Skip to main content

A Two-Level Principal-Agent Model for Schedule Risk Control of IT Outsourcing Project Based on Genetic Algorithm

  • Conference paper
  • First Online:
Proceedings of the 23rd International Conference on Industrial Engineering and Engineering Management 2016

Abstract

IT service outsourcing is an effective way to enhance the core competitiveness for many enterprises. But the schedule risk of IT outsourcing project may cause enormous economic loss to enterprise. In this paper, the principal-agent theory is used to build the model for schedule risk control of IT outsourcing project. According to the feature of problem, Genetic Algorithm (GA) is designed to solve the proposed model and the optimal plan of controlling schedule risk is given based on the simulation analysis. The simulation results demonstrate that this paper can provide the scientific quantitative proposal for the decision maker who needs to control the schedule risk of IT outsourcing project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mary C.L Shaji A.K Leslie P.W. “A review of the IT outsourcing literature: Insights for practice” Journal of Strategic Information Systems, 2009, 18;130–146.

    Google Scholar 

  2. Zhiping, F Weilan, S. “Identifying risk factors of IT outsourcing using interdependent information: An extended DEMATEL method ” Expert Systems with Applications, 2012, 39(3):3832–3840.

    Google Scholar 

  3. Bahli,B Rivard,S “Validating measures of information technology outsourcing risk factors” Omega, 2005, 33(2):175–187.

    Google Scholar 

  4. Kun.H “Research on risk early-warning of information technology outsourcing project based on neural network” Applied Mechanics and Materials, 2013, 411–414.

    Google Scholar 

  5. Willcocks LP Lacity MC T Kern “Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA” Journal of Strategic Information Systems, 1999, 8(3):285–314.

    Google Scholar 

  6. Kliem,R “Managing the risks of offshore IT development projects” Information Systems Management, 2004, 21(3):22–27.

    Google Scholar 

  7. Abdullah Lili M Verner June M “Analysis and application of an outsourcing risk framework” Journal of Systems and Software, 2012, 85(8):1930–1952.

    Google Scholar 

  8. Alexandrova,M “Risk factors in IT outsourcing partnerships: Vendor’s perspective” Global Business Review, 2015, 16(5):747–759.

    Google Scholar 

  9. Chitrasen S Saurav D Siba S M “Risk assessment in IT outsourcing using fuzzy decision-making approach: an Indian perspective” Experts Systems with Applications, 2014,14:4010–4022.

    Google Scholar 

  10. Samadi,H Nazari-Shirkouhi,S Keramati “An identifying and analyzing risks and responses for risk management in information technology outsourcing projects under fuzzy environment ” International Journal of Information Technology & Decision Making, 2014, 13(6):1283–1323.

    Google Scholar 

  11. Liangjuan, Q Harris, H Nan, Z “Risk identification and conduction model for financial institution IT outsourcing in China ”Information & Management, 2010, 13(4):429–443.

    Google Scholar 

  12. Xiaoxia H. Tianyi Z. Shamsiya K “Uncertain mean-variance and mean-semivariance models for optimal project selection and schedule” Knowledge-Based Systems, 2016, 93(1): 1–11.

    Google Scholar 

  13. Earl, M. “The risks of outsourcing IT” Sloan Management Review, 1996, 37 (3): 26–32.

    Google Scholar 

  14. Boehm, B.W. “Software risk management: principals and practices” IEEE Software, 1991, 8(1):32–41.

    Google Scholar 

  15. Boehm, B.W. “Software risk management” IEEE Software, 1989, 14(3):1–19.

    Google Scholar 

  16. Bahli,B Rivard,S “The information technology outsourcing risk: A transaction cost and agency theory-based perspective” Journal of Information Technology, 2003, 18(3):211–221.

    Google Scholar 

  17. Kweku-Muata Osei-Bryson Ojelanki K. Ngwenyama “Managing risks in information systems outsourcing: an approach to analyzing outsourcing risks and structure incentive contracts ” European Journal of Operational Research, 2006, 174: 245–264.

    Google Scholar 

  18. Sanfa, C Kai, C Bin, Z “Producer services outsourcing risk control based on outsourcing contract design: industrial engineering perspective” Systems Engineering Procedia, 2011, 2:308–315.

    Google Scholar 

  19. Narasimhaiah G Toni M. S “The impact of IT outsourcing on information systems success ” Information & Management, 2014, 51(3):320–335.

    Google Scholar 

  20. Christoph,S “Distributed Decision Making” Berlin: Springer-Verlag, 2003, 125–156.

    Google Scholar 

  21. Christoph,S “Distributed decision making-a unified approach” European Journal of Operational Research, 2003, 150: 237–252.

    Google Scholar 

  22. Fang C. Franck M “A simulation-based risk network model for decision support in project risk management” Decision Support Systems, 2012, 52(3):635–644.

    Google Scholar 

  23. Jerson C. Annelies M. “A multivariate approach for top-down project control using earned value management” Decision Support Systems, 2015, 79:65–76.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fuqian Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Atlantis Press and the author(s)

About this paper

Cite this paper

Sun, F., Duan, S., Lu, F., Bi, H. (2017). A Two-Level Principal-Agent Model for Schedule Risk Control of IT Outsourcing Project Based on Genetic Algorithm. In: Qi, E., Shen, J., Dou, R. (eds) Proceedings of the 23rd International Conference on Industrial Engineering and Engineering Management 2016. Atlantis Press, Paris. https://doi.org/10.2991/978-94-6239-255-7_37

Download citation

  • DOI: https://doi.org/10.2991/978-94-6239-255-7_37

  • Published:

  • Publisher Name: Atlantis Press, Paris

  • Print ISBN: 978-94-6239-254-0

  • Online ISBN: 978-94-6239-255-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics