Abstract
In software development projects (SDP), both the supplier and the customer must share their business knowledge for reaching the project success. However, this business knowledge is an essential intellectual property, and thus needs protection from misuse. In this paper, we present an analysis of knowledge difficult to protect. We enact a strategy to achieve SDPs success despite these barriers. Our theoretical and empirical analysis also found that SDP success is largely an uncertainty problem between the contractual parties on the management level, and thus technical-organizational approaches alone are inadequate for achieving success. Based on property rights theory, we introduce two models for protecting knowledge depending on uncertainties. Our findings offer managers important insights how they can design and enact especially fixed-price contracts. Moreover, we show how the economic theories can enhance understanding of SDP dynamics and advance the development of a theory of effective control of SDP success.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Manifesto, C.: The Laws of Chaos and the CHAOS 100 Best PM Practices. The Standish Group International, Boston (2010)
El Emam, K., Koru, A.G.: A replicated survey of IT software project failures. IEEE Softw. 25(5), 84–90 (2008)
Dijkstra, E.W.: The humble programmer. Assoc. Comput. Mach. 15(10), 859–866 (1972)
Al-Ahmad, W., Al-Fagih, K., Khanfar, K., Alsamara, K., Abuleil, S., Abu-Salem, H.: A taxonomy of an IT project failure: root causes. Int. Manage. Rev. 5(1), 93–104 (2009)
Dwivedi, Y.K., Ravichandran, K., Williams, M.D., Miller, S., Lal, B., Antony, V., Muktha, K.: IS/IT project failures: a review of the extant literature for deriving a taxonomy of failure factors. IFIP Adv. Inf. Commun. Technol. 402, 73–88 (2013)
Chua, C.E.H., Lim, W.K., Soh, C., Sia, S.K.: Client strategies in vendor transition: a threat balancing perspective. J. Strateg. Inf. Syst. 21(1), 72–83 (2012)
Dey, D., Fan, M., Zhang, C.: Design and analysis of contracts for software outsourcing. Inf. Syst. Res. 21(1), 93–114 (2010)
Fink, L., Lichtenstein, Y.: Why project size matters for contract choice in software development outsourcing. Data Base Adv. Inf. Syst. 45(3), 54–71 (2014)
Chen, Y., Bharadwaj, A.: An empirical analysis of contract structures in IT outsourcing. Inf. Syst. Res. 20(4), 484–506 (2009)
Williamson, O.E.: The Economic Institutions of Capitalism. Firms, Markets, Relational Contracting, New York (1985)
Tiwana, A.: Beyond the black box: knowledge overlaps in software outsourcing. IEEE Softw. 21(5), 51–58 (2004)
Teece, D.J.: Strategies for managing knowledge assets: the role of firm structure and industrial context. Long Range Plan. 33(1), 35–54 (2000)
Norman, P.M.: Are your secrets safe? knowledge protection in strategic alliances. Bus. Horiz. 44(6), 51–60 (2001)
Hart, O., Moore, J.: Property rights and the nature of the firm. J. Polit. Econ. 98(6), 1119–1158 (1990)
Cole, D.H., Grossman, P.Z.: The meaning of property rights: law versus economics? Land Econ. 78(3), 317–330 (2002)
Benaroch, M., Lichtenstein, Y., Wyss, S.: Contract Design Choices in IT Outsourcing: New Lessons from Software Development Outsourcing Contracts, 20 April 2012. http://ssrn.com/abstract=2137174 or http://dx.doi.org/10.2139/ssrn.2137174
Aubert, B.A., Patry, M., Rivard, S.: A tale of two outsourcing contracts. An agency-theoretical perspective. Wirtschaftsinformatik 45, 181–190 (2003)
Lichtenstein, Y.: Puzzles in software development contracting. Commun. ACM 47(2), 61–65 (2004)
Beulen, E., Ribbers, P.: IT Outsourcing contracts: practical implications of the incomplete contract theory. Proceedings of the 36th HICSS (2003)
Osei-Bryson, K.M., Ngwenyama, O.: Using decision tree modelling to support Peircian abduction in IS research: a systematic approach for generating and evaluating hypotheses for systematic theory development. Inf. Syst. J. 21(5), 407–440 (2011)
Schurz, G.: Patterns of abduction. Synthese 164(2), 201–234 (2008)
Walton, D.: Abductive reasoning. University of Alabama Press, Tuscaloosa (2014)
