Information Technology and Management

, Volume 8, Issue 4, pp 279–296 | Cite as

The impact of perceived risk on the capital market’s reaction to outsourcing announcements

  • Heiko GewaldEmail author
  • Tom Gellrich


Outsourcing is a widely accepted option in strategic management, which, like every business venture, bears opportunities and risks. Supplementing the popular area of research on the merits of outsourcing, this paper examines how stockholders rate corporate sourcing decisions with regard to the risk they associate with this transaction. Using event study methodology and multivariate cross-sectional OLS-regression, we analyze a sample of 182 outsourcing transactions in the global financial services industry between 1998 and 2004 in order to investigate the risk-specific drivers of excess returns to shareholders. The analysis studies the impact of risk-specific independent variables, including transaction size, length, outsourced business functionality, and experience with outsourcing. Our findings indicate that risk-mitigating strategies have significant explanatory power, indicating that the capital market’s reaction to an outsourcing announcement might at least partly be forecast. Results show a positive correlation between market reaction and business process outsourcing by financial services companies. We also find strong evidence indicating that capital markets react positively to relatively large transactions compared to the market capitalization of the outsourcing firm. For service providers our results show that traditional IT-related sourcing projects or the insourcing of administrative processes have a significant positive correlation with market reaction.


Outsourcing Perceived risk Global financial services industry Capital market Event study 


