Sunday, December 29, 2019

The Inmate Subculture in United States Prisons An...

The Inmate Subculture in United States Prisons: An Overview The Subculture Phenomena within Prisons To be able to discuss the issue of the inmate sub-cultures in prison I will first have to discuss what subcultures are and major reasons that they form. First of all the term subculture in general is kind of like a small culture within and not always accepted by members of a larger one known as a society. Societies as a whole are very large and contain many individuals within them, and let us face it it is human nature to group together or congregate with individuals that have similar interests. This causes the whole to split off into smaller groups and this process is how subcultures form; however, if you eliminate certain elements†¦show more content†¦2. Isolation from the inmate’s friend and family support structure which results in a need for belonging. 3. Confinement and the loss of an inmate’s freedom are also among the leading causes for subcultures to develop in a prison setting. 4. Overcrowding with so many prisoners we are running out of room to house them all and some prisons have had to convert what was to have been two man rooms into four man rooms. 5. Stress is the resulting effect of all of the previous environmental factors within the prisons and is not exclusive to the inmates but is also a problem for the Department of Corrections personnel as well. The inmates in prisons regardless of their age have adapted their own behavior norms, ideals, and their own social code or code of ethics therefore; the inmates have truly set themselves apart from the guards and society in general. The Juvenile Inmate Social Code The inmate social codes among juveniles are used to unite the inmates against the control of the facility staff that is trying to rehabilitate them and it serves a second purpose of attempting to strengthen the bonds among the inmates. The following is the Juvenile Inmate Social Code according to Turnstile Justice the second edition: 1. Exploit whomever you can: The conduct norms suggest that the powerless may be victimized in any conceivable way. 2. Don’t kiss ass: This Tenet warns inmates not to be dependentShow MoreRelatedA Research Project On Immigration Detention Centers9708 Words   |  39 PagesConclusion, Recommendations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...36 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦.41 Appendix A†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.....46 â€Æ' List of Illustrations Illustrations 1 – Growth in for-profit immigration detention compared to U.S. state and federal Prison Population†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.46 2 – DHS complains investigations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦....47 3 – Allocation of ICE funding requested by President in FY 2013..............................48 4 – Number ending ICE custody, by DetentionRead MoreCultural Analysis of North Korea Essay12722 Words   |  51 PagesINTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...6 NORTH KOREA HISTORY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...7 GEOGRAPHICAL SETTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦11 Figure 1 Geographic Map†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..11 ECONOMIC BACKGROUND†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..14 Figure 2 United States GDP per Capita†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.16 Figure 3 North Korea GDP per Capita†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...17 POLITICAL AND LEGAL SYSTEMS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...21 EDUCATION AND LANGUAGE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.26 Education†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.26 FigureRead MoreThe Social Impact of Drug Abuse24406 Words   |  98 Pages. . . . . . . . . . . . . . . . . Distribution and illicit trafficking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Consumption of drugs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Overview of opium/heroin and coca/cocaine . . . . . . . . . . . . . . . . . . . . . . . . . . Part two: impact of drug abuse II. Social implications of drug abuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 A. B. C. D. E. FamilyRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 PagesEdition Reed−Lajoux and others . . . This book was printed on recycled paper. Management http://www.mhhe.com/primis/online/ Copyright  ©2005 by The McGraw−Hill Companies, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without prior written permission of the publisher. This McGraw−HillRead MoreDeveloping Management Skills404131 Words   |  1617 Pagestextbook appear on appropriate page within text. Copyright  © 2011, 2007, 2005, 2002, 1998 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical

Saturday, December 21, 2019

The Deterrence Theory By Thomas Hobbes - 1347 Words

