The Influential Role of Perceived Risks versus Perceived Benefits in the Acceptance of Business Process Outsourcing: Empirical Evidence from the German Banking Industry

Business process outsourcing (BPO) has been suggested as one of the biggest areas of growth in the outsourcing market. Nevertheless, many organizations are still reluctant to outsource business processes that are part of their core business. In order to help overcome this divergence between expectations and reality, we systematically analyze the factors that form an organization’s attitude towards BPO as well as their intention to adopt BPO. We develop a BPO adoption model which is based on the argument that BPO poses both risks and benefits and that decision makers need to balance both before adopting BPO. The model is tested based on data that was collected in the German Banking Industry. Altogether 218 data points on the perceptions of business managers in the four areas of transaction processing (credits, securities, domestic payments, and foreign exchange/money market) were available for model testing via Partial Least Squares. The results show that the intention to outsource these IT-intensive business processes is strongly influenced by the manager’s attitude towards BPO. Other non-rational factors play a minor role. Only peer influences in the banking industry were found to significantly influence intentions. Around 77 percent of the variations in attitude are explained by perceived risks and perceived benefits. The perceived benefits have a much stronger influence on BPO acceptance than risks. This indicates that risks may be somewhat underrepresented in the adoption process. Moreover, it is instructive to note that the ability to focus on core competencies is the strongest advantage for BPO, followed by quality improvements and cost transparency. Interestingly, anticipated cost reductions have less influence than the previous three factors, and access to better resources plays no role in attitude formation. On the other hand, overall BPO risks are clearly dominated by financial risks. Strategic risks are also important and, to a lesser extent, performance risks, while psychosocial risks and privacy risks are not significant predictors. These findings support the recommendation that providers of BPO services should emphasize risk mitigation proposals in their offerings.

[1]  Barbara L. Marcolin,et al.  Financial and strategic motivations behind IS outsourcing , 1995, J. Inf. Technol..

[2]  Rudy Hirschheim,et al.  The myths and realities of information technology insourcing , 2000, CACM.

[3]  Jochen Franke,et al.  A Comparison of the Risks in Information Technology Outsourcing and Business Process Outsourcing , 2005, AMCIS.

[4]  Jeanne W. Ross,et al.  Preparing for utility computing: The role of IT architecture and relationship management , 2004, IBM Syst. J..

[5]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[6]  L. L. Cummings,et al.  Strategic Response to Institutional Influences on Information Systems Outsourcing , 1997 .

[7]  M. Machina,et al.  Decision-Making in the Presence of Risk , 1987, Science.

[8]  Marion G. Sobol,et al.  IS outsourcing practices in the USA, Japan and Finland: a comparative study , 1997, J. Inf. Technol..

[9]  R. Hirschheim,et al.  Information systems outsourcing : myths, metaphors, and realities , 1993 .

[10]  N. Venkatraman Beyond Outsourcing: Managing IT Resources as a Value Center , 1997 .

[11]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[12]  I. Ajzen The theory of planned behavior , 1991 .

[13]  Suzanne Rivard,et al.  Assessing the risk of IT outsourcing , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[14]  U. Bongartz,et al.  Transaktionsbanking quo vadis , 2004 .

[15]  Jeanne W. Ross,et al.  From the Vendor's Perspective: Exploring the Value Proposition in Information Technology Outsourcing 1, 2 , 2003 .

[16]  Fenio Annansingh,et al.  Risk management practices in IS outsourcing: an investigation into commercial banks in Nigeria , 2004, Int. J. Inf. Manag..

[17]  Qing Hu,et al.  Research Report: Diffusion of Information Systems Outsourcing: A Reevaluation of Influence Sources , 1997, Inf. Syst. Res..

[18]  H.-J. Lamberti,et al.  Die Industrialisierung des Backoffice am Beispiel der etb , 2004 .

[19]  Varun Grover,et al.  The Effect of Service Quality and Partnership on the Outsourcing of Information Systems Functions , 1996, J. Manag. Inf. Syst..

[20]  Bandula Jayatilaka,et al.  Information systems outsourcing: a survey and analysis of the literature , 2004, DATB.

[21]  Young-Gul Kim,et al.  Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation , 1999, J. Manag. Inf. Syst..

[22]  Wendy L. Currie,et al.  Vendor Strategies for Business Process and Applications Outsourcing: Recent Findings from Field Research , 2003 .

[23]  John K. Halvey,et al.  Business Process Outsourcing: Process, Strategies, and Contracts , 1999 .

[24]  Markus Lammers,et al.  Make, Buy or Share , 2004, Wirtschaftsinf..

[25]  M. Featherman,et al.  EXTENDING THE TECHNOLOGY ACCEPTANCE MODEL BY INCLUSION OF PERCEIVED RISK , 2001 .

[26]  T. M. Rajkumar,et al.  An Empirical Study of the Applicability of the Technology Acceptance Model to Application Development Outsourcing Decisions , 2003, AMCIS.

[27]  Mauricio Featherman,et al.  The intangibility of E-services: effects on artificiality, perceived risk, and adoption , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[28]  Leslie P. Willcocks,et al.  Analysing four types of IT sourcing decisions in the context of scale, client/supplier interdependency and risk mitigation , 1998, Inf. Syst. J..

[29]  Volker Stadler,et al.  ICT and operations outsourcing in banking , 2003, Wirtschaftsinf..

