[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

The Role of Vendor Legitimacy in IT Outsourcing Performance: : Theory and Evidence

Published: 01 March 2022 Publication History

Abstract

Information technology outsourcing (ITO) relationships today are facing increasingly turbulent environments. This research examines ITO performance by focusing on client firms’ perceived legitimacy of vendors, termed “vendor legitimacy,” consisting of pragmatic, cognitive, and moral dimensions. Based on our surveys with executives and managers at 200 ITO client firms, the study’s findings present the imperative to actively manage vendor legitimacy for achieving and sustaining ITO performance. Specifically, at the strategic level, clients’ perception of vendors as mutually aligned, long-term-oriented, tightly integrated partners is critical. At the operational level, clients should collaborate with vendors to design and establish interorganizational routines that undergird vendor legitimacy. At the managerial level, clients’ relational governance plays a pivotal role in attaining procedural justice, ethical standards, and fairness in the interorganizational collaboration. In sum, our study suggests that creating a dedicated corporate function or unit for continually overseeing and assessing a portfolio of vendors and swiftly identifying and responding to potential issues and crises related to vendor legitimacy would be a worthwhile investment.

Abstract

Information technology (IT) outsourcing relationships today are facing increasingly turbulent environments. With rapid changes in technological, commercial, societal, and regulatory landscapes, client firms have to closely and continually assess the desirability and appropriateness, or legitimacy, of their vendors in such dynamic settings. In this research, the focus is on client firms’ perceived legitimacy of vendors, termed “vendor legitimacy.” Specifically, building on institutional theory, vendor legitimacy is conceptualized as consisting of three dimensions—pragmatic, moral, and cognitive—and is examined through their respective impacts on IT outsourcing performance. The role of key governance strategies for managing vendor legitimacy, namely, contractual governance and relational governance, are likewise explored. Results from a multiple-sourced, matched-pair, cross-industry sample of executives and managers of 185 client firms reveal that these various governance strategies exert differential impacts on the aforementioned dimensions of vendor legitimacy, which, in turn, drive performance.