  1. 1.
    B.A. Aubert, M. Patry, et al., Assessing the risk of IT outsourcing, 31st Hawaii International Conference on System Sciences (1998).Google Scholar
  2. 2.
    B.A. Aubert, M. Patry et al., Managing IT outsourcing risk: lessons learned, in: Information systems outsourcing - Enduring themes, emergent patterns and future directions, R. Hirschheim, A. Heinzl and J. Dibbern, (eds.), (Springer, Berlin, 2002), pp. 155–176.Google Scholar
  3. 3.
    J. Bain, Economies of scale, concentration and entry, American Economic Review 44 (1954) 15–39.Google Scholar
  4. 4.
    R. Bauer, Consumer behavior as risk taking, in: Risk Taking and Information Handling in Consumer Behavior, D.F.Cox, (ed.), (Harvard University Press, Cambridge, MA, USA, 1967), pp 21–33.Google Scholar
  5. 5.
    P. Beitel and D. Schiereck, Value creation at the ongoing consolidation of the European banking market. Institute for Mergers and Acquisitions—Working Paper, Witten/Herdecke (2001).Google Scholar
  6. 6.
    P. Beitel, D. Schiereck et al., Explaining the M&A-success in European bank mergers and acquisitions, European Financial Management 10(1) (2004) 109–132.CrossRefGoogle Scholar
  7. 7.
    J.H. Benamati and T.M. Rajkumar, An Empirical Study of the Applicability of the Technology Acceptance Model to Application Development Outsourcing Decisions. Ninth Americas Conference on Information Systems, Tampa, USA (2003).Google Scholar
  8. 8.
    J.J. Binder, On the use of the multivariate regression model in event studies, Journal of Accounting Research 23(1) (1985) 370–383.CrossRefGoogle Scholar
  9. 9.
    J.J. Binder,The event study methodology since 1969, Review of quantitative Finance and Accounting 11 (1998) 111–137.CrossRefGoogle Scholar
  10. 10.
    BIS; International Convergence of Capital Measures and Capital Standards, Bank for International Settlements, Basel Committee on Banking Supervision, 2004.Google Scholar
  11. 11.
    S. Brown and J. Warner, Measuring security price performance, Journal of Financial Economics 8 (1980) 2–23.CrossRefGoogle Scholar
  12. 12.
    S. Brown and J. Warner, Using daily stock returns: The case of event studies, Journal of Financial Economics 14 (1985) 3–31.CrossRefGoogle Scholar
  13. 13.
    J. Cable and K. Holland, Modelling normal returns in event studies: A model-selection approach and pilot study, The European Journal of Finance 5 (1999) 331–341.CrossRefGoogle Scholar
  14. 14.
    B.M. Caldwell, IT Outsourcing Contracts: Crunching the Numbers. Gartner Dataquest Research Brief (2003).Google Scholar
  15. 15.
    B.M. Caldwell and A. Young, Outsourcing still the bright spot in IT services, Gartner Dataquest Alert, (2003)Google Scholar
  16. 16.
    D. Chatterjee, V.J. Richardson, et al., Examining theshareholder wealth effects of announcements of newly created CIO positions, MIS Quarterly 2(1) (2001) 43–70.CrossRefGoogle Scholar
  17. 17.
    D.F. Cox, Risk handling in consumer behavior, in: Risk Taking and Information Handling in Consumer Behavior, D.F. Cox (ed.), (Harvard University Press, Boston, MA, USA) pp 34–81.Google Scholar
  18. 18.
    S.M. Cunningham, The major dimensions of perceived risk, in: Risk Taking and Information Handling in Consumer Behaviour, D.F. Cox (ed.), (Harvard University Press, Boston, MA, USA, 1967) pp. 82–108.Google Scholar
  19. 19.
    W. Currie and L. Willcocks, Analysing four types of IT sourcing decisions in the context of scale, client/supplier interdependency and risk mitigation, Information Systems Journal 8 (1998) 119–143.CrossRefGoogle Scholar
  20. 20.
    W.L. Currie, Using multiple suppliers to mitigate the risk of IT outsourcing at ICI and Wessex Water, Journal of Information Technology 13 (1998) 169–180.CrossRefGoogle Scholar
  21. 21.
    J. Dibbern, The Sourcing of Application Software Development and Maintenance (Springer, Berlin, 2003).Google Scholar
  22. 22.
    J. Dibbern, T. Goles et al., Information systems outsourcing: A survey and analysis of the literature, The DATA BASE for Advances in Information Systems 35(4) (2004) 6–102.Google Scholar
  23. 23.
    P. Dodd and J.J. Warner, On corporate governance: a study of proxy contests, Journal of Financial Economics 11 (1983) 401–438.CrossRefGoogle Scholar
  24. 24.
    B. Dos Santos, K. Pfeffers et al., The impact of information technology investment announcements on the market value of the firm, Information Systems Research 4(1) (1993) 1–23.CrossRefGoogle Scholar
  25. 25.
    M.J. Earl, The risks of outsourcing IT, Sloan Management Review 37(3) (1996) 26–32.Google Scholar
  26. 26.
    E.F. Fama, L. Fisher et al., The adjustment of stock prices to new information, International Economic Review 10 (1969) 1–21.CrossRefGoogle Scholar
  27. 27.
    N.I. Farag and M.S. Krishnan, The market value of IT outsourcing investment announcements: An event-study analysis, Ninth Americas Conference on Information Systems 2003.Google Scholar
  28. 28.
    M.S. Featherman and P.A. Pavlou, Predicting e-Services Adoption: A Perceived Risk Facets Perspective, International Journal of Human Computer Studies 59 (2003) 451–474.CrossRefGoogle Scholar
  29. 29.
