Quantitative Aspects of Outsourcing Deals

合集下载

《自然辩证法》恩格斯英文原版

《自然辩证法》恩格斯英文原版

《自然辩证法》恩格斯英文原版Nature Dialectics:Engels'Original English VersionNature dialectics,as proposed by Friedrich Engels,is an essential concept in understanding the world and its development.This philosophical framework analyzes the connection between nature and society,highlighting the interdependence and interaction of various elements.At its core,nature dialectics recognizes that everything in the natural world is in a constant state of change.Engels emphasized that contradiction is inherent in nature,and it is through the resolution of these contradictions that progress and development occur.Engels'work on nature dialectics provides a profound insight into the understanding of the interconnectedness of all things.He argues that nature operates based on a dialectical method,where changes happen through the unity and conflict of opposing forces.One key aspect of Engels'theory is the transformation of quantity into quality.He explains that when a quantitative change accumulates to a certain point,it triggers a qualitative leap,resulting in a fundamental shift in the nature of the object or system.This concept can be observed in various aspects of nature,such as the transition from a liquid to a solid state when temperature decreases.Another important aspect of nature dialectics is the concept of negation of negation.Engels posits that the development of nature is not linear but rather a spiral-like process.Through a series of contradictions and resolutions, the new stage of development not only preserves theachievements of the past but also negates certain aspects, leading to a higher level of complexity.Engels also highlights the role of human beings in nature dialectics.He argues that humans are not separate from nature but are an integral part of it.Human society is shaped by natural laws and influenced by the contradictions and interactions within nature.Understanding this relationship is crucial in achieving sustainable development and harmonious coexistence with the natural world.In conclusion,Engels'work on nature dialectics provides a comprehensive framework for understanding the interconnections and development of the natural world.This philosophical perspective emphasizes the inherent contradictions within nature and the importance of resolving these contradictions for progress.By recognizing humans as part of nature,we can strive for a harmonious balance between society and the environment.Engels'ideas continue to have a profound impact on our understanding of the world and guide us towards a more sustainable future.。

供应链风险管理【外文翻译】

供应链风险管理【外文翻译】

毕业论文外文翻译原文Supply Chain Risk ManagementD.L. Olson and D. WuG lobal competition, technological change, and continual search for competitive advantage have motivated risk management in supply chains.1 Supply chains are often complex systems of networks, reaching hundreds or thousands of participants from around the globe in some cases (Wal-Mart or Dell). The term has been used both at the strategic level (coordination and collaboration) and tactical level (managementof logistics across functions and between businesses).2 In this sense, risk management can focus on identification of better ways and means of accomplishing organizational objectives rather than simply preservation of assets or risk avoidance.Supply chain risk management is interested in coordination and collaborationof processes and activities across functions within a network of organizations. Tang provided a framework of risk management perspectives in supply chains.3 Supply chains enable manufacturing outsourcing to take advantages of global relative advantages, as well as increase product variety. There are many risks inherent in this more open, dynamic system.Supply Chain Risk Management ProcessOne view of a supply chain risk management process includes steps for risk identification,risk assessment, risk avoidance, and risk mitigation.4 These structures for handling risk are compatible with Tang’s list given above, but focus on the broader aspects of the process.Risk IdentificationRisks in supply chains can include operational risks and disruptions. Operational risks involve inherent uncertainties for supply chain elements such as customer demand, supply, and cost. Disruption risks come from disasters (natural in the form of floods, hurricanes, etc.; man-made in the form of terrorist attacks or wars) and from economic crises (currency reevaluations, strikes, shifting market prices). Most quantitative analyses and methods are focused on operational risks. Disruptions are more dramatic, less predictable, and thus are much more difficult to model. Risk management planning and response for disruption are usually qualitative.Risk AssessmentTheoretically, risk has been viewed as applying to those cases where odds are known, and uncertainty to those cases where odds are not known. Risk is a preferable basis for decision making, but life often presents decision makers with cases of uncertainty. The issue is further complicated in that perfectly rational decisionmakers may have radically different approaches to risk. Qualitative risk management depends a great deal on managerial attitude towards risk. Different rational individuals are likely to have different response to risk avoidance, which usually is inversely related to return, thus leading to a tradeoff decision. Research into cognitive psychology has found that managers are often insensitive to probability estimates of possible outcomes, and tend to ignore possible events that they consider to be unlikely.5 Furthermore, managers tend to pay little attention to uncertainty involved with positive outcomes.6 They tend to focus on critical performance targets, which makes their response to risk contingent upon context.7 Some approaches to theoretical decision making prefer objective treatment of risk through quantitative scientific measures following normative ideas of how humans should make decisions. Business involves an untheoretical construct, however, with high levels of uncertainty (data not available) and consideration of multiple (often conflicting) factors, making qualitative approaches based upon perceived managerial risk more appropriate.Because accurate measures of factors such as probability are often lacking, robust strategies (more likely to enable effective response under a wide range of circumstances) are often attractive to risk managers. Strategies are efficient if they enable a firm to deal with operational risks efficiently regardless of major disruptions.Strategies are resilient if they enable a firm to keep operating despite major disruptions. Supply chain risk can arise from many sources, including the following:8● Political events● Product availability● Distance from source● Industry capacity● Demand fluctuation● Changes in technology● Changes in labor markets● Financial instability● Management turnoverRisk AvoidanceThe oldest form of risk avoidance is probably insurance, purchasing some level of financial security from an underwriter. This focuses on the financial aspects of risk, and is reactive, providing some recovery after a negative experience. Insurance is not the only form of risk management used in supply chains. Delta Airlines insurance premiums for terrorism increased from $2 million in 2001 to $152 million in 2002.9 Insurance focuses on financial risks. Other major risks include loss of customers due to supply change disruption.Supply chain risks can be buffered by a variety of methods. Purchasing is usually assigned the responsibility of controlling costs and assuring continuity of supply. Buffers in the form of inventories exist to provide some risk reduction, at a cost of higher inventory holding cost. Giunipero and Al Eltantawy compared traditionalpractices with newer risk management approaches.10 The traditional practice, relying upon extra inventory, multiple suppliers, expediting, and frequent supplier changes suffered from high transaction costs, long purchase fulfillment cycle times, and expensive rush orders. Risk management approaches, drawing upon practices such as supply chain alliances, e-procurement, just-in-time delivery, increased coordination and other techniques, provides more visibility in supply chain operations.There may be higher prices incurred for goods, and increased security issues, but methods have been developed to provide sound electronic business security. Risk MitigationTang provided four basic risk mitigation approaches for supply chains.11 These focus on the sources of risk: management of uncertainty with respect to supply, to demand, to product management, and information management. Furthermore, there are both strategic and tactical aspects involved. Strategically, network design can enable better control of supply risks. Strategies such as product pricing and rollovers can control demand to a degree. Greater product variety can strategically protect against product risks. And systems providing greater information visibility across supply chain members can enable better coping with risks. Tactical decisions include supplier selection and order allocation (including contractual arrangements); demand control over time, markets, and products; product promotion; and information sharing, vendor managed inventory systems, and collaborative planning, forecasting, and replenishment.Supply ManagementA variety of supplier relationships are possible, varying the degree of linkage between vendor and core organizations. Different types of contracts and information exchange are possible, and different schemes for pricing and coordinating schedules. Supplier Selection ProcessSupplier (vendor) evaluation is a very important operational decision. There are decisions selecting which suppliers to employ, as well as decisions with respect toquantities to order from each supplier. With the increase in outsourcing and the opportunities provided by electronic business to tap world-wide markets, these decisions are becoming ever more complex. The presence of multiple criteria in these decisions has long been recognized.12 A probabilistic model for this decision has been published to include the following criteria:131. Quality personnel2. Quality procedure3. Concern for quality4. Company history5. Price relative to quality6. Actual price7. Financial ability8. Technical performance9. Delivery history10. Technical assistance11. Production capability12. Manufacturing equipmentSome of these criteria overlap, and other criteria may exist for specific supply chain decision makers. But clearly there are many important aspects to selecting suppliers.Supplier Order AllocationOperational risks in supply chain order allocation include uncertainties in demands, supply yields, lead times, and costs. Thus not only do specific suppliers need to be selected, the quantities purchased from them needs to be determined on a recurring basis.Supply chains provide many valuable benefits to their members, but also create problems of coordination that manifest themselves in the “bullwhip” effect.14 Information system coordination can reduce some of the negative manifestations of the bullwhip effect, but there still remains the issue of profit sharing. Decisions that are optimal for one supply chain member often have negative impacts of the total profitability of the entire supply chain.15Demand ManagementDemand management approaches include using statistics in models for identification of an optimal portfolio of demand distributions16 and economic models to select strategies using price as a response mechanism to change demand.17 Other strategies include shifting demand over time, across markets, or across products. Demand management of course is one of the aims of advertising and other promotional activities. However,it has long been noted as one of the most difficult things to predict over time.Product ManagementAn effective strategy to manage product risk is variety, which can be used to increase market share to serve distinct segments of a market. The basic idea is to diversify products to meet the specific needs of each market segment. However, while this would be expected to increase revenues and market share, it will lead to increase manufacturing costs and inventory costs. Various ways to deal with the potential inefficiencies in product variety include Dell’s make-to-order strategy. Supply Chain DisruptionTang classified supply chain vulnerabilities as those due to uncertain economic cycles, customer demand, and disasters. Land Rover reduced their workforce by over one thousand when a key supplier went insolvent. Dole was affected by Hurricane Mitch hitting their banana plantations in Central America in 1998. September 11, 2001 suspended air traffic, leading Ford Motor Company to close five plants for several days.18 Many things can disrupt supply chains. Supply chain disruptions have been found to negatively impact stock returns for firms suffering them.19Supply Chain RisksRecent research into supply chain risk covers many topics.New Technology RiskGolda and Phillipi20 considered technical and business risk components of the supply chain. Technical risks relate to science and engineering, and deal with the uncertainties of research output. Business risks relate to markets, human responses to products and/or related services. At Intel, three risk mitigation strategies were considered to deal with the risks associated with new technologies:1. Partnerships, with associated decisions involving who to partner with, and at what stage of product development2. Pursue extendable solutions, evolutionary products that will continue to offer value as new technical breakthroughs are gained3. Evaluate multiple options to enable commercializationPartner Selection RiskPartner (to include vendor) evaluation is a very important operational decision. Important decisions include which vendors to employ and quantities to order from each vendor. With the increase in outsourcing and the opportunities provided by electronic business to tap world-wide markets, these decisions are becoming ever more complex. The presence of multiple criteria in these decisions has long been recognized.21Outsourcing RisksOther risks are related to partner selection, focusing specifically on the additional risks associated with international trade. Risks in outsourcing can include:22● Cost – unforeseen vendor selection, transition, or management●Lead time –delay in production start-up, manufacturing process, or transportation● Quality – minor or major finishing defects, component fitting, or structural Defects Outsourcing has become endemic in the United States, especially information technology to India and production to China.23 Risk factors include:● Ability to retain control● Potential for degradation of critical capability● Risk of dependency● Pooling risk (proprietarial information, clients competing among themselves) ● Risk of hidden costsEcological RisksIn our ever-more complex world, it no longer is sufficient for each organization to make decisions in light of their own vested self-interest. There is growing concern with the impact of human decisions on the state of the earth. This is especially true in mass production environments such as power generation,24 but also is important in all aspects of business. Cruz (2008) presented a dynamic framework for modeling and analysis of supply chain networks in light of corporate social responsibility.25 That study presented a framework multiple objective programming model with the criteria of maximizing profit, minimizing waste, and minimizing risk. Multiple Criteria Selection ModelA number of methodologies are applied in practice, to include simple screening and scoring methods,26 supplier positioning matrices to lay out risks by vendor, withassociated ratings,27 and a combination of sorts combining risk categorization with ratings of opportunity, probability, and severity.28 Traditional multiple criteria methods have also been applied, to include analytic hierarchy process.29 The simple multiattribute rating theory (SMART)30 model bases selection on the rank order of the product of criteria weights and alternative scores over these criteria, and will be used here. Note that we are demonstrating, and are not claiming that the orders and ratings used are universal. We are rather presenting a method that real decision makers could use with their own ratings (and even with other criteria that they might think important in a given application).OptionsThere are various levels of outsourcing that can be adopted. These range from simply outsourcing particular tasks (much like the idea of service oriented architecture), co-managing services with partners, hiring partners to manage services, and full outsourcing (in a contractual relationship). We will use these four outsourcing relationships plus the fifth option of doing everything in-house as our options. CriteriaWe will utilize the criteria given below:● Cost (including hidden)● Lead time● Quality● Ability to retain control● Potential loss of critical capability● Risk of dependency● Risk of loss of proprietarial information● Risk of client contentionThe SMART method begins by rank ordering criteria. Here assume the following rank order of importance: 1. Ability to retain control2. Risk proprietarial information loss3. Quality of product and service4. Potential loss of critical capability5. Risk of dependency6. Cost7. Lead time8. Risk of client contentionThe next step is to develop relative weights of importance for criteria. We will do this by assigning the most important criterion 100 points, and give proportional ratings for each of the others as given in Table 5.1:Weights are obtained by dividing each criterion’s assigned point value by the total of points (here 435). This yields weights shown in Table 5.2:Scoring of Alternatives over CriteriaThe next step of the SMART method is to score alternatives. This is an expression by the decision maker (or associated experts) of how well each alternative performs on each criterion. Scores range from 1.0 (ideal performance) to 0 (absolute worst performance imaginable). This approach makes the scores independent of scale, andindependent of weight. Demonstration is given in Table 5.3:Once weights and scores are obtained, value functions for each alternative are simply the sum products of weights times scores for each alternative. The closer to 1.0 (the maximum value function), the better. Table 5.4 shows value scores for the five alternatives:The outcome here is that in-house operations best satisfy the preference function of the decision maker. Obviously, different weights and scores will yielddifferent outcomes. But the method enables decision makers to apply a sound but simple analysis to aid their decision making.译文:供应链风险管理D.L. Olson 和D. Wu全球竞争,技术变化,以及不断寻找具有竞争优势的动机的供应链风险管理。

