Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA

Abstract The origins and history of a single case study of large-scale Information Technology (IT) outsourcing in the 1994–99 period is investigated in the United Kingdom Defence sector. Such deals are high risk and the paper describes types of risk and how the client organization sought to mitigate these. These risks and mitigation approaches are then analysed against a distinctive risk framework formulated for IT outsourcing. Risks emerging in terms of type and scope of outsourcing, vendor selection criteria and process, the role of the contract, retained capabilities and management processes, and partnering and relationship dimensions are then assessed against prior research findings. Two additional distinctive risks are identified from the case history arising from the public sector context and supplier long-term market strategy. A contribution of the paper is the revised risk framework for analysing IT outsourcing that is then presented. Finally, the implications of these findings for future research and practice are highlighted.

[1]  Lawrence Loh,et al.  Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect , 1992, Inf. Syst. Res..

[2]  L. Willcocks Managing information systems in UK public administration: Issues and prospects , 1994 .

[3]  R. Klepper,et al.  Outsourcing information technology, systems and services , 1998 .

[4]  Craig Smith The case study: a useful research method for information management , 1990, J. Inf. Technol..

[5]  John Sharp,et al.  A framework for deciding what to outsource in information technology , 1995, J. Inf. Technol..

[6]  Leslie P. Willcocks,et al.  Global IT outsourcing: search for business advantage , 2001 .

[7]  Leslie P. Willcocks,et al.  The Enabling and Determining Environment: Neglectied Issues in an I.S. Outsourcing Strategy , 1996, ECIS.

[8]  Edward M. Roche,et al.  Global Software Teams , 1999 .

[9]  O. Williamson,et al.  The mechanisms of governance , 1996 .

[10]  R. Hirschheim,et al.  Information systems outsourcing : myths, metaphors, and realities , 1993 .

[11]  Leslie P. Willcocks,et al.  The Relationship Advantage: Information Technologies, Sourcing, and Management , 2001 .

[12]  Leslie P. Willcocks,et al.  An Empirical Investigation of Information Technology Sourcing Practices: Lessons From Experience , 1998, MIS Q..

[13]  Robert White,et al.  The Outsourcing Manual , 1996 .

[14]  M. J. Earl,et al.  The Risks of Outsourcing IT , 1996 .

[15]  Detmar W. Straub,et al.  Production and Transaction Economies and IS Outsourcing: A Study of the U.S. Banking Industry , 1998, MIS Q..

[16]  Leslie P. Willcocks,et al.  Strategic sourcing of information systems , 1998 .

[17]  Anthony DiRomualdo,et al.  Strategic Intent for IT Outsourcing , 1998 .

[18]  R. Klepper Outsourcing relationships , 1995 .

[19]  J. C. Henderson PLUGGING INTO STRATEGIC PARTNERSHIPS: THE CRITICAL IS CONNECTION , 1990 .

[20]  Harold A. Linstone,et al.  Technological forecasting and social change , 2011 .

[21]  R. Nolan,et al.  How to Manage an IT Outsourcing Alliance , 1995 .

[22]  Thomas H. Davenport,et al.  Rigor vs. relevance revisited: response to Benbasat and Zmud , 1999 .

[23]  Dirk Deschoolmeester,et al.  The dynamics of an outsourcing relationship: a case in the Belgian food industry , 1993 .

[24]  Kalle Lyytinen,et al.  Attention Shaping and Software Risk - A Categorical Analysis of Four Classical Risk Management Approaches , 1998, Inf. Syst. Res..

[25]  Guy Fitzgerald,et al.  Contracts and Partnerships in the Outsourcing of IT , 1994, ICIS.

[26]  Barbara L. Marcolin,et al.  Financial and strategic motivations behind IS outsourcing , 1995, J. Inf. Technol..

[27]  Leslie P. Willcocks,et al.  IT outsourcing in insurance services: risk, creative contracting and business advantage , 1999, Inf. Syst. J..

