Presentation is loading. Please wait.

Presentation is loading. Please wait.

Nicole Say Kaitlyn Jones Justin Berry Section 1, Group 3.

Similar presentations

Presentation on theme: "Nicole Say Kaitlyn Jones Justin Berry Section 1, Group 3."— Presentation transcript:

1 Nicole Say Kaitlyn Jones Justin Berry Section 1, Group 3

2  As defined by the Information Technology Association of America, IT is… “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware”

3  A practice used by companies to reduce costs by transferring portions of work to outside suppliers rather than completing it internally.  Outsourcing in IT drastically increased around the time of Y2K because so many companies hired IT workers in foreign countries to de-bug their computer systems

4  1) Offshore outsourcing is costing U.S. jobs.  2) There's a stigma to offshore outsourcing.  3) The cost benefits of outsourcing are overstated.  4) It's a buyer's market for IT workers right now anyway.

5  5) There are huge cultural barriers.  6) What about the other risks of outsourcing (ie Expense of initial migration, fear of losing control, intellectual property issues)?  7) The ROI of outsourcing hasn't been proved.

6  We felt that the average person does not truly understand what IT is about yet they may have some preconceived notions and know some buzzwords that the news media have focused on  Reputable Author

7  Author of “Seven Myths about IT Outsourcing”  Serves as the CEO for Envision Financial Systems located in Tustin, CA  Founded by Mr. Gambhir in 1994, Envision Financial Systems has rose to become a leading provider of software systems for the financial industry  Envision was listed in 2005 and 2006 on the Software 500, a list comprised of the world’s most foremost software and service providers

8 ABC News "India Rising"

9  All 3 of our other articles dealt with the security risks a company takes when outsourcing their IT.  We choose articles from a variety of sources in order to limit the amount of bias our information may be subjected to.

10  Ivy Schmerken – Editor at large for Wall Street and Technology, a monthly publication that reaches over 21,000 businesses and IT executives.  Ariel Coro – A certified security engineer and President of The Aptive Group, a leading information security and compliance firm.  Chandradeo Bokhoree – Senior lecturer at the University of Technology, Mauritius.

11  1) Personal, private data being sold or seen by unapproved personnel.  2) Hidden code written deep within a software program that opens a back door to a hacker or allows the program to do something it was never intended to do.  3) Other countries may not have the same privacy protection laws as the U.S. so if a security breach were to happen, a company may not be able to prosecute or sue for damages.

12  1) Get Your House in Order  2) Choose Vendors Carefully  3) Principle of Least Usage  4) Understand the Privacy and Intellectual Property Mindset  5) Use Protection

13  6) Monitor Traffic  7) Provide Education  8) Conduct Security Audits  9) Review Prevention Technologies

14 CBS News Video – Military Software Security

15  While none of you may be MIS majors and have a direct future in IT, outsourcing of IT impacts many areas of a business outside of just the IT Department  Financial managers have to decide whether the reward of outsourcing outweighs the potential risks and if a company does decide to outsource, it is essential for you to know the proper steps to protect your company and your career

Download ppt "Nicole Say Kaitlyn Jones Justin Berry Section 1, Group 3."

Similar presentations

Ads by Google