the quantative and qualitative analysis

the quantative and qualitative analysis

the quantative and qualitative analysis Quantitative analysis and qualitative analysis are twokey methods in many fields of research, including socialscience, economics, marketing, and more. Quantitativeanalysis refers to the use of numerical data and statisticalmethods to analyze phenomena, while qualitative analysisinvolves the use of in-depth interviews, surveys, andobservations to gain a deeper understanding of human behaviorand attitudes.Quantitative analysis is particularly useful forcomparing trends and patterns across large sets of data. Ithelps researchers identify patterns, establish statisticalsignificance, and generate hypotheses that can be testedfurther using additional data. In economics, for example,quantitative analysis is commonly used to study therelationship between prices and demand, and to assess theimpact of policy measures on economic outcomes.Qualitative analysis, on the other hand, providesinsights into human behavior and attitudes that are difficultto obtain through quantitative methods alone. By usinginterviews and surveys, for example, qualitative analysts canbetter understand how people perceive a particular issue orproduct, and what motivates their behavior. Qualitativeanalysis can also reveal aspects of a phenomenon that are notadequately reflected in quantitative data, such as social norms, cultural values, and other contextual factors.Although quantitative and qualitative methods have different strengths and limitations, they can be used together to complement each other. For example, quantitative analysis can provide a baseline of statistical evidence to support qualitative findings, while qualitative methods can provide deeper insights into human behavior and attitudesthat are difficult to obtain through quantitative methods alone.In conclusion, quantitative and qualitative analysis are two key methods that complement each other in many research contexts. Quantitative analysis provides a systematic approach to analyzing large sets of data, while qualitative analysis provides insights into human behavior and attitudes that are difficult to obtain through quantitative methods alone. By combining these two methods, researchers can better understand complex phenomena and generate more comprehensive and accurate insights that can inform effective decision-making.。

量化分析英语演讲稿范文

量化分析英语演讲稿范文

量化分析英语演讲稿范文## Quantitative Analysis: Unlocking Value through Data-Driven Insights.Introduction:Quantitative analysis has emerged as a pivotal tool in the modern business landscape, empowering decision-makers with data-driven insights to gain a competitive edge. By harnessing the power of mathematical and statistical techniques, quantitative analysts transform raw data into actionable knowledge, enabling organizations to optimize their operations, predict market trends, and make well-informed decisions.Role of Quantitative Analysts:Quantitative analysts are skilled professionals who specialize in extracting meaningful patterns and insights from complex data. They play a crucial role in:Data analysis and modeling: Using mathematical and statistical tools to identify trends, patterns, and relationships in data.Risk assessment and forecasting: Quantifying risks and uncertainties to help organizations make informed decisions.Financial analysis and trading: Analyzing financial data to make investment decisions, manage portfolios, and assess market risk.Benefits of Quantitative Analysis:Organizations that leverage quantitative analysis effectively enjoy numerous benefits, including:Improved decision-making: Data-driven insights empower managers to make more informed and objective decisions.Enhanced risk management: Quantifying risks allows organizations to mitigate potential losses and seizeopportunities.Increased efficiency: Automating complex calculations and leveraging data visualization tools enhancesoperational efficiency.Competitive advantage: Access to valuable insights provides organizations with a competitive edge in the market.Challenges in Quantitative Analysis:Despite its benefits, quantitative analysis facescertain challenges:Data quality and availability: Ensuring the accuracy and availability of data is essential for reliable analysis.Computational complexity: Handling large and complex datasets can require significant computing resources.Bias and ethics: Quantitative models can be biased ifnot carefully designed and implemented.Overcoming Challenges:Organizations can overcome these challenges by:Establishing data governance: Setting standards for data collection, quality, and accessibility.Investing in technology: Utilizing advanced computing platforms and data visualization tools to enhance analysis capabilities.Promoting a data-driven culture: Fostering a culture that values data-informed decision-making.Conclusion:Quantitative analysis has become an indispensable tool in the business world, providing organizations with the power to unlock value through data-driven insights. By embracing quantitative analysis techniques, organizationscan improve their decision-making, manage risks, enhance efficiency, and gain a competitive edge. As the demand for data-driven insights continues to grow, the role of quantitative analysts will become increasingly crucial in shaping the future of business and society.## 定量分析,通过数据驱动的洞察释放价值。

Form of a Quantitative Characteristic Rule (cf. crosstab)

Form of a Quantitative Characteristic Rule (cf. crosstab)

S contains si tuples of class Ci for i = {1, …, m} Information measures info required to classify any arbitrary tuple m
I ( s1 , s2 , K, sm ) = −∑
i =1
si s log 2 i s s
t _weight (q a ) =

i range is [0…1] i =1 Form of a Quantitative Characteristic Rule: (cf. crosstab)

∑ count (q )
n
∀X , target_class ( X ) ⇒ condition1 ( X ) [t : w1 ] ∨ K ∨ condition m ( X ) [t : wm ]
new, see p. 20
Quantitative Characteristic Rules

Typicality weight (t_weight) of the disjuncts in a rule n: number of tuples in the initial generalized relation R t_weight: fraction of tuples in R that represent target class qa: generalized tuple describing the target class count (q a ) definition
Canada Foreign Foreign Foreign Canada Canada
20-25 25-30 25-30 25-30 20-25 20-25

系统集成项目经理该掌握专业英语词汇

系统集成项目经理该掌握专业英语词汇

系统集成项目经理该掌握专业英语词汇系统集成项目经理该掌握专业英语词汇Temporary————临时性Unique————独特的Project management————项目管理Project requirements————项目需求Initiating————启动Executing————实施Monitoring————监视Controlling————控制Closing————收尾Project manager————项目经理Project Charter————项目章程Project Management Plan————项目管理计划Phase————阶段Direct————指导Monitor————监视Reviewing————评审Change requests————变更请求Deliverables————可交付物、可交付成果Organizational process assets————组织过程资产Time Management————时间管理Activity Definition————活动定义Activity Sequencing————活动排序Activity Resource Estimating————活动资源估算Activity Duration Estimating————活动持续时间估算Schedule Development————进度计划Schedule Control————进度控制Cost Management————成本管理Cost Planning————成本计划Cost Estimating————成本估算Cost Budgeting————成本预算Cost Controlling————成本控制Quality Management————质量管理Quality Planning————质量规划Quality Assurance————质量保证Quality Control————质量控制Human Resource Management————人力资源管理Organize————组织Acquire————组建Develop————建设、发展Communications Management————沟通管理Collection————收集Dissemination————传输Storage————存储Disposition————处理Communications Planning————沟通规划Information Distribution————信息发布Performance Reporting————绩效报告Stakeholders————项目干系人、利害相关者Risk————风险Risk Management————风险管理Risk Management Planning————风险管理规划Risk Identification————风险识别Qualitative Risk Analysis————定性风险分析Quantitative Risk Analysis————定量风险分析Risk Response Planning————风险应对计划Risk Monitoring and Control————风险监控Procurement Management————采购管理系统集成项目经理该掌握专业英语词汇Plan Purchases and Acquisitions————采购规划Plan Contracting————合同计划Select Sellers————卖方选择Contract Administration————合同管理Contract Closure————合同收尾Projects——项目。

定量分析的英文名词解释

定量分析的英文名词解释

定量分析的英文名词解释Quantitative Analysis: An English Term ExplanationIntroductionThe field of quantitative analysis is a methodical approach that involves the examination and interpretation of data using mathematical and statistical techniques. It plays a crucial role in various disciplines, including finance, economics, business management, and scientific research. This article aims to provide a comprehensive explanation of the English term "quantitative analysis" by exploring its definitions, applications, and key components.Defining Quantitative AnalysisQuantitative analysis refers to the systematic process of analyzing numerical data to uncover patterns, relationships, and trends. Unlike qualitative analysis, which focuses on subjective observations and interpretations, quantitative analysis utilizes objective measurements and mathematical calculations to derive meaningful insights. By quantifying data through statistical models and mathematical formulas, this analytical approach enables researchers and decision-makers to make informed judgments based on empirical evidence.Applications of Quantitative Analysis1. Financial Analysis:Quantitative analysis plays a vital role in the field of finance. Analysts utilize various quantitative techniques to assess investments, evaluate risk, and make strategic decisions. For instance, by using financial ratios and mathematical models, analysts can analyze the performance and stability of companies, determine the fair value of stocks, and predict future market trends.2. Economics:Economists heavily rely on quantitative analysis to study economic phenomena and formulate economic policies. By analyzing economic indicators such as GDP, inflation rates, and unemployment rates, economists can assess the health of economies, predict future trends, and propose effective strategies for economic growth.3. Market Research:Quantitative analysis is widely used in market research to gather and interpret consumer data. Surveys and questionnaires are designed to collect quantitative data, which is then analyzed to understand consumer preferences, behavior patterns, and market trends. Statistical techniques, such as regression analysis and hypothesis testing, enable researchers to identify correlations, test hypotheses, and make predictions.Components of Quantitative Analysis1. Data Collection:The first step in quantitative analysis involves collecting relevant data. This can be done through various methods, such as surveys, experiments, or secondary data sources. It is crucial to ensure the accuracy, reliability, and representativeness of the data collected, as the quality of the analysis heavily relies on the quality of the data.2. Data Analysis:Once the data is collected, it is processed and analyzed using statistical techniques and mathematical models. Descriptive statistics, such as mean, median, and standard deviation, provide insights into the central tendencies and variability of the data. Inferential statistics allow researchers to draw conclusions and make predictions based on a sample of data.3. Data Interpretation:The final step of quantitative analysis involves interpreting the results. This requires critically evaluating the findings, identifying patterns or relationships, and drawing meaningful conclusions. Proper interpretation of quantitative analysis is essential to ensure that the insights gained from the data are relevant, valid, and actionable.ConclusionQuantitative analysis is a valuable tool used across various disciplines to analyze numerical data and derive meaningful insights. Its applications extend to finance, economics, market research, and beyond. By utilizing mathematical and statistical techniques, researchers and decision-makers can make informed judgments based on empirical evidence. Understanding the components and applications of quantitative analysis is essential for those who seek to effectively analyze and interpret numerical data.。

