Dissertation Study on Social Capital Perspective

Description
In the first half of the 19th century, Alexis de Tocqueville had observations about American life that seemed to outline and define social capital. He observed that Americans were prone to meeting at as many gatherings as possible to discuss all possible issues of state, economics, or the world that could be witnessed.

ABSTRACT

Title of Dissertation:

STRATEGIC PARTNERSHIPS IN TRANSFORMATIONAL OUTSOURCING AS A DISTINCTIVE SOURCE OF IT VALUE: A SOCIAL CAPTAL PERSPECTIVE Fei Ye, Doctor of Philosophy, 2005

Dissertation Directed by:

Dr. Ritu Agarwal Department of Decision & Information Technologies Robert H. Smith School of Business

Firms increasingly acquire needed information technology (IT) products and services from external sources through the formation of partnerships. In spite of the ubiquity of IT outsourcing practice in today’s organizations however, theoretical understanding of IT partnerships in outsourcing is limited. Extant research has largely focused on the economic or strategic aspects of IT outsourcing, using transaction cost economics (TCE) and the resource-based view (RBV) as dominant theoretical frameworks. This dissertation adopts a social perspective to examine the IT outsourcing phenomenon. It focuses on IT partnerships in transformational outsourcing relationships that are interorganizational engagements formed to rapidly and substantially improve performance at the organizational level. By synthesizing the knowledge based view of the firm with the concept of social capital, I attempt to explain how IT outsourcing relationships generate value for organizations. I argue that IT outsourcing partnerships constitute a form of social capital for the firm that chooses to outsource, that facilitates knowledge exchange and transfer. The increased knowledge stock

as a result of knowledge exchange and transfer, in turn, forms the foundation for IT value, which is manifested as success in business operations and IT-enabled innovation. To empirically test the theoretical model, I surveyed 151 client firms and 79 outsourcing service providers in China. Results suggest that both social capital and knowledge acquisition are crucial to the success of IT outsourcing. Evidence from the survey responses also indicates that different aspects of social capital play different roles in the process of IT value creation. Specifically, the structural dimension (partner resource endowment) and the cognitive dimension of social capital (shared vision and shared cognition) have a strong impact on knowledge acquisition; whereas the relational dimensions of social capital (social interaction and trust) has strong direct effects on successful outcomes of IT outsourcing. This study presented evidence that helps further our understanding of the IT outsourcing phenomenon through an alternative theoretical lens, and emphasizes the value other than immediate costrelated benefits that organizations may garner through IT outsourcing partnerships.

STRATEGIC IT PARTNERSHIPS IN TRANSFORMATIONAL OUTSOURCING AS A DISTINCTIVE SOURCE OF IT VALUE: A SOCIAL CAPITAL PERSPECTIVE

by

Fei Ye

Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park in partial fulfillment of the requirement for the degree of Doctor in Philosophy 2005

Advisory Committee: Professor Ritu Agarwal, Chair Professor Anil Gupta Professor Sanjay Gosain Professor Henry Lucas Professor Kent Norman Professor V. Sambamurthy

Table of Contents List of Tables ...................................................................................................................................v List of Figures ................................................................................................................................ vi Chapter 1: Introduction ....................................................................................................................1 1.1 IT Outsourcing Facts..............................................................................................................2 1.2 Motivation and Research Questions ......................................................................................3 1.3 Delineation of Phenomenon of Interests................................................................................4 1.3.1 Strategic IT Parnterships.................................................................................................5 1.3.2 An Example of a Strategic IT Partnership ......................................................................6 1.4 Research Goals and Contributions.........................................................................................8 Chapter 2: Literature Review: IT Outsourcing ..............................................................................13 2.1 IT Outsourcing Issues ..........................................................................................................17 2.1.1 Make-or-Buy Decisions ................................................................................................17 2.1.1 Motivations ...................................................................................................................18 2.1.3 Scope.............................................................................................................................19 2.1.4 Performance ..................................................................................................................21 2.1.5 Contracts .......................................................................................................................23 2.1.6 Partnerships...................................................................................................................25 2.2 Economic View of IT Outsourcing......................................................................................26 2.2.1 Transaction Cost Economics.........................................................................................26 2.2.2 Agency Theory..............................................................................................................28 2.3 Strategic Management View of IT Outsourcing..................................................................19 2.4 Social View of IT Outsourcing ............................................................................................30 2.4.1 Social Exchange Theory ...............................................................................................30 2.4.2 Relational/Partnership Perspective ...............................................................................31 2.4.3 Power and Political Theory...........................................................................................32 2.5 Critique of Prior Research ...................................................................................................33 2.6 Summary..............................................................................................................................36 Chapter 3: Thoeretical Underpinnings...........................................................................................39 3.1 Social Capital .......................................................................................................................39 3.2 Knowledge-Based View ......................................................................................................43 3.3 Other Relevant Research Streams........................................................................................46 3.3.1 Organizational Learning ...............................................................................................46 3.3.2 Strategic Alliances ........................................................................................................48 3.4 Summary..............................................................................................................................51 Chapter 4: Research Model and Propositions................................................................................53 4.1 Research Model ...................................................................................................................54 4.2 Social Capital .......................................................................................................................56 4.2.1 Definition of Social Capital ..........................................................................................56 4.2.2 Social Capital and Knowledge......................................................................................57 4.3 Types of Knowledge Acquired ............................................................................................58 4.3.1 Technical IT Knowledge...............................................................................................59 4.3.2 Managerial IT Knowledge ............................................................................................59 4.3.3 Networking Knowledge ................................................................................................60 4.4 Learning Intent.....................................................................................................................61

ii

4.5 Dimensions of Social Capital...............................................................................................62 4.5.1 Structural Dimension ....................................................................................................63 4.5.2 Relational Dimension....................................................................................................67 4.5.3 Cognitive Dimension ....................................................................................................70 4.6 The Outcomes of Knowledge Acquisition...........................................................................72 4.6.1 Combinative Capabilities..............................................................................................73 4.6.2 Success in Business Operations ....................................................................................74 4.6.3 IT-Enabled Innovation ..................................................................................................77 4.7 Summary..............................................................................................................................79 Chapter 5: Research Methodology.................................................................................................81 5.1 Case Studies .........................................................................................................................66 5.1.1 IT Outsourcing at COSCON.........................................................................................84 5.1.2 GD Post Office: Value Creation through IT .................................................................86 5.1.3 Summary of Cases ........................................................................................................88 5.2 Survey Methodology............................................................................................................89 5.2.1 Overview of Research Setting and Procedures .............................................................89 5.2.2 Sampling Procedures ....................................................................................................89 5.2.3 Contact Procotol............................................................................................................90 5.2.4 Respondents: Client Firms............................................................................................92 5.2.5 Respondents: Vendor Firms..........................................................................................99 5.2.6 Nonresponse Bias........................................................................................................101 5.3 Operationalization of Constructs .......................................................................................105 5.3.1 Structural Dimension of Social Capital ......................................................................107 5.3.2 Relational Dimension of Social Capital......................................................................107 5.3.3 Cognitive Dimension of Social Capital ......................................................................108 5.3.4 Knowledge Acquisition ..............................................................................................108 5.3.5 IT Outsourcing Success ..............................................................................................108 5.3.6 Moderating Variables..................................................................................................109 5.3.7 Control Variables ........................................................................................................110 5.4 Data Reduction and Scale Validation ................................................................................110 5.4.1 Factor Analysis: Test for Discriminant Validity.........................................................110 5.4.2 Confirmatory Factor Analysis.....................................................................................116 5.4.3 Reliability: Test for Internal Consistency...................................................................121 5.4.4 Desriptive Statistics and Test for Normality...............................................................123 5.4.5 Sample Size and Power...............................................................................................130 5.4.6 Hypotheses..................................................................................................................130 5.5 Summary............................................................................................................................132 Chapter 6: Analyses and Results..................................................................................................133 6.1 Three-Stage Least Squares.................................................................................................135 6.1.1 Data Conversion..........................................................................................................135 6.1.2 3SLS Equations and Variables....................................................................................136 6.1.3 3SLS Analysis: Client Sample....................................................................................137 6.1.4 3SLS Analysis: Paired Sample ...................................................................................142 6.2 Testing Mediation ..............................................................................................................145 6.3 Robustness Test: PLS ........................................................................................................146 6.3.1 Client Sample..............................................................................................................150

iii

6.3.2 Paried Sample .............................................................................................................150 6.4 Summary............................................................................................................................152 Chapter 7: Discussion ..................................................................................................................155 7.1 Implications of Results ......................................................................................................155 7.2 Contributions......................................................................................................................160 7.3 Limitations .........................................................................................................................164 7.4 Future Research Directions................................................................................................166 Appendix 1: Summary of IT Outsourcing Literature ..................................................................168 Appendix 2: IT Outsourcing Practices Survey (Client)...............................................................184 Appendix 3: IT Outsourcing Practices Survey (Vendor).............................................................191 Appendix 4: Application for Initial Review of Research Using Human Subjects ......................193 Appendix 5:Measurement Scales.................................................................................................196 Appendix 6: Path Analysis...........................................................................................................201 References....................................................................................................................................212

iv

List of Tables Table 1: Examples of Strategic IT Partnerships ..............................................................................9 Table 2: Summary of Theoretical Perspectives in IT Outsourcing Research ................................15 Table 3: Theoretical Perspectives and IT Outsourcing Issues Addressed .....................................17 Table 4: Motivations for and Benefits of IT Outsourcing .............................................................19 Table 5: IT Functions Outsourced .................................................................................................21 Table 6: Typologies of IT Outsourcing Contracts .........................................................................24 Table 7: Interview Questions .........................................................................................................83 Table 8: Profile of IT Outsourcers ...............................................................................................101 Table 9: ANOVA Results to Test Non-Response Bias on Response Time.................................103 Table 10: ANOVA Results to Test Non-Response Bias on Vendor Response ...........................104 Table 11: Operationalization of Research Variables ...................................................................106 Table 12: Exploratory Factor Analysis Results—Client .............................................................112 Table 13: Exploratory Factor Analysis Results—Outsourcer .....................................................114 Table 14: Results of Confirmatory Factor Analysis with AMOS................................................118 Table 15: Reliability Measures ....................................................................................................122 Table 16: Paired Sample Statistics...............................................................................................123 Table 17: Paired Sample Correlations .........................................................................................124 Table 18: Descriptive Statistics and Normality ...........................................................................125 Table 19: Intervariable Correlations ............................................................................................126 Table 20: Results of 3SLS—Client Sample.................................................................................138 Table 21: Results of 3SLS—Paired Sample ................................................................................143 Table 22: PLS Outer Model Loadings .........................................................................................148 Table 23: Inter-Construct Correlations ........................................................................................149 Table 24: Summary of Hypothesis Testing .................................................................................154 Table 25: Summary of Recent Studies on Social Capital ............................................................161 Table 26: Decomposition of Effects—Client Sample .................................................................204 Table 27: Decomposition of Effects—Paired Sample .................................................................204

v

List of Figures Figure 1: Conceptual Model ..........................................................................................................55 Figure 2: Industry Composition of Sample Firms .........................................................................93 Figure 3: Profile of Key Informants...............................................................................................94 Figure 4: Number of Full-Time IT Employees..............................................................................95 Figure 5: Scale of IT Outsourcing .................................................................................................96 Figure 6: Nature of IT Outsourcing Project...................................................................................97 Figure 7: Expected Duration of Current Contract of IT Outsourcing Project ...............................99 Figure 8: Duration to Present of Current IT Outsourcing Contract .............................................100 Figure 9: Distributions of Original Variables ..............................................................................127 Figure 10: Distributions Transformed Variables .........................................................................129 Figure 11: Summary of Relationships in Research Model ..........................................................134 Figure 12: Relationship between Shared Cognition and Knowledge Acquisition ......................139 Figure 13: Visualization of Interaction Terms—Client Sample ..................................................140 Figure 14: Visualization of Interaction between Learning Intent and Trust................................141 Figure 15: Vusualization of Interaction Terms—Paired Sample.................................................144 Figure 16: PLS Path Diagram—Client Sample ..........................................................................151 Figure 17: PLS Path Diagram—Paired Sample...........................................................................153 Figure 18: Path Analysis—Client Sample ...................................................................................203 Figure 19: Path Analysis—Paired Sample...................................................................................211

vi

Outsourcing can be more than a tool for cutting costs and improving organizational focus. Increasingly, it is a means of acquiring new capabilities and bringing about fundamental strategic and structural change1. —Jane C. Linder CHAPTER 1: INTRODUCTION Outsourcing is not a new phenomenon in the contemporary business environment; indeed, it has been extensively used to cut cost and improve strategic focus. Today, firms continue to seek help from outside to facilitate rapid organizational change, to launch new strategies, and to reshape organizational boundaries. To achieve these goals, firms are forming partnerships with other companies to rapidly and substantially improve performance at the organizational level, a phenomenon referred to as transformational outsourcing (Linder 2004). Information technology is an area in which outsourcing has been widely practiced. The pervasive impact of business computing has made information technologies an indispensable part of daily operations and the key to competitive success. However, in today’s fast-paced business environment, it is impossible for any single organization to understand, develop, and implement every information technology needed. Therefore, firms actively seek external IT providers to obtain needed IT services at lower costs and to achieve other goals such as better IT performance, improved services, and innovation. This phenomenon is referred to as IT outsourcing, which can be defined as “the delegation, through a contractual agreement, of all or any part of the technical resources, the human resource, and the management responsibilities associated with providing IT services to an external vendor” (Clark et al. 1995). IT outsourcing has reshaped corporate America since

1

Linder, J. C. (2004), “Transformational Outsourcing”, MIT Sloan Management Review, 45(2), Winter, pp. 5258

1

the landmark IT outsourcing decision by Eastman Kodak more than a decade ago. Due to the high uncertainty involved in the information technology domain and the increased scale of IT functions that are outsourced, contractual agreements alone are no longer sufficient to manage the outsourcing relationships. Especially when the outsourced IT functions have substantial impact at the enterprise level (such as ERP or CRM), it requires a shift in the managerial mindset of chief information officers (CIOs)—from a focus on effective management and maintenance of contracts to proactive formation of partnerships and alliances. This dissertation specifically focuses on IT partnerships and transformational outsourcing practices. 1.1 IT OUTSOURCING FACTS The IT outsourcing industry has experienced tremendous growth in the past ten years. According to market research by IDC, spending on IT outsourcing reached $56 billion in 2000 and is expected to top $100 billion by 2005. Today, a well-established outsourcing industry is serving a growing variety of needs. Firms outsource a wide variety of IT activities in today’s globalized economy, to access infrastructure technologies, improve business applications, change business processes, or even achieve business transformations. “While IT might be leading the charge, it’s outsourcing that’s providing the fuel.” said Frank Casale, CEO of the Outsourcing Institute, in the introduction of the IT Index prepared by the Outsourcing Institute (Casale 2001). Recent industry reports indicate a shift in orientation of IT outsourcing from transaction-driven to transformation-driven. The IT Index prepared by the Outsourcing Institute shows that although cost reduction remains the major motive for outsourcing, it is closely followed by goals such as “improving company focus” and “resources not available