References

[1]
Abbott P, Zheng Y, Du R, Willcocks L (2013) From boundary spanning to creolization: A study of Chinese software and services outsourcing vendors. J. Strategic Inform. Systems 22(2):121–136.
[2]
Ågerfalk P, Fitzgerald B (2008) Outsourcing to an unknown workforce: Exploring opensourcing as a global sourcing strategy. MIS Quart. 32(2):385–409.
[3]
Agrawal V, Lee D (2019) The effect of sourcing policies on suppliers’ sustainable practices. Prod. Oper. Management 28(4):767–787.
[4]
Aldrich H, Fiol M (1994) Fools rush in? The institutional context of industry creation. Acad. Management Rev. 19(4):645–670.
[5]
Ang S, Straub DW (1998) Production and transaction economies and IS outsourcing: A study of the U.S. banking industry. MIS Quart. 22(4):535–552.
[6]
Angst M, Wowak D, Handley M, Kelley K (2017) Antecedents of information systems sourcing strategies in U.S. hospitals: A longitudinal study. MIS Quart. 41(4):1129–1152.
[7]
Aral S, Bakos Y, Brynjolfsson E (2018) Information technology, repeated contracts, and the number of suppliers. Management Sci. 64(2):592–612.
[8]
Arbuckle JL (2011) IBM SPSS Amos 20 User’s Guide (SPSS, Chicago).
[9]
Armstrong JS, Overton TS (1977) Estimating nonresponse bias in mail surveys. J. Marketing Res. 14(3):396–402.
[10]
Aron R, Clemons E, Reddi S (2005) Just right outsourcing: Understanding and managing risk. J. Management Inform. Systems 22(2):37–55.
[11]
Aubert B, Rivard S, Patry M (1996) A transaction cost approach to outsourcing behavior: Some empirical evidence. Inform. Management 30(2):51–64.
[12]
Babbie E (1990) Survey Research Methods. (Wadsworth Publishing, Belmont, CA).
[13]
Babin R, Nicholson B (2009) Corporate social and environmental responsibility and global outsourcing. MIS Quart. Executive 8(4):203–212.
[14]
Babin R, Briggs S, Nicholson B (2011) Corporate social responsibility and global IT outsourcing. Comm. ACM 54(9):28–30.
[15]
Bahli B, Rivard S (2003) The information technology outsourcing risk: A transaction cost and agency theory-based perspective. J. Inform. Tech. 18(3):211–221.
[16]
Balogun J, Fahy K, Vaara E (2019) The interplay between HQ legitimation and subsidiary legitimacy judgments in HQ relocation: A social psychological approach. J. Internat. Bus. Stud. 50:223–249.
[17]
Barney J, Clifford T (2010) A valuable chain: Real world strategies for analyzing the value chain. What I didn’t Learn in Business School: How Strategy Works in the Real World (Harvard Business Review Press, Boston), 272.
[18]
Barrett M, Hinings CR, Oborn E (2008) Legitimacy management and trust in offshoring information technology services. Barrett M, Davidson E, Middleton C, DeGross J, eds. IFIP International Federation for Information Processing. Information Technology in the Service Economy: Challenges and Possibilities for the 21st Century, vol. 267 (Springer, Boston), 283–299.
[19]
Bartley T (2007) Institutional emergence in an era of globalization: The rise of transnational private regulation of labor and environmental conditions. Amer. J. Sociol. 113(2):297–351.
[20]
Baum CF, Schaffer ME, Stillman S (2003) Instrumental variables and GMM: Estimation and testing. Stata J. 3(1):1–31.
[21]
Benaroch M, Lichtenstein Y, Fink L (2016) Contract design choice and the balance of ex ante and ex post transaction costs in software development outsourcing. MIS Quart. 40(1):57–82.
[22]
Bianchi R, Johnson C (2016) Cheaper, simpler, better for customers: Outsourcing without trade-offs. McKinsey & Company (December 20), https://www.mckinsey.com/business-functions/operations/our-insights/cheaper-simpler-better-for-customers-outsourcing-without-trade-offs.
[23]
Bitektine A (2011) Toward a theory of social judgments of organizations: The case of legitimacy, reputation, and status. Acad. Management Rev. 36(1):151–179.
[24]
Bowman C, Ambrosini V (2000) Value creation vs. value capture: Toward a coherent definition of value in strategy. British J. Management 11(1):1–15.
[25]
Campbell DT, Fiske DW (1959) Convergent and discriminant validation by the multitrait-multimethod matrix. Psych. Bull. 56(2):81–105.
[26]
Cao Z, Lumineau F (2015) Revisiting the interplay between contractual and relational governance: A qualitative and meta-analytic investigation. J. Oper. Management 33/34(January):15–42.
[27]
Chen Y, Bharadwaj A (2009) An empirical analysis of contract structures in IT outsourcing. Inform. Systems Res. 20(4):484–506.
[28]
Chin WW, Thatcher JB, Wright RT (2012) Assessing common method bias: Problems with the ULMC technique. MIS Quart. 36(3):1003–1019.
[29]