An eye for an eye, and a tooth for a tooth. Isn’t that the motto that we should live by? Or should we take into consideration who has the most money, grew up in the nicest neighborhood, or even the context or their skin color? Although, we would love to believe that we live in a perfect world where everyone is given the justice that they deserve unfortunately, it does not always end up that way for some. Indeed, the Deterrence Theory then comes into play making sure that not only is everyone treated equally but, also making sure that it sees fit that the punishment given is carefully taken into consideration. The Deterrence Theory was first introduced by theorist Thomas Hobbes who was then followed up on the theory by Cesare Beccaria, and Jeremy Bentham who later added a more modern, updated version of the theory. This theory first came about during the military when the men that were being introduced to nuclear weapons that could cause massive destructive damage when it was put to use. The Deterrence Theory then came into play when it was time for a person to take up for their actions that person has caused and, being able to pay the price at hand for what they have done without being able to put the blame on another person or get away with it without being sure that you would also get the proper punishment. The reason why this theory has more than one theorist is due to â€Å" once one looks in detail at cases of international conflict, it becomes apparent that theShow MoreRelatedDeterrence Theory And The Criminal Justice Field Essay1578 Words   |  7 PagesIntroduction Deterrence can be defined as an act of threat to prevent another party from certain actions. Deterrence theory is based upon a belief that citizens choose to obey or violate the law after determining the advantages and disadvantages of their actions (Paternoster, 2010). Deterrence, in the criminal justice field, dissuades individuals from criminal activity and from continuing to live a life of crime after committing the first criminal like act (Dutton, 2014). Law enforcement providesRead MoreTheories Of The Age Of Enlightenment1026 Words   |  5 Pagesdeath. This way of thinking and punishing offenders continued through the 1600’s until the Age of Enlightenment. It was during this time that Thomas Hobbes wrote a book proposing theories that would change the way many people think about other individuals and their actions. Thomas Hobbes’ most influential contributions to the Age of Enlightenment were his theories on an individual’s ability to rationally choose t heir own actions, free will, and the idea of social contract, which explained that peopleRead MoreHow Rational Choice And Deterrence Theory Around The World1547 Words   |  7 Pagescommit a crime again. Now I’m going to talk about these two topic more broad and let you in on how Rational Choice and Deterrence Theory around the world most places then other plays a great big part in people everyday life, and how you can see from the beginning who was the creators to make these great idea up and put them into play, to what is being done, and even more if this theories really works in the world that we live in now. Now when it comes to the whole foundation of how it was all put togetherRead MoreThe Definition Of Labeling Theory And Deterrence Theory1116 Words   |  5 Pagesby society as different, it is hard to stray from the label that people know you by. Even after seeing someone else make the wrong decisions, it is easy to have mixed emotions and decipher from what is right and what is wrong. Labeling theory and Deterrence theory help explain the behavior patterns of criminals and how they are pushed to the point of committing crime. Criminals sometimes have mental and physical disabilities that can alter the way they make decisions and integrate themselves intoRead MoreThe Social Contract : Hobbes Vs. Rousseau1457 Words   |  6 PagesThe Social Contract: Hobbes vs. Rousseau Since the beginning of the modern age, governments and states have existed in order to maintain moral law. Essentially these institutions are for the greater good of humanity. However, little thought is ever given to how humans lived without governments. Each and every person in the modern age is born into a state, and becomes a part of that state regardless of their will. The concept that humans are born into a state is derived from the social contractRead MoreThe War Of The Golden Stool887 Words   |  4 PagesThere are multiple theories in relation to the prevention of war and even theories to support why there are wars. War is can be caused by the opposing interests and capabilities more specifically socio-cultural difference and also similarities between the two parties. Significant changes in the balance of power that can be caused by individual perception and expectations. Wars have been started over the simplest and mediocre things such as The War of the Golden Stool (1900) fought of the disrespectRead MoreThe Debate Over Death Penalty1618 Words   |  7 Pagesperspective, should not risk the life of innocent people due to moral prohibition to take a person’s life. This discourse also has some philosophical foundations. Thomas Hobbes in his famous work ‘Leviathan’ offered a new understanding of human nature where human beings are described as neither good nor evil (Bosworth 234). According to Hobbes, people are motivated by their own self-interest. In order to avoid conflicts and enable human communication and cooperation, people introduced a system of isolationRead MoreContemporary Utilization Of Classical Perspective1575 Words   |  7 