Outsourcing Course Work

Published: 2021-06-22 00:44:41
essay essay

Category: Business, Management, Criminal Justice, Law, Company, Ethics, Strategy

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
Introduction
Outsourcing is a situation where a company contracts another company to do a specific ob for them. A good example would be a shoe manufacturing company contracting a transporting company to transport and distribute their products for them (Reed 2005). Outsourcing is an activity that has been going on for some time and it is yet to end. Outsourcing takes a number of forms, the two common ones being: the Information Technology outsourcing and the Business Process outsourcing. Generally, outsourcing entails a process of four stages, namely; a) strategic thinking, b) evaluation and selection, c) contract development, and, d) outsourcing governance. Outsourcing has its own advantages and disadvantages, and it involves a number of risks. This paper will analyze the issues and problems related to outsourcing (Reed 2005).
Literature Review
1. Topic and its articles
As per the two articles: Legal pitfalls in outsourcing and the hidden risk in outsourcing oversees, outsourcing generally becomes a problem and an issue (Reed 2005). Outsourcing becomes an issue because many people are in support of it, despite the obvious criticism points. Again, outsourcing becomes a problem since most of the risks involved have not been sorted out, rather, ways to prevent the possible risks from occurring have not been found yet (Reed 2005). Legal pitfalls in outsourcing include high costs, and lots of time wastage during the negotiation process (Jennifer 2010). A lot of time is wasted when negotiating an outsourcing deal by focusing more on issues that are not in any way relevant to the participating parties. Problems may arise in the future if good time is not taken to discuss on how to handle possible risks or problems that may come up along the line. Another problem is bringing in the needed parties excessively late. All stakeholders in the project should be involved right from the beginning, and be involved in every stage of the process. The hidden risks include data theft, especially where information Technology is highly relied on to run the whole transaction.
2. Problems and issues
The above problems and issues were not expressed effectively, but for the problem of time wastage (Reed 2005), (Jennifer 2010). Time wastage can be solved by: A) getting together all the stakeholders right from the beginning. B) Have a session where a number of facts affecting the outsourcing project will be reviewed. This should be done at the very beginning of the project. C) Have a strategic plan well put out on paper. D) Do the negotiations with a win-win approach. E) Appreciate the fact that outsourcing is all about taking risks. F) Recognize the standards of the stakeholders to ensure that the working relationship is good enough for the success of the deal. G) Research on a number of options to have a variety from which to choose from. It is always advisable to have alternatives. As for the problem of data theft, not much has been suggested and brought forward on how to ensure safety of data.
3. Credibility of sources
One way to determine the credibility of the sources of information for the articles would be to check the qualifications of the authors. Do they have the skill and expertise needed to be able to comment on the article? Another way is to check on how the content in the article is brought out and is arranged.
4. Steps in refining the solutions
The two most effective steps to refining the solutions to the problems and resolutions to the issues posed by the chosen topic would be (Reed 2005), (Jennifer 2010):
i. Having a backup plan-This means that having another strategy to fall on incase the main one fails. This prevents and reduces chances of time wastage in the event that something goes wrong along the way. The backup plan should cover the whole project, from its beginning to the conclusion.
ii. Have a risk management plan in place –This could be an insurance that would absorb whatever loss could be incurred. Having a risk management plan is best since losses and risks are inevitable.
5. Strategies to foster criticism
The three strategies that could help foster criticism when evaluating both arguments for the chosen topic are (Reed 2005), (Jennifer 2010):
i. Analyzing the arguments- This means putting out all information that there is concerning the topic. The information should cover both the positive and negative aspects.
ii. Weighing the arguments- This is going through the arguments thoroughly. Compare the content and analyze it well.
iii. After analyzing and weighting the arguments at hand, point out whatever disadvantages. Use these as the basis for criticism for the arguments.
6. Approaches in refining solutions
When refining solutions to the problem, the three most appropriate approaches are (Reed 2005), (Jennifer 2010):
i. Linguistic analysis- This is where one studies the language used. This depends on the belief that the language can create part of the problem or actually the whole problem.
ii. Scientific method-This involves devising other ways that have been tried and tested before by others. The ways are proven to yield reliable evidence.
iii. Intruition- This is when one asks themselves a question and takes time to deeply think about it. Usually an answer will arise by itself.
7. Errors affecting truth and validity
When affecting truth and validity in the arguments for chosen topic, it is most probable that errors will occur. In this particular topic, the most possible errors are (Jennifer 2010):
i. Not being able to distinguish between issues and errors. This would lead to wrong arguments.
ii. It becomes an error if the said issues and problems are not addressed properly. Not addressing the issues and problems well would mean that they keep recurring and no developments would be made.
iii. Using information from authors that are not well credited to deal with the particular issue at hand.
8. Steps to follow when evaluating the topic
Steps followed when evaluating both articles for the chosen topic are:
i. Finding out who the author of the article is, their qualifications and their credentials.
ii. Checking how the current information in the article is.
iii. Trying to make out the possible or intended audience for the information is.
iv. Checking if the information is accurate and what its purpose is.
9. Techniques of presenting ideas
Techniques that would best be used to present ideas on this topic and to persuade others effectively are:
i. Establishing the meaning of all terms and explaining all features in the articles. Many demonstrations are called for here.
ii. The other technique depends more on outcomes. This would call for one to explain the consequences, effects, and even projections for what is expected.
10. Approaches to applying the techniques
To apply the above techniques to effective writing and speaking skills, certain approaches would have to be used. In this case, the most appropriate approaches are the Quasi-logical arguments and the dissociation of concepts.
Conclusion
As far as large-scale business is concerned, outsourcing is one of the inevitable activities. This is because outsourcing is a form of duty-delegation, which is one way that business managers use to enhance effectiveness. However, special care and attention to ensure all loopholes are well covered and tackled with. Nothing should be left to chance.
Works cited
Reed Taussig. “Perspective.” The hidden risk in outsourcing oversees. 24 Aug. 2005. 13 May
2011.
Jennifer C. Wolfe. “Legal Pitfalls in IT Outsourcing.” How to minimize Transactional Costs.28
Jan. 2010. 13 May 2011.

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read