Professional Documents
Culture Documents
A Study On Support For Information Management in Virtual Organaization
A Study On Support For Information Management in Virtual Organaization
A Study On Support For Information Management in Virtual Organaization
STUDY ON
“SUPPORT FOR INFORMATION MANAGEMENT IN VIRTUAL
ORGANAIZATION”
ZENSOR TECHNOLOGY
ABSTRACT
Organizations are developing alliances with the enterprises they interact with in a virtual environment. The
key factor in such virtual organizations is information systems. Concerns about quality of information systems may
be compounded within the virtual organization. This paper considers possible issues that might affect the quality of
information systems within the virtual organization. Making decisions is an integral part in the f functioning of any
organization. To f facilitate Decision making in this ever- competitive world it is imperative that managers have the
right information at the right time to bridge the gap between need and expectation. For better f low of information an
adequate Management Inf ormation Systems (MIS) is the need of this age. Thus it is important to have an
understanding of the MIS f ollowed in an organization by all levels of management in order to take eff ective and
appropriate
A management inf ormation system collects and processes data (inf ormation) and provides it to managers at all
levels who use it f or decision making, planning, program implementation, and control. The MIS has many roles to
perf orm like the decision support role, the perf ormance monitoring role and the f unctional support role.
To get a realistic view of the MIS, I’ve gone through the MIS of AC Limited. For the purpose of getting in depth
understanding of particular f unctions of the company, I f ocused the needs, uses and benef its of MIS with respect to
the Material Department of the company. For the preparation of this report, Inventory Management has primarily
been f ocused.
TABLE OF CONTENTS
PAGE:NO
CHAPTERS CONTENTS
INTRODUCTION
1 OBJECTIVES OF THE STUDY
NEED FOR THE STUDY
SCOPE OF THE PROJECT
PROJECT METHODOLOGY
3 COMPANY PROFILE
INDUSTRY PROFILE
DATA ANALYSIS
4
5
FINDINGS
SUGGESTIONS
CONCLUSIONS
References
CHAPTER-1
INTRODUCTION
INTRODUCTION
The quality of many information systems may be questioned by the considerable amount of
effort devoted to ‘maintenance’ activities. Such maintenance activities may be the reworking of the
system to meet the original requirements or modifying the systems to incorporate new requirements.
The extent of ‘reworking’ compared to ‘modification’ is difficult to determine when requirements may
not, initially, be stated clearly or continue to evolve as the development progresses. Concerns about
quality may be further heightened in situations in which new innovative information systems
developments are being proposed. This paper will consider the virtual organization and will highlight
issues that may affect the quality of the information provision. These issues may make the attainment of
a good quality information system within a virtual organization as elusive as they have with systems in
the past.
In this paper, quality and virtual organization are defined as follows. Quality is the extent to which the
information provision meets the needs of an organization. Virtual organization is defined as the
application of internet technology to create an electronic environment in which independent parties can
work together to achieve common business objectives [2, 5, 6, 10, 19, 21, 23]. This electronic
environment permits partner organizations to readily create new organizational structures to address
new market opportunities in a timely fashion. Such new organizational structures will be composite
advantage. Having the facility to readily change (or create) new organizational structures could help in
the achievement of a sustained competitive advantage. This facility to change organizational structures
has been heralded as revolutionary as it permits the creation of new business models, which can change
Organizations are now beginning to develop alliances with the enterprises they interact with in the
virtual environment [1-5, 7-9, 11-13, 21, 24, 29]. Some alliances may be project-based and of a
temporal nature. But many alliances may be longer term as organizations cooperate to gain sustained
competitive advantages by beginning to deliver unique, keenly priced, integrated products and services.
The critical success factor in these systems is the information provision across the virtual organization.
