Skip to main content

Part of the book series: SpringerBriefs in Information Systems ((BRIEFSINORMAT))

  • 948 Accesses

Abstract

In this chapter are described IT outsourcing services, IT outsourcing types, total versus selective IT outsourcing, single versus multiple providers, and how to select IT outsourcing provider. Additionally, this chapter includes the theories in IT outsourcing used in this research and also the risks, relationships and success factors in IT outsourcing that are our research goals.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alborz, S., Seddon, P., & Scheepers, R. (2005). The quality-of-relationship construct in IT outsourcing. In PACIS 2005 proceedings, Paper 93, Association for Information Systems.

    Google Scholar 

  • Bahli, B., & Rivard, S. (2002). Information technology outsourcing risk: A scenario-based conceptualisation. Cahier de la Chaire de gestion stratégique des technologies de l’information: HEC Montréal, 3000, chemin de la Côte-Sainte-Catherine, Montréal, Québec, H3T 2A7 Canada, no 02–04 – Octobre 2002, ISSN 1702-238X, 1–22. Accessed May 1, 2018, from http://neumann.hec.ca/chairegestionti/cahiers/cahier0204.pdf

  • Bahli, B., & Rivard, S. (2013). Cost escalation in information technology outsourcing: A moderated mediation study. Decision Support Systems, 56, 37–47.

    Article  Google Scholar 

  • Barney, J. (1991). Firm resources and sustained competitive advantage. Journal of Management, 17(1), 99–120.

    Article  Google Scholar 

  • Benbasat, I., & Zmud, R. (1999). Empirical research in information systems: The practice of relevance. MIS Quarterly, 23(1), 3–16.

    Article  Google Scholar 

  • Beulen, E. (2011). Maturing IT outsourcing relationships: A transaction costs perspective. In J. Kotlarsky, L. Willcocks, & I. Oshri (Eds.), New studies in global IT and business service outsourcing: Lecture notes in business information processing (pp. 66–79). Berlin: Springer.

    Chapter  Google Scholar 

  • Beulen, E., Fenema, P., & Currie, W. (2005). From application outsourcing to infrastructure management: Extending the offshore outsourcing service portfolio. European Management Journal, 23(2), 133–144.

    Article  Google Scholar 

  • Boehm, B. (1991). Software risk management: Principles and practices. IEEE Software, 8, 32–42.

    Article  Google Scholar 

  • Cao, Q., & Wang, Q. (2007). Optimizing vendor selection in a two-stage outsourcing process. Computers & Operations Research, 34(12), 3757–3768.

    Article  Google Scholar 

  • Christ, M., Mintchik, N., Chen, L., & Bierstaker, J. (2014). Outsourcing the information system: Determinants, risks, and implications for management control systems. Journal of Management Accounting Research, 27(2), 77–120.

    Article  Google Scholar 

  • Corbitt, B., & Tho, I. (2005). Towards an economic analysis of IT outsourcing risks. In Proceedings 16th Australasian conference on information systems (pp. 1–8). Sydney: Association for Information Systems.

    Google Scholar 

  • Cumps, B., Viaene, S., Dedene, G., & Vandenbulcke, J. (2006). A theoretical exploration of the relationship between outsourcing and business/ICT alignment. In Proceedings of European conference on information systems (ECIS 2006). Gothenburg: Association for Information Systems.

    Google Scholar 

  • Dibbern, J., Chin, W., & Kude, T. (2016). The sourcing of software services: Knowledge specificity and the role of trust. SIGMIS Database, 47(2), 36–57.

    Article  Google Scholar 

  • Eisenhardt, K. (1989). Agency theory: An assessment and review. Academy of Management Review, 14(1), 57–74.

    Article  Google Scholar 

  • Fitzgerald, F., & Willcocks, L. (1994). Contracts and partnerships in the outsourcing of IT. In Proceedings of fifteenth international conference on information systems (pp. 51–63). Vancouver, British Columbia: Association for Information Systems.

    Google Scholar 

  • Goo, J. (2009). Promoting trust and relationship commitment through service level agreements in IT outsourcing relationship. In R. Hirscheim, A. Heinzl, & J. Dibbern (Eds.), Information systems outsourcing enduring themes, global challenges, and process opportunities (3rd ed., pp. 27–53). Heidelberg: Springer.

    Google Scholar 

  • Gottschalk, P., & Solli-Sæther, H. (2006). Managing successful IT outsourcing relationships. Hershey, PA: IRM Press.

    Book  Google Scholar 

  • Guilding, C., Warnken, J., Ardill, A., & Fredline, L. (2005). An agency theory perspective on the owner/manager relationship in tourism-based condominiums. Tourism Management, 26(3), 409–420.

    Article  Google Scholar 

  • Hansson, S. (2007). Risk. In E. Zalta (Ed.), Stanford encyclopedia of philosophy (Winter 2008 Edition). Accessed May 1, 2018, from http://plato.stanford.edu/archives/win2008/entries/risk/

  • Hirscheim, R., Heinzl, A., & Dibbern, J. (2006). Information systems outsourcing, enduring themes, new perspectives and global challenges (2nd ed.). Berlin: Springer.

    Google Scholar 

  • Ho, W., Xu, X., & Dey, P. (2010). Multi-criteria decision making approaches for supplier evaluation and selection: A literature review. European Journal of Operational Research, 202(1), 16–24.