欧洲保险公司的整合风险监管框架

欧洲保险公司的整合风险监管框架
sigma
No 4/2006 Solvfor European insurers
3 Executive summary 5 The reform explained 14 Solvency II in comparison 19 To what extent might Solvency II change the industry’s solvency position? 24 The impact of Solvency II on European insurance markets 39 Appraisal of Solvency II 40 Appendices
Published by: Swiss Reinsurance Company Economic Research & Consulting P.O. Box 8022 Zurich Switzerland Telephone +41 43 285 2551 Fax +41 43 285 4749 E-mail: sigma@ New York Office: 55 East 52nd Street 40th Floor New York, NY 10055 Telephone +1 212 317 5135 Fax +1 212 317 5455 Hong Kong Office: 18 Harbour Road, Wanchai Central Plaza, 61st Floor Hong Kong, SAR Telephone +852 2582 5691 Fax +852 2511 6603 Authors: Patrizia Baur Telephone +41 43 285 3153 Rudolf Enz Telephone +41 43 285 2239 sigma co-editor: Aurelia Zanetti Telephone +41 43 285 2544 Managing editor: Thomas Hess, Head of Economic Research & Consulting, is responsible for the sigma series. The editorial deadline for this study was 12 May 2006. sigma is available in English (original language), German, French, Italian, Spanish, Chinese and Japanese. sigma is available on Swiss Re’s website: /sigma The internet version may contain slightly updated information. Translations: Swiss Re Group Language Services Graphic design and production: Swiss Re Logistics/Media Production © 2006 Swiss Reinsurance Company Zurich All rights reserved. The entire content of this sigma edition is subject to copyright with all rights reserved. The information may be used for private or internal purposes, provided that any copyright or other proprietary notices are not removed. Electronic reuse of the data published in sigma is prohibited. Reproduction in whole or in part or use for any public purpose is permitted only with the prior written approval of Swiss Re Economic Research & Consulting and if the source reference “Swiss Re, sigma No 4/2006” is indicated. Courtesy copies are appreciated. Although all the information used in this study was taken from reliable sources, Swiss Reinsurance Company does not accept any responsibility for the accuracy or comprehensiveness of the information given. The information provided is for informational purposes only and in no way constitutes Swiss Re’s position. In no event shall Swiss Re be liable for any loss or damage arising in connection with the use of this information.

Research Methodology Methods

Research Methodology Methods

Research Methodology MethodsResearch methodology methods are an integral part of any research study, as they provide the framework for conducting the research and gathering data. There are various research methodology methods that researchers can choose from, each with its own strengths and weaknesses. In this response, we will explore some of the common research methodology methods, including quantitative, qualitative, and mixed methods, and discuss the advantages and disadvantages of each approach.Quantitative research methodology methods involve the collection and analysis of numerical data. This type of research is often used to measure and quantify phenomena, and it relies on statistical analysis to draw conclusions. One of the main advantages of quantitative research is that it allows for the generalization of findings to a larger population. Additionally, quantitative research methodology methods are often considered to be more objective, as they rely on standardized measures and statistical analysis. However, a potential drawback of quantitative research is that it may overlook the complexity and context of the phenomena being studied, as it focuses primarily on numerical data.On the other hand, qualitative research methodology methods involve the collection and analysis of non-numerical data, such as interviews, observations, and open-ended survey responses. Qualitative research is often used to explore complex phenomena in depth, and it allows for a more holistic understanding of the subject under study. One of the main advantages of qualitative research is its ability to capture the richness and complexity of human experiences, as well as the context in which these experiences occur. However, qualitative research is often criticized for its subjectivity and lack of generalizability, as findings are often specific to the context in which the research was conducted.In recent years, there has been a growing interest in mixed methods research methodology methods, which involve the combination of both quantitative and qualitative approaches. This allows researchers to capitalize on the strengths of both approaches and provide a more comprehensive understanding of the phenomena being studied. Mixed methods research can provide a more complete picture of the research topic, as it allows for the triangulation of data from multiple sources. However, conducting mixed methodsresearch can be time-consuming and resource-intensive, as it requires expertise in both quantitative and qualitative methods.In conclusion, the choice of research methodology methods depends on the research question, the nature of the phenomena being studied, and the resources available to the researcher. Each approach has its own strengths and weaknesses, and researchers should carefully consider which method is most appropriate for their study. By understanding the advantages and disadvantages of different research methodology methods, researchers can make informed decisions about how to best approach their research and contribute to the advancement of knowledge in their field.。

Decision Making

Decision Making
Accepting or rejecting special orders when there is idle production capacity and the special orders have no long-run implications Decision Rule: does the special order generate additional operating income?
Are just as important as quantitative factors even though they are difficult to measure
To accompany Cost Accounting 12e, by Horngren/Datar/Foster. Copyright 2006 by Pearson Education. All rights reserved.
To accompany Cost Accounting 12e, by Horngren/Datar/Foster. Copyright 2006 by Pearson Education. All rights reserved.
11-4
Irrelevance
Historical costs are past costs that are irrelevant to decision making
To accompany Cost Accounting 12e, by Horngren/Datar/Foster. Copyright 2006 by Pearson Education. All rights reserved.
11-13
Insourcing vs. Outsourcing

