• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Information Technology Outsourcing and its Risks : supplier lock-in, hidden costs and the loss of control over outsourced IT

Blyth, Domenico January 2008 (has links)
<p>Nowadays, information technology outsourcing (ITO) represents an established business practice in which a considerable number of companies are involved. Since the success of ITO is highly dependent on the exposure to ITO risks, studying the very risks is of great importance. The aim of this thesis consists in revealing the occurrence of specific ITO risks: supplier lock-in, hidden costs and the loss of control over outsourced IT. Further aims of this work are the revelation of measures which can be taken in order to face these risks and of the influences these risks have on backsourcing considerations. The first part of this thesis constitutes the theoretical framework which is based on the review of relevant literature. Within this part of the work, transaction cost theory and resource-based theory are presented and applied for the discussion of the specific ITO risks under consideration. Furthermore, a multidimensional approach is utilized in order to illustrate the various dimensions of ITO. By this means, the identification of situations in which the ITO risks under consideration appear is enabled. The empirical part of this exploratory research is based on a multiple case study. The data necessary for this qualitative research was gathered from telephone interviews conducted with both ITO clients and IT suppliers. The results of this study indicate that the ITO risks under consideration all pose considerable threats to ITO operations and that there are both internal and external measures ITO companies can take in order to face these risks. Furthermore, the risks under discussion influence backsourcing considerations.</p>
2

Information Technology Outsourcing and its Risks : supplier lock-in, hidden costs and the loss of control over outsourced IT

Blyth, Domenico January 2008 (has links)
Nowadays, information technology outsourcing (ITO) represents an established business practice in which a considerable number of companies are involved. Since the success of ITO is highly dependent on the exposure to ITO risks, studying the very risks is of great importance. The aim of this thesis consists in revealing the occurrence of specific ITO risks: supplier lock-in, hidden costs and the loss of control over outsourced IT. Further aims of this work are the revelation of measures which can be taken in order to face these risks and of the influences these risks have on backsourcing considerations. The first part of this thesis constitutes the theoretical framework which is based on the review of relevant literature. Within this part of the work, transaction cost theory and resource-based theory are presented and applied for the discussion of the specific ITO risks under consideration. Furthermore, a multidimensional approach is utilized in order to illustrate the various dimensions of ITO. By this means, the identification of situations in which the ITO risks under consideration appear is enabled. The empirical part of this exploratory research is based on a multiple case study. The data necessary for this qualitative research was gathered from telephone interviews conducted with both ITO clients and IT suppliers. The results of this study indicate that the ITO risks under consideration all pose considerable threats to ITO operations and that there are both internal and external measures ITO companies can take in order to face these risks. Furthermore, the risks under discussion influence backsourcing considerations.

Page generated in 0.0486 seconds