Research Background

  • Georg Hodosi
  • Lazar Rusu
Part of the SpringerBriefs in Information Systems book series (BRIEFSINORMAT)


In this chapter are described IT outsourcing services, IT outsourcing types, total versus selective IT outsourcing, single versus multiple providers, and how to select IT outsourcing provider. Additionally, this chapter includes the theories in IT outsourcing used in this research and also the risks, relationships and success factors in IT outsourcing that are our research goals.


IT outsourcing services IT outsourcing types Cloud solutions IT outsourcing provider Transaction cost theory Risks Important factors Success factors 


  1. Alborz, S., Seddon, P., & Scheepers, R. (2005). The quality-of-relationship construct in IT outsourcing. In PACIS 2005 proceedings, Paper 93, Association for Information Systems.Google Scholar
  2. Bahli, B., & Rivard, S. (2002). Information technology outsourcing risk: A scenario-based conceptualisation. Cahier de la Chaire de gestion stratégique des technologies de l’information: HEC Montréal, 3000, chemin de la Côte-Sainte-Catherine, Montréal, Québec, H3T 2A7 Canada, no 02–04 – Octobre 2002, ISSN 1702-238X, 1–22. Accessed May 1, 2018, from
  3. Bahli, B., & Rivard, S. (2013). Cost escalation in information technology outsourcing: A moderated mediation study. Decision Support Systems, 56, 37–47.CrossRefGoogle Scholar
  4. Barney, J. (1991). Firm resources and sustained competitive advantage. Journal of Management, 17(1), 99–120.CrossRefGoogle Scholar
  5. Benbasat, I., & Zmud, R. (1999). Empirical research in information systems: The practice of relevance. MIS Quarterly, 23(1), 3–16.CrossRefGoogle Scholar
  6. Beulen, E. (2011). Maturing IT outsourcing relationships: A transaction costs perspective. In J. Kotlarsky, L. Willcocks, & I. Oshri (Eds.), New studies in global IT and business service outsourcing: Lecture notes in business information processing (pp. 66–79). Berlin: Springer.CrossRefGoogle Scholar
  7. Beulen, E., Fenema, P., & Currie, W. (2005). From application outsourcing to infrastructure management: Extending the offshore outsourcing service portfolio. European Management Journal, 23(2), 133–144.CrossRefGoogle Scholar
  8. Boehm, B. (1991). Software risk management: Principles and practices. IEEE Software, 8, 32–42.CrossRefGoogle Scholar
  9. Cao, Q., & Wang, Q. (2007). Optimizing vendor selection in a two-stage outsourcing process. Computers & Operations Research, 34(12), 3757–3768.CrossRefGoogle Scholar
  10. Christ, M., Mintchik, N., Chen, L., & Bierstaker, J. (2014). Outsourcing the information system: Determinants, risks, and implications for management control systems. Journal of Management Accounting Research, 27(2), 77–120.CrossRefGoogle Scholar
  11. Corbitt, B., & Tho, I. (2005). Towards an economic analysis of IT outsourcing risks. In Proceedings 16th Australasian conference on information systems (pp. 1–8). Sydney: Association for Information Systems.Google Scholar
  12. Cumps, B., Viaene, S., Dedene, G., & Vandenbulcke, J. (2006). A theoretical exploration of the relationship between outsourcing and business/ICT alignment. In Proceedings of European conference on information systems (ECIS 2006). Gothenburg: Association for Information Systems.Google Scholar
  13. Dibbern, J., Chin, W., & Kude, T. (2016). The sourcing of software services: Knowledge specificity and the role of trust. SIGMIS Database, 47(2), 36–57.CrossRefGoogle Scholar
  14. Eisenhardt, K. (1989). Agency theory: An assessment and review. Academy of Management Review, 14(1), 57–74.CrossRefGoogle Scholar
  15. Fitzgerald, F., & Willcocks, L. (1994). Contracts and partnerships in the outsourcing of IT. In Proceedings of fifteenth international conference on information systems (pp. 51–63). Vancouver, British Columbia: Association for Information Systems.Google Scholar
  16. Goo, J. (2009). Promoting trust and relationship commitment through service level agreements in IT outsourcing relationship. In R. Hirscheim, A. Heinzl, & J. Dibbern (Eds.), Information systems outsourcing enduring themes, global challenges, and process opportunities (3rd ed., pp. 27–53). Heidelberg: Springer.Google Scholar
  17. Gottschalk, P., & Solli-Sæther, H. (2006). Managing successful IT outsourcing relationships. Hershey, PA: IRM Press.CrossRefGoogle Scholar
  18. Guilding, C., Warnken, J., Ardill, A., & Fredline, L. (2005). An agency theory perspective on the owner/manager relationship in tourism-based condominiums. Tourism Management, 26(3), 409–420.CrossRefGoogle Scholar
  19. Hansson, S. (2007). Risk. In E. Zalta (Ed.), Stanford encyclopedia of philosophy (Winter 2008 Edition). Accessed May 1, 2018, from
  20. Hirscheim, R., Heinzl, A., & Dibbern, J. (2006). Information systems outsourcing, enduring themes, new perspectives and global challenges (2nd ed.). Berlin: Springer.Google Scholar
  21. Ho, W., Xu, X., & Dey, P. (2010). Multi-criteria decision making approaches for supplier evaluation and selection: A literature review. European Journal of Operational Research, 202(1), 16–24.CrossRefGoogle Scholar
