Skip to main content
Log in

Risk identification and conduction model for financial institution IT outsourcing in China

  • Published:
Information Technology and Management Aims and scope Submit manuscript

Abstract

In this paper we study the risks around IT outsourcing in Chinese financial institutions. We build a framework that explains the conduction paths from risk factors to risks, and from risks to resulting losses. Our framework describes relationships among 8 risk factors, 7 risks and 4 kinds of losses. Through case study we find that the main risk factors faced by Chinese financial institutions during IT outsourcing include limited IT literacy, limited choices of contractors, cultural conflict and objective misalignment with the contractors. These factors comprise the main differences between developing and developed countries in their financial institution IT outsourcing practices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. The name of Institution A and Institution B were created to conceal the actual name at the request of the interviewees.

References

  1. Adeleye BC, Annansingh F, Nunes MB (2004) Risk management practices in IS outsourcing: an investigation into commercial banks in Nigeria. Int J Inf Manag 24:167–180

    Article  Google Scholar 

  2. Aubert BA, Dussault S; Patry M, Rivard S (1999) Managing the risk of IT outsourcing. In: System sciences, HICSS-32. Proceedings of the 32nd annual Hawaii international conference, Hawaii

  3. Aubert BA, Rivard S, Patry M (1996) A transaction costs approach to outsourcing: some empirical evidence. Inf Manag 30(2):51–64

    Article  Google Scholar 

  4. Aubert BA, Rivard S, Patry M (2004) A transaction cost model of IT outsourcing. Inf Manag 41(7):921–932

    Article  Google Scholar 

  5. Bahli B, Rivard S (2003) The information technology outsourcing risk: a transaction cost and agency theory-based perspective. J Inf Tech 18(3):211–221

    Article  Google Scholar 

  6. Bahli B, Rivard S (2005) Validating measures of information technology outsourcing risk factors. Omega Int J Manag Sci 33:175–187. doi:10.1016/j.omega.2004.04.003

    Article  Google Scholar 

  7. Basel Committee on Banking Supervision (2005) Outsourcing in financial services—February 2005. Online http://www.bis.org/publ/joint12.pdf. Accessed 20 Mar 2012

  8. Bi L (2007) Managing the risks of IT outsourcing. J Corp Acc Finance 18(5):65–69. doi:10.1002/jcaf.20325

    Article  Google Scholar 

  9. Bi X, Su W, Wang L (2012) An analysis on the macroscopic growth process and stage of information systems development in Chinese enterprises. Inf Technol Manag. doi:10.1007/s10799-012-0115-z

    Google Scholar 

  10. Chen Y, Li L (2006) Deriving information from CRM for knowledge management—a note on a commercial bank. Syst Res Behav Sci 23(2):141–146

    Article  Google Scholar 

  11. China Computer World Research (2011) Financial IT outsourcing poised to take off. Online http://www.ccwresearch.com.cn/store/article_contentn.asp?articleId=36878&Columnid=557&view=#. Accessed 20 Mar 2012

  12. Deloitte Consulting (2005) Calling a change in the outsourcing market: the realities for the world’s largest organizations. Online http://www.deloitte.com/view/en_LU/lu/services/consulting/f9e36c98cf5fb110VgnVCM1000ba42f00aRCRD.htm. Accessed 20 Mar 2012

  13. Devos J, Van Landeghem H, Deschoolmeester D (2007) Outsourced information systems failures in SMEs: a multiple case study. In: Proceedings of the European conference on information management and evaluation, pp 139–148. Online http://books.google.com/books?id=hJPmejQ0kXAC&printsec=frontcover&hl=zh-CN#v=onepage&q&f=false

  14. Earl MJ (1996) The risk of IT outsourcing. Sloan Manag Rev 37(3):26–32

    Google Scholar 

  15. Federal Financial Institution Examination Council (2004) Guidance on information technology management and outsourcing technology services. Online http://www.ffiec.gov/press/pr071504.htm. Accessed 20 Mar 2012

  16. Fowler JB (1998) Examining information systems outsourcing: a case study from the United Kingdom. J Inf Tech 13(2):111–126

    Article  Google Scholar 

  17. Gallagher KP, Worrell JL (2008) Organizing IT to promote agility. Inf Technol Manag 9:71–88. doi:10.1007/s10799-007-0027-5

    Article  Google Scholar 

  18. Gewald H, Gellrich T (2007) The impact of perceived risk on the capital market’s reaction to outsourcing announcements. Inf Technol Manag 8(4):279–296. doi:10.1007/s10799-006-0008-0

    Article  Google Scholar 

  19. Gonzalez R, Gasco J, Llopis J (2005) Information systems outsourcing risks: a study of large firms. Ind Manag Data Syst 105(1):45–62

    Article  Google Scholar 

  20. Gonzalez R, Gasco J, Llopis J (2009) Information systems outsourcing reasons and risks: an empirical study. Int J Soc Sci 4(3):180–191

    Google Scholar 

  21. Gonzalez R, Gasco J, Llopis J (2010) Information systems outsourcing reasons and risks: a new assessment. Ind Manag Data Syst 110(2):284–303

    Article  Google Scholar 

  22. Grapal A, Sivaramakrishnan K, Krishnan MS, Mukhopadhyay T (2003) Contracts in offshore software development: an empirical analysis. Manag Sci 49(12):1671–1683

