62,447 research outputs found

    A Study of Information Systems Outsourcing Risks

    Get PDF
    Despite the considerable growth of Information Systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the main risks computer outsourcing entails for the largest Spanish firms. In order to achieve that aim, we have reviewed the previous literature on this topic and later analysed the results of a survey covering 5,000 firms. According to the firms under analysis, the main concern in relation to IS outsourcing is the excessive dependence on the provider this type of contract may generate. Nevertheless, some characteristics of firms (mainly their size) somehow determine what risks are seen as the most relevant. The conclusions also suggest that total outsourcing can turn out to be a very dangerous strategy, mainly due to the dependence it creates. This is why IS managers should consider other alternatives such as having multiple providers or resorting to selective outsourcing

    Towards a theory of information systems outsourcing risk

    Get PDF
    Information systems outsourcing risks are a vital component in the decision and management process associated to the provision of information systems and technology services by a provider to a customer. Although there is a rich literature on information systems outsourcing risks, the accumulated knowledge on this area is fragmented. In view of this situation, an argument is put forward on the usefulness of having a theory that integrates the various constructs related to information systems outsourcing risks. This study aims to contribute towards the synthesis of that theory, by proposing a conceptual scheme for interpreting the literature and presenting a preliminary version of a catalog of information systems outsourcing risks. Proposals for subsequent work towards the generation of the theory of information systems outsourcing risk are suggested

    A catalog of information systems outsourcing risks

    Get PDF
    Information systems outsourcing risks are a vital component in the decision and management process associated to the provision of information systems and technology services by a provider to a customer. Although there is a rich literature on information systems outsourcing risks, the accumulated knowledge on this area is fragmented. In view of this situation, an argument is put forward on the usefulness of having a theory that integrates the various constructs related to information systems outsourcing risks. This study aims to contribute towards the synthesis of that theory, by proposing a conceptual framework for interpreting the literature and presenting a catalog of information systems outsourcing risks. The conceptual framework articulates together six key risk elements, namely dangers, negative outcomes, undesirable consequences, factors and mitigation actions. The catalog condenses and categorizes the information systems outsourcing risk elements found on the literature reviewed, both from the perspective of the outsourcing customer and from the perspective of the outsourcing provider. Proposals for subsequent work towards the generation of the theory of information systems outsourcing risk are suggested

    Information systems offshore outsourcing: a descriptive analysis

    Get PDF
    Purpose - The present paper has as its aim to deepen in the study of Information Systems Offshore Outsourcing, proposing three essential steps to make this decision: weighing up the advantages and risks of Offshore Outsourcing; analysing the taxonomy of this phenomenon; and determining its current geography. Design/Methodology/Approach - With that objective in mind, it was decided to base the research work on the literature about this topic and the review of reports and statistics coming from different sources (consultants, the press, public institutions, etc.). Findings - Offshore Outsourcing has grown vertiginously in recent years. Its advantages exceed even those of onshore outsourcing, though it also involves greater risks derived from the (cultural and physical) distance existing between customer and provider. Various types of services and customer-provider relationships hide under the umbrella of Offshore Outsourcing; i.e. it is not a homogeneous phenomenon. The main Offshore Outsourcing customers can be found in the USA and Europe, mainly in the UK but also in other countries such as Germany and France. As for provider firms, most of them are located in Asia −outstandingly in India but also in China and Russia. At present, there are important providers scattered in other continents as well. Originality/Value - The conclusions suggest that the range of potential Offshore Outsourcing destinations must be widened and that the search for a provider cannot be based exclusively on cost savings; other considerations such as quality, security and proximity of the provider must also be taken into consideration. That is precisely the reason why the study of new countries like Spain as Offshore Outsourcing destinations is proposed

    Information systems outsourcing risks: a study of large firms

    Get PDF
    Purpose – Despite the considerable growth of information systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the main risks computer outsourcing entails in the case of the largest Spanish firms. Design/methodology/approach – In order to achieve that aim, reviews the previous literature on this topic and later analyses the results of a survey carried out using a questionnaire that was answered by 357 firms. Findings – According to the firms under analysis, the main concern in relation to IS outsourcing is the excessive dependence on the provider this type of contract can generate. Nevertheless, some characteristics of firms (mainly their size) determine to some extent what risks are seen as the most relevant. Originality/value – The conclusions suggest that total outsourcing can turn out to be a very dangerous strategy, mainly due to the dependence it creates. This is why IS managers should consider other alternatives such as having multiple providers or resorting to selective outsourcing

