首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 750 毫秒
1.
Despite the extensive proliferation of Information Technology Outsourcing (ITO), firms often obtain unsatisfactory outsourcing outcomes due to the lack of appropriate outsourcing capabilities of a client or their vendor. ITO clients strive to enhance outsourcing performance by establishing their own outsourcing capabilities as well as contracting with capable vendors to meet their strategic needs. Thus, for the success of an ITO project, it is imperative to find an effective combination of complementary outsourcing capabilities on both sides. However, knowledge of how to identify and develop a set of appropriate outsourcing capabilities of both client and vendor has yet to be developed. This study aims to fill this knowledge gap by elaborating on the configurational mechanisms of outsourcing capabilities from a bilateral perspective, which explicate how multiple types of client and vendor outsourcing capabilities combine into configurations simultaneously to produce high ITO performance. First, based on the ITO literature, we develop a conceptual framework that identifies three key types of outsourcing capabilities. Then, with the matched dataset collected from a client and their vendor, we conduct a fuzzy-set qualitative comparative analysis (fsQCA), which is a set-theoretic configurational method to investigate the systemic and holistic interdependencies among key outsourcing capabilities that produce high outsourcing performance. On the basis of the conceptual framework and empirical findings, we present four viable propositions to build configurations of client and vendor ITO capabilities that can achieve ITO success with theoretical and practical implications.  相似文献   

2.
Business process outsourcing (BPO) enables organizations to enhance operational capability, shorten response time, and gain strategic value. Yet, BPO risks are real and BPO initiatives can and do go awry. While prior research has attempted to understand BPO risks from the client perspective, the critical risks of BPO from the vendor perspective (and how they differ from those of the client perspective) are not well understood. By using the Delphi method, this study identifies and ranks BPO risk factors from the perspective of vendors as well as clients (for comparison purposes) across two countries. We identify a list of 68 BPO risk factors perceived by vendors and clients and top-ranked risk factors perceived by vendors. We categorize these factors into six risk dimensions (i.e., organizational environment, client, complexity, contract, execution, and vendor). Our findings indicate that vendors are concerned about not only the risks that influence their own business, but also those that may impact the business of clients. However, vendors focus more on client and execution risks, whereas clients focus more on vendor and organizational environment risks. Our research contributes to the existing literature by not only investigating the top-ranked risks from the perspective of vendors, but also revealing the similarities and differences in the perceptions of vendors and clients with respect to BPO risk. Our research also has practical utility for BPO vendors and clients.  相似文献   

3.
The origins and history of a single case study of large-scale Information Technology (IT) outsourcing in the 1994–99 period is investigated in the United Kingdom Defence sector. Such deals are high risk and the paper describes types of risk and how the client organization sought to mitigate these. These risks and mitigation approaches are then analysed against a distinctive risk framework formulated for IT outsourcing. Risks emerging in terms of type and scope of outsourcing, vendor selection criteria and process, the role of the contract, retained capabilities and management processes, and partnering and relationship dimensions are then assessed against prior research findings. Two additional distinctive risks are identified from the case history arising from the public sector context and supplier long-term market strategy. A contribution of the paper is the revised risk framework for analysing IT outsourcing that is then presented. Finally, the implications of these findings for future research and practice are highlighted.  相似文献   

4.
5.
Optimizing vendor selection in a two-stage outsourcing process   总被引:1,自引:0,他引:1  
The decision processes surrounding outsourcing are complicated by the very nature of uncertainty involved in the outsourcing process and by poor vendor management. In this study, we focus on vendor selection, one of the two basic issues of vendor management in outsourcing. Due to the limitation of the classic one-stage vendor selection model, we propose a two-stage vendor selection research framework in outsourcing. The first stage is a trial phase that helps the client to find the best match between the vendor and the outsourced project. In the second stage, the client employs the chosen vendor for the full implementation of the project. We formulate this selection decision under the two-stage framework as a combinatorial optimization model. We analyze the complexity of the problem and develop a solution procedure to find the exact optimal solution. By applying this model to numerical case studies, we demonstrate that benefit to adopt two-stage process to the vendor depends on information improvement in the first stage and the client's ability to adapt to updated knowledge. We also argue that the selection of vendors for the first stage testing is more about creating a good vendor portfolio than simply picking the frontrunners.  相似文献   