    Article  Google Scholar 

  23. Guo J, Gong Z (2011) Measuring virtual wealth in virtual worlds. Inf Technol Manag 12(2):121–135

    Article  Google Scholar 

  24. Guo J, Xu L, Gong Z, Che C, Chaudhry S (2012) Semantic inference on heterogeneous e-marketplace activities. IEEE Trans Syst Man Cybern Part A Syst Hum 42(2):316–330

    Article  Google Scholar 

  25. Hococht A, Trott P (2006) Outsourcing, information leakage and the risk of losing technology-based competencies. Eur Bus Rev 18(5):395–412

    Article  Google Scholar 

  26. Jiang Y, Xu L, Wang H, Wang H (2009) Influencing factors for predicting financial performance based on genetic algorithms. Syst Res Behav Sci 26(6):661–673

    Article  Google Scholar 

  27. Kern T, Willcocks LP, Lacity MC (2002) Application service provision: risk assessment and mitigation. MIS Q Exec 1(2):113–126

    Google Scholar 

  28. Lacity MC, Hirschheim R (1993) Information systems outsourcing: myths, metaphors and realities. Wiley, London

    Google Scholar 

  29. Lacity MC, Willcocks LP, Feeny DF (1996) The value of selective IT outsourcing. Sloan Manag Rev 37(3):13–25

    Google Scholar 

  30. Lichtman M (2009) Qualitative research in education: a user’s guide. Sage, Thousand Oaks, pp 159–176

    Google Scholar 

  31. Li M, Li D (2009) A survey and analysis of the literature on information systems outsourcing. In: Pacific Asia conference on information systems PACIS 2009 proceedings. http://aisel.aisnet.org/pacis2009/62

  32. Liu B, Cao S, He W (2011) Distributed data mining for e-business. Inf Technol Manag 12(2):67–79

    Article  Google Scholar 

  33. Tafti MHA (2005) Risk factors associated with offshore IT outsourcing. Ind Manag Data Syst 105(5):549–560

    Article  Google Scholar 

  34. Nair KGK, Prasaad PN (2004) Offshore outsourcing: a SWOT analysis of a state in India. Inf Syst Manag 21(3):34–40

    Article  Google Scholar 

  35. Ngwenyama OK, Sullivan WE (2007) Outsourcing contracts as instruments of risk management insights from two successful public contracts. J Enterp Inf Manag 20(6):615–664

    Google Scholar 

  36. Nissen ME (2006) Dynamic knowledge patterns to inform design: a field study of knowledge stocks and flows in an extreme organization. J Manag Inf Syst 22(3):225–263

    Article  Google Scholar 

  37. Niu N, Jin M, Cheng J (2011) A case study of exploiting enterprise resource planning requirements. Enterp Inf Syst 5(2):183–206

    Article  Google Scholar 

  38. Olson D, Staley J (2012) Case study of open-source enterprise resource planning implementation in a small business. Enterp Inf Syst 6(1):79–94

    Article  Google Scholar 

  39. Polo M, Piattini M, Ruiz F (2002) Integrating outsourcing in the maintenance process. Inf Technol Manag 3(3):247–269. doi:10.1023/A:1015550329456

    Article  Google Scholar 

  40. Prifling M, Gregory R, Beck R (2009) Changing psychological contracts and their effect on control modes in IT offshore outsourcing projects—a case from the financial services industry. In: Proceedings of the 42nd Hawaii international conference on system sciences, IEEE: 978-0-7695-3450-3/09

  41. Qian Y, Jin B, Fang W (2011) Heuristic algorithms for effective broker deployment. Inf Technol Manag 12(2):55–66

    Article  Google Scholar 

  42. Ravishankar MN, Pan SL, Leidner DE (2011) Implementation success of a KMS: a subculture-based multilevel analysis. Inf Syst Res 22(1):39–59

    Article  Google Scholar 

  43. Sarker S, Sarker S, Sahaym A (2012) Exploring value cocreation in relationships between an ERP vendor and its partners: a revelatory case study. MIS Q 36(1):317–338

    Google Scholar 

  44. Segev A, Gebauer J (2001) B2B procurement and marketplace transformation. Inf Technol Manag 2(3):241–260. doi:10.1023/A:1011442008251

    Article  Google Scholar 

  45. Willcocks LP, Lacity MC, Kern T (1999) Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA. J Strateg Inf Syst 8(3):285–314

    Article  Google Scholar 

  46. Williamson OE (1979) Transaction cost economics: the governance of contractual relations. J Law Econ 22(2):233–261

    Article  Google Scholar 

  47. Winkler JK, Dibbern J, Heinz A (2008) The impact of cultural differences in offshore outsourcing—case study results from German–Indian application development projects. Inf Syst Front 10(2):243–258. doi:10.1007/s10796-008-9068-5

    Article  Google Scholar 

  48. Yang B, Li L, Xu J (2001) An early warning system for loan risk assessment using artificial neural networks. Knowl Based Syst 14:303–306

    Article  Google Scholar 

  49. Yang B, Li L (2001) Development of a KBS for managing bank loan risk. Knowl Based Syst 14:299–302

    Article  Google Scholar 

  50. Yin RK (2003) Case study research: design and method, 3rd edn. Sage, Thousand Oaks

    Google Scholar 

  51. Zhu X, Wang H, Xu L, Li H (2008) Predicting stock index increments by neural networks: the role of trading volume under different horizons. Expert Syst Appl 34(4):3043–3054

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liangjuan Qin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Qin, L., Wu, H., Zhang, N. et al. Risk identification and conduction model for financial institution IT outsourcing in China. Inf Technol Manag 13, 429–443 (2012). https://doi.org/10.1007/s10799-012-0131-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10799-012-0131-z

Keywords

Navigation