Choudhury V, Sabherwal R (2003) Portfolios of control in outsourced software development projects. Inform. Systems Res. 14(3):291–314.
[30]
Clarke PE (2009) Return of the phantom menace: Omitted variable bias in political research. Conflict Management Peace Sci. 26(1):46–66.
[31]
Cohen MD, Bacdayan P (1994) Organizational routines are stored as procedural memory: Evidence from a laboratory. Organ. Sci. 5(4):554–568.
[32]
Dacin MT, Oliver C, Roy JP (2007) The legitimacy of strategic alliances: An institutional perspective. Strategic Management J. 28(2):169–187.
[33]
Davidson R, MacKinnon JG (1993) Estimation and Inference in Econometrics (Oxford University Press, New York).
[34]
Deloitte (2016) Deloitte’s 2016 global outsourcing survey. Accessed October 18, 2021, https://www2.deloitte.com/content/dam/Deloitte/nl/Documents/operations/deloitte-nl-s&o-global-outsourcing-survey.pdf.
[35]
Deloitte (2018) Deloitte’s 2018 global outsourcing survey. Accessed October 18, 2021, https://www2.deloitte.com/us/en/pages/operations/articles/global-outsourcing-survey.html
[36]
Dillman DA (1991) The design and administration of mail survey. Annual Rev. Sociol. 17(1):225–249.
[37]
DiMaggio PJ, Powell WW (1983) The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. Amer. Sociol. Rev. 48(2):147–160.
[38]
Dong MC, Fang Y, Straub DW (2017) The impact of institutional distance on the joint performance of collaborating firms: The role of adaptive interorganizational systems. Inform. Systems Res. 28(2):309–331.
[39]
Drentin R, Erriquez M, Nee C, Ziegler M (2018) Long tail, big savings: Digital unlocks hidden value in procurement. McKinsey & Company (June 6), https://www.mckinsey.com/business-functions/operations/our-insights/long-tail-big-savings-digital-unlocks-hidden-value-in-procurement.
[40]
Drori I, Honig B (2013) A process model of internal and external legitimacy. Organ. Stud. 34(3):345–376.
[41]
Du W, Pan SL (2013) Boundary spanning by design: Toward aligning boundary-spanning capacity and strategy in IT outsourcing. IEEE Trans. Engrg. Management 60(1):59–76.
[42]
Dyer J, Kale P, Singh H (2001) How to make strategic alliances work. MIT Sloan Management Rev. 42(4):37–43.
[43]
Faems D, Janssens M, Madhok A, Looy B (2008) Toward an integrative perspective on alliance governance: Connecting contract design, contract application and trust dynamics. Acad. Management J. 51(6):1053–1078.
[44]
Fafchamps M, Labonne J (2017) Using split samples to improve inference on causal effects. Political Anal. 25(4):465–482.
[45]
Flammer C (2018) Competing for government procurement contracts: The role of corporate social responsibility. Strategic Management J. 39(5):1299–1324.
[46]
Fogarty D, Bell PC (2014) Should you outsource analytics? MIT Sloan Management Rev. 55(2):41–45.
[47]
Gefen D, Straub DW, Boudreau M (2000) Structural equation modeling and regression: Guidelines for research practice. Comm. AIS 4(7):1–70.
[48]
Gefen D, Straub DW, Rigdon EE (2011) An update and extension to SEM guidelines for administrative and social science research. MIS Quart. 35(2):3–14.
[49]
Gefen D, Wyss S, Lichtenstein Y (2008) Business familiarity as risk mitigation in software development outsourcing contracts. MIS Quart. 32(3):531–551.
[50]
Goo J, Kishore R, Rao H, Nam K (2009) The role of service level agreements in relational management of information technology outsourcing: An empirical study. MIS Quart. 33(1):119–145.
[51]
Gopal A, Gosain S (2010) The role of organizational controls and boundary spanning in software development outsourcing: Implications for project performance. Inform. Systems Res. 21(4):960–982.
[52]
Gould W (2011) How can there be an intercept in the fixed-effects model estimated by xtreg, fe? Accessed October 18, 2021, https://stats.idre.ucla.edu/stata/faq/how-can-there-be-an-intercept-in-the-fixed-effects-model-estimated-by-xtreg-fe/.
[53]
Grover V, Cheon M, Tseng JTC (1996) The effect of service quality and partnership on the outsourcing of information system functions. J. Management Inform. Systems 12(4):89–116.
[54]
Gulati R (1995) Does familiarity breed trust? The implications of repeated ties for contractual choice in alliances. Acad. Management J. 38(1):85–112.
[55]
Gulati R, Gargiulo M (1999) Where do interorganizational networks come from? Amer. J. Sociol. 104(5):1439–1493.
[56]
Hadjistavropoulos HD, Frombach IK, Asmundson GJ (1999) Exploratory and confirmatory factor analytic investigations of the illness attitudes scale in a nonclinical sample. Behav. Res. Therapy 37(7):671–684.
[57]
Hair J, Joseph H, Hult GT, Ringle C, Sarstedt M (2014) A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) (Sage Publications, Los Angeles).