成本会计 英文术语

成本会计 英文术语

成本会计中英文术语非正常毁损Abnormal spoilage 生产成本法Absorption costing账户分析法Account analysis method 会计回报率Accounting rate of return 权责发生制下会计回报率Accrual accounting rate of return 作业Activity作业基础的预算管理Activity-based budgeting作业成本法Activity-based costing 作业管理Activity-based management 实际成本Actual cost实际成本法Actual costing调整分配率途径Adjusted allocation-rate approach允许的成本Allowable cost鉴定成本Appraisal costs 拟构成本Artificial costs注意力导向Attention directing 自治Autonomy平均成本Average cost平均等候时间Average waiting time 反冲成本法Backflush costing 平衡记分卡Balanced scorecard批次级成本Batch-level costs观念系统Belief systems 标杆管理Benchmarking账面价值Book value瓶颈Bottleneck边界系统Boundary systems盈亏平衡点Breakeven point预算Budget预算成本Budgeted cost预算松弛Budgetary slack预算间接成本分配率Budgeted indirect-cost rate捆绑产品Bundled product业务功能成本Business function costs 副产品Byproducts资本预算Capital budgeting储囤成本Carrying costs现金预算Cash budget因果图Cause-and-effect diagram 财务管理认证Certified in financial management注册管理会计师Certified management accountant财务总监Chief financial officer决定系数Coefficient of determination共谋定价Collusive pricing共同成本Common cost完整往复成本Complete reciprocated costs 合成单位Composite unit商讨会法Conference method 遵循质量Conformance quality 常数Constant固定毛利率NRV 法Constant gross-margin percentage NRV method约束条件Constraint滚动预算Continuous budget, rolling budget 贡献收益表Contribution income statement 边际贡献Contribution margin单位边际贡献Contribution margin per unit 边际贡献率Contribution margin percentage 边际贡献比例Contribution margin ratio 控制Control控制图Control chart可控性Controllability可控成本Controllable cost主计长Controller加工成本Conversion costs成本Cost成本会计Cost accounting成本会计标准委员会Cost accounting standards board成本汇集Cost accumulation成本分配Cost allocation成本分配基础Cost-allocation base成本分配基础Cost-application base 成本归集Cost assignment成本一收益权衡Cost-benefit approach 成本中心Cost center成本动因Cost driver成本估计Cost estimation成本函数Cost function成本层级Cost hierarchy成本流入Cost incurrence成本领先Cost leadership成本管理Cost management成本对象Cost object资本成本Cost of capital产品制造成本Cost of goods manufactured 成本库Cost pool成本预测Cost predictions成本追溯Cost tracing质量成本Costs of quality, quality costs 本量利分析Cost-volume-profit (CVP) analysis累计平均时间学习模型Cumulative average-time learning model当前成本Current cost客户成本层级Customer cost hierarchy客户生命周期成本Customer life-cycle costs 客户盈利分析Customer-profitability analysis 客户回应时间Customer-response time客户服务Customer service分权Decentralization决策模型Decision model决策表Decision table经营杠杆水平Degree of operating leverage 分母水平Denominator level生产数量差异Denominator-level variance, Output-level overhead variance, Production-volume variance因变量Dependent variable产品或服务设计Design of products, services, or processes设计质量Design quality设计锁定成本Designed-in costs, locked-in costs诊断控制系统Diagnostic control systems差异成本Differential cost差异收入Differential revenue直接分配法Direct allocation method直接成本法Direct costing成本对象的直接成本Direct costs of a cost object直接生产人工成本Direct manufacturing labor costs直接材料成本Direct material costs直接材料存货Direct material inventory 直接材料混合差异Direct material mix variance直接材料产量差异Direct material yield variance 直接法Direct method折现率Discount rate现金流量折现法Discounted cash flow (DCF) methods酌量性成本Discretionary costs 发送Distribution减少规模Downsizing向下需求旋转Downward demand spiral双重定价Dual pricing双成本分配率法Dual-rate cost-allocation method, dual-rate method倾销Dumping次优化决策制定Dysfunctional decision making, Incongruent decision making, suboptimal decision making经济订单数量Economic order quantity (EOQ) 经济增加值Economic value added有效性Effectiveness效率Efficiency效率差异Efficiency variance, usage variance 努力Effort技术成本Engineered costs约当产量Equivalent units事项Event预期货币价值Expected monetary value, expected value经验曲线Experience curve外部失败成本External failure cost设施支持成本Facility-sustaining costs 工厂间接费用Factory overhead costs 有利差异Favorable variance反馈Feedback财务主管Finance director财务会计Financial accounting财务预算Financial budget财务计划模型Financial planning models 产成品存货Finished goods inventory 先进先出分步法First-in, first-out (FIFO) process-costing method 固定成本Fixed cost 固定间接费用弹性预算差异Fixed overhead flexible-budget variance固定间接费用耗费差异Fixed overhead spending variance弹性预算Flexible budget弹性预算差异Flexible-budget variance 产品全部成本Full costs of the product 目标一致性Goal congruence毛利率Gross margin percentage 增长构成Growth component高低法High-low method同质的成本库Homogenous cost pool基本报酬率Hurdle rate混合成本核算系统Hybrid costing system 空置时间Idle time假设成本Imputed costs增量成本Incremental cost增量成本分配法Incremental cost-allocation method增量收入Incremental revenue增量收入分配法Incremental revenue-allocation method增量单位时间学习模型Incremental unit-time learning model自变量Independent variable成本对象的间接成本Indirect costs of a cost object间接成本分配率Indirect-cost rate间接制造成本Indirect manufacturing costs 工业工程法Industrial engineering method, Work-measurement method通货膨胀Inflation价格差异Input-price variance, price variance, rate variance内制Insourcing检验点Inspection point管理会计师协会Institute of Management Accountants交互式控制系统Interactive control systems 截距项Intercept中间产品Intermediate product 内部失败成本Internal failure costs 内含报酬率法Internal rate-of-return (IRR) method产品存货成本Inventoriable costs 存货管理Inventory management 投资Investment投资中心Investment center批次Job分批成本记录Job-cost record, job-cost sheet 分批法Job-costing system 联合成本Joint costs联产品Joint products即时制生产Just-in-time (JIT) production, lean production即时制采购Just-in-time (JIT) purchasing 改进法预算Kaizen budgeting人工时间记录Labor-time record学习曲线Learning curve生命周期预算Life-cycle budgeting 生命周期成本法Life-cycle costing 业务管理Line management线形成本函数Linear cost function 线性规划Linear programming 主产品Main product自产/夕卜购决策Make-or-buy decisions 管理会计Management accounting 例外管理Management by exception 管理控制系统Management control system 制造单元Manufacturing cells生产周期时间Manufacturing cycle time, Manufacturing lead time分配的制造费用Manufacturing overhead allocated, Manufacturing overhead applied 制造类企业Manufacturing-sector companies 安全边际Margin of safety市场营销Marketing市场分额差异Market-share variance 市场规模差异Market-size variance 全面预算Master budget全面预算生产能力利用Master-budget capacity utilization材料需求规划Materials requirements planning用料单Materials-requisition record 商业类企业Merchandising-sector companies 混合成本Mixed cost, semivariable cost 道德风险Moral hazard 动机Motivation多重共线性Multicollinearity 多变量回归Multiple regression 净利润Net income净现值法Net present value (NPV) method 净可实现值法Net realizable value (NPV) method 名义回报率Nominal rate of return 非线性成本函数Nonlinear cost function 非价值增加成本Nonvalue-added cost 正常生产能力利用Normal capacity utilization正常成本法Normal costing 正常毁损Normal spoilage 目标函数Objective function 准时表现On-time performance 一次性特殊订单One-time-only special order 经营预算Operating budget 营业部门Operating department 营业利润Operating income 经营杠杆Operating leverage 经营Operation经营成本核算系统Operation-costing system 机会成本Opportunity cost资本机会成本Opportunity cost of capital 采购订单成本Ordering costs 组织架构Organization structure 结果Outcomes产出单位成本Output unit-level costs 外部采购Outsourcing分配过多的间接成本Overabsorbed indirect costs, Overapplied indirect costs, overallocated indirect costs 加班奖金Overtime premium 帕累托图Pareto Diagram 局部生产力Partial productivity 回收期法Payback method 最大负荷定价Peak-load pricing 完全竞争市场Perfectly competitive market 期间成本Period costs实物计量法Physical measure method 计划Planning现实的生产能力Practical capacity 掠夺性定价Predatory pricing预防成本Prevention costs转入成本Previous department costs, transferred-in costs价格折扣Price discount区别定价Price discrimination价格恢复构成Price-recovery component 主要成本Prime costs预测报表Pro forma statements概率Probability概率分布Probability distribution问题解决Problem solving分步成本核算系统Process-costing system 产品Product产品成本Product cost产品成本互补Product-cost cross-subsidization 产品差异化Product differentiation 产品生命周期Product life cycle 产品组合决策Product mix decisions 成本高计的产品Product overcosting 产品支持成本Product-sustaining costs 成本少计的产品Product undercosting 生产Production生产部门Production department生产量水平Production-denominator level 生产力Productivity生产力构成Productivity component 利润中心Profit center按比例分配Proration采购订单提前量Purchasing-order lead time 采购成本Purchasing costsPV 图PV graph定性因素Qualitative factors质量Quality定量因素Quantitative factors真实回报率Real rate of return交互分配法Reciprocal allocation method, reciprocal method业务流程再造Reengineering精练化成本系统Refined costing system 回归分析Regression analysis相关成本Relevant costs相关范围Relevant range 相关收入Relevant revenues 再订购点Reorder point要求的回报率Required rate of return 研发Research and development 剩余收益Residual income剩余项Residual term责任会计Responsibility accounting 责任中心Responsibility center 投资报酬率Return on investment 收入分配Revenue allocation 收入中心Revenue center 收入动因Revenue driver 收入对象Revenue object 收入Revenues返工Rework合适规模Rightsizing安全库存Safety stock销售组合Sales mix销售组合差异Sales mix variance销售数量差异Sales-quantity variance 分离点销售价值法Sales value at splitoff method销售数额差异Sales-volume variance业务记录Scorekeeping废料Scrap销售价格差异Selling-price variance敏感性分析Sensitivity analysis可分离成本Separable costs阶梯法Sequential allocation method, step-down allocation method, step-down method顺序追溯Sequential tracing服务部门Service department, supporting department服务类企业Service-sector companies 服务支持成本Service-sustaining costs 单变量回归Simple regression单一成本分配率法single-rate cost-allocation method, single-rate method斜率系数Slope coefficient 原始凭证Source document 设定分析Specification analysis 分离点Splitoff point毁损Spoilage人事管理Staff management单一个体成本分配法Stand-alone cost-allocation method单一个体收入分配法Stand-alone revenue-allocation method标准Standard标准成本Standard cost标准成本法Standard costing估计系数标准差Standard error of the estimation coefficient标准投入Standard input 标准价格Standard price 静态预算Static budget静态预算差异Static budget variance 阶梯式成本函数Step cost function 脱销成本Stockout costs战略成本管理Strategic cost management 战略Strategy沉没成本Sunk costs超级变动成本法Super-variable costing, throughput costing供应链Supply chain单位目标成本Target cost per unit单位目标营业利润Target operating income per unit目标价格Target price目标投资回报率Target rate of return on investment 理论生产能力Theoretical capacity 约束理论Theory of constraints 物料贡献Throughput contribution 时间动因Time driver货币时间价值Time value of money全要素生产力Total factor productivity (TFP) 全部间接费用差异Total-overhead variance 转移价格Transfer price触发点Trigger point不确定性Uncertainty分配不足的间接成本underabsorbed indirect costs, underapplied indirect costs, underallocated indirect costs不利差异Unfavorable variance 单位成本Unit cost未用生产能力Unused capacity价值增加成本Value-added cost价值链Value chain价值工程Value engineering变动成本Variable cost变动成本法Variable costing变动间接费用效率差异Variable overhead efficiency variance变动间接费用弹性预算差异Variable overhead flexible-budget variance变动间接费用耗费差异Variable overhead spending variance差异Variance加权平均的分步法Weighted-average process-costing method在产品存货Work-in-process inventory 在产品Work-in-process。