2

internally”. Such findings are consistent with an IDC report, which found “mounting evidence that companies have turned to outsourcing for more strategic reasons, including keeping up with cutting-edge technology, building partnerships, creating value for the organization and its customers, and broadening infrastructure and operations reach”. The Outsourcing Institute’s Casale has acknowledged that more and more companies are viewing outsourcing “not just as a tactical, reactive thing, but as a strategic and proactive move” in general, but he believes that “the number of companies that truly understand the strategic value of outsourcing is still nowhere near where it should be” (Casale 2001). A recent study by Forrester revealed that the most important reason for IT outsourcing is to gain strategic business advantage and that IT improvement is the leading outcome of IT outsourcing practices2. This finding contrasts the previous emphasis on cost reduction. The difference in findings may be explained by a mismatch—many firms are too focused on cost-related concerns when they make IT outsourcing decisions, even though later they expect outcomes beyond cost-savings, such as strategic business improvement, improved services, and focus on core competencies. Such a mismatch makes it hard for firms to achieve the goals that are not specified at the outset of IT outsourcing. In addition, the extensive focus on cost has hindered a firm’s ability to innovate. Therefore, anecdotal evidence calls for a paradigm shift of IT outsourcing away from cost-related concerns. 1.2 MOTIVATION AND RESEARCH QUESTIONS Although there is a rich body of research on IT outsourcing, much of it has viewed IT outsourcing as a cost-reduction vehicle and examined the phenomenon through a transaction-oriented lens. Recent evidence and the transformational outsourcing trend, however, suggest an emerging relational orientation that focuses on building a successful
2
http://webevents.broadcast.com/cmp/oracle/100103

3

relationship between the client firm and the provider of IT services (Lee 2001; Lee et al. 2003). This emerging body of research shows that IT outsourcing is moving toward a partnership orientation and away from a contract-orientation (Lee et al. 2003). Recent academic research also highlights knowledge sharing, organizational capability, and partnership quality as factors that significantly influence IT outsourcing success (Lee 2001). For example, in a recent Oracle-sponsored online forum on IT outsourcing, practitioners presented evidence that IT outsourcing has entered a new stage of its lifecycle3, in which the focus has shifted from low-cost hardware and low-cost IT professionals to software process and automation services, knowledge transfer, and innovation (Oracle Outsourcing CIO, Timothy Chou and Forrester Senior Analyst, Christine Feurrusi Ross). Research on knowledge and learning in IT outsourcing relationships, however, has been scant to date. This dissertation is motivated by the growing importance of IT outsourcing, the somewhat conflicting perspectives on what IT outsourcing means to the firm, and the theoretical gaps between the existing literature on IT outsourcing and the empirical reality. Particularly, it seeks to explore the dynamics of IT partnerships in outsourcing practices and the impact of transformational IT outsourcing on the IT value of a firm. This dissertation attempts to answer the following questions: (1) Does transformational outsourcing create value that goes beyond immediate costrelated benefits? (2) If so, through what mechanisms does such value get created? 1.3 DELINEATION OF PHENOMENON OF INTEREST The focus of my theorizing and empirical analysis is on strategic IT partnerships established through the sourcing decision of acquiring IT services from an external entity,
3
http://webevents.broadcast.com/cmp/oracle/100103

4

who is considered as a strategic partner. Partnership is defined as an interorganizational relationship that reflects a long-term commitment, a sense of mutual cooperation, shared risk and benefits, and other qualities consistent with concepts and theories of participatory decision-making(Henderson 1990; Lee 2001) . The partnership concept rests on the notion that performance can be significantly improved through joint, mutually dependent action (Henderson 1990). 1.3.1 Strategic IT Partnerships Based on this definition, in the present study, a strategic IT partnership is defined as an interorganizational relationship formed between two firms through information technology to achieve shared goals of the participants. There are two types of strategic IT partnerships. The first type of IT partnership involves a client with certain needs for IT functions from external sources and a vendor that provides such services in exchange for a service fee. For instance, IT outsourcing or consulting is an example of this type of strategic IT partnership. Although IT outsourcing has been a cost-effective way of accessing specialized computing power or system development skill, recent trends have shown that increasing attention has been paid to building a successful relationship between the client firm and the provider of IT outsourcing services (Lee 2001). In this dissertation, I primarily focus on two types of IT outsourcing relationships that may have significant impact on business goals and operations: alignment and alliance (Nam et al. 1996). Examples of the alignment relationship are IS consulting or technical supervision for IT planning and design, and system conversion. In this type of IT outsourcing relationship, even if the vendor is not significantly involved in the client’s IT operation, it nonetheless has the potential to have a more strategic

5

impact on the client organization (Nam et al. 1996). IS planning, new product design and new systems design to help new market entry are some examples of the alliance relationship. In this type of relationship, the vendor takes over the internal IS operations and is responsible for highly strategic IT functions (Nam et al. 1996). The second type of strategic IT partnership relates to the partnership between two IT service providers. IT firms with knowledge and expertise in different domains form partnerships to benefit from synergy when providing IT services to clients. For example, IT consulting firms such as Accenture and BearingPoint are teaming up with IT providers (such as IBM, Siebel Systems, Cisco Systems, etc) with expertise in networking, business solution, software applications, systems design, and system integration, to better serve the clients’ business needs (Goolsby 2003). In addition, a recent article in eWeek revealed that large firms such as General Motors are initiating the “third wave” of IT outsourcing by outsourcing the IT functions to multiple IT service providers (Gibson 2003). Therefore, these IT service providers will have to partner with their competing rivals to get the job done. The collaboration among the IT service providers melds the interests of different IT providers and business objectives of the client firm, thus ensuring the success of the partnership. In this dissertation, I will focus on the first type of strategic IT partnership only, i.e. IT partnerships between a non-IT firm and an external vendor. 1.3.2 An Example of a Strategic IT Partnership An example of strategic IT partnership is the USAA-IBM partnership for managing an image project (Lasher et al. 1991). United Services Automobile Association (USAA) provides a broad range of financial services and products (investment, security, retirement, travel, and purchasing) to American

6

military officers, former officers, and their dependents. In the 1980s, USAA partnered with IBM to roll out an image project for its property and casualty insurance business. The daily incoming and outgoing documents were indexed on the IBM 3090 mainframes and then were scanned to create a digital electronic image. The image documents could be accessed from anywhere in the company for processing with the existing business applications. After several unsuccessful attempts to study image and other emerging technologies, the executives at USAA realized that they lacked the knowledge that would help them realize their paperless office vision. So they turned to IBM for help. Since IBM had no complete off-the-shelf image product that met USAA’s requirements, buying from IBM was not an option. Therefore, USAA and IBM structured partnership arrangements to orchestrate the design, planning, management, and implementation of the image-processing project. USAA provided ample resources to the image partnership. They brought the paperless office vision, evidence that they were successfully pursuing it, and a willingness to commit additional resources and commitment at all levels. IBM provided a complementary set of assets to the project. Several characteristics of IBM proved to be the major strengths in this partnership: its financial viability, quality field service, long-term relationship with and knowledge about USAA. Through its Federal Systems Division, IBM brought systems integration skills to put together a solution from a myriad of existing pieces drawn from IBM’s various product divisions, and if necessary, from outside of IBM. The partnership between USAA and IBM is an exemplary cooperative relationship between a technology supplier and its customer that led to the creation of a new emerging technology product. The cooperation helped both firms achieve key organizational objectives and build competitive advantage in their respective industries. The partnership

7

allowed the two firms to share risk, bring together complementary resources and knowledge, and create a basis for a long-term relationship of mutual benefit. Several additional examples of strategic IT partnership are summarized in Table 1. 1.4 RESEARCH GOALS AND CONTRIBUTIONS Notwithstanding the fast growth of the IT outsourcing industry, several questions remain unanswered about the IT outsourcing phenomenon, especially when the management of the outsourcing relationship goes beyond contract maintenance. This dissertation is an attempt to bridge a widening gap between the research literature and the reality. To this end, I believe it is useful to examine the IT outsourcing phenomenon from a social capital perspective. The goal of this dissertation is to explore the knowledge-related aspects of IT outsourcing practice. Specifically, I seek to find out whether learning from an IT partner in an outsourcing relationship creates value for the firm. The contribution of this study is mainly twofold. First, the proposed theoretical model emphasizes the role of knowledge in value creation, and argues that knowledge and learning are the underlying mechanisms of the value creation process. Anecdotal evidence has indicated that as the IT outsourcing practice becomes increasingly strategic in orientation, firms should no longer focus on getting the job done at less cost. Instead, smart firms are intentionally seeking partners with strong domain expertise and willingness to share. I believe that the previous belief that knowledge transfer does not exist in the IT outsourcing practice no longer holds in today’s reality. Instead, the questions have become: How does knowledge transfer happen in the partnering relationships in the IT context? What are the consequences of knowledge transfer? The proposed study seeks to explore these unanswered questions.

8

Table 1: Examples of Strategic IT Partnerships
Focal Firm MetLife Strategic Partner BearingPoint Partnership Description In 2000, MetLife, the largest life insurer, formed a partnership with BearingPoint to develop an integrated e-business service portal that would provide a single point of access and allow individual customers to perform self-service online. BearingPoint and MetLife worked together to analyze current enrollment process and identify opportunities for leveraging technology across various product lines. BearingPoint brought industry-specific knowledge to the partnership, in terms of how to leverage technology in competitions with both traditional and emerging technology-enabled competitors. In addition, BearingPoint not only provided the point solution to the business problem that MetLife wanted to address, but also delivered architectural and knowledge frameworks that can be reused and redeployed in MetLife’s future endeavors. This partnership enabled MetLife to drastically decrease the product cycle time and introduce new services faster to market. This online service portal resulted in growth in utilization of the service and increased satisfaction. (http://www.bearingpoint.com/clients/case_studies/metlife.html) In February 2001, the Siam Cement Group outsourced is IT services by forming IT One, a 50-50 joint venture between Siam Cement and Accenture. IT One is a cost-effective way of tying information technology to business needs at Siam Cement, but its mission goes far beyond efficiency. The joint venture is also Siam Cement’s vehicle for creating worldclass capabilities in customer relationship management, supply chain management and other vital applications. (http://www.accenture.com: Accenture Outsourcing Cases) Sony Computer Entertainment (SCE) was preparing its launch of the latest version of the games console, PlayStation2 (PS2). Europe is the world’s largest market for games consoles and SCE wanted an online, direct-to-consumer presence in Europe to coincide with a Fall 2000 launch. But SCE Europe only had scattered informational websites with no transactional e-commerce capabilities. SCE Europe engaged Accenture to design and build the infrastructure to provide B2C capabilities in time for the PS2 launch within a short time frame of eight months. The solution was to create PlayStation.com (Europe), an entirely new online business entity, servicing consumers in 16 countries with 15 currencies and 11 languages. … Accenture’s technology skills were used to design and build the Internet engine, including the design and deployment of SAP as the backbone architecture. Supply chain management expertise ensured home delivery and an efficient order-processing machine. Human performance specialists trained, communicated and designed the organizational structure for the entire project. (http://www.accenture.com: Accenture Outsourcing Cases)

Siam Cement Group (Thailand)

Accenture

Sony Computer Entertainment Europe

Accenture

9

Second, this dissertation uses an alternative theoretical lens to examine IT outsourcing relationships. Various theoretical frameworks, such as transaction cost economics, resource based view, agency theory and social exchange theory, have been applied to prior studies on IT outsourcing. These theories have helped us understand why firms outsource and what they outsource in the domain of IT, but prior studies have failed to establish a connection between IT outsourcing practice and organizational value, and failed to explain why such causal relationship exists. This dissertation is among one of the first attempts to fill this gap by applying social capital theory to try to answer the why question. I believe that social capital theory will help not only argue for a causal relationship between the strategic IT partnership and value creation, but also explore the enabling conditions for and dynamics of this relationship. The proposed research model also has managerial implications. The propositions show that IT outsourcing should no longer be regarded as a mere tactical mechanism for realizing cost related benefits. Rather, it would be fruitful for managers to view IT outsourcing as a potential strategic vehicle for gaining access to knowledge and capabilities from external sources in a changing environment that requires both focus and flexibility. Further, the model highlights different factors that influence the extent of knowledge transfer and knowledge exploitation that occurs in IT outsourcing. To the extent that many of these factors are under the direct control of executives and managers, the model provides guidance on actions and interventions that can help in extracting maximal value from an IT outsourcing partnership. The remainder of this dissertation proceeds as follows. I review the existing research literature on IT outsourcing and identify theoretical gaps in Chapter 2. In Chapter 3, I

10

present the overarching theoretical framework and review pertinent literature thatinform s the underlying logical reasoning. Building upon the theoretical foundation, I present the research model and discuss the propositions of the proposed study in Chapter 4. Chapter 5 is a description of the methodology I used to conduct an empirical test of the research model. In Chapter 6, I summarize the results of data analysis and discuss the implications of the results. In Chapter 7, I discuss the limitations and contributions of this study, and discuss future research directions.

11

CHAPTER 2: LITERATURE REVIEW: IT OUTSOURCING Although the focus of this dissertation is on the transformational IT outsourcing practice, it is useful to review the general IT outsourcing literature. This literature review chapter starts with a summary of IT outsourcing issues that have been studied in prior research. Prior literature on IT outsourcing is categorized into three broad groups based on their theoretical perspectives: economic, strategic, and social. For each of these three groups, prior studies are discussed to show how different theories have been applied to the IT outsourcing context. I then critically evaluate prior literature and point out some theoretical gaps that exist between theory and reality. The IT outsourcing phenomenon has attracted the attention of academia since the early 1990s. Research on IT outsourcing to date has tapped into various issues related to IT outsourcing (Lee et al. 2002; Lee et al. 2003) such as: make-or-buy decision (Baden-Fuller et al. 2000; Clark et al. 1995; DiRomualdo et al. 1998; Gover et al. 1994; Hu et al. 1997; Loh et al. 1992a; McFarlan et al. 1995; Willcocks et al. 1995b), the Kodak effect (Hu et al. 1997; Loh et al. 1992a), motivations (Ang et al. 2002; Apte et al. 1997; Lacity et al. 1998; McFarlan et al. 1995), scope (Willcocks et al. 1995a), performance (Saunders et al. 1997; Willcocks et al. 1998), insourcing vs. outsourcing (Hays 1998; Hirschheim et al. 2002; Lacity et al. 1995a; Reponen 1993), contracts (DiRomualdo et al. 1998; Saunders et al. 1997), and partnership (Klepper 1995; Pennington et al. 1997; Saunders et al. 1997; Willcocks et al. 1995a; Willcocks et al. 1998). An extensive list of IT outsourcing studies is presented in Appendix 1, highlighting the IT outsourcing issues that each study has covered. As evident in the literature review, a wide range of theoretical perspectives have been utilized to study the IT outsourcing phenomenon. Numerous as they are, these theoretical

13

perspectives fall under three broad categories: economic view, strategic management view, and social view (Lee et al. 2002; Lee et al. 2003). Major theories that have been applied to the IT outsourcing studies are summarized in Table 2. In the following sections, I will first summarize IT outsourcing issues that have been discussed in the extant literature, followed by a brief overview of the major theoretical perspectives in prior literature on IT outsourcing, i.e., the economic, strategic and social views, and a discussion of how each theoretical perspective can be used to address various IT outsourcing issues (see Table 3). Then, based on the literature review, I will discuss the theoretical gaps between the emerging trends and the existing academic research on IT outsourcing.

