Access the full text.
Sign up today, get DeepDyve free for 14 days.
John Felton (2008)
Outsourcing Information TechnologyThe International Journal of Knowledge, Culture, and Change Management: Annual Review, 8
E. Clemons, S. Reddi, M. Row (1993)
The Impact of Information Technology on the Organization of Economic Activity: The "Move to the Middle" HypothesisJ. Manag. Inf. Syst., 10
R. Klepper, Wendell Jones (1998)
Outsourcing information technology, systems and services
Y. Chen, A. Bharadwaj
An empirical analysis of IT outsourcing contract structures
M. Earl (1996)
The Risks of Outsourcing ITSloan Management Review, 37
Arun Rai, Likoebe Maruping, V. Venkatesh (2009)
Offshore information systems project success: the role of social embeddedness and cultural characteristicsManagement Information Systems Quarterly, 33
E. Clemons, L. Hitt (2004)
Poaching and the misappropriation of information: transaction risks of information exchange37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the
Susanne Lai, Richard Heeks, B. Nicholson
Development Informatics Working Paper Series Uncertainty and Coordination in Global Software Projects: a Uk/india-centred Case Study Uncertainty and Coordination in Global Software Projects: a Uk/india-centred Case Study
Joseph Rottman, Mary Lacity (2008)
A US Client’s learning from outsourcing IT work offshoreInformation Systems Frontiers, 10
S.J. Frank
Source out, risk in
Yuanyuan Chen, A. Bharadwaj (2009)
An Empirical Analysis of Contract Structures in IT OutsourcingInf. Syst. Res., 20
L. Willcocks, Mary Lacity (1999)
IT outsourcing in insurance services: risk, creative contracting and business advantageInformation Systems Journal, 9
CRISL Research
Opinion
S. Lai, R. Heeks, B. Nicholson
Uncertainty and coordination in global software projects: a UK/India centered case study
B. Aubert, Michel Patry, S. Rivard (2005)
A framework for information technology outsourcing risk managementData Base, 36
M. Tafti (2005)
Risks factors associated with offshore IT outsourcingInd. Manag. Data Syst., 105
Jens Dibbern, J. Winkler, Armin Heinzl (2008)
Explaining Variations in Client Extra Costs Between Software Projects Offshored to IndiaMIS Q., 32
Jan Heide, G. John (1988)
The Role of Dependence Balancing in Safeguarding Transaction-Specific Assets in Conventional ChannelsJournal of Marketing, 52
M. Smith, Sabyasachi Mitra, Sridhar Narasimhan (1996)
Offshore outsourcing of software development and maintenance: A framework for issuesInf. Manag., 31
K. Kaiser, S. Hawk (2004)
Evolution of Offshore Software Development: From Outsourcing to CosourcingMIS Q. Executive, 3
Ian Macneil (1980)
The new social contract: An inquiry into modern contractual relations
M.D. Myers
Qualitative research in information systems
R. Yin (1984)
Case Study Research: Design and Methods
M. Jensen, W. Meckling
Theory of the firm: managerial behavior, agency costs, and ownership structure
R. Aron, E. Clemons, S. Reddi (2005)
Just Right Outsourcing: Understanding and Managing RiskProceedings of the 38th Annual Hawaii International Conference on System Sciences
K. Eisenhardt (1989)
Building theories from case study researchSTUDI ORGANIZZATIVI
Christine Koh, Soon Ang, D. Straub (2004)
IT Outsourcing Success: A Psychological Contract PerspectiveInf. Syst. Res., 15
W. Dugger (1987)
The Economic Institutions of CapitalismJournal of Economic Issues, 21
A. Gopal, K. Sivaramakrishnan, M. Krishnan, T. Mukhopadhyay (2003)
Contracts in Offshore Software Development: An Empirical AnalysisManag. Sci., 49
Allen Lee (1999)
Rigor and relevance in MIS research: beyond the approach of positivism aloneManagement Information Systems Quarterly, 23
R. Sabherwal (1999)
The role of trust in outsourced IS development projectsCommun. ACM, 42
S. Frank (2005)
Source out, risk in [offshore software development]IEEE Spectrum, 42
V. Choudhury, R. Sabherwal (2003)
Portfolios of Control in Outsourced Software Development ProjectsInf. Syst. Res., 14
Charalambos Iacovou, Robbie Nakatsu (2008)
A risk profile of offshore-outsourced development projectsCommun. ACM, 51
R. Fairley (1994)
Risk management for software projectsIEEE Software, 11
Richard Heeks, S. Krishna, B. Nicholson, Sundeep Sahay (2001)
Synching or Sinking: Global Software Outsourcing RelationshipsIEEE Softw., 18
Shankar Ganesan (1994)
Determinants of Long-Term Orientation in Buyer-Seller Relationships:Journal of Marketing, 58
H. Barki, S. Rivard, J. Talbot
Toward an assessment of software project risk
A. Gopal, K. Sivaramakrishnan, M.S. Krishnan, T. Mukopadhyaya
Contracts in offshore software development: an empirical study
Madhuchhanda Aundhe, Saji Mathew (2009)
Risks in offshore IT outsourcing: A service provider perspectiveEuropean Management Journal, 27
L. Dignan
GM's bitter pill
Jens Dibbern, T. Goles, R. Hirschheim, Bandula Jayatilaka (2004)
Information systems outsourcing: a survey and analysis of the literatureData Base, 35
D. Avison, M. Myers (2002)
Qualitative Research in Information Systems: A Reader
N. Kumar, L.N. Stern, J.C. Anderson
Conducting inter‐organizational research using key informants