[58]
Han K, Mithas S (2013) Information technology outsourcing and non-IT operating costs: An empirical investigation. MIS Quart. 37(1):315–331.
[59]
Handley A, Angst C (2015) The impact of culture on the relationship between governance and opportunism in outsourcing relationships. Strategic Management J. 36(9):1412–1434.
[60]
Handley S, Benton W Jr (2012) The influence of exchange hazards and power on opportunism in outsourcing relationships. J. Oper. Management 30(1-2):55–68.
[61]
Hancox M, Hackney R (2000) IT outsourcing: Frameworks for conceptualizing practice and perception. Inform. Systems J. 10(3):217–237.
[62]
Hargadon A, Fanelli A (2002) Action and possibility: reconciling dual perspectives of knowledge in organizations’. Organ. Sci. 13(3):290–302.
[63]
Harjoto MA, Jo H (2011) Corporate governance and CSR nexus. J. Bus. Ethics 100:45–67.
[64]
Heide JB (1994) Interorganizational governance in marketing channels. J. Marketing 58(January):71–85.
[65]
Helper S, MacDuffie JP, Sabel C (2000) Pragmatic collaborations: Advancing knowledge while controlling opportunism. Indust. Corporate. Change 9(3):443–488.
[66]
Himmelreich H, Hildebrandt P, Nalgirkar R, Bijlsma J (2019) When agile meets outsourcing. Accessed October 18, 2021, https://www.bcg.com/publications/2019/agile-meets-outsourcing.aspx.
[67]
Hodgson GM, Knudsen T (2010) Generative replication and the evolution of complexity. J. Econom. Behav. Organ. 75(1):12–24.
[68]
Hsu C, Lin R, Wang T (2015) A legitimacy challenge: An institutional perspective on the implementation of a cross-cultural interorganizational information system. Eur. J. Inform. Systems 24(3):278–294.
[69]
Huber T, Fischer T, Dibbern J, Hirschheim R (2013) A process model of complementary and substitution of contractual and relational governance in IS outsourcing. J. Management Inform. Systems 30(3):81–114.
[70]
Human S, Provan K (2000) Legitimacy building in the evolution of small-firm multilateral networks: A comparative study of success and demise. Admin. Sci. Quart. 45(2):327–365.
[71]
Im G, Rai A (2008) Knowledge sharing ambidexterity in long-term interorganizational relationships. Management Sci. 54(7):1281–1296.
[72]
Janssen O, Van De Vliert E, Veenstra C (1999) How task and person conflict shape the role of positive interdependence in management teams. J. Management 25(2):117–142.
[73]
Jarvenpaa SL, Mao JY (2008) Operational capabilities development in mediated offshore software services models. J. Inform. Tech. 23(1):3–17.
[74]
Jin KG, Drozdenko RG (2010) Relationships among perceived organizational core values, corporate social responsibility, ethics, and organizational performance outcomes: An empirical study of information technology professionals. J. Bus. Ethics 92(3):341–359.
[75]
Jogani R, Pande A, Shirdade V (2017) Five ways to unlock win–win value from IT-services sourcing relationships. McKinsey & Company (September 15), https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/five-ways-to-unlock-win-win-value-from-it-services-sourcing-relationships.
[76]
Joyner BE, Payne D (2002) Evolution and implementation: A study of values, business ethics and corporate social responsibility. J. Bus. Ethics 41(4):297–311.
[77]
Kaiser K, Hawk S (2004) Evolution of offshore software development: From outsourcing to cosourcing. MIS Quart. Executive 3(2):69–81.
[78]
Kane GC, Palmer D, Nguyen-Phillips A, Kiron D (2015) Is your business ready for a digital future? MIT Sloan Management Rev. 56(4):37–44.
[79]
Kern T, Willcocks L (2000) Exploring information technology outsourcing relationships: Theory and practice. J. Strategic Inform. Systems 9(4):321–350.
[80]
Kim HJ, Lee SH, Lee HG (2007) An empirical study on the importance of psychological contract commitment in information systems outsourcing. J. Management Inform. Systems Res. 17(2):50–82.
[81]
Kim H, Shin B, Lee H (2013) The mediating role of psychological contract breach in IS outsourcing: Inter-firm governance perspective. Eur. J. Inform. Systems 22(5):529–547.
[82]
King WR, Torkzadeh G (2008) Information systems offshoring: Research status and issues. MIS Quart. 32(2):205–225.
[83]
Klein B (1996) Why hold-ups occur: The self-enforcing range of contractual relationships. Econom. Inquiry 34(3):464–484.
[84]
Koh C, Ang S, Straub D (2004) IT outsourcing success: A psychological contract perspective. Inform. Systems Res. 15(4):356–373.
[85]
Kostova T, Zaheer S (1999) Organizational legitimacy under conditions of complexity: The case of the multinational enterprise. Acad. Management Rev. 24(1):64–81.
[86]
