A Proposal Framework for Evaluating Risks of Information Technology Outsourcing



Similar documents
IT OUTSOURCING PROJECT RISKS: FROM CLIENT AND VENDOR PERSPECTIVES

Risks and Audit Objectives for IT Outsourcing

A Decision-Making Framework for IT Outsourcing using the Analytic Hierarchy Process

Identifying & Prioritizing of Electronic Commerce Factors in B2B Relationships using Fuzzy ANP (Case study: Nanotechnology High tech Organizations)

A Review of Risk Management for Information Systems Outsourcing

Information Systems Outsourcing Success: A Review

Evaluating Simulation Software Alternatives through ANP

IDENTIFYING AND PRIORITIZING THE FINANCING METHODS (A HYBRID APPROACH DELPHI - ANP )

A REVIEW AND CRITIQUE OF HYBRID MADM METHODS APPLICATION IN REAL BUSINESS

Supplier Selection through Analytical Hierarchy Process: A Case Study In Small Scale Manufacturing Organization

ERP SYSTEM SELECTION BY AHP METHOD: CASE STUDY FROM TURKEY

A Recommendation Framework Based on the Analytic Network Process and its Application in the Semantic Technology Domain

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service

A Multi-Criteria Decision-making Model for an IaaS Provider Selection

Proceedings of the 41st International Conference on Computers & Industrial Engineering

Proceedings of the 41st International Conference on Computers & Industrial Engineering

The Key Successful Factors of Customer Service Experience

BNM748 STRATEGIC GLOBAL OUTSOURCING AND OFFSHORING

6 Analytic Hierarchy Process (AHP)

Influence of Tactical Factors on ERP Projects Success

COMBINING MODIFIED DIAMOND MODEL AND SYSTEM IMPLEMENTATION STAGE TO EXPLORE THE ERP AND MES SYSTEM INTEGRATION CRITICAL FACTORS

EFFECTS OF HUMAN FACTOR ON THE SUCCESS OF INFORMATION TECHNOLOGY OUTSOURCING

Aircraft Selection Using Analytic Network Process: A Case for Turkish Airlines

While much research has focused on information technology (IT) outsourcing,

SHORT VERSION, NO EXAMPLE AND APPENDIX 1. (MC 2 ) 2 : A Generic Decision-Making Framework and its Application to Cloud Computing

Knowledge-Based Sustainable Decision-making Framework for the Implementation of Innovative Technologies in the Malaysian Construction Industry

ERP SYSTEM SELECTION MODEL FOR LOW COST NGN PHONE COMPANY

Proposing an approach for evaluating e-learning by integrating critical success factor and fuzzy AHP

DYNAMIC PROJECT PORTFOLIO MANAGEMENT USING ANP

IMPROVING THE CRM SYSTEM IN HEALTHCARE ORGANIZATION

Vendor Evaluation and Rating Using Analytical Hierarchy Process

An Evaluation of Strategic Networking Equipments Using. AHP(Analytic Hierarchy Process)

Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process

Study of the Decision-Making Model of Outsourcing Service Provider Selection

Identification and Prioritization of Knowledge Flow Barriers Based on Organizational Knowledge Management Cycle (OKMC)

Editorial: some measurement methods are applied to business performance management

Abstract No : Impact Of ERP Implementation Process On Decreasing Risk In Supply Chain. Hossein Rikhtehgar Berenji

Crosswalk Between Current and New PMP Task Classifications

Risk management in enterprise resource planning implementation: a new risk assessment framework

The Extent of ERP Customization towards User Satisfaction in Daily Operation for Manufacturing Companies

How To Understand International Technology Transfer

Applied Soft Computing

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances

Interdisciplinary Management Research V. HOW DIFFERS OUTSOURCING OF CORE AND SUPPORTIVE ACTIVITIES IN SLOVENIAN SMEs

Analytical hierarchy process for evaluation of general purpose lifters in the date palm service industry