6.
The information systems (IS) literature, and the industry sectors confronted with information technology (IT) outsourcing, are beginning to perceive IT outsourcing as more than just a necessary organizational resource-acquisition venture. Instead organizations have begun to consider vendors as their partners, causing many companies to enter into more intricate deals that include both contractual and informal issues. In light of these developments, a growing concern with forming closer client–vendor relationships has evolved for both vendors and clients. This paper explores, in the context of a case study, three critical dimensions emerging from previous studies. These are: what is outsourced; the contract; and the relationship dimension. We also explore the process and management issues underlying these dimensions. The investigation is enabled through two analytical frameworks, one proven in previous research, one exploratory, but both specifically developed for IT outsourcing arrangements.  相似文献   

7.
Whereas most discussion of outsourcing has concentrated on the clients’ perspective, we investigated the formation of offshore IS vendors’ trust in their client and the client's control over the vendor; these were assumed to affect the vendor's performance. Focusing on the Japan–China offshoring context, we conducted a survey of 110 project managers in nine Chinese IS outsourcers. Our findings indicated that trust had a significant effect on project quality but little on cost adherence; the relationship between control and the two vendor performance measures were the opposite of this. Furthermore, information sharing, communication quality, and inter-firm adaptation emerged as three significant contributors to the vendor's trust in the client; goal setting and cultural blending turned out to be significant in influencing the client's control over the vendor. One of the key contributions and implications of our research was that certain offshore client behaviors could shape vendor performance by influencing the vendor's trust in the client and client's control over the vendor, beyond formal contracts. These findings may be useful for both offshore vendors and clients in developing successful IS outsourcing.  相似文献   

8.
Past studies in the IT outsourcing area have examined the management of IT outsourcing relationships from a variety of perspectives. The present paper extends this line of research. In this study, we take a multi-theoretic perspective to explore factors that determine the duration of continuing IT outsourcing relationships between vendor and client firms. Five ex-ante and two ex-post factors that may influence relationship duration were examined in this study. Data for this study were collected using a nationwide survey. To investigate the dynamics of continuing outsourcing relationships through repetitive contracts, we performed survival analysis using an accelerated failure-time (AFT) model. Four factors are found to have a significant relationship with relationship duration as hypothesized. However, three factors, of which two are ex-post factors, are found to not have a significant impact on outsourcing relationship duration. Implications and contributions of the study are discussed.  相似文献   

9.
Our research attempted to identify the behavioral process of knowledge transfer by examining the effects of IT human capability, human character, trust, and cooperative learning on it in an IT outsourcing situation. By analysing data collected from vendor and client matched-pair samples of 87 IT outsourcing projects, we found that both the client's and the vendor's character influenced trust, trust affects on cooperative learning, and the cooperative learning influence on knowledge transfer. More importantly, it we found that the client's IT human capability had a direct impact on cooperative learning and knowledge transfer. This indicated that client's IT human capability was a crucial factor in effective knowledge transfer during IT outsourcing. It also implied that client firms should identify and retain some IT personnel who can apply vendors’ competencies in IT practice and respond effectively to any technological challenges.  相似文献   

10.
A substantial body of previous research on the client–vendor relationship has identified inter-organizational partnerships and formal contracts as important governance mechanisms for outsourcing performance. Successful IS development through outsourcing, however, may be more dependent on the people who execute the project in the field than on inter-firm relationships and agreed-upon formalities. Among individual-level variables, the special importance of psychological contracts has recently been noted in IS literature. This study investigates the mediating role of psychological contract breach between these two firm-level governance factors and outsourcing performance. By analyzing matched responses from project managers, vendor participants, and system users, we found that the effects of explicit legal contracts and partnership quality on outsourcing outcome are fully mediated by the client's perception of breach by the vendor. This study offers an extended theoretical perspective on the governance of firm-level collaboration, especially revealing that the benefits of formal contracts and inter-organizational partnerships eventually translate into satisfactory outsourcing outcomes for system users through each party's perception of breach on the individual level. Moreover, discrepancy was observed in this study between the client and vendor regarding the impact of legal contracts on individuals’ psychological contract while that of partnership was prominent in both sides.  相似文献   

11.
What happens when agile methods are introduced in global outsourcing set-ups? Agile methods are designed to empower IT developers in decision-making through self-managing collocated teams. We studied how agile methods were introduced into global outsourcing from the Indian IT vendor’s perspective. We explored how agile processes in global outsourcing impacts work conditions of the Indian IT developers, and were surprised to find that agile methodologies, even after 3 years of implementation, created a stressful and inflexible work environment negatively impacting their personal lives. Many of the negative aspects of work, which agile methodologies were developed to reduce, were evident in the global agile outsourcing set-up. We propose translocality to repudiate the dichotomy of global/local reminding us that methodologies and technologies must be understood as immediately localized and situated. Translocality helps us to explain why we cannot determine the impact of global agile as a methodology independent of how it unfolds at particular sites. Instead, we must attend to concrete practices of use when evaluating the impact of new methods.  相似文献   

