Claim Missing Document
Check
Articles

Found 2 Documents
Search

Determining Multi-Criteria Supplier Selection towards Sustainable Development of IT Project Outsourcing Fauziah Baharom; Prashaya Fusiripong; Yuhanis Yusof
International Journal of Supply Chain Management Vol 6, No 3 (2017): International Journal of Supply Chain Management (IJSCM)
Publisher : International Journal of Supply Chain Management

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (13.161 KB)

Abstract

Due to competitiveness in the global business, many organizations have sought alternative to improve their businesses and operations by outsourcing projects and this includes Information Technology (IT) projects. Selecting the most suitable IT supplier is important to ensure sustainable development of the projects. Supplier is selected based on a set of criteria used in the decision process. The criteria can be comprised into tangible and intangible criteria. Many studies have attempted to determine the criteria to be used in selecting IT supplier, nevertheless, it has yet to be reported on a standardize set of criteria to be used in IT outsourcing projects. Thus outsourcing decisions are often made under uncertainty and incomplete information which leads to weak decision and high risk of projects failure. Therefore, the study aimed to determine multi-criteria for supplier selection in order to ensure the sustainable development of IT outsourcing projects. The criteria were identified using comprehensive review approach that utilizes searching information related to multi criteria supplier selection in IT outsourcing and successful criteria of IT outsourcing projects. As a result, the identified criteria is proposed as a standardize criteria in selecting supplier for IT outsourcing projects. Such a contribution is hoped to benefit businesses for various IT outsourcing projects.
A Secured e-Tendering Model Based on Rational Unified Process (RUP) Approach: Inception and Elaboration Phases Haslina Mohd; Fauziah Baharom; Norida Muhd Darus; Mohamed Ali Saip; Zaharin Marzuki; Azman Yasin; Muhammad Afdhal Muhammad Robie
International Journal of Supply Chain Management Vol 5, No 4 (2016): International Journal of Supply Chain Management (IJSCM)
Publisher : International Journal of Supply Chain Management

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (13.161 KB)

Abstract

Due to the rapid rise in the e-Tendering transaction over the internet and the increasing use of e-Tendering solution by large organizations, there is a need to construct a secured e-Tendering model to ensure some security mechanisms such as confidentiality, integrity, and accessibility of the document are embedded in the e-tendering model. This to ensure the e-tendering transaction is secured and the most important is to gain trust from the e-Tendering stakeholder. Therefore, there is a need to develop a secured e-Tendering model as a guideline to e-tendering developers in developing the system. The Rational Unified Process (RUP) is the most appropriate system development methodology that can guide researchers in generating secured artifact. The RUP has been used by many researchers to construct a secured application model in various researches and projects. This due to the ability of the RUP in guiding researchers to deliver secured artifacts through Inception and elaboration phases. Therefore, this study aims to construct a secured e-tendering artifacts based on RUP. The Unified Modeling Language (UML) is used to generate the secured e-tendering artifacts. This paper discusses the generation of use case, misuse case and class diagrams based on security mechanism that need to be embedded in the e-Tendering model. This study also found that, the RUP is one of the best system development methodology that can be used as one of the research methodology in the Software Engineering domain, especially related to secured design of any observed application. This methodology has been tested in various studies, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth. . This study may contribute to the software industries in developing a secured system application in the future, and also to the secured system modeling domain.