Analysis of IT Multisourcing Practice in a Telecommunication Company

A comprehensive framework for selecting an ERP system

IMPROVING PERFORMANCE OF SME S USING SUPPLY CHAIN FRAMEWORK AND MULTI-CRITERIA DECISION METHODOLOGY

Knowledge Management and Measuring its impact on Organisational Performance

Decision-making with the AHP: Why is the principal eigenvector necessary

Identifying Requirements of Agricultural Mobile Marketing from Experts Perception

DETERMINING CONSUMER S CHOICE AMONG VARIOUS INSURANCE POLICIES: AN ANALYTICAL HIERARCHICAL PROCESS APPROACH

Management Science Letters

Dimensions for describing and explaining the successful outcome of the IS outsourcing process emphasising the relationship perspective

Application of Fuzzy Analytic Hierarchy Process in Ranking Modern Educational Systems Success Criteria

INFORMATIONMANAGEMENTAND DECISION-MAKINGTHROUGH ERP SYSTEMS

Intelligent Analysis Model for Outsourced Software Project Risk Using Constraint-based Bayesian Network

Using Data Mining Techniques to Increase Efficiency of Customer Relationship Management Process

Comparative Analysis of FAHP and FTOPSIS Method for Evaluation of Different Domains

IMPROVING SUPPLY CHAIN ACTIVITIES BY ADVANCING AND TEACHING AHP APPLICATIONS

The 5 Questions You Need to Ask Before Selecting a Business Intelligence Vendor. Share With Us!

24 th Australasian Conference on Information Systems, 4-6 December 2013, Melbourne. Proudly sponsored by

ERP SELECTION USING EXPERT CHOICE SOFTWARE

Companies using the balanced scorecard have

CONSIDERING CRITICAL FACTORS OF SUCCESS AT IMPLEMENTING CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM AND RANKING THEM

ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi

Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model

Performance Management Systems: Conceptual Modeling

Spend Analysis: The Nexus of Spend Management. November 2011 Constantine G. Limberakis

Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process

A Combined Method for Evaluating Criteria when Selecting ERP Systems

Investigating the effective factors on Customer Relationship Management capability in central department of Refah Chain Stores

APPLICATION OF AHP METHOD FOR THE SELECTION OF BUSINESS PLAN SOFTWARE

Desingning interactive modelof Key success factors of customer relationship management using structural-interpretive modeling

REVIEW OF BARRIERS TO THE DEVELOPMENT OF E-INSURANCE USING AHP METHOD )CASE STUDY: IRAN INSURANCE(

BiSL Glossary. 5 February 2014

Cloud Computing ABSTRACT PEER-REVIEWED. Simon Krogh Copenhagen Business School. A Social Relations Perspective

Critical Success Factors of the Offshore Outsourcing of Software Development Projects: A System Dynamics Approach. Abstract

Abstract. ijcrb.webs.com INTERDISCIPLINARY JOURNAL OF CONTEMPORARY RESEARCH IN BUSINESS DECEMBER 2012 VOL 4, NO 8

Sourcing Lifecycle Analysis

Report on SELECTING THE BEST PROJECT DELIVERY METHOD USING THE ANALYTICAL HIERARCHY PROCESS (AHP)

Summary Ph.D. thesis Fredo Schotanus Horizontal cooperative purchasing

DEVELOPING CREDIT RATING INDICATORS OF CUSTOMERS FOR ELECTRONIC COMPANIES

CONCEPTUAL FRAMEWORK OF CRM PROCESS IN BANKING SYSTEM

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course

FUZZY COMPREHENSIVE EVALUATION METHOD FOR THE EVALUATION OF HUMAN CAPITAL IN UNIVERSITY SYSTEM: A CASE STUDY

Central Bank of Ireland Guidelines on Preparing for Solvency II Pre-application for Internal Models

Available online at ScienceDirect. Procedia CIRP 17 (2014 ) Madani Alomar*, Zbigniew J. Pasek

Improving IT Outsourcing Value Creation With Emphasizing On Service Oriented Approach.

