|
Showing 1 - 24 of
24 matches in All Departments
Robotic Process Automation will continue its exponential growth
over the next five years. With more than 54 vendors, different
kinds of tools, generic applicability and as a cognitive and AI
platform, RPA has fast become an opportunity that is too good to
miss. So, how do you leverage the massive potential business value?
Based on four years of research into over 420 business deployments,
this book identifies the distinctive leading practices of
front-runners, and a Total Value of Ownership (TVO) framework to
drive out value across the RPA life-cycle. This book brings a new
focus on RPA's strategic potential: the innovations made possible
and how to deliver through effective sourcing stakeholder-buy-in,
governance, change management, and capability development
practices. RPA as a platform, linking with cognitive and AI
technologies as part of digital transformation is highlighted. The
central messages - think and behave strategically, start right,
institutionalize fast, and innovate continuously - are
demonstrated, with multiple client experiences, trials and lessons.
From dealing with old world process and IT challenges, RPA is now
being applied towards building the new digital world and becoming
strategic in its application. * Based on extensive new research by
world renowned authors * Comprehensive market overview * A
systematic set of action principles across the RPA life-cycle *
Challenges, and where value is being left on the table * A focus on
metrics and Total Value of Ownership * Multiple client case studies
* RPA as a foundation for cognitive and AI
This pioneering guide offers the first comprehensive analysis to
Robotic Process Automation (RPA) risks as actually experienced and
dealt with by organizations. The authors present analysis and
findings from a two-year study. As more organizations adopt RPA,
they find that best practice companies are able to gain a 'triple
win' from RPA: a win for shareholders, a win for customers, and a
win for employees. But while such results are impressive, they are
far from guaranteed. Service automation, like all organizational
initiatives, is fraught with risks that need to be mitigated. The
RPA risk mitigation framework reveals the significantRPA risks, and
identifies 30 key risk mitigation practices that the research found
to be successful. Whether an organization is just beginning its RPA
journey or has reached maturity, this definitive guide serves as a
key source of knowledge.
In this wide-ranging collection, Professor Willcocks and Professor
Lacity examine the economic determinants and outcomes of
outsourcing and offshoring at both the firm and country levels.
They provide a comprehensive overview of the topic, offering an
interdisciplinary perspective, which covers the empirical and
theoretical research not only of economists but also of researchers
from other disciplines, most notably business strategy, information
systems and international business. With an authoritative, original
introduction by the editors, the book will be an indispensible
guide to students and scholars, wishing to understand the
theoretical and empirical research on the economics of outsourcing
from its beginnings in the 1930s to current thinking.
In this book, leading practitioners and academics provide
comprehensive coverage and novel insights into blockchains and the
token economy. Real world case studies from a wide range of
industries provide practical examples of blockchain-based tokens
for real estate, logistics, insurance, recruitment, collectibles,
reservations, metaverses, and more. The cases show how
tokens provide an  innovative way to create and transfer
value without relying on traditional intermediaries. Â Readers
will better understand the business and social benefits of
tokenization, but also its challenges. Chapter 3 and Chapter 8 are
available open access under a Creative Commons Attribution 4.0
International License via link.springer.com.
In this book, leading practitioners and academics provide
comprehensive coverage and novel insights into blockchains and the
token economy. Real world case studies from a wide range of
industries provide practical examples of blockchain-based tokens
for real estate, logistics, insurance, recruitment, collectibles,
reservations, metaverses, and more. The cases show how tokens
provide an innovative way to create and transfer value without
relying on traditional intermediaries. Readers will better
understand the business and social benefits of tokenization, but
also its challenges. Chapter 3 and Chapter 8 are available open
access under a Creative Commons Attribution 4.0 International
License via link.springer.com.
This edited three volume edition brings together significant papers
previously published in the Journal of information Technology (JIT)
over its 30 year publication history. The three volumes of Enacting
Research Methods in Information Systems celebrate the
methodological pluralism used to advance our understanding of
information technology's role in the world today. In addition to
quantitative methods from the positivist tradition, JIT also values
methodological articles from critical research perspectives,
interpretive traditions, historical perspectives, grounded theory,
and action research and design science approaches. Volume 1 covers
Critical Research, Grounded Theory, and Historical Approaches.