12.
Investigations of offshore outsourcing of information systems have presented little evidence on developing country software and information technology (IT) industries. This study probes how Indian software and IT suppliers trade off work in India versus bodyshopping of employees. Worldwide clients view these practices as full offshoring versus on-shore temporary hiring from an Indian firm, but these practices are probed from suppliers’ perspective. Suppliers’ characteristics are theorized to affect their use of bodyshopping versus in-India work. A Reserve Bank of India survey of every Indian software and IT firm elicited suppliers’ use of bodyshopping to serve clients abroad. Consistent with theoretical rationales, suppliers that were larger, incorporated, public, and owned foreign subsidiaries most frequently provided bodyshopping among their international services. Bodyshopping was used frequently for IT purchasing and systems maintenance and infrequently for business process applications, and was infrequent to nations where bodyshopped labor costs were high. The evidence expands knowledge of the vibrant entrepreneurial IT industry in India and how it serves client firms abroad.  相似文献   

13.
Despite the increasing use of onshore and offshore business process outsourcing (BPO), a comprehensive literature review [38] finds that there has been limited empirical research on BPO outcomes. This article responds to the call for research by developing and testing a conceptual model for BPO outcomes using data from 50 firms publicly traded in the U.S., including 38 firms in the Forbes Global 2000. We find that client firm capabilities, vendor configuration, and country location lead to interesting tradeoffs in the BPO quality, cost, and time outcomes. For example, while multi-sourcing offers advantages such as risk mitigation, client firms encounter reduced BPO time benefits when they use multiple vendors. While onshore BPO can lead to an improved quality, higher onshore labor costs result in lower BPO cost savings. And while offshore destinations such as India offer lower labor costs, time zone differences lead to reduced BPO time benefits.  相似文献   

14.
Scoring and double-sided due diligence processes employed with vendor selection for IT infrastructure outsourcing Outsourcing opens the procurement of semi-finished products from business partners that are able to provide the respective processes in the required quality but at lower prices, e. g. because of bundling effects and specialization advantages. In particular, services that are not based on core-processes of an enterprise are well-suited for outsourcing. The evaluation of IT service outsourcing is difficult, because of its strategic position in enterprises. Against this background, this article describes a method to select a suitable vendor for IT infrastructure outsourcing employing scoring and double-sided due diligence processes. Our findings are based on experiences when selecting the vendor for outsourcing the European Information Technology Infrastructure (IT/I) area of the Deutsche Bank AG.  相似文献   

15.
We use knowledge‐based theory to develop and test a model of client–vendor knowledge transfer at the level of the individual offshore information systems engineer. We define knowledge transfer in this context in terms of mechanisms by which an offshore engineer employed by a vendor can (a) gain understanding of their onshore client; and (b) utilize their knowledge for the benefit of the client. Over large geographic, cultural and institutional distances, effective knowledge transfer is difficult to achieve, although it is central to the success of many offshore outsourcing contracts. Our empirical test consists of a survey of vendor software engineers physically located in India but working on development projects for clients in Europe and the United States. The findings support predictions regarding engineer exposure to explicit and tacit knowledge: We find client–vendor knowledge transfer to the offshore vendor engineer to be positively associated with formal training and client embedment. We also test whether an offshore vendor engineer's inappropriate reliance on informal discussions in the offshore location hinders effective client–vendor knowledge transfer. Our result for this is mixed. Finally, we show differences between offshore engineers who have had previous onshore experience and those who have not. Client embedment is a potent driver of knowledge transfer when the offshore engineer has had previous onshore placement, while it acts to reduce inappropriate reliance on informal discussions for those that have not had an onshore placement.  相似文献   

16.
Expectations have been found to exert a significant impact on client satisfaction in outsourcing projects and have been utilized to understand how individuals accumulate experiences and develop beliefs. In this study, we examine the impact of expectations on IT outsourcing success. Although extant studies identify multiple potential expectations, the expectations construct is often viewed as unidimensional with expectations examined at a general level. Furthermore, our multidisciplinary literature review indicates a gap in the literature regarding which expectations to employ. We therefore draw upon the Expectation Confirmation Theory (ECT) to determine a parsimonious set of expectations that combine to influence outsourcing success. Through an international survey of chief information officers (CIOs) and other senior IT outsourcing practitioners, we demonstrate the impact of expectations on IT outsourcing success. Moreover, we evidence that the should, minimally acceptable, and intolerable expectations can be used to predict outsourcing success. This study contributes to the outsourcing literature, specifically, and the multidisciplinary ECT literature, generally, by evaluating the multi-faceted nature of expectations. The results have practical implications for clients and vendors engaged in IT outsourcing and those who engage in expectation management.  相似文献   