14

Table 2: Summary of Theoretical Perspectives in IT Outsourcing Research
Theoretical Perspective Theoretical Argument Firms should consider three attributes of a market exchange—asset specificity, behavioral uncertainty, and transaction frequency—when making the make-or-buy decision. These attributes indicate situations in which opportunities exist for one or both parties involved in a market exchange to behave opportunistically. When opportunism arises, the costs of managing the exchange (transaction costs) increase and the performance of the exchange suffers. IT services can be provided by an external vendor if the costs of providing such services in-house exceed the transaction costs that might incur within the market exchange. A firm is viewed as a distinctive bundle of resources, which can generate competitive advantage for the firm if they are rare, valuable, irreplaceable, and inimitable. A firm will use market competence as long as it can generate capabilities using internal resources. However, if deficits in resources and capabilities are diagnosed on the firm’s strategic orientation, then market becomes an option to fill these gaps. Firms may need IT outsourcing if it lacks technical staff, advanced technology, or technical capabilities internally. The principal delegates the work to the agent who has specialty and performs the work. Agency problem arises when two parties have different goals and it is difficult or expensive to for the principal to measure what the agent is doing. The focus of agency theory is on developing the most efficient contract that governs the principal-agent relationship, assuming self-interested people and corporations. One of the most important and most difficult tasks in IT outsourcing is to writing and managing the contract that would reduce the risk of agency problem at the lowest cost level. Three important aspects within any relationship are interests, conflicts, and power. The interests may be reflected through the formation of various interest groups (political coalitions). If conflicts of interest arise, then power and politics serve as the medium for ultimate conflict resolution. Power is the potential of a party to influence the behavior of another in a certain manner. Politics is the manner through which power is exercised. Organizational behavior can be explained as a product of values, norms, beliefs, and regulations that originate in larger institutional contexts. IT outsourcing decisions can be viewed as an outcome of normative, mimetic, and coercive isomorphism. Studies (Ang et al. 1998; Barney 1999; Clemons et al. 1993; Dibbeern et al. 2002; Finlay et al. 1999; Grover et al. 1996; Jurison 2002; Lacity et al. 1995b; Lonsdale 2001; Murray et al. 1999; Ngwenyama et al. 1999; Poppo et al. 2002a; Poppo et al. 1998) (Baden-Fuller et al. 2000; Barney 1999; Dibbeern et al. 2002; Grover et al. 1996; Grover et al. 1994b; Insinga et al. 2000; Poppo et al. 1998; Quinn 2000; Venkatraman 1997) (Choudhury et al. 2003; Logan 2000; Poppo et al. 1998)

Transaction Cost Economics

Resource-Based View

Agency Theory

(Dibbeern et al. 2002; Lee et al. 1999)

Power and Political Theory Institutional Theory

(Ang et al. 1997; Ho et al. 2003; Jayatilaka 2002; Poppo et al. 1998)

15

Theoretical Perspective Diffusion of Innovation

Theoretical Argument Diffusion of innovation is the process by which an innovation is communicated through certain channels over time among members of a social system. Four characteristics of the diffusion process are: innovation, time, social system, and communication channels. The adoption of IT outsourcing can be viewed as the diffusion of an innovative process, influenced by various factors. Processes evolve over time as participants mutually and sequentially demonstrate their trustworthiness. Parties involve in social interactions where one party is obligated to satisfy a requirement, in order to receive benefit from the other party. The information processing of other party is tuned to the demands that originated from these interactions. For successful IT outsourcing relationships, both parties should demonstrate efforts of developing and maintaining a good relationship by behaving in consistence with the expectation of the other party. Parties involved in an exchange are in mutual agreement that the resulting outcomes of the exchange are greater than what would be obtained otherwise, which motivates both parties to consider the relationship important in and of itself, and to devote resources towards the development and maintenance of the relationship. It is characterized by the presence of norms associated with the creation, preservation, and harmonization of the relationship between the exchange partners. Partners involved in an IT outsourcing relationship should share norms that are “designed to enhance the well-being of the relationship as a whole”, in order to get the best value. The process of client-vendor interaction is a key feature of exchange. The interactions can be modeled along two dimensions: interactive and distributive. Interactive interactions are characterized by cooperative behavior. Both parties seek ways to achieve mutual objectives while bargaining. Interactive interactions form the basis for long-term relationships. (Hu et al. 1997)

Studies

(Lee et al. 1999)

Social Exchange Theory

(Goles et al. 2002)

Relational Exchange Theory

Partnership & Relational Perspective

(Goles et al. 2002; Grover et al. 1996; Klepper 1995; Lee 2001; Lee et al. 2002; Lee et al. 2003; Marcolin 2002; McFarlan et al. 1995; Willcocks et al. 1995a; Willcocks et al. 1998)

16

Table 3: Theoretical Perspectives and IT Outsourcing Issues Addressed Issue Addressed Make-or-buy decision Kodak effect Motivation Scope Performance Insource vs. outsource Contracts Partnership Theoretical Perspective Transaction Cost Economics, Resource-Based View, Institutional Theory Institutional Theory Transaction Cost Economics, Resource-Based View, Diffusion of Innovation Transaction Cost Economics Agency Theory, Power Political Theory; Social Exchange Theory, Relational Exchange Theory, Partnership & Relational Perspective Transaction Cost Economics, Production Cost Economics, ResourceBased View Agency Theory, Power Political Theory Social Exchange Theory, Relational Exchange Theory, Partnership & Relational Perspective

2.1

IT OUTSOURCING ISSUES Lee and colleagues review the evolution of IT outsourcing research at different stages

of its life-cycle. Major IT outsourcing issues (Lee et al. 2002; Lee et al. 2003) that have been addressed in prior literature will be summarized below. Although discussed separately, it is important to point out that as may be expected, the IT outsourcing issues are interrelated. 2.1.1 Make-or-Buy Decision In the early stage of the life-cycle of IT outsourcing, IT outsourcing was considered as a commodity. Therefore, the focus of academic research was on the choice between internal development and external acquisition. This issue of boundary choice, as reflected in the early predominance of Transaction Cost Economics, was also referred to as “make-orbuy” decision. The make-or-buy decision is usually made based on a wide range factors that management considers important to the survival and strategic competence of the firm

17

(Barthelemy et al. 2001; Clark et al. 1995; Lacity et al. 1993a; McFarlan et al. 1995; Pinnington et al. 1995), which are discussed subsequently. Aside from these considerations, researchers have also suspected possible “bandwagon effect” in IT outsourcing decision-making process. To find out whether there is “bandwagon effect” in the IT outsourcing decision processes, researchers collected and compared data of firm outsourcing activities before and after Kodak’s landmark announcement to outsource its IT functions (Hu et al. 1997; Lacity et al. 1995a; Loh et al. 1992b). The results, however, were not conclusive. The study by Loh and Venkatraman (1992) indicates significant impact of Kodak contract on the later outsourcing practices (Loh et al. 1992b). Hu et al (1997), on the other hand, found counter-evidence for the “Kodak effect” (Hu et al. 1997). A possible explanation for this discrepancy is that Loh and Venkatraman’s study was in the early days of IT outsourcing when the “bandwagon effect” was likely to be present. As firms became more experienced in the IT outsourcing activities, more recent studies should find much less or no presence of this effect. Another issue that should be taken into account at the time of IT outsourcing decision is the choice between insourcing and outsourcing. Although it is expected that IT outsourcing may generate potential benefits, the internal IT units should not be excluded from the considerations of alternatives to IT outsourcing because they could be more cost efficient than the outside vendors (Ang et al. 2002; Hirschheim et al. 2002; Lacity et al. 1995a; Reponen 1993). 2.1.2 Motivations The boundary choice decision of an organization is usually motivated by a combination of economic, technical, and organizational considerations (Clark et al. 1995;

18

Finlay et al. 1999; Grover et al. 1996). Results from previous survey studies (Antonucci et al. 1998b; Collins et al. 1995; Loh et al. 1992b; Reponen 1993) reveal that cost reduction, flexibility, and focus on core business are among the most dominant motivations (expected benefits) for IT outsourcing. In Table 4, I summarize major motivations for IT outsourcing. Table 4: Motivations for and Benefits of IT Outsourcing Category Motivation Cost reduction Selected Studies (Altinkemer et al. 1994; Clark et al. 1995; Collins et al. 1995; Ketler et al. 1993; Lacity et al. 1993a; Lacity et al. 1998; Reponen 1993; Smith et al. 1998) (Grover et al. 1994a) (Altinkemer et al. 1994) (Clark et al. 1995; Venkatraman et al. 1994) (Altinkemer et al. 1994; Clark et al. 1995; Collins et al. 1995; Grover et al. 1994a) (Altinkemer et al. 1994) (Clark et al. 1995; Collins et al. 1995) (Clark et al. 1995) (Altinkemer et al. 1994; Collins et al. 1995; Grover et al. 1994a; Smith et al. 1998; Venkatraman et al. 1994) (Altinkemer et al. 1994; Collins et al. 1995) (Altinkemer et al. 1994) (Venkatraman et al. 1994) (Altinkemer et al. 1994; Clark et al. 1995; Grover et al. 1994a; Ketler et al. 1993; Venkatraman et al. 1994)

Economies of scale Shared risk Improved performance Access to cuttingedge technology Specialized skills Technological Technological integration Reduced technological risk Technological flexibility Focus on core business Flexibility Strategic alliances Innovative use of IT functionality Increased knowledge and expertise

Economic

Strategic

2.1.3

Scope When the decision is in favor of outsourcing IT, the next consideration becomes the

scope of IT outsourcing. In prior literature, the scope of IT outsourcing has been discussed in

19

various formats: degree of outsourcing (complete vs. selective) (Lacity et al. 1995b; Loh et al. 1992a; Pinnington et al. 1995; Willcocks et al. 1995a; Willcocks et al. 1995c), number of vendors (single vs. multiple) (Michell et al. 1997; Ngwenyama et al. 1999), duration of contract (short-term vs. long-term) (Clark et al. 1995; Lacity et al. 1995b; McFarlan et al. 1995; Willcocks et al. 1995c), and outsourced functions (asset vs. service) (Clark et al. 1995; De Looff 1995; Grover et al. 1994a). Prior studies suggest that selective outsourcing with multiple vendors and short-term, tight contract are more likely to achieve positive outcome (Lacity et al. 1998; Lacity et al. 1996; Poppo et al. 2002a; Saunders et al. 1997). Short-term contracts provides flexibility while selective outsourcing eschews the problem inherent in total outsourcing, and demonstrates a way of more flexible and modular outsourcing (Lacity et al. 1996). Although the smaller-sized selective outsourcing deals attracted less public attention than mega-deals, selective outsourcing is the most common practice (Lacity et al. 2000; Lacity et al. 2001; Lacity et al. 1996; Pinnington et al. 1995). IT outsourcing functions are summarized in Table 5 below, and among them, previous survey findings showed that IT infrastructure is the most commonly outsourced IT/IS function that is selectively given out to external providers (Grover et al. 1996; Grover et al. 1994b; Lacity et al. 2000; Lacity et al. 2001).

20

Table 5: IT Functions Outsourced4 Category Examples

• Installation, operation and technical maintenance of centralized computers (client/server systems or systems software) System Operations / • Systems programming Data Center • Systems control • Security and catastrophe prevention • Construction, operation, and maintenance of networks • Administration and integration of data and applications servers into Telecommunications networks / Networks • Implementation and operation of relevant services for inter- and intra-company information exchange (e.g., EDI) • Development of software and applications • Systems analysis Applications • Project management Development, • Maintenance of existing applications Implementation, & • Data administration Maintenance • Implementation and adaptation of standard software packages (e.g., SAP R/3) • Advise and support for the users • Training, instruction and continued education of users Help Desk / User • Problem management Support / • Function as a bridge between other departments and the IS Information Center department • Test, procure, install, introduce and maintain hardware and software • Long-term IS planning • Integration of business planningand IS planning • Identification of future IS innovations IS Planning & IS Management • IS controlling • Conception of system architecture • Standards and methods 2.1.4 Performance Management chooses to outsource some or all IT functions of an organization with the expectation that IT outsourcing would bring economic, technological, or strategic
4

Adapted from Dibbern, J., and Heinzl, A. "Outsourcing Information Systems in Small and Medium Sized Enterprises: A Test of a Multi-Theoretical Casaul Model," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), SpringerVerlag, New York, 2002.

21

benefits. However, the IT outsourcing decision provides no assurance of desirable outcome. Therefore, researchers have also focused on performance and success of IT outsourcing (Currie et al. 2001; DiRomualdo et al. 1998; Hays 1998; Poppo et al. 2002a). A number of studies (Gopal et al. 2003; Lacity et al. 1998; Lacity et al. 2000; Loh et al. 1992a; Venkatraman et al. 1994) have examined successful outcomes of IT outsourcing based on various measurement indicators such as cost saving (Lacity et al. 1998), relationship satisfaction (Lee et al. 1999), and overall success (Grover et al. 1996; Lee 2001; Lee et al. 1999). Although respondents of prior studies indicate that cost reduction is the most often realized benefit, researchers acknowledge that IT outsourcing performance/success should be measured along multiple dimensions such as economic, technological, strategic, and overall satisfaction with contract (Lee et al. 1999; Saunders et al. 1997). On the other hand, a great amount of risk is involved in the IT outsourcing practices. Numerous studies have pointed to the downside of IT outsourcing such as lower service quality, loss of control and flexibility, lock-in relationship, and dependence on vendors (Antonucci et al. 1998a; Araujo 1998; Barthelemy 2001; Earl 1996; Grover et al. 1994a; Lei et al. 1995; Lonsdale 2001). Some researchers (Earl 1996; Lei et al. 1995) argue that IT outsourcing leaves the firm no chance of organizational learning. Much learning about the capability of IT is experiential. Therefore, without experiencing IT, firms will not be able to appreciate the challenges (Earl 1996). In the long run, it is desirable for a firm to maintain innovative capacity in IT because of the potential of finding new ways of providing IT services and of exploiting IT for the business. If the firm chooses to outsource its IT functions, its ability to use IT to innovate may be impaired. A firm’s ability to innovate is predicated on organic and fluid organizational processes and experimental and

22

entrepreneurial competencies, and outsourcing IT renders these premises impossible (Earl 1996). 2.1.5 Co ntracts IT outsourcing arrangements are established and maintained through various types of contracts. As IT outsourcing practices evolve, IT outsourcing contracts become more complicated due to uncertainty and contingencies involved, and play an important role in the success of the IT outsourcing projects (DiRomualdo et al. 1998; Feeny et al. 1998; Willcocks et al. 1995c). A number of researchers have emphasized the importance of effectively designing and managing IT outsourcing contracts (Lacity et al. 1998; McFarlan et al. 1995; Saunders et al. 1997; Willcocks et al. 1995a; Willcocks et al. 1998). Based on IT outsourcing practices, researchers (Behara et al. 1995; De Looff 1995) have developed typologies of IT outsourcing contracts, as summarized in Table 6.

