Research on Capability Assessment of IS Outsourcing Service Providers



Similar documents
A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

Study of the Decision-Making Model of Outsourcing Service Provider Selection

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course

Revisiting the Risks of Software Development Outsourcing Project

Modeling of Knowledge Transfer in logistics Supply Chain Based on System Dynamics

BNM748 STRATEGIC GLOBAL OUTSOURCING AND OFFSHORING

A Review of Risk Management for Information Systems Outsourcing

A Solution for Data Inconsistency in Data Integration *

A Research on Influencing Mechanism of Business Process Outsourcing(BPO) Service Quality

Dimensions for describing and explaining the successful outcome of the IS outsourcing process emphasising the relationship perspective

Improving Software Development Processes with Multicriteria Methods

Research on Semantic Web Service Composition Based on Binary Tree

Information Systems Outsourcing Success: A Review

Study of Lightning Damage Risk Assessment Method for Power Grid

An Improved PROMETHEE Method Applied in Enterprise's Financial Performance Measurement

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain

MULTICRITERIA MAKING DECISION MODEL FOR OUTSOURCING CONTRACTOR SELECTION

New Satisfying Tool for Problem Solving. in Group Decision-Support System

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

The Applications of Business Intelligence to the Improvement of Supply Chain Management A Case of an Electronic Company

Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model

Research on Undergraduate Accounting Education at the Present Stage Based on Questionnaire Survey

SU Qiang Professor

A Multi-attribute Decision Making Approach for Resource Allocation in Software Projects

Identifying & Prioritizing of Electronic Commerce Factors in B2B Relationships using Fuzzy ANP (Case study: Nanotechnology High tech Organizations)

Research on Operation Management under the Environment of Cloud Computing Data Center

EMERGENT CHANGES IN IT OUTSOURCING CLIENT-VENDOR RELATIONSHIPS

Management Information System Proficiencies and Planning

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

UPS battery remote monitoring system in cloud computing

Performance Evaluation System of Enterprise Knowledge Management Based on Balanced Scorecard

Research and Application of Workflow-based Modeling Approval in Dispatching Automation Master System

Proposing an approach for evaluating e-learning by integrating critical success factor and fuzzy AHP

for Oil & Gas Industry

Study of Impact of 3D Printing Technology and Development on Creative Industry

Application Research of CMM in Real Estate Entreprise Management

Study on IOT based Architecture of Logistics Service Supply Chain

Cost-aware Workload Dispatching and Server Provisioning for Distributed Cloud Data Centers

Customer Relationship Management based on Increasing Customer Satisfaction

IT SERVICES OUTSOURCING LIVIU ION CIORA, ION BULIGIU

Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing

Game among Mobile Operators, Bank and the Third-party Payment Services Provider in Mobile Payment Market

2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

Measuring System Performance & User Satisfaction after Implementation of ERP

Development of Virtual Lab System through Application of Fuzzy Analytic Hierarchy Process

RANKING THE CLOUD SERVICES BASED ON QOS PARAMETERS

Patent Big Data Analysis by R Data Language for Technology Management

Numerical Analysis of the Moving Formwork Bracket Stress during Construction of a Curved Continuous Box Girder Bridge with Variable Width

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

Bachelor of Science in Mechanical Engineering (with Distinction) Zhejiang University, Zhejiang, China (One of the top five universities in China)

Research Article Two-Period Inventory Control with Manufacturing and Remanufacturing under Return Compensation Policy

AIS Electronic Library (AISeL) Association for Information Systems. Mark Borman University of Sydney,

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

Managed Hosting: Best Practices to Support Education Strategy in the Career College Sector

INFORMATION SYSTEMS OUTSOURCING: EXPLORATION ON THE IMPACT OF OUTSOURCING SERVICE PROVIDERS SERVICE QUALITY

Learning Concept Hierarchy from YANG for Management of Software-Defined Networking based on Theory of Concept Lattices

Studies of Chinese Intellectual Property:Academic Basis and Development Idea

Strategic Planning for the Textile and Clothing Supply Chain

ASAE s Job Task Analysis Strategic Level Competencies

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP

The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data

The Impact of Management Information Systems of Human Resources on the Training Needs in Al-Balqa Applied University

