Search results
1 – 10 of over 20000Mohamed Alsudairi and Yogesh K. Dwivedi
In recent years a large number of studies have appeared on information systems (IS)/information technology (IT) outsourcing related issues but scattered in a number of distantly…
Abstract
Purpose
In recent years a large number of studies have appeared on information systems (IS)/information technology (IT) outsourcing related issues but scattered in a number of distantly related publishing outlets which may hamper the use of such published resources and repetition of research conducted by various researchers. The purpose of this paper is to conduct a systematic survey of the literature pertaining to research on IS/IT outsourcing.
Design/methodology/approach
The research aim was accomplished by extracting information on a number of relevant variables by conducting a review of 315 articles on IS/IT outsourcing published between 1992 and 2008.
Findings
The analysis is presented by listing and illustrating subject category, journals, year of publications and country, frequently published authors, productive institutions, the trend of collaborative nature (co‐author analysis) of research, the impact/influence of published research; topics/research issues and utilised methods, and the challenges and limitations of existing research.
Practical implications
Results of this research may have implications for both private and public sector organizations interested in outsourcing IS/IT services and applications, and various stakeholders of academic publishing (namely, researchers, journal editors, reviewers and universities) research on IS/IT outsourcing.
Originality/value
The primary value of this paper lies in extending the understanding of evolution and patterns of outsourcing research.
Details
Keywords
Information security is an integral part of all outsourcing activities and it is important for both the outsourcing company and the vendor to reach agreement as regards what type…
Abstract
Purpose
Information security is an integral part of all outsourcing activities and it is important for both the outsourcing company and the vendor to reach agreement as regards what type and what level of information security will be provided by the vendor in relation to the outsourced activities. The purpose of this paper is to evaluate the potential risks and information system (IS) security needs when outsourcing takes place and analyse the different security level in outsourcing agreements.
Design/methodology/approach
This paper is primarily based on a review of the literature. International security standards and best security practices are analysed and discussed. A multiple level security framework as an effective approach in outsourcing domain is addressed.
Findings
It is found that IS security risks can be effectively identified, monitored and evaluated by the concept of a layered security model that fits best in the complex outsourcing domain. There are three levels of security, first guidelines of technical security, second risk analysis and, third compliance and evaluation criteria, including managing information security.
Originality/value
The approach could be used to integrate IS security with service level agreements. Outsourcing vendors with security certifications, strong security adherence systems and optimal disaster recover plans will have a competitive edge in the industry.
Details
Keywords
This paper analyzes how information systems (IS) can serve as tools of neo-colonial control in offshore outsourcing of research and development work. It draws on critical work…
Abstract
Purpose
This paper analyzes how information systems (IS) can serve as tools of neo-colonial control in offshore outsourcing of research and development work. It draws on critical work examining business and knowledge process outsourcing.
Design/methodology/approach
The paper reports an empirical study of how laboratory information management systems (LIMS) shape offshore outsourcing practices involving Western client firms and Indian contract research organizations (CROs) in the pharmaceutical industry. The study adopted a multi-actor perspective, involving interviews with representatives of Western clients, Indian CROs, system validation auditors, and software vendors. The analysis was iterative and interpretative, guided by postcolonial sensitivity to themes of power and control.
Findings
The study found that LIMS act as tools of neo-colonial control at three levels. As Western clients specify particular brands of LIMS, they create a hierarchy among local CROs and impact the development of the local LIMS industry. At inter-organizational level, LIMS shape relationships by allowing remote, real-time and retrospective surveillance of CROs’ work. At individual level, the ability of LIMS to support micro-modularizing of research leads to routinization of scientific discovery, negatively impacting scientists’ work satisfaction.
Originality/value
By examining multiple actors’ perceptions of IS, this paper looks beyond the rhetoric of system efficiency characteristic of most international business research. As it explores dynamics of power and control surrounding IS, it also questions the proposition that outsourcing of high-end work will move emerging economies upstream in the value chain.
Details
Keywords
Subasinghage Maduka Nuwangi, Darshana Sedera, Shirish C. Srivastava and Glen Murphy
Contemporary offshore information system development (ISD) outsourcing is becoming even more complex. Outsourcing partner has begun “re-outsourcing” components of their projects…
Abstract
Purpose
Contemporary offshore information system development (ISD) outsourcing is becoming even more complex. Outsourcing partner has begun “re-outsourcing” components of their projects to other outsourcing companies to minimize cost and gain efficiencies. This paper aims to explore intra-organizational information asymmetry of re-outsourced offshore ISD outsourcing projects.
