The role of trust in outsourced IS development projects
Communications of the ACM
Interorganizational Routines and Performance in Strategic Alliances
Organization Science
Portfolios of Control in Outsourced Software Development Projects
Information Systems Research
Trust-building mechanisms utilized in outsourced IS development projects: a case study
Information and Management
Globalization and the American IT worker
Communications of the ACM - Bioinformatics
A transaction cost model of IT outsourcing
Information and Management
IT Outsourcing Success: A Psychological Contract Perspective
Information Systems Research
Journal of Management Information Systems
Journal of Management Information Systems - Special section: Strategic and competitive information systems
Software development outsourcing contract: structure and business value
Journal of Management Information Systems - Special section: Realizing value from information technology investment
Supporting risks in software project management
Journal of Systems and Software
EASE'08 Proceedings of the 12th international conference on Evaluation and Assessment in Software Engineering
Hi-index | 0.00 |
This article presents an evolutionary framework for the establishment and progression of client-vendor relationships in the context of offshore applications development. It is argued that such a relationship typically begins as a cost-reduction exercise, with the client contracting out simple, structured applications to one or more offshore vendors. Over time, the client assigns increasingly complex applications to selected vendors and cultivates loose, trust-based, networklike relationships with them. As offshore applications continue to evolve and become business-critical, the client may seek to regain control by establishing a command-based hierarchy. This may be achieved through part or full ownership of a vendor organization or by starting a captive offshore subsidiary. Thus, the initial client objective of cost reduction ultimately is displaced by one pertaining to risk control. Pertinent prior research is used to justify the proposed framework. This is followed by a case study that describes how a specialty telecommunications company is pursuing just such an evolutionary path.