Virtual Organizations
A virtual organization provides a network of beneficial alliances for an organization, its partners and
other organizations . The virtual organization has also been defined as a series of value chains in which
a variety of participants can contribute, either to strategic or operational activities. Venkatraman and
Henderson (1999) reject the virtual organization as a distinct structure and view virtuality as a strategic
characteristic, which can be instantiated as one of three distinct vectors. The first vector dealing with
customers interactions within a virtual environment and is termed the ‘virtual encounter’. The second
vector is the vertical integration of all parties involved in the creation of a product or service and is
referred to as ‘virtual sourcing’. The final vector is concerned with the leveraging of knowledge across
Six models of virtuality have also been proposed in an attempt to classify the various forms that virtual
organizations could take, although it is admitted that some of these are, in essence, an electronic re-
implementation of traditional forms of doing business [6]. These various definitions permeate the
literature. Marshall and McKay (2000) however have proposed defining characteristics for virtual
A lack of commonality in defining a virtual organization is not surprising. Internet technology enables a
variety of organizational structures to be created and in the future there may be organizational structures
that have yet to be conceptualized. The availability of a virtual dimension has initiated changes in how
and where organizations perform work. Business processes and information flows are changing and
business models are changing dramatically as witnessed by the phenomenal growth of collaborative
INFORMATION SYSTEMS
Traditional information systems are synonymous with data processing activities in which interrelated
components collect, manipulate and disseminate data and information with a feedback mechanism, to
meet particular business objectives . The types of information systems include strategic, management
and operations levels and cover functional areas such as sales & marketing, manufacturing, finance,
accounting and human resources [18]. During the late 1980s and 1990s there was a growing awareness
that information systems were a corporate asset and should be linked to strategic planning to facilitate
the achievement of strategic business objectives [16, 28]. To achieve this link required the planning and
information system that enables an organization to change goals, operations, products and services to
gain a competitive advantage [18]. Competitive advantages are based on the established generic
strategies of cost leadership, product differentiation, and market focus [14]. Ward (1990) developed a
three-era model depicting the evolution of information systems. The eras covered the 60s, the 70s &
80s, and the 80s & 90s. Each era was typified as follows: the first by standalone data processing; the
second by management information systems; the third by strategic information systems (SIS). The latter
was characterized as follows: networked and integrated systems, which were available and supportive
to users and were business driven. In the 80s & 90s when organizations were attempting to align their
IS/IT strategy with the business strategy, more often than not, it was the strategic application of IT that
occupied the attention of organizations rather than the provision of information to support the
The traditional objective of information systems has been to provide the right information of the desired
quality and quantity to the right person in a timely fashion. In the era of the virtual organization this
traditional objective is under review. Current information systems store a static representation of an
organization’s information within its software systems and databases or data warehouses. Mathotra
(2000) considers traditional systems to be inflexible due to the static nature of their information, which
is unhelpful in the dynamic and changing environment of the virtual organization [22]. In this situation
it is necessary to review the Information System paradigm in reaction to the dynamic and changing
environment of the new millennium. The determination of requirements for information systems has
always been a difficult task with varying degrees of success and is dependent on the experience of staff
and their familiarity with the application area. This difficulty is deemed to be further compounded by
the characteristics of a virtual organization, which include being adaptable, flexible and responsive to
Virtual organizations are information dependant and their success depends on the efficient use of
information and information systems [. A basic premise in a virtual organization is that the relevant
information is available to all parties. But Marshall and McKay (2000) view a virtual organization as
being problematic in terms of managing the relationships and the difficulty in defining the information
systems requirements . An additional problem with many web applications, like the virtual
organization, is that the information systems’ developers do not always know exactly who are going to
be the users and what are their information needs and expectations [26]. The virtual organization could
provide participants with access to multiple systems which raises concern about information exposure
and whether participants within enterprises are adequately trained to exercise sound control practices
[15, 26]. Such concerns about security may discourage enterprises from participating in the virtual
organization.
OBJECTIVES OF THE STUDY
The objective of this report is to study the MIS implementation at AC Ltd. and with the help of this
domain, to get an insight into the needs of MIS in business setups on a big scale, various f unctions
perf ormed by the MIS, benef its derived out of such a system and the risks involved.
I intend to aim my study at analyzing the business needs of the organization, key challenges or
desired f unctional requirements of the MIS, the IT solution that is currently implemented and the
outcome of such a system. AC Ltd. requires MIS to map internal processes and interaction with the
external environment to the technology and ensure the solution delivers real benef its to the business.
NEED FOR THE STUDY
Still lack of system integration af ter a level. Though inventory management module is integrated
well with all the other modules like f inancial system, thus reducing the redundancy. But still there is
need of paper work and manual intervention when reordering is required. System cannot be conf
igured to reorder automatically, even f or the f ast moving raw material.
Lack of Web Integration. AC hasn’t still employed the concept of taking orders or ordering through
web and have no integration of its system to its website.
Legacy Network Support. Backbone network used by AC is still the same, which they used in 1993.
They haven’t upgraded the network support f rom then, which has started creating problems f or
them already. As MIS of the company is improving day- by- day including more and more f
unctionalities, the network has already become very slow.
Lack of training to managers to ef f ectively use the decision support f unctionalities of system. This
is another problem that we f elt at the company. IT department is basically making the improvements
in the system continuously with new added f unctionalities, but there is lack of training to managers
to ef f ectively use these f unctions in way that can support them to make better decisions. For
example, on an average, a manager uses only 10- 15 types of reports out of more than 200 types of
reports available.
CHAPTER-2
REVIEW OF LITERATURE
REVIEW OF LITERATURE
After an exhaustive search for information on backup related projects having specifically
taken place in other states’ Cooperative Extension systems, the project manager found that the majority
were facing a situation similar to that of the Kentucky CES (prior to the completion of the project).
Some Extension Services did not have publicly available information regarding the topic. Of the ones
that did, many exhibited trends that matched the situation in Kentucky: userdriven backups, no
For example, the University of Arkansas, Division of Agriculture, recommends that CES personnel
perform their own individual backups using the Windows Backup Utility, and provides a limited set of
instructions for doing so (University of Arkansas, 2006). South Dakota State University also
recommends that CES users handle their own backup needs, and lists a set of best practices. When
discussing archival backup media, one instruction states, “If you require a full year’s worth of data in
your backup arsenal, use twentyone sets of media; you’ll have four dailies, five weeklies, plus twelve
monthlies” (South Dakota State University, 2007). While theoretically sound, instructions such as these
are ambiguous at best and add an unnecessary workload for nonIT oriented users.
On the other end of the spectrum, the University of NebraskaLincoln appeared to have a reliable backup
process in place for CES offices. The system, named NSave, is a universitywide resource utilizing
Tivoli Storage Manger technology to back up workstations and servers to a secure, centralized location.
Published information indicates that the system is effective, well documented, and well supported
(University of NebraskaLincoln, 2007). However, because NSave was developed for the entire campus
at the University level (not just CES offices, though CES offices appear to be welcome to participate), it
is not an entirely appropriate model for a CESonly project such as the one being addressed here. In fact,
the University of Kentucky does have a TSMbased backup resource available for on campus
workstations and servers. However, current policy restricts access to systems located on the UK wide
operations, performed by the Texas A&M University System Internal Audit Department. The audit’s
findings were published in a publicly available document, and included a section on current backup and
information security procedures. Many of these findings were quite familiar when compared to the
“Research data is stored on employees’ computers without systematic formal backup procedures. This
elevates the risk of data loss in the case of a hard drive crash or data theft.”
“IT personnel are generally spread so thin that backup is performed irregularly.”
“Backup tapes are kept onsite with no offsite copies for insurance in the event of an unforeseen
disaster.”
However, it is interesting to note that in response to these findings, the Texas CES still recommended a
user driven backup approach. Management specifically responded that “all units have been instructed
that all relevant or sensitive data, including research data, that is stored on personal computers must be
backed up on a systematic and regular basis; they have also been instructed to keep a
copy of the back up at a secure, offsite location” (TAMU Internal Audit Department, 2004). This
project, while sharing very similar initial circumstances, will pursue a decidedly different solution.
In contrast to the relatively small amount of backup related research specifically pertaining to CES,
there is a vast amount of literature published on backup technologies in general. The project manager
consulted a variety of resources, including industry trade publications, technical magazines, books, and
webbased material. When narrowing down these resources to those that were relevant to this project –
i.e., concerning enterprise backup solutions for a wide user base – a few common themes arose. These
included:
differential backup types: Snapshots record complete or partial system states at regular
intervals, and essentially simulate an ongoing set of full backups (Kay, 2006).
Continued importance of secure, offsite backups
for disaster recovery: While certainly not a new concept, recent literature continues to stress offsite
Furthermore, offsite disaster recovery storage must meet the same datasecurity standards as the primary
Importance of choosing a backup solution that fits the situation at hand: When considering the near
limitless field of available technologies, care must be taken to choose a solution that
integrates into the current technical environment, maintains regulatory compliance, and fits applicable
requirements. For successful development of a backup and recovery strategy, it is key to ensure that the
business requirements have been properly captured and properly valued; the analysis of these business
innovation, D2D2T combines the speed of diskbased backups with the capacity and
archival benefits of tape. The concept behind D2D2T is to back up from production disk to
backup disk as quickly as possible; once this "D2D" has finished, files can be backed up or migrated to
As indicated above, there is a substantial amount of literature available on backup technology and
However, also as previously indicated, very little information has been published regarding backup
solutions in use in Cooperative Extension offices. This project attempts to explore the topic from that
specific angle.