Kotlarsky J, Scarbrough H, Oshri I (2014) Coordinating expertise across knowledge boundaries in offshore-outsourcing projects: The role of codification. MIS Quart. 38(2):607–627.
[87]
[88]
Kumar K, Anderson P (2000) Interfirm diversity and the management of meaning in international strategic alliances. Internat. Bus. Rev. 9(2):237–252.
[89]
Kumar R, Das T (2007) Interpartner legitimacy in the alliance development process. J. Management Stud. 44(8):1425–1453.
[90]
Lacity M, Willcocks LP (1998) An empirical investigation of information technology sourcing practices: Lessons from experience. MIS Quart. 22(3):363–308.
[91]
Lacity M, Willcocks LP (2013) Outsourcing business processes for innovation. MIT Sloan Management Rev. 54(3):63–69.
[92]
Lacity M, Khan S, Yang A, Willcocks L (2010) A review of the IT outsourcing empirical literature and future research directions. J. Inform. Tech. 25(4):395–433.
[93]
Landau D, Drori I, Terjesen S (2014) Multiple legitimacy narratives and planned organizational change. Human Relations 67(11):1321–1345.
[94]
Lagenspetz O (1992) Legitimacy and trust. Philosophical Investigations 15(1):1–21.
[95]
Lee JN (2001) The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success. Inform. Management 38(5):323–335.
[96]
Lee JN, Choi B (2011) Effects of initial and ongoing trust in IT outsourcing: A bilateral perspective. Inform. Management 48(2–3):96–105.
[97]
Lee JN, Kim YG (1999) Effect of partnership quality on IS outsourcing success: Conceptual framework and empirical validation. J. Management Inform. Systems 15(4):29–61.
[98]
Lee JN, Miranda S, Kim YM (2004) IT outsourcing strategies: Universalistic, contingency, and configurational explanations of success. Inform. Systems Res. 15(2):110–131.
[99]
Lee JN, Park Y, Straub DW, Koo Y (2019) Holistic archetypes of IT outsourcing strategy: A contingency fit and configurational approach. MIS Quart. 43(4):1201–1225.
[100]
Levina N, Ross JW (2003) From the vendor’s perspective: Exploring the value proposition in information technology outsourcing. MIS Quart. 27(3):331–364.
[101]
Levina N, Vaast E (2005) The emergence of boundary spanning competence in practice: Implications for implementation and use of information systems. MIS Quart. 29(2):335–363.
[102]
Li X, Zhou YM (2017) Offshoring pollution while offshoring production? Strategic Management J. 38(11):2310–2329.
[103]
Li JJ, Poppo L, Zhou KZ (2010) Relational mechanisms, formal contracts, and local knowledge acquisition by international subsidiaries. Strategic Management J. 31(4):349–370.
[104]
Lioliou E, Zimmermann A, Willcocks L, Gao L (2014) Formal and relational governance in IT outsourcing: Substitution, complementarity and the role of the psychological contract. Inform. Systems J. 24(6):503–535.
[105]
Liu Y, Aron R (2015) Organizational control, incentive contracts, and knowledge transfer in offshore business process outsourcing. Inform. Systems Res. 26(1):81–99.
[106]
Lu JW, Xu D (2006) Growth and survival of international joint ventures: An external-internal legitimacy perspective. J. Management 32(3):426–448.
[107]
Lumineau F, Malhotra D (2011) Shadow of the contract: How contract structure shapes interfirm dispute resolution. Strategic Management J. 32(5):532–555.
[108]
Malhotra D, Murnighan JK (2002) The effects of contracts on interpersonal trust. Admin. Sci. Quart. 47(3):534–559.
[109]
March JG (1994) A Primer on Decision Making: How Decisions Happen (Free Press, New York).
[110]
Margolis JD, Walsh JP (2003) Misery loves companies: Rethinking social initiatives by business. Admin. Sci. Quart. 48(2):268–305.
[111]
Margolis JD, Elfenbein HA, Walsh JP (2009) Does it pay to be good? A meta-analysis and redirection of research on the relationship between corporate social and financial performance. Preprint, submitted March 1, https://doi.org/10.2139/ssrn.1866371.
[112]
Martinez R, Dacin M (1999) Efficiency motives and normative forces: Combing transactions costs and institutional logic. J. Management 25(1):75–96.
[113]
Martinson M, Ma D (2009) Sub-cultural differences in information ethics across China: Focus on Chinese management generation Gaps. J. Assoc. Inform. Systems 10(11):816–833.
[114]
Miranda S, Kavan C (2005) Moments of governance in IS outsourcing: Conceptualizing effects of contracts on value capture and creation. J. Inform. Tech. 20(3):152–169.
[115]
Miranda S, Kim YM (2006) Professional vs. political contexts: Institutional mitigation and the transaction cost heuristic in information systems outsourcing. MIS Quart. 30(3):725–753.
[116]
Moore G, Benbasat I (1991) Development of an instrument to measure the perceptions of adopting an information technology innovation. Inform. Systems Res. 2(3):192–222.
[117]
Moran P, Ghoshal S (1999) Markets, firms, and the process of economic development. Acad. Management J. 24(3):390–412.
[118]
Nelson RR, Winter SG (1982) An Evolutionary Theory of Economic Change (Harvard University Press, Cambridge, MA).
[119]
Neter J, Wasserman W, Kutner MH (1985) Applied Linear Statistical Models, 2nd ed. (Richard D Irwin Inc., Homewood, IL).
[120]
Nunnally JC, Bernstein IH (1994) Psychometric Theory, 3rd ed.(McGraw-Hill, New York).
[121]
Oliveira N, Lumineau F (2019) The Dark side of interorganizational relationships: An integrative review and research agenda. J. Management 45(1):231–261.
[122]
Orsdemir A, Hu B, Deshpande V (2019) Ensuring corporate social and environmental responsibility through vertical integration and horizontal sourcing. Manuf. Serv. Oper. Management 21(2):417–434.
[123]
Oshri I, Kotlarsky K, Gerbasi A (2015) Strategic innovation through outsourcing: The role of relational and contractual governance. J. Strategic Inform. Systems 24(3):203–216.
[124]
Panagopoulos NG, Rapp AA, Vlachos PA (2016) I think they think we are good citizens: Meta-perceptions as antecedents of employees’ reactions to corporate social responsibility. J. Bus. Res. 69(8):2781–2790.
[125]
Peteraf MA (1993) The cornerstones of competitive advantage: A resource-based view. Strategic Management J. 14(3):179–191.
[126]
Peteraf MA, Shanley M (1997) Getting to know you: A theory of strategic group identity. Strategic Management J. 18(Special Summer Issue):165–186.
[127]
Petter S, Straub DW, Rai A (2007) Specifying formative constructs in IS Research. MIS Quart. 31(4):623–656.
[128]
Pindyck RS, Rubinfeld DL (1999) Econometric Models and Economic Forecasts, 4th ed. (McGraw-Hill, Singapore).
[129]
Pisano GP, Shih WC (2009) Restoring American competitiveness. Harvard Bus. Rev. 87(7–8):114–125.
[130]
Podsakoff PM, Organ DW (1986) Self-reports in organizational research: Problems and prospects. J. Management 12(4):531–544.
[131]
Podsakoff PM, MacKenzie SB, Lee JY, Podsakoff NP (2003) Common method biases in behavioral research: A critical review of the literature and recommended remedies. J. Appl. Psychol. 88(5):879–903.
[132]
Poppo L, Zenger T (2002) Do formal contracts and relational governance functions as substitutes or complements? Strategic Management J. 23(8):707–725.
[133]
Poppo L, Zhou KZ, Ryu S (2008) Alternative origins to interorganizational trust: An interdependence perspective on the shadow of the past and the shadow of the future. Organ. Sci. 19(1):39–55.
[134]
Ragu-Nathan TS, Tarafdar M, Ragu-Nathan BS, Tu Q (2008) The consequences of technostress for end users in organizations: Conceptual development and empirical validation. Inform. Systems Res. 19(4):417–433.
[135]
Rai A, Likoebe MM, Viswanath V (2009) Offshore information systems project success: The role of social embeddedness and cultural characteristics. MIS Quart. 33(3):617–641.
[136]
Rai A, Keil M, Hornyak R, Wüllenweber K (2012) Hybrid relational-contractual governance for business process outsourcing. J. Management Inform. Systems 29(2):213–256.
[137]
Rao R, Chandy R, Prabhu J (2008) The fruits of legitimacy: Why some new ventures gain more from innovation than others. J. Marketing 72(4):58–75.
[138]
Reuer J, Ariño A (2007) Strategic alliance contracts: Dimensions and determinants of contractual complexity. Strategic Management J. 28(3):313–330.
[139]
Ring PS, Van de Ven AH (1994) Developmental process of cooperative interorganizational relationships. Acad. Management J. 19(1):90–118.
[140]
Rossetti C, Choi TY (2005) On the dark side of strategic sourcing: Experiences from the aerospace industry. Acad. Management Perspect. 19(1):46–60.
[141]
Rottman J (2008) Successful knowledge transfer within offshore supplier networks: A case study exploring social capital in strategic alliances. J. Inform. Tech. 23(1):31–43.
[142]
Rousseau DM (1989) Psychological and implied contracts in organizations. Employee Responsibilities Rights J. 2(2):121–139.
[143]
Roy V, Aubert B (2002) A resource-based analysis of IT sourcing. Data Base Adv. Inform. Systems 33(2):29–40.
[144]
Ryall MD, Sampson RC (2009) Formal contracts in the presence of relational enforcement mechanisms: Evidence from technology development contracts. Management Sci. 55(6):906–925.
[145]
Sarkar M, Aulakha PS, Cavusgil ST (1998) The strategic role of relational bonding in interorganizational collaborations: An empirical study of the global construction industry. J. Internat. Management 4(2):85–107.
[146]
