8
Views
59
CrossRef citations to date
0
Altmetric
Original Articles

Management of Information Systems Outsourcing: A Bidding Perspective

Pages 131-159 | Published online: 11 Dec 2015

References

  • Apte, U. and Winniford, M. Global outsourcing of information systems functions: opportunities and challenges. In M. Khosrowpour (ed.), Managing Information Technology in a Global Society. Harrisburg, PA: Idea Group Publishing, 1991, pp. 58–59.
  • Bakos, J.Y., and Kemerer, C.F. Recent applications of economic theory in information technology research. Decision Support Systems, 8, 5, (September 1992), 365–386.
  • Banker, R.D., and Kemerer, C.F. Performance evaluation metrics for information systems development: a principal-agent model. CISR WP NO 243, MIT (July 1992).
  • Bets, M. Real IS payoff lies in business benefits. Computerworld (January 3, 1994), 10, 56.
  • Chaudhury, A.; Rao, H.R.; and Nam, K. Mixed integer programming for outsourcing bidding. Research-in-Progress Paper, Proceedings of the 14th International Conference on Information Systems, Dallas, 1992, p. 263.
  • Chester, J.S. National goes with EDS-IBM beat out for major outsourcing. Communications Week (January 21, 1991), 42.
  • Clermont, P. Outsourcing without guilt. Computerworld (September 9, 1991), 67.
  • Eckerson, W. Outsourcing: a tough call for net execs. Network World (July 9, 1990), 1, 52.
  • Fudenberg, D., and Tirole, J. Game Theory. Cambridge, MA: MIT Press, 1992.
  • Gantz, J. Outsourcing: threat or salvation? Networking Management (October 1990), 25–40.
  • Gurbaxani, V., and Kemerer, C.F. An agent-theoretic perspective on the management of information systems. Proceedings of the 22nd Hawaii International Conference on System Sciences, January 1989, pp. 141–150.
  • Halper, M. IBM pilot reduces outsourcing costs. Computerworld (October 26, 1992), 1, 16.
  • Halper, M. Smarts prevail in the area of doubtsourcing. Computerworld (January 4, 1993), 8–10.
  • Jacobs, P. Some assembly required: even with industry-standard components, it takes some work to put together a heterogenous environment. DG Review, 12, 9 (March 1992), 25.
  • Johnston-Turner, M. The new players: common carriers. Network World (February 17, 1992), 34.
  • Johnston-Turner, M. The first step to outsourcing. Data Communications.21 1 (January 1992), 23.
  • Johnston-Turner, M., and Juneau, L. Crafting a net outsourcing strategy. Network World (February 17, 1992), 34.
  • Kreps, D. A Course in Microeconomic Theory. Princeton, NJ: Princeton University Press, 1990.
  • Lacity, M.C., and Hirschheim, R. Information Systems Outsourcing: Myths, Metaphors, and Realities. New York: John Wiley, 1993.
  • Ledyard, J. Incentive compatibility. In J. Eatwell, M. Milgate, and P. Newman (eds.), Allocation, Information and Markets. New York: Norton, 1989, pp. 141–151.
  • Loh, L., and Venkatraman, N. Diffusion of information technology outsourcing: influence sources and the Kodak effect. Information System Research, 3, 4 (December 1992), 334–358.
  • Loh, L., and Venkatraman, N. Determinants of information technology outsourcing. Journal of Management Information Systems, 9, 1 (Summer 1992), 7–24.
  • Mandel. M.J. How game theory rewrote all the rules. Business Week (October 24, 1994), 44.
  • McAfee, R.P., and McMillan, J. Auctions and bidding. Journal of Economic Literature, 25 (June 1987), 699–738.
  • Milgrom, P. Auction and bidding: a primer. Journal of Economic Perspectives, 3, 3 (Summer 1989), 3–22.
  • Myerson, R.B. Mechanism design. In J. Eatwell, M. Milgate, and P. Newman (eds.), Allocation, Information and Markets. New York: Norton, 1989, pp. 191–206.
  • Myerson, R.B. Optimal auction design. Mathematics of Operations Research, 6, 1 (February 1981), 58–73.
  • Myerson, R.B. Incentive compatibility and the bargaining problem. Econometrica, 47, 1 (January, 1979), 61–73.
  • Nam, K. Three essays on information systems outsourcing. Ph.D. dissertation, SUNY Buffalo, 1995.
  • Nam, K.; Chaudhury, A.; and Rao, H.R. A mixed integer model of bidding strategies in outsourcing. European Journal of Operational Research (1995), forthcoming.
  • Philips, L. The Economics of Incomplete Information. Cambridge: Cambridge University Press, 1988.
  • Pick, R.A., and Whinston, A.B. A computer charging mechanism for revealing user preferences within a large organization. Journal of Management Information Systems, 6, 1 (Summer 1989), 87–100.
  • Rassenti, S.; Smith, V.L.; and Bulfin, R.L. A combinatorial auction mechanism for airport time slot allocation. Bell Journal of Economics, 13, 2 (Autumn 1982), 402–417.
  • Richmond, W.B., and Seidmann, A. Software development outsourcing contract structure and business value. Journal of Management Information Systems, 10, 1 (Summer 1993), 57–72.
  • Richmond, W.B.; Seidmann, A.; and Whinston, A.B. Incomplete contracting issues in information systems development outsourcing. Decision Support Systems, 8, 5 (September 1992), 459–477.
  • Schmerken, I. Outsourcing holds the line on technology costs. Wall Street Computer Review, 8, 4 (January 1991), 12.
  • Schrage, L. Personal communication, October 29, 1994.
  • Simon, H. A. Prediction and prescription in systems modeling. Operations Research, 38, 1 (January-February 1990), 7–14.
  • Smith, V. Auctions. In J. Eatwell, M. Milgate, and P. Newman (eds.). Allocation, Information and Markets. New York: Norton, 1987, pp. 39–53.
  • Socolovsky, A. Computer service evolves into outsourcing. Electronic Business (September 3, 1990), 23.
  • Waller, W.S., and Bishop, R.A. An experimental study of incentive pay schemes, communication, and intrafirm resource allocation. The Accounting Review, 65, 4 (October 1990), 812–836.
  • Wilder, C. Giant firms join outsourcing parade. Computerworld, 35, 39 (September 30, 1991), 1, 91.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.