Abstract
In this chapter are described IT outsourcing services, IT outsourcing types, total versus selective IT outsourcing, single versus multiple providers, and how to select IT outsourcing provider. Additionally, this chapter includes the theories in IT outsourcing used in this research and also the risks, relationships and success factors in IT outsourcing that are our research goals.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alborz, S., Seddon, P., & Scheepers, R. (2005). The quality-of-relationship construct in IT outsourcing. In PACIS 2005 proceedings, Paper 93, Association for Information Systems.
Bahli, B., & Rivard, S. (2002). Information technology outsourcing risk: A scenario-based conceptualisation. Cahier de la Chaire de gestion stratégique des technologies de l’information: HEC Montréal, 3000, chemin de la Côte-Sainte-Catherine, Montréal, Québec, H3T 2A7 Canada, no 02–04 – Octobre 2002, ISSN 1702-238X, 1–22. Accessed May 1, 2018, from http://neumann.hec.ca/chairegestionti/cahiers/cahier0204.pdf
Bahli, B., & Rivard, S. (2013). Cost escalation in information technology outsourcing: A moderated mediation study. Decision Support Systems, 56, 37–47.
Barney, J. (1991). Firm resources and sustained competitive advantage. Journal of Management, 17(1), 99–120.
Benbasat, I., & Zmud, R. (1999). Empirical research in information systems: The practice of relevance. MIS Quarterly, 23(1), 3–16.
Beulen, E. (2011). Maturing IT outsourcing relationships: A transaction costs perspective. In J. Kotlarsky, L. Willcocks, & I. Oshri (Eds.), New studies in global IT and business service outsourcing: Lecture notes in business information processing (pp. 66–79). Berlin: Springer.
Beulen, E., Fenema, P., & Currie, W. (2005). From application outsourcing to infrastructure management: Extending the offshore outsourcing service portfolio. European Management Journal, 23(2), 133–144.
Boehm, B. (1991). Software risk management: Principles and practices. IEEE Software, 8, 32–42.
Cao, Q., & Wang, Q. (2007). Optimizing vendor selection in a two-stage outsourcing process. Computers & Operations Research, 34(12), 3757–3768.
Christ, M., Mintchik, N., Chen, L., & Bierstaker, J. (2014). Outsourcing the information system: Determinants, risks, and implications for management control systems. Journal of Management Accounting Research, 27(2), 77–120.
Corbitt, B., & Tho, I. (2005). Towards an economic analysis of IT outsourcing risks. In Proceedings 16th Australasian conference on information systems (pp. 1–8). Sydney: Association for Information Systems.
Cumps, B., Viaene, S., Dedene, G., & Vandenbulcke, J. (2006). A theoretical exploration of the relationship between outsourcing and business/ICT alignment. In Proceedings of European conference on information systems (ECIS 2006). Gothenburg: Association for Information Systems.
Dibbern, J., Chin, W., & Kude, T. (2016). The sourcing of software services: Knowledge specificity and the role of trust. SIGMIS Database, 47(2), 36–57.
Eisenhardt, K. (1989). Agency theory: An assessment and review. Academy of Management Review, 14(1), 57–74.
Fitzgerald, F., & Willcocks, L. (1994). Contracts and partnerships in the outsourcing of IT. In Proceedings of fifteenth international conference on information systems (pp. 51–63). Vancouver, British Columbia: Association for Information Systems.
Goo, J. (2009). Promoting trust and relationship commitment through service level agreements in IT outsourcing relationship. In R. Hirscheim, A. Heinzl, & J. Dibbern (Eds.), Information systems outsourcing enduring themes, global challenges, and process opportunities (3rd ed., pp. 27–53). Heidelberg: Springer.
Gottschalk, P., & Solli-Sæther, H. (2006). Managing successful IT outsourcing relationships. Hershey, PA: IRM Press.
Guilding, C., Warnken, J., Ardill, A., & Fredline, L. (2005). An agency theory perspective on the owner/manager relationship in tourism-based condominiums. Tourism Management, 26(3), 409–420.
Hansson, S. (2007). Risk. In E. Zalta (Ed.), Stanford encyclopedia of philosophy (Winter 2008 Edition). Accessed May 1, 2018, from http://plato.stanford.edu/archives/win2008/entries/risk/
Hirscheim, R., Heinzl, A., & Dibbern, J. (2006). Information systems outsourcing, enduring themes, new perspectives and global challenges (2nd ed.). Berlin: Springer.
Ho, W., Xu, X., & Dey, P. (2010). Multi-criteria decision making approaches for supplier evaluation and selection: A literature review. European Journal of Operational Research, 202(1), 16–24.
