Skip to main content

Pattern-Based Solution Risk Model for Strategic IT Outsourcing

  • Conference paper
Advances in Data Mining. Applications and Theoretical Aspects (ICDM 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7987))

Included in the following conference series:

  • 1826 Accesses

Abstract

We present a pattern-based solution risk model for assessing risk of incurring a cost-overrun in Strategic IT Outsourcing (SO) by the SO provider based on historical deals and their corresponding cost overruns. The approach is based on finding co-occurring patterns of solution elements and cost-overrun elements, i.e., elements that had to be implemented as not foreseen in the project planning phase. In order to find such co-occurring patterns we apply closed itemset-mining augmented with item cost information and build corresponding association rules with risk information. Such rules can be used by project managers of SO contracts to minimize the gap between the proposed and implemented solutions. In experiments, conducted on a sample of deals of a multi-national SO provider, we show the applicability of the framework for predicting significant cost-overruns. The introduced model is a general solution risk model for service delivery, whose task is to minimize the gap between proposed and implemented service elements by the provider based on historical deals.

The paper was supported by the EU project OpenIoT (ICT 287305).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference Very Large Data Bases, pp. 487–499 (September 1994)

    Google Scholar 

  2. D’Aveni, R.A., Ravenscraft, D.J.: Economies of integration versus bureaucracy costs: Does vertical integration improve performance? The Academy of Management Journal 37(5), 1167–1206 (1994)

    Article  Google Scholar 

  3. Grossi, V., Romei, A., Ruggieri, S.: A case study in sequential pattern mining for it-operational risk. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part I. LNCS (LNAI), vol. 5211, pp. 424–439. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Gwadera, R., Crestani, F.: Ranking sequential patterns with respect to significance. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010, Part I. LNCS (LNAI), vol. 6118, pp. 286–299. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Han, J., Fu, Y.: Mining multiple-level association rules in large databases. IEEE Transactions on Knowledge and Data Engineering 11(5) (1999)

    Google Scholar 

  6. Huang, X., An, A., Cercone, N.: Comparison of interestingness functions for learning web usage patterns. In: Proceedings of the Eleventh International Conference on Information and Knowledge Management, CIKM 2002, pp. 617–620. ACM, New York (2002)

    Chapter  Google Scholar 

  7. Kern, T., Willcocks, L.P., Heck, E.V.: Winner’s curse in it outsourcing: Strategies for avoiding relational trauma. California Management Review 44(2), 47–69 (2002)

    Article  Google Scholar 

  8. Mahnke, V., Overby, M.L., Vang, J.: Strategic it-outsourcing: What do we know and need to know? In: DRUID Summer Conference 2003 on Creating, Sharing and Transferring Knowledge, Copenhagen, June 12-14 (2003)

    Google Scholar 

  9. Martens, B., Teuteberg, F.: Why risk management matters in it outsourcing a systematic literature review and elements of a research agenda. In: 17th European Conference on Information Systems, Verona, Italy, June 8-10 (2009)

    Google Scholar 

  10. Omiecinski, E.R.: Alternative interest measures for mining associations in databases. IEEE Transactions on Knowledge and Data Engineering 15, 57–69 (2003)

    Article  Google Scholar 

  11. Pasquier, N., Taouil, R., Bastide, Y., Stum, G., Lakhal, L.: Generating a condensed representation for association rules. Journal of Intelligent Information Systems 24(1), 29–60 (2005)

    Article  MATH  Google Scholar 

  12. Pei, J., Han, J., Mao, R.: Closet: An efficient algorithm for mining frequent closed itemsets. In: Proceedings of the 2000 ACM-SIGMOD International Workshop of Data Mining and Knowledge Discovery (DMKD 2000), pp. 21–30 (2000)

    Google Scholar 

  13. Quinn, J.B., Helmer, F.G.: Strategic outsourcing. Sloan Management Review, 43–55 (Summer 1994)

    Google Scholar 

  14. Ruzaini, S., Aris, S.: Risk management practices in it outsourcing projects. In: 2008 International Symposium on Information Technology, ITSim 2008, August 26-28, vol. 4, pp. 1–8 (2008)

    Google Scholar 

  15. Tatti, N.: Maximum entropy based significance of itemsets. KAIS 17(1), 57–77 (2007)

    Google Scholar 

  16. Wu, X., Zhang, C., Zhang, S.: Efficient mining of both positive and negative association rules. ACM Trans. Inf. Syst. 22, 381–405 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gwadera, R. (2013). Pattern-Based Solution Risk Model for Strategic IT Outsourcing. In: Perner, P. (eds) Advances in Data Mining. Applications and Theoretical Aspects. ICDM 2013. Lecture Notes in Computer Science(), vol 7987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39736-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39736-3_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39735-6

  • Online ISBN: 978-3-642-39736-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics