Skip to main content

IT Outsourcing Configuration: Defining and Designing Outsourcing Arrangements

  • Chapter
The Practice of Outsourcing

Abstract

In this chapter, we introduce the concept of information technology outsourcing (ITO) “configuration”, defined as: a high-level description of the set of choices the organization makes in crafting its IT outsourcing portfolio. From research into 49 ITO arrangements studied over time, we identify seven attributes — Scope Grouping, Supplier Grouping, Financial Scale, Duration, Pricing, Resource Ownership, and Commercial Relationship — as key descriptors of an organization’s ITO configuration. Seven further cases tested the relevance of the attributes. The contribution of this chapter is its articulation of the concept of configuration as a taxonomy of ITO structural characteristics, the key attributes, and demonstration that configuration is an important concept for understanding, comparing, and managing ITO arrangements. In particular we detail the rationales for 31 different options in outsourcing, the risks and management issues emerging for each, and how these play out in different combinations in selected, illustrative case studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Ang, S. and Beath, C. (1993) “Hierarchical Elements in Software Contracts”, Journal of Organizational Computing, 3, 3, 329–361.

    Article  Google Scholar 

  • Ang, S. and Cummings, L.L. (1997) “Strategic Response to Institutional Influences on Information Systems Outsourcing”, Organizational Science, 8, 3, 235–256.

    Article  Google Scholar 

  • Cross, J. (1995) “IT Outsourcing at British Petroleum”, Harvard Business Review, May-June, 94–102.

    Google Scholar 

  • Cullen, S. (2005) Outsourcing IT and Services: Research Into Lifecycle, Configuration and Success, PHD Thesis, University of Melbourne, Melbourne.

    Google Scholar 

  • Cullen, S. and Seddon, P.B. (2004) “Configuration: An Important Concept for Understanding IT Outsourcing”, Pacific-Asia Conference on Information Systems. Summer, Hong Kong.

    Google Scholar 

  • Cullen, S. and Willcocks, L.P. (2003) Intelligent IT Outsourcing: Eight Building Blocks to Success, Elsevier, Chichester.

    Google Scholar 

  • Cullen, S., Seddon, P.B. and Willcocks, L.P. (2005) “Managing Outsourcing: The Lifecycle Imperative”, MIS Quarterly Executive, 4, 1, April, 229–246.

    Google Scholar 

  • Cullen, S., Willcocks, L.P. and Seddon, P.B. (2001) Information Technology Outsourcing Practices in Australia, Deloitte Touche Tohmatsu, Sydney.

    Google Scholar 

  • Currie, W.L. (1996) “Outsourcing in the Private and Public Sectors: An Unpredictable IT Strategy”, European Journal of In formation Systems, 4, 4, 226–236.

    Article  Google Scholar 

  • Currie, W.L. (1998) “Using Multiple Suppliers to Mitigate the Risk of IT Outsourcing at ICI and Wessex Water”, Journal of Information Technology, 13, 169–180.

    Article  Google Scholar 

  • Deloitte (2005) Calling a Change in the Outsourcing Market Deloitte Development LLC, http://www.deloitte.com/dtt/cda/doc/content/usoutsourcing_callingachange. pdf April.

  • Dibbern, J., Goles, T., Hirschheim, R. and Jayatilaka, B. (2004) “Information Systems Outsourcing: A Survey and Analysis of the Literature”, ACM Data Base, 35, 4, 6–102.

    Article  Google Scholar 

  • Domberger, S., Fernandez, P. and Fiebeg, D. (2000) “Modelling the Price, Performance and Contract Characteristics of IT Outsourcing”, Journal of Information Technology, 15, 2, 107–118.

    Article  Google Scholar 

  • Drucker, P. (1995) “The Network Society”, The Wall Street Journal, March 29, A14.

    Google Scholar 

  • Dyer, J. (2000) Collaborative Advantage: Winning through Extended Enterprise Supplier Networks, Oxford University Press, New York.

    Google Scholar 

  • Earl, M. (1996) “The Risks of Outsourcing IT”, Sloan Management Review, 37, 3, 26–32.

    Google Scholar 

  • Earls, A. (2004) “End of the Affair: Bringing Outsourced Operations Back in-house”, Computerworld, May 31, p. 35.

    Google Scholar 

  • Feeny, D., Lacity, M. and Willcocks, L. (2005) “Taking The Measure Of Outsourcing Service Providers”, Sloan Management Review, 46, 3, 41–48.

    Google Scholar 

  • Gallivan, M.J. and Oh, W. (1999) “Analyzing IT Outsourcing Relationships as Alliances among Multiple Clients and Vendors”, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. HICSS, Hawaii.

    Google Scholar 

  • Hancox, M. and Hackney, R. (1999) “Information Technology Outsourcing: Conceptualizing Practice in the Public and Private Sector”, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. HICSS, Hawaii.

    Google Scholar 

  • Hirschheim, R.A. and Lacity, M.J. (2000) “The Myths and Realities of Information Technology Outsourcing”, Communications of the ACM, 43, 2, 99–107.

    Article  Google Scholar 

  • Hui, P.P. and Beath, CM. (2002) “The IT Sourcing Process: A Framework for Research”. Working Paper, University of Texas at Austin, Texas.

    Google Scholar 

  • Humphry, R. (2000) Review of the Whole of Government Information Technology Outsourcing Initiative, Commonwealth of Australia, Sydney, December.

    Google Scholar 

  • Jensen, M.C. and Meckling, W. (1976) “Theory of the Firm: Managerial Behavior, Agency Costs and Ownership Structure”, Journal of Financial Economics, 4, 305–360.

    Article  Google Scholar 

  • Kern, T. and Willcocks, L.P. (2001) The Relationship Advantage: Information Technologies, Sourcing, and Management, Oxford University Press, Oxford.