Volume 2 deals with Interpretive Approaches and also explores
Action Research. Volume 3 focuses on Design Science Approaches and
discusses Alternative Approaches including Semiotics Research,
Complexity Theory and Gender in IS Research. The Journal of
Information Technology (JIT) was started in 1986 by Professors
Frank Land and Igor Aleksander with the aim of bringing technology
and management together and bridging the 'great divide' between the
two disciplines. The Journal was created with the vision of making
the impact of complex interactions and developments in technology
more accessible to a wider audience. Retaining this initial focus,
the JIT has gone on to extend into new and innovative areas of
research such as the launch of JITTC in 2010. A high impact
journal, JIT shall continue to publish leading trends based on
significant research in the field.
This edited three volume edition brings together significant papers
previously published in the Journal of information Technology (JIT)
over its 30 year publication history. The three volumes of Enacting
Research Methods in Information Systems celebrate the
methodological pluralism used to advance our understanding of
information technology's role in the world today. In addition to
quantitative methods from the positivist tradition, JIT also values
methodological articles from critical research perspectives,
interpretive traditions, historical perspectives, grounded theory,
and action research and design science approaches. Volume 1 covers
Critical Research, Grounded Theory, and Historical Approaches.
Volume 2 deals with Interpretive Approaches and also explores
Action Research. Volume 3 focuses on Design Science Approaches and
discusses Alternative Approaches including Semiotics Research,
Complexity Theory and Gender in IS Research. The Journal of
Information Technology (JIT) was started in 1986 by Professors
Frank Land and Igor Aleksander with the aim of bringing technology
and management together and bridging the 'great divide' between the
two disciplines. The Journal was created with the vision of making
the impact of complex interactions and developments in technology
more accessible to a wider audience. Retaining this initial focus,
the JIT has gone on to extend into new and innovative areas of
research such as the launch of JITTC in 2010. A high impact
journal, JIT shall continue to publish leading trends based on
significant research in the field.
This edited three volume edition brings together significant papers
previously published in the Journal of information Technology (JIT)
over its 30 year publication history. The three volumes of Enacting
Research Methods in Information Systems celebrate the
methodological pluralism used to advance our understanding of
information technology's role in the world today. In addition to
quantitative methods from the positivist tradition, JIT also values
methodological articles from critical research perspectives,
interpretive traditions, historical perspectives, grounded theory,
and action research and design science approaches. Volume 1 covers
Critical Research, Grounded Theory, and Historical Approaches.
Volume 2 deals with Interpretive Approaches and also explores
Action Research. Volume 3 focuses on Design Science Approaches and
discusses Alternative Approaches including Semiotics Research,
Complexity Theory and Gender in IS Research. The Journal of
Information Technology (JIT) was started in 1986 by Professors
Frank Land and Igor Aleksander with the aim of bringing technology
and management together and bridging the 'great divide' between the
two disciplines. The Journal was created with the vision of making
the impact of complex interactions and developments in technology
more accessible to a wider audience. Retaining this initial focus,
the JIT has gone on to extend into new and innovative areas of
research such as the launch of JITTC in 2010. A high impact
journal, JIT shall continue to publish leading trends based on
significant research in the field.
Bringing together theoretical and empirical studies from the
Journal of Information Technology, this book provides a definitive
guide to research discovered on the growing global sourcing
phenomenon. Paying particular attention to Information Technology
Outsourcing (ITO) and Business Process Outsourcing (BPO),
theoretical chapters explore insightful ways of thinking about the
different facets of outsourcing, and provide useful information to
practitioners and researchers. Empirical chapters report the
findings of 405 major research studies into the risks and successes
of relationships between customer and vendor, the development of
trust in these relationships, the factors affecting locations for
offshoring, and specialized offshoring organizations such as
captive centres. In this comprehensive study, the editors present
an expert review of the historical development of this field, and
offer analysis of emerging findings and practices for the future.