Based on discovered research, this project will be the first to publish a publicly available, indepth report
regarding the analysis, design, and implementation of a backup and recovery solution specifically for
CES offices. Because every county in every state in the US has a CES office, the project’s findings will
be a valuable resource for those seeking to implement similar systems for CES offices in other states, or
An overview of available research revealed that when considering backup strategies, many states’ CES
programs are in a situation similar to that of Kentucky. While an abundance of information relating to
general backup technology is available from a variety of sources, virtually no information was
published on efforts by other universities to implement an enterprise grade backup system specifically
for CES offices. This project intends to contribute to the field by filling that void.
CHAPTER-3
COMPANY PROFILE
INDUSTRY PROFILE
COMPANY PROFILE
Zensar Technologies Limited is an Indian publicly traded software and services company. The
company's stock trades on the Bombay Stock Exchange and on the National Stock Exchange of India. A
subsidiary of RPG Group, the company's chairman is Forbes-listed billionaire Harsh Goenka.
History
Zensar Technologies Ltd. was incorporated in March 26 1963. The Company is a leading digital solutions
and technology services company that specializes in partnering with global organizations across industries
on their Digital Transformation journeys. It was promoted by its foreign collaborators ICL UK; Fujitsu
Japan; and Northern Telecom Canada. The Company is engaged in providing a complete range of IT
Services and Solutions. As of March 31 2019 the Company has 23 subsidiaries. Its business operations are
spread across countries with offices in 29 locations with presence in the key regions of US Europe Africa
Middle East India and APAC.The company manufactures and markets computer hardware and software. Its
chief products are digital computer systems including peripherals. The company manufactures the entire
range of hardware products ranging from PCs to mainframe computers. It has entered into collaborations
with Fujitsu Japan and Genicom US to manufacture line printers. The company tied up with Sun Micro
Systems the world leader in Unix workstations and servers.In 1988 ICL entered into an agreement with RPG
Enterprises to jointly manage the company. RPG Enterprises provides management support to ICIM. It has
changed the name of its subsidiary companies International Computer (india) ICIM International Inc & ICIL
Singapore Pte to Zenstar Technologies Zenstar Technologies Inc & Zenstar Technologies (Singapore).In
1999 the company sold SES business to Accel Ltd for a total purchase consideration of Rs 11.34 cr & also
has taken over the liabilities under various leasing agreement relating to equipment rented out to customers.
In Mar. 2001 the Board of Directors of Fujitsu ICIM and Zensar Technologies have approved the merger of
the two companies at a share swap ratio of 1:1 which translates into one share of Zensar Technologies for
each share held in Fujitsu ICIM. Hence the name of the company was changed to 'Zensar Technologies Ltd.'
As the Chinese economy is gearing up and the business opportunities are growing more and more the
company has decided to enter into a JV with New Jade Tech Ltd a subsidiary of Asia Logistics Ltd a
Hongkong SE listed company. The joint venture will operate from the Software Technology Park of Zhuhai
near Hongkong. The company is also planning to set up a branch in Finland to cater to customers in the
Scandinavian region. The process is underway and is expected to be completed shortly.The company has
signed a share purchase agreement on December 12 2005 for acquiring entire equity stake of OBT Global a
Hyderabad based company. Further Zensar Technologies Inc. the company's wholly owned US subisidiary
would be acquiring the entire common stock of OBT Global Inc USA an affiliate of OBT Globalin an all
cash transaction. The newly acquired companies are engaged in SAP solutions specifically focused on the
Indian industry verticals of textile healthcare and pharmacy.The wholly owned subsidiary company in UK
acquired one of Europe's leading experience design agencies Foolproof Limited headquartered in London
along with its two wholly owned subsidiary companies in UK and one wholly owned subsidiary Company
in Singapore in November 2016.The wholly owned subsidiary company in USA acquired Keystone Logic
Inc. a leading Omnichannel and Digital Supply Chain Company headquartered in Atlanta USA in March
2017. Further the Company entered into a definitive agreement to acquire the business of Keystone Logic
Solutions Private Limited on March 30 2017.During FY 2018 the Company incorporated three wholly
owned subsidiaries in India viz. Zensar Information Technologies Limited Zensar Software Technologies
Limited and Zensar IT Services Limited. Further wholly owned subsidiary company of the Company viz.