Design/methodology/approach
An online survey was conducted to get an overall view of information asymmetry between principal and agents (as per the agency theory).
Findings
Statistical analysis showed that there are significant differences between the principal and agent on clarity of requirements, common domain knowledge and communication effectiveness constructs, implying an unbalanced relationship between the parties. Moreover, the authors' results showed that these three are significant measurement constructs of information asymmetry.
Research limitations/implications
In this study the authors have only considered three main factors as common domain knowledge, clarity of requirements and communication effectiveness as three measurement constructs of information asymmetry. Therefore, researches are encouraged to test the proposed constructs further to increase its precision.
Practical implications
The authors' analysis indicates significant differences in all three measurement constructs, implying the difficulties to ensure that the agent is performing according to the requirements of the principal. Using the agency theory as theoretical view, this study sheds light on the best contract governing methods which minimize information asymmetry between the multiple partners within ISD outsourcing organizations.
Originality/value
Currently, to the best of the authors' knowledge, no study has undertaken research on intra-organizational information asymmetry in re-outsourced offshore ISD outsourcing projects.
Details
Keywords
J. Art Gowan and Richard G. Mathieu
The literature on software project management is extended into the broader domain of large‐scale IS management by studying enterprise‐wide system upgrade projects. In particular;…
Abstract
Purpose
The literature on software project management is extended into the broader domain of large‐scale IS management by studying enterprise‐wide system upgrade projects. In particular; examines the role that the intervention of project management practices (formal project methodologies and outsourcing) play in large and/or complex IS projects, which result in good project performance.
Design/methodology/approach
A survey instrument was completed by 449 information systems managers about a specific upgrade project. The primary analytical approach used was structural equation modeling (SEM).
Findings
It was found that neither project complexity nor project size are good indicators of meeting a project's target date. Large projects that adopted formal project management practices were more probable to meet the project target date. Projects with a high degree of complexity which involved outsourcing and adopted formal project management practices, were more likely to meet the project target date.
Practical implications
Clearly, the message to managers of IS projects is to establish a project methodology, especially in large, enterprise‐wide projects, and when some degree of outsourcing is required.
Research limitations/implications
Future research should consider additional measures of performance such as cost, end‐user satisfaction and business value.
Originality/value
Much had been written in the literature about how large, complex IT projects have high failure rates. Our study provides conclusive evidence that, the greater the degree of methodology implementation, the greater the chance for meeting the project's target date. Prior to this research, this had not been explicitly shown in the research literature.
Details
Keywords
Colleen Carraher-Wolverton and Rudy Hirschheim
The authors’ contribution to the literature involves using expectation disconfirmation theory (EDT) to examine the impact of expectations on outsourcing success. This study…
Abstract
Purpose
The authors’ contribution to the literature involves using expectation disconfirmation theory (EDT) to examine the impact of expectations on outsourcing success. This study hypothesizes that perceptions of outsourcing success are contingent on disconfirmation between clients’ expectations and the perceived performance of fundamental issues related to the outsourcing relationship.
Design/methodology/approach
To test the hypothesis, this study surveyed chief information officers, vice presidents and senior information systems managers to determine their perceptions of vendors. This study analyzed the data using structural equation modeling.
Findings
The findings demonstrate that the existing outsourcing success factors are more precisely depicted as multidimensional success factors that predict managerial perceptions of outsourcing success. This study uses a novel perspective to identify the multidimensional nature of the outsourcing success factors that might have remained latent without further analysis.
Originality/value
Using EDT, this study extends the understanding of outsourcing success as not merely composed of unidimensional factors but as a collection of multidimensional outsourcing success factors. This research demonstrates that not only do these success factors predict outsourcing success, but they can also be grouped together to provide a diversified, yet parsimonious view of how expectations relating to certain success factors influence a client’s perception of outsourcing success.
Details
Keywords
Bowon Kim, Kyungbae Park and Jinyong Kim
It is important for an IT service company (IS company) to fully take into account the differences in customer satisfaction across different customer groups. In this article, we…
Abstract
It is important for an IT service company (IS company) to fully take into account the differences in customer satisfaction across different customer groups. In this article, we consider three layers of customers in the client company. There are project directors who interface with and accept the final product (i.e. IT system) from the IS company, users who actually use the IT system for their daily operations, and finally operators who do maintenance works for the IT system. We propose that each customer group (i.e. project director, user, or operator) evaluates the IT systems success with a different set of criteria. Transaction relationship and partnership turn out to be important determinants for the project directors: task‐related and IS‐related output performances seem to be less influential. The reverse conclusion can be made for users and operators. One additional insight is that IS company’s efforts to understand its customer’s tasks and share risks with the customer company might have unexpected effects. Although the project directors seem to like such close involvement, it can be detrimental to the users’ satisfaction with the IS outsourcing projects.
