[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/HICSS.1998.654830guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Assessing the Risk of IT Outsourcing

Published: 06 January 1998 Publication History

Abstract

Outsourcing decisions, and contractual arrangements of the type required by an IT outsourcing deal, entail risks. This is not to say that outsourcing is bad in itself. It only means that, as in other risky business ventures such as new product development, capital investments, and IS projects, risk assessment and risk management are important contributors to the success of an IT outsourcing venture. This paper focuses on risk assessment. After providing a brief conceptual definition of risk, the paper reviews the empirical literature in order to identify the main undesirable outcomes that may result from an IT outsourcing deal. It then uses transaction cost and agency theory as a primary theoretical basis, and proposes a framework for categorizing risk factors which have been identified in the literature. Finally, the paper discusses the dynamics of risk, by examining how the various risk factors are linked to the undesirable outcomes.

Cited By

View all
  • (2018)How to Build Successful Cloud Computing RelationshipsInternational Journal of IT/Business Alignment and Governance10.4018/IJITBAG.20180701019:2(1-14)Online publication date: 1-Jul-2018
  • (2018)Integration of Information Systems and Cybersecurity CountermeasuresACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3184444.318444849:1(33-52)Online publication date: 1-Feb-2018
  • (2017)IT/IS Outsourcing in Large Companies Motivations and RisksProcedia Computer Science10.1016/j.procs.2017.11.135121:C(1047-1061)Online publication date: 1-Jan-2017
  • Show More Cited By
  1. Assessing the Risk of IT Outsourcing

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    HICSS '98: Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 6 - Volume 6
    January 1998
    ISBN:0818682485

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 06 January 1998

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)How to Build Successful Cloud Computing RelationshipsInternational Journal of IT/Business Alignment and Governance10.4018/IJITBAG.20180701019:2(1-14)Online publication date: 1-Jul-2018
    • (2018)Integration of Information Systems and Cybersecurity CountermeasuresACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3184444.318444849:1(33-52)Online publication date: 1-Feb-2018
    • (2017)IT/IS Outsourcing in Large Companies Motivations and RisksProcedia Computer Science10.1016/j.procs.2017.11.135121:C(1047-1061)Online publication date: 1-Jan-2017
    • (2017)Information security concerns in IT outsourcingInformation and Management10.1016/j.im.2016.10.00254:4(452-464)Online publication date: 1-Jun-2017
    • (2016)We Need Numbers!Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems10.1145/2858036.2858570(4129-4141)Online publication date: 7-May-2016
    • (2016)Exposing and selling the use of web services-an option to be considered in make-or-buy decision-makingDecision Support Systems10.1016/j.dss.2016.06.00689:C(28-40)Online publication date: 1-Sep-2016
    • (2013)Managing risk in information technology outsourcingInternational Journal of Business Information Systems10.1504/IJBIS.2013.05205212:2(210-242)Online publication date: 1-Feb-2013
    • (2013)Towards a unified model for successful implementation of outsourcing and reversibility of information systemsJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2013.03.00325:2(229-240)Online publication date: 1-Jul-2013
    • (2013)Building an IT service catalog in a small company as the main input for the IT financial managementComputer Standards & Interfaces10.1016/j.csi.2013.07.00336:1(42-53)Online publication date: 1-Nov-2013
    • (2012)Impact of Vendor Selection on Firms' IT OutsourcingJournal of Global Information Management10.4018/jgim.201204010220:2(25-43)Online publication date: 1-Apr-2012
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media