A Comparison of the Risks in Information Technology Outsourcing and Business Process Outsourcing

While the issue of risk in information technology outsourcing (ITO) is addressed by numerous authors, the risks of business process outsourcing (BPO) are essentially unexplored. The authors propose that the risk structure of ITO is different compared to the one in BPO, the latter therefore requiring additional research. To challenge this proposition the major risks of ITO have been derived from literature and were assessed whether they apply differently to BPO engagements. The assessment has been conducted via structured interviews with senior business and risk mangers of BPO service providers and BPO customers. Our findings indicate that, although the individual risk types are generally the same, they differ significantly in tendency. Fifteen individual risks were analyzed and the findings were that in BPO compared to ITO, two risks are classified to have a tendency to be lower and eleven risks are classified to have a tendency to be higher. Only two risks were seen to generally be the same in BPO as with ITO. Additionally, a risk type has been identified which was not formerly reported in outsourcing, namely the misuse of trust regarding sensitive data.

[1]  Leslie P. Willcocks,et al.  Commercializing the Back Office at Lloyds of London:: Outsourcing and Strategic Partnerships Revisited , 2004 .

[2]  Leslie P. Willcocks,et al.  Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA , 1999, J. Strateg. Inf. Syst..

[3]  T. Kern The Gestalt of an information technology outsourcing relationship: an exploratory analysis , 1997, ICIS '97.

[4]  S. Rivard,et al.  Série Scientifique Scientific Series Managing It Outsourcing Risk: Lessons Learned Managing It Outsourcing Risk: Lessons Learned , 2022 .

[5]  B. Bahli,et al.  A Validation of Measures Associated with the Risk Factors in Information Technology Outsourcing , 2003 .

[6]  Leslie P. Willcocks,et al.  Application Service Provision: Risk Assessment and Mitigation , 2002, MIS Q. Executive.

[7]  Heiko Gewald,et al.  The Influence of Percieved Risk and Perceived Usefulness on Manager's Attitude Towards Business Process Outsourcing , 2005, AMCIS.

[8]  Anne C. Rouse,et al.  AIS Electronic Library (AISeL) , 2000 .

[9]  F. Duhamel,et al.  Bringing Together Strategic Outsourcing and Corporate Strategy : Outsourcing Motives and Risks , 2003 .

[10]  Leon A. de Looff,et al.  Information systems outsourcing decision making: a framework organizational theories and case studies , 1995, J. Inf. Technol..

[11]  Abdulwahed Mohammed Khalfan,et al.  Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors , 2004, Int. J. Inf. Manag..

[12]  M. J. Earl,et al.  The Risks of Outsourcing IT , 1996 .

[13]  Ying Fan STRATEGIC OUTSOURCING: , 2007 .

[14]  Leslie P. Willcocks,et al.  Exploring ASP as sourcing strategy: theoretical perspectives, propositions for practice , 2002, J. Strateg. Inf. Syst..

[15]  Mary Lacity,et al.  Lessons in Global Information Technology Sourcing , 2002, Computer.

[16]  Mihir A. Parikh,et al.  A Process View of Information Systems Outsourcing Research: Conceptual Gaps and Future Research Directions , 2004, AMCIS.

[17]  Leslie P. Willcocks,et al.  IT and business process outsourcing: the knowledge potential , 2004 .

[18]  John Hood,et al.  Risk and the Outsourcing of Risk Management Services: The Case of Claims Management , 2003 .

[19]  Anne C. Rouse,et al.  Minimising risks in IT outsourcing: Choosing target services , 2003, PACIS.

[20]  J. Barthélemy,et al.  IT outsourcing:: Evidence from France and Germany , 2001 .

[21]  John K. Halvey,et al.  Business Process Outsourcing: Process, Strategies, and Contracts , 1999 .