23

Table 6: Typologies of IT Outsourcing Contracts Studies Contract Characteristics

Time and materials Payment is based on actual use of personnel and materials Fixed fee Payment is based on a lump-sum for a defined workload or service Fixed fee plus variable elements Payment is based on a predicted changes in workloads or business circumstances De Looff (1995) Cost plus management fee Payment is based on the real cost incurred by vendor plus a percentage Fee plus incentive scheme Payment is based on some benefits that accrue to the client or performance over and above an agreed baseline Share of risk and reward Payment is based on how well the client or a joint venture performs Classical contract Client signs the vendor’s standard contract without making any specialized changes. Lacity & Neo-classical contract Client and vendor include special requirements such as detailing contingencies, Willcocks measures of performance, service levels, and penalties of non-performance. (1995) Relational contract Client and vendor do not detail contingencies in the contracts, implying that contracts will not be used as original references, but both parties will commit to solving disputes under the trust and spirit of partnership. Fee-for-service contract: A customer pays a fee to a supplier in exchange for the management and delivery of specified IT products or services. Fee-for-service contract may be Lacity & categorized as follows: standard, detailed, loose, and mixed. Willcocks (1998) Strategic alliance/partnership Collaborative interorganizational relationships involving significant resources of two or more organizations to create, add to, or maximize their joint value.

24

2.1.6

Partnership Although IT outsourcing contracts are an important determinant of the ultimate

success of IT outsourcing projects, it is not sufficient to manage and maintain the IT outsourcing arrangements by contracts only. A good contract alone does not ensure a good relationship, and clients and vendors find it necessary to create social norms to complement their use of contracts (Poppo et al. 2002a). Due to the high technological uncertainty and emerging contingencies, no one contract can address every rule and agreement at the outset. Moreover, IT outsourcing arrangements between the clients and vendors also involve noncontractual interactions, which gives rise to forms of relationships that extend beyond the contractual binding (Lee et al. 2002). Having realized the limitations of the contracts, organizations seek a flexible relationship with external vendors to achieve outsourcing success (Klepper 1995; Lasher et al. 1991; McFarlan et al. 1995; Willcocks et al. 1998). An effective partnership between the client and the vendor, therefore, can be a key predictor of outsourcing success (Grover et al. 1996; Lee 2001; Lee et al. 1999). In the sample of their study, Saunders and colleagues find that partnership arrangements are more likely to be successful than supplier relationships (Saunders et al. 1997). Given the variety of issues that arise in the IT outsourcing context, what theoretical perspectives have been applied to examine the phenomenon? In the following section, I will present an overview of the major theoretical perspectives that have been used in prior IT outsourcing literature and discuss how these theories have been applied to address IT outsourcing issues.

25

2.2

ECONOMIC VIEW OF IT OUTSOURCING Economics theories such as transaction cost economics and agency theory argue that

hierarchies are more efficient than markets in producing goods and services, under the assumption that organizations and individuals are self-interested and will behave opportunistically. Transaction cost economics has been widely used to describe and explain the IT outsourcing phenomenon. Two types of costs should be considered at the time of outsourcing decision: production and coordination. Agency theory focuses more on how to reduce agency costs using a contract. 2.2.1 Transactions Cost Economics Transactions cost economics (TCE) is fundamentally about the “make-or-buy” decision faced by a firm. It attempts to explain how the boundary of a firm is determined. Specifically, the organization of a firm’s economic activities is determined by the trade-offs between the relative cost of production and coordination (hierarchy) and the relative cost of transaction (i.e., cost of searching, negotiation, contracting, coordination, and control in the market). Whenever the transactions costs of a specific economic activity exceed the coordination costs, it should be kept in-house, and vice versa. Whenever the in-house production costs of an economic activity exceed that of an external provider, it should be carried out in a market rather than in a hierarchy. Transactions costs are contingent upon three factors: asset specificity, uncertainty, and frequency of transactions. The boundary choice of a firm is determined based upon these two contingencies jointly (Williamson 1975; Williamson 1996). TCE has been a predominant theoretical framework used to explain the IT sourcing phenomenon. Some argue that since IT reduces the unit cost of coordination and the

26

transaction specificity of investment in inter-firm interactions, the increased adoption of IT will lead to greater degree of outsourcing and hence less integrated firms (Clemons et al. 1993; Malone et al. 1987). In studies that examined the relationship between the IT outsourcing component functions and outsourcing success, researchers (Klepper 1995; Lacity et al. 1993b; McFarlan et al. 1995) have found that TCE provided a good framework for IS outsourcing, and that asset specificity of outsourcing transactions needed to be considered in any decision to outsource (Grover et al. 1994b). A more recent study by Gopal and colleagues extends this line of research by adopting an incomplete contract perspective. They study the determinants of contract choice, and their analysis suggests that the choice of contract and other factors significantly affect the profits accruing to the vendor in the context of offshore software development projects (Gopal et al. 2003). The theoretical explanatory power of TCE, however, is somewhat equivocal. In a study of economic determinants of IT outsourcing in the banking industry, Ang and Straub found that IT outsourcing was strongly influenced by relative production cost advantages offered by the vendors and that transactions costs played a much smaller role than production costs(Ang et al. 1998) . Having realized the theoretical limitation of Transaction Cost Economics, researchers have called for application of multiple theories beyond Transaction Cost Economics (Baldwin et al. 2001; Poppo et al. 1998). Poppo and Zenger (1998) examine how well various theories explain a firm’s boundary choice and find that the decision of boundary choice is likely to be complex, requiring the integration of transactions costs and other theories such as agency theory and social exchange theory.

27

2.2.2

Agency Theory Agency theory argues that to achieve the specialization benefit, a principal delegates

the work to an agent who has the specialty and performs the work. Agency problem arises when the principal and the agent have different goals and when it is difficult or expensive to for the principal to measure what the agent is doing (Eisenhardt 1989a). The focus of agency theory is on developing the most efficient contract that governs the principal-agent relationship, assuming self-inte rested people and corporations. As evidenced in prior literature, one of the most important and most difficult tasks in IT outsourcing is writing the contract that minimizes the risk of agency problem and maximizes control and flexibility (Clark et al. 1995; Clemons et al. 1993; Gopal et al. 2003; Lacity et al. 1993a; Lacity et al. 1995b; Lacity et al. 1998; Lacity et al. 1996; Marcolin 2002; Willcocks et al. 1998). Early studies suggest that firms should create a complete or tight contract, and use the contract as the major control mechanism to safeguard performance and control costs (Behara et al. 1995; Lacity et al. 1993b). The outsourcing context, however, is characterized by incomplete information, and it is impossible for the contracting parties to foresee every future contingency upfront. Therefore, the common IT outsourcing practice is to sign short-term contracts that can be renegotiated and reinterpreted later. 2.3 STRATEGIC MANAGEMENT VIEW OF IT OUTSOURCING In prior IT outsourcing research, the most widely used theory from a strategic management perspective is the resource-based view. The resource-based view considers a firm’s resources as the foundation of the firm’s strategy, and examines the strategic impacts the firm’s internal resources and capabilities have on its position in competition.

28

The resource-based view (RBV) has its root in Penrose’s seminal work Theory of the Growth of the Firm, and is further developed by Barney (1991). Proponents of the RBV view a firm as a bundle of productive resources, and argue that resources that are scarce, valuable, non-substitutable, and inimitable are sources of sustainable competitive advantage (Barney 1991). The resource-based approach to strategy formulation involves careful analysis of a firm’s resource and capability base and recommends selecting a strategy to extend and upgrade the gaps in the resources and capabilities. In the presence of such gaps, the external acquisition of complementary resources and capabilities become necessary. Resource-based view is particularly pertinent to the supplementary nature of IT outsourcing. A firm’s boundary choice is determined by its internal IT resources and capabilities (Barney 1999). That is, IT is outsourced because gaps exist between the IT needs and the firm’s incumbent stock of resources and capabilities. Through IT outsourcing, a firm can obtain specific human resources (e.g. skilled programming and telecommunication personnel) and technological resources (e.g. network infrastructure) by evaluating its needs and managing the relationship with an outside supplier (Dibbeern et al. 2002; Grover et al. 1996; Grover et al. 1994a). Grover and colleagues (1994b) found empirical support for the resource-based view in the IT outsourcing context. Their results indicate that organizations with gaps in quality of information, and particularly in support, would tend to increase their outsourcing based on the extent of discrepancy. They also found that the organizational strategy and the role of IT moderated the relationship between the capability gap and the degree of outsourcing (Grover et al. 1994b).

29

2.4

SOCIAL VIEW OF IT OUTSOURCING IT outsourcing arrangements are typically based on contractual relationships between

the client and the vendor. Drawing upon theories from marketing, IS researchers have also adopted a social perspective to study the IT outsourcing phenomenon (Goles et al. 2002; Klepper 1995; Lee et al. 2002; Lee et al. 2003; Marcolin 2002; McFarlan et al. 1995; Willcocks et al. 1998). Clemons and Reddi’s prediction of a trend of “moving to the middle” (between market and hierarchy) in the IT outsourcing practices (Clemons et al. 1993) can be viewed as the beginning of the social perspective in IT outsourcing research. Other research findings have echoed the importance of understanding the social contexts in which the economic transactions take place. Social exchange theory, relational exchange theory, and power and political theory have been applied to prior IT outsourcing studies. 2.4.1 Social Exchange Theory Social exchange is defined as “voluntary actions of individuals that are motivated by returns they are expected to bring and typically in fact bring from others” (Blau 1964). Social exchange theory posits that exchanges are embedded in a social context. Parties that are involved in the exchange behave within the expectation of each other, believing that the other party will behave benevolently in return. Due to the voluntary character, social exchange involves more uncertainty and is less formal than economic exchange (Das et al. 2002). Therefore, trust is an important factor in this context. In a social exchange, processes evolve over time as participants mutually and sequentially demonstrate their trustworthiness. The information processing of other party is tuned to the demands that originatefrom these interactions. Social exchange theorists also consider dependence on organization as another actor in the social contexts. For successful IT outsourcing relationships, both parties should

30

demonstrate efforts of developing and maintaining a good relationship by behaving in a manner consistent with the expectation of the other party. Outsourcing is not recommended if trust is not present between the parties and the dependence of one party upon the other is much higher than the other way around. 2.4.2 Relational/Partnership Perspective About a decade ago, researchers had different conceptualizations of IT outsourcing partnerships. Some researchers considered it unsuitable to label IT outsourcing vendors as strategic partners because the vendor and the client did not share the profit motives (Lacity et al. 1993b). Other researchers, more receptive to the partnership concept in the IT outsourcing phenomenon, viewed partnership as an arrangement particularly for the total IT outsourcing practices (McFarlan et al. 1995; Willcocks et al. 1995a). Even in the limited area of applications, the partnership arrangement was found to be problematic in some cases (Willcocks et al. 1995a). Neither of these views, however, seems to be applicable to today’s IT outsourcing industry. Increasingly, firms are looking to their outsourcing partners for new or improved IT-based business capabilities that can have a direct impact on business performance, such as dynamic forecasting, logistics optimization, and customized marketing and product offerings (DiRomualdo et al. 1998). Increasing attention is being paid to building a successful partnership between the focal firm and the outsourcer (Lee 2001), and firms have been successful in forming partnerships with external vendors to execute only part of the overall suite of IT functions (selective IT outsourcing). The emerging social (relational) perspective of IT outsourcing debunks the view that shared profit motive is the only determinant of the partnership in IT outsourcing. The focal firm and the outsourcer can be partners because the focal firm views the outsourcer as having the knowledge, expertise,

31

and business perspectives that can contribute in a strategic way to its business (McDowell 2003). In their recent study, Poppo and Zenger rebut the common belief that relational exchange arrangements are substitutes for complex contracts in the interorganizational exchanges. They hypothesize a complementary relationship between contracts and relational governance, and empirically test the hypotheses in a sample of information service exchanges. They find evidence that increasingly customized contracts are coupled with high level of relational governance. Results also suggest that the interdependence between formal contracts and relational governance enables performance improvements in interorganizational exchanges (Poppo et al. 2002b). 2.4.3 Power and Political Theory Three important aspects within any relationship are interests, conflicts, and power. The interests may be reflected through the formation of various interest groups (political coalitions). If conflicts of interest arise, then power and politics serve as the medium for ultimate conflict resolution. Power is the potential of a party to influence the behavior of another in a certain manner. Politics is the manner through which power is exercised. In the IT outsourcing context, the IT outsourcing decision can be regarded as an outcome of power distribution among stakeholders (such as the internal IT unit, functional units, top management, customers, suppliers, etc.) and political reasons. The stakeholders’ perceptions of IT outsourcing are usually reflected in the motivations (or opposition) for IT outsourcing. Power distribution and political strengths of stakeholders, on the other hand, can also be reshaped as a result of an outsourcing arrangement. For example, the internal IT unit may become less favorable because the IT functions are performed and managed by an

32

external vendor. More power may lean towards the external vendor when the client firm becomes dependent on the vendor. Lacity and Hirshheim (1993) discuss how IT executives use outsourcing as a means to enhance their power. 2.5 CRITIQUE OF PRIOR RESEARCH Despite the burgeoning body of academic research focused on IT outsourcing, several theoretical gaps exit between experiential reality of IT outsourcing practicestoday and the extant academic research. The present study seeks to fill these gaps. First, the predominant theoretical frameworks used to explain the IT outsourcing decision have been transaction cost economics and resource-based view. Recent academic research, however, suggests that transaction cost economics and resource-based view are no longer adequate to explain the IT outsourcing phenomenon. Poppo and Zenger (1998) tested how well several alternative theories explained the firms’ make-or-buy decisions in information services and found that the boundary choice decision is likely to be complex and requires integration of transaction cost, knowledge-based and measurement reasoning (Poppo et al. 1998). Some other researchers (Baldwin et al. 2001; Lee et al. 2002; Lee et al. 2003) also call for application of multiple theoretical frameworks beyond transaction cost economics and the resource-based view. Recent research on IT outsourcing focuses on issues other than motivation, decision, and success of IT outsourcing. This IT outsourcing research trend shows that researchers are applying multiple and alternative theoretical frameworks to explore multiple aspects of this complex phenomenon (see Table 2 and Table 3). However, it is surprising that knowledge, as one of the most important component of the knowledge economy, has received limited attention in the IT outsourcing research (see

