Introduction |
|
xi | |
SECTION I RULES OF THE OUTSOURCING GAME |
|
1 | (54) |
|
Making the Decision to Outsource IT |
|
|
3 | (12) |
|
|
|
|
|
The Outsourcing Alternative |
|
|
15 | (14) |
|
|
|
|
|
Whether to Outsource and Downsize |
|
|
29 | (16) |
|
|
|
|
|
A Sensible Approach to Outsourcing |
|
|
45 | (10) |
|
|
|
|
SECTION II OUTSOURCING TO WIN |
|
55 | (36) |
|
The Essentials for Successful IT Outsourcing |
|
|
57 | (10) |
|
|
|
|
|
|
|
|
|
How to Manage Outsourcing for Best Results |
|
|
67 | (16) |
|
|
|
|
|
Improving IT Performance as an Outsourcing Alternative |
|
|
83 | (8) |
|
|
|
|
SECTION III OUTSOURCING AND PROCESS |
|
91 | (52) |
|
How to Select an Outsourcing Vendor |
|
|
93 | (12) |
|
|
|
|
|
A Step-by-Step Guide for Writing a Successful RFP |
|
|
105 | (18) |
|
|
|
|
|
|
123 | (10) |
|
|
|
|
|
Outsourcing as a Means of Improving Process Maturity: An Approach for More Rapidly Moving up the Capability Maturity Model |
|
|
133 | (10) |
|
|
|
|
SECTION IV OUTSOURCING SELECTIVE FUNCTIONS |
|
143 | (70) |
|
Outsourcing Network Management and Information Systems |
|
|
145 | (14) |
|
|
|
|
|
Outsourced Systems Development |
|
|
159 | (10) |
|
|
|
|
|
Applications Maintenance Outsourcing |
|
|
169 | (8) |
|
|
|
|
|
Support Services Outsourcing |
|
|
177 | (6) |
|
|
|
|
|
Outsourcing the Help Desk Function |
|
|
183 | (12) |
|
|
|
|
|
Outsourcing Data Center performance |
|
|
195 | (8) |
|
|
|
|
|
Application Service Providers |
|
|
203 | (10) |
|
|
|
|
SECTION V MANAGING OUTSOURCING |
|
213 | (84) |
|
Managing Outsourcing through Metrics |
|
|
215 | (12) |
|
|
|
|
|
Managing the Risks of Outsourcing Systems Development: Part I |
|
|
227 | (8) |
|
|
|
|
|
|
|
|
|
Managing the Risks of Outsourcing Systems Development: Part II |
|
|
235 | (10) |
|
|
|
|
|
|
|
|
|
Managing the Risks of Outsourcing Systems Development: Part III |
|
|
245 | (22) |
|
|
|
|
|
|
|
|
|
Audit and Control of Information Systems Outsourcing |
|
|
267 | (12) |
|
|
|
|
|
Audit Guidelines for IT Outsourcing |
|
|
279 | (8) |
|
|
|
|
|
|
|
|
|
An Audit of IT Outsourcing: A Case Study |
|
|
287 | (10) |
|
|
|
|
|
|
|
|
SECTION VI LONG-TERM STRATEGIES FOR BECOMING AN OUTSOURCING CHAMPION |
|
297 | (22) |
|
Outsourcing and Long-Term Strategy |
|
|
299 | (8) |
|
|
|
|
|
The Effects of Outsourcing on Information Security |
|
|
307 | (12) |
|
|
|
|
Index |
|
319 | |