Some information technology (IT) security requirements are almost considered commodities. Their support is handled in standard ways. Virus updating and e-mail support are examples, and the support for these services is often a candidate for outsourced work. In addition to justifying outsourced work, the type of outsourcing, (e.g., on-site or off-shore) must be studied.
Identify 3 types of outsourcing that are often used within IT.
For each, provide an example of IT work with rationalization of trade-offs by listing pros and cons.
Please use by the following format for your answers:
State a general summary of the proposed use of outsourcing in IT for the project.
Compare and contrast role differences in the IT organization between an in-house strategy and an outsourced strategy for IT services.
Some roles, such as development and support service needs, may become unncessary, but new roles may arise with needs to plan, manage, and monitor outsourced work.
Identify role changes with regard to impacts from outsourcing.
Predict the business impact from each change.
PLACE THIS ORDER OR A SIMILAR ORDER WITH NURSING HOMEWORK HELP TODAY AND GET AN AMAZING DISCOUNT
The post Identify 3 types of outsourcing that are often used within IT.Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas: appeared first on Nursing Homework Help.