Skip to main content

Anxiety and Psychological Security in Offshoring Relationships: The Role and Development of Trust as Emotional Commitment

  • Chapter
  • First Online:
Outsourcing and Offshoring Business Services
  • 2521 Accesses

Abstract

In this paper we focus on the neglected role of anxiety and psychological security in organizational life, specifically in the context of the organization and development of offshoring relationships that extend across time and geography. In contrast with much of the literature on offshoring (and interorganizational relationships more generally), which tends to take a very conventional rational decision-making perspective on the phenomenon in question, we emphasize the less tangible, emotional dimensions. In particular, we are concerned with understanding the processes by which clients, who have little or no previous experience of offshoring, may develop and sustain adequate levels of psychological security to enable them to bracket risk and productively engage in such unfamiliar and alien work arrangements. To this end, we draw on Anthony Giddens’ distinctive, noncognitivist conception of trust, supplemented by other important contributions in the area, to explore the processes by which a sense of psychological security and stability is achieved in the face of the quotidian anxieties provoked by engagement in these contemporary modes of global organizing. Our synthesized theoretical framework is developed and illustrated in the context of an ongoing, in-depth, longitudinal study of the evolution of an Ireland–India information systems offshoring relationship. By tracing the dynamics of this relationship over an 18-month period, we examine the practices (or ‘relationship work’) through which trust is produced and suggest that different mechanisms can be discerned at different (albeit overlapping) stages of the relationship. In the earlier phase, the emphasis is on the role played by care and attentiveness in producing a sense of trust in the qualities of the supplier. As the relationship develops, however, the emphasis shifts to the production of a stable collaborative order. Here, we focus on the micropolitical dynamics of such processes and draw attention to three important tactical interventions (brokerage, signaling, and the ‘third man’). We conclude by arguing that the sense of trust that was carefully cultivated in the earlier phase of the relationship provided a crucial foundation, which not only facilitated the subsequent development of a stable collaborative order but, most noticeably, helped contain a serious crisis that beset the project in December 2006.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For examples of other interesting work that places issues of anxiety and insecurity center stage, see Miller and O’Leary (1987), Knights (1990, 1992), Bloomfield and Coombs (1992), Knights and Murray (1994), Sturdy (1997), and Knights and Willmott (1999).

  2. 2.

    Of course, Giddens was himself deeply influenced by the psychoanalytic tradition, in particular by the work of Sigmund Freud, Erik Erikson (1950), and RD Laing (1971).

  3. 3.

    By highlighting the importance of trust, however, we do not wish to downplay that of more conventional means of control as a risk management strategy. Following Das and Teng (1998), we see trust and control as playing mutually supplementary roles in the production of an overall sense of confidence. As Hart (1988) felicitously puts it, trust exists ‘at the interstices of control.’

  4. 4.

    Giddens uses the term ‘abstract systems’ to collectively refer to two distinct types of disembedding mechanism that allow social interactions/relations to be ‘lifted out’ of the particularities of specific locales and restructured across indefinite spans of time–space:

    • Symbolic tokens: These refer to media of exchange that have standard value and thus are interchangeable across a plurality of contexts. Money is an important example. It can be passed around regardless of the specific characteristic of the individuals or groups that handle it at any particular juncture.

    • Expert systems: These bracket time and space by deploying modes of technical knowledge that have validity independent of the practitioners and clients who make use of them (e.g. the system of Western medical knowledge). Thus, like symbolic tokens, they provide ‘guarantees’ of expectations across distanciated time–space.

  5. 5.

    These conventional approaches implicitly adopt a ‘cognitivist’ perspective (Chaiklin and Lave 1996; Dreyfus and Dreyfus 2005; Kelly 2005) that has been roundly criticized by those who would advocate a more holistic approach to understanding the human subject – that is, one that avoids a dualism between the cognitive and the emotional (cf. Ciborra 2006; Mcgrath 2006). Indeed, a key shortcoming of the notion of ‘calculative trust’ is that it fails to adequately discriminate between trusting behavior and calculated risk taking.

