53
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Identifying Vendor Risks In Remote Infrastructure Management Services

Pages 32-50 | Published online: 12 Sep 2014

Reference

  • Aron, R., Clemons, E. K. & Reddi, S. (2005). Just right outsourcing: Understanding and managing risk. Journal of Management Information Systems, 22 (2), 37–55.
  • Aubert, B. A., Patry, M & Rivard, S. (2005). A framework for information technology outsourcing risk management, ACMSIGMIS Database, 36 (4), 9–28.
  • Aubert, B.A., Patry, M & Rivard S. (2001). Managing IT outsourcing risks - lessons learned, Cahier du GReSI no 01-11, Obtained through the Internet: http://citeseerx.ist.psu.edu/viewdoc/dowvnload?doi=10.1.1.114.2558andrep=replandtype=pdf [accessed January 10, 2010].
  • Aundhe, M.D. & Mathew, S. K. (2009). Risk mitigation in offshore IT outsourcing contracts: A service provider perspective, European Management Journal, 27 (6), 418–428.
  • Bahli, B., & Rivard, S. (2005). Validating measures of information technology outsourcing risk factors, Omega, 33 (2), 175–187.
  • Bahli, B. & Rivard, S., (2003). The information technology outsourcing risk: A transaction cost and agency theory-based perspective, Journal of Information Technology, 18 (3), 211–221.
  • Barki, H., Rivard, S. & Talbot, J. (1993). Toward an assessment of software project risk, Journal of Management Information Systems, 10 (2), 203–225.
  • Beulen, E., Fenema, P. V. & Currie, W. (2005). From application outsourcing to infrastructure management: Extending the offshore outsourcing service portfolio, European Management Journal, 23 (2), 133–144.
  • Choudhury, V., & Sabherwal, R. (2003). Portfolios of control in outsourced software development projects, Information Systems Research, 14 (3), 291–314.
  • Clemons, E. K., & Hitt, L. M. (1997). Strategic sourcing for services: Assessing the balance between outsourcing and insourcing. Wharton school of the University of Pennsylvania. Operations and Information Management Working Paper 97-06-01. Obtained through the Internet: http://opim.wharton.upenn.edu/∼clemons/files/outsourcing_v4_2.pdf [accessed January 10, 2009].
  • CRISINFAC (2009). State of the Industry, CRISIL IT Services Annual Review.
  • DiRomualdo, A. and Gurbaxani, V. (1998). Strategic intent for IT outsourcing, Sloan Management Review, 39 (4), 67–80.
  • Earl, M. (1996). The risks of outsourcing IT, Sloan Management Review, 37 (3), 26–32.
  • Eisenhardt, K. M. (1989). Building theories from case study research, The Academy of Management Review, 14 (4), 532–550.
  • Eisenhardt, K. M. (1989). Building theories from case study research, The Academy of Management Review, 14 (4), 532–550.
  • Faraj, S. & Sproull, L. (2000). Coordinating expertise in software development teams. Management Science, 46 (12), 1154–1568.
  • Goo, J., Kishore, R., Rao, H. R. & Nam, K. (2009). The role of service level agreements in relational management of information technology outsourcing: An empirical study, MIS Quarterly, 33 (1), 119–145.
  • Gopal, A., Sivaramakrishnan, K., Krishnan, M. S., & Mukopadhyaya, T. (2003). Contracts in offshore software development: An empirical study, Management Science, 49 (12), 1671–1683.
  • Hazel, T. (2006). Critical risks in outsourced IT projects: The intractable and the unforeseen, Communications of the ACM, 49 (11),75–79.
  • Kern, T., & Willcocks, L. P. (2001). The Relationship Advantage, New York: Oxford University Press.
  • Kraut, R. & Streeter, L. (1995). Coordination in large scale software development. Communications of the ACM, 38 (3), 69–81.
  • Kumar, N., Stern, L. N. & Anderson, J. C. (1993). Conducting inter-organizational research using key informants, Academy of Management Journal, 36 (6), 1633–1651.
  • Lacity, M. C. & Willcocks, L. P. (2001). Global information technology outsourcing: In search of business advantage, Chichester, England: Wiley.
  • Lacity, M. C. & Hirschheim, R. (1993). Information Systems Outsourcing: Myths, Metaphors and Realities, Chichester, England: Wiley.
