Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017 (2017), Article ID 6916575, 17 pages
https://doi.org/10.1155/2017/6916575
Research Article

Simulated Annealing Genetic Algorithm Based Schedule Risk Management of IT Outsourcing Project

College of Information Science and Engineering, Northeastern University, Shenyang 110819, China

Correspondence should be addressed to Hualing Bi; moc.621@180gnilauhib

Received 10 April 2017; Revised 20 July 2017; Accepted 3 August 2017; Published 28 September 2017

Academic Editor: M. L. R. Varela

Copyright © 2017 Fuqiang Lu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. C. Lacity, S. A. Khan, and L. P. Willcocks, “A review of the IT outsourcing literature: Insights for practice,” Journal of Strategic Information Systems, vol. 18, no. 3, pp. 130–146, 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. Z. P. Fan, W. Suo, and B. Feng, “Identifying risk factors of IT outsourcing using interdependent information: an extended DEMATEL method,” Expert Systems with Applications, vol. 39, no. 3, pp. 3832–3840, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. B. Bahli and S. Rivard, “Validating measures of information technology outsourcing risk factors,” Omega, vol. 33, no. 2, pp. 175–187, 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Huang, “Research on risk early-warning of information technology outsoucing project based on neural network,” Applied Mechanics and Materials, vol. 411-414, pp. 2400–2405, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. Gartner, Gartner says worldwide IT spending on pace to grow 2.1 percent in 2014, Press release, Stamford, CT, USA, 2014.
  6. R. Kliem, “Managing the risks of offshore It development projects,” Information Systems Management, vol. 21, no. 3, pp. 22–27, 2004. View at Publisher · View at Google Scholar · View at Scopus
  7. L. M. Abdullah and J. M. Verner, “Analysis and application of an outsourcing risk framework,” Journal of Systems and Software, vol. 85, no. 8, pp. 1930–1952, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Alexandrova, “Risk Factors in IT Outsourcing Partnerships: Vendors’ Perspective,” Global Business Review, vol. 16, no. 5, pp. 747–759, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Samantra, S. Datta, and S. S. Mahapatra, “Risk assessment in IT outsourcing using fuzzy decision-making approach: An Indian perspective,” Expert Systems with Applications, vol. 41, no. 8, pp. 4010–4022, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Samadi, S. Nazari-Shirkouhi, and A. Keramati, “Identifying and analyzing risks and responses for risk management in information technology outsourcing projects under fuzzy environment,” International Journal of Information Technology and Decision Making, vol. 13, no. 6, pp. 1283–1323, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. L. Qin, H. Wu, N. Zhang, and X. Li, “Risk identification and conduction model for financial institution IT outsourcing in China,” Information Technology and Management, vol. 13, no. 4, pp. 429–443, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Huang, T. Zhao, and S. Kudratova, “Uncertain mean-variance and mean-semivariance models for optimal project selection and scheduling,” Knowledge-Based Systems, vol. 93, pp. 1–11, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Earl, “The risks of outsourcing IT [J],” Sloan Management Review, vol. 37, no. 3, pp. 26–32, 1996. View at Google Scholar
  14. B. W. Boehm, “Software Risk Management: Principles and Practices,” IEEE Software, vol. 8, no. 1, pp. 32–41, 1991. View at Publisher · View at Google Scholar · View at Scopus
  15. L. Wang, C. Fang, C.-D. Mu, and M. Liu, “A pareto-archived estimation-of-distribution algorithm for multiobjective resource-constrained project scheduling problem,” IEEE Transactions on Engineering Management, vol. 60, no. 3, pp. 617–626, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. B. W. Boehm, “Software risk management,” IEEE Software, vol. 14, no. 3, pp. 1–19, 1989. View at Google Scholar
  17. B. Aubert, S. Dussault, M. Patry, and S. Rivard, “Managing the risk of IT outsourcing,” in Proceedings of the HICSS 32 - 32nd Annual Hawaii International Conference on System Sciences, p. 10, Maui, HI, USA. View at Publisher · View at Google Scholar
  18. B. A. Aubert, S. Dussault et al., “Assessing IT outsourcing risk,” in Proceedings of the 31nd Hawaii International Conference on System Sciences, Maui, HI, USA, 1998.
  19. B. A. Aubert, S. Dussault, M. Patry et al., “outsourcing risk management at British Petroleum,” in Proceedings of the 34nd Hawaii International Conference on System Science, Maui, HI, USA, 2001.
  20. B. Bahli and S. Rivard, “The information technology outsourcing risk: a transaction cost and agency theory-based perspective,” Journal of Information Technology, vol. 18, no. 3, pp. 211–221, 2003. View at Publisher · View at Google Scholar · View at Scopus
  21. K. Osei-Bryson and O. K. Ngwenyama, “Managing risks in information systems outsourcing: an approach to analyzing outsourcing risks and structuring incentive contracts,” European Journal of Operational Research, vol. 174, no. 1, pp. 245–264, 2006. View at Publisher · View at Google Scholar · View at Scopus