  6. 6.

    Zollo et al. (2002) have also drawn attention to the importance of stable routines in facilitating productive interorganizational relations. Specifically, they draw on evolutionary economics to argue that such routines facilitate ‘…information gathering, communication, decision-making, conflict resolution, and the overall governance of the collaborative process’ (p. 709). Moreover, they draw an explicit distinction between the development of interorganizational routines and trust, because they view trust rather narrowly as an ‘interpersonal’ (p. 709) phenomenon and as the result of ‘deliberative efforts to assess the likelihood of opportunistic behaviour’ (p. 709). While we would agree with these authors’ conclusions that interorganizational routines are extremely important, we would argue that the view of trust synthesized here is more insightful, in that it does not confine the importance of such routines to mere ‘information gathering’ and ‘communication’. Rather, ‘trust as habitus’ also emphasizes the important anxiety reducing functions of such routines.

  7. 7.

    Although Zucker’s emphasis on information and deliberation clearly has cognitivist leanings that would sit uncomfortably with the perspective synthesized here (i.e. we would view interaction as consisting of much more than mere information exchange), we nonetheless believe that the broad mechanisms that she identifies are a very helpful supplement.

  8. 8.

    More precisely, building on the notion that any such abstract system will be interpretively flexible and may be enacted or embedded differently in different contexts, we argue that the key issue at stake is the expert system-in-use (i.e. the specific way in which such abstract principles are instantiated in the practices that constitute this project). The fact that systems always have to be reembedded underscores the importance of making the connection between forms of system trust and personal trust, between the rule and its application (Wittgenstein 1953). It is not merely trust in ‘abstract principles’ that needs to be reestablished at access points but, also, trust in the manner in which these principles are appropriated and applied.

  9. 9.

    We could, indeed, countenance a further stage immediately prior to this Courtship one. At the Dating stage, NetTrade explored a number of options and had some brief liaisons with a number of other vendors. (They had to kiss a few frogs before finding their Prince!) In fact, these encounters were very important in framing their subsequent relationship with IndiaSoft. Here, however, we believe that the anxiety-reducing mechanisms at play were essentially the same as those in the Courtship phase, and so we rejected the idea of analyzing them separately.

  10. 10.

    Whether this was an ‘accurate’ impression of IndiaSoft or not is, perhaps, beside the point. While we are conscious of the danger of resorting to cultural stereotypes here, the key issue is that John formed and sustained this impression of them, and acted on that basis. One point worth considering in this respect is the extent to which IndiaSoft staff were ‘mirroring’ (perhaps unconsciously) particular traits of their client. It would be interesting, for instance, to observe how their ‘presentation of self’ (Goffman 1956) would differ with a very different kind of client. On the evidence of our interaction with IndiaSoft staff, however, both in Ireland and in India, we could also clearly recognize the kind of traits to which John drew attention, and broader social values appear to be a very important feature of life in the firm. Furthermore, there are some good bases for making cultural comparisons between Ireland and India. Not only do both countries share a similar British colonial history (indeed India adopted a modified version of the Irish constitution postindependence and even a modified version of the Irish national flag!) and an emphasis on familial and community ties, but comparisons might also be drawn between recent modes of economic development based on engineering and high technology (see e.g. Foley and O’Connor 2004). Indeed, as John Stuart Mill once pointed out, ‘[t]hose Englishmen who know something about India, are even now those who understand Ireland best’ (Cook 1993: 53).

  11. 11.

    Of course, we would be sympathetic to the general idea that even ostensibly rational/cognitive exercises are often enacted in ritualistic ways as a means of facilitating a more emotional type of commitment. This illustrates the difficulties associated with making a clean separation between the ‘cognitive’ and the ‘emotional.’

  12. 12.