[30]  J. P. Peter Reliability: A Review of Psychometric Basics and Recent Marketing Practices , 1979 .

[31]  Rudy Hirschheim,et al.  REALIZING OUTSOURCING EXPECTATIONS Incredible Expectations, Credible Outcomes , 1994 .

[32]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[33]  A. Hackethal German Banks and Banking Structure , 2004 .

[34]  J. Jurison Applying Traditional Risk-Return Analysis to Strategic IT Outsourcing Decisions , 2002 .

[35]  Leslie P. Willcocks,et al.  IT and business process outsourcing: the knowledge potential , 2004 .

[36]  Anne C. Rouse,et al.  AIS Electronic Library (AISeL) , 2000 .

[37]  Dalvinder Singh Outsourcing in Financial Services , 2005 .

[38]  A. Rasheed,et al.  Rational decision‐making and firm performance: the moderating role of the environment , 1997 .

[39]  Rafael Repullo,et al.  Capital Requirements, Market Power and Risk-Taking in Banking , 2003 .

[40]  Lawrence Loh,et al.  An Organizational-Economic Blueprint for Information Technology Outsourcing: Concepts and Evidence , 1994, ICIS.

[41]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[42]  Shyam Sunder,et al.  Financial services business process outsourcing , 2004, CACM.

[43]  S. Rivard,et al.  Série Scientifique Scientific Series Managing It Outsourcing Risk: Lessons Learned Managing It Outsourcing Risk: Lessons Learned , 2022 .

[44]  R. L. Huber How Continental Bank outsourced its "crown jewels.". , 1993, Harvard business review.

[45]  Michael J. Ryan,et al.  An Investigation of Perceived Risk at the Brand Level , 1976 .

[46]  Jaak Jurison The role of risk and return in information technology outsourcing decisions , 1995, J. Inf. Technol..

[47]  Robert W. Zmud,et al.  The outsourcing of information services: transforming the nature of business in the information industry , 1995, J. Inf. Technol..

[48]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[49]  F. Duhamel,et al.  Bringing Together Strategic Outsourcing and Corporate Strategy : Outsourcing Motives and Risks , 2003 .

[50]  Jos van Hillegersberg,et al.  New Architectures for Financial Services , 2004 .

[51]  Herbert Zerwas,et al.  Outsourcing bei Instituten in Deutschland , 2002 .

[52]  Andreas Hackethal,et al.  Vertical Integration and Bank Performance , 2005, Wirtschaftsinformatik.

[53]  Abdulwahed Mohammed Khalfan,et al.  Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors , 2004, Int. J. Inf. Manag..

[54]  Leslie P. Willcocks,et al.  Commercializing the Back Office at Lloyds of London:: Outsourcing and Strategic Partnerships Revisited , 2004 .

[55]  Leslie P. Willcocks,et al.  Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA , 1999, J. Strateg. Inf. Syst..

[56]  C. Saunders,et al.  Achieving Success in Information Systems Outsourcing , 1997 .

[57]  B. Bahli,et al.  A Validation of Measures Associated with the Risk Factors in Information Technology Outsourcing , 2003 .

[58]  Hiroyuki Tamura,et al.  Behavioral models for complex decision analysis , 2005, Eur. J. Oper. Res..

[59]  A. Kakabadse,et al.  Trends in Outsourcing:: Contrasting USA and Europe , 2002 .

[60]  Mary Lacity,et al.  Lessons in Global Information Technology Sourcing , 2002, Computer.

[61]  Leslie P. Willcocks,et al.  Global Information Technology Outsourcing: In Search of Business Advantage , 2001 .

[62]  Heiko Gewald,et al.  A Framework for Classifying the Operational Risks of Outsourcing - Integrating Risks from Systems, Processes, People and External Events within the Banking Industry , 2004, PACIS.

[63]  P. Pavlou INTEGRATING TRUST IN ELECTRONIC COMMERCE WITH THE TECHNOLOGY ACCEPTANCE MODEL: MODEL DEVELOPMENT AND VALIDATION , 2001 .

[64]  T. M. Rajkumar,et al.  The Application Development Outsourcing Decision: An Application of the Technology Acceptance Model , 2002, J. Comput. Inf. Syst..

[65]  Suzanne Rivard,et al.  Managing the Risk of IT Outsourcing , 1999, HICSS.

[66]  M. J. Earl,et al.  The Risks of Outsourcing IT , 1996 .

[67]  Leslie P. Willcocks,et al.  An Empirical Investigation of Information Technology Sourcing Practices: Lessons From Experience , 1998, MIS Q..

[68]  R. Nolan,et al.  How to Manage an IT Outsourcing Alliance , 1995 .

[69]  Leslie P. Willcocks,et al.  Risk assessment and information systems , 1993, ECIS.

[70]  R. Bagozzi,et al.  Representing and testing organizational theories: A holistic construal. , 1982 .

[71]  Lawrence Loh,et al.  Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect , 1992, Inf. Syst. Res..

[72]  Ramiro Montealegre,et al.  De-escalating Information Technology Projects: Lessons from the Denver International Airport , 2000, MIS Q..

[73]  Detmar W. Straub,et al.  Production and Transaction Economies and IS Outsourcing: A Study of the U.S. Banking Industry , 1998, MIS Q..