Abstract
You’ve done your homework. You’ve used the Business Model Mapping Toolkit and now have a preliminary understanding of which Sourcing Business Model is the most appropriate for your situation. But how do you take this information and turn it into action? In the past, you would have used a formal multistep strategic sourcing process. (Exhibit A1 in the appendix presents the most popular models.) But as we noted in chapter 1, existing models have many weaknesses, resulting in lower-than-expected performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Notes
Gerard Chick and Robert Handfield, The Procurement Value Proposition (London: Kogan Page, 2012), p. 201.
Kate Vitasek telephone interview with Kelly Barner, March 2015. Jeanette Jones and Kelly Barner, Supply Market Intelligence for Procurement Supply Market: Research, Process and Resources (Plantation, FL: J. Ross Publishing, 2015).
Helen Clegg and Susan Montgomery, “7 Steps for Sourcing Information Products,” Information Outlook 9, no. 12 (December 2005), http://www.atkearneypas.com/knowledge/articles/2005/7steps.pdf; accessed March 20, 2015, quote p. 37.
Peter Kraljic, “Purchasing Must Become Supply Management,” Harvard Business Review (September 1983), https://hbr.org/1983/09/purchasing-must-become-supply-management; accessed July 5, 2015.
Kate Vitasek, Karl Manrodt, and Srini Krishna, Vested Case Study: Microsoft/Accenture OneFinance (Knoxville: University of Tennessee, College of Business Administration, 2010).
George Kimball, “Risk Allocation Liability Limits and Disputes in Outsourcing,” Outsourcing 2010: Structuring, Negotiation, and Governance, pp. 12–21; http://www.arnoldporter.com/resources/documents/Allocating_Risks_Outsourcing_2003.pdf; accessed July 6, 2015.
Rachel Abrams, “Target Puts Data Breach Costs at $148 Million,” New York Times, August 5, 2014; http://www.nytimes.com/2014/08/06/business/target-puts-data-breach-costs-at-148-million.html?_r=0; accessed March 29, 2015.
Kate Vitasek, Karl Manrodt, and Jeanne Kling; Vested: How P&G, McDonald’s, and Microsoft Are Redefining Winning in Business Relationships (New York: Palgrave Macmillan, 2012).
Cisco, “Procter & Gamble Revolutionizes Collaboration with Cisco TelePresence,” 2008; http://www.cisco.com/web/about/ac79/docs/wp/Procter_Gamble_Final.pdf.
Kate Vitasek, Karl Manrodt, and Jeanne Kling, Vested: How P&G, McDonald’s, and Microsoft Are Redefining Winning in Business Relationships (New York: Palgrave Macmillan, 2012).
Kate Vitasek, Mike Ledyard, and Karl B. Manrodt, Vested Outsourcing: Five Rules That Will Transform Outsourcing, 2nd ed. (New York: Palgrave Macmillan, 2013).
Oliver Williamson, “Outsourcing: Transaction Cost Management and Supply Chain Management,” Journal of Supply Chain Management no. 2 (2008): 5–22.
Oliver E. Williamson, “The Theory of the Firm as Governance Structure: From Choice to Contract,” Journal of Economic Perspectives 16, no. (2002): 171–195. http://www.empresas.ufpr.br/williamson.pdf; accessed June 6, 2015.
Dell, “Dell Streamlines Indirect Procurement with Ariba Buyer,” Issue 1 (2001); http://www.dell.com/content/topics/global.aspx/power/en/pslq01_dell_ariba?c=us&l=en&cs.
Kate Vitasek, Karl Manrodt, and Jeanne Kling, Vested: How P&G, McDonald’s, and Microsoft Are Redefining Winning in Business Relationships (New York: Palgrave Macmillan, 2012).
Copyright information
© 2016 Bonnie Keith, Kate Vitasek, Karl Manrodt, and Jeanne Kling
About this chapter
Cite this chapter
Keith, B., Vitasek, K., Manrodt, K., Kling, J. (2016). Considerations for Crossing the Continuum. In: Strategic Sourcing in the New Economy. Palgrave Macmillan, New York. https://doi.org/10.1007/978-1-137-55220-4_10
Download citation
DOI: https://doi.org/10.1007/978-1-137-55220-4_10
Publisher Name: Palgrave Macmillan, New York
Print ISBN: 978-1-137-55218-1
Online ISBN: 978-1-137-55220-4
eBook Packages: Business and ManagementBusiness and Management (R0)