Zensar Technologies (Singapore) Pte. Ltd. in Singapore incorporated wholly owned subsidiary viz. Zensar
Info Technologies (Singapore) Pte. Ltd. in Singapore. The Board of Directors at its meeting held on 14th
March 2018 approved transfer of business in certain geographies to Zensar Information Technologies
Limited and Zensar Software Technologies Limited by way of slump sale. Further the Board of Directors of
wholly owned subsidiary company of the Company viz. Zensar Technologies (Singapore) Pte. Ltd. in
Singapore approved transfer of its business to wholly owned subsidiary viz. Zensar Info Technologies
(Singapore) Pte. Ltd in Singapore by way of slump sale. The relevant disclosures in this behalf were filed
with the Stock Exchanges. On 21st March 2018 the Company had entered into definitive agreement for
acquisition of Cynosure Interface Services India Pvt. Ltd. An agreement to acquire Cynosure Inc. USA was
entered into by Zensar Technologies Inc. USA a wholly owned subsidiary of the Company on the same
day.In July 2018 Zensar Technologies Inc. USA wholly owned subsidiary of the Company entered into
definitive agreement for acquisition of 100% shareholding of Indigo Slate Inc USA. In January 2019
Company along with Zensar Information Technologies Limited and Zensar Software Technologies Limited
(wholly owned subsidiaries of the Company) respectively entered in to definitive agreement(s) for sale of
100% of the share capital of these wholly owned subsidiaries to Lorhan IT Services Private Limited. (a
wholly owned subsidiary of First Tek Inc.)In February 2000, the company renamed to Zensar. Ganesh
Natarajan became CEO in 2001, beginning a 15-year tenure.[6] From 2000 to 2005, the company focused
on application management for its clients.[7] Vivek Gupta was named Zensar's Executive Chairman in
2010.[8] RPG Group, the Indian industrial conglomerate headquartered in Mumbai, Maharashtra, is the
majority shareholder in the company. The company continues to have its headquarters in Pune in Western
India.
By 2012, Zensar had approximately 11000 employees servicing 400 clients in over 20 global locations and
at the end of the 2019 financial year earned revenues of over US$550 million.
Sandeep Kishore was named Zensar's CEO in 2016, taking over from Ganesh Natarajan, with Zensar
Technology backers being RPG Enterprises. In 2015, APAX Portfolio Company acquired a stake in Zensar
from Electra Partners Mauritius.[10][5]
As of October 2018, Zensar Technologies has offices in over 20 countries.[12] It is listed on both the
National Stock Exchange of India (NSE) and the Bombay Stock Exchange (BSE) and is a component of
several indices including the NSE's Nifty 500 and the S&P BSE 500. In December 2020, Ajay S. Bhutoria
was named Zensar's CEO.
PRODUCTS AND SERVICES
Zensar’s business is spread between North America, United Kingdom, parts of Europe and South Africa.
Zensar’s teams work out of 29 global locations including offices of acquired entities. Its primary business
involves providing digital and technology solutions to global customers. Its key business verticals include
high-tech manufacturing, infrastructure, and healthcare.The following is a list of acquisitions made by
Zensar since 2005.
Locations
Zensar has offices in eighteen countries.
List of subsidiaries
Name Location
Zensar Technologies UK Ltd.United Kingdom
Zensar Technologies B.V. Geneva
Zensar Technologies B.V. The Netherlands
Zensar Technologies Keizersgracht The Netherlands
Zensar Technologies Herriotstraße Frankfurt, Germany
Zensar Technologies Regus Business Centre GmbH Austria
Zensar Technologies, Inc. United States of America
Zensar (Africa) Holdings (Pty) Ltd. Johannesburg
Reception
Zensar was the innovation award winner in the "Creating an Impact-IT Skills" category at India Perspectives
2018. Gartner Magic Quadrant named the company Niche Player 2019 for managed mobility services.[29]
The company is often quoted by analysts in industry media for its expertise on enterprise IT spending,
research consulting and advisory services.