Services Providers. Ivan Soto

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

Small and Medium-Sized Enterprise Human Resources Management Outsourcing Feasibility Study in China

The Real Estate Enterprise Supply Chain Logistics Model Research

An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption

Evaluation Model of Buyers Dynamic Reputation in E-commerce

Portfolio Management for IS Outsourcing

Competency Requirements for Executive Director Candidates

The Research on Demand Forecasting of Supply Chain Based on ICCELMAN

A firm s competitive strategy starts with its value proposition described by its Value Chain Model Dr. Donald Jess

Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm

Critical Success Factors for ERP System Implementation

Monitoring and Warning System for Information Technology (IT) Outsource Risk in Commercial Banks Based on Nested Theory of Excel Logical Function

A Survey on Bilingual Teaching in Higher Education Institute in the Northeast of China

Simulating Optimum Design of Handling Service Center System Based on WITNESS

Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING

Resource Management Group

Analysis of the Risk in Information Technology (IT) outsourcing In Public Organisations

Crowdsourcing Fraud Detection Algorithm Based on Psychological Behavior Analysis

A Decision-Making Framework for IT Outsourcing using the Analytic Hierarchy Process

COMPARISON OF AHP AND ANP METHODS FOR RESILIENCE MEASUREMENT IN SUPPLY CHAINS. Pavel WICHER, Radim LENORT

The Research of Data Management in the University Human Resource Systems

Evolution of Interests in the Learning Context Data Model

Enterprise Cloud Computing (ECC): Security Model for SMEs Data in The Cloud

Business Continuity / Disaster Recovery Context

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network

Analysis of Appropriate Methods for Assessment of Safety in Aviation

Study on Human Performance Reliability in Green Construction Engineering

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014

An Extended VIKOR Method for Ranking Online Graduate Business Programs

Applications and Analysis of Client Consumer Behavior Based on Big Data

Research of the Combination of Distributed Business Processes Based on Dynamic Planning

Transcription:

, pp.291-298 http://dx.doi.org/10.14257/ijunesst.2015.8.6.28 Research on Capability Assessment of IS Outsourcing Service Providers Xinjun Li and Junyan Wang School of Economic and Management, Yantai University, Yantai 264005, China lixinjun101@163.com Abstract IS outsourcing services have developed into a major and continuously growing IS services business. Although there is a wealth of academic literature examining information systems (IS) outsourcing, there is little academic literature that addresses the current outsourcing problem that most firms facing, which is how to assess IS outsourcing service providers capability. Given multiattribute nature of IS outsourcing service providers capability assessment, this paper argues that thirteen capability criteria should be considered for assessments, and proposes the PROMETHEE as aids in assessing IS outsourcing service providers capability decisions, together with changing weights for a sensitivity analysis. It shows by means of an application that the presented method is very well suited as a tool for the IS outsourcing service providers capability assessment. Keywords: IS outsourcing, Project Management, Outsourcing and IS Development, Evaluation 1. Introduction The continuous need to improve efficiency and effectiveness in organizations is one of the main driving forces for the development of IS outsourcing services (Wang and Yang 2007). Although outsourcing services was hit by the financial crisis, IS outsourcing services as a whole have developed into a major and continuously growing IS services business(whitten, Chakrabarty and Wakefield 2010). The management of IS outsourcing is always to challenge organizations, both IS outsourcing service providers and their clients need to understand what makes IS outsourcing successful (Ang and Straub 2004). Prior research has identified that IS outsourcing service providers capability is one of the key factors, which impact the success of IS outsourcing (Han, Lee and Seo 2008). Although there is a wealth of academic literature examining information systems outsourcing(gonzalez and Llopis 2006; King and Torkzadeh 2008), there is little academic literature that addressed how to assess IS outsourcing service providers capability and presents a clear gap in previous research. In this paper, we focus on the how to assess outsourcing service providers capability. It will apply the PROMETHEE to the how to assess outsourcing service providers capability question in an effort to demonstrate one quantitative method to this complex assessment. 2. Performance Criteria When evaluating IS outsourcing service providers capability, a number of criteria could be considered. There have been a lot of attempts to find out all factors of IS outsourcing service providers capability assessment, but the problem has not been theoretically solved. The choice of factors has been selected in agreement with a group of experts and managers. Another group might have selected a somewhat different set of factors. Firms should select all factors which can affect organizations benefit as possible as they can. A careful examination of factors used before is provided in Table 1 (Feeny, ISSN: 2005-4246 IJUNESST Copyright c 2015 SERSC