  • Lacity, M. C. & Hirschheim, R. (1995). Beyond the Information Systems Outsourcing Bandwagon: The Insourcing Response, New York: Wiley.
  • Lacity, M. C., Willcocks, L. P. & Feeny, D. F. (1996). The value of selective IT sourcing. Sloan Management Review. 37 (3), 13–25.
  • Lee, J., (2008). Exploring the vendor’s process model in Information Technology outsourcing. Communication of the ACM, 22 (31), 569–588.
  • Levina, N. & Ross, J. (2003). From the vendor’s perspective, exploring the value proposition in information technology outsourcing, MIS Quarterly, 27 (3), 331–364.
  • Loh, L. & Venkatraman, N. (1995). An empirical study of Information Technology outsourcing: Benefits, risks and performance implications, Proceedings of International Conference on Information Systems (ICIS)- 1995.
  • Mathew, S. K. (2006). Understanding risk in IT outsourcing, a fuzzy framework, Journal of Information Technology Cases and Application Research, 8 (3), 27–39.
  • Mcneil, R. (1980). The new social contract: An inquiry into modern contractual relations. New Haven, CT: Yale University Press.
  • Michell, V. & G. Fitzgerald (1997). The IT outsourcing market-place: Vendors and their selection, Journal of Information Technology, 12 (3), 223–237.
  • Mukherjee, P. K., & Singh, A. (2008). The next wave of outsourcing: Remote infrastructure management, Global Services, 3 (30), 35–41.
  • Myers, M. D. (1997). Qualitative research in information systems, MIS Quarterly, 21 (2), 241–242. MISQ Discovery, archival version, June 1997, http://www.misq.org/discovery/MISQD_isworld/. MISQ Discovery, updated version, last modified: May 13, 2010 www.qual.auckland.ac.nz
  • Natovich, J. (2003). Vendor related risks in IT development: A chronology of an outsourced project failure, Technology Analysis and Strategic Management, 15 (4), 409–419.
  • Palvia, P., King, R.C., Xia, W. and Palvia, S. (2010). Capability, Quality and performance of offshore IS vendors: A theoretical framework and empirical investigation. Decision Sciences, 41 (2), 231–270.
  • Peppard, J. (2003). Managing IT as a portfolio of services. European Management Journal, 21 (4), 467–483.
  • Pyburn, P. J. (1983). Linking the MIS plan with corporate strategy: An exploratory study. MIS Quarterly, 7 (2), 1–14.
  • Russell, B. & Chatterjee, S. (2003). Relationship quality: The undervalued dimension of software quality. Communications of the ACM, 46 (8), 85–89.
  • Sabherwal, R. (1999). The role of trust in outsourced IS development projects. Communications of the ACM, Vol. 42, no. 2, pp. 80–86.
  • Schmidt, R., Lyytinen, K., Keil, M. & Cule, P. (2001). Identifying software project risks: an international Delphi study. Journal of Management Information Systems, 17 (4), 5–36.
  • Swinarski, M. E., R. Kishore, & H. R. Rao (2002) Impact of vendor capabilities on ASP performance, In R. Hirschheim, A. Heinzl, and J. Dibbern (Eds.), Information systems outsourcing: enduring themes, emergent patterns, and future directions, (pp. 497–512), Berlin, Germany: Springer Verlag.
  • Tafti M.H. (2005). Risks factors associated with offshore IT outsourcing, Industrial Management and Data Systems, 105 (5), 549–560.
  • Tanriverdi, H., Konana, P. and L. Ge (2005) Online supplement for ISR2005-193-SI, Obtained through the Internet: http://wwws.informs.org/content/download/15310/180455/file/Online_supplement_for_ISR2005-193-SI.pdf [accessed June 01, 2010].
  • TPI (2011). The TPI index, an informed view of the state of the global commercial outsourcing market, fourth quarter and full year 2010, Obtained through the Internet: www.tpi.net/pdf/index/getfile.asp?file=4Q10-TPI-Index.pdf [accessed January 2011].
  • Willcocks, L.P., Lacity, M.C. & Kern, T. (1999). Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA, The Journal of Strategic Information Systems, 8 (3), 285–314.
  • Williamson, O. E. (1985). The Economic Institutions of Capitalism, New York: Free Press.
  • Yin, R.K. (1994). Case Study Research: Design and Methods, Vol. 5, Applied social research methods series. Thousand Oaks, CA: Sage Publications Inc.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.