17.
IT outsourcing contracts are often discontinued in favor of other alternatives (returning to in-house development, or switching to another vendor). Switching costs are experienced when terminating a business relationship and securing an alternative. We tried to answer the question: do switching costs matter significantly in the strategic choice to continue outsourcing, switch vendors, or backsource? Switching costs were considered, such as those due to IT operations (sunk investment, lost performance, system upgrades, uncertainty, and induction–retraining–performance), personnel-replacement costs (candidate search, and IT/setup), and in-house learning (cognitive/behavioral learning). A field survey was conducted, and, for each of these cost types, the differences between group means across the three groups (outsourcing continuation, vendor switching, and backsourcing) were determined. The findings suggested that customer organizations preferred outsourcing continuation most and backsourcing least when their switching costs were high. However, the relative preference for vendor switching depended on the switching cost type.  相似文献   

18.
IT executives entering into information technology (IT) outsourcing arrangements seek various strategic, economic, and technological benefits. However, although several cases of IT outsourcing are considered successful, cases of failure can also be observed. Problems and challenges associated with IT outsourcing often not only relate to the strategic decision whether or not to outsource, but to the operational level as well. Especially organizations with little experience of implementing larger IT outsourcing programs face problems with the steering of external outsourcing providers. In this paper, we propose a reference framework that structures the required processes for an effective steering of IT outsourcing relationships. The research is based on the design science paradigm in information systems research. In a first step, we derive a framework from related literature and knowledge in this particular area. We then undertake extensive fieldwork, including expert interviews and field studies to evaluate our framework and to develop it further. The suggested framework proves to be a viable instrument to support the systematic analysis of current processes and the definition of suitable target processes for the steering of IT outsourcing programs. This paper??s primary contribution therefore lies in providing an applicable instrument for practitioners as well as in extending the existing body of knowledge on IT outsourcing governance.  相似文献   

19.
This paper explores the value of a configurational approach to IT outsourcing by developing a framework for IT outsourcing effectiveness. Taking a process view of outsourcing and drawing on the relational view of the firm, the framework identifies four high-level dimensions that correspond to an organization’s resource position in four key areas: organizational IT value position, organizational IT asset position, relational asset position, and relational capability position. A novel structured method is used to identify the congruent outsourcing configurations within the range of possible outsourcing configurations based on the interdependencies among the four dimensions. Three congruent outsourcing configurations, designated asset dependence, relational dependence, and independence, emerge from this analysis. Drawing on the assumptions of configurational theory about organizational change and taking a dynamic perspective, the framework is extended to describe how organizations transition between outsourcing configurations over time. This paper demonstrates how a configurational approach can address three potential problems of the outsourcing literature and advance outsourcing research.  相似文献   

20.
We model the diffusion of IT outsourcing using announcements about IT outsourcing deals. We estimate a lognormal diffusion curve to test whether IT outsourcing follows a pure diffusion process or there are contagion effects involved. The methodology permits us to study the consequences of outsourcing events, especially mega-deals with IT contract amounts that exceed US$1 billion. Mega-deals act, we theorize, as precipitating events that create a strong basis for contagion effects and are likely to affect decision-making by other firms in an industry. Then, we evaluate the role of different communication channels in the diffusion process of IT outsourcing by testing for the fit of the mixed influence model at the industry level. This helps us to evaluate the consistency of evidence at two different levels of analysis. We also evaluate two flexible diffusion models: the Gompertz and Weibull models. Our results show that the diffusion patterns of IT outsourcing do not appear to be lognormal, suggesting that IT outsourcing does not follow a pure diffusion process. Instead, we find the presence of contagion effects in the diffusion of IT outsourcing. During periods of the most rapid outsourcing growth – the contagion periods – the actions of the large and more visible firms may provide exemplars for smaller firms, reducing their inhibitions about committing to IT outsourcing. We also find that the results of the mixed influence and the Weibull models, which provide the best fit for overall IT outsourcing diffusion patterns, are potentially indicative of the existence of spillovers that might drive the observed contagion effects at the industry level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号