Pagesexplain the contemporary utilization of the classical perspective of criminology. Deterrence theory, rational choice theory, routine activities theory, and lifestyle theory will be explained and defined thoroughly detailing each theory and provide a historical background, theorist(s) invol ved, prior literature, scientific methods, results, personal opinions, and policy implications for each theory. These theories are still being utilized in law enforcement in present day enforcement of laws andRead MoreThe Various Theories of Criminology 1276 Words   |  5 Pagesdeveloping the theories. What role do criminologists play in the field of criminology? The term criminologist is used to describe any individual who is employed in the criminal justice field regardless of formal training. (Schmalleger) These individuals study crime, criminals, and criminal behavior. Those responsible for collecting and examining physical evidence of crime are referred to as criminalists. Criminologists perform a variety of activities such as data gathering, data analysis, theory constructionRead MoreThe War On Drugs And Mass Incarceration Essay1439 Words   |  6 PagesSeptember 16, 1968 â€Å"As I look over the problems in this country, I see one that stands out particularly: the problem of narcotics (Hill et al., 2012)† President Reagan has had multiple positive outcomes with the War on Drugs. He has had the deterrence theory which was in place to decipher why one would commit a deviant or criminal act. Reagan also had many increases of consequences for the behavior an individual had. While President Reagan was in administration, he focused on battling the use of

Friday, December 13, 2019

Top 10 Risks of Offshore Outsourcing Free Essays

string(26) " personnel on an account\." Top 10 Risks of Offshore Outsourcing Summary:  Offshore outsourcing is growing 20%-25% per annum, with little evidence of slowing. Indeed, while most enterprises experience initial resistance, most technical issues are readily resolved and geopolitical risk is deemed insignificant after careful evaluation. By Dean Davison | December 9, 2003 — 00:00 GMT (16:00 PST) Offshore outsourcing is growing 20%-25% per annum, with little evidence of slowing. We will write a custom essay sample on Top 10 Risks of Offshore Outsourcing or any similar topic only for you Order Now Indeed, while most enterprises experience initial resistance, most technical issues are readily resolved and geopolitical risk is deemed insignificant after careful evaluation. Even the current political fervor about jobs being moved offshore via outsourcing is not impacting the demand or strategy of IT organizations. Offshore outsourcing will continue to grow as a â€Å"labor arbitrage† model until 2008/09. META Trend: During 2004/05, outsourcing will divide into commodity and transformational services. Infrastructure services will mirror grid-computing structures and develop consumption-based pricing (a. k. a. , â€Å"utility services†). Through 2006/07, transformational services (e. g. application development maintenance and business process outsourcing) will segment along horizontal (function commonality) and vertical (specialized) business process/services outsourcing functions. Although vendors will attempt to bundle infrastructure with â€Å"value† services, clients will demand â€Å"line item† pricing by 2008/09. Through 2004/05, IT organizations will outsource discrete projects/functions offshore (e. g. , from applicatio n development projects to specific call center support). Growth will continue at 20%+. Offshore strategies by domestic vendors will shift business from large, integrated outsourcing contracts, but most IT organizations will still develop strategies that focus on pure-play offshore vendors. The top 10 risks of offshore outsourcing are as follows. 1. Cost-Reduction Expectations The biggest risk with offshore outsourcing has nothing to do with outsourcing – it involves the expectations the internal organization has about how much the savings from offshore will be. Unfortunately, many executives assume that labor arbitrage will yield savings comparable to person-to-person comparison (e. . , a full-time equivalent in India will cost 40% less) without regard for the hidden costs and differences in operating models. In reality, most IT organizations save 15%-25% during the first year; by the third year, cost savings often reach 35%-40% as companies â€Å"go up the learning curve† for offshore outsourcing and modify operations to align to an offshore model. 2. Da ta Security/Protection IT organizations evaluating any kind of outsourcing question whether vendors have sufficiently robust security practices and if vendors can meet the security requirements they have internally. While most IT organizations find offshore vendor security practices impressive (often exceeding internal practices), the risk of security breaks or intellectual property protection is inherently raised when working in international business. Privacy concerns must be completely addressed. Although these issues rarely pose major impediments to outsourcing, the requirements must be documented and the methods and integration with vendors defined. 