    At the same time, however, the trust also had a brittle quality. In September 2006, one of the researchers met an Irish software developer who had worked with IndiaSoft in India for a short, and unhappy, period. His experience of working with IndiaSoft was not very positive and was dramatically at odds with NetTrade’s impression of them. John, on hearing this story, became extremely worried about the project, and for a short time began to seriously question his own judgments.

  13. 13.

    This kind of interaction became a familiar theme in the project and might be understood as involving the negotiation of the boundary between frontstage and backstage (Goffman 1956). Such was John’s anxiety that he was always trying to ‘peep backstage.’ In his view, however, IndiaSoft did not want to show him their ‘dirty laundry’.’ The fact that trust rests on a presentational base, where frontstage impression management is vital, would suggest that IndiaSoft’s reluctance to accede to John’s wishes was well founded.

  14. 14.

    Cramton (2001) notes how physical separation and reliance on communications technologies can exacerbate uncertainty when trying to interpret the meaning of silence.

  15. 15.

    Demonstrating their irritation over the issue, the €80,000 bill that they received was always referred to as a ‘penalty’ by NetTrade but as a ‘cost overrun’ by IndiaSoft.

References

  • Abbott, P.Y (2004). Software-Export Strategies for Developing Countries: A Caribbean perspective, Electronic Journal of Information Systems in Developing Countries (EJISDC) 20: 1–19.

    Google Scholar 

  • Allen, T.J, and Cohen, S.I (1969). Information Flows in Research and Development Laboratories, Administrative Science Quarterly 14: 12–19.

    Article  Google Scholar 

  • Barki, H, Rivard, S, and Talbot, J (1993). Towards an Assessment of Software Development Risk, Journal of Management Information Systems 10: 203–225.

    Article  Google Scholar 

  • Bloomfield, B, and Coombs, R. (1992). Information Technology, Control and Power: The centralization and decentralization debate revisited, Journal of Management Studies 29: 459–484.

    Article  Google Scholar 

  • Boehm, B.W., and Demarco, T (1997). Software Risk Management: Principles and practices, IEEE Software 14: 17–19.

    Article  Google Scholar 

  • Cartwright, S, and Cooper, C.L (1993). The Role of Culture Compatibility in Successful Organizational Marriage, The Academy of Management Executive 7: 57–70.

    Google Scholar 

  • Chaiklin, S, and Lave, J (eds.) (1996). Understanding Practice: Perspectives on activity and context, Cambridge University Press: Cambridge.

    Google Scholar 

  • Ciborra, C (2006). The Mind or the Heart? It Depends on the (Definition of) Situation, Journal of Information Technology 21: 129–139.

    Article  Google Scholar 

  • Cook, S.B (1993). Imperial Affinities. Nineteenth Century Analogies and Exchanges between India and Ireland, Delhi: Sage.

    Google Scholar 

  • Cramton, C.D (2001). The Mutual Knowledge Problem and its Consequences for Dispersed Collaboration, Organization Science 12: 346–371.

    Article  Google Scholar 

  • Das, T.K, and Teng, B.-S (1998). Between Trust and Control: Developing confidence in partner cooperation in alliances, Academy of Management Review 23: 491–512.

    Google Scholar 

  • Dasgupta, P. (1988). Trust as a Commodity, In D. Gambetta (ed.) Trust: Making and Breaking Cooperative Relations, Oxford: Basil Blackwell.

    Google Scholar 

  • Dreyfus, H.L, and Dreyfus, S.E (2005). Expertise in Real World Contexts, Organization Studies 26: 779–792.

    Article  Google Scholar 

  • Earl, M.J (1996). The Risks of Outsourcing IT, Sloan, Management Review 37: 26–32.

    Google Scholar 

  • Erikson, E (1950). Childhood and Society, New York: Norton.

