172
Views
6
CrossRef citations to date
0
Altmetric
Articles

How are Public Sector Organizations Managing is Outsourcing Risks? An Analysis of Outsourcing Guidelines from Three Jurisdictions

&
Pages 73-87 | Published online: 05 Jan 2016

References

  • Alberta Canada Office of the CIO. A Contract Management Framework for Information Technology Projects. Edmonton, Alberta, 1999a.
  • Alberta Canada Office of the CIO. Appendix 1 — Outsourcing Request for Proposals Template: 1–66. 1999c.
  • Arnott, S. “MoD Wasted 120m on Mismanaged IT,” PC Magazine Online, 2003.
  • Aubert, B.A., S. Dussault, et al. “Managing the Risk of IT Outsourcing,” 32nd Hawaii International Conference on System Sciences, Maui, Hawaii, IEEE Computer Society, 1999.
  • Aubert, B.A., M. Patry, et al. “Assessing the Risk of IT Outsourcing,” CIRANO Scientific Series, 1998.
  • Aubert, B.A., M. Patry, et al. “IT Outsourcing Risk Management at British Petroleum,” Cahier du GReSI, 00:10, 2000.
  • Barzel, Y. “Measurement Cost and the Organization of Markets,” Journal of Law and Economics, 25, 1982, pp. 27–48.
  • Benamati, J., A.L. Lederer, et al. “Information Technology Change: The Impact on IT Management,” Journal of Computer Information Systems, 38:4, 1998, pp. 9–13.
  • Boehm, B.W. “Software Risk Management: Principles and Practices,” IEEE Software, 1991, pp. 32–42.
  • Bryson, N. and O. Ngwenyama. “Structuring I.S. Outsourcing Contracts for Mutual Gain: An Approach to Analyzing Performance Incentives Schemes,” Journal of the Association for Information Systems, November 2000.
  • Earl, M.J. “The Risks of Outsourcing IT,” Sloan Management Review, 37:3, 1996, pp. 26–32.
  • Field, T. “You Can't Outsource City Hall,” CIO Magazine, 2002.
  • Gay, C.L. and J. Essinger. Inside Outsourcing: The Insider's Guide to Strategic Sourcing. London: Nicholas Brealey, 2000.
  • General Services Administration of the USA. “Outsourcing Information Technology, General Services Administration,” 1998.
  • Gilbert, A.H., R.A. Pick, et al. “The Role of the CIO: Enduring MIS Issues,” Journal of Computer Information Systems, 40:1, 1999, pp. 8–16.
  • Kern, T., L.P. Willcocks, et al. “Application Service Provision: Risk Assessment and Mitigation,” MIS Quarterly Executive, 1:2, 2002, pp. 113–126.
  • Klein, H. and D. Truex. “Discourage Analysis: An Approach to Investigating Organizational Emergence.” In Holmqvist, B., P.B. Andersen, H. Klein and R. Posner Eds.). Signs of Work. New York: Walter de Gruyter, 1996.
  • Krippendorf, K. Content Analysis: An Introduction to its Methodology. Newbury Park, CA: Sage, 1980.
  • Lacity, M.C. and R. Hirschheim. “The Information Systems Outsourcing Bandwagon,” Sloan Management Review, Fall 1993, pp. 73–86.
  • Lacity, M.C., R.A. Hirschheim, et al. Beyond the Information Systems Outsourcing Bandwagon: The Insourcing Response, Chichester, New York: Wiley, 1995.
  • Lacity, M.C. and R.A. Hirschheim. Information Systems Outsourcing: Myths, Metaphors, and Realities. Chichester, New York: J. Wiley, 1993.
  • Lacity, M.C. and L. Willcocks. Global Information Technology Outsourcing: In Search of Business Advantage. Chichester, New York: Wiley, 2001.
  • Lacity, M.C. and L. Willcocks. “Interpreting Information Technology Sourcing Decisions from a Transaction Cost Perspective,” Templeton College, Oxford University, 1995.
  • Lacity, M.C., L.P. Willcocks, et al. “IT Outsourcing: Maximize Flexibility and Control,” Harvard Business Review, May-June 1995, pp. 84–93.
  • LeSueur, S. “Connecticut Muddies Outsourcing Outlook,” Washington Technology, 14, 1999.