33

Table 2). IT outsourcing practices today are no longer the same as those in the traditional sense. In today’s economy, firms are experiencing continuous waves of revolutionary change in information technologies. Thus, the reasons for IT outsourcing become different than those more than a decade ago. The focus on motivation for IT outsourcing has shifted from catching up with rivals (“bandwagon effect”) and changing sources of profit in the value chain to exploiting technology shifts and emerging markets (Baden-Fuller et al. 2000). Firms sometimes need to buy-in new skills to stay in the competitive race because the key technologies required to fulfill customer needs have changed. On other occasions, faced with the emerging markets, firms usually do not possess either technology or knowledge about the market. A firm needs to gain access to these critical factors, search the emerging market, and carry out innovation through outsourcing to excel in competition when rivals are left in a disadvantaged position without external assistance (Baden-Fuller et al. 2000). These new IT outsourcing practices require not only the transfer of IT artifact, technical knowledge, but also the transfer of non-technical business knowledge (such as business process knowledge or best practices of industry) from the outsourcer to the focal firm. Apparently, the dynamics of the IT outsourcing phenomenon invite alternative theoretical frameworks for further understanding by both academia and practitioners. Second, although numerous researchers have demonstrated the performance benefits that accrue from IT outsourcing, this research strand lacks a systematic theoretical explanation of the relationship between the IT outsourcing decision and improved performance. Moreover, in studies that highlight the performance benefits, the performance measures used have a tendency to focus on short-term oriented, cost-related benefits. The

34

impact of IT outsourcing practice on a firm’s long-term performance has largely been ignored. Third, a large proportion of the extant IT outsourcing literature tends to treat the relationship between the outsourcer and the client as an arms-length transaction. This view is not surprising, given that TCE, which considers markets and hierarchies as dichotomies, has been the dominant theoretical lens for viewing IT outsourcing. Both parties are viewed as passive participants, with the client firm handing off part or all of its IT functions to the vendor, and the vendor firm striving to hit the “baseline” as agreed upon in the IT outsourcing contract. The paradox of IT outsourcing, however, is that “it touts market efficiency when its applicability on a broad scale depends on non-market, human trust building relationships” (Klein 2002). As a result, some researchers suggest that the IT outsourcing relationship should be managed less as a contract and more as a partnership (Goles et al. 2002; Kern et al. 2002b; Lasher et al. 1991; Lee et al. 1999; Lynskey 1999; McFarlan et al. 1995; Venkatraman et al. 1994; Willcocks et al. 1998). Yet most studies on IT outsourcing to date have not demonstrated how the client and the vendor interact throughout the IT outsourcing practice to achieve the targeted goals. Most of the prior studies used descriptive statistics from large-scale industry surveys or summary recommendations from detailed interviews to identify dos and don’ts of IT outsourcing practices. However, the real dynamics of the complex and multifaceted phenomenon remain largely unknown. In the IT outsourcing context, the relationship between a client and a vendor is switching from the traditional arms-length relationship to strategic partnership, in which the success of one firm is dependent on the success of the other. A number of case studies shed

35

light on the ongoing dynamics between IT outsourcing partners (Lasher et al. 1991; Lynskey 1999; Willcocks et al. 1998). In these cases, the relationship between the IT outsourcing partners has been described as cooperative and collaborative, and has been found to yield an extension of technological capabilities of both firms. Several more recent empirical studies have also found that a successful IT outsourcing partnership requires collaboration and knowledge sharing between the focal firm and the outsourcer (Lee 2001; Lee et al. 1999). Successful IT outsourcing in a digital economy is characterized by a collaborative approach to decision making and new ideas, an open flow of information between the companies, and a commitment to share knowledge capital (McDowell 2003). This emerging trend indicates that it is no longer sufficient to get the sophisticated IT function executed by an external vendor. Rather, to achieve a successful outcome from the IT outsourcing practice, the acquired information technology must be aligned with the strategic vision of the firm and integrated in the existing or newly created business processes. Some firms that outsource IT for business impact ask their outsourcing partner not only to implement new systems with bottom-line impact, but to take further responsibility for implementing changes in the business as well (DiRomualdo et al. 1998). 2.6 SUMMARY In this chapter, prior literature on IT outsourcing was summarized by both IT outsourcing issues of interest and theoretical perspectives that have been applied in prior studies. By pointing out the theoretical gaps, I stress the goal of the dissertation—to provide an alternative lens for viewing the IT outsourcing phenomenon. In Chapter 3 that follows, the social capital perspective and a knowledge-based view are used as the underlying

36

theoretical frameworks for a proposed research model to examine a firm’s IT value creation process through strategic IT partnerships.

37

CHAPTER 3: THEORETICAL UNDERPINNINGS This chapter reviews the underlying theoretical frameworks of this dissertation, social capital and the knowledge-based view. The origin of social capital and its salience in studying IT outsourcing will be briefly discussed in this section. The knowledge-based view has been adopted in a wide range of research endeavors in strategy (Eisenhardt et al. 2000). In addition, the development of the conceptual model is supported by findings from research streams such as organizational learning and strategic alliances. Although a distinctive theory, organizational learning is closely related to the knowledge-based perspective because firms build their knowledge stock through various modes of learning . Further, strategic alliances are an area in which knowledge-based view has been extensively applied. Therefore, I review these research streams as well, and summarize key findings from these research streams. 3.1 SOCIAL CAPITAL Since the early 1990s, social capital has been a widely studied concept in multiple disciplines in social sciences. Rooted in the classics of sociology in the late 1800s, the concept of social capital was introduced by Bourdieu and made popular by Coleman and Putnam in the late 1980s. Bourdieu, the pioneer who first established the framework for theorizing and research in the social capital area, defines social capital as “the aggregate of the actual or potential resources that are linked to possession of a durable network of more or less institutionalized relationships of mutual acquaintance or recognition” (Portes 1998). This definition implies that social capital can be decomposed into two elements: the social relationship itself that allows individuals to claim access to resources possessed by their associates, and the amount and quality of those resources (Portes 1998). Bourdieu’s

39

definition of social capital focuses on the collectively owned capital generated through resources linked to the membership in a group. His major goal is to develop a social stratification of different forms of capitals—social capital, economic capital, cultural capital, etc. The second school of social capital has adopted a more normative approach. In his 1988 article on social capital in the creation of human capital, Coleman emphasizes that social capital is not possessed by a single entity but is embedded in a network relationship involving multiple entities (Coleman 1988). Coleman argues that social capital is defined by its function: “It is not a single entity but a variety of different entities having two characteristics in common—they all consist of some aspect of social structure, and they facilitate certain actions of individuals within the structure. Like other forms of capital, social capital is productive, making possible the achievement of certain ends that would not be attainable in its absence.” (Coleman 1988) Coleman highlights the importance of the closure of a social network, which nurtures and ensures the emergence of effective norms among the members within the network. In addition, access to a certain social network as an information channel forms the basis of future actions of an entity, and therefore may generate added value due to the increased ability of an entity to tap into resources in the social network (Grix 2001). Putnam’s view of social capital shifts focus towards the correlation between the “civicness” (as embodied in density of associations and relations of reciprocity) and the democracy in a geographical region. He treats social capital as “features of social organization, such as trust, norms, and networks that can improve the efficiency of society by facilitating coordinated actions” (Putnam 1993). In his research, trust is considered as the

40

most critical factor that facilitates and perpetuates social capital in a society and the outcome of “norms of reciprocity and networks of civic engagement” (Grix 2001). Yet another school of research on social capital adopts a network-based utilitarian approach (Burt 1992; Burt 2000; Lin 2001). As summarized by Burt (2000), social capital in essence is a metaphor about advantage that individuals or groups have because of their location in the social structure (Burt 2000). Proponents of the network approach such as Burt and Lin criticize Coleman’s definition of social capital as a variety of entities, and propose to remove tautology and confusion by focusing on distinguishable and measurable variables within the egocentric network approach (Burt 1992; Burt 2000; Lin 2001). Specifically, they measure various structural characteristics of a network (such as strength of tie, structural holes, centrality, embeddedness, etc.) to examine the relationships among entities within the network and the outcomes of social capital (Burt 1992; Granovetter 1973). Despite the obviously sociological origin of social capital, the concept has been considered acceptable in other social science disciplines (Adam et al. 2003). Nahapiet and Ghoshal’s seminal article (Nahapiet et al. 1998) has led to an increased application of social capital to business research areas such as intra- or inter-organizational arrangements (Anand et al. 2002; Chung et al. 2000; Koka et al. 2002; Tsai 2000), technology management (Preece 2002), innovation (Adler et al. 2002; Cohen et al. 1999; Reagans et al. 2001; Yli-Renko et al. 2001), organizational behavior(Bolino et al. 2002; Karl 2001; Pennings et al. 1998) and dynamic capabilities (Blyler et al. 2003). Extending the sociology research on the outcomes of social capital (such as efficient governance, democracy, social cohesion, etc.), Nahapiet and Ghoshal (1998) argue from a business and managerial perspective that social capital facilitates the creation of intellectual capital within an organization. Enlightened by their

41

conceptual framework, researchers have examined the role social capital plays in facilitating knowledge exchange in and among business units (Tsai 2001; Tsai et al. 1998; Yli-Renko et al. 2001) and in determining the extent of innovation (Landry et al. 2002). Based on previous studies on social capital in the management discipline, I adopt the following conceptualizations of social capital (Adam et al. 2003) for the present research: (1) Social capital works as a catalyst for disseminating human and intellectual capital; and (2) Social capital provides the foundation for greater levels of synergy and coordination. In this dissertation, I intend to extend Nahapiet and Ghoshal’s argument further to an interorganizational context, in which firms are involved in networked organizational forms. I study how social capital in such organizational forms influences knowledge creation. Details of the underlying arguments and theory development are presented in the “research model and proposition” section. Social capital is a new but promising theory for studying the IT outsourcing phenomenon. Burt (2000) has pointed out that social capital promises to yield new insights into why certain people and organizations perform better than others. In the IT outsourcing research area, traditional transaction cost economics and resource-based view of the firm have provided theoretical foundations for understanding why and what to outsource, whereas social capital will serve as a new theoretical underpinning for understanding how IT outsourcing can benefit the firm. It is the access to and the quality of superior knowledge or capabilities from external sources that give the focal firm advantage in new knowledge creation.

42

3.2

THE KNOWLEDGE-BASED VIEW It has been recognized that a continuously renewed knowledge stock and an ongoing

knowledge creation process have become the one of the managerial priorities in today’s organizations. Continuous learning of new knowledge forms the basis for organizational renewal and sustainable competitive advantage (Inkpen 1996). Academic researchers have extended the resource-based view to incorporate knowledge as the most strategically significant resource of the firm (Grant 1996b; Kogut et al. 1992). Proponents of the knowledge-based view argue that heterogeneous knowledge bases and capabilities among firms are the main determinants of sustainable competitive advantage and superior performance (Decarolis et al. 1999). The widely accepted concept of knowledge in the strategy field is grounded in Western epistemology, in which knowledge is considered as “justified true belief” (Nonaka et al. 1995). In the traditional view, knowledge is modeled as an “unambiguous, reducible, and easily transferable construct, while knowing is associated with processing information” (Eisenhardt et al. 2000). A more recent view of knowledge, however, is based on the distinction between tacit and explicit knowledge (Polanyi 1962). Tacit knowledge is embedded in the individual and is very difficult to articulate. The only way to learn tacit knowledge is through observation and practice. As knowledge is explored, put into action and socially justified, some part of it may be codified into explicit forms that can be processed and transferred. Prior studies in strategy have shown that knowledge (especially tacit knowledge) is the most critical resource of a firm to generate sustainable competitive advantage because of its inimitability and relative immobility (Grant 1996b; Gupta et al. 2000a).

43

Other researchers categorize organizational knowledge differently. Kogut and Zander distinguish two categories of knowledge as information and know-how (Kogut et al. 1992). Information is the “knowledge that can be transmitted without loss of integrity once the syntactical rules required for deciphering it are known” (Kogut et al. 1992). Knowledge as information implies knowing what something means, while know-how is a description of knowing how to do something. Know-how is defined as “the accumulated practical skill or expertise that allows one to do something smoothly and efficiently” (von Hippel 1988). Quinn and colleagues argue that there are four different types of knowledge: cognitive knowledge (know-what), advanced skills (know-how), system understanding and trained intuition (know-why), and self-motivated creativity (care-why) (Quinn et al. 1996). Nonaka developed essential elements of a theory of organizational knowledge creation (Nonaka 1994), a paradigm with a major theme that organizational knowledge is created through an ongoing dialogue between tacit and explicit knowledge. Organizational knowledge creation is viewed as an upward spiral process, starting from the individual level, moving up to group level and organizational level, and even reaching to the interorganizational level (Nonaka 1994). Nonaka argues that while new knowledge is developed by individuals, organizations play a critical role in articulating and amplifying that knowledge. The value of knowledge to a firm lies in the fact that it will grow exponentially if it is properly stimulated and shared (Quinn et al. 1996). Dierickx and Cool conceptualized the knowledge of a firm as stocks and flows. Stocks of knowledge are accumulated knowledge assets, while flows are knowledge streams within and across organizations that contribute to the accumulation of knowledge (Dierickx et al. 1989). Superior stocks and flows are viewed

44

as sources of sustained competitive advantage and better performance. Kogut and Zander posited that firms do better than markets in terms of knowledge creation and transfer (Kogut et al. 1992). In the same spirit as Nonaka’s spiral process of knowledge creation, they argue that although knowledge resides in individuals, it is embedded in the organizational principles and routines whereby people voluntarily cooperate in an organizational context. Knowledge creation is path-dependent through the replication and recombination of existing knowledge, which makes it possible to become a source of competitive advantage. A firm also needs to continuously recombine its knowledge and apply it to new opportunities in order to deter imitation by its competitors. Grant further developed the knowledge-based view as a theory of strategy (Grant 1996a) and a theory of organization (Grant 1996b). Grant argues that sustained competitive advantage is obtained by non-proprietary tacit knowledge residing in individuals and the firm’s ability to integrate individual specialized knowledge and apply it to new products and services (Grant 1996a; Grant 1996b). To summarize, the literature on the knowledge-based perspective indicates the following. (1) Knowledge (especially tacit knowledge) is the most strategically important resource that can be a source of sustainable competitive advantage for a firm. (2) The knowledge stock of a firm needs to be continuously renewed through knowledge recombination and knowledge creation to generate value. (3) Value creation is determined by the firm’s ability to integrate knowledge at different levels and the ability to apply the integrated knowledge to create new business opportunities. As is evident from the brief review, there is agreement that knowledge constitutes a significant resource for firms and

45

confers the potential for superior performance and competitive advantage. In essence, knowledge constitutes the basis for organizational learning. 3.3 OTHER RELEVANT RESEARCH STREAMS Other than the overarching theoretical frameworks, studies in two other research streams—organizational learning and strategic alliance—have been informative for this dissertation. Relevant findings from these two research streams are summarized below. 3.3.1 Organizational Learning Organizational learning is an underlying theoretical foundation for the knowledgebased perspective. Organizational learning serves as the mechanism through which firms access, obtain, and create knowledge and capabilities to renew their cumulative knowledge stock on a regular basis. Today, managers in most organizations are convinced of the importance of improved organizational learning in order to achieve the organizational renewal and transformation necessary for a burgeoning world market (Nevis et al. 1995). The importance of organizational learning is also manifested in the successful cases of learning organizations that have the well-developed core competencies to launch new products and services and the ability to fundamentally renew or revitalize (Nevis et al. 1995). Huber defines learning as a process of information processing by an entity, which changes its range of potential behaviors (Huber 1991). Although le arning theory originally focused on individuals, it has been increasingly applied to organizational levels, where it is viewed as a key process in the adaptation of organizations to the environment (Argote 1999; Knight 2002). Huber describes organizational learning as a process in which knowledge is acquired from various sources, distributed within the organization, interpreted based on the organizational context, and then stored in organizational memory (Huber 1991).

