119
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Will Negative Experiences Impact Future it Outsourcing?

&
Pages 91-101 | Received 24 Mar 2009, Accepted 17 Jul 2009, Published online: 11 Dec 2015

References

  • Ang, S. & Straub, D.W. “Production and Transaction Economies and IS Outsourcing: A Study of the U.S. Banking Industry.” MIS Quarterly, 22(4), 1998, 535–552.
  • Anderson, J.C. & Gerbing, D.W. “Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach.” Psychological Bulletin, 103, 1988, 411–423.
  • Aron, R., Clemons, E.K., & Reddi, S. “Just Right Outsourcing: Understanding and Managing Risk”. Journal of Management Information Systems, 22(2), 2005, 37–55.
  • Aubert, B.A., Patry, M. & Rivard, S. “Assessing the Risk of IT Outsourcing”. IEEE Proc. 31st Annual Hawaii International Conference on System Sciences, 6, 1998, 685–692.
  • Aubert, B.A., Patry, M., & Rivard, S. “A framework for Information Technology Outsourcing Risk Management”. The DATA BASE for Advances in Information Systems, 36(4), 2005, 9–28.
  • Bahli, B. & Rivard, S. “Validating measures of information technology outsourcing risk factors”. Omega, 33, 2005, 175–187.
  • Barki, H., Rivard, S., & Talbot, J. “Toward an Assessment of Software Development Risk”. Journal of Management Information Systems, 10(2), 1993, 203–225.
  • Boudreau, M., Gefen, D. & Straub, D. “Validation in IS research: A state of the art assessment”. MIS Quarterly, 25(1), 2001, 1–24.
  • Chakrabarty, S., Whitten, D., & Green, K.W. “Understanding Service Quality and Relationship Quality in IS Outsourcing”. Journal of Computer Information Systems. 48(2), 2007, 1–15.
  • Chau, P.Y.K. “An Empirical Assessment of a Modified Technology Acceptance Model”. Journal of Management Information Systems, 13(2), 1996, 185–204.
  • Clark, T.D., Zmud, R.W, & McCray, G.E. “The outsourcing of information services: transforming the nature of business in the information industry”. Journal of Information Technology, (10), 1995, 221–237.
  • Dibbern, J., Goles, T., Hirschheim, R., & Jayatilaka, B. “Information systems outsourcing: a survey and analysis of the literature”. The DATABASE for Advances in Information Systems, 35(4), 2004, 6–102.
  • Dyer, J.H. & Singh, H. “The Relational View: Cooperative Strategy and Sources of Interorganizational Competitive Advantage”. Academy of Management Review, 23(4), 1998, 660–679.
  • Etezadi-Amoli, J. & Farhoomand, A.F. “A structural model of end user computing satisfaction and user performance”. Information & Management, 30(2), 1996, 65–73.
  • Earl, M.J. “The Risks of Outsourcing IT”. Sloan Management Review, 37(3), 1996, 26–32.
  • Eisenhardt, K.M. “Agency Theory: An Assessment and Review”. Academy of Management Review, 14(1), 1989, 57–74.
  • Faisal, M.N. & Banwet, D.K. “Analysing alternatives for information technology outsourcing decision: an analytic network process approach”. International Journal of Business Information Systems. 4(1), 2009, 47–62.
  • Gefen, D., Wyss, S., and Lichtenstein, Y. “Business Familiarity as Risk Mitigation in Software Development Outsourcing Contracts”. MIS Quarterly, 32(3), 2008, 531–551.
  • Gonzalez, R., Gasco, J., & Llopis, J. “Information systems outsourcing: A literature analysis”. Information & Management, 43(7), 2006, 821–834.
  • Gonzalez, R., Gasco, J., & Llopis, J. “Information systems outsourcing risks: A study of large firms”. Industrial Management & Data Systems, 105(1), 2005, 45–62.
  • Grover, V., Cheon, M.J., & Teng, J.T.C. “The Effect of Service Quality and Partnership on the Outsourcing of Information Systems Functions”. Journal of Management Information Systems, 12(4), 1996, 89–116.
  • Grover, V., Cheon, M.J., & Teng, J.T.C. “A descriptive study on the outsourcing of information systems functions”. Information & Management, (27), 1994, 33–44.
  • Grover, V., Jeong, S.R.J., Kettinger, W.J., & Teng, J.T.C. “The Implementation of Business Process Reengineering”. Journal of Management Information Systems, 12(1), 1995, 109–144.
  • Hartwick, J. & Barki, H. “Explaining the Role of User Participation in Information System Use”. Management Science, 41(4), 1994, 440–465.
  • Hirschheim, R., Heinzl, A., Dibbern, J. “Outsourcing in a Global Economy: traditional Information Technology Outsourcing, Offshore Outsourcing, and Business Process Outsourcing”. Information Systems Outsourcing, Springer Berlin Heidelberg, 2009, 3–21.
  • Kelloway, E.K. Using LISREL for Structural Equation Modeling. SAGE Publications, 1998.
  • King, W.R. “Developing a sourcing strategy for IS: a behavioral decision process and framework”. IEEE Transactions on Engineering Management, 48(1), 2001, 15–24.
  • King, W.R. & Malhotra, Y. “Developing a framework for analyzing IS sourcing”. Information and Management, 37(6), 2000, 323–334.
  • Kini, R.B. “Vendor availability: a key factor for outsourcing in Chilean ICT sector”. Information Management & Computer Security, 15(5), 2007, 350–361.
  • Klepper, R. & Jones, W.O. Outsourcing Information Technology, Systems & Services. Prentice Hall, 1998.
