197
Views
3
CrossRef citations to date
0
Altmetric
Articles

Using financial derivatives to hedge against market risks in IT outsourcing projects – a quantitative decision model

, &
Pages 249-264 | Received 13 May 2013, Accepted 25 Jul 2013, Published online: 15 Oct 2013

References

  • Apte, U. M., Sobol, M. G., Hanaoka, S., Shimada, T., Saarinen, T., Salmela, T., & Vepsalainen, A. P. J. (1997). IS outsourcing practices in the USA, Japan and Finland: A comparative study. Journal of Information Technology, 12, 289–304.
  • Aron, R., Clemons, E. K., & Reddi, S. (2005). Just right outsourcing: Understanding and managing risk. Journal of Management Information Systems, 22, 37–55.
  • Arrow, K. J. (1971). The theory of risk aversion. In K. J. Arrow (Ed.), Essays in the theory of risk-bearing (1st ed.). (pp. 90–120). Chicago, IL: Markham.
  • Aubert, B. A., Dussault, S., Patry, M., & Rivard, S. (1999). Managing the risk of IT outsourcing. Paper presented at the 32nd Hawaii International Conference on System Science, January 5–8 1999, Maui.
  • Aubert, B. A., Patry, M., & Rivard, S. (2001). Managing IT outsourcing risk: Lessons learned. CIRANO Working Papers 2001s–39. Retrieved from: http://www.cirano.qc.ca/pdf/publication/2001s-39.pdf
  • Aundhe, M. D., & Mathew, S. K. (2009). Risks in offshore IT outsourcing: A service provider perspective. European Management Journal, 27, 418–428.
  • Bahli, B., & Rivard, S. (2003). The information technology outsourcing risk: A transaction cost and agency theory-based perspective. Journal of Information Technology, 18, 211–221.
  • Baker, S., Spiro, M. & Hamm, S. (2000). The fall of Baan (int’l edition). Retrieved from http://www.businessweek.com/2000/00_33/b3694015.htm
  • Benaroch, M. (2002). Managing information technology investment risk: A real options perspective. Journal of Management Information Systems, 19, 43–84.
  • Berger, J. O. (1985). Statistical decision theory and Bayesian analysis. New York: Springer.
  • Bernoulli, D. (1954). Exposition of a new theory on the measurement of risk. Econometrica, 22, 23–36.
  • Black, F., & Scholes, M. (1973). The pricing of options and corporate liabilities. Journal of Political Economy, 81, 637–654.
  • Business Wire India (2007). Wipro and Nortel win outsourcing excellence award. Retrieved from http://www.businesswireindia.com/pressrelease.asp?b2mid=13506
  • CBC News (2009). Nortel Networks files for bankruptcy protection. Retrieved from http://www.cbc.ca/news/business/story/2009/01/14/nortelbankruptcypro.html
  • Dibbern, J., Goles, T., Hirschheim, R., & Jayatilaka, B. (2004). Information systems outsourcing: A survey and analysis of the literature. ACM SIGMIS Database, 35, 6–102.
  • Feeny, D. F., & Willcocks, L. P. (1998). Core IS capabilities for exploiting information technology. Sloan Management Review, 39, 9–21.
  • Fernandez, W. D. (2003). Metateams in major information technology projects: A grounded theory on conflict, trust, communication, and cost. Queensland: University of Technology.
  • Fichman, R. G., Keil, M., & Tiwana, A. (2005). Beyond valuation: Options thinking in IT project management. California Management Review, 47, 74–96.
  • Fitzgerald, G., & Willcocks, L. (1994). Contracts and partnerships in the outsourcing of IT. In J. I. DeGross, S. L. Huff, & M. Munro (Eds.), Proceedings of the 15th International Conference on Information Systems (Paper 17), Vancouver, BC.
  • Freund, R. J. (1956). The introduction of risk into a programming model. Econometrica, 24, 253–263.
  • Fridgen, G., & Müller, H. V. (2009). Risk/cost valuation of fixed price IT outsourcing in a portfolio context. In J. F. Nunamaker Jr., & W. L. Currie (Eds.), Proceedings of the 30th International Conference on Information Systems (Paper 135), Phoenix.
  • Fridgen, G., & Müller, H. V. (2011). An approach for portfolio selection in multi-vendor IT outsourcing. In D. F. Galletta, & T.-P. Liang (Eds.), Proceedings of the 32nd International Conference on Information Systems (Track 14), Shanghai.
  • Goo, J., Kishore, R., Rao, H. R., & Nam, K. (2009). The role of service level agreements in relational management of IT outsourcing: An empirical study. MIS Quarterly, 33, 119–145.
  • Gull, D. (2011). Valuation of discount options in software license agreements. Business & Information Systems Engineering, 3, 221–230.
  • Han, H. S., Lee, J. N., & Seo, Y. W. (2008). Analyzing the impact of a firm’s capability on outsourcing success: A process perspective. Information & Management, 45, 31–42.
