Are there contagion effects in information technology and business process outsourcing?

We model the diffusion of IT outsourcing using announcements about IT outsourcing deals. We estimate a lognormal diffusion curve to test whether IT outsourcing follows a pure diffusion process or there are contagion effects involved. The methodology permits us to study the consequences of outsourcing events, especially mega-deals with IT contract amounts that exceed US$1billion. Mega-deals act, we theorize, as precipitating events that create a strong basis for contagion effects and are likely to affect decision-making by other firms in an industry. Then, we evaluate the role of different communication channels in the diffusion process of IT outsourcing by testing for the fit of the mixed influence model at the industry level. This helps us to evaluate the consistency of evidence at two different levels of analysis. We also evaluate two flexible diffusion models: the Gompertz and Weibull models. Our results show that the diffusion patterns of IT outsourcing do not appear to be lognormal, suggesting that IT outsourcing does not follow a pure diffusion process. Instead, we find the presence of contagion effects in the diffusion of IT outsourcing. During periods of the most rapid outsourcing growth - the contagion periods - the actions of the large and more visible firms may provide exemplars for smaller firms, reducing their inhibitions about committing to IT outsourcing. We also find that the results of the mixed influence and the Weibull models, which provide the best fit for overall IT outsourcing diffusion patterns, are potentially indicative of the existence of spillovers that might drive the observed contagion effects at the industry level.

[1]  W. Powell,et al.  The iron cage revisited institutional isomorphism and collective rationality in organizational fields , 1983 .

[2]  Lawrence Loh,et al.  Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect , 1992, Inf. Syst. Res..

[3]  Robert P. Parker,et al.  bea's Chain Indexes, Time Series, and Measures of Long-Term Economic Growth , 1997 .

[4]  M. Lynne Markus,et al.  Toward a “Critical Mass” Theory of Interactive Media , 1987 .

[5]  Robert J. Kauffman,et al.  The Global Diffusion Patterns of Successive Technology Generations: Modeling Analog and Digital Wireless Phone Growth , 2006, 2006 International Conference on Information and Communication Technologies and Development.

[6]  M. Midlarsky,et al.  Analyzing Diffusion and Contagion Effects: The Urban Disorders of the 1960s , 1978, American Political Science Review.

[7]  P. Geroski Models of technology diffusion , 2000 .

[8]  Robert J. Kauffman,et al.  Should We Go Our Own Way? Backsourcing Flexibility in IT Services Contracts , 2010, J. Manag. Inf. Syst..

[9]  S. Bikhchandani,et al.  You have printed the following article : A Theory of Fads , Fashion , Custom , and Cultural Change as Informational Cascades , 2007 .

[10]  E. Rogers,et al.  The diffusion of interactive communication innovations and the critical mass: the adoption of telecommunications services by German banks , 1999 .

[11]  Eric A. Walden,et al.  Intellecutal Property Rights and Cannibalization in Information Technology Outsourcing Contracts , 2005, MIS Q..

[12]  Vijay Mahajan,et al.  New Product Diffusion Models in Marketing: A Review and Directions for Research: , 1990 .

[13]  Martha Crenshaw,et al.  Rejoinder to “Observations on ‘Why Violence Spreads’” , 1980 .

[14]  Robert A. Peterson,et al.  Models for innovation diffusion , 1985 .

[15]  Ricardo Fraiman,et al.  Testing statistical hypothesis on random trees , 2006 .

[16]  N. Venkatraman,et al.  Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis , 2011, J. Manag. Inf. Syst..

[17]  Suzanne Rivard,et al.  Assessing the risk of IT outsourcing , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[18]  Qing Hu,et al.  Research Report: Diffusion of Information Systems Outsourcing: A Reevaluation of Influence Sources , 1997, Inf. Syst. Res..

[19]  William H. DeLone Firm Size and the Characteristics of Computer Use , 1981, MIS Q..

[20]  Brian Rowan Organizational Structure and the Institutional Environment: The Case of Public Schools. , 1982 .

[21]  Nigel Meade,et al.  Technological Forecasting-Model Selection, Model Stability, and Combining Models , 1998 .

[22]  E. Lehmann,et al.  Testing Statistical Hypothesis. , 1960 .

[23]  Robert J. Kauffman,et al.  Understanding early diffusion of digital wireless phones , 2009 .

[24]  Robert J. Kauffman,et al.  Returns to Information Technology Outsourcing , 2011 .

[25]  D. Marquardt An Algorithm for Least-Squares Estimation of Nonlinear Parameters , 1963 .

[26]  Izak Benbasat,et al.  Predicting Intention to Adopt Interorganizational Linkages: An Institutional Perspective , 2003, MIS Q..

[27]  Leslie P. Willcocks,et al.  An Empirical Investigation of Information Technology Sourcing Practices: Lessons From Experience , 1998, MIS Q..

[28]  Eduardo S. Schwartz,et al.  Investment Under Uncertainty. , 1994 .

[29]  Leslie P. Willcocks,et al.  Exploring relationships in IT outsourcing: the interaction approach , 2002 .

[30]  R. Rossiter,et al.  Fisher Ideal Indexes in the National Income and Product Accounts , 2000 .

[31]  Charlotte H. Mason,et al.  Technical Note---Nonlinear Least Squares Estimation of New Product Diffusion Models , 1986 .

[32]  Stijn Claessens,et al.  Contagion: Understanding How It Spreads , 2000 .

[33]  L. L. Cummings,et al.  Strategic Response to Institutional Influences on Information Systems Outsourcing , 1997 .

[34]  Ken Peffers,et al.  Competitor and vendor influence on the adoption of innovative applications in electronic commerce , 1998, Inf. Manag..

[35]  Virginia Gray,et al.  Innovation in the States: A Diffusion Study , 1973, American Political Science Review.

[36]  Jeffrey H. Rohlfs A theory of interdependent demand for a communications service , 1974 .

[37]  David Collier,et al.  Prerequisites Versus Diffusion: Testing Alternative Explanations of Social Security Adoption , 1975, American Political Science Review.

[38]  Kunsoo Han,et al.  Returns to Information Technology Outsourcing , 2011 .

[39]  Rajiv Kishore,et al.  The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study , 2009, MIS Q..

[40]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[41]  Robert G. Fichman,et al.  Going Beyond the Dominant Paradigm for Information Technology Innovation Research: Emerging Concepts and Methods , 2004, J. Assoc. Inf. Syst..

[42]  M.Nawaz Sharif,et al.  The Weibull distribution as a general model for forecasting technological change , 1980 .

[43]  S. Thompson Social Learning Theory , 2008 .

[44]  J. Aitchison,et al.  The lognormal distribution : with special reference to its uses in economics , 1957 .

[45]  Frank M. Bass,et al.  A New Product Growth for Model Consumer Durables , 2004, Manag. Sci..

[46]  Martha Crenshaw,et al.  Why Violence SpreadsThe Contagion of International Terrorism , 1980 .

[47]  Henrich R. Greve,et al.  Jumping Ship: The Diffusion of Strategy Abandonment , 1995 .