Klammer, B.: Empirische Sozialforschung. Eine Einführung für Kommunikationswissenschaftler und Journalisten. Utb, Konstanz (2005)
Schnell, R., Hill, P., Esser, E.: Methoden der Sozialforschung, 9th edn. Oldenbourg Wissenschaftsverlag, München (2011)
Mayer, H.: Interview und Schriftliche Befragung. Entwicklung, Durchführung und Auswertung. Oldenbourg Wissenschaftsverlag, München (2012)
Myers, M.D., Newman, M.: The qualitative interview in IS research: Examining the craft. Inf. Organ. 17(1), 2–26 (2007)
Gläser, J., Laudel, G.: Experteninterviews und Qualitative Inhaltsanalyse, 4th edn. VS Verlag, Wiesbaden (2010)
Rowley, J.: The wisdom hierarchy: representations of the DIKW hierarchy. J. Inf. Sci. 33(2), 163–180 (2007)
Ackoff, R.L.: From data to wisdom. J. Appl. Syst. Anal. 16, 3–9 (1989)
Zeleny, M.: Management support systems: towards integrated knowledge management. Hum. Syst. Manage. 7(1), 59–70 (1987)
Swigon, M.: Personal knowledge and information management – conception and exemplification. J. Inf. Sci. 39(6), 832–845 (2013)
Pohl, K.: The three dimensions of requirements engineering. In: Bubenko, J., Krogstie, J., Pastor, O., Pernici, B., Rolland, C., Sølvberg, A. (eds.) Seminal Contributions to Information Systems Engineering, pp. 63–80. Springer, Heidelberg (2013)
IEEE Recommended Practice for Software Requirements Specifications. Institute of Electrical and Electronics Engineers (1998)
Glinz, M.: On non-functional requirements. In: Requirements Engineering Conference, pp. 21–26 (2007)
Gassmann, O., Kausch, C., Ellen, E.: Negative side effects of customer integration. Int. J. Technol. Manage. 50(1), 43–63 (2010)
Paasi, J., Luoma, T., Valkokari, K., Lee, N.: Knowledge and intellectual property management in customer–supplier relationships. Int. J. Innov. Manage. 14(04), 629–654 (2010)
Barzel, Y.: Economic Analysis of Property Rights. Cambridge University Press, Cambridge (1997)
Liebeskind, J.P.: Knowledge, strategy, and the theory of the firm. Strateg. Manage. J. 17(S2), 93–107 (1996)
Friesike, S.: Profiting from Innovation by Managing Intellectual Property. Doctoral Dissertation, University of St. Gallen (2011)
Williamson, O.E.: Credible commitments: using hostages to support exchange. Am. Econ. Rev. 73, 519–540 (1983)
North, D.C.: Institutions and credible commitment. J. Inst. Theor. Econ. (JITE)/Zeitschrift für die gesamte Staatswissenschaft 149, 11–23 (1993)
Ebers, M., Semrau, T.: What drives the allocation of specific investments between buyer and supplier? J. Bus. Res. 68(2), 415–424 (2015)
Crasswell, R.: Taking information seriously: misrepresentation and nondisclosure in contract law and elsewhere. Va Law Rev. 92, 565–632 (2006)
Bogers, M.: The open innovation paradox. knowledge sharing and protection in R&D collaborations. Eur. J. Innov. Manage. 14(1), 93–117 (2011)
Badenfelt, U.: Fixing the contract after the contract is fixed: A study of incomplete contracts in IT and construction projects. Int. J. Project Manage. 29, 568–576 (2011)
Choo, C.W.: The knowing organization: how organizations use information to construct meaning, create knowledge and make decisions. Int. J. Inf. Manage. 16(5), 329–340 (1996)
Clark, A., Chalmers, D.: The extended mind. Analysis 58, 7–19 (1998)
Krogh, G.V.: How does social software change knowledge management? toward a strategic agenda. J. Strateg. Inf. Syst. 21, 154–164 (2012)
Wiegers, K., Beatty, J.: Software Requirements. Pearson Education, Boston (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Gaebert, C. (2016). Protection of Customers’ and Suppliers’ Knowledge in Software Development Projects with Fixed-Price Contract: Using Property Rights Theory. In: Lorenz, P., Cardoso, J., Maciaszek, L., van Sinderen, M. (eds) Software Technologies. ICSOFT 2015. Communications in Computer and Information Science, vol 586. Springer, Cham. https://doi.org/10.1007/978-3-319-30142-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-30142-6_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30141-9
Online ISBN: 978-3-319-30142-6
eBook Packages: Computer ScienceComputer Science (R0)