    Book  Google Scholar 

  • Klepper, R. and Jones, W.O. (1998) Outsourcing Information Technology Systems & Services, Prentice Hall, New Jersey.

    Google Scholar 

  • Knolmayer, G. (2002) “Cybermediaries Supporting the Management of Independent Workers: A Case Study of Extended Outsourcing Relationships”, in Hirschheim, R.A., Heinzl, A. and Dibbern J. et al. (eds). Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, Springer-Verlag, New York.

    Google Scholar 

  • Lacity, M.C. and Hirschheim, R.A. (1993) Information Systems Outsourcing: Myths, Metaphors, and Realities, Wiley, New York.

    Google Scholar 

  • Lacity, M. and Rottman, J. (2007) The Offshore Outsourcing of IT Work, Palgrave, London.

    Google Scholar 

  • Lacity, M.C, Willcocks, L.P. and Feeny, D. (1996) “The Value of Selective Sourcing”, Sloan Management Review, Spring 13–25.

    Google Scholar 

  • Lacity, M.C. and Willcocks, L.P. (1998) “An Empirical Investigation of Information Technology Sourcing Practices: Lessons from Experience”, Management Information Systems Quarterly, 22, 3, September, 363–408.

    Article  Google Scholar 

  • Lacity, M.C. and Willcocks, L.P. (2001) Global IT Outsourcing: In Search Of Business Advantage, Wiley, Chichester.

    Google Scholar 

  • Lacity, M. and Willcocks, L. (2009) Information Systems and Outsourcing: Studies in Theory and Practice, Palgrave, London.

    Google Scholar 

  • Lacity, M., Willcocks, L. and Feeny, D. (1996) “The Value of Selective IT Sourcing”, Sloan Management Review, 37, 3, Spring, pp. 13–25.

    Google Scholar 

  • Lee, J-N., Miranda, S.M. and Kim, Y-M. (2004) “IT Outsourcing Strategies: Universalistic, Contingency, and Configurational Explanations of Success”, Information Systems Research, 15, 2, 110–131.

    Article  Google Scholar 

  • Loh, L. and Venkatraman, N. (1992) “Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis”, Journal of Management Information Systems, 9, 1, Summer, 7–24.

    Article  Google Scholar 

  • Loh, Lawrence and Venkatraman, N. (1995) “An Empirical Study of Information Technology Outsourcing: Benefits, Risks, and Performance Implications”. Proceedings of the 16th International Conference on Information Systems, Amsterdam 277–288.

    Google Scholar 

  • Marcolin, B.L. and McLellan, K.L. (1998) “Effective IT Outsourcing Arrangements”, Proceedings of the 31st Annual Hawaii International Conference on System Sciences. HICSS, Hawaii, 654–665.

    Google Scholar 

  • McFarlan, F.W. and Nolan, R.L. (1995) “How to Manage an IT Outsourcing Alliance”, Sloan Management Review, 4, 9–23.

    Google Scholar 

  • Millar, V. (1994) “Outsourcing Trends”, Proceedings of the Outsourcing, Cosourcing and Insourcing Conference, University of California-Berkeley, California.

    Google Scholar 

  • Mintzberg, H. and Lampel, J. (1999) “Reflecting on the Strategy Process”, Sloan Management Review, 40, 3, 21–30.

    Google Scholar 

  • Quinn, J.B., Doorley, T. and Paquette, P. (1990) “Beyond Products: Services-Based Strategy”, Harvard Business Review, March-April, 58–67.

    Google Scholar 

  • Rottman, J. and Lacity, M. (2005) “Twenty Practices for Offshore Outsourcing”, MISQ Executive 3, 3, 117–130.

    Google Scholar 

  • Rouse, A.C. and Corbitt, B. (2003) “Revisiting IT Outsourcing Risks: Analysis of a survey of Australia’s Top 1000 organizations”, 14th Australasian Conference on Information Systems, Perth, 1–11.

    Google Scholar 

  • Sambamurthy, V., Straub, D.W. and Watson, R.T. (2001) “Information Technology Managing in the Digital Era”, in Dickson, G.W. and DeSanctis, G. (eds) Information Technology and the Future Enterprise, New Models for Managers, NJ: Prentice Hall, 281–305.

    Google Scholar 

  • Venkatraman, N. (1997) “Beyond Outsourcing: Managing IT Resources as a Value Center”, Sloan Management Review, 38, 3, 51–64.

    Google Scholar 

  • Willcocks, L.P. and Cullen, S. (2005) The Outsourcing Enterprise: A CEO Agenda Briefing, LogicaCMG, London.

    Google Scholar 

  • Willcocks, L. and Lacity, M. (2009) Research Studies in Information Technology Outsourcing: Perspectives, Practices and Globalization. Volume 1 — Making IT Outsourcing Decisions; Volume 2 — Managing Outsourcing Relationships; Volume 3 — Global Outsourcing: Issues and Trends, Sage, London.

    Google Scholar 

  • Willcocks, L., Petherbridge, P. and Olson, N. (2003) Making IT Count: Strategy, Delivery, Infrastructure, Butterworth Heinemann, Oxford.

    Google Scholar 

  • Williamson, O.E. (1985) The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting, The Free Press, New York.

    Google Scholar 

Download references

Authors

Copyright information

© 2009 Sara Cullen, Peter Seddon and Leslie Willcocks

About this chapter

Cite this chapter

Cullen, S., Seddon, P., Willcocks, L. (2009). IT Outsourcing Configuration: Defining and Designing Outsourcing Arrangements. In: The Practice of Outsourcing. Palgrave Macmillan, London. https://doi.org/10.1057/9780230240841_11

Download citation

Publish with us

Policies and ethics