Outsourcing Competence

The topic of this paper, competences needed for outsourcing, is organized by first providing a generic competence scheme, which is subsequently instantiated to the area of sourcing and outsourcing. Sourcing and outsourcing are positioned as different areas of activity, neither one of which is subsumed under the other one. It is argued that competences relevant for outsourcing are mainly community based rather than evidence based. Subjective ability and objective ability are distinguished as categories, together making up ability, which are distinct but not necessarily disjoint from competence. Conjectural ability is introduced as a form of subjective ability. A person’s competence profile includes competences as well as abilities, including subjective ones. Competence assessment and acquisition as well as the impact of assessed competence on practical work is described. The analysis of competence and ability thus developed is used as standpoint from which to extract a specification of an audience for a theory of outsourcing, yet to be written. Moreover, it allows to formulate requirements for and in preparation of the development of an outsourcing theory. Formulating these requirements is done under the assumption that a person’s awareness of a theory of outsourcing is expected to strengthen that person’s outsourcing competence profile. This work has been performed in the context of Symbiosis, an NWO funded project (NWO is The Netherlands Organisation for Scientific Research), which focuses on software process outsourcing. The title is ambiguous, it can be disambiguated as follows: X-competence where “X = outsourcing”. When making reference to this paper we will refer to the authors as J.A. Bergstra, G.P.A.J. Delen, and S.F.M. van Vlijmen. Here Jan abbreviates Johannes and Bas abbreviates Sebastiaan as is customary in Dutch.

[1]  J. D. Trout Scientific Explanation And The Sense Of Understanding* , 2002, Philosophy of Science.

[2]  Stephen L. Vargo,et al.  Evolving to a New Dominant Logic for Marketing , 2004 .

[3]  Clayton M. Christensen,et al.  The Process of Building Theory , 2001 .

[4]  Thomas G Rundall,et al.  Evidence-based management. , 2007, Hospitals & health networks.

[5]  Barry Turner,et al.  Some practical aspects of qualitative data analysis: One way of organising the cognitive processes associated with the generation of grounded theory , 1981 .

[6]  Robert K. Perrons,et al.  The role of clockspeed in outsourcing decisions for new technologies: insights from the prisoner's dilemma , 2004, Ind. Manag. Data Syst..

[7]  Fabrizio Macagno,et al.  Defeasible Classifications and Inferences from Definitions , 2010 .

[8]  Tracy Hill Strategy and performance , 2012 .

[9]  Lisa Kreeger Inside outsourcing: A grounded theory of relationship formation within a nascent service system , 2007 .

[10]  R. Hirschheim,et al.  Information systems outsourcing : myths, metaphors, and realities , 1993 .

[11]  David Robotham,et al.  Competences: measuring the unmeasurable , 1996 .

[12]  B. Waller Classifying and Analyzing Analogies , 2001 .

[13]  Ronald Schettkat Something unforeseeable happened? Natural rate theory and economic crisis , 2010 .

[14]  E.J.J. Beulen,et al.  Outsourcing van IT - Management Guide , 2006 .

[15]  Lawrence Loh,et al.  Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect , 1992, Inf. Syst. Res..

[16]  Jan A. Bergstra,et al.  Introducing Sourcements , 2011, ArXiv.

[17]  Guus Delen Decision and Control Factors for IT-sourcing , 2008 .

[18]  Handbook of Network and System Administration , 2011 .

[19]  Jan A. Bergstra,et al.  Thread algebra for strategic interleaving , 2007, Formal Aspects of Computing.

[20]  Mahen Tampoe,et al.  Exploiting the core competences of your organization , 1994 .

[21]  Evan H. Magill,et al.  Feature Interactions in Telecommunications and Software Systems VI, May 17-19, 2000, Glasgow, Scotland, UK , 2000, FIW.

[22]  J. U. Nielsen,et al.  The EU public procurement regime— Does it work? , 2001 .

[23]  Huw Richards,et al.  Strategy and Performance: Competing through Competences , 2002 .

[24]  Alexandra Van den Abbeele,et al.  Public procurement of consulting services: Evidence and comparison with private companies , 2006 .

[25]  Jan A. Bergstra,et al.  Informal Control code logic , 2010, ArXiv.

[26]  Jan A. Bergstra,et al.  Business Mereology: Imaginative Definitions of Insourcing and Outsourcing Transformations , 2010, ArXiv.

[27]  K. Parry Grounded theory and social process: A new direction for leadership research , 1998 .

[28]  Jan A. Bergstra,et al.  Machine structure oriented control code logic , 2007, Acta Informatica.

[29]  Irene van Staveren Home Care Reform in the Netherlands: Impacts on Unpaid Care in Rotterdam , 2009 .

[30]  Quint Wellington Redwood,et al.  Improving offshore outsourcing success with Carnegie Mellons eSourcing Capability Model , 2007 .

[31]  Mark Burgess System Administration and the Scientific Method , 2008 .

[32]  Ronald A. Ash,et al.  THE PRACTICE OF COMPETENCY MODELING , 2000 .

[33]  Leslie P. Willcocks,et al.  Exploring information technology outsourcing relationships: theory and practice , 2000, J. Strateg. Inf. Syst..