Lacity and Willcocks 2005; ITSqc 2010; Liou and Chuang 2010; Levina and Ross 2003; Reza, Thiam, Sai, and Zeinab, 2014; Ye Fang and Zhang 2009). 3. The Adopted Method The PROMETHEE approach. The PROMETHEE method is applicable to the following multi-criteria problem: (1) max{ f ( x), f ( x),, f ( x) x X} 1 2 where X is a finite set of possible alternatives, and n f j are n criteria to be maximized. For each alternative, f ( x) is an evaluation of this alternative. When we compare two x, x X ( i k) i k j alternatives we must acquire the solvers of these comparisons based on preference. We, therefore, resolve a preference function P. Let (2) P( x, x ) F( d) F[ f ( x ) f ( x )], i k i k 0 P( x, x ) 1 i k Table 1.Capability Criteria (3) Business (C1) Criteria understanding Explanation Meeting both client service-level agreements and its own business plan, discussions about service returns. Knowledge (C2) management Demonstrating a commitment to knowledge sharing through formal policies, effectively managing the use of process assets across the organization, taking advantage of expert practices. Human resources (C3) Performance management (C4) Relationship (C5) Technology (C6) management management Security management (C7) Establishing and maintaining an effective work environment, building competences, managing employee satisfaction, motivation, and retention. Establishing organization-wide programs to meet its objective, measuring the organization s capabilities and benchmarking its performance as the basis for improvements Establishing and maintaining trust and ensuring the effectiveness of interactions with clients and partner relationships, managing the cultural differences between stakeholder, and managing the client s and end-users satisfaction. Managing the acquisition and deployment of technology, integrating the organization s technology infrastructure, optimizing the performance of the technology infrastructure. Risk management through formal policies, managing intellectual property threats, identifying, assessing, and controlling risk, preparing for and managing recovery from disasters 292 Copyright c 2015 SERSC

Service delivery (C8) Marketing (C9) exploitation Planning & contracting (C10) Language (C11) Service transfer (C12) Enhancing value (C13) Tracking service delivery activities, delivering services according to agree-upon commitments, identifying problems that impact service delivery and taking both preventive and corrective actions Building well-known brand, brand s competition Planning and tracking organization s activities, developing a clearly service specification, obtaining and using feedback, managing service design and deployment Speaking, writing, understanding, communicating Managing the effective transfer of resources, ensuring continuity of service during the service transfer Continuously innovate to add statistically and practically significant value to the services they provide to their client s and other stakeholders Be the preference function associated to the criteria, where Fd ( ) is a monotonically increasing function of the observed deviation ( ) between and. In order to facilitate the selection of specific preference function, six basic types of this preference function are proposed to decision maker, in each case no more than two parameters (thresholds q, ) have to be fixed (Lo and Chen 2012). PROMETHEE permits the computation of the following quantities for alternatives x i and : p or s x k w P ( x, x ) j1 j j i k ( xi, xk), n j1 ( xi ) ( xi, xk ), xk X ( xi ) ( xk, xi ), xk X n w j d f( x i ) f( x k ) (4) ( x ) ( x ) ( x ). i i i w j are weights associated with criteria. All the alternatives can be completely Where ranked (PROMETHEEII) by net flow (Figueira, Greco and Ehrgott 2005). The geometrical analysis for interactive aid (GAIA) plane displays graphically the relative position of the alternatives in terms of contributions to the various criteria (Brans and Vincke 1985). In the next section a real, but simplified, IS outsourcing service providers capability assessment problem is presented to illustrate our approach in practice. 4. An Application 4.1the Problem Faced A Chinese manufacturer want to outsource its information systems functions to outside expert, five candidates (Vendor 1, Vendor 2, Vendor 3, Vendor 4, and Vendor 5) can Copyright c 2015 SERSC 293