Supply Chain Risk Management

Supply Chain Risk Management

Chapter 5Supply Chain Risk ManagementD.L. Olson and D. WuGlobal competition, technological change, and continual search for competitive advantage have motivated risk management in supply chains.1 Supply chains are often complex systems of networks, reaching hundreds or thousands of participants from around the globe in some cases (Wal-Mart or Dell). The term has been used both at the strategic level (coordination and collaboration) and tactical level (man-agement of logistics across functions and between businesses).2 In this sense, risk management can focus on identification of better ways and means of accomplishing organizational objectives rather than simply preservation of assets or risk avoid-ance. Supply chain risk management is interested in coordination and collaboration of processes and activities across functions within a network of organizations. Tang provided a framework of risk management perspectives in supply chains.3 Supply chains enable manufacturing outsourcing to take advantages of global relative advantages, as well as increase product variety. There are many risks inherent in this more open, dynamic system.Supply Chain Risk Management ProcessOne view of a supply chain risk management process includes steps for risk identi-fication, risk assessment, risk avoidance, and risk mitigation.4 These structures for handling risk are compatible with Tang’s list given above, but focus on the broader aspects of the process.Risk IdentificationRisks in supply chains can include operational risks and disruptions. Operational risks involve inherent uncertainties for supply chain elements such as customer demand, supply, and cost. Disruption risks come from disasters (natural in the form of floods, hurricanes, etc.; man-made in the form of terrorist attacks or wars) and from economic crises (currency reevaluations, strikes, shifting market prices).D.L. Olson, D. Wu (eds.) New Frontiers in Enterprise Risk Management, 57© Springer-Verlag Berlin Heidelberg 200858 D.L. Olson, D. Wu Most quantitative analyses and methods are focused on operational risks. Disruptions are more dramatic, less predictable, and thus are much more difficult to model. Risk management planning and response for disruption are usually qualitative.Risk AssessmentTheoretically, risk has been viewed as applying to those cases where odds are known, and uncertainty to those cases where odds are not known. Risk is a prefera-ble basis for decision making, but life often presents decision makers with cases of uncertainty. The issue is further complicated in that perfectly rational decision mak-ers may have radically different approaches to risk. Qualitative risk management depends a great deal on managerial attitude towards risk. Different rational individ-uals are likely to have different response to risk avoidance, which usually is inversely related to return, thus leading to a tradeoff decision. Research into cogni-tive psychology has found that managers are often insensitive to probability esti-mates of possible outcomes, and tend to ignore possible events that they consider to be unlikely.5 Furthermore, managers tend to pay little attention to uncertainty involved with positive outcomes.6 They tend to focus on critical performance tar-gets, which makes their response to risk contingent upon context.7 Some approaches to theoretical decision making prefer objective treatment of risk through quantita-tive scientific measures following normative ideas of how humans should make decisions. Business involves an untheoretical construct, however, with high levels of uncertainty (data not available) and consideration of multiple (often conflicting) factors, making qualitative approaches based upon perceived managerial risk more appropriate.B ecause accurate measures of factors such as probability are often lacking, robust strategies (more likely to enable effective response under a wide range of circumstances) are often attractive to risk managers. Strategies are efficient if they enable a firm to deal with operational risks efficiently regardless of major disrup-tions. Strategies are resilient if they enable a firm to keep operating despite major disruptions. Supply chain risk can arise from many sources, including the following:8● Political events● Product availability●Distance from source● Industry capacity● Demand fluctuation●Changes in technology●Changes in labor markets● Financial instability● Management turnover5 Supply Chain Risk Management 59 Risk AvoidanceThe oldest form of risk avoidance is probably insurance, purchasing some level of financial security from an underwriter. This focuses on the financial aspects of risk, and is reactive, providing some recovery after a negative experience. Insurance is not the only form of risk management used in supply chains. Delta Airlines insur-ance premiums for terrorism increased from $2 million in 2001 to $152 million in 2002.9 Insurance focuses on financial risks. Other major risks include loss of cus-tomers due to supply change disruption.Supply chain risks can be buffered by a variety of methods. Purchasing is usu-ally assigned the responsibility of controlling costs and assuring continuity of sup-ply. Buffers in the form of inventories exist to provide some risk reduction, at a cost of higher inventory holding cost. Giunipero and Al Eltantawy compared traditional practices with newer risk management approaches.10 The traditional practice, rely-ing upon extra inventory, multiple suppliers, expediting, and frequent supplier changes suffered from high transaction costs, long purchase fulfillment cycle times, and expensive rush orders. Risk management approaches, drawing upon practices such as supply chain alliances, e-procurement, just-in-time delivery, increased coordination and other techniques, provides more visibility in supply chain opera-tions. There may be higher prices incurred for goods, and increased security issues, but methods have been developed to provide sound electronic business security. Risk MitigationTang provided four basic risk mitigation approaches for supply chains.11 These focus on the sources of risk: management of uncertainty with respect to supply, to demand, to product management, and information management. Furthermore, there are both strategic and tactical aspects involved. Strategically, network design can enable better control of supply risks. Strategies such as product pricing and rollovers can control demand to a degree. Greater product variety can strategically protect against product risks. And systems providing greater information visibility across supply chain mem-bers can enable better coping with risks. Tactical decisions include supplier selection and order allocation (including contractual arrangements); demand control over time, markets, and products; product promotion; and information sharing, vendor managed inventory systems, and collaborative planning, forecasting, and replenishment. Supply ManagementA variety of supplier relationships are possible, varying the degree of linkage between vendor and core organizations. Different types of contracts and information exchange are possible, and different schemes for pricing and coordinating schedules.60 D.L. Olson, D. Wu Supplier Selection ProcessSupplier (vendor) evaluation is a very important operational decision. There are decisions selecting which suppliers to employ, as well as decisions with respect to quantities to order from each supplier. With the increase in outsourcing and the opportunities provided by electronic business to tap world-wide markets, these decisions are becoming ever more complex. The presence of multiple criteria in these decisions has long been recognized.12 A probabilistic model for this decision has been published to include the following criteria:131. Quality personnel2. Quality procedure3. Concern for quality4. Company history5. Price relative to quality6. Actual price7. Financial ability8. Technical performance9. Delivery history10. Technical assistance11. Production capability12. Manufacturing equipmentSome of these criteria overlap, and other criteria may exist for specific supply chain decision makers. But clearly there are many important aspects to selecting suppliers. Supplier Order AllocationOperational risks in supply chain order allocation include uncertainties in demands, sup-ply yields, lead times, and costs. Thus not only do specific suppliers need to be selected, the quantities purchased from them needs to be determined on a recurring basis.Supply chains provide many valuable benefits to their members, but also create problems of coordination that manifest themselves in the “bullwhip” effect.14 Information system coordination can reduce some of the negative manifestations of the bullwhip effect, but there still remains the issue of profit sharing. Decisions that are optimal for one supply chain member often have negative impacts of the total profitability of the entire supply chain.15Demand ManagementDemand management approaches include using statistics in models for identification of an optimal portfolio of demand distributions16 and economic models to select strate-gies using price as a response mechanism to change demand.17 Other strategies include5 Supply Chain Risk Management 61 shifting demand over time, across markets, or across products. Demand management of course is one of the aims of advertising and other promotional activities. However, it has long been noted as one of the most difficult things to predict over time.Product ManagementAn effective strategy to manage product risk is variety, which can be used to increase market share to serve distinct segments of a market. The basic idea is to diversify products to meet the specific needs of each market segment. However, while this would be expected to increase revenues and market share, it will lead to increase manufacturing costs and inventory costs. Various ways to deal with the potential inefficiencies in product variety include Dell’s make-to-order strategy. Supply Chain DisruptionTang classified supply chain vulnerabilities as those due to uncertain economic cycles, customer demand, and disasters. Land Rover reduced their workforce by over one thousand when a key supplier went insolvent. Dole was affected by Hurricane Mitch hitting their banana plantations in Central America in 1998. September 11, 2001 suspended air traffic, leading Ford Motor Company to close five plants for several days.18 Many things can disrupt supply chains. Supply chain disruptions have been found to negatively impact stock returns for firms suffering them.19Supply Chain RisksRecent research into supply chain risk covers many topics.New Technology RiskGolda and Phillipi20 considered technical and business risk components of the sup-ply chain. Technical risks relate to science and engineering, and deal with the uncertainties of research output. Business risks relate to markets, human responses to products and/or related services. At Intel, three risk mitigation strategies were considered to deal with the risks associated with new technologies:1. Partnerships, with associated decisions involving who to partner with, and atwhat stage of product development62 D.L. Olson, D. Wu 2. Pursue extendable solutions, evolutionary products that will continue to offervalue as new technical breakthroughs are gained3. Evaluate multiple options to enable commercializationPartner Selection RiskPartner (to include vendor) evaluation is a very important operational decision. Important decisions include which vendors to employ and quantities to order from each vendor. With the increase in outsourcing and the opportunities provided by electronic business to tap world-wide markets, these decisions are becoming ever more complex. The presence of multiple criteria in these decisions has long been recognized.21Outsourcing RisksOther risks are related to partner selection, focusing specifically on the additional risks associated with international trade. Risks in outsourcing can include:22●Cost – unforeseen vendor selection, transition, or management●Lead time – delay in production start-up, manufacturing process, or transportation ●Quality – minor or major finishing defects, component fitting, or structuraldefectsOutsourcing has become endemic in the United States, especially information technology to India and production to China.23 Risk factors include:●Ability to retain control●Potential for degradation of critical capability●Risk of dependency●Pooling risk (proprietarial information, clients competing among themselves)●Risk of hidden costsEcological RisksIn our ever-more complex world, it no longer is sufficient for each organization to make decisions in light of their own vested self-interest. There is growing con-cern with the impact of human decisions on the state of the earth. This is espe-cially true in mass production environments such as power generation,24 but also is important in all aspects of business. Cruz (2008) presented a dynamic frame-work for modeling and analysis of supply chain networks in light of corporate5 Supply Chain Risk Management 63 social responsibility.25 That study presented a framework multiple objective pro-gramming model with the criteria of maximizing profit, minimizing waste, and minimizing risk.Multiple Criteria Selection ModelA number of methodologies are applied in practice, to include simple screening and scoring methods,26 supplier positioning matrices to lay out risks by vendor, with associated ratings,27 and a combination of sorts combining risk categorization with ratings of opportunity, probability, and severity.28 Traditional multiple criteria meth-ods have also been applied, to include analytic hierarchy process.29 The simple multiattribute rating theory (SMART)30 model bases selection on the rank order of the product of criteria weights and alternative scores over these criteria, and will be used here. Note that we are demonstrating, and are not claiming that the orders and ratings used are universal. We are rather presenting a method that real decision makers could use with their own ratings (and even with other criteria that they might think important in a given application).OptionsThere are various levels of outsourcing that can be adopted. These range from sim-ply outsourcing particular tasks (much like the idea of service oriented architec-ture), co-managing services with partners, hiring partners to manage services, and full outsourcing (in a contractual relationship). We will use these four outsourcing relationships plus the fifth option of doing everything in-house as our options. CriteriaWe will utilize the criteria given below:●Cost (including hidden)● Lead time● Quality●Ability to retain control●Potential loss of critical capability●Risk of dependency●Risk of loss of proprietarial information●Risk of client contentionThe SMART method begins by rank ordering criteria. Here assume the follow-ing rank order of importance:64 D.L. Olson, D. Wu1. Ability to retain control2. Risk proprietarial information loss3. Quality of product and service4. Potential loss of critical capability5. Risk of dependency6. Cost7. Lead time8. Risk of client contentionThe next step is to develop relative weights of importance for criteria. We will do this by assigning the most important criterion 100 points, and give proportional ratings for each of the others as given in Table 5.1:Weights are obtained by dividing each criterion’s assigned point value by the total of points (here 435). This yields weights shown in Table 5.2:Scoring of Alternatives over CriteriaThe next step of the SMART method is to score alternatives. This is an expression by the decision maker (or associated experts) of how well each alternative performs on each criterion. Scores range from 1.0 (ideal performance) to 0 (absolute worst performance imaginable). This approach makes the scores independent of scale, and independent of weight. Demonstration is given in Table 5.3:Table 5.1Assignment of points to criteriaRank Criterion Points1 Ability to retain control 1002 Risk proprietarial information loss 903 Quality of product and service 854 Potential loss of critical capability 605 Risk of dependency 406 Cost 30time 257 Lead8 Risk of client contention 5Table 5.2Weight developmentRank Criterion Points Weights1 Ability to retain control 1000.2302 Risk proprietarial information loss 90 0.2073 Quality of product and service 850.1954 Potential loss of critical capability 60 0.1385 Risk of dependency 40 0.0926 Cost 30 0.069time 25 0.0577 Lead8 Risk of client contention 50.0115 Supply Chain Risk Management65Once weights and scores are obtained, value functions for each alternative are sim-ply the sum products of weights times scores for each alternative. The closer to 1.0 (the maximum value function), the better. Table 5.4 shows value scores for the five alternatives:The outcome here is that in-house operations best satisfy the preference function of the decision maker. Obviously, different weights and scores will yield different outcomes. B ut the method enables decision makers to apply a sound but simple analysis to aid their decision making.ConclusionsSupply chains have become important elements in the conduct of global business. There are too many efficiency factors available from global linkages to avoid. We all gain from allowing broader participation by those with relative advantages. Alliances can serve as safety nets by providing alternative sources, routes, or prod-ucts for its members. Risk exposure within supply chains can be reduced by reduc-ing lead times. A common means of accomplishing lead time reduction is by collocation of suppliers at producer facilities.This chapter has discussed some of the many risks associated with supply chains. A rational process of dealing with these risks includes assessment of what can go wrong, quantitative measurement to the degree possible of risk likelihood and severity, qualitative planning to cover a broader set of important criteria, and contingency planning. A wide variety of available supply chain risk-reduction strat-egies were reviewed, with cases of real application.Table 5.3ScoresCriteria Out-tasking Co-managed Managed Contract In-house Ability to retain control 0.9 0.6 0.3 0.0 1.0Risk proprietarial 0.8 0.5 0.2 0.0 1.0information lossQuality of product 0.3 0.4 0.6 0.9 0.7and servicePotential loss of 0.3 0.2 0.2 0.0 1.0critical capabilityRisk of dependency 0.8 0.4 0.3 0.0 1.0Cost 0.3 0.5 0.7 1.00.2Lead time 0.8 0.3 0.5 0.7 0.4Risk of client 0.0 0.2 0.3 1.0 0.3contentionTable 5.4Value functionsAlternative Out-tasking Co-managed Managed Contract In-house 0.613 0.438 0.363 0.297 0.844 2 3 4 5 166 D.L. Olson, D. WuWhile no supply chain network can expect to anticipate all future disruptions, they can set in place a process to reduce exposure and impact. Preplanned response is expected to provide better organizational response in keeping with organizational objectives.End Notes1. Ritchie, B., and Brindly, C. (2007). Supply chain risk management and performance: A guid-ing framework for future development, International Journal of Operations and Production Management 27:3, 303–322.2. Mentzer, J.T, Dewitt, W., Keebler, J.S., Min, S., Nix, N.W., Smith, C.D., and Zacharia, Z.G.(2001).Supply Chain Management. Thousand Oaks, CA: Sage.3. Tang, C.S. (2006). Perspectives in supply chain risk management, International Journal ofProduction Economics 103, 451–488.4. Chapman, P., Cristopher, M., Juttner, U., Peck, H., and Wilding, R. (2002). Identification andmanaging supply chain vulnerability, Logistics and Transportation Focus 4:4, 59–64.5. Kunreuther, H. (1976). Limited knowledge and insurance protection, Public Policy 24,227–261.6. MacCrimmon, K.R., and Wehrung, D.A. (1986). Taking Risks: The Management ofUncertainty. New York: Free Press.7. March, J., and Shapira, Z. (1987). Managerial perspectives on risk and risk taking,Management Science 33, 1404–1418.8. Giunipero, L.C., and Aly Eltantawy, R. (2004). Securing the upstream supply chain: A riskmanagement approach, International Journal of Physical Distribution and Logistics Management 34:9, 698–713.9. Rice, B., and Caniato, F. (2003). Supply chain response to terrorism: Creating resilient andsecure supply chains, Supply Chain Response to Terrorism Project Interim Report. Cambridge, MA: MIT Center for Transportation and Logistics.10. Giunipero and Aly Eltantawy. (2004). op cit.11. Tang (2006), op cit.12. Dickson, G.W. (1966). An analysis of vendor selection systems and decisions, Journal ofPurchasing 2, 5–17.13. Moskowitz, H., Tang, J., and Lam, P. (2000). Distribution of aggregate utility using stochasticelements of additive multiattribute utility models, Decision Sciences 31, 327–360.14. Sterman, J.D. (1989). Modeling managerial behavior: Misperceptions of feedback in adynamic decision making experiment, Management Science 35, 321–339.15. Bresnahan, T.F., and Reiss, P.C. (1985). Dealer and manufacturer margins, Rand Journal ofEconomics 16, 253–268.16. Carr, S., and Lovejoy, W. (2000). The inverse newsvendor problem: Choosing an optimaldemand portfolio for capacitated resources, Management Science 47, 912–927.17. Van Mieghem, J., and Dada, M. (2001). Price versus production postponement: Capacity andcompetition,Management Science 45, 1631–1649.18. Tang (2006), op cit.19. Hendricks, K., and Singhal, V. (2005). An empirical analysis of the effect of supply chain dis-ruptions on long-run stock price performance and equity risk of the firm, Production and Operations Management 25–53.20. Golda, J., Philippi, C. (2007). Managing new technology risk in the supply chain. IntelTechnology Journal 11:2, 95–104.21. Dickson, G.W. (1966). op cit.; Weber, C.A., Current, J.R., and Benton, W.C. (1991). Vendorselection criteria and methods, European Journal of Operational Research, 50, 2–18; Moskowitz,H., et al. (2000). op cit.5 Supply Chain Risk Management 6722. Wellborn, C. (2007). op cit.23. Sanders, N.R., Locke, A., Moore, C.B., and Autry, C.W. (2007). A multidimensional frame-work for understanding outsourcing arrangements. Journal of Supply Chain Management: A Global Review of Purchasing and Supply 43:4, 3–15.24. Sheu, J.-B. (2008). Green supply chain management, reverse logistics and nuclear power gen-eration.Transportation Research: Part E 44:1, 19–46.25. Cruz, J.M. (2008). Dynamics of supply chain networks with corporate social responsibilitythrough integrated environmental decision-making. E uropean Journal of Operational Research 184, 1005–1031.26. Golda and Philippi. (2007). op cit.27. Chou, S.-Y., Shen, C.-Y., and Chang, Y.-H. (2007). Vendor selection in a modified re-buy situ-ation using a strategy-aligned fuzzy approach. International Journal of Production Research 45:14, 3113–3133.28. Wellborn, C. (2007). Using FMEA to assess outsourcing risk. Quality Progress 40:8, 17–21.29. Levary, R.R. (2007). Ranking foreign suppliers based on supply risk. Supply ChainManagement: An International Journal 12:6, 392–394; Balan, S., Brat, P., Kumar, P. (2008).A strategic decision model for the justification of supply chain as a means to improve nationaldevelopment index. International Journal of Technology Management 40:1/3, 69–86.30. Edwards, W., and Barron, F.H. (1994). SMARTS and SMARTER: Improved simple methodsfor multiattribute utility measurement, Organizational Behavior and Human Decision Processes 60, 306–325; Olson, D.L. (1996). Decision Aids in Selection Problems. New York: Springer.。