  • Li, W.K., D.C. Yen, et al. “A Synergic Process for Outsourcing and Reengineering,” Journal of Computer Information Systems, 37:3, 1997, pp. 29–36.
  • Liebowitz, J. “Information Systems: Success or Failure?” Journal of Computer Information Systems, 40:1, 1999, pp. 17–26.
  • McFarlan, F.W. “Portfolio Approach to Information Systems,” Harvard Business Review, 1981.
  • Murphy, J. “Ways to Evaluate and Address Your Outsourcing Risk,” Gartner Research, 2003.
  • Myers, M.D. “A Disaster for All to See: An Interpretive Analysis of a Failed IS Project,” Accounting, Management and Information Technologies, 4:4, 1994, pp. 185–201.
  • Nam, K., S. Rajagopalan, et al. “A Two-level Investigation of Information Systems Outsourcing,” Communications of the ACM, 39:7, 1996, pp. 37–44.
  • Nelson, P., W. Richmond, et al. “Two Dimensions of Software Acquisition,” Communications of the ACM, 39:7, 1996, pp. 29–35.
  • Neuendorf, K.A. The Content Analysis Handbook. Thousand Oaks, CA: Sage, 2002.
  • Ngwenyama, O. and N. Bryson. “Making the Information Systems Outsourcing Decision: A Transaction Cost Approach to Analyzing Decision Problems,” European Journal of Operational Research, 115, 1999, pp. 351–367.
  • Ngwenyama, O. and P.A. Nielsen. “Competing Values in Software Process Improvement: An Assumption Analysis of CMM from an Organizational Culture Perspective,” IEEE Transactions on Engineering Management, 50:1, 2003, pp. 100–112.
  • Peterson, T.O. and P.C. Smith. “Managing the Information Resource: An Experiential Exercise in Information Allocation,” Journal of Computer Information Systems, 36:1, 1995, pp. 31–47.
  • Porter, M.C. and V. Millar. “How Information Gives You Competitive Advantage,” Harvard Business Review, July-August 1985, pp. 149–160.
  • Queensland Australia Office of the CIO. “Best Practice in Information Technology and Telecommunications (IT&T) Purchasing”, Brisbane Australia, Queensland Government, 1–34, 2001.
  • Queensland Australia Office of the CIO. “Queensland Government Guide to Best Practice in IT Outsourcing-Module 1-Making the Decision,” Brisbane Queensland, Queensland Health Dept. of Public Works and Housing, 1997.
  • Rao, H.R., K. Nam, et al. “Information Systems Outsourcing,” Communications of the ACM, 39:7, 1996, pp. 27–28.
  • Roberts, C.W. and R. Popping, “Computer Supported Content Analysis: Some Recent Developments,” Social Science Computer Review, 11, 1993, pp. 283–291.
  • Rosenburg, S.D., P.P. Schnurr, et al. “Content Analysis: A Comparison of Manual and Computerized Systems,” Journal of Personality Assessment, 54:1&2, 1990, pp. 298–310.
  • Ryan, G.W. and H.R. Bernard. “Data Management and Analysis Methods”. In Denzin, N.K. and Y.S. Lincoln (Eds.). Handbook of Qualitative Research, 2nd ed. Thousand Oaks, CA: Sage, 2000, pp. 769–802.
  • Shore, B. “Using Information Technology to Achieve a Competitive Advantage: A Study of Current and Future Trends,” Journal of Computer Information Systems, 36:4, 1996, pp. 54–59.
  • Texas Department of Information Resources. “Outsourcing Strategies: Guidelines for Evaluating Internal and External Resources for Major Information Technology Projects,” Austin, TX: State of Texas, Department of Information Resources, 1998, pp. 1–72.
  • Weber, R.P. Basic Content Analysis, 2nd ed. Newbury Park, CA: Sage, 1990.
  • Willcocks, L., M.C. Lacity, et al. Strategic Sourcing of Information Systems Perspectives and Practices. Chichester, New York: Wiley, 1998.
  • Williamson, O.E. Markets and Hierarchies Analysis and Anti-trust Implications: A Study in the Economics of Internal Organization. New York: Free, 1975.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.