Investigation and Prioritizing Outsourcing of Information and Communication Technology (ICT) Projects (Case Study: ICT Infrastructure Projects)

Document Type : Research Paper

Authors

1 MSc. Graduated In Information Technology Management, Institude of Higher Education of Mehralborz, Tehran, Iran

2 Assistant Prof ,Management Group ,Institude of Higher Education of Ershad, Damavand, Iran

Abstract

Outsourcing IT functions is being developed as a replacement for implementing IT projects or rendering IT services within organizations. Organizations’ past experiences in outsourcing indicate that this process poses variety of risks and problems. This study is aimed to identify and prioritize the risks of outsourcing IT infrastructure projects. Classifying risks of outsourcing along with incorporating thematic experts’ experiences through the Delphi method, reveals various risks associated with the employer and the contractor as the primary sources of risks as well as general risks and chronological risks which occur in the periods before, during and after contracts. A total of 22 main risks were identified and categorized. Afterwards, based on the opinions obtained from thematic experts and using the Analytic Hierarchy Process, different types of risks were prioritized. The results suggest that those risks arising due to failings of structure and content are more important than those of technical and contextual knowledge.

Keywords

Main Subjects


Abdullah, L. M. & Verner, J. M. (2008). Risk framework for outsourced strategic IT system development from the client perspective. Software Metrics European Forum, Milan, Italy.
Abdullah, L. M. & Verner, J. M. (2012). Analysis and application of an outsourcing risk framework. Journal of Systems and Software, 85(8): 1930-1952.
Akomode, O. J., Lees, B. & Irgens, C. (1998). Constructing customised models and providing information to support IT outsourcing decisions. Logistics Information Management, 11(2): 114-127.
Aundhe, M. D. & Mathew, S.K. (2009). Risks in offshore IT outsourcing: A service provider perspective. European Management Journal, 27 (6): 418-428.
Bahli, B. & Rivard, S. (2005). Validating measures of information technology outsourcing risk factors. Omega, 33(2): 175-187.
Bhattacharya, S., Behara, R.S. & Gundersen, D.E. (2003). Business risk perspectives on information systems outsourcing. International Journal of Accounting Information Systems, 4(1): 75-93.
Brandas, C. (2010). Risks and audit objectives for IT outsourcing. Informatica Economica Journal, 14(1): 113-118.
Chou, D. C. & Chou, A. Y. (2009). Information systems outsourcing life cycle and risks analysis. Computer Standards & Interfaces, 31(5): 1036-1043.
Cong, G. & Chen, T. (2014). A Novel Dynamic Algorithm for IT Outsourcing Risk Assessment Based on Transaction Cost Theory. Discrete Dynamics in Nature and Society 501:325890.
Currie, W. L. (2003). A knowledge-based risk assessment framework for evaluating web-enabled application outsourcing projects. International Journal of Project Management, 21(3): 207-217.
Lacity, M. C., Khan, S. A. & Willcocks, L.P. (2009). A review of the IT outsourcing literature: Insights for practice." The Journal of Strategic Information Systems, 18(3): 130-146.
Lingmin, J. & Ruiqiong, Z. (2014). ITO Risks Preliminary Analysis Model of IT Outsourcing Corporations in China.School of Informatics, Guangdong University.
Mikaeili, F. & Sedaghati, H. (2006). Assess the risks of outsourcing IT projects. Industrial Management Studies, 22(13): 19-40 (in Persian).
Nakatsu, R. T. & Iacovou, C. L. (2009). A comparative study of important risk factors involved in offshore and domestic outsourcing of software development projects: A two-panel Delphi study. Information & Management, 46(1): 57-68.
Satty, T. L. (1980). The analytic hierarchy process, New York: McGraw-Hill.
Tajari, J., Valmohammadi, C. & Mohammadi, M. (2014). Identification and Prioritization of Outsourcing Risks of Information Technology Projects (Case Study: Iran Technical and Vocational Universit). International Journal of Basic Sciences & Applied Research, 3 (2): 85-89.
Tesch, D., Kloppenborg, T. J. & Frolick, M. N. (2007). IT project risk factors: the project management professionals perspective. Journal of computer information systems, 47(4): 61-69.
Tho , I. (2005). Managing the risk of IT outsourcing, Butterworth-Heinemann.
Tschinkel, B. (2011). Information Technology Project Risk Management: How Risk Management Impacts the IT Project. Seidenberg School of CSIS, Pace University, White Plains, NY.
Venkatesh, V., Thong, J. Y. & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 36(1): 157-178.
Willcocks, L. P., Lacity, M. C. & Kern, T. (1999). Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA. The Journal of Strategic Information Systems, 8(3): 285-314.
Wu, D., Wu, D. D., Zhang, Y. & Olson, D. L. (2013). Supply chain outsourcing risk using an integrated stochastic-fuzzy optimization approach. Information Sciences, 235: 242-258.
Xi, X., Xu, Y. & Todo, H. (2013). The Present Situation of IT Outsourcing and Countermeasure. Journal of Software Engineering and Applications, 6 (8): 426.
Yang, C. & Huang, J.B. (2000). A decision model for IS outsourcing. International Journal of Information Management, 20(3): 225-239.