Information Systems Development Outsourcing: The Role of Control Configurations
نویسندگان
چکیده
The Control theory provides a useful theoretical foundation for examining the coordination between the client and the vendor in information systems development outsourcing (ISD-outsourcing). Recent research has identified two control mechanisms: structural (structure of the control mode) and process (the process through which the control mode is enacted). Yet, control theory research to-date does not describe the ways in which the two control mechanisms can be combined to ensure project success. Grounded in case study data from eight ISD-outsourcing projects, we delineate three ‘control configurations’; i) aligned, ii) negotiated, and iii) self-managed, which describe the combinative patterns of structural and process control mechanisms within and across different control modes.
منابع مشابه
Analyzing the Impact of Interaction Processes on the Relationship Between Firm ’s Capabilities and Outsourcing Success of Information Technology ( case study: higher education centers of Isfahan)
Nowadays, firm have realized the importance of information technology as an essential tool for the success of business. Accessing the applicability of information technology might be the main expectation of the firm for outsourcing. By outsourcing, firms can have access to advanced technologies and use external sources for their goal. The aim of this study is to analyze the impact of interactio...
متن کاملOutsourcing Evaluation of Operational Supervision of Participation Facility in Maskan Bank and Investigation of Possible Practices Using AHP Method
This article aims to find out the best outsourcing practice for operational supervision process of participation facility in Maskan Bank. In the preliminary study, it was found that the bank has not achieved the expected outsourcing benefits and has seriously risked losing control over the supervision process and overdependence on the supplier. As a part of this study, the Bank objectivrs of ou...
متن کاملAnalyzing the Impact of Interaction Processes on the Relationship Between Firm ’s Capabilities and Outsourcing Success of Information Technology ( case study: higher education centers of Isfahan)
Nowadays, firm have realized the importance of information technology as an essential tool for the success of business. Accessing the applicability of information technology might be the main expectation of the firm for outsourcing. By outsourcing, firms can have access to advanced technologies and use external sources for their goal. The aim of this study is to analyze the impact of interactio...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملInvestigating relationships in information technology outsourcing in strategic policy making with an interactive approach (case study: Islamic Azad University)
Objective: This research has been done with the aim of investigating relationships in information technology outsourcing in strategic policy with an interactive approach in Islamic Azad University. Methods:The present research is in terms of the library-field environment, in terms of practical purpose, in terms of the time of cross-sectional data collection, in terms of the descriptive-survey r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013