Introduction to quantitative genetics

Introduction to quantitative genetics

An overview of where we’re headed
Woltereck’s ideas force us to realize that when we see a phenotypic difference between two individuals in a population there are three possible explanations for that difference: 1. The individuals have different genotypes. 2. The individuals developed in different environments. 3. The individuals have different genotypes and they developed in different environments. This leads us naturally to think that phenotypic variation consists of two separable components, namely genotypic and environmental components.1 Putting that into an equation Var(P ) = Var(G) + Var(E ) , where Var(P ) is the phenotypic variance, Var(G) is the genetic variance, and Var(E ) is the environmental variance.2 As we’ll see in just a moment, we can also partition the genetic variance into components, the additive genetic variance , Var(A), and the dominance variance, Vrisingly subtle and important insight buried in that very simple equation: Because the expression of a quantitative trait is a result both of genes involved in that trait’s expression and the environment in which it is expressed, it doesn’t make sense to say of a particular individual’s phenotype that genes are more important than environment in determining it. You wouldn’t have a phenotype without both. What we might be able to say is that when we look at a particular population of organisms some fraction of the phenotypic differences among them is due to differences in the genes they carry and that some fraction is due to differences in the environment they have experienced.3 It’s often useful to talk about how much of the phenotypic variance is a result of additive genetic variance or of genetic variance. h2 n = Var(A) Var(P )

外包人员评级工作总结

外包人员评级工作总结

外包人员评级工作总结英文回答:As an outsourcing personnel, my job involves evaluating the performance of outsourced workers and providing feedback to the management team. This process is crucial in ensuring that the outsourced workers are meeting the standards set by the company and are delivering quality work. In order to effectively summarize the performance of outsourced workers, I have developed a systematic approach that involves several key steps.Firstly, I closely monitor the work of the outsourced workers on a regular basis. This includes reviewing their completed tasks, assessing the quality of their work, and identifying any areas where improvement may be needed. For example, if an outsourced worker is responsible for customer service, I would listen to recorded calls or review customer interactions to evaluate their communication skills and problem-solving abilities.Secondly, I gather feedback from relevant stakeholders, such as the internal team members who work closely with the outsourced workers or the clients who receive the outsourced services. This feedback provides valuable insights into the outsourced workers' performance from different perspectives. For instance, if the outsourced workers are responsible for data entry, I would consult with the internal team members who rely on the accuracy of the entered data to understand how well the outsourced workers are meeting their needs.After gathering the necessary information, I then analyze the performance of the outsourced workers and identify their strengths and areas for improvement. This involves looking at both quantitative data, such as productivity metrics, as well as qualitative data, such as feedback from stakeholders. For example, I may find that an outsourced worker consistently meets their productivity targets but struggles with attention to detail, which would be an area for improvement.Finally, I summarize my findings in a comprehensive report that outlines the performance of the outsourced workers and provides recommendations for further development. This report is shared with the management team, and I also schedule a meeting to discuss the findings and recommendations in more detail. During this meeting, I use examples and specific cases to illustrate my points and ensure that the management team has a clear understandingof the outsourced workers' performance.Overall, my approach to evaluating the performance of outsourced workers involves thorough monitoring, gathering feedback, analysis, and reporting. By following this systematic approach, I am able to provide valuable insights to the management team and support the ongoing improvementof the outsourced workers' performance.中文回答:作为一名外包人员,我的工作涉及评估外包工人的表现,并向管理团队提供反馈。

Project

Project
Cross functional collaboration
Team members work together across different functions to bring diverse perspectives and skills to the project
Flexibility and adaptability
Team members are expected to be flexible and adaptable to changes in project requirements and deadlines
Team collaboration methods
Regular meetings
The team holds regular meetings to discuss progress, challenges, and next steps
the project
Milestone setting
Key project milestones
Identification of significant project milestones that mark important stages of completion
Milestone criteria
Impact analysis
Evaluate the potential sequences of each risk on project objectives, such as cost, schedule, scope, and quality
Risk matrix
Create a risk matrix to prioritize risks based on their probability and impact, allowing for focused mitigation effects

成本对比表 英文

成本对比表 英文

成本对比表英文Cost Comparison Table。

In today's competitive business environment, cost plays a crucial role in decision-making. Whether it is for purchasing a product, selecting a service provider, or investing in a project, understanding the cost implications is essential. A cost comparison table is a valuable tool that allows us to compare different options based on their costs and make informed decisions. In this article, we will explore the importance of cost comparison tables and how they can help businesses optimize their operations.A cost comparison table provides a clear and concise overview of the costs associated with various options. It allows us to compare multiple alternatives side by side, making it easier to identify the most cost-effective solution. The table typically includes categories such as initial cost, ongoing expenses, maintenance fees, and any other relevant costs. By presenting this information in a structured format, decision-makers can quickly assess the financial implications of each option.One of the primary benefits of using a cost comparison table is the ability to identify cost-saving opportunities. By analyzing the different cost components, businesses can pinpoint areas where they can reduce expenses. For example, if a company is considering upgrading its technology infrastructure, the table can help compare the costs of purchasing new equipment versus leasing it. By evaluating the long-term costs, including maintenance and upgrades, the table can highlight the more cost-effective option.Furthermore, a cost comparison table enables businesses to evaluate the total cost of ownership. It goes beyond the initial investment and considers the ongoing expenses associated with each option. For instance, when choosing between two software solutions, the table can include factors such as licensing fees, training costs, and support charges.By considering these additional costs, decision-makers can make a more accurate assessment of the overall financial impact.In addition to cost savings, a cost comparison table also facilitates better resource allocation. By understanding the cost breakdown of different options, businesses can allocate their resources more effectively. For instance, if a company is expanding its operations and needs to hire additional staff, the table can help compare the costs of hiring full-time employees versus outsourcing certain tasks. This information can assist in making informed decisions and optimizing resource allocation.Moreover, a cost comparison table enhances transparency and accountability within an organization. By clearly presenting the costs associated with different options, decision-makers can justify their choices and ensure that they are acting in the best interest of the company. It also allows for better communication among stakeholders, as the table provides a common reference point for discussing costs and making decisions collaboratively.To create an effective cost comparison table, it is important to gather accurate and up-to-date information. This may involve conducting market research, obtaining quotes from suppliers, or consulting industry experts. It is also crucial to consider both quantitative and qualitative factors when comparing costs. While financial figures are essential, other factors such as quality, reliability, and customer support should also be taken into account.In conclusion, a cost comparison table is a valuable tool for businesses to evaluate different options and make informed decisions. By providing a clear overview of costs, it enables organizations to identify cost-saving opportunities, evaluate the total cost of ownership, optimize resource allocation, and enhance transparency. When creating a cost comparison table, it is essential to gather accurate information and consider both quantitative and qualitative factors. By utilizing this tool effectively, businesses can achieve cost optimization and improve their overall financial performance.。