  22. C. Sanfa, C. Kai, and Z. Bin, “Producer Services Outsourcing Risk Control Based on Outsourcing Contract Design: Industrial Engineering Perspective,” Systems Engineering Procedia, vol. 2, pp. 308–315, 2011. View at Publisher · View at Google Scholar
  23. S. Xianli, H. Min, and W. Xingwei, “Distributed decision-making risk management of virtual enterprises with principal agent characteristics,” Journal of System Engineering, vol. 25, no. 3, 2010. View at Google Scholar
  24. S. Christoph, Distributed Decision Making, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003. View at Publisher · View at Google Scholar
  25. S. Christoph, “Distributed decision making-a unified approach,” European Journal of Operational Research, vol. 150, no. 2, pp. 237–252, 2003. View at Publisher · View at Google Scholar · View at MathSciNet
  26. F. Sun, S. Duan, and F. Lu, “A two-level principal-agent model for schedule risk control of it outsourcing project based on genetic algorithm,” in Proceedings of the 23rd International Conference on Industrial Engineering and Engineering Management, pp. 17-18, 2016.
  27. C. Fang and F. Marle, “A simulation-based risk network model for decision support in project risk management,” Decision Support Systems, vol. 52, no. 3, pp. 635–644, 2012. View at Publisher · View at Google Scholar · View at Scopus
  28. C. Jerson, M. Annelies et al., “A multivariate approach for top-down project control using earned value management,” Decision Support Systems, vol. 79, pp. 65–76, 2015. View at Publisher · View at Google Scholar · View at Scopus
  29. M. Compare, F. Martini, and E. Zio, “Genetic algorithms for condition-based maintenance optimization under uncertainty,” European Journal of Operational Research, vol. 244, no. 2, pp. 611–623, 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. C. García-Martínez, M. Lozano, F. Herrera, D. Molina, and A. M. Sánchez, “Global and local real-coded genetic algorithms based on parent-centric crossover operators,” European Journal of Operational Research, vol. 185, no. 3, pp. 1088–1113, 2008. View at Publisher · View at Google Scholar · View at Scopus
  31. Y. Shuai, S. Bradley et al., “A new crossover approach for solving the multiple travelling salesmen problem using genetic algorithms,” European Journal of Operational Research, vol. 228, no. 1, pp. 72–82, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  32. K. Deep and M. Thakur, “A new crossover operator for real coded genetic algorithms,” Applied Mathematics and Computation, vol. 188, no. 1, pp. 895–911, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  33. J. H. Holland, Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence, MIT Press, Cambridge, UK, 1992.
  34. H. Ahonen, A. G. de Alvarenga, and A. R. Amaral, “Simulated annealing and tabu search approaches for the Corridor Allocation Problem,” European Journal of Operational Research, vol. 232, no. 1, pp. 221–233, 2014. View at Publisher · View at Google Scholar · View at MathSciNet
  35. D. Zhang, Y. Liu, R. M'Hallah, and S. C. H. Leung, “A simulated annealing with a new neighborhood structure based algorithm for high school timetabling problems,” European Journal of Operational Research, vol. 203, no. 3, pp. 550–558, 2010. View at Publisher · View at Google Scholar · View at Scopus
  36. E. Rodriguez-Tello, J.-K. Hao, and J. Torres-Jimenez, “An improved simulated annealing algorithm for bandwidth minimization,” European Journal of Operational Research, vol. 185, no. 3, pp. 1319–1335, 2008. View at Publisher · View at Google Scholar · View at Scopus
  37. O. Briant, D. Naddef, and G. Mounié, “Greedy approach and multi-criteria simulated annealing for the car sequencing problem,” European Journal of Operational Research, vol. 191, no. 3, pp. 993–1003, 2008. View at Publisher · View at Google Scholar · View at Scopus
  38. Z. Dai and X. Zheng, “Design of close-loop supply chain network under uncertainty using hybrid genetic algorithm: a fuzzy and chance-constrained programming model,” Computers and Industrial Engineering, vol. 88, pp. 444–457, 2015. View at Publisher · View at Google Scholar · View at Scopus
  39. M. A. Rahman and G. K. Venayagamoorthy, “A hybrid method for power system state estimation using Cellular Computational Network,” Engineering Applications of Artificial Intelligence, vol. 64, pp. 140–151, 2017. View at Publisher · View at Google Scholar
  40. N. Pérot and N. Bousquet, “Functional Weibull-based models of steel fracture toughness for structural risk analysis: estimation and selection,” Reliability Engineering & System Safety, vol. 165, pp. 355–367, 2017. View at Google Scholar
  41. N. Wattanapongskorn and D. W. Coit, “Fault-tolerant embedded system design and optimization considering reliability estimation uncertainty,” Reliability Engineering and System Safety, vol. 92, no. 4, pp. 395–407, 2007. View at Publisher · View at Google Scholar · View at Scopus
  42. S. Chatterjee and S. Bandopadhyay, “Reliability estimation using a genetic algorithm-based artificial neural network: An application to a load-haul-dump machine,” Expert Systems with Applications, vol. 39, no. 12, pp. 10943–10951, 2012. View at Publisher · View at Google Scholar · View at Scopus