    Google Scholar 

  • Flyvbjerg, B. (2001). Making Social Science Matter: Why social inquiry fails and how it can succeed again, Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Flyvbjerg, B. (2006). Five Misunderstandings about Case-Study Research, Qualitative Inquiry 12: 219–245.

    Article  Google Scholar 

  • Foley, T, and O’Connor, M. (eds.) (2004). Ireland and India, Colonies: Culture and the Empire – Proceedings of the fourth Galway conference on colonialism, Irish Academic Press: Dublin, Ireland.

    Google Scholar 

  • Gambetta, D. (ed.) (1988). Trust: Making and breaking of cooperative relations, Oxford: Blackwell.

    Google Scholar 

  • Giddens, A (1990). The Consequences of Modernity, Cambridge: Polity.

    Google Scholar 

  • Giddens, A. (1991). Modernity and Self-Identity: Self and society in the late modern age, Cambridge: Polity.

    Google Scholar 

  • Goffman, E (1956). The Presentation of Self in Everyday Life, London: Penguin.

    Google Scholar 

  • Good, D (1988). Individuals, Interpersonal Relations, and Trust, In D. Gambetta (ed.) Trust: The Making and Breaking of Cooperative Relations, Oxford: Blackwell.

    Google Scholar 

  • Hart, K (1988). Kinship, Contract and Trust: The economic organization of migrants in an African city slum, In D. Gambetta (ed.) Trust: The Making and Breaking of Cooperative Relations, Oxford: Blackwell.

    Google Scholar 

  • Hirschhorn, L (1988). The Workplace Within: The psychodynamics of organizational life, Cambridge, MA: MIT Press.

    Google Scholar 

  • Imsland, V, and Sahay, S. (2005). Negotiating Knowledge’: The case of a Russian–Norwegian software outsourcing project, Scandinavian Journal of Information Systems 17: 101–130.

    Google Scholar 

  • Kelly, S (2005). New Frontiers in the Theorization of ICT-Mediated Interaction? Exploring the Implications of a Situated Learning Epistemology, In W.R. King and R. Torkzadeh (eds.) Proceedings of the International Conference on Information Systems (ICIS), Las Vegas: Association of Information Systems.

    Google Scholar 

  • Kern, T (1997). The Gestalt of an Information Technology Outsourcing Relationship: An exploratory analysis, Eighteenth Annual International Conference on Information Systems (ICIS), Atlanta, Georgia: Association of Information Systems.

    Google Scholar 

  • Klein, H.K, and Myers, M.D (1999). A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems, MIS Quarterly 23: 67–88.

    Article  Google Scholar 

  • Klepper, R. (1995). The Management of Partnering Development in I/S Outsourcing, Journal of Information Technology 10: 249–258.

    Article  Google Scholar 

  • Knights, D (1990). Subjectivity, Power and the Labour Process, In D. Knights and H. Willmott (eds.) Labour Process Theory, London: Macmillan.

    Chapter  Google Scholar 

  • Knights, D. (1992). Changing Spaces: The disruptive impact of a new epistemological location for the study of management, Academy of Management Review 17: 514–536.

    Google Scholar 

  • Knights, D, and Murray, F (1994). Managers Divided: Organisation politics and information technology management, Chichester: John Wiley.

    Google Scholar 

  • Knights, D, and Willmott, H (1999). Management Lives: Power and identity in work organizations, London: Sage.

    Google Scholar 

  • Kumar, K, and Willcocks, L.P (1996). Offshore Outsourcing: A country too far? Fourth European Conference on Information Systems (ECIS), Lisbon, Portugal: Association of Information Systems.

    Google Scholar 

  • Lacity, M.C, and Willcocks, L.P (2001). Global Information Technology Outsourcing: In search of business advantage, Chichester: John Wiley & Sons.

    Google Scholar 

  • Laing, R.D (1971). Self and Others, Harmondsworth: Penguin.

    Google Scholar 

  • Levina, N (2005). The Emergence of Boundary Spanning Competence in Practice: Implications for implementation and use of information systems, MIS Quarterly 29: 335–363.

