The simulation results demonstrate that this paper can provide the scientific quantitative proposal for the decision maker who needs to control the schedule risk of IT outsourcing project. (2017) A Two-Level Principal-Agent Model for Schedule Risk Control of IT Outsourcing Project Based on Genetic Algorithm. (eds) Proceedings of the 23rd International Conference on Industrial Engineering and Engineering Management 2016.
Outsourcing information technology (IT) operations has been recognized to have important potential benefits, including cost reduction, improved quality of service, and access to technological expertise.
This study was supported in part by Quebec's FCAR (Fonds concerté d'aide à la recherche).
In August 2008, SI was acquired by Serco Inc., which describes itself as a a leading provider of professional, technology, and management services focused on the federal government.
Information security means protecting information (data) and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Security management is a process of defining the security controls in order to protect the information assets.
Insights from transaction costs theory suggest that there exist three major sources of risk factors for IT outsourcing: the transaction, the client and the supplier.
From these insights, preliminary measures of IT outsourcing risk factors were developed and data from a survey of 132 IT executives were analyzed with partial least squares to assess their reliability and validity.