Sarkar MB, Aulakh PS, Madhok A (2009) Process capabilities and value generation in alliance portfolios. Organ. Sci. 20(3):583–600.
[147]
Sartor MA, Beamish PW (2014) Offshoring innovation to emerging markets: Organizational control and information institutional distance. J. Internat. Bus. Stud. 45(9):1072–1095.
[148]
Scott W (1995) Institutional and Organizations (Sage, Thousand Oaks, CA).
[149]
Scott W (2008) Institutions and Organizations: Ideas and Interests (Sage Publications, Thousand Oaks, CA).
[150]
Sivo SA, Fan X, Witta EL, Willse JT (2006) The search for “optimal” cutoff properties: Fit index criteria in structural equation modeling. J. Experiment. Ed. 74(3):267–288.
[151]
Spearing NM, Connelly LB, Nghiem HS, Pobereskin L (2012) Research on injury compensation and health outcomes: Ignoring the problem of reverse causality led to a biased conclusion. J. Clinical Epidemiology 65(11):1219–1226.
[152]
Srivastava S, Teo T (2012) Contract performance in offshore systems development: Role of control mechanisms. J. Management Inform. Systems 29(1):115–158.
[154]
Straub DW, Boudreau MC, Gefen D (2004) Validation guidelines for IS positivist research. Comm. AIS. 13(24):380–427.
[155]
Su N (2013) Internationalization strategies of Chinese IT service suppliers. MIS Quart. 37(1):175–200.
[156]
Su N (2015) Cultural sensemaking in offshore information technology service suppliers: A cultural frame perspective. MIS Quart. 39(4):959–983.
[157]
Su C, Littlefield JE (2001) Entering Guanxi: A business ethical dilemma in mainland China? J. Bus. Ethics. 33(3):199–210.
[158]
Su N, Levina N, Ross J (2016) The long-tail strategy of IT outsourcing. MIT Sloan Management Rev. 57(2):81–89.
[159]
Subramani M (2004) How do suppliers benefit from information technology use in supply chain relationships? MIS Quart. 28(1):45–73.
[160]
Suddaby R, Greenwood R (2005) Rhetorical strategies of legitimacy. Admin. Sci. Quart. 50(1):35–67.
[161]
Suchman M (1995) Managing legitimacy: Strategic and institutional approaches. Acad. Management Rev. 20(3):571–610.
[162]
Swar B, Moon J, Oh J, Rhee C (2012) Determinants of relationship quality for IS/IT outsourcing success in public sector. Inform. Systems Frontiers 14(2):457–475.
[163]
Tallon PP, Kraemer KL, Gurbaxani V (2000) Executives’ perceptions of the business value of information technology: A process-oriented approach. J. Management Inform. Systems 16(4):145–173.
[164]
Tangpong C, Hung K, Ro Y (2010) The interaction effect of relational norms and agent cooperativeness on opportunism in buyer-supplier relationships. J. Oper. Management 28:398–414.
[165]
Taylor H (2007) Outsourced IT projects from the vendor perspective: Different goals, different risks. J. Global Inform. Management 15(2):1–27.
[166]
Tiwana A (2010) Systems development ambidexterity: Explaining the complementary and substitutive roles of formal and informal controls. J. Management Inform. Systems 27(2):87–126.
[167]
Tiwana A, Bush A (2007) A comparison of transaction cost, agency, and knowledge-based predictors of IT outsourcing decisions: A U.S.-Japan cross-cultural field study. J. Management Inform. Systems 24(1):259–300.
[168]
Trochim W, Donnelly J, Arora K (2016) Research Methods: The Essential Knowledge Base, 2nd ed. (Cengage Learning, Boston).
[169]
Tsui J, Windsor C (2001) Some cross-cultural evidence on ethical reasoning. J. Bus. Ethics 31(2):143–150.
[170]
Walden EA (2005) Intellectual property rights and cannibalization in information technology outsourcing contracts. MIS Quart. 29(4):699–720.
[171]
Wang T, Bansal P (2012) Social responsibility in new ventures: Profiting from a long-term orientation. Strategic Management J. 33(10):1135–1153.
[172]
Williamson OE (1985) The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting (Free Press/Collier Macmillan, New York).
[173]
Wooldridge JM (2009) Introductory Econometrics: A Modern Approach, 4th ed. (South-Western Cengage Learning, Mason, OH).
[174]
Wu S, Straub D, Liang TP (2015) How information technology governance mechanisms and strategic alignment influence organizational performance: Insights from a matched survey of business and IT managers. MIS Quart. 39(2):497–518.
[175]
Yang Z, Su C, Fam KS (2012) Dealing with institutional distances in international marketing channels: Governance strategies that engender legitimacy and efficiency. J. Marketing 76(3):41–55.
[176]
Zollo M, Reuer JJ, Singh H (2002) Interorganizational routines and performance in strategic alliances. Organ. Sci. 13(6):701–713.
[177]
Zimmerman M, Zeitz G (2002) Beyond survival: Achieving new venture growth by building legitimacy. Acad. Management Rev. 27(3):414–431.