[28]  B. Galliers,et al.  The Journal of Strategic Information Systems , 1996 .

[29]  Guy Fitzgerald,et al.  Information technology outsourcing in Europe and the USA: Assessment issues , 1995 .

[30]  Guy Fitzgerald,et al.  IT outsoursing in Europe and the USA: Assessment issues , 1995, ECIS.

[31]  L. Willcocks,et al.  The Value of Selective IT Sourcing , 1996 .

[32]  Wendy L. Currie,et al.  New strategies in it outsourcing : major trends and global best practice , 1997 .

[33]  B. Boehm Software risk management: principles and practices , 1991, IEEE Software.

[34]  Guy Fitzgerald,et al.  Outsourcing IT: The strategic implications , 1995 .

[35]  James W. Fairfield-Sonn,et al.  The Awakening Giant: Continuity and Change in ICI. , 1987 .

[36]  Leslie P. Willcocks,et al.  Predicting risk of failure in large-scale Information Technology projects , 1994 .

[37]  L. Willcocks,et al.  Beyond the It Productivity Paradox , 1999 .

[38]  Geoff Walsham,et al.  GIS for District-Level Administration in India: Problems and Opportunities , 1999, MIS Q..

[39]  L. Willcocks,et al.  Information Technology in Public Services: Towards the Contractual Organization? , 1997 .

[40]  Izak Benbasat,et al.  Empirical Research in Information Systems: The Practice of Relevance , 1999, MIS Q..

[41]  Robert Klepper The management of partnering development in I/S outsourcing , 1995, J. Inf. Technol..

[42]  Robert N. Charette,et al.  Applications Strategies for Risk Analysis , 1990 .

[43]  M. Jelinek Managing change for competitive success , 1993 .

[44]  Allen S. Lee Rigor and relevance in MIS research: beyond the approach of positivism alone , 1999 .

[45]  R. L. Huber How Continental Bank outsourced its "crown jewels.". , 1993, Harvard business review.

[46]  Donald A. Marchand,et al.  Mastering Information Management , 2000 .

[47]  Leslie P. Willcocks,et al.  Risk assessment and information systems , 1993, ECIS.

[48]  L. Willcocks,et al.  Core IS Capabilities for Exploiting Information Technology , 1998 .

[49]  Leslie P. Willcocks,et al.  Co-operative partnership and ‘total’ IT outsourcing: From contractual obligation to strategic alliance? , 1995 .

[50]  Patricia F. Sanders Phenomenology: A New Way of Viewing Organizational Research , 1982 .

[51]  J. Cross IT Outsourcing: British Petroleum's Competitive Approach , 1995 .

[52]  J. Rockart,et al.  EIGHT IMPERATIVES FOR THE NEW IT ORGANIZATION , 1996 .

[53]  L. Willcocks,et al.  To outsource IT or not?: recent research on economics and evaluation practice , 1996 .

[54]  Guy Fitzgerald,et al.  IT outsourcing and the changing shape of the information systems function , 1996 .

[55]  Alison M. Keyes,et al.  Beyond the Information Systems Outsourcing Bandwagon: s The Insourcing Response, by Mary Celia Lacity and Rudy Hirschheim , 1996, J. Am. Soc. Inf. Sci..

[56]  Leslie P. Willcocks,et al.  IT outsourcing as strategic partnering: the case of the UK Inland Revenue , 1998, ECIS.

[57]  A. Pettigrew Longitudinal Field Research on Change: Theory and Practice , 1990 .

[58]  Mark Keil,et al.  Pulling the Plug: Software Project Management and the Problem of Project Escalation , 1995, MIS Q..

[59]  Lorin M. Hitt,et al.  Beyond the productivity paradox , 1998, CACM.

[60]  Jaak Jurison The role of risk and return in information technology outsourcing decisions , 1995, J. Inf. Technol..