Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

PDF

California State University, San Bernardino

2006

Outsourcing

Articles 1 - 2 of 2

Full-Text Articles in Business

Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach Jan 2006

Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach

Journal of International Technology and Information Management

Global Information Technology (IT) outsourcing has been recognized to have important potential benefits. However, researchers and practitioners also recognize potential risks involved in global IT outsourcing, which sometimes lead to undesirable consequences. This paper develops a model to assess risks in global IT outsourcing. Specifically, this paper begins by identifying global IT outsourcing risk factors by considering the national infrastructure, organizational infrastructure, and project environment. Second, a Global IT Outsourcing (GITO) engagement model for risk assessment is developed to logically link all these risk factors together. Third, one quantifiable approach based on a relative-weighted assessment model is presented to demonstrate …


Theoretical And Pragmatic Framework For Outsourcing Of It Services, Haidar M. Fraihat Jan 2006

Theoretical And Pragmatic Framework For Outsourcing Of It Services, Haidar M. Fraihat

Journal of International Technology and Information Management

Since previous research in the information technology (IT) field focused on successes and failures of IT outsourcing (ITO) by organizations, this paper investigates the critical success factors (CSF) for IT outsourcing in the existing global environment. It is intended to provide assistance for the consideration of business professionals and IT managers when they make, examine or evaluate ITO decisions. Fifty four IT outsourcing CSFs were identified through an extensive literature review research. Some of the factors were utilized more frequently than others, while some CSFs have been given more importance than other by IT researchers. A 2-part theoretical framework (conceptual …