    Information Systems Outsourcing In Spain: Reflections From The Practitioners

    Get PDF
    The widespread growth of Information Systems outsourcing on an international scale contrasts sharply with the somewhat limited development of this practice in Spain. That is why the present paper deals with the situation of Information Systems outsourcing in this country. For this purpose, we have used the opinions and comments of those in charge of Information Systems departments at the largest Spanish firms through a normative Delphi study. Outsourcing makes it possible to achieve strategic as well as economic advantages and managers propose a number of ways to reduce the risks associated with this practice. Provider specialisation and permanent client-provider contact are key aspects in order to ensure outsourcing success and development. This paper is basically descriptive though it uses quantitative information. Furthermore, it refers exclusively to the context of large Spanish firms. Despite the limitations mentioned above, the paper has the advantage that in the panellists’ words we interpret the results obtained, which means that we can largely ratify the results of the first questionnaire elaborated. Moreover, it is worth studying the Spanish outsourcing model, which is less developed and has not received as much attention from researchers as that of other Western countries

    Risks and Hidden Costs: A Study of 26 Outsourced Projects

    Get PDF
    Despite the current unfavorable outlook of the larger economy, there has been a steady increase in information systems outsourcing by organizations which is projected to reach $97.9 billion in 2012. Ordinarily, organizations outsource their software projects to avoid the risks associated with developing the software internally and to control costs. However, a study of twenty six outsourced projects indicates that such organizations face unique risks and hidden costs that are particular to software outsourcing. This paper describes research done to estimate the effort expended by organizations in overseeing and participating in outsourced software projects and the implications for identifying risks and predicting costs of such projects. For many of the organizations that participated in the survey, uncovering the actual costs and risks of an outsourced project was an eye opener: the hidden costs and risks are surprisingly significant and are typically not managed by the organization

    The Refugee Problem: An International Legal Tangle

    Get PDF
    Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization, paving way to cloud computing. Cloud computing aims at providing computing services to its users as an utility. It allows its authenticated users to access a wide range of highly scalable computing capabilities and services via the internet on a pay-per-usage basis. Organisations not only view these benefits as cost-saving strategies, but also aim at improving the competitive advantages using cloud computing. Hence, this has given rise to a new horizon in IT/IS outsourcing. With a collaboration of cloud computing and outsourcing emerged a new concept called cloudsourcing. Cloudsourcing can be termed as the next generation outsourcing and the next phase of cloud computing promising benefits from both the areas. Cloudsourcing is outsourcing traditional business via the cloud infrastructure. Though there is pompous popularity surrounding this new technology, there is much hesitation in adopting it due to the inherent security issues. This paper discusses in detail the security issues and possible solution to the same. As this is a new concept, not much work is identified to be done in providing a set of guidelines to adopt cloudsourcing that are very specific to information security. This work intends to fill this aperture by building a set of well-defined information security guidelines, which can be termed as a novel. For this purpose, design science research method proposed by Hevner et al is used so as to accomplish this goal. Initially, a literature study is done after which an exploratory study comprising of interviews is done to gather qualitative data. The results of the exploratory interview is tested for correctness and evaluated based on an evaluation study comprising a survey based questionnaire. The analysis of the evaluation study results provides the final results. In such an attempt, the identified countermeasures to risks are classified into three groups namely, organisational, technical and regulatory and compliance guidelines. Hence the end results constituting the set of information security guidelines are classified into the above mentioned groups. This work is assumed to contribute to our understanding of information security in cloudsourcing and in supporting IT decision makers, IT project managers and security executives of organisations for a smooth and secure transition towards cloudsourcing their business

    The Emergence of Global Software Development Outsourcing Case Studies of Large Organizations in Australia

    Get PDF
    Information Technology (IT) is a diverse environment and managing all areas of IT has increasingly become difficult for an organization’s internal Information Systems group. Coupled with the fact that performance requirements have become dynamic, there is a greater need to search the world for the most capable supplier(s). An approach towards global outsourcing of software development or offshore development has been witnessed in the United States; however, organizations in Australia have not been as aggressive in pursuing this strategy. This study aims to document the reasons behind this stance via multiple case studies. Specifically, the study aims to document the awareness, practicality, drivers and risks in adopting a pro-active global outsourcing strategy in Australian industry

    Offshore Information Systems Outsourcing: Strategies and Scenarios

    Get PDF
    This paper presents the findings of an ongoing research study into offshore information technology and systems outsourcing. Fieldwork was conducted in India and the United Kingdom to identify different strategies and scenarios. Based on the premise that offshore outsourcing poses greater risks than using suppliers from the home country, the research develops a risk assessment matrix comprising four scenarios: body shopping; maintenance and support of system hardware and software; IT architecture design; and strategy and product development. As offshore outsourcers develop resources and capabilities to offer high value-added work, this increases their own risk, and those of the customer
    • 

    corecore