应收账款管理问题及对策研究的英语

应收账款管理问题及对策研究的英语

应收账款管理问题及对策研究的英语Research on Accounts Receivable Management Issues and StrategiesIntroduction:Accounts receivable management is an important aspect of financial management for any organization. It involves effectively managing the credit extended to customers and ensuring timely collections of payments. However, organizations commonly face challenges in managing accounts receivable, which can impact their cash flow and overall financial stability. This research aims to explore the issues related to accounts receivable management and propose strategies to overcome them.Objectives:1. Identify common issues faced by organizations in accounts receivable management.2. Analyze the impact of these issues on an organization's financial stability.3. Explore strategies that can be implemented to mitigate the identified issues.4. Assess the effectiveness of these strategies in improving accounts receivable management.Methodology:This research will adopt a mixed-method approach, including both qualitative and quantitative data collection methods. Primary data will be collected through interviews with financial managers and accounts receivable personnel from selected organizations. A questionnaire survey will also be conducted to gather quantitativedata on accounts receivable management practices and challenges. Secondary data will be obtained from financial reports, case studies, and relevant literature.Analysis:The collected data will be analyzed using statistical techniques, content analysis, and thematic analysis methods. The issues identified will be categorized into common themes, and their impact on an organization's financial stability will be evaluated. The strategies implemented by organizations to overcome these issues will be critically examined, and their effectiveness will be assessed.Findings:This research is expected to identify common issues faced by organizations in accounts receivable management, such as late payments, high bad debts, and inefficient collection processes. The impact of these issues on an organization's financial stability will be quantified, highlighting the significance of effective accounts receivable management. Strategies such as credit risk assessment, invoice automation, and outsourcing collections will be explored as potential solutions to these issues.Conclusion:Effective accounts receivable management is crucial for an organization's financial stability. This research aims to provide valuable insights into the challenges faced by organizations in managing accounts receivable and propose strategies that can be implemented to improve the process. By addressing these issues,organizations can enhance their cash flow, reduce bad debts, and improve overall financial performance.。