46

Huber (1991) argues that there are five processes through which organizations acquire knowledge: congenital learning, experiential learning, vicarious learning, grafting, and searching. Therefore, firms can learn not only from internal sources such as organizational experiments, organizational self-appraisal, and unintentional and unsystematic learning, but also from external sources by imitating competitors or acquiring and grafting on new members who possess knowledge not previously available within the organization (Huber 1991). Numerous studies in strategy have examined organizational learning from external sources. Cohen and Levinthal linked organizational learning and innovation to the evolving knowledge base of the firm by introducing the idea of absorptive capacity, which is the ability to recognize the value of external information, assimilate it and apply it to commercial ends (Cohen et al. 1990). According to Cohen and Levinthal, a firm’s ability to internalize external information and knowledge is largely a function of the level of the firm’s prior knowledge. In the same vein, Nonaka and Takeuchi, in their book The Knowledge Creating Company, view organizational learning as an adaptive change process that is influenced by past experience, focused on developing and modifying routines, and supported by organizational memory (Nonaka et al. 1995). A school of thought on knowledge and learning has emerged in the strategy literature, focusing on the social aspects of knowledge (Brown et al. 1991; Spender 1996). This approach focuses more on the process of knowing than on knowledge as an objective and transferable resource. Knowledge is considered socially constructed and embedded within the context; and the creation of meaning (learning) occurs in ongoing social interaction grounded in working practices and the specifics of social and cultural setting (Eisenhardt et al. 2000). Brown and Duguid (1991) argue that learning theory should be distanced from

47

codified, transferable and objective notions of knowledge, and focus instead on knowledge in context. In their view, meaningful knowledge is deeply related to daily work, and the acquisition of new knowledge is socially constructed from working practices. To summarize the above, several major points in the organizational literature are worth noting. (1) Organizational learning is a critical factor for organizational renewal and transformation. (2) Organizational learning is a process in which several knowledge related activities take place. (3) Firms can learn through different channels and from various sources. 3.3.2 Strategic Alliances/Partnerships Strategy researchers increasingly recognize a growing trend toward the hybrid form of governance structure, or “network form of organization” (Powell 1999). It has been widely acknowledged that the proliferation of interfirm networks such as strategic alliances/partnerships is driven by the challenge of growing knowledge intensity (Adler 2001; Powell 1998). As product life cycles shorten and competition intensifies, timing consideration and access to know-how have become paramount concerns (Powell 1999). Researchers have found that firms are becoming less self-sufficient to generate science and technology to sustain growth in face of the uncertainty and complexity of today’s globalized business environment(Morrison et al. 1997; Powell 1999) , and that the most qualified centers of excellence in the relevant know-how are located outside the firm’s boundary (Teece et al. 1987). Strategic alliances/partnerships, defined as “any voluntarily initiated cooperative agreement between firms that involves exchange, sharing, or co-development, and it can include contributions by partners of capital, technology, or firm-specific assets” (Gulati 1999), can be viewed as a means by which a firm learns from external sources.

48

Studies on strategic alliances/partnerships confirm a significant increase in their use as a strategic device (Anand et al. 2000; Gulati et al. 2000; Kale et al. 2000; Kogut et al. 1996; Mowery et al. 1996). Alliances/partnerships are considered not only as a means to acquire complementary resources and capabilities that firms lack (Parise et al. 2001), but also as a means to gain access to other firms’ capabilities, supporting more focused, intensive exploitation of existing capabilities within each firm (Mowery et al. 1996). Researchers have identified motivations for forming strategic alliances/partnerships, namely, strategic motivations, transaction cost related motivations, and learning related motivations, among which, the learning related motivations are receiving increasing attention in the academic research (Anand et al. 2000; Dyer et al. 2000; Gulati 1995b; Gulati et al. 2000; Inkpen 1996; Knight 2002; Kogut et al. 1996; Morrison et al. 1997; Mowery et al. 1996; Osborn et al. 1997; Tsang 1997). Some researchers claim that firms enter the alliance arrangement with learning as an implicit goal (Yoshino et al. 1995). To survive and respond to changes in a highly competitive and volatile environment, a firm must be able to continuously learn new knowledge and practices. Forming strategic alliances/partnerships with external entities that are better able to help the firm achieve its goals allows the firm to focus more on its core competencies as well as to exchange knowledge and new ideas with them. Henderson and Cockburn (1994) examined the knowledge sourcing decisions on the research productivity in R&D projects and found that the allocation of key resources through collaborative processes and linkages to external scientific community were strongly correlated with research productivity (Henderson et al. 1994). Powell et al. (1996) argue that when the knowledge base of an industry is complex, expanding, and widely dispersed, the locus of innovation will be found in networks of learning rather than in individual firms.

49

They found that the establishment of a network of collaboration in biotechnology firms seems to be a cumulative process, and the development of a central position in the network enables future growth (Powell et al. 1996). Pennings and Harianto (1992) found that technological networking was the best predictor for technological innovation and firms with extensive networking are more likely to implement innovation with external partners (Pennings et al. 1992). Since organizational learning and the knowledge-based view of the firm are the underlying theories of the formation of strategic alliances/partnerships, a distinct research stream has focused on the knowledge management in strategic alliances. This stream explores how knowledge is transferred across partners (Mowery et al. 1996), how knowledge about collaborating per se develops over time and impacts collaborative outcomes (Simonin 1997), and factors that facilitate or inhibit knowledge transfer among members in strategic alliances/partnerships (Adler 2001; Dyer et al. 2000; Lane et al. 1998; Simonin 1999; Szulanski 1996). Knowledge has become the most strategically significant resource of the firm, and can be acquired through collaboration among firms in strategic alliances/partnerships. To summarize, the strategic alliance/partnership literature highlights the following issues. (1) Strategic alliances/partnerships are a mechanism for acquiring and assessing resources, knowledge, and capabilities that are not readily available in the firm. (2) Strategic alliances/partnerships provide a platform for collaboration and knowledge transfer between or among firms. (3) Through collaboration and knowledge transfer, strategic alliances/partnerships may lead to improved firm performance such as increased productivity and innovation.

50

3.4

SUMMARY As illustrated in the literature review above, the knowledge-based view argues for the

primacy of knowledge as a value-generating asset and a source of competitive advantage. This view notes that organizational learning is critical for continually expanding a firm’s knowledge stock, and highlights the social aspects of learning and knowledge creation. By forming strategic alliances/partnerships, a firm increases its potential capability of knowledge creation and organizational learning. Extending these arguments to the IT outsourcing phenomenon suggests that outsourcing is more than just getting an IT-related job done across the organizational boundaries. Rather than simply obtaining certain information technologies from external sources, both the focal firm and the outsourcer will need to exert effort to make the information technologies work in the focal firm’s context. This effort, from a knowledge-based perspective, involves flows of knowledge and ongoing interorganizational learning between these two entities. What are the drivers of such learning? How does such knowledge flow generate value for the focal firm? These questions moti vate the model developed next.

51

CHAPTER 4: RESEARCH MODEL AND PROPOSITIONS Overall, I view the value creation process in the strategic IT partnerships as a twostage learning activity. In the conceptual model, the first step of organizational learning involves access to and acquisition of IT resources and knowledge from the strategic partner, which is consistent with the concept of knowledge acquisition proposed by Huber. In this stage, organizational learning is a manifestation of the “increased knowledge and information” (Huber 1991). The second step of learning involves higher level of knowledge internalization and integration, in which the acquired IT resources and knowledge are combined with existing resources and capabilities to create value for the focal firm. This process encompasses the concepts of information distribution, information interpretation, and organizational memory (Huber 1991), and is consistent with the notion of capability of integration proposed by Grant (Grant 1996a). In this chapter, I present the research model and argue from the standpoint of a client firm that the strategic partnership a firm forms through IT outsourcing constitutes a source of social capital, which facilitates collaboration between the focal firm and its partner. Knowledge exchange and knowledge transfer through collaboration, in turn, generates IT value for the focal firm. In the discussion that follows, the client firm is referred to as “the focal firm” while the IT service provider is referred to as “the outsourcer” or “the partner”. Below, I discuss each major construct (social capital, knowledge acquisition, and IT value creation) of the research model and their interrelationships in greater details. Propositions are developed based on the respective discussions.

53

4.1

RESEARCH MODEL As shown in the theoretical model in Figure 1, I adopt a social capital perspective to

examine the process of IT value creation through the IT outsourcing partnerships. Specifically, I view a strategic IT partnership as a form of social capita l possessed by the focal firm. Various facets of this social capital interact with the Learning Intent of the partnership and jointly result in an increase in the firm’s knowledge stock. The increased knowledge stock of the firm, in turn, interacts with the firm’s combinative capabilities, and creates IT value for the focal firm. Each of the constructs and relationships in the model are discussed below. Although the proposed model draws upon the conceptual framework proposed by Nahapiet and Ghoshal (1998), it differs from theirs in the following ways. First, the proposed model focuses on a dyadic relationship at the inter-firm level rather than a network relationship at the intra-firm level. The unit of analysis is the focal firm embedded in a dyadic relationship. Second, the model extends Nahapiet and Ghoshal’s by incorporating value created through the generation of intellectual capital (knowledge) and introduces two moderating variables—learning intent and combinative capabilities—as contextual contingencies.

54

Figure 1: Conceptual Model

Structural Dimension: • Partner Network Resource Endowment • Reciprocity Relational Dimension: • Trust • Social Interaction

Strategic Intent

Combinative Capabilities Project Success Knowledge Acquisition • Technical IT Knowledge • Managerial IT Knowledge • Networking Knowledge

IT-Enabled Innovation

Cognitive Dimension: • Shared Cognition • Shared Vision

55

4.2

SOCIAL CAPITAL In this section, I first define the concept of social capital. Then I discuss the

facilitating role that social capital plays in facilitation of knowledge transfer and creation. A proposition is developed based on this discussion. 4.2.1 Definition of Social Capital Integrating various definitions of social capital in sociology, business scholars define it as “the sum of the actual and potential resources embedded within, available through, and derived from the network of relationships possessed by an individual or social unit” (Nahapiet et al. 1998). Granovetter notes that economic actions are not independent of social relationships surrounding the economic actors and that it may be advantageous for the economic actors to be sensitive and responsive to social relations (Granovetter 1985). Given that strategically participating and managing social relations may provide unique economic opportunities for the economic actors (Uzzi 1996; Uzzi 1997), firms develop social capital by participating in collaborations (Chung et al. 2000). Indeed, analysts of social capital are centrally concerned with the significance of relationships as a resource for social action (Burt 1992; Burt 2000; Coleman 1988) and future economic actions (Chung et al. 2000). Participating in an IT outsourcing partnership, therefore, can be considered as a source of social capital because it helps develop potentially beneficial relationships with external parties. As shown in the proposed research model in Figure 1, I argue that social capital embedded in an IT outsourcing partnership yields IT value via the intervening process of learning. Specifically, social capital amplifies a firm’s existing knowledge stock by influencing the conditions in which knowledge exchange and transfer take place.

56

4.2.2

Social Capital and Knowledge I argue that some interesting dynamics reside in the process of how social capital

facilitates value creation. In this dissertation, I will adopt the organizational learning perspective and examine how strategic IT outsourcing partnerships create value for the focal firm through knowledge transfer. Nahapiet and Ghoshal (1998) state that social capital facilitates the process of knowledge exchange and combination, which results in knowledge creation. They refer to the result of knowledge creation as intellectual capital. Dyer and Singh (1998) proposed a relational view of the firm, and argued that a firm’s critical resources may extend beyond its boundaries, and that firms that combine resources in unique ways with alliance partners may realize a competitive advantage over competing firms (Dyer et al. 1998). Dyer and Singh also suggested that the exchange of knowledge resources provides value to the alliance partners. Substantial knowledge exchange results in joint learning, and the integration of complementary resources results in joint creation of new products, technologies, and services (Dyer et al. 1998). Strategic IT outsourcing partnerships, as a source of social capital, should also facilitate knowledge transfer between the focal firm and the partner, which in turn will result in knowledge combination to create value. Prior literature has examined two distinct benefits of social capital: allocative efficiency and adaptive efficiency (Nahapiet et al. 1998). Allocative efficiency results from the reduced information redundancy due to the structural characteristics of the network ties and the decreasing probability of opportunistic behavior due to high levels of trust. Adaptive efficiency is an outcome of the facilitating role that social capital plays in creativity and learning (Nahapiet et al. 1998). Nahapietand Ghoshal (1998) note that social capital

57

facilitates the development of intellectual capital by affecting the conditions necessary for exchange and combination to occur. I believe that social capital serves as a complementary rather than competing theoretical lens for research on information technology outsourcing. It complements transaction cost economics theory in that it focuses on social aspects of market transactions. Transaction cost economics considers markets a less efficient way of transferring knowledge than hierarchies. When social capital is created and maintained among parties involved in market transactions, then the problem of lack of efficiency to transfer knowledge in markets will be mitigated. In this dissertation, the overarching proposition is that social capital embedded in an IT outsourcing partnership provides the enabling foundation for a process of knowledge exchange and transfer, the result of which is knowledge acquisition or an increased knowledge stock of the focal firm. In the following sections, I will further develop propositions at a granular level that follow from this general proposition. 4.3 TYPES OF KNOWLEDGE ACQUIRED Given the proposition that social capital embedded in IT outsourcing partnerships can facilitate knowledge exchange and transfer, it is important to distinguish the different types of knowledge acquired by the focal firm in the process of exchange and transfer. Although conceptually appealing, previously proposed typologies of knowledge are not easy to discriminate among in an empirical setting because knowledge can involve both tacit and explicit (or declarative and procedural) aspects at the same time and the aspects of knowledge characteristics are constantly changing (Spender 1996). Therefore, I do not use these typologies. Rather, I contextualize the knowledge construct to the specific domain of

