Outsourcing Business Processes
By: Andrew • Research Paper • 2,043 Words • March 29, 2010 • 1,000 Views
Outsourcing Business Processes
Outsourcing Business Processes
Summary
This paper captures the most prominent services and issues associated with today's outsourcing environment. Outsourcing is the modern business term for having other companies accomplish basic business processes rather than doing them inhouse. While outsourcing has always been an important business option, modern technical capabilities are fast making outsourcing a critical requirement in competitive, cost conscious industries. However, our recent experience with terrorist challenges indicates that a second look is needed to ensure that outsourcing risks are still acceptable.
This paper (1) benchmarks classical (but modern) outsourcing methods to provide a starting point, (2) notes what information system services are being outsourced, (3) provides examples of how those services were being promoted and leveraged, with some comments on terrorist related risks, and (4) indicates how the experts suggest that outsourcing, if it is reliable and secure, should be addressed in contracts (incentives). An awareness of these basic aspects of outsourcing is important to the business analyst or consultant.
Benchmarking Modern Outsourcing
Charles L. Gay and James Essinger (2000) provide not only a generic (non-high-tech) framework within which to view modern, high-tech outsourcing, they also provide this framework from the British perspective, often using United States companies as examples. They list numerous benefits and hazards of outsourcing, only indirectly considering terrorist acts, and they explore the different business relationships that apply in the world of outsourcing. Based on their perspectives, we can conclude that outsourcing is a well developed but also complex topic, one that is often over simplified and, thus, is often improperly implemented.
Nevertheless, with the British framework in mind, one should view the numerous and quickly evolving high-tech extrapolations of outsourcing as less intimidating and, also, less risky from a business perspective, at least as view from their pre-September thinking. With a few rather obvious guidelines in place, a business consultant (certainly an information technology business consultant) should be able to recommend to a client what aspects of the client's business can and should be outsourced. The consultant can also be very helpful in selecting an appropriate source of those services as well as make suggestions as to how to approach outsourcing contractually. This requires some preparation and awareness, but it only involves alerting the client to possibilities as part of an analysis of business functions, some of which may now be considered from a new security perspective.
Outsourcing Today
Exploring the Internet for outsourcing information consistently leads to the obvious. For example, outsourcing has become a major element of the high-tech startup environment over the past couple of years. There have been (and are) many new high-tech companies trying to convince low-tech companies of the advantages of e-business. Indeed, many high-tech outsourcing marketers touted services to their high-tech peers, proclaiming the advantages of focusing on their high-tech core-business while outsourcing everything else. Of course, much of this was easier to sell prior to September, before security and reliability became a central concern throughout the industry.
High-tech to high-tech marketing results from the emergence of high-tech access to cheap labor (e.g., programming, data entry, and accounting) from other countries, more immediate access to state-of-the art software (discussed below), and access to expert problem solvers for future non-core business issues that make outsourcing attractive from a risk-sharing perspective. Unfortunately, some of these overseas labor cost savings advantages are decreasingly attractive due to other problems, including the emergent security issues but also including recent realizations of new problems.
The new set of problems include the downstream operating and maintenance regimes, regimes that require an increased communication level, perhaps to make up for past poor communications. For, example, based on personal experience at IBM with support from India, there is increased frustration due to poor issue response, poor access to programming details, and the difficulty of communicating operational problems that need early correction.
Value vs. Risk
Nevertheless, technology managers and outsourcing consultants still need to consider several other outsourcing risk factors, such as the potential for legal complexities, for reduced flexibility, and for crises such as unforgiving business database disasters. Recent terrorist activities argue