Cited By

View all
  • (2023)The Interdependence of Coordination and Cooperation in Information Technology OutsourcingInformation Systems Research10.1287/isre.2023.121634:4(1791-1806)Online publication date: 1-Dec-2023
  • (2023)Contracting and timing for outsourcing of information system with uncertain requirementsNeural Computing and Applications10.1007/s00521-022-07355-635:3(2279-2289)Online publication date: 1-Jan-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Information Systems Research
Information Systems Research  Volume 33, Issue 1
March 2022
404 pages
ISSN:1526-5536
DOI:10.1287/isre.2022.33.issue-1
Issue’s Table of Contents

Publisher

INFORMS

Linthicum, MD, United States

Publication History

Published: 01 March 2022
Accepted: 25 July 2021
Received: 16 April 2018

Author Tags

  1. IT outsourcing
  2. contractual governance
  3. relational governance
  4. vendor legitimacy

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)The Interdependence of Coordination and Cooperation in Information Technology OutsourcingInformation Systems Research10.1287/isre.2023.121634:4(1791-1806)Online publication date: 1-Dec-2023
  • (2023)Contracting and timing for outsourcing of information system with uncertain requirementsNeural Computing and Applications10.1007/s00521-022-07355-635:3(2279-2289)Online publication date: 1-Jan-2023

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media