    Article  Google Scholar 

  • Hodosi, G. (2010). A method for decision support in information technology outsourcing: The case for large Swedish companies. Licentiate Thesis, Report Series No. 10–003, ISSN 1101–8526, 2010, Stockholm University, Stockholm.

    Google Scholar 

  • Hodosi, G., & Rusu, L. (2013). How do critical success factors contribute to a successful IT outsourcing: A study of large multinational companies. Journal of Information Technology Theory and Application (JITTA), 14(1), 17–43.

    Google Scholar 

  • ISO. (2002). SO/IEC guide 73:2002, risk management – Vocabulary – Guidelines for use in standards. Accessed May 1, 2018, from http://www.iso.org/iso/catalogue_detail?csnumber=34998

  • Jahyun Goo, J., & Nam, K. (2007). Contract as a source of trust–commitment in successful IT outsourcing relationship: An empirical study. In Proceedings of the 40th annual Hawaii international conference on system sciences (pp. 1–10). Washington, DC: IEEE Computer Society.

    Google Scholar 

  • Jensen, M., & Meckling, W. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics, Harvard University Press, 3(4), 305–360.

    Google Scholar 

  • Kacprzyk, J., Nurmi, H., & Fedrizzi, M. (2012). Consensus under fuzziness. New York: Springer Science & Business Media.

    Google Scholar 

  • Karami, A., Yazdani, H., Beiryaie, H., & Hosseinzadeh, N. (2010). A risk based model for IS outsourcing vendor selection. In 2010 2nd IEEE international conference on information and financial engineering, Chongqing (pp. 250–254). Piscataway, NJ: IEEE.

    Chapter  Google Scholar 

  • Kern, T., & Willcocks, L. (2000). Exploring information technology outsourcing relationships: Theory and practice. Journal of Strategic Information Systems, 9(4), 321–350.

    Article  Google Scholar 

  • Kern, T., & Willcocks, L. (2002). Exploring relationships in information technology outsourcing: The interaction approach. European Journal of Information Systems, 11, 3–19.

    Article  Google Scholar 

  • Lacity, M., Willcocks, L., & Rottman, J. (2008). Global outsourcing of back office services: Lessons, trends, and enduring challenges. Strategic Outsourcing: An International Journal, 1(1), 13–34.

    Article  Google Scholar 

  • Lee, J., Huynh, M., & Hirscheim, R. (2009). Exploring the role of initial trust, initial distrust, and trust through knowledge sharing in IT outsourcing: From a service receiver’s perspective. In R. Hirscheim, A. Heinzl, & J. Dibbern (Eds.), Information systems outsourcing enduring themes, global challenges, and process opportunities (3rd ed., pp. 55–74). Berlin: Springer.

    Google Scholar 

  • Murcko, T. (2014). BusinessDictionary – online. WebFinance, Inc. Accessed April 1, 2018, from http://www.businessdictionary.com/definition/risk-exposure.html

  • Nyrhinen, M., & Dahlberg, T. (2007). Is transaction cost theory able to explain contracts used for and success of firm-wide IT-infrastructure outsourcing? In Proceedings of the 40th Hawaii international conference on system sciences (HICSS-40). Waikoloa, HI: IEEE Computer Society.

    Google Scholar 

  • Ostrom, L., & Wilhelmsen, C. (2012). Risk assessment, tools, techniques, and their applications. Hoboken, NJ: Wiley.

    Book  Google Scholar 

  • Prahalad, C., & Hamel, G. (1990). The core competence of the corporation. Harvard Business Review, 68(3), 79–91.

    Google Scholar 

  • Rockart, J. (1979). Chief executives define their own data needs. Harvard Business Review, 57(2), 81–94.

    Google Scholar 

  • Rusu, L., & Hodosi, G. (2011). Assessing the risk exposure in IT outsourcing for large companies. International Journal of Information Technology and Management, 10(1), 24–44.

    Article  Google Scholar 

  • Sargent, A. (2006). Outsourcing relationship literature: An examination and implications for future research. In Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: Achievements, challenges & the future (pp. 280–287). New York: Association for Computing Machinery.

    Google Scholar 

  • Schermann, M., Dongus, K., Yetton, P., & Krcmar, H. (2016). The role of transaction cost economics in information technology outsourcing research: A meta-analysis of the choice of contract type. The Journal of Strategic Information Systems, 25(1), 32–48.

    Article  Google Scholar 

  • Solli-Sæther, H., & Gottschalk, P. (2015). Stages-of-growth in outsourcing, offshoring and backsourcing: Back to the future? Journal of Computer Information Systems, 55(2), 88–94.

    Article  Google Scholar 

  • Tiwana, A., & Kim, S. (2016). Concurrent IT sourcing: Mechanisms and contingent advantages. Journal of Management Information Systems, 33(1), 1–38.

    Article  Google Scholar 

  • Weber, C., Current, J., & Benton, W. (1991). Vendor selection criteria and methods. European Journal of Operational Research, 50(1), 2–18.

    Article  Google Scholar 

  • Williamson, O. (1985). The economic institutions of capitalism – Firms, markets, relational contracting. London: The Free Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hodosi, G., Rusu, L. (2019). Research Background. In: Risks, Relationships and Success Factors in IT Outsourcing. SpringerBriefs in Information Systems. Springer, Cham. https://doi.org/10.1007/978-3-030-05925-5_2

Download citation

Publish with us

Policies and ethics