Optimizing vendor selection in a two-stage outsourcing process

The decision processes surrounding outsourcing are complicated by the very nature of uncertainty involved in the outsourcing process and by poor vendor management. In this study, we focus on vendor selection, one of the two basic issues of vendor management in outsourcing. Due to the limitation of the classic one-stage vendor selection model, we propose a two-stage vendor selection research framework in outsourcing. The first stage is a trial phase that helps the client to find the best match between the vendor and the outsourced project. In the second stage, the client employs the chosen vendor for the full implementation of the project. We formulate this selection decision under the two-stage framework as a combinatorial optimization model. We analyze the complexity of the problem and develop a solution procedure to find the exact optimal solution. By applying this model to numerical case studies, we demonstrate that benefit to adopt two-stage process to the vendor depends on information improvement in the first stage and the client's ability to adapt to updated knowledge. We also argue that the selection of vendors for the first stage testing is more about creating a good vendor portfolio than simply picking the frontrunners.

[1]  Samit Soni,et al.  A Framework for Facilitating Sourcing and Allocation Decisions for Make-to-Order Items , 2004, Decis. Sci..

[2]  R. Nolan,et al.  How to Manage an IT Outsourcing Alliance , 1995 .

[3]  Joe Zhu,et al.  A buyer-seller game model for selection and negotiation of purchasing bids: Extensions and new models , 2004, Eur. J. Oper. Res..

[4]  Zeger Degraeve,et al.  The use of total cost of ownership for strategic procurement: a company-wide management information system , 2005, J. Oper. Res. Soc..

[5]  Lorin M. Hitt,et al.  Vendor Screening in Information Technology Contracting With a Pilot Project , 2004, J. Organ. Comput. Electron. Commer..

[6]  Robert E. Gregory,et al.  Source Selection: A Matrix Approach , 1986 .

[7]  N.-E. Dahel Vendor selection and order quantity allocation in volume discount environments , 2003 .

[8]  Fong-Yuen Ding,et al.  Using data envelopment analysis to compare suppliers for supplier selection and performance improvement , 2000 .

[9]  D. M. Deighton,et al.  Computers in Operations Research , 1977, Aust. Comput. J..

[10]  Robert M. Monczka,et al.  Cost-Based Supplier Performance Evaluation , 1988 .

[11]  M. J. Earl,et al.  The Risks of Outsourcing IT , 1996 .

[12]  J. Current,et al.  An optimization approach to determining the number of vendors to employ , 2000 .

[13]  R. Handfield,et al.  Involving Suppliers in New Product Development , 1999 .

[14]  Leslie P. Willcocks,et al.  Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA , 1999, J. Strateg. Inf. Syst..

[15]  Leslie P. Willcocks,et al.  An Empirical Investigation of Information Technology Sourcing Practices: Lessons From Experience , 1998, MIS Q..

[16]  Yoram Wind,et al.  The Determinants of Vendor Selection: The Evaluation Function Approach , 1968 .

[17]  S. H. Ghodsypour,et al.  The total cost of logistics in supplier selection, under conditions of multiple sourcing, multiple criteria and capacity constraint , 2001 .

[18]  Michael A. Cusumano,et al.  MIT SLOAN MANAGEMENT REVIEW プラットフォーム・リーダーシップ:イノベーションのマネジメント , 2002 .

[19]  K. Desouza,et al.  The ten outsourcing traps to avoid , 2004 .

[20]  Anthony DiRomualdo,et al.  Strategic Intent for IT Outsourcing , 1998 .

[21]  Simon Domberger,et al.  Examining the Magnitude and Sources of Cost Savings Associated with Outsourcing , 2002 .

[22]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[23]  L. Willcocks,et al.  ABOUT THE PRESENTER: , 2002 .

[24]  William R. King,et al.  Outsourcing and the Future of It , 2004, Inf. Syst. Manag..

[25]  Manoj Kumar,et al.  A fuzzy goal programming approach for vendor selection problem in a supply chain , 2004, Comput. Ind. Eng..

[26]  H. Raghav Rao,et al.  A two-level investigation of information systems outsourcing , 1996, CACM.

[27]  R. Puryear,et al.  Strategic sourcing: from periphery to the core. , 2005, Harvard business review.