3. Process Discipline (CMM) The Capability Maturity Model (CMM) becomes an important measure of a company’s readiness to adopt an offshore model. Offshore vendors require a standardized and repeatable model, which is why CMM Level 5 is a common characteristic. META Group observes that approximately 70% of IT organizations are at CMM Level 1 – creating a gap that is compensated for by additional vendor resources on-site (see  Figure 1). Companies lacking internal process model maturity will undermine potential cost savings. 4. Loss of Business Knowledge Most IT organizations have business knowledge that resides within the developers of applications. In some cases, this expertise may be a proprietary or competitive advantage. Companies must carefully assess business knowledge and determine if moving it either outside the company or to an offshore location will compromise company practices. 5. Vendor Failure to Deliver A common oversight for IT organizations is a contingency plan – what happens if the vendor, all best intentions and contracts aside, simply fails to deliver. Although such failures are exceptions, they do occur, even with the superb quality methodologies of offshore vendors. When considering outsourcing, IT organizations should assess the implications of vendor failure (i. . , does failure have significant business performance implications? ). High risk or exposure might deter the organization from outsourcing, it might shift the outsourcing strategy (e. g. , from a single vendor to multiple vendors), or it might drive the company toward outsourcing (if the vendor has specific skills to reduce risks). The results of risk analysis vary between companies; it is the process of risk analy sis that is paramount. 6. Scope Creep There is no such thing as a fixed-price contract. All outsourcing contracts contain baselines and assumptions. If the actual work varies from estimates, the client will pay the difference. This simple fact has become a major obstacle for IT organizations that are surprised that the price was not â€Å"fixed† or that the vendor expects to be paid for incremental scope changes. Most projects change by 10%-15% during the development cycle. 7. Government Oversight/Regulation Utilities, financial services institutions, and healthcare organizations, among others, face various degrees of government oversight. These IT organizations must ensure that the offshore vendor is sensitive to industry-specific requirements and the vendor’s ability to: 1) comply with government regulations; and 2) provide sufficient â€Å"transparency† showing that it does comply and is thus accountable during audits. The issue of transparency is becoming more significant as requirements such as the USA PATRIOT Act and the Sarbanes-Oxley Act place greater burdens of accountability on all American corporations. 8. Culture A representative example: although English is one official language in India, pronunciation and accents can vary tremendously. Many vendors put call center employees through accent training. In addition, cultural differences include religions, modes of dress, social activities, and even the way a question is answered. Most leading vendors have cultural education programs, but executives should not assume that cultural alignment will be insignificant or trivial. 9. Turnover of Key Personnel Rapid growth among outsourcing vendors has created a dynamic labor market, especially in Bangalore, India. Key personnel are usually in demand for new, high-profile projects, or even at risk of being recruited by other offshore vendors. While offshore vendors will often quote overall turnover statistics that appear relatively low, the more important statistic to manage is the turnover of key personnel on an account. You read "Top 10 Risks of Offshore Outsourcing" in category "Essay examples" Common turnover levels are in the 15%-20% range, and creating contractual terms around those levels is a reasonable request. Indeed, META Group has seen recent contracts that place a â€Å"liability† on the vendor for any personnel that must be replaced. The impact of high turnover has an indirect cost on the IT organization, which must increase time spend on knowledge transfer and training new individuals. 0. Knowledge Transfer The time and effort to transfer knowledge to the vendor is a cost rarely accounted for by IT organizations. Indeed, we observe that most IT organizations experience a 20% decline in productivity during the first year of an agreement, largely due to time spent transferring both technical and busine ss knowledge to the vendor. Many offshore vendors are deploying video conferencing (avoiding travel) and classroom settings (creating one-to-many transfer) to improve the efficacy of knowledge transfer. In addition, employee turnover often places a burden on the IT organization to provide additional information for new team members. Business Impact: Offshore outsourcing can reduce IT expenditures by 15%-25% within the first year. Longer term, process improvements often make great impacts on both cost savings and the quality of IT services delivered. Bottom Line: As IT organizations consider the vast benefits and allure of offshore outsourcing, they must balance the risks and uncertainties with the potential for labor arbitrage. Strategic Decision Challenges Researchers have applied different perspectives