The Impact of Contract Design on Outsourcing Success: Case Studies on Risk Mitigation Measures

From the outsourcer’s perspective, the outsourcing literature emphasizes the importance of contracts and risk awareness for managing outsourcing ventures. However, there is a lack of theoretical foundation with regard to the importance of risk and contract design towards outsourcing success. By extending the risk model of Bahli and Rivard (2001) we aim at answering the following questions: (1) ‘how does the design of the outsourcing contract impact on outsourcing risk?’ and (2) ‘how, in turn, does outsourcing risk affect outsourcing success?’. Based on multiple case studies of Business Process Outsourcing (BPO) arrangements, our results show that the ‘complementarity’ of contract clauses — Service Level Agreements, PenaltyReward-Systems, and Pricing — is important to contractually implement risk mitigation. Furthermore, by synchronizing the objectives of the inand outsourcer ex ante resulting in specific contract clauses which compensate for losses ex post, the existence of risk and its impact on outsourcing success can be limited.

[1]  C. Saunders,et al.  Achieving Success in Information Systems Outsourcing , 1997 .

[2]  T. Kern The Gestalt of an information technology outsourcing relationship: an exploratory analysis , 1997, ICIS '97.

[3]  K. Eisenhardt Agency Theory: An Assessment and Review , 1989 .

[4]  R. Hirschheim,et al.  Information systems outsourcing : myths, metaphors, and realities , 1993 .

[5]  Leslie P. Willcocks,et al.  IT outsourcing as strategic partnering: the case of the UK Inland Revenue , 1998, ECIS.

[6]  Leslie P. Willcocks,et al.  The Relationship Advantage: Information Technologies, Sourcing, and Management , 2001 .

[7]  Suzanne Rivard,et al.  The information technology outsourcing risk: a transaction cost and agency theory-based perspective , 2003, J. Inf. Technol..

[8]  Suzanne Rivard,et al.  Characteristics of IT outsourcing contracts , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[9]  Barbara L. Marcolin,et al.  Effective IT outsourcing arrangements , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[10]  Leslie P. Willcocks,et al.  The Relationship Advantage: Information Technologies, Sourcing, and Management , 2002 .

[11]  Peter B. Seddon,et al.  Impact of Configuration on IT Outsourcing Relationships , 2004, AMCIS.

[12]  Heiko Gewald,et al.  A Framework for Classifying the Operational Risks of Outsourcing - Integrating Risks from Systems, Processes, People and External Events within the Banking Industry , 2004, PACIS.

[13]  Suzanne Rivard,et al.  Toward an Assessment of Software Development Risk , 1993, J. Manag. Inf. Syst..

[14]  Varun Grover,et al.  The Effect of Service Quality and Partnership on the Outsourcing of Information Systems Functions , 1996, J. Manag. Inf. Syst..

[15]  Suzanne Rivard,et al.  Assessing the risk of IT outsourcing , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[16]  KA Thleen,et al.  Building Theories from Case Study , 2007 .

[17]  Pieter M. A. Ribbers,et al.  Managing complex IT outsourcing-partnerships , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[18]  Suzanne Rivard,et al.  An Assessment of Information Technology Outsourcing Risk , 2001, ICIS.

[19]  S. Rivard,et al.  Série Scientifique Scientific Series Managing It Outsourcing Risk: Lessons Learned Managing It Outsourcing Risk: Lessons Learned , 2022 .

[20]  Rajiv Kishore,et al.  Management of Information Technology Outsourcing Relationships: The Role of Service Level Agreements , 2004, ICIS.

[21]  M. Lynn Hawaii International Conference on System Sciences , 1996 .

[22]  L. Willcocks,et al.  Information Technology in Public Services: Towards the Contractual Organization? , 1997 .

[23]  Suzanne Rivard,et al.  A framework for information technology outsourcing risk management , 2005, DATB.

[24]  Rajiv D. Banker,et al.  Performance Evaluation Metrics for Information Systems Development: A Principal-Agent Model , 2015, Inf. Syst. Res..

[25]  Denzil G. Fiebig,et al.  Modelling the price, performance and contract characteristics of IT outsourcing , 2000, J. Inf. Technol..

[26]  M. J. Earl,et al.  The Risks of Outsourcing IT , 1996 .

[27]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[28]  John K. Halvey,et al.  Business Process Outsourcing: Process, Strategies, and Contracts , 1999 .

[29]  Leslie P. Willcocks,et al.  ITsourcing reflections Lessons for customers and suppliers WI – Schwerpunktaufsatz , 2012 .

[30]  Leslie P. Willcocks,et al.  Exploring information technology outsourcing relationships: theory and practice , 2000, J. Strateg. Inf. Syst..

[31]  Suzanne Rivard,et al.  Managing the Risk of IT Outsourcing , 1999, HICSS.

[32]  G. Hult,et al.  Impact of Organizational and Contract Flexibility on Outsourcing Contracts , 1998 .

[33]  J. Cross IT Outsourcing: British Petroleum's Competitive Approach , 1995 .

[34]  Bandula Jayatilaka,et al.  Information systems outsourcing: a survey and analysis of the literature , 2004, DATB.

[35]  Anthony Wensley,et al.  Game theory as a tool for understanding information services outsourcing , 1997, J. Inf. Technol..

[36]  Young-Gul Kim,et al.  Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation , 1999, J. Manag. Inf. Syst..

[37]  R. Nolan,et al.  How to Manage an IT Outsourcing Alliance , 1995 .

[38]  B. Bahli,et al.  A Validation of Measures Associated with the Risk Factors in Information Technology Outsourcing , 2003 .