58

IT. Particularly, I argue that social capital is an enabling antecedent of acquisition of three types of knowledge: technical IT knowledge, managerial IT knowledge, and networking knowledge. 4.3.1 Technical IT Knowledge Technical IT knowledge refers to the knowledge directly related to the information technology obtained from the external source. Technological knowledge of a firm includes elements such as scientific principles, theories, algorithms, conceptual models, specific analytical or experimental techniques, heuristics, and empirical regularities (Pisano 2000). In the IT context, technical knowledge also includes but is not limited to the following: programming, system analysis and design, and competencies in emerging technologies (Bharadwaj 2000). IT researchers (DiRomualdo et al. 1998; Feeny et al. 1998) have indicated that even in the case of outsourcing, firms need to continuously obtain technical IT knowledge to create a coherent blueprint for a technical platform that responds to current and future business needs, to make partner selection decisions on an informed basis, and to identify how to address business needs that cannot be properly satisfied by standard technical approaches. 4.3.2 Managerial IT Knowledge Managerial IT knowledge is the knowledge that is not directly related to the technology per se but is nonetheless critical for the successful integration and implementation of the technology into business operations. General managerial knowledge includes how to organize and manage projects, coordinate different problem-solving activities, determine goals and incentives, allocate resources and assign personnel, and resolve disputes (Pisano 2000). In the IT context, managerial knowledge includes effective

59

management of the IT function, coordination and interaction with user community, and project management and leadership skills (Bharadwaj 2000). For instance, in an IT outsourcing relationship, the outsourcer may transfer to the client the best practice based on its prior experience in a certain business area or the same industry. Although not directly linked to the technology, such knowledge may be critical for the application and integration of the technology into a specific business context. 4.3.3 Networking Knowledge Networking knowledge is the knowledge cumulated through prior experience in networking and partnering. Such knowledge has been recognized as a key asset. For instance, Lorenzoni and Lipparini view a firm’s capability to interact with other companies as a distinctive organizational capability, which accelerates the firm’s knowledge access and transfer with relevant effects on company growth and innovativeness (Lorenzoni et al. 1999). Pennings and Harianto argue that a firm’s experience in dealing with external partners is an integral component of its stock of skills (Pennings et al. 1992). Gulati examined the network resources a firm possessed and found that the extent of capabilities firms accumulated about forming alliances positively affected the frequency with which they enter new alliances (Gulati 1999). Kale and colleagues found that firms with extensive experience in alliances were better able to find the balance between learning from partners and protecting their own knowledge (Kale et al. 2000). Some IT researchers view managing vendor partnerships as a critical imperative for an organization (Rockart et al. 1996). As firms become increasingly virtual in nature, knowledge about networking and vendor management will be more crucial and valuable because such accumulated knowledge will not only help identify the focal

60

firm’s IT outsourcing needs, it will also be important for managing the partnership in the future (Barthelemy 2001). All three types of knowledge are valuable to the firm not only because they are relevant to the partnerships per se, but also because they can be applied to business purpose outside of the partnership arrangement. Such knowledge can be internalized by the focal firm and utilized to explore new markets, offer new products, or form new partnerships (Inkpen 2002). The outcomes of knowledge internalization and integration are manifested as IT value, which will be discussed below. 4.4 LEARNING INTENT Social capital provides an enabling foundation for knowledge exchange and transfer. However, the foundation alone does not guarantee knowledge transfer unless the participants are motivated to do so (Gupta et al. 2000b; Nahapiet et al. 1998; Szulanski 1996). Even when opportunities for knowledge transfer exist within partnerships, firms may view the purpose of the partnership differently. Some may consider the partnership an opportunity for the external exploration of knowledge, while others may adopt a more traditional perspective of a vendor-client transaction that questions the existence of learning within this relationship. Therefore, firms may have different intentions in terms of learning (Parise et al. 2001). In this dissertation, I term the propensity to view partnerships as an opportunity to learn as “Learning Intent”. With greater Learning Intent, the focal firm may intentionally seek knowledge from its partner and encourage knowledge transfer, thus yielding an increased knowledge stock. In its absence, the focal firm may overlook the useful knowledge that the partner possesses and bypass the opportunity for knowledge transfer. Therefore, the Learning Intent works as a moderator in the relationship between the social capital and the

61

incremental knowledge stock. The influence of social capital on knowledge acquisition by the focal firm will be more significant when the focal firm perceives the partnership as an opportunity to learn and is more willing to seek knowledge from its partner than otherwise. This moderating effect applies to all of the proposed relationships between dimensions of social capital and the knowledge acquisition by the focal firm, and is reflected in all the propositions developed subsequently. 4.5 DIMENSIONS OF SOCIAL CAPITAL As pointed out earlier, research on social capital is more diverse than unified. Given the fact that researchers define social capital in various different ways, Adler and Kwon note that “the concept of social capital offers a way to bring more theoretical specificity to a broad range of phenomena” (Adler et al. 2002). The growing body of diverse conceptualizations of social capital indicates that the concept of social capital can be viewed as a genotype with many phenotypic applications (Adam et al. 2003). The context-specific nature of the concept of social capital suggests that any aspect considered to be social capital should be defined “by virtue of institutions or social networks in which they are embedded” and that social capital “stems not only from the subjective attributes … but more profoundly from emergent and existing social infrastructures which facilitate individual and collective actions of many kinds” (Foley et al. 1999). Prior research has applied a variety of operationalizations of social capital, but a few constructs—trust, norms, and network memberships (Adam et al. 2003; Foley et al. 1999)—are recurrent throughout the studies. Based on this observation, Nahapiet and Ghoshal (1998) make a distinction among three dimensions of social capital: structural, relational, and cognitive. Later, Adler and Kwon (2000) echoed this categorization by focusing on networks (structural dimension), shared norms (relational

62

dimension), and shared beliefs (cognitive dimension) (Adler et al. 2000). Since the view of the concept of social capital is dependent on the researcher’s disciplinary background and on the questions being addressed (Adam et al. 2003), I believe that it is reasonable to adopt a categorization that is most appropriate and applicable to the business environment. Given its acknowledged robustness in theoretical definition and empirical support, the dimensions of social capital proposed by Nahapiet and Ghoshal (1998) are selected for the proposed research context. 4.5.1 Structural Dimension The structural dimension of social capital refers to “the overall pattern of connections between actor—that is, who you reach and how you reach them” (Nahapiet et al. 1998). The fundamental argument of social capital theory is that network ties provide access to resources. Social capital is a valuable source of information benefits because “who you know” affects “what you know”. In the proposed model, I will use the network resource endowment of partner (size, financial abundance, diversity, and number of network ties) to describe potential sources of benefits from “who you know”, which will determine “what you know” (incremental knowledge stock). The information benefits of social capital are realized in three forms: access, timing, and referrals (Burt 1992; Burt 2000). Partners with better resource endowment are more likely to provide such benefits due to their network centrality, financial slack, and knowledge scope. In the IT context, a firm may find from time to time that it needs certain technological capabilities that are critical to its success in competition yet are not readily available through internal development. For instance, the European retailer Carrefour chose Accenture as its partner to carry out its global system deployment project not only because of Accenture’s

63

successful experience in general design and implementation of integrated global IT and management systems, but also because of Accenture’s global reach and ability to provide worldwide support, and its recent experience with several other major international retail organizations. Sony Computer Entertainment Europe partnered with Accenture to develop a B2C e-commerce capability that was not available internally. This partnership provided benefits of access and timing so that Sony was able to roll out the B2C service within 8 months before the launch of the new PlayStation2. In the case where the related firms do not have such technological capabilities, the focal firm could still benefit from opportunities in that the related firms might know other firms in the network that could solve the problem. For example, the focal firm may leverage the outsourcer’s network resources, i.e., its connection and partnership with other firms that have the capabilities needed. Research evidence suggests that large and well-established firms tend to have larger knowledge stock and more relational resources, and partnering with such firms may enable the focal firm to access much needed knowledge and skills at a timely manner. For example, Stuart (2000) found that partner endowment could influence the advantage of the alliance partner and partnering with well-known firms conveys status to a focal firm (Stuart 2000). Henderson and Cockburn (1996) found that the effects of economies of scale and knowledge spillovers were stronger in larger firms than in smaller firms and that large firms benefited primarily from economies of scope in the form of a larger and more diversified knowledge pool (Henderson et al. 1996). Therefore,

64

Proposition 1a: The network resource endowment of the strategic IT partner is positively related to the acquisition of technical, managerial, and networking knowledge by the focal firm. Proposition 1b: The influence of the network resource endowment of the strategic IT partner on the acquisition of technical, managerial, and networking knowledge by the focal firm is moderated by the focal firm’s Learning Intent. In addition to “who you know”, the structural dimension of social capital also reflects the pattern of connection among members, i.e. how members within a social network are connected with each other. One of the mechanisms that governs the processes of social interactions among individuals is reciprocity, which reflects the “pattern of exchange through which the mutual dependence of people, brought about by the division of labor, is realized” (Gouldner 1960). The fundamental principles of reciprocity lies in what Gouldner refers to as the “norm of reciprocity” (Gouldner 1960). When the norm of reciprocity is established, embedded obligations are generated through exchanges of benefits or favors among individuals. For example, in a social exchange, party A receives benefit or favor from party B, therefore becomes indebted to party B. Party A remains indebted until she fulfills the obligation to repay the benefit or favor to party B. The motivation of reciprocity stems from individuals’ egoistic beliefs, and the norm of reciprocity serves as a mechanism for stabilizing social systems and for initiating social interaction and creating social structures (Gouldner 1960). The chance of an individual to receive benefits in the future increases if this individual reciprocates favorable treatments. Failure to repay debt may benefit an individual in the short-term, but creates conflicts among individuals and causes breakdown of reciprocity within the social system.

65

In a study on how organizational field network properties influence the rate of formation of collaborative ties among firms, Kenis and Knoke develop a set of field network properties such as network density, reciprocity and centralization that may influence the tie formation rate in a nonlinear fashion. They focus on the information reciprocity in the field network, and argue that a field that features two-way open communication channels may have increased rate of tie formation among members (Kenis et al. 2002). The open structure of the field networks enables information circulation and encourages members to exchange information that alerts them of future partnership opportunities. Following from the discussion of information reciprocity, I argue that the nature of information relationship between the focal firm and the outsourcer as specified in the contractual agreement can influence the knowledge transfer process. Mowery et al. (1996) suggest that interfirm knowledge transfers are more limited in unreciprocated and unilateral information relationships such as licensing agreements, as opposed to reciprocated and bilateral information relationships such as technology sharing or joint development agreement (Mowery et al. 1996). Information and knowledge flows in the IT outsourcing relationships are mainly reflected in the power that each partner has in terms of decisionmaking and problem solving (Clark et al. 1995; Subramani et al. 2003). If both parties consider each other as equal partners with similar status in decision-making and problem solving, then it is more likely that both parties will exhibit high levels ofreciprocity, expecting that the other will do the same in return. In other words, both parties expect to benefit from the information and knowledge that the other party provides through decisionmaking and problem solving, and will reciprocate by sharing information and knowledge with equal levels of commitment and fairness. In contrast, when information flows in single

66

direction in the decision-making and problem solving processes, structural blockage is created. In this case, one party always receives information more than the other does, thus discouraging the other party from future knowledge contribution and resource commitment to the relationship (Chung et al. 2000). Even if the participants possess heterogeneous knowledge and skills, joint decision-making and problem solving indicate symmetric power distribution among participants in the relationship, and hence greater willingness of each to contribute resources and knowledge. Asymmetric power is a hindrance to the collaborative partnership and will inhibit effective knowledge transfer, thus reducing the extent of knowledge acquisition that occurs. Therefore, Proposition 2a: Higher level of reciprocity between the partners in the strategic IT partnership is positively related to the acquisition of technical, managerial, and networking knowledge by the focal firm. Proposition 2b: The influence of the level of reciprocity between partners in the strategic IT partnership on the acquisition of technical, managerial, and networking knowledge is moderated by the focal firm’s Learning Intent. 4.5.2 Relational Dimension The relational dimension of social capital refers to “those assets created and leveraged through relationships, and parallel to what was described as behavioral as opposed to structural” (Nahapiet et al. 1998). This dimension reflects the relational characteristics of the “soft” side of the social capital—something that is not specified in the structure of the partnership, such as goodwill trust and social interaction. Many studies of strategic alliances have found that trust is a major antecedent of successful partnerships (Dyer et al. 1998; Gulati 1995a; Gulati et al. 2000; Hamel et al. 1989;

67

Kogut et al. 1996; Liedtka et al. 1997; Morrison et al. 1997; Mowery et al. 1996; Tsai et al. 1998; Uzzi 1996). Trust indicates a willingness to assume risk when the other party might take advantage of your vulnerability, based on the faith in the good intent and concern of exchange partners, belief in their competence and capability, belief in their reliability, and belief in their perceived openness. Implied in the definition are two different views of trust: (1) a risk view based on confidence in the predictability of the other party’s behavior and (2) a moral view based on confidence in the goodwill of the other party(Ring et al. 1994) . While the risk-based trust can be ensured by formal contractual means, the goodwill-based trust is developed through interpersonal interactions that generate social-psychological bonds between both parties (Ring et al. 1994). Therefore, when both parties depend more on their confidence in each other’s goodwill, trust can be considered as an alternative or complement to formal, arms-length governance mechanisms (Dyer et al. 1998; Larson 1992). Prior studies have found that trust lubricates cooperation and facilitates free information and knowledge transfer between partners. Trust is at the heart of effective knowledge-intensive interfirm networks (Powell 1999). Indeed, we see a growing number of firms building longterm, trust-based partnerships with their suppliers. A growing body of research shows that when firms need innovation and knowledge inputs from suppliers rather than just standardized commodities, no combination of strong hierarchical control or market discipline can assure as high a level of performance as trust-based community (Bensaou et al. 1995; Dyer 1996). Low trust relations enable cost improvements but are unable to stimulate the creation of new knowledge (Adler 2001). In the absence of prior interaction, trust stems from previous experience of the focal firm in partner relations or the reputation of the partner. Therefore,

68

Proposition 3a: Higher level of trust between the focal firm and the strategic IT partner is positively related to the acquisition of technical, managerial, and networking knowledge by the focal firm. Proposition 3b: The influence of the level of trust between the focal firm and the strategic IT partner on the acquisition of technical, managerial, and networking knowledge by the focal firm is moderated by the focal firm’s Learning Intent. Social interaction refers to the intensity of social relationships between partners. Ring and Van de Ven (1994) note that tacit know-how and intangible assets are more easily employed through relational rather than transactional exchanges (Ring et al. 1994). Mutual trust, respect and friendship derived from relational exchanges are referred to as “relational capital” (Kale et al. 2000), which facilitates one-on-one interaction between two firms within the partnership. During such interactions, the partners learn about each other and develop norms of equality. In addition, close and intensive personal interactions among individuals of partner firms play a crucial role in knowledge transfer because one of the most important premises for interorganizational learning is to understand where the relevant knowledge resides in the partner firm and who possesses it (Dyer et al. 1998; Kale et al. 2000). Interpersonal relationships and interactions act as effective mechanisms to transfer tacit or sticky knowledge across organizational boundaries, and the effectiveness of interorganizational knowledge transfer depends on the extent to which individuals from the two firms have direct and close contact with each other. In other words, frequent encounters are an important vehicle for knowledge exchange. Therefore,