Contractor selection using the analytic network process

IMPACT OF SUPPLY CHAIN MANAGEMENT STRATEGIES ON COMPETITIVE ADVANTAGE IN MANUFACTURING COMPANIES OF KHUZESTAN PROVINCE

SUPPLY CHAIN MANAGEMENT AND A STUDY ON SUPPLIER SELECTION in TURKEY

IT SERVICES OUTSOURCING LIVIU ION CIORA, ION BULIGIU

EIOPACP 13/011. Guidelines on PreApplication of Internal Models

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Software Resource Management Considering the Interrelation between Explicit Cost, Energy Consumption, and Implicit Cost

Strategic Planning for the Textile and Clothing Supply Chain

Degree of Uncontrollable External Factors Impacting to NPD

ASSESSMENT OF CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM OF RED CRESCENT IN TEXTILE COMPANY USING AHP APPROACH

Transcription:

Proceedings of the 2011 International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, January 22 24, 2011 A Proposal Framework for Evaluating Risks of Information Technology Outsourcing A. Keramati Department of Industrial Engineering, College of Engineering, University of Tehran, P.O. Box 11365 4563, Tehran, Iran; E- mail: keramati@ut.ac.ir. H. Samadi Department of Industrial Engineering, Islamic Azad University, South Tehran Branch, Tehran, Iran. S. Nazari-Shirkouhi Department of Industrial Engineering, College of Engineering, University of Tehran, Tehran, Iran. Abstract Information Technology Outsourcing (ITO) operations have important potential benefits including cost reduction, improved quality of service, and access to technological expertise. ITO has been recognized to have important potential benefit but ITO has some risks that it sometimes leads to undesirable consequence. This paper reviews research studies of ITO risks and proposes a framework for evaluating and prioritizing of them. Risk factors are studied domestically from the perspective of client. Keywords Information technology outsourcing, Risk, Domestic outsourcing, Client perspective 1. Introduction In today s business environment, Information Technology (IT) is considered to be a key source of competitive advantage [1]. Organizations are making large investments in IT and there is growing realization that IT investments can be a significant source of competitive advantage [2]. As spending on IT raises steeply, organizations become increasingly technology-dependent and, consequently, they become highly vulnerable to the risks of IT failure. Therefore, IT risk is one of the important issues facing information s (IS) executives today [3]. Especially in the area of IT, where projects have a long history of failing, there is a great deal of interest in the effects of risk [4]. Outsourcing IT operations is a topic that has gained popularity since Kodak first announced a major outsourcing agreement in 1989 [5]. He turned over its entire data center, network and microcomputer operation to three IS external parties [6]. Outsourcing information technology operations has been recognized to have important potential benefits, including cost reduction, improved quality of service, and access to technological expertise. Indeed, while firms enter outsourcing agreements with the objective of cutting costs and improving the level of service rendered to users, the outcome of such contracts may be just the opposite. Researchers and practitioners also recognize that, in some circumstances, ITO entails risk, and that it sometimes leads to undesirable consequences that are the opposite of the expected benefits [5]. The main purpose of this study was to investigate information technology outsourcing risk factors with considering the literature review of it and propose a framework for evaluation and prioritizing of these risks with ANP model. This study analyses domestic IT outsourcing risks from the perspective of client. 2. Literature Review Aundhe and Mathew s [7] research revealed that there are three broad categories of risks: project specific, relationship specific, and macroeconomic. A case based approach using the principles of grounded theory was used for studying the risks and considered interaction among the categories. Chou and Chou [8] identified an information s outsourcing life cycle through three project related periods: pre-contract phase, contract phase, and post- 139