Bringing together theoretical and empirical studies from the
Journal of Information Technology, this book provides a definitive
guide to research discovered on the growing global sourcing
phenomenon. Paying particular attention to Information Technology
Outsourcing (ITO) and Business Process Outsourcing (BPO),
theoretical chapters explore insightful ways of thinking about the
different facets of outsourcing, and provide useful information to
practitioners and researchers. Empirical chapters report the
findings of 405 major research studies into the risks and successes
of relationships between customer and vendor, the development of
trust in these relationships, the factors affecting locations for
offshoring, and specialized offshoring organizations such as
captive centres. In this comprehensive study, the editors present
an expert review of the historical development of this field, and
offer analysis of emerging findings and practices for the future.
This edited three volume edition brings together significant papers
previously published in the Journal of information Technology (JIT)
over its 30 year publication history. The three volumes of Enacting
Research Methods in Information Systems celebrate the
methodological pluralism used to advance our understanding of
information technology's role in the world today. In addition to
quantitative methods from the positivist tradition, JIT also values
methodological articles from critical research perspectives,
interpretive traditions, historical perspectives, grounded theory,
and action research and design science approaches. Volume 1 covers
Critical Research, Grounded Theory, and Historical Approaches.
Volume 2 deals with Interpretive Approaches and also explores
Action Research. Volume 3 focuses on Design Science Approaches and
discusses Alternative Approaches including Semiotics Research,
Complexity Theory and Gender in IS Research. The Journal of
Information Technology (JIT) was started in 1986 by Professors
Frank Land and Igor Aleksander with the aim of bringing technology
and management together and bridging the 'great divide' between the
two disciplines. The Journal was created with the vision of making
the impact of complex interactions and developments in technology
more accessible to a wider audience. Retaining this initial focus,
the JIT has gone on to extend into new and innovative areas of
research such as the launch of JITTC in 2010. A high impact
journal, JIT shall continue to publish leading trends based on
significant research in the field.
This edited three volume edition brings together significant papers
previously published in the Journal of information Technology (JIT)
over its 30 year publication history. The three volumes of Enacting
Research Methods in Information Systems celebrate the
methodological pluralism used to advance our understanding of
information technology's role in the world today. In addition to
quantitative methods from the positivist tradition, JIT also values
methodological articles from critical research perspectives,
interpretive traditions, historical perspectives, grounded theory,
and action research and design science approaches. Volume 1 covers
Critical Research, Grounded Theory, and Historical Approaches.
Volume 2 deals with Interpretive Approaches and also explores
Action Research. Volume 3 focuses on Design Science Approaches and
discusses Alternative Approaches including Semiotics Research,
Complexity Theory and Gender in IS Research. The Journal of
Information Technology (JIT) was started in 1986 by Professors
Frank Land and Igor Aleksander with the aim of bringing technology
and management together and bridging the 'great divide' between the
two disciplines. The Journal was created with the vision of making
the impact of complex interactions and developments in technology
more accessible to a wider audience. Retaining this initial focus,
the JIT has gone on to extend into new and innovative areas of
research such as the launch of JITTC in 2010. A high impact
journal, JIT shall continue to publish leading trends based on
significant research in the field.
Socially Responsible Outsourcing is an edited collection that focus
on the topic of socially responsible outsourcing (SRO) including
research frameworks, rich case studies, and an SRO agenda for the
future.
This edited two-volume collection presents the most interesting and
compelling articles pertaining to the formulation of research
methods used to study information systems from the 30 year
publication history of the Journal of Information Technology (JIT).
This edited two-volume collection presents the most interesting and
compelling articles pertaining to the formulation of research
methods used to study information systems from the 30-year
publication history of the Journal of Information Technology .
Since 2007, South Africa has been one of the world's upcoming
Business Process Outsourcing (BPO) offshore destinations. This book
is based on the authors' most recent research into high performance
BPO globally and new research streams specifically on South Africa.
A rich database of over 2,200 outsourcing arrangements, studied
across sectors and geographies, and over time, from inception,
through contract signing, to outcomes. This book has unparalleled
insight into the robust practices that have been proven effective
time and again.