  • Koong, K.S., Liu, L., & Wang, Y.J. “Taxonomy development and assessment of global information technology outsourcing decisions”. Industrial Management & Data Systems, 107(3), 2007, 397–414.
  • Kumbakara, N. “Managed IT Services: the role of IT standards”. Information Management & Computer Security, 16(4), 2008, 336–359.
  • Lacity, M.C., Hirschheim, R., & Willcocks, L. “Realizing Outsourcing Expectations”. Information Systems Management, 11(4), 1994, 7–18.
  • Lacity, M.C., Willcocks, L.P., & Feeny, D.F. “The value of selective IT sourcing”. Sloan Management Review, 37(3), 1996, 13–25.
  • Lacity, M.C., Willcocks, L.P, & Rottman, J.W. “Global outsourcing of back office services: lessons, trends, and enduring challenges,” Strategic Outsourcing: An International Journal, 1(1), 2008, 13–34.
  • Lee, J-N & Kim, Y-G. “Effects of partnership quality on IS outsourcing success: Conceptual framework and empirical evidence”. Journal of Management Information Systems, 15(4), 1999, 29–61.
  • Leventhal, D. “A survey of agency models of organizations”. Journal of Economic Behavior and Organization, 9(2), 1988, 153–185.
  • Lichtenstein, Y. “Puzzles in Software Development Contracting”. Communications of the ACM, 47(2), 2004, 61–65.
  • Loebbecke, C. & Huyskens, C. “What drives netsourcing decisions? An empirical analysis”. European Journal of Information Systems, (15), 2006, 415–423.
  • Loh, L. & Venkatraman, N. “Determinants of Information Technology Outsourcing: A Cross-sectional Analysis”. Journal of Management Information Systems, 9(1), 1992, 7–24.
  • McFarlan, W. Portfolio Approach to Information Systems, IEEE Press Piscataway, NJ, USA 1982.
  • McLvor, R. “How the transaction cost and resource-based theories of the firm inform outsourcing evaluation”. Journal of Operations Management, 27(1), 2009, 45–63.
  • Ngwenyama, O. & Bryson, N. “Making the information systems outsourcing decision: A transaction cost approach to analyzing decision problems”. European Journal of Operational Research, 115(2), 1999, 351–367.
  • Nunnally, J.C. Psychometric Theory (2nd edition), McGraw-Hill, New York, NY, 1978.
  • Oh, W., Gallivan, M.J, & Kim, J.W. “The Market's Perception of the Transactional Risks of Information Technology Outsourcing Announcements”. Journal of Management Information Systems, 22(4), 2006, 271–303.
  • Osei-Bryson, K-M. & Ngwenyama, O.K. “Managing risks in information systems outsourcing: An approach to analyzing outsourcing risks and structuring incentive contracts”. European Journal of Operational Research, 174(1), 2006, 245–264.
  • Oza, N.V., Hall, T., Rainer, A. & Grey, S. “Trust in software outsourcing relationships: An empirical investigation of Indian software companies”. Information and Software Technology, 48(5), 2006, 345–354.
  • Percin, S. “Fuzzy multi-criteria risk-benefit analysis of business process outsourcing (BPO)”. Information Management & Computer Security, 16(3), 2008, 213–234.
  • Solli-Saether, H. & Gottschalk, P. “Maturity in IT outsourcing relationships: an exploratory study of client companies”, Industrial Management & Data Systems. 108(5), 2008, 635–649.
  • Soteriou, A.C. & Chase, R.B. “A robust optimization Approach for improving service quality”. Manufacturing & Service Operations Management. 2(3), 2000, 264–286.
  • Straub, D., Weill, P., & Schwaig, K.S, “Strategic Dependence on the IT resource and Outsourcing: A test of the strategic control model”, Information Systems Frontiers, 10(2), 2008, 195–210.
  • Teng, J.T.C., Cheon, M.J., & Grover, V. “Decisions to outsource information systems functions: testing a strategy- theoretic discrepancy model”. Decision Sciences, 26(1), 1995, 75–103.
  • Van de Ven, A.H., Delbecq, A.L. & Koenig, R. “Determinants of Coordination Modes within Organizations”. American Sociological Review, 41(2), 1976, 22–338.
  • Wang, E.T.G., Barron, T., & Seidmann, A. “Contracting Structures for Custom Software Development: The Impacts of Informational Rents and Uncertainty on Internal Development and Outsourcing”. Management Science, 43(12), 1997, 1726–1744.
  • Wang, J-J & Yang, D-L. “Using a hybrid multi-criteria decision aid method for information systems outsourcing”. Computers and Operations Research, 34(12), 2007, 3691–3700.
  • Whitten, D. & Leidner, D. “Bringing IT Back: An Analysis of the Decision to Backsource or Switch Vendors”. Decision Sciences, 37(4), 2006, 605–621.
  • Williamson, O.E. “The Economics of Organization: The Transaction Cost Approach”. American Journal of Sociology, 87(3), 1981, 548–577.
  • Willcocks, L., Lacity, M. & Fitgerald, G. “Information Technology Outsourcing in Europe and the USA; Assessment Issues”. International Journal of Information Management, 15(5), 1995, 333–351.
  • Wright, C. “Top Three Potential Risks With Outsourcing Information Systems”. Information Systems Control Journal, 5, 2004, 1–3.
  • Young-Ybarra, C. & Wiersema, M. “Strategic flexibility in information technology alliances: the influence of transaction cost economics and social exchange theory”. Organization Science, 10(4), 1999, 439–459.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.