Hodosi, G. (2010). A method for decision support in information technology outsourcing: The case for large Swedish companies. Licentiate Thesis, Report Series No. 10–003, ISSN 1101–8526, 2010, Stockholm University, Stockholm.
Hodosi, G., & Rusu, L. (2013). How do critical success factors contribute to a successful IT outsourcing: A study of large multinational companies. Journal of Information Technology Theory and Application (JITTA), 14(1), 17–43.
ISO. (2002). SO/IEC guide 73:2002, risk management – Vocabulary – Guidelines for use in standards. Accessed May 1, 2018, from http://www.iso.org/iso/catalogue_detail?csnumber=34998
Jahyun Goo, J., & Nam, K. (2007). Contract as a source of trust–commitment in successful IT outsourcing relationship: An empirical study. In Proceedings of the 40th annual Hawaii international conference on system sciences (pp. 1–10). Washington, DC: IEEE Computer Society.
Jensen, M., & Meckling, W. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics, Harvard University Press, 3(4), 305–360.
Kacprzyk, J., Nurmi, H., & Fedrizzi, M. (2012). Consensus under fuzziness. New York: Springer Science & Business Media.
Karami, A., Yazdani, H., Beiryaie, H., & Hosseinzadeh, N. (2010). A risk based model for IS outsourcing vendor selection. In 2010 2nd IEEE international conference on information and financial engineering, Chongqing (pp. 250–254). Piscataway, NJ: IEEE.
Kern, T., & Willcocks, L. (2000). Exploring information technology outsourcing relationships: Theory and practice. Journal of Strategic Information Systems, 9(4), 321–350.
Kern, T., & Willcocks, L. (2002). Exploring relationships in information technology outsourcing: The interaction approach. European Journal of Information Systems, 11, 3–19.
Lacity, M., Willcocks, L., & Rottman, J. (2008). Global outsourcing of back office services: Lessons, trends, and enduring challenges. Strategic Outsourcing: An International Journal, 1(1), 13–34.
Lee, J., Huynh, M., & Hirscheim, R. (2009). Exploring the role of initial trust, initial distrust, and trust through knowledge sharing in IT outsourcing: From a service receiver’s perspective. In R. Hirscheim, A. Heinzl, & J. Dibbern (Eds.), Information systems outsourcing enduring themes, global challenges, and process opportunities (3rd ed., pp. 55–74). Berlin: Springer.
Murcko, T. (2014). BusinessDictionary – online. WebFinance, Inc. Accessed April 1, 2018, from http://www.businessdictionary.com/definition/risk-exposure.html
Nyrhinen, M., & Dahlberg, T. (2007). Is transaction cost theory able to explain contracts used for and success of firm-wide IT-infrastructure outsourcing? In Proceedings of the 40th Hawaii international conference on system sciences (HICSS-40). Waikoloa, HI: IEEE Computer Society.
Ostrom, L., & Wilhelmsen, C. (2012). Risk assessment, tools, techniques, and their applications. Hoboken, NJ: Wiley.
Prahalad, C., & Hamel, G. (1990). The core competence of the corporation. Harvard Business Review, 68(3), 79–91.
Rockart, J. (1979). Chief executives define their own data needs. Harvard Business Review, 57(2), 81–94.
Rusu, L., & Hodosi, G. (2011). Assessing the risk exposure in IT outsourcing for large companies. International Journal of Information Technology and Management, 10(1), 24–44.
Sargent, A. (2006). Outsourcing relationship literature: An examination and implications for future research. In Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: Achievements, challenges & the future (pp. 280–287). New York: Association for Computing Machinery.
Schermann, M., Dongus, K., Yetton, P., & Krcmar, H. (2016). The role of transaction cost economics in information technology outsourcing research: A meta-analysis of the choice of contract type. The Journal of Strategic Information Systems, 25(1), 32–48.
Solli-Sæther, H., & Gottschalk, P. (2015). Stages-of-growth in outsourcing, offshoring and backsourcing: Back to the future? Journal of Computer Information Systems, 55(2), 88–94.
Tiwana, A., & Kim, S. (2016). Concurrent IT sourcing: Mechanisms and contingent advantages. Journal of Management Information Systems, 33(1), 1–38.
Weber, C., Current, J., & Benton, W. (1991). Vendor selection criteria and methods. European Journal of Operational Research, 50(1), 2–18.
Williamson, O. (1985). The economic institutions of capitalism – Firms, markets, relational contracting. London: The Free Press.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Hodosi, G., Rusu, L. (2019). Research Background. In: Risks, Relationships and Success Factors in IT Outsourcing. SpringerBriefs in Information Systems. Springer, Cham. https://doi.org/10.1007/978-3-030-05925-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-05925-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05924-8
Online ISBN: 978-3-030-05925-5
eBook Packages: Business and ManagementBusiness and Management (R0)