    Google Scholar 

  • Lorenz, E.H (1988). Neither Friends nor Strangers: Informal networks of subcontracting in French industry, In D. Gambetta (ed.) Trust: Making and Breaking Cooperative Relations, Oxford: Basil Blackwell.

    Google Scholar 

  • Mayer, R.C, Davis, J.H, and Schoorman, F.D (1995). An Integrative Model of Organizational Trust, Academy of Management Review 20: 709–734.

    Google Scholar 

  • Mcallister, D.J (1995). Affect- and Cognition-Based Trust as Foundations for Interpersonal Cooperation in Organizations, Academy of Management Journal 38: 24–59.

    Article  Google Scholar 

  • Mcfarlan, F.W, and Nolan, R.L (1995). How to Manage an IT Outsourcing Alliance, Sloan Management Review 36: 9–23.

    Google Scholar 

  • Mcgrath, K (2006). Affection not Affliction: The role of emotions in information systems and organizational change, Information and Organization 16: 277–303.

    Article  Google Scholar 

  • Menzies-Lyth, I (1988). Containing Anxiety in Institutions: Selected essays, London: Free Association Press.

    Google Scholar 

  • Miller, P, and O’Leary, T (1987). Accounting and the Construction of the Governable Person, Accounting, Organizations and Society 12: 235–265.

    Article  Google Scholar 

  • Misztal, B.M (1996). Trust in Modern Societies, Cambridge: Polity.

    Google Scholar 

  • Nicholson, B, and Carmel, E. (2003). Offshore Software Sourcing by Small Firms: An analysis of risk, trust and control, IFIP TC8 & TC9/WG8.2 & WG9.4 Working Conference on Information Systems Perspectives and Challenges in the Context of Globalization, Athens, Greece, International Federation for Information Processing: Laxenburg, Austria.

    Google Scholar 

  • Nicholson, B, and Sahay, S (2001). Some Political and Cultural Issues in the Globalisation of Software Development: Case experience from Britain and India, Information and Organization 11: 25–43.

    Article  Google Scholar 

  • Nicholson, B, and Sahay, S (2004). Embedded Knowledge and Offshore Software Development, Information and Organization 14: 329–365.

    Article  Google Scholar 

  • Pawlowski, S.D, and Robey, D (2004). Bridging User Organizations: Knowledge brokering and the work of information technology professionals, MIS Quarterly 28: 645–672.

    Google Scholar 

  • Pettigrew, A.M (1990). Longitudinal Field Research on Change: Theory and practice, Organization Science 1: 267–292.

    Article  Google Scholar 

  • Reed, M.I (1992). The Sociology of Organizations: Themes, perspectives and prospects, Hemel Hempstead: Harvester Wheatsheaf.

    Google Scholar 

  • Ring, P.S (1996). Fragile and Resilient Trust and their Roles in Economic Exchange, Business and Society 35: 148–175.

    Article  Google Scholar 

  • Ring, P.S., and Van De Ven, A.H (1994). Developmental Process of Cooperative Interorganizational Relationships, Academy of Management Review 19: 90–118.

    Google Scholar 

  • Rousseau, D.M, Sitkin, S.B, Burt, R.S, and Camerer, C. (1998). Not so Different after All: A cross-discipline view of trust, Academy of Management Review 23: 393–404.

    Article  Google Scholar 

  • Sahay, S (2003). Global Software Alliances: The challenge of ‘standardization, Scandinavian Journal of Information Systems 15: 3–21.

    Google Scholar 

  • Sahay, S, Nicholson, B, and Krishna, S (2003). Global IT Outsourcing: Software development across borders, Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Segal, H (1989). Klein, London: Karmac Books.

    Google Scholar 

  • Strauss, A.L, and Corbin, J (1990). Basics of Qualitative Research: Grounded theory procedures and techniques, Newbury Park: Sage.