meet its need. They think about the factors of vendor s capabilities and want to know how to decide which service provider should be selected. 4.2 Criteria Weights The personal construct theory (PCT) was used for the weight definition, as shown in Figure 1(for detailed presentations please see (Goletsis, Psarras and Samouilidis)). 4.3 The Problem Faced-Evaluation and Analysis The evaluations of these 5 alternatives according to the previously stated criteria, i.e. evaluation matrix, are displayed in Table 2. Each semantic value included in the set {very weak, weak, common, good, very good} is associated with a numerical value, such as ranking from 1 to 5, which is used for the calculations. Before using the PROMETHEE method to assess the candidate IS outsourcing service providers, for each criterion, a specific Preference Function (PF), with its thresholds is defined (see Table 3). The problem was completely prepared for implementation of PROMETHEE II, performing the comparison with the weights gotten by the PCT method leads to the final values of leaving, entering and net flows and the complete ranking of alternatives in Table 4 and in Figure 2. The priority for the five IS outsourcing service providers are in the following order: Vendor4, Vendor1, Vendor 2, Vendor5, and Vendor 3. The assessment problem can be represented in the GAIA plane (see Figure. 3, where candidate vendors are represented by points and criteria by vectors). Figure 1. Criteria Weights Definition with the Use Personal Construct Theory 294 Copyright c 2015 SERSC

Table 2. Evaluation Matrix Table 3. Preference Functions Thresholds Thresholds Criteria PF Criteria PF q p s q p s C1 Linear 1 2 - C8 Level 1 2 - C2 Level 1 2 - C9 Level 1 2 - C3 Level 1 2 - C10 Level 1 2 - C4 U-shape 2 - - C11 Level 1 2 - C5 Level 1 2 - C12 Level 1 2 - C6 U-shape 2 - - C13 U-shape 2 - - C7 Linear 1 2 - Table 4. PROMETHEE Flows Alternative Vendor1 0.31 0.04 0.27 Vendor2 0.18 0.31-0.13 Vendor3 0.05 0.37-0.32 Vendor4 0.34 0.03 0.31 Vendor5 0.10 0.23-0.13 Copyright c 2015 SERSC 295

Figure 2. PROMETHEEII Complete Ranking 4.4 The Problem Faced-Sensitivity Analysis When the weights of the criteria are modified, we have to analyze the impact on the results by a sensitivity analysis. Table 5 gives for each criterion the limits within weights values which can vary without changing the PROMETHEE II complete ranking. From the result of sensitivity analysis, it is clear that C7, C5, C4 and C11 have the greatest impact on the complete ranking. Figure 3. Gaia Analysis Table 5. Stability Intervals Interval Interval Criteria Weight Criteria Weight Min Max Min Max C1 0.125 0.0000 1.0000 C8 0.063 0.0622 0.4670 C2 0.094 0.0936 0.3146 C9 0.125 0.1215 0.7926 C3 0.125 0.0249 0.6646 C10 0.063 0.0000 0.4670 C4 0.063 0.0000 0.1300 C11 0.031 0.0291 0.1603 C5 0.125 0.0000 0.1253 C12 0.015 0.0000 0.2442 C6 0.047 0.0000 1.0000 C7 0.109 0.0000 0.1108 C13 0.015 0.0130 1.0000 296 Copyright c 2015 SERSC

