43 research outputs found

    Determinants of Netsourcing: An Empirical Evaluation

    Get PDF

    Sourcing strategies to keep up with competition: the case of SAP

    Get PDF
    This paper applies the Red Queen theory to explain how organizations utilize various sourcing arrangements in order to compete in an evolutionary arms race where only the strongest competitors will survive. The case study incorporates competition, and views sourcing strategies as a means to improve the firm’s viability to survive competition in the marketplace. The study begins by positioning the Red Queen theory within the sourcing literature. It subsequently applies the framework to a case study of SAP AG to illustrate how sourcing strategies have changed over time in response to the logic of competition. The case study reveals that (a) organizations are adaptive systems and capable of learning to make strategic changes pertaining to sourcing arrangements; (b) organizations select the terms on which they want to compete by developing certain capabilities within the firm; (c) organizations are reflexive and over time develop competitive hysteresis which allows them to become stronger competitors. In the case of SAP AG, various sourcing arrangements were selected over its 40-year history to respond to technological and market changes

    Competitive Moves Over Time: The Case of SAP

    Get PDF
    This paper applies the Red Queen theory to explain how organizations utilize various sourcing arrangements in order to compete in an evolutionary arms race where only the strongest competitors will survive. This case study incorporates competition and views sourcing strategies as a means to improve its viability to survive in the marketplace. The study begins with a review of sourcing literature to position the Red Queen theory within the sourcing literature. It subsequently applies the framework to a case study of SAP AG to illustrate how sourcing strategies changed over time in response to the logic of competition. The case study reveals that (a) organizations are adaptive systems and capable of organizational learning to make strategic changes pertaining to sourcing arrangements; (b) organizations select the terms in which they want to compete by developing certain capabilities within the firm; (c) organizations are reflexive and over time develop competitive hysteresis which allows them to become stronger competitors. In the case of SAP AG, various sourcing arrangements were selected over its 40-year history to respond to technological and market changes

    Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification

    Get PDF
    The past decade has seen an increasing interest in IT outsourcing as it promises companies many economic benefits. In recent years, IT paradigms, such as Software-as-a-Service or Cloud Computing using third-party services, are increasingly adopted. Current studies show that IT security and data privacy are the dominant factors affecting the perceived risk of IT outsourcing. Therefore, we explicitly focus on determining the technological risks related to IT security and quality of service characteristics associated with IT outsourcing. We conducted an extensive literature review, and thoroughly document the process in order to reach high validity and reliability. 149 papers have been evaluated based on a review of the whole content and out of the finally relevant 68 papers, we extracted 757 risk items. Using a successive refinement approach, which involved reduction of similar items and iterative re-grouping, we establish a taxonomy with nine risk categories for the final 70 technological risk items. Moreover, we describe how the taxonomy can be used to support the first two phases of the IT risk management process: risk identification and quantification. Therefore, for each item, we give parameters relevant for using them in an existing mathematical risk quantification model

    mpirically Testing a Model for the Intention of Firms to Use Remote Application Hosting

    Get PDF

    TAXONOMY OF TECHNOLOGICAL IT OUTSOURCING RISKS: SUPPORT FOR RISK IDENTIFICATION AND QUANTIFICATION

    Get PDF
    The past decade has seen an increasing interest in IT outsourcing as it promises companies many economic benefits. In recent years, IT paradigms, such as Software-as-a-Service or Cloud Computing using third-party services, are increasingly adopted. Current studies show that IT security and data privacy are the dominant factors affecting the perceived risk of IT outsourcing. Therefore, we explicitly focus on determining the technological risks related to IT security and quality of service characteristics associated with IT outsourcing. We conducted an extensive literature review, and thoroughly document the process in order to reach high validity and reliability. 149 papers have been evaluated based on a review of the whole content and out of the finally relevant 68 papers, we extracted 757 risk items. Using a successive refinement approach, which involved reduction of similar items and iterative re-grouping, we establish a taxonomy with nine risk categories for the final 70 technological risk items. Moreover, we describe how the taxonomy can be used to support the first two phases of the IT risk management process: risk identification and quantification. Therefore, for each item, we give parameters relevant for using them in an existing mathematical risk quantification mode

    Capturing Value from Data: Revenue Models for Data-Driven Services

    Get PDF
    Undisputedly, the amount of data is growing exponentially and huge opportunities exist to exploit them. New service business models are being built around value propositions based on data and analytics. Suitable revenue models need to reap the benefits of these value propositions. However, the question of how to best turn a value proposition into revenue for data-driven services is not systematically addressed in literature. \ \ We provide an overview of possible revenue models for data-driven services. Based on a sample of 100 start-ups, we apply qualitative analysis to identify different revenue models for newly established data-driven services such as subscription, gain sharing and multi-sided revenue models. \ \ This paper will contribute to the fundamental understanding of how companies can capture value from data-driven services. It should give guidance on the design and selection of appropriate revenue models and, thus, inspire new forms of revenue generation from the use of data.

    Using Real Options Analysis for Evaluating Uncertain Investments in Information Technology: Insights from the ICIS 2001 Debate

    Get PDF
    Business and information systems (IS) executives continue to grapple with issues of risk and uncertainty in evaluating investments in information technology (IT). Despite the use of net present value (NPV) and other investment appraisal techniques, executives are often forced to rely on instinct when finalizing IT investment decisions. Recognizing the shortcomings of NPV, real options analysis has been suggested as an alternative approach, one that considers the risks associated with an investment while recognizing the ability of corporations to defer an investment until a later period or to make a partial investment instead. Responding to a growing interest in real options analysis among the IS community, a debate involving four prominent researchers was convened at the 2001 International Conference on Information Systems (ICIS). In addition to offering a tutorial overview of real options, the goal of the debate was to assess the state of research in this area and to identify avenues for future research. This paper describes the outcomes of the debate, culminating in a series of research questions and topics that set the stage for future research in IT and real options analysis. A transcript of the debate and an overview of real options analysis are included as appendices
    corecore