{"title":"Hitting the IT-Implementation Trifecta","authors":"Robert Zafft","doi":"10.2139/ssrn.2243314","DOIUrl":null,"url":null,"abstract":"BPO and enterprise-software vendors need to manage enormous IT-implementation risks arising from their outsourcing contracts. They want to hit the IT-implementation trifecta: (i) finish on time; (ii) deliver under budget; and (iii) contribute spare cash to troubled IG projects. This payoff looks as good as the ones at the racetrack. But, how can the vendor stack the odds in its favor?The answer lies in applying proven risk-management and portfolio-underwriting techniques from other fields.Note -- This article arises from the entirely private research activities of the author and does not reflect the views of author's employers, past or present, nor any other organizations with which the author is or has been affiliated.","PeriodicalId":186074,"journal":{"name":"IRPN: Product Development Strategy & Organization (Topic)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IRPN: Product Development Strategy & Organization (Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.2243314","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
BPO and enterprise-software vendors need to manage enormous IT-implementation risks arising from their outsourcing contracts. They want to hit the IT-implementation trifecta: (i) finish on time; (ii) deliver under budget; and (iii) contribute spare cash to troubled IG projects. This payoff looks as good as the ones at the racetrack. But, how can the vendor stack the odds in its favor?The answer lies in applying proven risk-management and portfolio-underwriting techniques from other fields.Note -- This article arises from the entirely private research activities of the author and does not reflect the views of author's employers, past or present, nor any other organizations with which the author is or has been affiliated.