  • Hanink, D. M. (1985). A mean-variance model of MNF location strategy. Journal of International Business Studies, 16, 165–170.
  • Hartman, F., & Ashrafi, R. A. (2002). Project management in the information systems and information technologies industries. Project Management Journal, 33, 5–15.
  • Hull, J. (2009). Options, futures, and other derivatives (7th ed.). Upper Saddle River, NJ: Pearson Education.
  • Iacovou, C. L., & Nakatsu, R. (2008). A risk profile of offshore-outsourced development projects. Communications of the ACM, 51, 89–94.
  • Kern, T., Willcocks, L. P., & Lacity, M. C. (2002). Application service provision: Risk assessment and mitigation. MIS Quarterly Executive, 1, 113–126.
  • Koh, C., Ang, S., & Straub, D. W. (2004). IT outsourcing success: A psychological contract perspective. Information Systems Research, 15, 356–373.
  • König, C., Mette, P., & Müller, H. V. (2013). Multivendor portfolio strategies in cloud computing. Paper presented at the 21st European Conference on Information Systems, June 5–8 2013, Utrecht, The Netherlands.
  • Lacity, M. C., Khan, S. A., & Willcocks, L. P. (2009). A review of the IT outsourcing literature: Insights for practice. The Journal of Strategic Information Systems, 18, 130–146.
  • Lacity, M. C., & Willcocks, L. P. (1998). An empirical investigation of information technology sourcing practices: Lessons from experience. MIS Quarterly, 22, 363–408.
  • Lacity, M. C., & Willcocks, L. P. (2003). IT sourcing reflections: Lessons for customers and suppliers. Wirtschaftsinformatik, 45, 115–125.
  • Lee, J. N. (2001). The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success. Information & Management, 38, 323–335.
  • Lee, J. N., & Choi, B. (2011). Effects of initial and ongoing trust in IT outsourcing: A bilateral perspective. Information & Management, 48, 96–105.
  • Lee, J. N., Huynh, M. Q., & Hirschheim, R. (2008). An integrative model of trust on IT outsourcing: Examining a bilateral perspective. Information Systems Frontiers, 10, 145–163.
  • Lee, M. K. O. (1996). IT outsourcing contracts: Practical issues for management. Industrial Management & Data Systems, 96, 15–20.
  • Loh, L., & Venkatraman, N. (1992). Determinants of information technology outsourcing: A cross-sectional analysis. Journal of Management Information Systems, 9, 7–24.
  • Markowitz, H. M. (1959). Portfolio selection: Efficient diversification of investments. New York: John Wiley & Sons.
  • Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing—The business perspective. Decision Support Systems, 51, 176–189.
  • Ngwenyama, O. K., & Sullivan, W. E. (2006). Secrets of a successful outsourcing contract: A risk analysis. In J. Ljungberg, & M. Andersson (Eds.), Proceedings of the 14th European Conference on Information Systems, 248–259, Göteborg, Sweden.
  • Pappous, P. A. (1985). Software Escrow: The court favorite and bankruptcy law. Santa Clara Computer & High Technology Law Journal, 1, 309.
  • Sabherwal, R. (1999). The role of trust in outsourced IS development projects. Communications of the ACM, 42, 80–86.
  • Spiotto, A. H., & Spiotto, J. E. (2003). Ultimate downside of outsourcing: Bankruptcy of the service provider. American Bankruptcy Institute Law Review, 11, 47–92.
  • Taylor, H. (2006). Critical risks in outsourced IT projects: The intractable and the unforeseen. Communications of the ACM, 49, 75–79.
  • Verhoef, C. (2005). Quantifying the value of IT-investments. Science of Computer Programming, 56, 315–342.
  • von Neumann, J., & Morgenstern, O. (1947). The theory of games and economic behaviour. Princeton, NJ: Princeton University Press.
  • Wehrmann, A., Heinrich, B., & Seifert, F. (2006). Quantitatives IT-Portfoliomanagement: Risiken von IT-Investitionen wertorientiert steuern. Wirtschaftsinformatik, 48, 234–245.
  • Willcocks, L. P., Lacity, M. C., & Kern, T. (1999). Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA. Journal of Strategic Information Systems, 8, 285–314.
  • Zimmermann, S. (2008). Governance im IT-Portfoliomanagement - Ein Ansatz zur Berücksichtigung von Strategic Alignment bei der Bewertung von IT. WIRTSCHAFTSINFORMATIK, 50, 357–365.
  • Zimmermann, S., Katzmarzik, A., & Kundisch, D. (2008). IT sourcing portfolio management for IT service providers - a risk/cost perspective. Paper presented at the 29th International Conference on Information Systems, December 14–17 2008, Paris.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.