contract phase. Also, various risk factors associated with each phase of the information outsourcing practice have been identified and examined. Willcocks et al. [9] categorized these risks: contextual, building to contract and post-contract issues. A contribution of the paper was proposed a framework for analyzing the risk and then presented a case study. Bhattacharya et al. [10] categorized these risks: risk exposure of supplier capabilities and risk exposure of company capabilities. Akomode et al. [11] categorized these risks: performance, technical expertise, commitment, adequate time-to-volume, quality and adequate forecasting of total cost. They discussed IT outsourcing in detail and proposed a customized computer-orientated model based on action research and analytical hierarchy process. Currie [12] categorized these risks: delivery and enablement; integration; and operations; business transformation; and client/vendor relationships and attempts to make knowledge explicit, whilst also recognizing the tacit aspects of evaluating consortium, project-based outsourcing. Insights from transaction costs theory, Bahli and Rivard [5] suggested that there are three major sources of risk factors for IT outsourcing: the transaction, the client and the supplier.they applied Partial Least Squares (PLS) to assess their reliability and validity of these risk factors. In the other papers, in spite of paying attention to identify the lists of information technology outsourcing risks, they have not categorized them [6, 13-15]. 3. Methodology To extract risk factors of ITO risks, the methodology proposed by Aloini et al. [16] is used. They reviewed and analyzed 75 key articles about ERP implementation and extracted risk factors. Furthermore, they analyze the impact of each risk on ERP projects success and classified them in order to address each risk factor and its relevance during different stages of ERP project lifecycle. In this research, we have adopted the same methodology and reviewed 11 key papers published in 1998 2009 about ITO risks. In order to this, we searched for papers that have been published as full papers. Based on methodology was proposed by Aloini et al. [16] into the following five dimensions: 1 Research type: considering this dimension, the papers can be categorized into three general classes: Empirical al/theoretical 2 Research aim and : based on the aims of the research, they can be classified into three classes: System selection System implementation Risk Considering the of research as a classification scheme, the research are organized in three categories: Multiple s Business Size specific Small and medium enterprises (S-SMEs) Large corporate-enterprises (S-LC). 3 Research content: describes briefly the process and the research results. 4 Proposed risk factors: describes the extracted risk factors of each work in general. 5 Research tool: describes the research tool used in each study. Beside for validating the factors of ITO risks from its literature and suitable categorizing of it, we tried to evaluate the structure and extracted risk factors and its functionality from the point of three experts. 4. Propose Framework The results of categorizing act over key papers of ITO risks which have been published between the years 1998 to 2009 can be seen in Table 1. After extracting the ITO risks from the literature by using methodology Aloini et al. [16], the details of these papers have been reviewed from the point of any risk, used methods and its categorizing. These papers have been selected from among researches which have been mentioned by Bahli and Rivard [5] for general categorizing of risks and details of them. This study analyses domestic IT outsourcing risks from the client point of view. Also, other risks that have been described in pointed papers were evaluated and the common risks have been derived and placed in our categorized model. So, if there is any risk that not considered can be described. These three risks as following: 1) Inadequate user involvement 2) Breach of contract by the vendor 3) Vendor viability 140

