The Key Role of Interfaces in IT Outsourcing Relationships
نویسندگان
چکیده
Many IT outsourcing operations fail, and when they do not fail they often impose renegotiations over the life of the contract between outsourcers and service providers. Possible remedies include the improvement of knowledge-sharing processes over organizational boundaries between partners, who may learn more about the problems that occur while looking at possible solutions together. Ensuring the right flow of knowledge in the two directions is central to the success of IT outsourcing operations, particularly in the transition stage of the relationship. However, these solutions do not fully acknowledge the different interrelationships between the main factors affecting knowledge transfer in outsourcing relationships in a dynamic way. In this paper, previous research on modeling knowledge-sharing across boundaries is applied to IT outsourcing contracts during the transition phase of the IT outsourcing relationship. Simulation experiments suggest that four reinforcing processes play key roles in the progress of the outsourcing relationship: trust, outsourcers’ and providers’ knowledge, commitment, and interfacing. DOI: 10.4018/jitsa.2012010103 38 International Journal of Information Technologies and Systems Approach, 5(1), 37-56, January-June 2012 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. interfaces, which have proven to be effective in other knowledge-intensive tasks across professional and organizational boundaries (Black, 2002; Black, Carlile, & Repenning, 2004; Luna-Reyes, Black, Cresswell, & Pardo, 2008). Our model provides dynamic explanations for the success and failure of IT outsourcing operations at the transition stage at the beginning of the relationship between outsourcers and their IT service providers. The paper addresses the following research question: what are the dynamic factors that account for the success or failure of IT outsourcing relationship during the initial transition stage? Simulation experiments suggest that four reinforcing processes play key roles in the progress of the outsourcing relationship: trust, outsourcers’ and providers’ knowledge, commitment, and interfacing. We first present a review of the development of those four processes in the literature and their importance in IT outsourcing relationships. Then we present an integrative systems dynamic base model that combines those dimensions and a series of simulations. We analyze and comment on the model and the simulations in the discussion and present the limitations of this study and future research directions in the conclusion.
منابع مشابه
A New Trust Model for B2C E-Commerce Based on 3D User Interfaces
Lack of trust is one of the key bottle necks in e-commerce development. Nowadays many advanced technologies are trying to address the trust issues in e-commerce. One among them suggests using suitable user interfaces. This paper investigates the functionality and capabilities of 3D graphical user interfaces in regard to trust building in the customers of next generation of B2C e-commerce websit...
متن کاملInvestigating relationships in information technology outsourcing in strategic policy making with an interactive approach (case study: Islamic Azad University)
Objective: This research has been done with the aim of investigating relationships in information technology outsourcing in strategic policy with an interactive approach in Islamic Azad University. Methods:The present research is in terms of the library-field environment, in terms of practical purpose, in terms of the time of cross-sectional data collection, in terms of the descriptive-survey r...
متن کاملA Capability Maturity Model of Information Technology Outsourcing Relationships: a Vendor Perspective
Information technology outsourcing relationships between clients and suppliers are generally embedded into formal contracts. The empirical literature on contracting usually assumes that contractual completeness is difficult to achieve due to the transaction costs of describing—or of even foreseeing—the possible states of nature in advance. Little research has been done on the on-going set of pr...
متن کاملPreparing for utility computing: The role of IT architecture and relationship management
In this paper we examine the likely impact of utility computing on information technology (IT) outsourcing. Drawing on a set of eleven outsourcing cases and on IT outsourcing literature, we identify four risks that lessen the potential benefits of IT outsourcing. We consider two approaches to outsourcing: selectively managing a network of outsourcing partners and managing large-scale exclusive ...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJITSA
دوره 5 شماره
صفحات -
تاریخ انتشار 2012