Abstract
In this paper we study the risks around IT outsourcing in Chinese financial institutions. We build a framework that explains the conduction paths from risk factors to risks, and from risks to resulting losses. Our framework describes relationships among 8 risk factors, 7 risks and 4 kinds of losses. Through case study we find that the main risk factors faced by Chinese financial institutions during IT outsourcing include limited IT literacy, limited choices of contractors, cultural conflict and objective misalignment with the contractors. These factors comprise the main differences between developing and developed countries in their financial institution IT outsourcing practices.
Similar content being viewed by others
Notes
The name of Institution A and Institution B were created to conceal the actual name at the request of the interviewees.
References
Adeleye BC, Annansingh F, Nunes MB (2004) Risk management practices in IS outsourcing: an investigation into commercial banks in Nigeria. Int J Inf Manag 24:167–180
Aubert BA, Dussault S; Patry M, Rivard S (1999) Managing the risk of IT outsourcing. In: System sciences, HICSS-32. Proceedings of the 32nd annual Hawaii international conference, Hawaii
Aubert BA, Rivard S, Patry M (1996) A transaction costs approach to outsourcing: some empirical evidence. Inf Manag 30(2):51–64
Aubert BA, Rivard S, Patry M (2004) A transaction cost model of IT outsourcing. Inf Manag 41(7):921–932
Bahli B, Rivard S (2003) The information technology outsourcing risk: a transaction cost and agency theory-based perspective. J Inf Tech 18(3):211–221
Bahli B, Rivard S (2005) Validating measures of information technology outsourcing risk factors. Omega Int J Manag Sci 33:175–187. doi:10.1016/j.omega.2004.04.003
Basel Committee on Banking Supervision (2005) Outsourcing in financial services—February 2005. Online http://www.bis.org/publ/joint12.pdf. Accessed 20 Mar 2012
Bi L (2007) Managing the risks of IT outsourcing. J Corp Acc Finance 18(5):65–69. doi:10.1002/jcaf.20325
Bi X, Su W, Wang L (2012) An analysis on the macroscopic growth process and stage of information systems development in Chinese enterprises. Inf Technol Manag. doi:10.1007/s10799-012-0115-z
Chen Y, Li L (2006) Deriving information from CRM for knowledge management—a note on a commercial bank. Syst Res Behav Sci 23(2):141–146
China Computer World Research (2011) Financial IT outsourcing poised to take off. Online http://www.ccwresearch.com.cn/store/article_contentn.asp?articleId=36878&Columnid=557&view=#. Accessed 20 Mar 2012
Deloitte Consulting (2005) Calling a change in the outsourcing market: the realities for the world’s largest organizations. Online http://www.deloitte.com/view/en_LU/lu/services/consulting/f9e36c98cf5fb110VgnVCM1000ba42f00aRCRD.htm. Accessed 20 Mar 2012
Devos J, Van Landeghem H, Deschoolmeester D (2007) Outsourced information systems failures in SMEs: a multiple case study. In: Proceedings of the European conference on information management and evaluation, pp 139–148. Online http://books.google.com/books?id=hJPmejQ0kXAC&printsec=frontcover&hl=zh-CN#v=onepage&q&f=false
Earl MJ (1996) The risk of IT outsourcing. Sloan Manag Rev 37(3):26–32
Federal Financial Institution Examination Council (2004) Guidance on information technology management and outsourcing technology services. Online http://www.ffiec.gov/press/pr071504.htm. Accessed 20 Mar 2012
Fowler JB (1998) Examining information systems outsourcing: a case study from the United Kingdom. J Inf Tech 13(2):111–126
Gallagher KP, Worrell JL (2008) Organizing IT to promote agility. Inf Technol Manag 9:71–88. doi:10.1007/s10799-007-0027-5
Gewald H, Gellrich T (2007) The impact of perceived risk on the capital market’s reaction to outsourcing announcements. Inf Technol Manag 8(4):279–296. doi:10.1007/s10799-006-0008-0
Gonzalez R, Gasco J, Llopis J (2005) Information systems outsourcing risks: a study of large firms. Ind Manag Data Syst 105(1):45–62
Gonzalez R, Gasco J, Llopis J (2009) Information systems outsourcing reasons and risks: an empirical study. Int J Soc Sci 4(3):180–191
Gonzalez R, Gasco J, Llopis J (2010) Information systems outsourcing reasons and risks: a new assessment. Ind Manag Data Syst 110(2):284–303
Grapal A, Sivaramakrishnan K, Krishnan MS, Mukhopadhyay T (2003) Contracts in offshore software development: an empirical analysis. Manag Sci 49(12):1671–1683