Written by the world's leading academics in the outsourcing field,
this books gives the most recent overview of developments in
research and practice. It focuses on new practices in innovation,
offshoring, onshoring, capabilities, project management and cloud
services, offering a distinctive theory of outsourcing.
While China is known for its immense manufacturing base, in recent
years the Chinese government has assigned a high priority to
science and technology services as its future growth sectors. The
Chinese government is supporting this vision with the establishment
of research and technology parks, favorable tax incentives, policy
reform, grants to help Chinese firms achieve certifications,
investments in infrastructure, and promotion of IT outsourcing
(ITO) and business process outsourcing (BPO) services. Beyond the
aspirations of its leaders, is China ready to compete in the global
ITO and BPO markets? How can Western managers successfully engage
Chinese ITO/BPO suppliers?
In this book, top scholars and practitioners doing leading research
on China's ITO and BPO sector help answer these questions. All
told, this book reports on findings from 519 interviews, 305
surveys, 11 detailed case studies, and 34 formal presentations.
Authors analyze the strengths and weaknesses of China's ITO and BPO
markets, categorize and analyze Chinese suppliers, project future
trends in China's ITO and BPO capabilities, and prescribe lessons
for Western managers seeking to engage Chinese suppliers. Several
chapters contain studies of Chinese suppliers and clients engaged
in particular ITO or BPO services, including, procurement, media
relations, logistics, and research and development. Overall, the
Chinese ITO and BPO markets are changing rapidly as they both
respond to and help form the global outsourcing landscape. This
book provides an in-depth, contemporary view on where China is
heading, how it is going to get there, and how companies and
countries can engage with China's emerging outsourcing
capabilities.
A close look at the main developments in IT, business processes and
offshore outsourcing. This book studies these topics in both theory
and practice, exploring the rising prominence of outsourcing with a
multi-dimensional, contextual perspective.
This book presents a close look at the main developments in IT,
business processes and offshore outsourcing. The authors study
these topics in both theory and practice, exploring the rising
prominence of outsourcing with a multi-dimensional, contextual
perspective.
This edited three volume edition brings together significant papers
previously published in the Journal of information Technology (JIT)
over its 30 year publication history. The three volumes of Enacting
Research Methods in Information Systems celebrate the
methodological pluralism used to advance our understanding of
information technology's role in the world today. In addition to
quantitative methods from the positivist tradition, JIT also values
methodological articles from critical research perspectives,
interpretive traditions, historical perspectives, grounded theory,
and action research and design science approaches. Volume 1 covers
Critical Research, Grounded Theory, and Historical Approaches.
Volume 2 deals with Interpretive Approaches and also explores
Action Research. Volume 3 focuses on Design Science Approaches and
discusses Alternative Approaches including Semiotics Research,
Complexity Theory and Gender in IS Research. The Journal of
Information Technology (JIT) was started in 1986 by Professors
Frank Land and Igor Aleksander with the aim of bringing technology
and management together and bridging the 'great divide' between the
two disciplines. The Journal was created with the vision of making
the impact of complex interactions and developments in technology
more accessible to a wider audience. Retaining this initial focus,
the JIT has gone on to extend into new and innovative areas of
research such as the launch of JITTC in 2010. A high impact
journal, JIT shall continue to publish leading trends based on
significant research in the field.
This publication explores two overlapping niche sourcing markets:
rural sourcing and impact sourcing. Rural sourcing is the practice
of locating information technology outsourcing (ITO) or business
process outsourcing (BPO) delivery centers in low-cost, non-urban
areas. Impact sourcing is the practice of hiring and training
marginalized people in ITO or BPO services who normally would have
few opportunities for good employment. Rural sourcing and impact
sourcing intersect when marginalized people in rural areas are
hired, trained, and employed in ITO or BPO businesses. Based on 62
interviews with providers and clients in the US, Israel, India, and
China, this concise study discusses challenges, best practices, and
lessons for providers seeking to build ITO and BPO capabilities in
remote areas or with unique populations and for clients seeking to
buy their services.
|
|