  22. Hodosi, G. (2010). A method for decision support in information technology outsourcing: The case for large Swedish companies. Licentiate Thesis, Report Series No. 10–003, ISSN 1101–8526, 2010, Stockholm University, Stockholm.Google Scholar
  23. Hodosi, G., & Rusu, L. (2013). How do critical success factors contribute to a successful IT outsourcing: A study of large multinational companies. Journal of Information Technology Theory and Application (JITTA), 14(1), 17–43.Google Scholar
  24. ISO. (2002). SO/IEC guide 73:2002, risk management – Vocabulary – Guidelines for use in standards. Accessed May 1, 2018, from
  25. Jahyun Goo, J., & Nam, K. (2007). Contract as a source of trust–commitment in successful IT outsourcing relationship: An empirical study. In Proceedings of the 40th annual Hawaii international conference on system sciences (pp. 1–10). Washington, DC: IEEE Computer Society.Google Scholar
  26. Jensen, M., & Meckling, W. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics, Harvard University Press, 3(4), 305–360.Google Scholar
  27. Kacprzyk, J., Nurmi, H., & Fedrizzi, M. (2012). Consensus under fuzziness. New York: Springer Science & Business Media.Google Scholar
  28. Karami, A., Yazdani, H., Beiryaie, H., & Hosseinzadeh, N. (2010). A risk based model for IS outsourcing vendor selection. In 2010 2nd IEEE international conference on information and financial engineering, Chongqing (pp. 250–254). Piscataway, NJ: IEEE.CrossRefGoogle Scholar
  29. Kern, T., & Willcocks, L. (2000). Exploring information technology outsourcing relationships: Theory and practice. Journal of Strategic Information Systems, 9(4), 321–350.CrossRefGoogle Scholar
  30. Kern, T., & Willcocks, L. (2002). Exploring relationships in information technology outsourcing: The interaction approach. European Journal of Information Systems, 11, 3–19.CrossRefGoogle Scholar
  31. Lacity, M., Willcocks, L., & Rottman, J. (2008). Global outsourcing of back office services: Lessons, trends, and enduring challenges. Strategic Outsourcing: An International Journal, 1(1), 13–34.CrossRefGoogle Scholar
  32. Lee, J., Huynh, M., & Hirscheim, R. (2009). Exploring the role of initial trust, initial distrust, and trust through knowledge sharing in IT outsourcing: From a service receiver’s perspective. In R. Hirscheim, A. Heinzl, & J. Dibbern (Eds.), Information systems outsourcing enduring themes, global challenges, and process opportunities (3rd ed., pp. 55–74). Berlin: Springer.Google Scholar
  33. Murcko, T. (2014). BusinessDictionary – online. WebFinance, Inc. Accessed April 1, 2018, from
  34. Nyrhinen, M., & Dahlberg, T. (2007). Is transaction cost theory able to explain contracts used for and success of firm-wide IT-infrastructure outsourcing? In Proceedings of the 40th Hawaii international conference on system sciences (HICSS-40). Waikoloa, HI: IEEE Computer Society.Google Scholar
  35. Ostrom, L., & Wilhelmsen, C. (2012). Risk assessment, tools, techniques, and their applications. Hoboken, NJ: Wiley.CrossRefGoogle Scholar
  36. Prahalad, C., & Hamel, G. (1990). The core competence of the corporation. Harvard Business Review, 68(3), 79–91.Google Scholar
  37. Rockart, J. (1979). Chief executives define their own data needs. Harvard Business Review, 57(2), 81–94.Google Scholar
  38. Rusu, L., & Hodosi, G. (2011). Assessing the risk exposure in IT outsourcing for large companies. International Journal of Information Technology and Management, 10(1), 24–44.CrossRefGoogle Scholar
  39. Sargent, A. (2006). Outsourcing relationship literature: An examination and implications for future research. In Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: Achievements, challenges & the future (pp. 280–287). New York: Association for Computing Machinery.Google Scholar
  40. Schermann, M., Dongus, K., Yetton, P., & Krcmar, H. (2016). The role of transaction cost economics in information technology outsourcing research: A meta-analysis of the choice of contract type. The Journal of Strategic Information Systems, 25(1), 32–48.CrossRefGoogle Scholar
  41. Solli-Sæther, H., & Gottschalk, P. (2015). Stages-of-growth in outsourcing, offshoring and backsourcing: Back to the future? Journal of Computer Information Systems, 55(2), 88–94.CrossRefGoogle Scholar
  42. Tiwana, A., & Kim, S. (2016). Concurrent IT sourcing: Mechanisms and contingent advantages. Journal of Management Information Systems, 33(1), 1–38.CrossRefGoogle Scholar
  43. Weber, C., Current, J., & Benton, W. (1991). Vendor selection criteria and methods. European Journal of Operational Research, 50(1), 2–18.CrossRefGoogle Scholar
  44. Williamson, O. (1985). The economic institutions of capitalism – Firms, markets, relational contracting. London: The Free Press.Google Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Georg Hodosi
    • 1
  • Lazar Rusu
    • 1
  1. 1.Computer and Systems SciencesStockholm UniversityStockholmSweden

Personalised recommendations