term Relationships
46
9-46
Requirements for
Long Term Relationships
• Joint effort by the organizations.
9-47
Background on the Booz Allen Hamilton
Outsourcing Security Survey
» As the use of outsourcing continues to grow, so too do risks to
customer and company data that companies must rely on their
outsourcing vendors to protect
» In order to better understand how companies are managing the
information security and data privacy risks of outsourcing, Booz
Allen Hamilton surveyed senior executives involved in defining and
managing their companies’ outsourcing strategies
» The survey, which reflects the responses of 158 executives from
companies across a range of industries, June-December 2005, was
designed to provide insight into:
˃ Senior Executive perspectives on the magnitude of information security risk involved in outsourcing
relationships
˃ How companies approach the evaluation and monitoring of outsourcing vendors’ information
security capabilities
˃ The information security and data privacy challenges that the outsourcing industry must address in
order to maintain the trust and confidence of customers and clients
» The following presentation provides an initial summary of the 48
survey results
Key Takeaway: Companies using
outsourcing are increasingly concerned
about information security
Executive Summary
17
Geographic factors
0 50 100 150
51
Note: Includes only # of respondents who answered “Very Important” in each category
Note: Respondents were asked to select all that apply
Increased awareness of security risks has led
many companies to review their outsourcing
strategies in the last year
No
No Yes Yes
42 37
58
% % 63
%
%
52
The security risk is perceived as significantly
higher for providers with offshore operations
Do you perceive a greater or lesser risk of
security threats for outsourcing providers
located offshore?
Much Lower No basis
1 for comparison
4
Moderately Lower 2 %
%
%
Same
28%
17 Much Higher
%
48 76%
76% of
of respondents
respondents consider
consider the
the
% security risks when using offshore
security risks when using offshore
Moderately Higher providers
providers higher
higher than
than the
the risks
risks
associated
associated with
with domestic
domestic providers
providers
53
Providers with operations in India, Asia and
South America are particularly challenged by a
legal and regulatory perception gap
82
Provider’s network & system
security 78
Provider’s compliance with
standards and laws
68
Provider’s personnel security Verifiable security
management capabilities
policy and procedures matter more than absolute
63 spending
Physical security at provider’s
facilities
60
Provider’s security team (depth
of expertise)
Provider’s security budget 33
0 20 40 60 80
% of respondents putting factor in top 3
56
Companies want more 3rd party audits and independent
security evaluations of outsourcing providers
What tools do you feel are most important to
use in evaluating the security capabilities of
outsourcing vendors?
Site visits and in-person audits of vendor 105
security processes and capabilities
57
Two
Two thirds
thirds of
of respondents
respondents are
are
34%
open
open to
to some
some form
form of
of US
US
regulation
regulation of
of security
security standards
standards
Industry
Industryassociations
associationstop
top
Outsourcing service provider coalitions 46 preference
preference for
forestablishing
establishing
or industry associations
security
securitystandards
standards
Industry
Industry ready
ready for
for public-private
public-private
0 20 40 60
partnerships
partnerships for
for setting
setting
# of Respondents expressing preference standards
standards and
and regulations
regulations
59
…while leveraging external auditors for
monitoring
Who should be responsible for
certifying, monitoring and
enforcing standards?
0 20 40 60 80
61
55% 85%
85% ofof respondents
respondents may
may be
be
Maybe - would depend on comparison willing
willing to
to pay
pay some
some premium
premium
of security against other factors for
for improved
improved security
security
62
Respondents viewed service disruption, loss of customer trust and
brand impact, and loss of intellectual property as equally
important outsourcing security risks
What do you believe are the greatest security risks and vulnerabilities to your
business from outsourcing?
Disruptions in product delivery or service caused by breakdowns
94
in mission critical business processes or functions
Other 5
0 20 40 60 80 100
# of Respondents expressing preference
63
Financial Services
respondents trusted
30% even the largest
30% providers’ security
Yes capabilities
Maybe, but
no way to
14%
verify or 18% Government
30%
validate 36%
25% respondents were
9% even more skeptical
claims
Government
with less than 30%
36% trusting all or the
37% largest providers
20%
No Yes, but only
the largest 14% 24% 67% of
Half
25% manufacturing
Half of
of
Verification 19%
Verification of
of respondents found
Manufacturing
respondents
respondents
compliance
compliance 22ndnd
discredit
discredit
most
some degree of 65
most important
important
outsourcers’ 43%
outsourcers’factor
evaluation
evaluation factor provider security
security
security claims
claims
claims to be credible
Over the next two years, respondents expect continued growth
in the outsourcing market, but are generally divided on whether
growth will occur in existing functions, or expand upstream
For your industry, what do you expect 5%
Financial Services
outsourcing market
50% 45% growth to continue, but
Reduction in the
size of the market are divided on expansion
into upstream functions
Slowing growth or market
stagnation
6
7% % Government respondents
27%
are less certain, with
36% almost 40% expecting
market stagnation or
Government
49% 9%
reduction
27%
38%
Continued growth and 5%
successful expansion of
outsourced functions
Continued growth, but with (e.g., moving upstream into R&D)
86% of manufacturing
10%
little expansion respondents expect
beyond current functions outsourcing market
growth to continue, but 66
Manufacturing
17%
NO
83%
YES
67
Survey respondents represented companies of all sizes
19% 8%
5%
39% <$100 M
<1,000
$100M - $1B 42%
18% 1,000 - 10,000
75,000+
24%
27%
68