The Black Book of Outsourcing: How to Manage the Changes, Challenges and Opportunities
Outsourcing and research gurus Douglas Brown and Scott Wilson chart a course of advice for business leaders charged with managing sourcing initiatives, present a wealth of opportunities for job seekers, and offer insights for entrepreneurial thinkers and investors worldwide
SCOTT WILSON is cofounder of the Out-sourcing Management Institute and President of the renowned Outsourcing Career Center, the first international executive search firm serving outsourcing professionals and management exclusively. He is also an entrepreneur and a leading public speaker on outsourcing. He lives in Clearwater, Florida, with his wife Marianne and their two children.
Table of Contents
Introduction: Outsourcing: Opportunities and Challenges.
Part One: How to Plan, Lead, and Manage Outsourcing Initiatives.
Chapter 1: Overview of the Outsourcing Process.
Chapter 2: Making the Decision to Outsource.
Chapter 3: What You Need to Know before You Start.
Chapter 4: Assessing Cost, Benefit, and Risk for Your Outsourcing Venture.
Chapter 5: Outsourcing Options.
Chapter 6: Selecting Your Suppliers and Vendors.
Chapter 7: Managing Your Outsourcing Vendors.
Chapter 8: Navigating Contracts and Negotiations.
Chapter 9: New Career Opportunities in Outsourcing Management.
Chapter 10: Finding Top Outsourcers: Vendor Directory.
Chapter 11: Avoiding Common Outsourcing Mistakes.
Part Two: The Indispensable Guide to Finding an Outsourcing Career.
Chapter 12: Strategizing for Success in the New Global Economy.
Chapter 13: Learning to Market Yourself in the Global Economy.
Chapter 14: Hot Jobs in Outsourcing.
Chapter 15: Finding an Offshore, Nearshore, or Bestshore Job.
Part Three: The Indispensable Guide for Outsourcing Entrepreneurs.
Chapter 16: Starting Down the Entrepreneurial Path to Outsourcing.
Chapter 17: Capitalizing on the Outsourcing Start-Up Boom.
Chapter 18: Starting an Outsourcing Business.
Sign up now »
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Users, cats more likely hack culprits than cyber-espionage: Trustwave
- AusCERT 2013: Home-electronics gear’s UPnP as insecure in Australia as rest of world: Metasploit
- AusCERT 2013: Big data skills help beat the bad guys, says HP
- Growing mobile malware threat swirls (mostly) around Android
- In pictures: AusCERT 2013 Day One