寄售库存在OEM委托制造方中适用性研究——基于J公司寄售库存的分析工商管理

寄售库存在OEM委托制造方中适用性研究——基于J公司寄售库存的分析工商管理

Written by Lv Yuanyuan Supervised by Dr. Dong Jielin
III
目录
第 1 章 绪 论....................................................................................................................1 1.1 选题的背景 ................................................................................................................. 1 1.2 研究的目的与意义 ..................................................................................................... 2 1.2.1 研究目的...............................................................................................................2 1.2.2 研究意义...............................................................................................................2 1.3 研究思路 ..................................................................................................................... 3 1.4 研究方法 ..................................................................................................................... 3 1.4.1 图表法...................................................................................................................3 1.4.2 案例分析法...........................................................................................................4 1.5 文论研究框架 ............................................................................................................. 4
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Quantitative Aspects of Outsourcing DealsC.VerhoefFree University of Amsterdam,Department of Mathematics and Computer Science, De Boelelaan1081a,1081HV Amsterdam,The Netherlandsx@cs.vu.nlAbstractThere are many goals for outsourcing information technology:for instance, cost reduction,speed to market,quality improvement,or new business opportuni-ties.Based on our real-world experience in advising organizations with goal-drivenoutsourcing deals,we identified the most prominent quantitative input needed toclose such deals.These comprise what we named thefive executive issues enablingrational decision making.They concern cost,duration,risk,return,andfinancingaspects of outsourcing.They add an important quantitativefinancial/economic di-mension to the decision making process.Based on inferred outcomes for thefiveexecutive issues,we address the easily overlooked aspects of selecting partners,contracting,monitoring progress,and acceptance and delivery conditions for con-tracts.Keywords and Phrases:outsourcing,goalsourcing,smartsourcing,fastsourcing,costsourcing,offshore outsourcing,eastsourcing,tasksourcing,backsourcing,in-sourcing,scalesourcing,profitsourcing,activity-based cost estimation,total cost ofownership(TCO),requirements creep risk,time compression risk,litigation risk,failure risk,overtime risk,deglubitor risk,payback period risk. INTRODUCTIONMany organizations play with the idea to commission their IT activities to third parties. This became known as outsourcing.Reasons to outsource are manifold.For instance, IT is not the core business,or there is a shortage of IT-developers,or the proper com-petences are lacking,or in-house development costs are too high.But also union rights can be an obstacle since in some countries they prevent you from making superfluous programmers available to the industry(fire them)once the information technology be-comes operational.Or,the organization cannot innovate since all their developers have to maintain the aging legacy portfolio.Or the quality level of in-house developed in-formation technology is becoming unacceptable.Or due to a merger the new board of directors concentrated the IT departments into a new separate organization outside the merged company;sometimes in a joint venture with an existing IT service provider.An example is the joint venture between ATOS Origin and Euronext:AtosEuronext.This was a consequence of the merger of the Belgian,Dutch,and French stock-exchanges who outsourced al their IT-activity to this new joint venture.Needless to say that there are many more forms and reasons for outsourcing.The focus in this paper is the out-sourcing of tailor-made applications,so not infrastructure,networks,data centers,etc.1The in-and outsource cycleOften the immediate cause of an outsourcing question can be traced back to what is called the complexity catastrophe[5].Business-critical parts of the IT-portfolio be-came so complex that they are causing all kinds of problems:operational problems, high costs,stopped or stunted innovative power,or other causes.A commonly tried escape from the complexity catastrophe is to abandon the old systems,and start with a clean slate.But then you run the chance of falling prey to the so-called error catastro-phe[5].In this error catastrophe,the past is“buried”and all the knowledge that was built-up in the discarded IT-systems is now lost.Sometimes organizations swing from the one extreme of complexity to the other of error-proneness,by throwing their IT-problems over the fence to an IT service provider who promised to clean up the mess. Although sometimes alongside the systems also their support staff is outsourced,the business technologists hardly ever switch jobs in such deals.The risk that the newly found partner is going to solve the wrong problem then becomes ly, all the errors that were made along the road that led to the complexity catastrophe are made again.After the problems surface(deadlines missed,wrong functionality,cost overruns,operational disasters,etc),executives realize that outsourcing is not a panacea to solve all their IT-troubles,and a typical reaction is then to backsource the IT.Back-sourcing(also called insourcing)is to bring the outsourced IT back in-house,because it is felt that despite its problems,their IT-assets are better off in-house than outsourced. Then the cycle starts again:sooner or later somehow the complexity catastrophe is entered,and the temptation to throw the problem over the fence grows again. Dangerous gamesSwinging between the two extremes is not at all productive,and potentially jeopardizes the survival of organizations.In some cases,significant amounts of money are involved in outsourcing deals.This makes them endeavors with a high risk profile.For instance, in[44]we can read thatThe Rolls Royce deal with EDS was worth45per cent of its market cap-italization,while the Sainsbury’s deal with Accenture was17per cent ofits market capitalizationIndeed,such deals can directly affect share-holder value.And if the cost,duration, risk,return,andfinancing of such deals are not properly addressed,it could lead to nose diving stocks,loss of market share,or even bankruptcy if the decisions were taken“on the golf course”.Financial news sources contain aflurry of articles testifying to this; we mention just three recent ones:•The Financial Times reported on March26,2003that the ICI Group had a share price drop of39%in one day.They attributed this to the failure in its Dutch sub-sidiary Quest to get the supply chain software to run correctly.Due to persistent late or missed deliveries the largest customers went elsewhere[23].•The Dutch version of the Financial Times reported on June20,2003that Van Heek-Tweka(textiles)filed for chapter11protection.The stock-exchange Eu-ronext suspended trading in this stock.This moratorium on payments was nec-essary since two weeks earlier,its most important subsidiary went bankrupt.The major cause of the bankruptcy was a failing IT-project.First of all its costs bal-looned,and second,this system created havoc in the supply chain[7].2•A local stock market news service reported on June26,2003that Hagemeyer (B2B markets)suspended its implementation of the Global Hagemeyer Solution, for establishing a single ICT-platform for all worldwide activities.Since after the system went live in the UK,one of their most important divisions went from86 million Euro positive,to28million negative.Moreover the market share went from22%down to18%.In Australia they will implement this system in a more evolutionary manner,and in the United States they will not implement it at all.The total loss is not disclosed[45].In[25],a systematic study was carried out where a sample of150press announce-ments of IT-investments was related to the market value of the announcers(59publi-cally traded companies).A connection was found between such press announcements and the organization’s market value.The cumulative abnormal return over a three-day period around the investment announcement was measured.This return was negative. So these announcements turned out to have a significant negative impact on the market value of thefirm[25].We are not surprised by this,since IT is a production factor in many organizations,so how you deal with IT affects your market value directly.If you announce these investments in the press,they are usually significant,so the un-derlying information technology is of considerable size.Risk of failure,cost overruns, time overruns,and underdelivery of desired functionality are strongly connected to the size of software(we will see this later on).And since75%of the organizations have a completely immature software process(CMM level1)[32,p.30],almost by definition such investments are exposed to all these risks,resulting in a negative impact on the market value in the long run.Apparently,the investor perceives such announcements not as a value creator,and we think they are right about this.The examples we gave show some of the long-term impacts.Apparently,keen investors do not wait,but react immediately,resulting in a negative impact on the announcer’s market value.Obviously,a more sophisticated strategy is necessary,since gambling with share-holder’s capital puts sustainable growth and the continuity of the organization at risk. By now,the shareholder is protected by the Sarbanes-Oxley Act of2002—an act to pro-tect investors by improving the accuracy and reliability of corporate disclosures[18]. So there are plenty of good reasons why you should get hold on accurate and reliable data to base your IT-outsourcing decisions on.GoalsourcingBased on the in advance identified goals for outsourcing,a balanced relation with others can emerge.Part of that relation is to ensure that the right responsibilities are taken care of by the appropriate organizations.In particular all stakeholders should understand the long-term consequences of the sometimes far reaching decisions.And a sound quan-titativefinancial/economic analysis is without doubt part of a careful decision process. Due to earlier experienced problems,a mix of in-house work and outsourced activity becomes more and more popular.These mixes are driven by a main goal,hence the name goalsourcing(sometimes we see the synonym tasksourcing).The idea of goal-sourcing is that for a given goal,a mix of activities should be established so that parties perform only those tasks that optimally serve the overall goal.There are many ways to mix activities:perform activities in-house that you can do fastest,and commission work to others that they can perform faster than you.This mix can be called fastsourcing:you maximize to speed-to-market.You can also optimize a mix towards costs:do in-house what is cheapest,and outsource to others what they3can do cheaper.This is called costsourcing.A commonly used implementation for costsourcing is to contract certain activities to low-wage countries.A popular name for this stems from the U.S.where programming was contracted to low-wage countries offshore North America.This implementation of costsourcing became known as off-shore outsourcing(in Western Europe the term eastsourcing is used for outsourcing to Eastern Europe).The idea behind an IT-department that is placed outside an organiza-tion is to turn an internal cost center into an external profit center:now you can offer your solution to other parties as well.Examples are the just mentioned AtosEuronext, and Sabre.Thefirst offers services to others than the founding fathers of Euronext, and the latter—a joint venture between American Airlines(AA)and IBM—handles the reservations of both AA and other airline companies.The goal that such deals characterizes is to exploit the economies of scale,hence we sometimes refer to it as scalesourcing,or the more tantalizing profitsourcing.Another mix is to optimize to-wards quality:business-critical information technology that needs to satisfy particular quality standards.This mix amounts to performing those activities in-house that are done best,and commission to third parties those activities that others excel in.We call this smartsourcing.We like to stress that this paper is not a complete how-to guide for outsourcing issues.Rather it serves as a complement to the aspects and issues that according to our experience are not on the radar of decision makers and their supporting staff.We will illustrate ourfindings via a running example on smartsourcing.The results are applicable to many types of outsourcing deals,and are not restricted to the running example.Running exampleThe author advised several organizations about all kinds of outsourcing deals.This paper brings together the experience gained,and the lessons learned during thisfield work.For the sake of explanation we composed a running example containing the most prominent quantitative aspects of outsourcing deals.Of course,we modified all the organization-specific data to ensure strict anonymity of the involved organizations. Our running example is afictitious federal government agency(FGA)that is going to modernize its operations,and is in need for a new management information system supporting its core mission.We call the system CMS,short for Core Mission System. Only very rough requirements and afirst sketch in charcoal of the functional specifica-tions are to our avail for the CMS.Of course,there are a number of existing systems that implement parts of the new functionality but there are also new requirements.De-spite the rather sketchy shape of our CMS,federal politicians already know the date when the system becomes operational:this is part of the Act that mandated construc-tion of the new CMS.Since sensitive data is going to be processed by this system,the FGA opted for a smartsourcing scenario.Becoming a smart buyerWe provide insight into thefive executive issues for this running example,so that you can initiate,evaluate,and effectuate you own outsourcing deals by following a similar path.Although the paper is written from the perspective of the problem-owner,both problem-owners and IT service providers should be in a position to migrate from naive decision makers to realistic and rational negotiators in closing outsourcing deals,after studying our results.Of course,the quantitative data cannot and should not replace4the entire rationale for decision making.Many other considerations shape this process, e.g.,competitive edge,market share,reputational risk,first/second mover advantage, deepness of your pockets,and so on.The results reported on in this paper focus on a much needed,often neglected dimension that can shed light on thefive executive issues:cost duration,risk,return,andfinancing of outsourcing deals.Organization of the paper The rest of this paper is organized as follows.First we discuss how to obtain more information about one of the key indicators we need for our analysis:size information of the information technology under consideration for outsourcing.After we collected such information via various sources and methods,we interpret the information.Based on our best estimate,we address cost aspects,sched-ule,andfinancing issues.Then we address the topic of IT-risks both in a quantitative and a qualitative manner.Subsequently,we assess the returns projected by the busi-ness,by comparing them to the estimated development and operational costs.With all this information,we can turn our attention to often neglected aspects of selection, contracting,monitoring and delivery.Finally we summarize our conclusions. COLLECTING SIZE INFORMATIONFirst,we need to know more about the amount of IT that is subject to an outsourcing ly,the amount of functionality is the key from which you can derive the five executive issues.The most reliable[39,38]metric for size is the function point[1, 10,27,12].At this point you do not need to know what function points are exactly, just think of them as a universal IT-currency converter,giving a synthetic measure of the size of the software.For instance,it takes about106.7Cobol statements to construct1function point of software.It takes128C statements for the same1function point[30].Metrics derived from function points are intuitive in economic analyses. For instance,the cost per function point is comparable to the price per cubic meter for a civil construction.Also this is a synthetic measure,since not all cubic meters are similar,but for economical analysis it is perfect.To outsource maintenance we need to know how much functionality is being out-sourced.This is best measured via source code analysis,with which an as accurate as possible function point count of the existing IT-assets can be conducted.For instance via statement counting and using the language specific factors(106.7,128,...)to re-cover the function point totals.In case of new development you use the requirements for a function point analysis to obtain an idea of the size[12].For our running example, the Core Mission System(CMS)of thefictitious Federal Government Agency(FGA), several size estimates were carried out.Ball-park estimateFirst of all,a fellow federal government agency is asked for advise.Make sure that this friendly estimate is void of commercial bias,and purely technology-driven.Based on similar efforts they already carried out,they came with a ball-park estimate:be-tween7500and15000function points.Although this is a very rough idea,it gives information:we are talking a multi-million dollar investment here.5Measuring the bandwidthAfter thisfirst friendly advise,we probed a few outsourcers for an initial cost esti-mate based on different pricing schemes.One scheme was to see what the minimal size would be,another scheme gave an indication of the maximal size.We used the following pricing schemes:•Based on your idea of the number of function points,give us a price,and if it is going to cost more,we will pay you additionally for that.For this extra cost, provide us with a price per function point.•Based on your idea of the number of function points,give us afixed price,and if it is going to cost more,bad luck for you.We took the minimum of the answers on thefirst question,and the maximum of the answers on the second question.This gave us a range between6000and18000 function points.For this estimate it is not necessary to insist on certified function point counting specialists.You are not after the most accurate counting,but assessing potential bandwith.Going Scrooge Note that in some situations you cannot use this method openly: some countries have regulations regarding public offerings that forbid measuring the bandwith like this.Then you can use shrewd tricks to obtain the bandwith data.One simple trick is to commission a potential outsourcer to carry out a function point analy-sis.Often such outsourcers are doing other things for you already,so the next thing you do is to leak secret information to these spies that one of the above pricing strategies is going to be in the public offering.No one is ever going tofile you a lawsuit if another pricing strategy is followed later on,since officially they do not know about it.For people feeling a little uncomfortable about manipulative methods,just remember that you are responsible for a multi-million dollar deal and that government regulations are not always the most optimal way to close them.We imagine that Ebenezer Scrooge, the cruel miser created by Charles Dickens in A Christmas Carol could have invented this trick.Indicative function point countAfter these ball-park estimates,an independent certified function point analyst is hired to carry out an indicative function point analysis.The documentation is not yetfit for a detailed function point analysis.After going through the preliminary requirements doc-uments and the functional specifications a number of indicative estimates were made using three indicative methods.One on the basis of datafiles(5239FP),one based by weighing the requirements(6700FP),and an indication based on the functional spec-ifications(7692FP).The average was taken:6544function points.The confidence interval for each method was50%,and for the average30%was taken.For our purpose it is not important what the technical details are that the certified function point analyst used.For decision making it is important whether you can trust the data and what to do and not to do with it.BackfiringNext,we made use of the fact that some functionality of the Core Mission System was available in existing IT-assets within the ly,parts of the work process6were already implemented using outdated technology marked for retirement after suc-cessful implementation of the new CMS.The legacy systems that were identified for replacement were counted using backfiring.A third party was hired to conduct this spe-cialized task.Basically,backfiring is counting the statements using an automated tool, and then using a table with factors turning the statements into function points.If you find1153C statements,using the benchmarked C-specific conversion factor of128, this represents about9function points of software.The accuracy of backfiring from logical statements is approximately±20%[32,p.79].The outcome of this source code analysis gave us several totals for statements in several languages,and a total of 6724function points.INTERPRETING THE COLLECTED INFORMATIONWe have collected size information using different sources,different means,and for different purposes.Now we are in a position to review and interpret the data.The ultimate goal is to come up with two data points:an indicative internal function point total and a politically correct confidence interval.We summarized all the data points in Table1.Method max FP confidence(%)friendly ball-park15000N.A.enemy ball-park18000N.A.264752393350670038467692backfiring806820a N.A.=Not ApplicableTable1:Some indicative data on function point totals and confidence intervals.Ball-park EstimatesThe function of both ball-park estimates is to develop an idea of the order of magnitude. For now think of the bandwith somewhere in between6000and7500at the minimal side,and between15000and18000at the high side.No matter what the precise num-bers are,one thing is clear:the running example is clearly a major investment,and it is worth the effort to invest in some more involved estimates.But these will cost you money.To give you an idea,for the running example the effort for the function point analyst was about50hours.The effort for backfiring is measured differently,but think in terms of a few dollar cents per physical line of code.Function point estimatesIn government situations,it is a good idea to use certified analysts,since in case of major failure,it might come to congressional hearings.And then you at least did everything possible to obtain the best information.Moreover,in the United States,out-sourcing deals and their negotiations are subject to a law commonly known as TINA,7which is the Truth In Negotiations Act.TINA prescribes certified,calibrated,paramet-ric techniques as a basis for estimating everything necessary for acquisition,including information technology.A complete handbook giving directions is available on the Internet[17].Also,expect counterchecks in the form of assessments of your plans by external advisors.So there are plenty of reasons to buy the best knowledge available.No matter how careful you are,also information from certified analysts or certified estimating techniques is notflawless.In our case we found some counting errors,scru-tinized proprietary methods used in counterchecks,and cross-examined function point analysts.Reviewing such documents almost always surfaces a few major omissions—that you cannot afford since you base all other estimates on function point totals.We like to mention an error that is often made,but rarely recognized as such.So this deserves further elaboration.The three different methods that were used were averaged,and the aggregated confidence interval went from50%to30%.Although the 50%confidence intervals were used in the report,we found out during our interview with the specialist that this amount was the numerical representation of his feeling that it was an unknown but probably large variation.The problems are summarized:•you cannot take the average of the three methods;•but even if you can,the error margin is not decreasing.Let’s see how this works by transposing from the world of software size estimating to thefield of length determination for which many of us have more intuition.Suppose we have three methods to estimate the distance between two points.•A certain muscular tension in your legs represents approximately1meter.Just walk the distance,you count1023steps.Leading to1023meter.•Hop in a car,reset the day counter,and drive the distance,look at the day counter.It shows983meter.•Use a laser beam,and calculate the distance from the time it takes for the light to travel back and forth.This leads to981.04meter.Question:would you take the average of the three methods for the best approxima-tion of the distance?Just the same,it is useless to average the outcomes for the three methods that were used to calculate the size of the Core Mission System.You will take the most accurate one,but since the confidence intervals are in fact unknown,you cannot.Now the error margin.Suppose for a minute that you can average the three meth-ods,then the error margin is not diminishing.It stays the same:50%.That is because there is no margin decreasing effect in place.Such an effect can be accounted for when the same method is applied repeatedly.For instance,repeat the walk10000times,and the error margin will become smaller,and after infinite walks,it will approach the laser beam measurement.But there is no repetitive effect in the function point estimates.So, do not believe averages and diminishing variation unless it is absolutely clear that this makes sense.Backfiring estimateFrom the backfiring estimate we learned that there are6724function points of software in production.One possible way of interpreting this data point is to apply Kim Ross’s8rule of thumb,which is that the function point count of an upgraded system will be twice that of the old one[58].This amounts to13448function points.Horse tradingWith all the data points,and their interpretation,thefinal task is to come to afirst estimate that satisfies the following criteria:•it is justifiable given the investigations,•it has enoughflexibility to manoeuvre within the own organization,when the project scope changes.This part is not mathematical but political.Depending on the status of a project, the political volatility,and other soft aspects,it is customary to downplay or boost the numbers that come out of a data collection exercise.For our running example,thefinal responsible person is the Secretary under which thefictitious Federal Governmental Agency resorts.Since money allocation for such a project cannot easily be changed when new information necessitates this,you have to be careful with the numbers you disclose.In this case it was decided to use a function point total that would give with a30%confidence interval the maximal total function point count(7692FP)and round that to one digit significance.Then this was rounded further to numbers with a pre-liminary feel.The outcome of this political calculation was that the preliminary data to work with for the Core Mission System should be10K function points±25%.Of course this information is not broadcasted widely,but used internally to base initial decision making on.This and other estimates are then used to base more involved cal-culations ly,to infer data for thefive executive issues:cost,duration,risk, return,andfinancing.Dealing with arbitrary numbersSome readers may think at this moment:but what if my estimate is not10K but some other number,for which no public benchmarks exist?Namely,for different sizes of software the production rates can vary substantially and assignment scopes can differ a little as well.Therefore,you cannot always apply a benchmark for one size to another size.Here we show that if the numbers would have been different,we can obtain the desired answers;this only takes a bit more work.Suppose our best estimate for the CMS is the backfiring result:6724function points,plus or minus20%.Suppose we need to know the average work hours per function point for this size and its confidence interval.There are two possibilities to answer this question:•Use professional software cost estimation tools.•Use public benchmarks,and statistical and mathematical techniques.To answer our question using commercially available tools,we refer you to the ven-dors.Incidentally,some large organizations use a combination of several commercial tools,in-house developed tools,and statistical/mathematical analysis.We will show how to answer the above question by doing the math.Although there are no precise data points for6724function points in the public domain,we can infer the numbers from public data.In[32,p.191],we found that for in-house developed9。

相关文档
最新文档