    L. Freiedrich and T. Gellrich, Capital Market reaction to financial services outsoutcing. E-Finance Lab Working Paper, Frankfurt, 2003.Google Scholar
  30. 30.
    M.J. Gallivan and W. Oh, Analyzing IT outsourcing relationships as alliances among multiple clients and vendors. 32nd Hawaii International Conference on System Sciences, Hawaii (1999).Google Scholar
  31. 31.
    H. Gewald and J. Franke, A Comparison of the Risks in Information Technology Outsourcing and Business Process Outsourcing. 11th Americas Conference on Information Systems, Omaha, NE, USA (2005).Google Scholar
  32. 32.
    H. Gewald and D. Hinz, A Framework for Classifying the Operational Risks of Outsourcing, Eighth Pacific Asia Conference on Information Systems. Shanghai, PR China (2004).Google Scholar
  33. 33.
    D. Glassman, IT outsourcing and shareholder value. Stern Stewart Research—EVAluation, (2000).Google Scholar
  34. 34.
    V. Grover, M.J. Cheon et al., The effect of service quality and partnership on the outsourcing of IS functions. Journal of Management Information Systems 12(4) (1996) 89–116.Google Scholar
  35. 35.
    J.F. Houston and M.D. Ryngaert, The overall gains from large bank mergers, Jounal of Banking and Finance 18(6) (1994) 1155–1176.CrossRefGoogle Scholar
  36. 36.
    R. Huber, How continental bank outsourced its crown jewels, Harvard Business Review (71:January / February) (1993) 121–129.Google Scholar
  37. 37.
    J. Hunton, J. Reck, et al., The market’s reaction to information systems outsourcing announcements, Journal of Information Systems 14(2) (2000) 109–125.Google Scholar
  38. 38.
    K.S. Im, K.E. Dow, et al., Research report: A reexamination of IT investment and the market value of the firm—An event study methodology, Information Systems Research 12(1) (2001) 103–117.CrossRefGoogle Scholar
  39. 39.
    M.C. Jensen and W.H. Meckling, Theory of the firm: Managerial behaviour, agency costs and ownership structure, Journal of Financial Economics 3 (1976) 305–360.CrossRefGoogle Scholar
  40. 40.
    T. Kern, L.P. Willcocks, et al., Application service provision: Risk assessment and mitigation, MIS Quarterly Executive 1(2) (2002) 113–126.Google Scholar
  41. 41.
    M.C. Lacity, Lessons in global information technology, Computer, (August) pp. 26–33 (2002).Google Scholar
  42. 42.
    M.C. Lacity, L.P. Willcocks, et al., The value of selective IT sourcing. Sloan Management Review, Spring (1996) pp. 13–25.Google Scholar
  43. 43.
    P. Lassig, H.-J. Lamberti, et al., Scoring- und beiderseitige Due-Diligence-Prozesse im Rahmen der Lieferantenauswahl beim Infrastrukturoutsourcing, Wirtschaftsinformatik 45(2) (2003) 147–156.Google Scholar
  44. 44.
    L. Loh and N. Venkatraman, Determinants of information technology outsourcing: A cross-sectional analysis, Journal of Management Information Systems 9(1) (1992) 7–24.Google Scholar
  45. 45.
    A.C. Mackinlay, Event studies in economics and finance, Journal or Economic Literature (35:March 1997), (1997) pp. 13–39.Google Scholar
  46. 46.
    A. Mcwilliams and D. Siegel, Event studies in management research, Academy of Management Journal 40 (1997) 626 – 657.CrossRefGoogle Scholar
  47. 47.
    V. Michell and G. Fitzgerald, The IT outsourcing marketplace: vendors and their selection, Journal of Information Technology 12 (1997) 223–237.CrossRefGoogle Scholar
  48. 48.
    V.-W. Mitchell, Understanding consumer’s behaviour: Can perceived risk theory help? Management Decision 30(3) (1992) 26–31.CrossRefGoogle Scholar
  49. 49.
    W. Oh and M.J. Gallivan, An empirical assessment of transaction risks of IT outsourcing arrangements: An event study. 37th Hawaii International Conference on System Sciences, Hawaii (2004).Google Scholar
  50. 50.
    P.A. Pavlou, Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model, International Journal of Electronic Commerce 7(3) (2003) 69–103.Google Scholar
  51. 51.
    J.P. Peter and M.J. Ryan, An investigation of perceived risk at the brand level, Journal of Marketing Research (13:May) (1976) pp. 184–188.Google Scholar
  52. 52.
    P.P. Peterson, Event Studies: A review of issues and methodology, Working Paper University of Nebraska, Lincoln (1989).Google Scholar
  53. 53.
    C.K. Prahalad and G. Hamel, The core competence of the corporation, Harvard Business Review 68(3) (1990) 79–91.Google Scholar
  54. 54.
    J.B. Quinn and F.G. Hilmer, Strategic outsourcing, Sloan Management Review 35(4) (1994) 43–55.Google Scholar
  55. 55.
    TPI; The TPI Index Q4/2005,, 2005.Google Scholar
  56. 56.
    N. Venkatraman and L. Loh, The shifting logic of the IS organization: From technical portfolio to relationship portfolio, Information Strategy 10(2) (1994) 5–11.Google Scholar
  57. 57.
    L.P. Willcocks, M.C. Lacity, et al., Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA, Journal of Strategic Information Systems 8(3) (1999) 285–314.CrossRefGoogle Scholar
  58. 58.
    P.C. Young and J. Hood, Risk and the outsourcing of risk management services: The case of claims management, Public Budgeting & Finance 23(3) (2003) 109–119.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  1. 1.E-Finance LabJohann Wolfgang Goethe-UniversityFrankfurt am MainGermany

Personalised recommendations