Business Case Development Risks in On and Offshore IT Outsourcing: Unpacking the Theories

Business Case Development Risks in On and Offshore IT Outsourcing: Unpacking the Theories

Anne C. Rouse (Deakin University, Australia)
DOI: 10.4018/978-1-60960-768-5.ch008
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Outsourcing of IT-supported business processes (systems development; customer relationship management; helpdesk, etc.) has become increasingly common in Western economies since the late 1990s. Such outsourcing is totally dependent on the provision of inter-organizational information systems (IOSs), which act as the “glue” to link vendor(s) and client(s). Hence understanding the importance of IOSs, and conversely, the downsides or risks they embody, is a critical part of ensuring that outsourcing arrangements are successful. In this chapter the theory behind outsourcing is unpacked, and readers are alerted to sometimes-overlooked aspects of the IOSs on which outsourcing depends. These raise the risks, and reduce the benefits, of outsourcing if they are not well thought through. Decision makers are advised to explicitly include the notion of risk in their outsourcing business cases, including those risks associated with the IOSs that support outsourcing arrangements.
Chapter Preview
Top

Introduction

An important business phenomenon of the last two decades has been the rapid growth of outsourcing. This is particularly so for complex, IT-supported business processes like systems development; IT service delivery; customer relationship management; helpdesk, etc. Such outsourcing has become increasingly common in western economies since the late 1990s. This outsourcing is also proving to be an important source of income for developing countries such as India, China, the Philippines and the former Soviet Republic, which are able to provide services from “offshore.”

This chapter will illustrate that inter-organizational systems (IOSs) are the glue which holds together these types of outsourcing arrangements. It will then argue that, given this, understanding the importance, and conversely, the downsides or risks that IOSs embody, is a critical part of ensuring that outsourcing arrangements are successful.

The chapter also identifies deficiencies in the business cases typically developed by purchasing firms when deciding to outsource. These deficiencies are even more critical if this involves offshore delivery. The chapter outlines several key IOS-related issues firms need to take into account when investigating the business case for offshore outsourcing. These include a realistic assessment of the risks associated with sending customer data to countries with limited sanctions against release of such data. This risk is inherent in all cross-national IOSs, but is heightened when data is sent to countries where high levels of corruption exist. They also include risks associated with replacing face to face organizational controls with those mediated by IOSs.

The chapter is essentially a literature review, but is informed by a series of ten focus groups conducted by the author with purchaser and vendor staff involved in outsourcing arrangements (n = 46). Services supplied within these outsourcing arrangements included back-end operations; delivery of mainframe IT services; software development; help desk operations and desktop support. Details are reported in Rouse (2002). The organization of the chapter is as follows: after providing a background to the growth of outsourcing, particularly business process outsourcing (BPO), the chapter then explores inter-organizational systems (IOSs). It then canvasses the importance of taking into account risks as well as costs and benefits when developing the business case on which the sourcing decision is made. The chapter then explores in more detail the risks associated with outsourcing, especially when it is provided offshore. It also focuses on those risks that are associated with replacing internal, face to face direction and coordination with electronically mediated coordination. Finally the chapter provides examples of typical risks associated with this IOS mediation and suggests some implications.

Complete Chapter List

Search this Book:
Reset