Abstract
The objective of this paper is to report the findings of a case study into the risks involved in an information systems outsourcing partnership between a retail bank client and the vendor, an information technology service provider. By drawing on the case study, the paper proposes a theoretical development of shared benefits and shared risks in IT outsourcing partnerships. The paper argues that the longevity and success of the outsourcing partnership depends largely on managing shared risks and goals in the outsourcing partnership, which may gradually deteriorate over time without frequent, open interactions between partnership members. The outsourcing partnership contractual agreements alone may have limited scope in contributing to shared risk reduction in the IT outsourcing partnership if relationships deteriorate.
This research is based on an investigation of two organizations that used a formal contract to bind each partner’s benefits, risks, roles, and responsibilities in an IT outsourcing partnership. Future research should seek to explore shared outsourced partnership benefits and risks across organizations in other sectors. Findings indicate that shared outsourced partnership risks need to be actively managed in order to reap the benefits. This paper argues that success in an IT outsourcing partnership relies on managing shared risks in the outsourcing relationship.
Chapter PDF
Similar content being viewed by others
References
Ang, S., and Toh, S. K. 1998. “Failure in Software Outsourcing: A Case Analysis,” in Strategic Sourcing of Information Systems, L. P. Willcocks and M. C. Lacity (eds.), Chichester, UK: John Wiley and Sons Ltd., pp. 351–368.
Aron, R., Clemons, E. K., and Reddi, S. 2005. “Just Right Outsourcing: Understanding and Managing Risk,” Journal of Management Information Systems (22:2), pp. 37–56.
Aubert, B., Patry, M., Rivard, S., and Smith, H. 2001. “IT Outsourcing Risk Management at British Petroleum,” in Proceedings of the 34 th Hawaii International Conference on System Sciences, Maui, HI, January 3–6, Los Alamitos, CA: IEEE Computer Society Press.
Babbie, E. 1992. The Practice of Social Research Methods for Social Work (6th ed.), Belmont, CA: Wadsworth Publishing Company.
Charmaz, K. 2000. “Grounded Theory: Objectivist and Constructivist Methods,” in Handbook of Qualitative Research (2nd ed.), N. K. Denzin and Y. S. Lincoln (eds. ), Thousand Oaks, CA: Sage Publications, pp. 509–535.
Clarke C. J., and Varma S. 1999. “Strategic Risk Management: The New Competitive Edge,” Long Range Planning (32:4), pp. 414–424.
Collins, J. M., and Ruefli, T. W. 1995. Strategic Risk: A State-Defined Approach, Boston: Springer.
Currie, W. 2000. “The Supply-Side of IT Outsourcing: The Trend towards Mergers, Acquisitions and Joint Ventures,” International Journal of Physical Distribution and Logistics Management (30), pp. 238–254.
Currie, W. L., and Willcocks, L. P. 1998. “Analyzing Four Types of IT Sourcing Decisions in the Context of Scale, Client/Supplier Interdependency and Risk Mitigation,” Information Systems Journal (8:2), pp. 119–143.
Emblemsvag, J., and Kjolstad, L. E. 2002. “Strategic Risk Analysis: A Field Version,” Management Decision (40:9), pp. 842–852.
Glaser, B. 1978. Theoretical Sensitivity: Advances in the Methodology of Grounded Theory, Mill Valley, CA: Sociology Press.
Henderson J C. 1990. “Plugging into Strategic Partnerships: The Critical IS Connection,” Sloan Management Review (31), pp. 7–18.
Khalfan, A. M. 2004. “Information Security Considerations in IS/IT Outsourcing Projects: A Descriptive Case Study of Ttwo Sectors,” International Journal of Information Management (24:1), pp. 29–42.
Kern, T., and Willcocks, L. 2000. “Exploring Information Technology Outsourcing Relationships: Theory and Practice,” Journal of Strategic Information Systems (9), pp. 321–350.
Lacity, M. C., Willcocks, L. P. 1998. “An Empirical Investigation of Information Technology Sourcing Practices: Lessons from Experience,” MIS Quarterly (22:3), pp. 363–308.
Lee, J. N. 1998. “Partnership Quality in IS Outsourcing: Social Theory Perspective,” paper presented at the Doctoral Consortium of the 19th International Conference on Information Systems, Helsinki, Finland.
