User Acceptance of a Software Tool for Decision Making in IT Outsourcing: A Qualitative Study in Large Companies from Sweden

  • Christoffer Andresen
  • Georg Hodosi
  • Irina Saprykina
  • Lazar Rusu
Part of the Communications in Computer and Information Science book series (CCIS, volume 111)


Decisions for IT outsourcing are very complex and needs to be supported by considerations based on many (multiple) criteria. In order to facilitate the use of a specific tool by a decision-maker in IT outsourcing, we need to find out whether such a tool for this purpose will be accepted or rejected or what improvements must be added to this tool to be accepted by some IT decision makers in large companies from Sweden.


IT outsourcing decision makers ITO tool user acceptance decision making 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aubert, B., Dussault, S., Patry, M., Rivard, S.: Managing the risk of IT outsourcing, System Sciences. In: Proceedings of the 32nd Annual Hawaii International Conference - HICSS-32 (1999)Google Scholar
  2. 2.
    Aubert, B., Patry, N., Rivard, S.: Managing IT outsourcing risk: Lesson learned, CIRANO, Montreal, 2001s-39 (2001), (accessed on May 2007)
  3. 3.
    Aubert, B., Patry, N., Rivard, S.: A framework for information technology outsourcing risk management. The DATA BASE for Advances in Information Technology 36(4) (2005)Google Scholar
  4. 4.
    Bahli, B., Rivard, S.: Information Technology Outsourcing Risk: A Scenario-Based Conceptualisation. HEC Montréal, Cahier de la Chaire de gestion stratégique des technologies de l’information, Octobre 02-04, pp. 1–22 (2002),, (accessed on May 2007)
  5. 5.
    Bahli, B., Rivard, S.: The information technology outsourcing risk: a transaction cost and agency theory-based perspective. Journal of Information Technology 18, 211–221 (2003)CrossRefGoogle Scholar
  6. 6.
    Corbitt, B.J., Tho, I.L.: Toward an economic analysis of IT outsourcing risks. In: 16th Australasian Conference on Information Systems (2005)Google Scholar
  7. 7.
    Cronk, J., Sharp, J.: A framework for deciding what to outsource in information technology. 10th Journal of Information Technology, 259–267 (1995)Google Scholar
  8. 8.
    Davis, F.D.: Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly 13(3), 319–340 (1989)CrossRefGoogle Scholar
  9. 9.
    Hirscheim, R., Lacity, M.: The Myths and Realities of Information Technology Insourcing. Communication of the ACM 43(2), 99–107 (2000)CrossRefGoogle Scholar
  10. 10.
    Hodosi, G., Rusu, L.: A Software Tool that Supports Decisions for Companies to Outsource Information Technology or Not. In: Proceedings of the Mediterranean Conference on Information Systems - MCIS 2007, University of Trento, Venice, Italy, October 4-8, vol. 1, pp. 69–78 (2007)Google Scholar
  11. 11.
    Hodosi, G., Rusu, L.: Information Technology Outsourcing: A Case Study of Best Practices in two Swedish Global Companies. In: Proceedings of the Mediterranean Conference in Information Systems - MCIS 2008, Hammamet, Tunisia, October 23-26 (2008)Google Scholar
  12. 12.
    Jurison, J.: The role of risk and return in information technology outsourcing decisions. Journal of Information Technology, 239–247 (1995)Google Scholar
  13. 13.
    Lacity, M., Kahn, S.A., Willcocks, L.P.: A review of the IT outsourcing literature: Insight for practice. Journal of Strategic Information Systems 18, 130–146 (2009)CrossRefGoogle Scholar
  14. 14.
    Looff, L.A.: Information systems outsourcing decision making: a framework, organizational theories and case studies. Journal of Information Technology, 281–297 (1995)Google Scholar
  15. 15.
    Martens, B., Teuteberg, F.: Why management matters in IT outsourcing – a systematic literature review and elements of a research agenda. In: 17th European Conference on Information Systems (2009)Google Scholar
  16. 16.
    Rouse, A.: Testing some myths about I.T. outsourcing: A survey of Australia’s top 1000 firms. In: 16th European Conference on Information Systems (2008)Google Scholar
  17. 17.
    Tho, I.: Managing the risk of IT outsourcing. Butterworth-Heinemann Publications, Elsevier, Oxford (2005)Google Scholar
  18. 18.
    Sommerville, I.: Software Engineering. Addison-Wesley Publishers Limited, USA (2007)MATHGoogle Scholar
  19. 19.
    Willcocks, L.P., Lacity, M.C.: Information systems outsourcing in theory and practice. Journal of Information Technology 10, 203–207 (1995)CrossRefGoogle Scholar
  20. 20.
    Williamson, O.: The Economic Institutions of Capitalism - Firms, Markets, Relational Contracting, pp. 52–63. The Free Press, London (1985)Google Scholar
  21. 21.
    Wüllenweber, K., Jahner, S., Kromar, H.: Relational Risk Mitigation: The Relationship Approach to Mitigating Risk in Business Process Outsourcing. In: Proceedings of the 41st Hawaii International Conference on System Science -2008. IEEE, Los Alamitos (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Christoffer Andresen
    • 1
  • Georg Hodosi
    • 1
  • Irina Saprykina
    • 1
  • Lazar Rusu
    • 1
  1. 1.Department of Computer and Systems SciencesStockholm UniversitySweden

Personalised recommendations