Information Technology Outsourcing Risk Trends in China

  • Desheng Wu
  • David L. Olson
  • Dexiang Wu


The information technology (IT) industry has seen massive changes in the past decade. A great deal of outsourcing of IT has been outsourced, much to India, but also a great deal to China and Russia. The Chinese government has adopted a five-year plan for economic development emphasizing service outsourcing. This paper reviews IT outsourcing risk, considers methods to identify and assess risk, and points to tools for the evaluation of risk, both quantitative and qualitative. Factors specific to China are reviewed.


Information Technology Delphi Method Enterprise System Software Company Risk Identification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Anderson K (2007). Convergence: A holistic approach to risk management. Network Security May, 4-7Google Scholar
  2. Asia Times Online: Accessed July 2007
  3. Bryson KM and Sullivan WE (2003) Designing effective incentive-oriented contracts for application service provider hosting of ERP systems, Business Process Management Journal, 9: 705-721Google Scholar
  4. Cong G., Zhang J., Chen T. and Lai K-K (2008) A variable precision fuzzy rough group decision-making model for IT offshore outsourcing risk evaluation. Journal of Global Information Management 16: 18-34CrossRefGoogle Scholar
  5. Ekanayaka Y Currie WL and Seltsikas P (2003) Evaluating application service providers. Benchmarking: An International Journal 10: 343-354Google Scholar
  6. Fa SZ (2006) Circular of Ministry of Commerce on Implementing the “thousand-hundred-ten project” of service outsourcing.
  7. Gonzalez R, Gasco J, Llopis J (2006) Information systems offshore outsourcing. Industrial Management & Data Systems 106: 1233-1248Google Scholar
  8. Joplin B and Terry C (2000) Financial system outsourcing: The ERP application hosting option. Government Finance Review 16: 31-33Google Scholar
  9. Kliem RL, Ludin IS (1998) Reducing project risk. Gower, Aldershot EnglandGoogle Scholar
  10. Levensohn A (2004) How to manage risk – Enterprise-wide. Strategic Finance 86: 55-56Google Scholar
  11. Meta Group Consultancy (2001) ComputerWorld, March 19:,39026381,39150917,00.htm
  12. Moore CM (1994) Group techniques for idea building, 2nd ed. Sage Publications, Thousand Oaks CAGoogle Scholar
  13. Olson DL (2004) Managerial issues of enterprise resource planning systems. McGraw-Hill/Irwin, BostonGoogle Scholar
  14. Van Everdingen Y, van Hellegersberg J and Waarts E (2000) ERP adoption by European midsize companies. Communications of the ACM 43: 27-31Google Scholar
  15. Wang J-J and De-Li Y (2007) Using a hybrid multi-criteria decision aid method for information systems outsourcing. Computers & Operations Research 34: 3691-3700zbMATHGoogle Scholar
  16. Yusuf Y, Gunasekaran A, Wu C (2006) Implementation of enterprise resource planning in China. Technovation 26: 1324-1336Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Desheng Wu
    • 1
  • David L. Olson
    • 2
  • Dexiang Wu
    • 3
  1. 1.RiskLabUniversity of TorontoCanada
  2. 2.University of NebraskaUSA
  3. 3.University of Science and Technology of ChinaChina

Personalised recommendations