Abstract
In this chapter, we introduce the concept of information technology outsourcing (ITO) “configuration”, defined as: a high-level description of the set of choices the organization makes in crafting its IT outsourcing portfolio. From research into 49 ITO arrangements studied over time, we identify seven attributes — Scope Grouping, Supplier Grouping, Financial Scale, Duration, Pricing, Resource Ownership, and Commercial Relationship — as key descriptors of an organization’s ITO configuration. Seven further cases tested the relevance of the attributes. The contribution of this chapter is its articulation of the concept of configuration as a taxonomy of ITO structural characteristics, the key attributes, and demonstration that configuration is an important concept for understanding, comparing, and managing ITO arrangements. In particular we detail the rationales for 31 different options in outsourcing, the risks and management issues emerging for each, and how these play out in different combinations in selected, illustrative case studies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ang, S. and Beath, C. (1993) “Hierarchical Elements in Software Contracts”, Journal of Organizational Computing, 3, 3, 329–361.
Ang, S. and Cummings, L.L. (1997) “Strategic Response to Institutional Influences on Information Systems Outsourcing”, Organizational Science, 8, 3, 235–256.
Cross, J. (1995) “IT Outsourcing at British Petroleum”, Harvard Business Review, May-June, 94–102.
Cullen, S. (2005) Outsourcing IT and Services: Research Into Lifecycle, Configuration and Success, PHD Thesis, University of Melbourne, Melbourne.
Cullen, S. and Seddon, P.B. (2004) “Configuration: An Important Concept for Understanding IT Outsourcing”, Pacific-Asia Conference on Information Systems. Summer, Hong Kong.
Cullen, S. and Willcocks, L.P. (2003) Intelligent IT Outsourcing: Eight Building Blocks to Success, Elsevier, Chichester.
Cullen, S., Seddon, P.B. and Willcocks, L.P. (2005) “Managing Outsourcing: The Lifecycle Imperative”, MIS Quarterly Executive, 4, 1, April, 229–246.
Cullen, S., Willcocks, L.P. and Seddon, P.B. (2001) Information Technology Outsourcing Practices in Australia, Deloitte Touche Tohmatsu, Sydney.
Currie, W.L. (1996) “Outsourcing in the Private and Public Sectors: An Unpredictable IT Strategy”, European Journal of In formation Systems, 4, 4, 226–236.
Currie, W.L. (1998) “Using Multiple Suppliers to Mitigate the Risk of IT Outsourcing at ICI and Wessex Water”, Journal of Information Technology, 13, 169–180.
Deloitte (2005) Calling a Change in the Outsourcing Market Deloitte Development LLC, http://www.deloitte.com/dtt/cda/doc/content/usoutsourcing_callingachange. pdf April.
Dibbern, J., Goles, T., Hirschheim, R. and Jayatilaka, B. (2004) “Information Systems Outsourcing: A Survey and Analysis of the Literature”, ACM Data Base, 35, 4, 6–102.
Domberger, S., Fernandez, P. and Fiebeg, D. (2000) “Modelling the Price, Performance and Contract Characteristics of IT Outsourcing”, Journal of Information Technology, 15, 2, 107–118.
Drucker, P. (1995) “The Network Society”, The Wall Street Journal, March 29, A14.
Dyer, J. (2000) Collaborative Advantage: Winning through Extended Enterprise Supplier Networks, Oxford University Press, New York.
Earl, M. (1996) “The Risks of Outsourcing IT”, Sloan Management Review, 37, 3, 26–32.
Earls, A. (2004) “End of the Affair: Bringing Outsourced Operations Back in-house”, Computerworld, May 31, p. 35.
Feeny, D., Lacity, M. and Willcocks, L. (2005) “Taking The Measure Of Outsourcing Service Providers”, Sloan Management Review, 46, 3, 41–48.
Gallivan, M.J. and Oh, W. (1999) “Analyzing IT Outsourcing Relationships as Alliances among Multiple Clients and Vendors”, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. HICSS, Hawaii.
Hancox, M. and Hackney, R. (1999) “Information Technology Outsourcing: Conceptualizing Practice in the Public and Private Sector”, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. HICSS, Hawaii.
Hirschheim, R.A. and Lacity, M.J. (2000) “The Myths and Realities of Information Technology Outsourcing”, Communications of the ACM, 43, 2, 99–107.
Hui, P.P. and Beath, CM. (2002) “The IT Sourcing Process: A Framework for Research”. Working Paper, University of Texas at Austin, Texas.
Humphry, R. (2000) Review of the Whole of Government Information Technology Outsourcing Initiative, Commonwealth of Australia, Sydney, December.
Jensen, M.C. and Meckling, W. (1976) “Theory of the Firm: Managerial Behavior, Agency Costs and Ownership Structure”, Journal of Financial Economics, 4, 305–360.
Kern, T. and Willcocks, L.P. (2001) The Relationship Advantage: Information Technologies, Sourcing, and Management, Oxford University Press, Oxford.
