skip to main content
article
Free Access

The myths and realities of information technology insourcing

Published:01 February 2000Publication History
First page image

References

  1. 1 Ang, S. The Etiology of Information Systems Outsourcing. Ph.D. Dissertation, Department of Information and Decision Sciences, University of Minnesota, 1993.Google ScholarGoogle Scholar
  2. 2 Clark, T., Zmud, R., and McCray, G. The outsourcing of information services: Transforming The nature of business in the information industry. J Info. Tech. 10, 4 (1995), 221-237.Google ScholarGoogle Scholar
  3. 3 Grover, V., Cheon, M., and Teng, J. The effect of service quality and partnership on the outsourcing of information systems functions. J. MIS 12, 4 (Spring 1996), 89-116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Gurbaxani, V. The new world of Information Technology outsourcing. Commun. ACM 39, 7, (July 1996), 45-47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 International Data Corporation. Report on Outsourcing. (Aug. 1, 1997); www.outsourcing.com.Google ScholarGoogle Scholar
  6. 6 Klepper, R. Outsourcing relationships. Managing Information Technology Investments in Outsourcing. M. Khosrowpour, ed. Idea Group Publishing, Harrisburg, PA, 1995, 218-243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Lacity, M, and Hirschheim, R. Information Systems Outsourcing: Myths, Metaphors and Realities. Wiley, Chichester 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Lacity, M, and Hirschheim, R. Beyond the Information Systems Outsourcing Bandwagon: The Insourcing Response. Wiley, Chichester, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 Loh, L, and Venkatraman, N. Diffusion of information technology outsourcing: Influence sources and the Kodak effect. Info. Syst. Res. (1992), 334-358.Google ScholarGoogle Scholar
  10. 10 Nam, K., Rajagopalan, S., Rao, H., Chaudhury, A. A two-level investigation of information systems outsourcing. Commun. ACM 39, 7, (July 1996), 36-44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 Willcocks, L, and Fitzgerald, G. A Business Guide to Outsourcing Information Technology. Business Intelligence, London, 1994.Google ScholarGoogle Scholar

Index Terms

  1. The myths and realities of information technology insourcing

        Recommendations

        Reviews

        Stephen R. Ruth

        This article is valuable to researchers and managers from three perspectives. First, it describes a useful methodology for examining the payoff of outsourcing part or all of the IT function. Through carefully researched case studies of 14 decisions at large companies (with annual revenues from $250 million to $35 billion), half insourced and half outsourced, the authors are able to classify actors and outcomes. Second, the cases make it abundantly clear that an analysis of the return on investment of this type of decision is not nearly as much an economic analysis as a clash of management styles and cultures. As they conclude, “success is related to who is doing the evaluating” (p. 107). Third, they establish a classification scheme that makes it possible to examine the outsourcing/insourcing decision more rationally. The matrix includes four examples, or “archetypes,” that classify financial outcomes (significant reduction in IT costs, or no change in IT costs) and sponsorship of the insourcing decision (senior managers, or IT managers). The non-IT manager's objective is primarily reducing costs, while the user wants good service. The authors see the IT manager as being caught in the middle. They believe that the outsourcing decision can be an opportunity for a firm to reduce IT costs without reorganizing or firing the in-house staff: “ since it is known that most of the cost savings come from the implementation of key cost reduction strategies such as data center consolidation, unit-cost chargeback systems, and standardized software, rather than economies of scale, internal IT departments should be able to reduce costs on their own” (p. 107).

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 43, Issue 2
          Feb. 2000
          109 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/328236
          Issue’s Table of Contents

          Copyright © 2000 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 February 2000

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format