to understand sourcing decision, the key among them being production and transaction cost economics (Ang Straub, 1998), resource-based views (RBV), and resource-dependence views (Teng et al. , 1995). The Resource-Based View (RBV) argues that a firm’s competitive advantage depends heavily on its resources, as well as how these are used. Resources that are valuable and rare can lead to the creation of competitive advantage (Wade Hulland, 2004). Competitive advantage can be sustained over longer time periods to the extent that the firm is able to protect against resource imitation, transfer, or substitution. The knowledge-based theory (KBV) of the firm considers knowledge as the most strategically significant resource of the firm. Its proponents argue that, because knowledge-based resources are usually difficult to imitate and socially complex, heterogeneous knowledge bases and capabilities among firms are the major determinants of sustained competitive advantage and superior corporate performance. There is certain level of paradox in outsourcing when viewed from RBV or KBV prisms. Proponents of outsourcing have often used RBV to justify outsourcing decisions. The lack of resources, or resource gaps, that a firm has can also be rectified by acquiring resources from outside the firm boundaries by souring arrangement (Teng et al. , 1995). Outsourcing has been considered as a part of the way that firms assemble knowledge from suppliers (Shi et al. , 2005). Thus, information systems (IS) outsourcing can be seen as a mechanism to integrate IS knowledge from IS vendors. Knowledge sharing by both, client and supplier sides, is considered to be a success factor in outsourcing (Lee, 2001). However, some researchers have raised concerns regarding the potential loss of internal know-how through IS outsourcing (Willcocks et al. , 2004) and the potential loss of intellectual property (Chen et al. ,2002; Evaristo et al. , 2005). Outsourcing involves the inherent risk of forgoing the development of the knowledge base of the firm. Hoecht and Trott (2006) argues that innovative capability of the firm is largely dependent on cumulative knowledge built up over many years of experience. Innovative ability cannot be simply bought and sold. Earl (1996) argues that innovation needs slack resources, organic and fluid organizational processes, and experimental and entrepreneurial competences – all attributes that external sourcing does not guarantee. Aron (2005) describes these risks as the long-term intrinsic risks of atrophy. These risks are an inevitable byproduct of the process of outsourcing. Over time, if a company outsources an activity completely, it loses the core group of people who were familiar with it. They retire, they leave for employment where their skills are more alued, or they simply become less technically competent and out of date. Reliance on outsourcing is problematic, not only because key areas of expertise may be gradually lost to the outsourcing organization but also because outside providers may not have the desired leading edge expertise over the long-term (Earl, 1996) or may spread their expertise among many clients so that it degrades from core competency to mere industry standard. Hoecht Trott (2006) remind senior managers of the harm that may be inflicted on the ability of the organization to survive in the long term if its core competencies are slowly eroded through outsourcing. A related issue is that of the strategic intent (DiRomualdo Gurbaxani, 1998) behind the offshore outsourcing decision by organizations. Strategic intent in this context can range from an improvement in the IS unit of the organization (which generally provides the lowest degree of benefits), an improvement in the business processes of the overall organization, or a commercial intent to generate profits by developing core expertise in the domain of outsourced IT service (Kishore et al. , 2004–2005). The commercial intent is exemplified in the oft-cited case of American Airlines who established a new subsidiary to sell airline reservation related services commercially to other airlines and travel agents using Sabre, its airline reservation system, and to generate new revenues and profits from this line of business. Strategic intent behind outsourcing is an important challenge as it has been shown that stock market reacts favorably and rewards companies when they outsource with an intent of creating the maximum returns for the firm (Agrawal et al. 2006). On the vendor side, vendors can develop their expertise through building knowledge from experiences and holding the knowledge for competitive advantage. Szulanski (Szulanski, 1996) identifies lack of incentives, lack of confidence, turf protection, and the â€Å"not invented here† syndrome as motivational factors potentially influencing knowledge transfer in outsourcing arrangements. This two-sided nature of knowledge transfer is expected to create asymmetric information leading to outsourcing failures. From a client’s view several challenges then arise including deciding what is the right proportion of IT function insourced or outsourced, and what IT application should be outsourced or kept within for strategic reasons. How to cite Top 10 Risks of Offshore Outsourcing, Essay examples