Professional Documents
Culture Documents
Prepared by
: Ali Al Habib
ID
: 11621366
Date
: 08/09/2014
Table of Contents
Abstract
............................................................................................ 3
1.0 Introduction
.................................................................................. 4
......................................... 8
7.0 Conclusion
References
............................................... 12
................................................................................ 16
....................................................................................... 17
Page
|
2
Abstract
IT outsourcing activities considered one of the critical items for large scale corporative.
Where many organization shifting for outsourcing the IT services or partial functions.
However, this decision required to be studied with respect of risk. The risk analysis
consider an important and essential for organization decision making for many critical
activities. Qualitative and quantitative are classified as traditional methods that used for
risk analysis. However, a structure and hierarchy method for the assessment the risk used
guiding to proper decision making approach which is fuzzy logic. This paper
demonstrated the fuzzy logic methodology for analyzing the risk for IT outsourcing. A
case study is exemplified for applying this technique. Finally, further remarks and future
work for this approach are proposed.
Page
|
3
1.0 Introduction
IT outsourcing is one of the important and powerful trend in IT business world.
It has a serious impact for corporative performance and growth. It will support the
companies that wish to proceed in IT outsourcing to focus on their strategic
business and cutoff the cost. Outsourcing typically involves entering into an
official agreement with a third party (vendors/companies) to provide and deliver
specific services, usually for a certain and agreed fees. But this decision which is
Outsourcing the IT completely or partially not always applicable. Even with past
outsourcing experience, managing the outsourcing arrangement is critical and
required an extensive study for risk analysis.
The traditional risk analysis approaches are quantitative and qualitative
analysis methodology. Whereas, the quantitative and qualitative analysis have
some advantages and commonly used. However a hierarchy and structured
method is used for evaluation the risk which is the Fuzzy Logic and leading to
support decision making. This literature review will briefly list some of common of
risks that affect the IT outsourcing. Then will introduce the fuzzy logic method.
Further, explanation for using the Fuzzy logic approach for solving and managing
the risk analysis for IT outsourcing with a demonstrating a case study. A
conclusion provided with recommendation and future work addressed at end.
2.0 Risks of IT Outsourcing
IT outsourcing considered one of the important topics nowadays. This activity
effects in direct way the companies, services, customers and individuals. This is a critical
decision especially for large scale corporate to determine either to proceed for
outsourcing the IT services to keep focus on their core business. The outsourcing. The
main objective of outsourcing in addition to keep eyes and provide a desired quality on
the main business is cost cutting. But in some case the IT outsourcing is not a right
decision for outsourcing the critical IT services that are in-cooperated with central
business activities. The outsourcing decision discussed on IT services that are considered
eligible for outsourcing. A bench marking required to be conducted to evaluate the need
of the outsourcing. In addition to that the risk analysis required to be studied.
Page
|
4
There are many risks raised due this decision. The risks are summarized in eleven
(11) points.
1. Possibilities of Weak Management
In some cases the IT services performance and delivery are weak and is not satisfied
the corporate operation due to poor IT management. If the corporate decide to Outsource
due this reason, the company executives should know that the they still need a
professional IT manger has the capability for managing the contracts with outsourced
vendors and track, monitor and maintain the relationship with the third-party. The
company has to consider this risk either to higher qualified IT manger or internally rectify
the performance issue for replacing the position or turn around internally.
2. Inexperience staff
Another risk is once a newly established contracts with a vendor the weak
performance staff would like to transfer to this outsourced company and this will not
improve the performance of outsourced IT services or meet the objective of the
outsourcing. The situation will be worst, in case the selected outsourced vendor one
of the highly ranked companies and specialist staff decided that to move this
company. This will be a big loss for experience resources and original company most
of time eager to keep such resources.
3. Business uncertainty
If the outsources decision based on cost cutting and focusing on the main business
and not evaluating other elements such as the potential growth for the corporate and
future roadmap. Such as a CEO decide to retain the IT services based on growth and
expansion of company activity. This classified as uncertainty with dealing with
business.
5. Endemic Uncertainty
Some case there is no define scope or service needed by the employee due to
updated in technology or changing user requirement due unseen requirement in the
project. A fixed contract with outsourcing entities will not be sufficient in the matter.
The companies should have clauses for reviewing their contracts and have them able
to inject their requirement once they objected to change.