INDUSTRY PROFILE
DATA ANALYSIS
DATA ANALYSIS
Table 4.1: Descriptive statistics of respondents (N=520)
Count Percentage
Male 330 64%
Gender
Female 190 36%
Manager 234 45%
Team Leads 120 23%
Designation
Software 166 32%
Developer
25-35 342 66%
36-45 93 18%
Age 46-55 52 10%
above 55 33 6%
less than 1year 207 40%
1-5 235 45%
Experience of working in virtual team 6-10 71 14%
More than 10 7 1%
Less than 1year 259 50%
Experience of working in current 1-5 220 42%
virtual team 6-10 38 7%
More than 10 3 1%
Less than 10 236 45%
11-25 171 33%
No of members in team 25-50 77 15%
More than 50 36 7%
Virtual Team 303 59%
Appropriate team structure
Traditional team 217 41%
Rotated Component
Matrixa
Component
1 2
Q_IS2 1 0.0719
43
Q_IS3 0.8591 0.1457
57 3
Q_IS1 0.8394 0.1583
52 89
Q_IS14 0.7503 0.3588
53 79
Q_IS6 0.6464 0.3231
51 43
Q_IS5 0.6054 0.3852
12 26
Q_IS10 0.5935 0.4732
28 79
Q_IS9 0.5810 0.4373
84 8
Q_IS4 0.5725 0.3648
27 26
Q_IS12 0.2861 0.7612
99
Q_IS8 0.0469 0.7580
29 55
Q_IS13 0.4380 0.7083
08 04
Q_IS11 0.4355 0.5951
74 29
Q_IS15 0.4639 0.5683
63 29
Figure 4.3: Parameters on Information Sharing were loaded onto two factors
To further explore the adequacy of the model, AMOS was employed. CFA of the model resulted in a
good fit on all indices CMIN/df =2.792, p < 0.001; CFI = .966; TLI= .960;
RMSEA= .059. Table 4.5 provides the calculated values for the model. Results suggest that the model
obtained for the information sharing out performs on all indices.
Table 4.5: Model Fit Indices for Information Sharing
CMIN/df P value RMSEA CFI TLI
Model 2.792 .000 .059 .966 .960
Dependability on each other: Our findings suggest that members in virtual teams
depend upon each other for the completion of tasks. An individual needs to establish a
regular and consistent connection among them for the development of trust.
Dealing with time: Time has emerged as the crucial factor in developing trust in
virtual teams. Bringing members across different zones is a great team building tool.
Involvement and discussion across time with each and every member ensures that
members are bonding together.
Concern for collaboration: The process of building trust is essential in virtual settings.
Trust within a virtual group is essential for collaboration, communication,
coordination and increased team performance.
Information penetration: Penetration of information within a team becomes a necessity
in absence of regular and constant personal interaction for building trust in virtual
environment.
Variety of information shared: Effective utilization of knowledge in virtual team
depends on the perception of the task assigned and understanding of the reality of the
task. This makes sharing of all information compulsory for everyone. Be it clarity on
team norms, roles and responsibilities of individuals, or escalation methods.
Reliability on technology: Use and reliability on technology for achieving
effectiveness of work, increase locational and time flexibility of work and promote
sensible use of resources in virtual environment.
TABLE 4.8:
RELIABILITY STATISTICS OF EACH FACTOR
Reliability on Technology
Communication Tools Used for Communication
Implementation of Results
Creation of “The TIC Employee Segmentation Framework”
This research also aims to explain that it is vital for any organization to identify employee skills and
abilities which would help them to grow better in their team as well as their career. Virtual teams are the set of
talented, highly capable and experienced individuals spread across various locations, who work together for the
completion of a particular task, without being in close physical proximity to each other. Hence both
organizations and members need to continuously analyse and introspect their current position. This framework
helps members of virtual teams to do the needful analysis of the skills they possess and enhance the same
if required. Also, it can help individuals identify their different skills, knowledge & capability which add to
the competitive advantage of the organizations.
“The TIC Employee Segmentation Framework”, is an important entity for the members of virtual teams as they,
along with their managers can freely judge their skills on their current position, assessment of the individuals can
be done, expectations of the job can be identified and future prospects can be shared with them. All the clusters
and their explanations are elaborated in Table 4.10
4.1.6 Results of K-means Cluster Analysis to Identify the Profiles of the
Employees Based on the Skills
This cluster profile of the employees is built up after performing k-means cluster analysis on a sample size of
520 professionals using the questionnaire designed after studying the literature. First and last cluster is divided
into three cases, and all the cases are mutually exclusive. Second cluster is divided into two cases, and both the
cases are mutually exclusive. The K- means cluster analysis results are shown below (Table 4.9).
Table 4.9: Number of cases in each cluster
This was used to segregate employees based on their skill typology. The 8 clusters viz. Unfailing
abiders, Differentiator, Fervent Certainers, Eminent assorters,
Ace Comprehenders, Proficient users, Tech-adapters, Facilitators are
representing the different set of people with varied skills (Figure 4.8). This holistic charter
gives a comprehensive insight into the individual who is part of a virtual team and can help in
making an organization more competitive and effective.