NO. 1 2 3 4 5 6 Reference Willcocks et al. [9] Chou and Chou [8] Adeleye et al. [6] Bahli and Rivard [5] Akomode et al. [11] Nakatsu, and Lacovou [13] Table 1: The result of categorizing act over key articles of ITO risks which have been published between the years 1998 to 2009 Research Aim/Sector Research content Proposed risk factors Research tools type al/ theoretica l Empirical Empirical Empirical selection size specific / implementati on /multiple implementati on size specific / Risk /size specific Risk /multiple Risk /multiple The paper proposed a framework for analyzing IT outsourcing risk, whether risk mitigation tactics were successful or otherwise, and the reasons for those outcomes and then present a case study. Risk factors are studied from the perspective of client. Various risk factors that associated with each phase of the information outsourcing practice have been identified and examined. ISO quality standards and risk standards are also discussed in this paper. This research work focuses on the risk practices adopted by Commercial Banks in Nigeria that are related to the outsourcing of information s (IS). Risk factors study domestically from the perspective of client. The main purpose of this study was to validate measures of the risk factors associated with outsourcing IT operations. Risk factors study domestically from the perspective of client. The paper discusses IT outsourcing and proposes a customized computerorientated model based on AR and AHP. Risk factors are studied domestically from the perspective of client. This paper has investigated the risk factors of outsourced software development. First objective was to create ly Contextual/ building to contract / post-contract issues pre-contract phase/ contract phase/ post-contract phase Benefit/time/resource the transaction/ the client/the supplier Performance/ technical expertise/ commitment/ adequate time-to-volume/ quality / adequate forecasting of total-cost Risks that appeared in both domestic and offshore contexts/ Risks that appeared in both but A questionnaire was issued to the 22 respondents, after which the short list was reduced to six. The main method of data collection was a questionnaire sent to 15 commercial banks, which was aimed at respondents in three distinct categories: executive, s managers and users data from a survey of 132 IT executives were analyzed with partial least squares to assess their reliability and validity Delphi technique was used for identifying risks by experts 141

NO. 7 8 9 Reference Lacity et al. [15] Osei-Bryson and Ngwenyama [14] Bhattachary a et al. [10] 10 Currie [12] 11 Aundhe and Mathew [7] Research type al/ theoretica l al/ theoretica l Aim/Sector Research content Proposed risk factors Research tools selection / multiple implementati on/ multiple risk /size specific selection /small and medium enterprises (S-SMEs) selection / size specific generated lists of risk factors for both domestically and offshore outsourced projects from the perspective of client. This paper provides substantial evidence that researchers have meaningfully and significantly addressed the call for academics to produce knowledge relevant to practitioners..risks study from the perspective of client. This paper offers a method and some mathematical models for analyzing risks and constructing incentive contracts for IS outsourcing This study analyses domestic ITO risks from the point of client/supplier. This paper approaches IS outsourcing by explicitly integrating issues related to business process outsourcing. Risks study from the perspective of client/supplier. The overall aim of the research study is to develop a risk assessment framework for evaluating the deployment, hosting and integration of web-enabled software applications by ASPs.. Risks study from the point of client/supplier This study analysis offshore IT outsourcing risks from the perspective of service providers. were exacerbated in the offshore context/ Risks that were unique to the offshore context contract/ client/supplier Shirking/opportunistic bargaining risk exposure of supplier capabilities / risk exposure of company capabilities delivery and enablement/ integration/ and operations/ business transformation/ client/vendor relationships project specific/ relationship specific/ and macroeconomic This method use in American corporation data was collected from various sources including practitioner conferences and semi-structured questionnaire that 15 firms were interviewed the research process by interviewing 6 senior managers of an organization Since their goal was to understand. in 2006 they conducted 15 interviews with 5 mid-sized offshore party. 142

Which the first and third risk matter have been derived from the paper of Nakatsu and Lacovou [13] and the second one derived from Lacity et al. [15] (These risk have not been mention in our selected article) and categorize in our model of these risks. For being certain from the validity of derived structure, three experts were used. These experts have ten years of good experience in ITO field. After specifying of derived the structure, details of risks and paying attention to the concept of each one, dependency or independency of them have been evaluated and then consulted with three experts. Many decisionmaking problems cannot be structured hierarchically because they involve interaction of various factors, with highlevel factors occasionally depending on low-level factor. Structuring a problem with functional dependencies that allows for feedback among clusters is considered to be a network. Saaty [17] suggested the use of AHP to solve the problem of independence among alternatives or criteria, and the use of ANP to solve the problem of dependence among alternatives or criteria. With due attention to consult with these three experts and concept of risks, we propose a structure for analyzing ITO risks with ANP model. (See Figure 1) Uncertainty Relatedness Transaction Small number of suppliers Measurement problems Asset specificity Do not expertise with outsourcing Client Do not expertise with the IT operation Inadequate user involvement Do not expertise with outsourcing Supplier Do not expertise with the IT operation Breach of contract by the vendor Vendor viability Figure 1: A framework for analyzing ITO risks with ANP model 5. Conclusions In this paper, general categorization of the ITO risks has been done according to Bahli and Rivard s research [5]. The advantage of using this method is as the following these three points: The main purpose of this paper is validating measure of ITO risks, as result shows that the outcome of these factors are validate. the main purpose of outsourcing is decreasing the cost,so transaction cost theory have been used for introducing and categorizing ITO risks in this article.we have to point out that the main reason for selection of this theory is adoption of the assumption to the real condition. The risks of this paper include the majority risks of other papers. 143

In addition to the mentioned reasons, also three experts were consulted and the structure of risks and the details of each risk have been confirmed by them. By considering the situation of relation between the risks, ANP model is proposed for evaluating and prioritizing of them. Now, we are gathering the information for priority of these risks by the method of ANP and we can evaluate ITO risks based on experts judgments as a future work. References 1. Chen T., Zhang J., Lai K.K., 2009, An integrated real options evaluating model for information technology projects under multiple risks, International Journal of Project Management, 27(11) 776 786. 2. Kumar R.L., 2002, Managing risks in IT projects: an options perspective, Information & Management, 40(12) 63 74. 3. Bandyopadhyay K., Mykytyn P.P., Mykytyn K., 1999, A framework for integrated risk in information technology, Management Decision, 37/5(8) 437-444. 4. Bakker K. de, Boonstra A., Wortmann H., 2010, Does risk contribute to IT project success? A meta-analysis of evidence, International Journal of Project Management, 28(5), 493-503. 5. Bahli B., Rivard R., 2005, Validating measures of information technology outsourcing risk factors, Omega, 33 (13) 175 187. 6. Adeleye B.C., Annansingh F., Nunes M.B., 2004, Risk practices in IS outsourcing:an investigation into commercial banks in Nigeria, International Journal of Information Management, 24 (14) 167 180. 7. Aundhe M.D., Mathew S.K., 2009, Risks in offshore IT outsourcing: A service provider perspective, European Management Journal, 27 (11), 418 428. 8. Chou D.C., Chou A.Y., 2009, Information s outsourcing life cycle and risks analysis, Computer Standards & Interfaces, 31 (8) 1036 1043. 9. Willcocks L.P., Lacity M.C., Kern T., 1999, Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA, Journal of Strategic Information Systems, 8 (30) 285 314. 10. Bhattacharya S., Behara R.S., Gundersen D.E., 2003, Business risk perspectives on information s outsourcing, Information Systems, 4 (19) 75 93. 11. Akomode O. J., Lees B., Irgens C., 1998, Constructing customised models and providing information to support IT outsourcing decisions, Logistics Information Management, Volume 11 Number 2 1998 pp. 114 127. 12. Currie W.L., 2003, A knowledge-based risk assessment framework for evaluating web-enabled application outsourcing projects, International Journal of Project Management, 21 (11) 207 217. 13. Nakatsu R.T., Iacovou C.L., 2009, A comparative study of important risk factors involved in offshore and domestic outsourcing of software development projects: A two-panel Delphi study, Information & Management 46 (12) 57 68. 14. Osei-Bryson K.M., Ngwenyama O.K., 2006, Managing risks in information s outsourcing: An approach to analyzing outsourcing risks and structuring incentive contracts, European Journal of Operational Research, 174 (20) 245 264. 15. Lacity M.C., Khan S.A., Willcocks L.P., 2009, A review of the IT outsourcing literature: Insights for practice, Journal of Strategic Information Systems, 18 (17) 130 146. 16. Aloini, D., Dulmin, R., Mininno, V., 2007, Risk in ERP project introduction: review of the literature, Information and Management, 44(6) 547 567. 17. Saaty, T.L., 1996. Decision making with dependence and feedback: the analytic network process, RWS Publications, Pittsburgh, Pa. 144