5. Conclusions This research described herein presents a proposal for applying a decision model to support the IS outsourcing service providers capability assessment, this model uses one multiple criteria decision aid techniques (PROMETHEE), with more dimensions and a sensitivity analysis approach. We have tried to explain how the PROMETHEE method provides powerful tools to assess IS outsourcing service providers capability and to analyze the relations between criteria. The proposed assessment model can help practitioners choose and analyze factors and attributes easily. Because it is a quantitative process, the practitioners can make better decisions and obtain better results from IS outsourcing service providers capability assessment. Acknowledgements This work is supported by the National Social Science Fund of China under Grant No. 12CGL042, the National Natural Science Fund of China under Grant No. 71372122, 71402158 and 71272122. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation. References [1] C. K. Ang, D. W Straub, IT outsourcing success: a psychological contract perspective, Information Systems Research, vol. 15, no. 4, (2004), pp. 356-373. [2] J. P. Brans and P. H. Vincke, A preference ranking organization method, Management Science, vol. 31, no. 6, (1985), pp. 647-656. [3] D. Feeny, M. Lacity and L. Willcocks, Taking the measure of outsourcing providers, MIT Sloan Management Review, vol. 46, no. 3, (2005), pp. 41-48. [4] J. Figueira, S. Greco and M. Ehrgott, Multiple criteria decision analysis: state of the art surveys, New York: Springer, (2005). [5] Y. Goletsis, J. Psarras and J. E. Samouilidis, Preject ranking in the armenian energy sector using a multicriteria method for groups, Annals of Operations Research, vol. 120, no. 4, (2003), pp. 135-157. [6] R. Gonzalez and J. G. Llopis, Information systems outsourcing: A literature analysis, Information & Management vol. 43, no. 7, (2006), pp. 821-834. [7] H. S. Han, J. N. Lee and Y. W. Seo, Analyzing the impact of a firm s capability on outsourcing success: A process perspective, Information & Management vol. 45, no. 1, (2008), pp.31-42. [8] ITSqc (IT Services Qualification Center), The esourcing capability model for service providers, (2014), (http://www.itsqc.org/models/escm-sp/index.html). [9] R. Reza, K. C. Thiam, P. L. Sai and S. A. Zeinab, A semantic interoperability framework for software as a service systems in cloud computing environments, Expert Systems with Applications, vol. 41, no. 13, (2014), pp. 5751-5770. [10] N. Levina and J. Ross, From the vendor s perspective: exploring the value proposition in information technology outsourcing, MIS Quarterly, vol. 27, no. 3, (2003), pp. 331-364. [11] J. J. H. Liou and Y. T. Chuang, Developing a hybrid multi-criteria model for selection of outsourcing providers, Expert Systems with Applications, vol. 37, no. 5, (2010), pp. 3755-3761. [12] W. R. King and G. Torkzadeh, Information systems offshoring: Research status and issues, MIS Quarterly, vol. 32, no. 2, (2008), pp. 205-225. [13] J. J. Wang and D. L. Yang, Using a hybrid multicriterial decision aid method for information systems outsourcing, Computers & Operations Research, vol. 34, no. 12, (2007), pp. 3691-3700. [14] C. Lo and W. Chen, A hybrid information security risk assessment procedure considering interdependences between controls, Expert Systems with Applications, vol. 39, no. 1, (2012), pp. 247-257. [15] D. Whitten, S. Chakrabarty and R. Wakefield, The strategic choice to continue outsourcing, switch vendors, or backsource: Do switching costs matter?, Information & Management, vol. 47, no. 3, (2010), pp. 167-175. [16] J. W. Ye, B. X. Fang and Y. Z. Zhang, A quantitative method for evaluation the security threats of grid system to tasks, International Journal of Innovative Computing, Information and Control, vol. 5, no. 4, (2009), pp. 1125-1136. Copyright c 2015 SERSC 297

Authors Xinjun Li, he is an associate professor in the school of economics and management at Yantai University, China. He received MS in management science and engineering from Tianjin University (2004) and PhD in operations management from Southeast University (2007). He is a postdoctoral fellow twice at Shanghai Jiaotong University and Dalian University of Technology respectively. His current research interests mainly focus on supply chain management and information management. His research is published in leading scientific journals such as Asia-Pacific Journal of Operational Research, Operations Research and Management Science, Journal of Industrial Engineering and Engineering Management, Control and Decision and Journal of Mechanical Engineering. Junyan Wang, she is a master from the school of economics and management at Yantai University. She received her bachelor s degree in Shandong University of Finance and Economics in 2014. His research direction is business management and supply chain management. 298 Copyright c 2015 SERSC