Lee, J. N, Huynh, M. Q., Kwok, R. C-W., and Pi, S-M. 2003. “IT Outsourcing Evolution—Past, Present, and Future,” Communications of ACM (46:5), pp. 84–89.
Lee, J. N, and Kim, Y. G. 2005. “Understanding Outsourcing Partnership: A Comparison of Three Theoretical Perspectives,” IEEE Transactions on Engineering Management (52:1 ), pp. 43–58.
Loh, L.,and Venkatraman, N. 1992. “Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis,” Journal of Management Information Systems (8), pp. 7–24.
Marchand, N., and Jacobsen, H. A. 2001. “An Economic Model to Study Dependencies between Independent Software Vendors and Application Service Providers,” Electronic Commerce Research (1:3), pp. 315–334.
McFarlane, F. W., and Nolan, R. L. 1995. “How to Manage an IT Outsourcing Alliance,” Sloan Management Review (36:2), pp. 9–23.
Miles, M. B., and Huberman, A. M. 1984. Qualitative Data Analysis: A Sourcebook of New Methods, London: Sage Publications.
Myers, M.D. 1994. “A Disaster for All to See: An Interpretive Analysis of a Failed IS Project,” Accounting Management and Information Technologies (4:4), pp. 185–201.
Peltier, T. 1996. “The Risk of Allowing Outside Staff Access to Your Information Systems,” Information Security Technical Report (1:3), pp. 18–28.
Rubin, H., and Rubin, I. 1995. Qualitative Interviewing : The Art of Hearing Data, Thousand Oaks, CA: Sage Publications.
Saunders, C., Gebelt, M., and Hu, Q. 1997. “Achieving Success in Information Systems Outsourcing,” California Management Review (39:2), pp. 63–79.
Smith H. A., McKeen J. D., Staples D. S. 2001. “Risk Management in Information Systems: Problems and Potentials,” Communications of the Association for Information Systems (7:13), pp. 1–29.
Strauss A. L., and Corbin, J. M. 1990. Basics of Qualitative Research: Grounded Theory Procedures and Techniques, Newbury Park, CA: Sage Publications.
Strauss, A. L., and Corbin, J. M. 1994. “Grounded Theory Methodology: An Overview,” in Handbook of Qualitative Research, N. K. Denzin, and Y. S. Lincoln (eds.), Thousand Oaks, CA: Sage Publications, pp. 273–285.
Sullivan, W. E., and Ngwenyama, O. K. 2005. “How Are Public Sector Organizations Managing Is Outsourcing Risks? An Analysis of Outsourcing Guidelines from Three Jurisdictions,” Journal of Computer Information (45:3), pp. 73–87.
Travis, J., and Saldanha, M. 1999. “An Investigation of IS/IT Project Risk Analysis and Management Practices in Western Australia,” in Proceedings of the 10 th Australasian Conference on Information Systems, Wellington, New Zealand, December 1–3.
Walker, C. 1996. “Giant Contracts Boost UK Outsourcing Growth,” ComputerWeekly, July 20, p. 12.
Willcocks, L. P., and Lacity, M. 1999. “IT Outsourcing in Financial Services: Risk, Creative Contracting, Business Advantage,” Information Systems Journal (9), pp. 163–183.
Willcocks, L. P., Lacity, M., and Kern, T. 1999. “Risk Mitigation in IT Outsourcing Strategy Revisited: Longitudinal Case Research,” Journal of Strategic Information Systems (8:2), pp. 285–314.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 International Federation for Information Processing
About this paper
Cite this paper
Ajitkumar, S., Bunker, D., Smith, S., Winchester, D. (2008). A Study of the Risks in an Information System Outsourcing Partnership. In: León, G., Bernardos, A.M., Casar, J.R., Kautz, K., De Gross, J.I. (eds) Open IT-Based Innovation: Moving Towards Cooperative IT Transfer and Knowledge Diffusion. TDIT 2008. IFIP – The International Federation for Information Processing, vol 287. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-87503-3_23
Download citation
DOI: https://doi.org/10.1007/978-0-387-87503-3_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-87502-6
Online ISBN: 978-0-387-87503-3
eBook Packages: Computer ScienceComputer Science (R0)