Klepper, R. and Jones, W.O. (1998) Outsourcing Information Technology Systems & Services, Prentice Hall, New Jersey.
Knolmayer, G. (2002) “Cybermediaries Supporting the Management of Independent Workers: A Case Study of Extended Outsourcing Relationships”, in Hirschheim, R.A., Heinzl, A. and Dibbern J. et al. (eds). Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, Springer-Verlag, New York.
Lacity, M.C. and Hirschheim, R.A. (1993) Information Systems Outsourcing: Myths, Metaphors, and Realities, Wiley, New York.
Lacity, M. and Rottman, J. (2007) The Offshore Outsourcing of IT Work, Palgrave, London.
Lacity, M.C, Willcocks, L.P. and Feeny, D. (1996) “The Value of Selective Sourcing”, Sloan Management Review, Spring 13–25.
Lacity, M.C. and Willcocks, L.P. (1998) “An Empirical Investigation of Information Technology Sourcing Practices: Lessons from Experience”, Management Information Systems Quarterly, 22, 3, September, 363–408.
Lacity, M.C. and Willcocks, L.P. (2001) Global IT Outsourcing: In Search Of Business Advantage, Wiley, Chichester.
Lacity, M. and Willcocks, L. (2009) Information Systems and Outsourcing: Studies in Theory and Practice, Palgrave, London.
Lacity, M., Willcocks, L. and Feeny, D. (1996) “The Value of Selective IT Sourcing”, Sloan Management Review, 37, 3, Spring, pp. 13–25.
Lee, J-N., Miranda, S.M. and Kim, Y-M. (2004) “IT Outsourcing Strategies: Universalistic, Contingency, and Configurational Explanations of Success”, Information Systems Research, 15, 2, 110–131.
Loh, L. and Venkatraman, N. (1992) “Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis”, Journal of Management Information Systems, 9, 1, Summer, 7–24.
Loh, Lawrence and Venkatraman, N. (1995) “An Empirical Study of Information Technology Outsourcing: Benefits, Risks, and Performance Implications”. Proceedings of the 16th International Conference on Information Systems, Amsterdam 277–288.
Marcolin, B.L. and McLellan, K.L. (1998) “Effective IT Outsourcing Arrangements”, Proceedings of the 31st Annual Hawaii International Conference on System Sciences. HICSS, Hawaii, 654–665.
McFarlan, F.W. and Nolan, R.L. (1995) “How to Manage an IT Outsourcing Alliance”, Sloan Management Review, 4, 9–23.
Millar, V. (1994) “Outsourcing Trends”, Proceedings of the Outsourcing, Cosourcing and Insourcing Conference, University of California-Berkeley, California.
Mintzberg, H. and Lampel, J. (1999) “Reflecting on the Strategy Process”, Sloan Management Review, 40, 3, 21–30.
Quinn, J.B., Doorley, T. and Paquette, P. (1990) “Beyond Products: Services-Based Strategy”, Harvard Business Review, March-April, 58–67.
Rottman, J. and Lacity, M. (2005) “Twenty Practices for Offshore Outsourcing”, MISQ Executive 3, 3, 117–130.
Rouse, A.C. and Corbitt, B. (2003) “Revisiting IT Outsourcing Risks: Analysis of a survey of Australia’s Top 1000 organizations”, 14th Australasian Conference on Information Systems, Perth, 1–11.
Sambamurthy, V., Straub, D.W. and Watson, R.T. (2001) “Information Technology Managing in the Digital Era”, in Dickson, G.W. and DeSanctis, G. (eds) Information Technology and the Future Enterprise, New Models for Managers, NJ: Prentice Hall, 281–305.
Venkatraman, N. (1997) “Beyond Outsourcing: Managing IT Resources as a Value Center”, Sloan Management Review, 38, 3, 51–64.
Willcocks, L.P. and Cullen, S. (2005) The Outsourcing Enterprise: A CEO Agenda Briefing, LogicaCMG, London.
Willcocks, L. and Lacity, M. (2009) Research Studies in Information Technology Outsourcing: Perspectives, Practices and Globalization. Volume 1 — Making IT Outsourcing Decisions; Volume 2 — Managing Outsourcing Relationships; Volume 3 — Global Outsourcing: Issues and Trends, Sage, London.
Willcocks, L., Petherbridge, P. and Olson, N. (2003) Making IT Count: Strategy, Delivery, Infrastructure, Butterworth Heinemann, Oxford.
Williamson, O.E. (1985) The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting, The Free Press, New York.
Copyright information
© 2009 Sara Cullen, Peter Seddon and Leslie Willcocks
About this chapter
Cite this chapter
Cullen, S., Seddon, P., Willcocks, L. (2009). IT Outsourcing Configuration: Defining and Designing Outsourcing Arrangements. In: The Practice of Outsourcing. Palgrave Macmillan, London. https://doi.org/10.1057/9780230240841_11
Download citation
DOI: https://doi.org/10.1057/9780230240841_11
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-30202-4
Online ISBN: 978-0-230-24084-1
eBook Packages: Palgrave Business & Management CollectionBusiness and Management (R0)