4.1.7 Cluster Profiles of Employees
4.2 T-test for Studying the Perceived Differences of Virtual Team Members
on Gender and Prior Working Experience
4.2.1 Gender
Hypothesis 1: Gender has no influence on the factors identified earlier
Of all the variables, it was found that penetration of information, variety of information shared,
reliability on technology and tools used for communication significantly differentiate males from
females in virtual teams and it may be observed from the table 4.11
. Since t-test is used to for the comparison of groups.
Table 4.11: Group Statistics for Gender
Std. Error
Factor Identified Gender N Mean Std. Deviation
Mean
Dependability on Male 330 2.1159 .80979 .04607
each other Female 190 2.0313 .68542 .05320
Male 330 2.0444 .76265 .04346
Dealing with time
Female 190 1.9869 .62280 .04834
Concern for Male 330 2.3344 .90008 .05112
Collaboration Female 190 2.2209 .74450 .05778
Penetration of Male 330 1.8728 .81592 .04634
information Female 190 1.6941 .54782 .04252
Variety of Male 330 2.3054 .74144 .04211
information Female 190 2.0813 .62731 .04869
Reliability on Male 330 1.7726 .90316 .05130
technology Female 190 1.6014 .49160 .03816
Tools used for Male 330 1.9898 .81715 .04641
communication Female 190 1.8454 .60624 .04705
Implementation of Male 330 2.8226 1.07448 .06103
results Female 190 2.6386 1.03518 .08035
Table 4.12: Independent samples for gender
Table 4.13: Group statistics for prior work experience in virtual teams
Have you ever
Std. Std. Error
Factor Identified been member N Mean
Deviation Mean
of VT
Dependability on Yes 386 2.3306 .74777 .03806
each other No 88 2.0182 .81516 .08690
Yes 385 2.0290 .75631 .03854
Dealing with Time
No 88 2.0000 .51541 .05494
Concern for Yes 387 2.2791 .86324 .04388
Collaboration No 88 2.3636 .79532 .08478
Penetration of Yes 387 1.7956 .75249 .03825
information No 88 1.8763 .67501 .07196
Variety of Yes 387 2.2313 .70035 .03560
information No 88 2.1989 .75762 .08076
Reliability on Yes 387 1.6714 .80400 .04087
technology No 88 1.8845 .68990 .07354
Tools used for Yes 387 1.9190 .78112 .03971
communication No 88 2.0152 .60206 .06418
Implementation of Yes 387 2.8217 1.08236 .05502
results No 88 2.4716 .93267 .09942
Table 4.14: Independent sample test for prior work experience in virtual team
Levene's Test for
Factor Identified T-test for Equality of Means
Equality of Variances
F Sig. T Df Sig. (2-tailed)
Dependability on each
1.294 .256 -3.201 472 .001
other
Dealing with time 6.753 .010 .342 471 .733
Concern for
.580 .447 -.841 473 .401
collaboration
Penetration of
.349 .555 -.925 473 .356
information
Variety of information .050 .824 .386 473 .700
Reliability on
.316 .574 -2.300 473 .022
technology
Tools used for
3.638 .057 -1.083 473 .279
communication
Implementation of
3.335 .068 2.806 473 .005
results
Tools
100 Used
80
60
40
20
0
PERCENT
Figure 4.10: Percentage and frequency of the tool used according to its respective feature
4.3.3 Feature of Tool and its Usage for Information Sharing, Communication or Both
The objective of this question was to know the contribution of specific features towards
information sharing and communication in virtual teams. Members were asked to indicate
their choice for information sharing, communication or both, against the particular feature of
the tool. The contribution of a particular feature towards information sharing, communication
or both in virtual teams has been tabulated in Table 4.17.
Results are highlighted in table below. Communication amongst virtual team members
happens strongly in the presence of Group chat (55.2%), Video chat (43.5%) and video
conferencing (38.5%) feature. For the process of information sharing to happen a tool need
to have Document creating, editing and management (56.9%), File sharing and management
(66.5%) and workload management (50.6%) feature in it. It is communication that happens
when a tool has a schedule management (58.8%) feature in it.
Table 4.17: Feature and its contribution to information sharing and communication
S.no Feature Contribution Frequency Percent
Information Sharing 74 14.2
1. Group Chat Communication 287 55.2
Both 159 30.6
Information Sharing 78 15.0
2. Video Chat Communication 226 43.5
Both 216 41.5
Information Sharing 44 8.4
Video Communication 200 38.5
3.