Details
Keywords
Kweku‐Muata Bryson and William E. Sullivan
Information systems (IS) outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve…
Abstract
Information systems (IS) outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies of scale and specialization because their only business is information processing. The challenge of implementing, operating and maintaining enterprise resource planning (ERP) systems and the outsourcing service offered by ERP vendors have made ERP outsourcing an attractive option for some organizations. However, although IS outsourcing is now a major industry, the outsourcing of ERP applications is still in its infancy. This paper explores ERP outsourcing in terms of the application service provider (ASP) approach where a third‐party vendor hosts, manages and maintains various data and ERP applications on behalf of different clients. Critical to the management of the ERP outsourcing relationship is the outsourcing contract, which, if improperly or incompletely written, can have significant negative implications for the outsourcing firm. Contracts that encourage vendor performance and discourage under‐performance are therefore clearly of interest to managers. Although many articles have appeared on outsourcing, the issue of incentive contracts for ERP outsourcing has not been adequately addressed by researchers, partly because of the infancy of this area. In this paper, an approach to analyze incentive schemes and structuring ERP outsourcing contracts for the mutual gain of the parties is presented.
Details
Keywords
The purpose of this paper is to suggest a framework that would guide the practicing manager to decide the degree of information systems (IS) outsourcing.
Abstract
Purpose
The purpose of this paper is to suggest a framework that would guide the practicing manager to decide the degree of information systems (IS) outsourcing.
Design/methodology/approach
The proposed framework has been derived from the findings of a previous empirical study and qualitative inputs. Analytical hierarchy process (AHP) is then used to apply the framework. The framework is finally validated in three India‐based banks.
Findings
The proposed framework helps in creating a strategic alignment between the business strategy and information system strategy. The application of the framework shows the preference of managers towards high IS outsourcing. Strategic alignment and medium term impact emerge the important factors in IS outsourcing. The validity of the framework is proved in three banks.
Research limitations/implications
The validation exercise has been done on a small sample due to resources constraints and a study involving a larger sample is desired. Further, it is advised to review the framework on regular intervals and make suitable changes in decision factors.
Practical implications
The framework is helpful to managers in identifying the critical factors which can act as useful inputs in taking informed decisions on the degree of IS outsourcing.
Originality/value
The paper fills some of the gaps in IS outsourcing by suggesting a practice‐ oriented framework that guides the decision maker to undertake a systematic and structured approach in arriving at an outsourcing decision. The framework has evolved from the practices of banks in India for which there does not exist any similar research.
Details
Keywords
Naomi Wangari Mwai, Joseph Kiplang’at and David Gichoya
The aim of this paper is to establish how resource dependency theory (RDT) and transaction cost theory (TCT) can inform decisions to outsource ICT services by public university…
Abstract
Purpose
The aim of this paper is to establish how resource dependency theory (RDT) and transaction cost theory (TCT) can inform decisions to outsource ICT services by public university libraries in Kenya.
Design/methodology/approach
The study adopted a multiple case study strategy in four selected public universities libraries in Kenya. Purposive sampling was used to identify respondents and data collection was done using a semi-structured interview schedule.
Findings
The study highlights how RDT and TCT theoretical perspectives illuminate some of the reasons, and problems associated with Information and Communications Technology outsourcing in Libraries. The paper concludes with recommendations and the way forward.
Research limitations/implications
The study was limited to the outsourcing of information technology services in four public university libraries in Kenya, namely, Kenyatta University (KU) in Kahawa, Nairobi; Moi University (MU) in Eldoret; University of Nairobi (UON) in Nairobi; and Jomo Kenyatta University of Agriculture and Technology (JKUAT) in Juja, Thika. This being a qualitative study (and taking into consideration the subjective views where bias could occur), the researchers ensured that the research was reliable by recording and taking notes during the interviews and by using peer-debriefing and professionals in the field to ascertain their views.
Practical implications
The paper provides practical insights into outsourcing of Information Technology (IT) services in Public University libraries and information centres in Kenya. This study is useful for university libraries, information professionals, information communication technology professionals and university management.
Social implications
The implications of the study are that outsourcing needs to be guided by clear policies that are documented and communicated to all the stakeholders.
Originality/value
This research assesses IT outsourcing services in selected public academic libraries in Kenya.
Details