A. Chatfield, Padmaharsha Wanninayaka (2008)
IT Offshoring Risks and Governance CapabilitiesProceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)
E. Carmel, P. Tjia
Offshoring Information Technology, Sourcing and Outsourcing to a Global Workforce
J.N. Lee, Y. Kim
Effect of partnership quality in IS outsourcing success: conceptual framework and empirical investigation
M. Graf, Susan Mudambi (2005)
The Outsourcing of It-Enabled Business Processes: A Conceptual Model of the Location DecisionJournal of International Management, 11
T. Kern, L. Willcocks (2001)
The Relationship Advantage
Michael Jensen, W. Meckling (1976)
Theory of the Firm
K. Eisenhardt (1989)
Agency Theory: An Assessment and ReviewAcademy of Management Review, 14
W. Aspray, Frank Mayadas, Moshe Vardi (2006)
Globalization and offshoring of software : a report of the ACM Job Migration Task Force
N. Levina, J. Ross (2003)
From the Vendor's Perspective: Exploring the Value Proposition in Information Technology OutsourcingMIS Q., 27
Jae-Nam Lee, Minh Huynh, R. Kwok, Shih-Ming Pi (2000)
The evolution of outsourcing research: what is the next issue?Proceedings of the 33rd Annual Hawaii International Conference on System Sciences
A.T. Kearney
Offshoring for Long Term Advantage
T. Kern, L. Willcocks (2000)
Exploring information technology outsourcing relationships: theory and practiceJ. Strateg. Inf. Syst., 9
E. Beulen, P. Fenema, W. Currie (2005)
From Application Outsourcing to Infrastructure Management:: Extending the Offshore Outsourcing Service PortfolioEuropean Management Journal, 23
T. Kern, L. Willcocks, E. Heck (2002)
The Winner's Curse in IT Outsourcing: Strategies for Avoiding Relational TraumaCalifornia Management Review, 44
B. Boehm, Rony Ross (1989)
Theory-W Software Project Management: Principles and ExamplesIEEE Trans. Software Eng., 15
H. Barki, S. Rivard, Jean Talbot (2001)
and An Integrative Contingency Model of Software Project Risk Management,” Journal of Management Information Systems (4), June, pp. ., 17
H. Barki, S. Rivard, Jean Talbot (1993)
Toward an Assessment of Software Development RiskJ. Manag. Inf. Syst., 10
Jahyun Goo, R. Kishore, H. Rao, K. Nam (2009)
The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical StudyMIS Q., 33
T. Goles, Wynne Chin (2005)
Information systems outsourcing relationship factors: detailed conceptualization and initial evidenceData Base, 36
J.C. Anderson, J.A. Narus
A model of distribution firm and manufacturing firm working partnerships
H. Tanriverdi, P. Konana, L. Ge
Online supplement for ISR2005‐193‐SI
H. Barki, S. Rivard, Jean Talbot (2001)
An Integrative Contingency Model of Software Project Risk ManagementJournal of Management Information Systems, 17
J. Barthélemy (2001)
The Hidden Costs of IT OutsourcingMIT Sloan Management Review, 42
M.D. Aundhe, S.K. Mathew
Risk mitigation in offshore IT outsourcing contracts: a service provider perspective
Purpose – Although risks and client‐vendor relationships in IT outsourcing have been studied in prior research, there is a paucity of studies providing insights on the mitigation of client risks through the relationship. This research aims to focus on mitigation of the ex post risks of firms engaged in offshore software development (OSD). Client risks due to service provider behavior are identified first. Further, this work seeks to identify relationship variables that could reduce the impact of determinants of risk on a risk category. Design/methodology/approach – This research followed a multiple case study method aiming to build insights and directions that would facilitate further research. The paper's goal of sampling was to choose cases which were likely to extend the emergent theory pertaining to risks and their mitigation through relationships. Findings – Findings from this study show that shirking, loss of control over information assets, and service provider lock‐in are the three categories of ex post risks. A relationship management strategy ensuring reasonable profits to the vendor could mitigate shirking risk. Trustworthiness of vendors established through credibility and benevolence in prior engagements could mitigate the risk of loss of control over information assets. Further, dependence balancing through a multi‐vendor offshoring strategy and joint investments in relationship‐specific assets could mitigate the risk of service provider lock‐in. Practical implications – The findings from this research provide useful insights in vendor selection and management process. Originality/value – This paper adds to the growing body of literature in offshore IT outsourcing and makes two significant contributions: identification and categorization of risks due to vendor behavior and their determinants in OSD; and understanding the role of relationship dimension in mitigating such risks in OSD.
Strategic Outsourcing An International Journal – Emerald Publishing
Published: Jun 28, 2011
Keywords: Offshore software development; Risk management; Mitigation; Relationship; Outsourcing; Vendor behavior
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.