Conferencing Both 276 53.1
Document Information Sharing 296 56.9
4. create, edit Communication 135 26.0
Management Both 89 17.1
Information Sharing 346 66.5
File Sharing Communication 57 11.0
5.
Management Both 117 22.5
Information Sharing 263 50.6
Workload Communication 175 33.7
6.
Management Both 82 15.8
Information Sharing 140 26.9
Schedule Communication 306 58.8
7.
Management Both 74 14.2
Information Sharing
Information Sharing
Information Sharing
Information Sharing
Both
Communication
Both
Communication
Both
Communication
Both
Communication
Both
Communication
Both
Communication
Both
Information Sharing
Information Sharing
Communication
Group Chat MS 15 5
Communicator
Video Chat Skype 12 8
SharePoint
MS Communicator
Skype
GoToMeeting
Google Drive
Schedule Once
2
0
The first sub-section, reports the factor analysis used to identify various factors that impact trust,
information sharing and communication in virtual teams.
The second sub-section, reports the generation of “The TIC Employee Segmentation framework”.
Cluster analysis was used to group the employees on the basis of the distinct characteristics of
each virtual team member.
Details of the respondents are clearly highlighted in Table 4.1. Among the participants, 330
(64%) were Males and 190 (36%), Females. There were 234 (45%) Managers, 120 (23%) Team
Leads and 166 (32%) software developers.
After collecting the data, the demographics were analysed for Age.
The sample was divided into four brackets of age, 25-35 years, 342 (66%) respondents; 36-45
years 93 (18%) respondents; 46-55years, 52 (10%) respondents and above 55 years, 33 (6%)
respondents.
In case of experience of working in a virtual team, the brackets were from less than 1 years, 207
(40%) respondents; 1-5 years, 235 (45%)
respondents; 6-10 years, 71 (14%) respondents and more than 10 years, 7 (1%) respondents. For
experience of work in current virtual teams the age brackets are: less than 1 years, 259 (50%)
respondents; 1-5 years, 220 (42%) respondents; 6-10 years, 38 (7%) respondents and
more than 10 years, 3 (1%) respondents. For the category of number of members in virtual team
the brackets are: less than 10, 236 (45%) respondents; 11-25, 171 (33%) respondents;
25-50, 77 (15%) respondents and more than 50, 7 (1%) respondents. Amongst the respondents
303(59%) respondents felt that virtual teams were good to work in and 217 (41%) respondents
found traditional set up to be more convenient for working.
SUGGESTIONS
One of the most important challenges in the transition of the organization towards virtualness is
changing the Mindset of the organization to accept virtualness as a strategic variable.
The new business models and the IT based systems call for a change in the processes, for the
introduction of the systems to be effective.
Technology introduction without changing the processes to align harmoniously will not lead to
any perceptible change.
The development of virtual alliances requires the development of interpersonal and team skills in
a virtual environment.
The third sub-section talks about the equations used to generate the “Employee Profile
Configurator” for virtual teams.
In fourth sub-section, descriptive analysis was conducted to identify the most preferred
communication tools used by the members of a virtual team.
In last sub-section a t-test was applied to study the perceived differences of virtual team members
on gender, prior working experience and team structure
CONCLUSION
The Application Virtualization, instead, addresses the separation of concerns be-
tween application provision and SOl operational management. The virtualized ap- plication is
exposed via a Gateway and the configuration of infrastructure services (potentially provided
by third parties) for managing non-functional aspects of the application is done in a
transparent way for the application consumer. So, the added
value is mainly in the automatic configuration of third party management services such as
SLA and seeurity. The adoption of the Gateway avoids direct access to the resources of a SP
and access is controlled by the security services.
In terms of business impact, the Application Virtualization allows ASPs to ex- pose tbeir
applications in a simple and manageable way without being involved in the management of
the enabling infrastructure. This increases flexibility and allows a separation of concerns
between application provision and management, and en- ables the transition towards a SaaS
model.
In terms of exploitation opportunities, the VO Set Up component can be used in combination
with components of the security area of the Being RID project to manage the life-cycle of
circles of trust between providers targeting the Federated Identity Management market.
For the Application Virtualization, the selected strategy for this component is to be used in
combination with components of the security and SLA areas of the BEinGRID project to
coordinate different service execution environments to allow secure and manageable
application exposure.
The idea behind this strategy is to exploit this component as a brokerage solution for different
cloud providers.
53
REFERENCES
Goyal www.tcs.com
www.sap.com
54