Guo J, Gong Z (2011) Measuring virtual wealth in virtual worlds. Inf Technol Manag 12(2):121–135
Guo J, Xu L, Gong Z, Che C, Chaudhry S (2012) Semantic inference on heterogeneous e-marketplace activities. IEEE Trans Syst Man Cybern Part A Syst Hum 42(2):316–330
Hococht A, Trott P (2006) Outsourcing, information leakage and the risk of losing technology-based competencies. Eur Bus Rev 18(5):395–412
Jiang Y, Xu L, Wang H, Wang H (2009) Influencing factors for predicting financial performance based on genetic algorithms. Syst Res Behav Sci 26(6):661–673
Kern T, Willcocks LP, Lacity MC (2002) Application service provision: risk assessment and mitigation. MIS Q Exec 1(2):113–126
Lacity MC, Hirschheim R (1993) Information systems outsourcing: myths, metaphors and realities. Wiley, London
Lacity MC, Willcocks LP, Feeny DF (1996) The value of selective IT outsourcing. Sloan Manag Rev 37(3):13–25
Lichtman M (2009) Qualitative research in education: a user’s guide. Sage, Thousand Oaks, pp 159–176
Li M, Li D (2009) A survey and analysis of the literature on information systems outsourcing. In: Pacific Asia conference on information systems PACIS 2009 proceedings. http://aisel.aisnet.org/pacis2009/62
Liu B, Cao S, He W (2011) Distributed data mining for e-business. Inf Technol Manag 12(2):67–79
Tafti MHA (2005) Risk factors associated with offshore IT outsourcing. Ind Manag Data Syst 105(5):549–560
Nair KGK, Prasaad PN (2004) Offshore outsourcing: a SWOT analysis of a state in India. Inf Syst Manag 21(3):34–40
Ngwenyama OK, Sullivan WE (2007) Outsourcing contracts as instruments of risk management insights from two successful public contracts. J Enterp Inf Manag 20(6):615–664
Nissen ME (2006) Dynamic knowledge patterns to inform design: a field study of knowledge stocks and flows in an extreme organization. J Manag Inf Syst 22(3):225–263
Niu N, Jin M, Cheng J (2011) A case study of exploiting enterprise resource planning requirements. Enterp Inf Syst 5(2):183–206
Olson D, Staley J (2012) Case study of open-source enterprise resource planning implementation in a small business. Enterp Inf Syst 6(1):79–94
Polo M, Piattini M, Ruiz F (2002) Integrating outsourcing in the maintenance process. Inf Technol Manag 3(3):247–269. doi:10.1023/A:1015550329456
Prifling M, Gregory R, Beck R (2009) Changing psychological contracts and their effect on control modes in IT offshore outsourcing projects—a case from the financial services industry. In: Proceedings of the 42nd Hawaii international conference on system sciences, IEEE: 978-0-7695-3450-3/09
Qian Y, Jin B, Fang W (2011) Heuristic algorithms for effective broker deployment. Inf Technol Manag 12(2):55–66
Ravishankar MN, Pan SL, Leidner DE (2011) Implementation success of a KMS: a subculture-based multilevel analysis. Inf Syst Res 22(1):39–59
Sarker S, Sarker S, Sahaym A (2012) Exploring value cocreation in relationships between an ERP vendor and its partners: a revelatory case study. MIS Q 36(1):317–338
Segev A, Gebauer J (2001) B2B procurement and marketplace transformation. Inf Technol Manag 2(3):241–260. doi:10.1023/A:1011442008251
Willcocks LP, Lacity MC, Kern T (1999) Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA. J Strateg Inf Syst 8(3):285–314
Williamson OE (1979) Transaction cost economics: the governance of contractual relations. J Law Econ 22(2):233–261
Winkler JK, Dibbern J, Heinz A (2008) The impact of cultural differences in offshore outsourcing—case study results from German–Indian application development projects. Inf Syst Front 10(2):243–258. doi:10.1007/s10796-008-9068-5
Yang B, Li L, Xu J (2001) An early warning system for loan risk assessment using artificial neural networks. Knowl Based Syst 14:303–306
Yang B, Li L (2001) Development of a KBS for managing bank loan risk. Knowl Based Syst 14:299–302
Yin RK (2003) Case study research: design and method, 3rd edn. Sage, Thousand Oaks
Zhu X, Wang H, Xu L, Li H (2008) Predicting stock index increments by neural networks: the role of trading volume under different horizons. Expert Syst Appl 34(4):3043–3054
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Qin, L., Wu, H., Zhang, N. et al. Risk identification and conduction model for financial institution IT outsourcing in China. Inf Technol Manag 13, 429–443 (2012). https://doi.org/10.1007/s10799-012-0131-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10799-012-0131-z