6. Hidden Costs
The cost saving and targeting this element is vital for success the Outsourcing. By
comparing the cost of the outsource vendor to company IT budget and operation a
one view of the cost will be expose. But they cannot see hidden cost due to
discontinue for a technology or not considering the turnover phase including the
relocation and redeployment costs. Moreover, not considering the management cost
for this activity.
7. Lack Of Organizational Learning
Some companies executives do not have the full view of IT capabilities and their
role in running their service along the corporate. May they need to experience the
importance role for some service that needed to support especially for the strategic
ones. In some cases strategic assets and facilities are hard to be outsourced
8. Loss of Innovation Capacity
In some areas related to the companies required them to have an Innovative ideas
to be implemented and development for some application to meet their trend and
move forward. The outsourced IT partner may has a limitation on this. The
outsourcing is not a smart option in this situation.
Page
|
6
desired decision support problem. Fuzzy model can in-house the uncertainty of
real-world human language and logic. Fuzzy logic addresses and resembles human
decision making with an ability to generate precise solutions from certain or approximate
information.
The fuzzy logic will allow a great in dealing with qualitative data, as well as
object attribute. Also, it offers an attractive trade-off between accuracy and compactness
express relationships in terms of simple rules. Additionally, not computationally
expensive, it is cheaper because they are easier to design and require a few rules to cover
large scale of complexity.
Fuzzy logic and probabilistic logic are mathematically similar both have truth
values ranging between 0 and 1 but conceptually distinct, due to different
interpretations. Fuzzy logic corresponds to "degrees of truth", while probabilistic logic
corresponds to "probability, likelihood"; as these differ, fuzzy logic and probabilistic
logic yield different models of the same real-world situations.
For example, both kinds of truth and probabilities range between [0, 1] and may
seems likely at first look. If we let a 50 ml glass contain 5 ml of water cup. We may take
in our consideration the two concepts: Empty and Full status. The meaning of each of
these status could be represented by Fuzzy Set. One probably define the cup as being 0.5
empty and 0.05 fully. The design might equally be a set of membership function where
the cup would be considered full for all values below to 25 ml.
4. Fuzzy Logic Approach for ITO Risk Analysis
There are many studies discussed the IT Outsourcing risks and provide their
results in published papers. They study various sources of risks and risk mitigate
guideline and advice but they dont try to quantify the degree of risk that could be extent
and considered. The risk factors measured by Quantitative and quantitative criteria.
Where the quantitative criteria could be used in this situation as easy technique. While
the qualitative technique
dealing with subjective measures, as many risk signs and factors subjective in nature and
depend on decision-makers linguistic judgment. The need to transform the linguistic
assessment evaluation to logical mathematical base. Fuzzy model proposed here to show
the capability of this model for risk assessment. A Fuzzy number is define as fuzzy subset
in the universe. There are many type of fuzzy numbers such as triangular, bell-shaped and
Page
|
8
trapezoidal used to form a decision making process. For easy the computation and simple
the mathematics the trapezoid is widely used(Samantra, Datta et al. 2014).
Figure.
1.
Trapezoid
fuzzy
number
A~
Page
|
9
Page
|
10
Step 2: The Selection of Fuzzy linguistic classified scale for representing both likelihood
of occurrence and impact of risks, and, also selecting suitable membership functions for
each mentioned variable.
Step 3. Linguistic data (in relation to likelihood of occurrence (L) and impact of risk (I))
for each risk factor have been collected from the experts. Therefore, linguistic data have
been translated into proper fuzzy numbers.
Step 4. Combined preferences (aggregated decision-making opinion) that have been
computed using fuzzy aggregation operators. Fuzzy risk ratings of each influencing factor
have been calculated by multiplying fuzzy likelihood of occurrence and fuzzy risk impact
where R= L X
I.
Step 5. Crisp risk rating corresponding to each risk influencing factor has required to be
calculated using Incentre of centroids method that developed by Thorani applicable for
generalized trapezoidal fuzzy numbers in fuzzy logic theory.
Step 6. Classify and Categorization of risks that has been carried out based on individual
crisp risk ratings.
Step 7. An action requirement plan required to be formulated with reference to different
risk categories.
The above listed steps are designed to be generic (Samantra, Datta et al. 2014).The risk
analysis result may differ from one case to another depend of experts, decision makers
who participated in the evaluation and nature of company policies.
The following section will demonstrate a case study shows the mentioned Fuzzy model.
Page
|
11
Page
|
12
Page
|
13
Table 3. Risk Impact (I) of various risk factors assigned by DMs in linguistic terms.