    Google Scholar 

  • Strauss, A.L, and Corbin, J (1997). Grounded Theory in Practice, London: Sage.

    Google Scholar 

  • Sturdy, A (1997). The Consultancy Process – An insecure business?, Journal of Management Studies 34: 389–413.

    Article  Google Scholar 

  • Tsoukas, H. (1989). The Validity of Idiographic Research Explanations, Academy of Management Review 14: 551–561.

    Google Scholar 

  • Tushman, M.L (1977). Special Boundary Roles in Innovation Processes, Administrative Science Quarterly 22: 587–605.

    Article  Google Scholar 

  • Van De Ven, A.H, and Poole, M.S (1995). Explaining Development and Change in Organizations, Academy of Management Review 20: 510–540.

    Article  Google Scholar 

  • Van De Ven, A.H, and Poole, M.S (2005). Alternative Approaches for Studying Organizational Change, Organization Studies 26: 1377–1400.

    Article  Google Scholar 

  • Walsham, G (1995). Interpretive Case Studies in IS research: Nature and method, European Journal of Information Systems 4: 74–81.

    Article  Google Scholar 

  • Wastell, D. (1999). Learning Dysfunctions in Information Systems Development: Overcoming the social defences with transitional objects, MIS Quarterly 23: 581–600.

    Article  Google Scholar 

  • Wastell, D (2003). Organizational Discourse as Social Defence: Taming the tiger of electronic government, In E. Wynn, E. Whitley, M.D. Myers, and J.I. Degross (eds.) Global and Organizational Discourse about Information Technology, Boston: Kluwer Academic Publishers.

    Google Scholar 

  • Wastell, D.G. (1996). The Fetish of Technique: Methodology as a social defence, Information Systems Journal 6: 25–40.

    Article  Google Scholar 

  • Wenger, E (1998). Communities of Practice: Learning, meaning and identity, Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Willcocks, L.P, Lacity, M, and Kern, T (1999). Risk Mitigation in IT Outsourcing Strategy Revisited: Longitudinal case research at LISA, Journal of Strategic Information Systems 8: 285–314.

    Article  Google Scholar 

  • Willcocks, L.P, and Kern, T (1998). IT Outsourcing as Strategic Partnering: The case of the UK inland revenue, European Journal of Information Systems 7: 29–45.

    Article  Google Scholar 

  • Willcocks, L.P, and Lacity, M (1999). IT Outsourcing in Insurance Services: Risk, creative contracting and business advantage, Information Systems Journal 9: 163–180.

    Article  Google Scholar 

  • Willcocks, L.P, and Margetts, H (1994). Risk Assessment in Information Systems, European Journal of Information Systems 4: 1–12.

    Article  Google Scholar 

  • Williams, B (1988). Formal Structures and Social Reality, In D. Gambetta (ed.) Trust: Making and Breaking Cooperative Relations, Oxford: Basil Blackwell.

    Google Scholar 

  • Winnicott, D.W. (1987). Babies and Their Mothers, New York: Addison-Wesley.

    Google Scholar 

  • Wittgenstein, L (1953). Philosophical Investigations, Oxford: Blackwell.

    Google Scholar 

  • Zollo, M, Reuer, J.J, and Singh, H (2002). Interorganizational Routines and Performance in Strategic Alliances, Organization Science 13: 701–713.

    Article  Google Scholar 

  • Zucker, L.G (1986). Production of Trust: Institutional sources of economic structure 1840–1920, Research in Organizational Behaviour 8: 53–111.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Séamas Kelly .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Kelly, S., Noonan, C. (2017). Anxiety and Psychological Security in Offshoring Relationships: The Role and Development of Trust as Emotional Commitment. In: Willcocks, L., Lacity, M., Sauer, C. (eds) Outsourcing and Offshoring Business Services. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-52651-5_10

Download citation

Publish with us

Policies and ethics