Then, this linguistic information has been transformed into appropriate trapezoidal fuzzy
numbers referring to the linguistic scale (Table 1).
Risk Rating
The next phase of this process is doing the aggregation task. The aggregation done using
using fuzzy aggregation rules based on that associated decision matrices
Page
|
14
Table 4. Aggregated preferences by seven candidates in terms of fuzzy numbers and their
crisp ratings.
Where the aggregation is the process which the fuzzy sets are combined to form
a single collective preference fuzzy set. Let k is the
number of decision makers (DMt, t = 1, . . . , k), who are responsible
for the assessing m IT outracing risks (Ri, i = 1, ... , m), with corresponding n
Influencing factors (Fi,j, j = 1, . . . , n). The aggregated fuzzy preferences
as per (Chen, 2000).
Then, the following equation is developed for calculation fuzzy risk rating of each
influencing factors
.
It concluded that the highest risk rating after applying above calculation is the strategic
risk has the major critical value and contribution to IT outsourcing process for the
decision making refer to figure.2 shows a summary graph for each percentage risk.
Page
|
15
Figure 2. The percentage of contribution of each individual risks to the overall ITO risk.
As we observe, this methodology fuzzy based multi-criteria decision making
approach was a successful evaluation used in analysis the risk for IT outsourcing where
resulted that the risk factor with highest degree of risk required to be monitored carefully
to get the IT outsourcing project success without major impacts. Moreover, this
methodology was pass through a validation process by selecting another 15 IT executive
leaders with more than 10 year experience in IT outsourcing for reviewing the process
with respect the applicability of the method, benefits of operation, completeness of risk
factors and importance of strategic planning for IT outsourcing. The result was highly
recommend this methodology.
7.0 Conclusion
Fuzzy logic process for IT outsourcing is an empirical and a reliable method. It is
more practical and more reliable than the traditional and statics approach. It is considered
close to a realistic outcomes as the experts in IT outsourcing and senior executives in this
fields are participating in this study analysis while the others rely on objects inputs. The
risk impact and likelihood of occurrence their weight scores by the experts. In addition to
that, the approach exemplify a modeling for risk influence in hierarchal structured way.
The case studied that applied for IT leader company was illustrated the success
experience in this field. In my opinion, this fuzzy approach could be extended to other
outsourcing activity in the industrial and business sectors. Definitely, this technique will
support the management provision the outsourcing in clear manner and categorize the
risks with their degree. Future work is proposed to have this model developed in
customized application with logged all risks and their impacts associated with risk
Page
|
16
influence and have a special entry for risk analysis for different Outsourcing for industrial
and business sectors.
Page
|
17
References:
Chen, S.-j. & Chen, S.-m. 2007, 'Fuzzy risk analysis based on the ranking of generalized
trapezoidal fuzzy numbers', Applied Intelligence, vol. 26, no. 1, pp. 1-11.
Earl, M.J. 1996, 'The Risks of Outsourcing IT', Sloan Management Review, vol. 37, no. 3,
p. 26.
Foundation of Fuzzy Logic, Viewed on 02/09/2014,
<http://www.mathworks.com.au/help/fuzzy/foundations-of-fuzzy-logic.html>
Fuzzy Control SystemWikipedia, Viewed on 02/09/2014,
<http://en.wikipedia.org/wiki/Fuzzy_control_system>
Harris, J. 2000, An introduction to fuzzy logic applications, Kluwer Academic, Dordrecht
; London.
Mathew, S.K. 2006, 'Understanding Risk in IT Outsourcing: A Fuzzy Framework',
Journal of Information Technology Case and Application Research, vol. 8, no. 3, pp.
27-39.
Nazari-Shirkouhi, S., Ansarinejad, A., Miri-Nargesi, S.S., Dalfard, V.M. & Rezaie, K.
2011, 'Information Systems Outsourcing Decisions under Fuzzy Group Decision Making
Approach', International Journal of Information Technology & Decision Making, vol. 10,
no. 06, pp. 989-1022
Samantra, C., et al. (2014). "Risk assessment in IT outsourcing using fuzzy
decision-making approach: An Indian perspective." Expert Systems with Applications
41(8): 4010-4022.
Shankar, N.R., Abdullah, M.L., P Thorani, Y.L. & Bushan Rao, P.P. 2012, 'Fuzzy Risk
Analysis based on a new approach of Ranking Fuzzy Numbers using Orthocenter of
Centroids', International Journal of Computer Applications, vol. 42, no. 3.
Page | 18