69

Proposition 4a: Higher levels of social interaction between individuals of the focal firm and those of its strategic IT partner are positively related to the acquisition of technical, managerial, and networking knowledge by the focal firm. Proposition 4b: The influence of levels of social interaction between individuals of the focal firm and those of its strategic IT partner on the acquisition of technical, managerial, and networking knowledge by the focal firm is moderated by the Learning Intent of the focal firm. 4.5.3 Cognitive Dimension The cognitive dimension of social capital refers to “those resources providing shared representations, interpretations, and systems of meaning among parties” (Nahapiet et al. 1998). Although it is widely recognized that innovation is achieved by combining different knowledge and experience and that diversity of knowledge backgrounds is a way of expanding knowledge, social exchange and combination processes requires meaningful communication, which is based on some shared language or mutual understanding of the context (Boland et al. 1995; Nahapiet et al. 1998). Knowledge transfer and learning require a shared cognition and shared vision. Shared cognition is “knowledge structures held by members of a team that enable them to form accurate explanations and expectations for the task, and in turn, coordinate their actions and adapt their behavior to demands of the task and other team members” (Cannon-Bowers et al. 1993). A shared cognition is one of the terms used to describe the process in which dyads, groups, or larger collectives make collective sense of the surroundings. The collective sense-making not only resides in individual members of the collective, but also create a consensual understanding among them. Such common understanding reduces the barriers of

70

understanding between partners because they have similar cognitions and knowledge regarding the context. However, the relatedness between the knowledge structure of the focal firm and that of its partner may be curvilinearly related to learning (Ahuja et al. 2001). It is well established that the creation of knowledge often occurs by bringing together knowledge from disparate sources and disciplines. Too little relatedness will provide little common background of understanding and absorptive capacity on both sides, and both parties will suffer from the stickiness of the knowledge transferred (Szulanski 1996). Too much relatedness, however, creates the pitfall of the weakness of strong ties in that little new knowledge is likely to be created. Lane and Lubatkin (1996) introduced the concept of relative absorptive capacity and examined the relationship between knowledge transfer and similarity between partners. They found that similarity of basic knowledge was positively related to learning, while similarity of specialized knowledge was negatively related to learning (Lane et al. 1998). Collectively, these findings suggest the following: Proposition 5a: Higher level of shared cognition between the focal firm and the strategic IT partner is positively related to the acquisition of technical, managerial, and networking knowledge by the focal firm in a non-linear fashion. Proposition 5b: The influence of the leve l of shared cognition between the focal firm and the strategic IT partner on the acquisition of technical, managerial, and networking knowledge is moderated by the focal firm’s Learning Intent. Common values and a shared vision are major manifestations of the cognitive dimension of social capital. They reflect the extent to which partners to an exchange have common beliefs regarding the importance of the motives for transacting, as well as the goals

71

and objectives of the exchange (Young-Ybarra et al. 1999). Common values and shared vision create harmony of interests, which in turn, reduces the possibility of opportunistic behavior (Ouchi 1980). A shared vision clarifies the common goal of the partnership, reduces the conflict in interests, and mitigates the problem of opportunistic behaviors in the “learning race” (Kogut 2000). If the focal firm and the partner share a vision and values, they are less likely to hurt each other by pursuingself -interests and will be more motivated to expend effort to create a win-win situation, in which both parties are better off by sharing knowledge and expertise (Tsai et al. 1998). The above arguments suggest the following: Proposition 6a: Higher level of common values and a shared vision between the focal firm and the strategic IT partner is positively related to the acquisition of technical, managerial, and networking knowledge by the focal firm. Proposition 6b: The influence of the levelof common values and a shared vision between the focal firm and the strategic IT partner on the acquisition of technical, managerial, and networking knowledge is moderated by the focal firm’s Learning Intent. 4.6 THE OUTCOMES OF KNOWLEDGE ACQUISITION: IT VALUE

CREATION Access to resources and capabilities through the IT outsourcing partnership will add to the cumulative stock of resources and capabilities, and is potentially valuable for the firm because it provides the essential ingredients in the form of technical, managerial, and networking knowledge. In addition, a firm’s ability to create value is not based upon its access to physical or financial assets. Rather, such ability is generated from its sets of intangible, knowledge-based resources (Itami 1987). However, in order for the knowledge to be useful and valuable for the focal firm, it has to be integrated with existing knowledge and

72

capabilities. In other words, it is through a process of knowledge recombination that value gets created (Grant 1996b; Kogut et al. 1992). The result of such process of knowledge recombination manifests itself in the form of IT value—success in IT outsourcing, namely, success in business operations and IT-enabled innovations. As shown in Figure 1, I also argue that increased knowledge stock interacts with a firm’s combinative capabilities in generating such value. 4.6.1 Combinative Capabilities The strength of the transformation from knowledge to value is profoundly dependent on the combinative capabilities of the firm. Nahapiet and Ghoshal note that one of the conditions for creation of intellectual capital is the firm’s capability of combining information or experience (Nahapiet et al. 1998). Kogut and Zander (1992) define combinative capability as “the intersection of the capability of the firm to exploit its knowledge and the unexplored potential of the technology, or technological opportunity”. As they point out, “…Creating new knowledge does not occur in abstraction from current abilities. Rather, new learning, such as innovations, are products of a firm’s combinative capabilities to generate new applications from existing knowledge.” (Kogut et al. 1992) Organizational learning does not stop after knowledge acquisition. In a recent study, absorptive capacity, the critical antecedent and outcome of learning, was extended to also include assimilation, transformation, and exploitation of knowledge (Zahra et al. 2002). The reconceptualization of absorptive capacity highlights the importance of recombination and integration of acquired and existing knowledge. The knowledge-based theory of strategy proposed by Grant (1996a) emphasizes a firm’s ability to integrate knowledge from various sources. Grant and other scholars (Kogut

73

2000; Kogut et al. 1996) also extend the argument to an interorganizational context and suggest that knowledge can also be integrated externally through relational networks that span organizational boundaries. Such networks provide efficient mechanisms for accessing and integrating new knowledge, especially in high velocity environments, where speed and scope of knowledge integration are critical for sustaining competitive advantage. The IT outsourcing partnerships provide the focal firm with access to knowledge and capabilities. The externally acquired IT resources, knowledge and capabilities alone, however, cannot generate much value for the focal firm unless they are fully integrated with the existing knowledge to generate a right mix of new knowledge and capabilities for the focal firm. It is through combination of the two previously unrelated stocks of knowledge—the externally acquired knowledge and the existing knowledge stock—that value is created. Therefore, as a result of partnering with an IT outsourcer, the focal firm will acquire a combination of technological IT knowledge, managerial IT knowledge, and networking knowledge. The acquired knowledge will be fully deployed to its greatest potential only if it is integrated with the existing knowledge stock of the focal firm, suggesting a moderating effect of combinative capabilities on the relationship between knowledge acquisition and IT value creation. This moderating effect will be reflected in the propositions developed below. 4.6.2 Success in Business Operations One of the manifestations of value generated from IT outsourcing is success in business operations. With abundant evidence of information technology being utilized as a strategic differentiator, researchers have attempted to identify critical organizational capabilities that enable effective business operations.

74

Knowledge has been regarded as the most important resource that a firm can possess, and is playing an increasingly critical role in a firm’s success in strategic competition (Grant 1996a; Helfat et al. 2000; Pisano 2000). In prior IS outsourcing studies have examined the outcomes of IT outsourcing from business and user perspectives. From the business perspective, some studies assessed the success of IT outsourcing as the degree to which predefined objectives of IT outsourcing are realized in terms of economic, strategic, and technological benefits (Grover et al. 1996; Lee et al. 1999; Lee et al. 2004). The strategic benefits of IT outsourcing refer to the ability of the firm to focus on its core business, outsource routine IT activities so that it can focus on strategic uses of IT, and enhance IT competence and expertise through contractual agreements with an outsourcer. The economic benefits of IT outsourcing refer to the ability of a firm to utilize expertise and economies of scale in human and technical resources of the service provider to manage its cost structure through unambiguous contractual agreements. Technological benefits refer to the ability of a firm to again access to leading-edge technology and to avoid the risk of technological obsolescence that results from the dynamic changes in IT. From the user perspective, some studies addressed the issue of success of IT outsourcing from a user perspective. Lee (1999) studied the level of perceived quality of IT services provided as an outcome of outsourcing, and focused on the reliability, relevancy, accuracy, currency, and completeness of output information(Lee et al. 1999). Whitten (2004) found that the user information satisfaction in an IT outsourcing context is determined by multiple factors such as services provided by the vendor, quali ty of vendor staff, quality of output information, and users’ perception on learning and involvement in the project

75

(Whitten 2004). Kim et al (2003) studied how an outsourcing service provider can satisfy different user groups in the client company, and found that different users have different criteria (such as transaction relationship, partnership in outsourcing, and task-related and ITrelated performance) to evaluate the system (Kim et al. 2003). Although a number of previous studies have addressed the issue of success in IT outsourcing from various angles, there seems to be a missing link between IT outsourcing and performance measures (Mahnke et al. 2005). Key determinants that affect the overall performance of the outsourcing process remain to be empirically addressed in greater depth. Recent studies that utilize a relational view have found evidence that knowledge sharing as a measure of partnership quality contributes positively to outsourcing performance (Lee 2001; Willcocks et al. 2004). Based on the findings of prior studies, one can postulate that IT outsourcing not only allows a firm to focus more on its core competencies, but also provides an opportunity for the client firm to gain knowledge, skills and expertise from the outsourcing service provider. Such knowledge, skills, and expertise, when assimilated in the client organization, may become the catalyst for improvement in operation processes (Willcocks et al. 2004). To summarize the above arguments, knowledge may enable a firm to achieve efficiency in business operations. Acquisition of various types of knowledge from external sources, therefore, can strengthen a firm’s ability to increase efficiency in various areas of business. Proposition 7a: Higher level of acquisition of technical, managerial, and networking knowledge by the focal firm from the strategic IT partnership is positively related to its success in business operations.

76

Proposition 7b: The influence of the acquisition of technical, managerial, and networking knowledge by the focal firm on the focal firm’s success in business operations is moderated by the focal firm’s combinative capabilities. 4.6.3 IT-Enabled Innovation The second manifestation of value generated from IT outsourcing, IT-enabled innovation, is perhaps the most important way in which IT can contribute to a firm (Mason et al. 1997). Innovation, defined as commercialized new ideas, such as new products and/or services, new organizational forms, or new markets (Schumpeter 1950), is widely acknowledged to lie at the heart of a firm’s capability to sustain competitive advantage (Abernathy et al. 1985). Innovation is critical for survival and success in a high velocity environment, in which firms can only have temporal competitive advantage and have to keep refining their competitive advantage through “creative destruction” (Schumpeter 1950) on a regular basis. The conceptualization of innovation has changed drastically during the past several decades. Rather than discrete event resulting from isolated individuals, innovation nowadays is considered as a process, in which a variety of actors constantly interact and exchange knowledge (Landry et al. 2002). Therefore, innovation can be viewed as a result of interactive learning and continuous expansion of knowledge. Knowledge accumulated and renewed over time will enable new ways of thinking and the implementation of novel ideas (Hurley et al. 1998). Convergence of many types of knowledge detained by different sources will eventually result in innovation. In this dissertation, I view IT-enabled innovation as new products, services, or processes developed, new organizational forms realized, and new markets explored by the

77

focal firm through the application IT (Agarwal et al. 2002; Chatterjee et al. 2002), and suggest that such innovation is a key facet of the value that IT generates for the firm. For example, in the mid to late 1990s, many firms partnered with Internet-based service providers to speedily establish a web presence. Going online enabled these firms to provide new products or services to a larger customer base through the newly created distribution channel. However, such opportunities could not have been realized without the extensive application of and knowledge about the technology. As noted earlier, the role of knowledge in enhancing and sustaining innovation is a recurrent theme in the strategic management literature (Grant 1996a; Grant 1996b; Helfat et al. 2000; Kale et al. 2000; Kogut et al. 1992; Kogut et al. 1996; Koza et al. 1998). In the IT context, knowledge acquired from external sources can facilitate IT-enabled innovation in two ways. First, the formation of an alliance with an external partner expands the range of resources, knowledge, and capabilities that the focal firm can utilize. Access to such resources, knowledge, and capabilities enables the focal firm to realize the strategic goals and implement its new ideas that would be impossible otherwise (Feeny et al. 1998). Clearly, the focal firm acquires the technical know-how and business understanding necessary to generate new thinking about applications of IT. The knowledge and capabilities acquired form a building block for the focal firm to collaboratively explore and develop new business initiatives together with the IT outsourcing partner. Second, the exposure to external sources of knowledge and capabilities broadens the focal firm’s business horizon and enables it to envision business processes that information technology can make possible. Increased technical and business knowledge will increase the focal firm’s awareness of new business opportunities enabled by IT, thus causing it to be more proactive in initiating more

78

innovations. The networking knowledge related to managing external partnerships should also enhance the abilities of IT executives and professionals to interact more effectively with their future IT partners to better serve its business needs. The above arguments suggest the following: Proposition 8a: Higher level of acquisition of technical, managerial, and networking knowledge by the focal firm from the strategic IT partnership is positively related to its ITenabled innovation. Proposition 8b: The influence of acquisition of technical, managerial, and networking knowledge by the focal firm on the focal firm’s IT-enabled innovation is moderated by the focal firm’s combinative capabilities. 4.7 SUMMARY In Chapter 4, major constructs such as social capital, knowledge acquisition, and IT value have been discussed. Specifically, I not only established the causal relationships among them based on theoretical arguments, but developed fine granular propositions by examining various dimensions of social capital, different types of knowledge acquired, and manifestations of IT value creation. I believe that the propositions provide a solid theoretical foundation and methodological guidance for future empirical test of the model. I discuss the research setting and methodology, as well as data analysis and findings in the sections that follow.

79

CHAPTER 5: RESEARCH METHODOLOGY This chapter describes the research design, methodology, and procedure of the study for this dissertation. Specifically, this chapter highlights the research setting, participants, data collection procedures, measures, power considerations, and analytical strategies. Due to the lack of existing understanding and the complexity of the phenomenon of interest, no single research methodology is sufficient to provide the extensive and rich information needed to satisfactorily address the research questions. Additionally, any particular data source or a single research method may suffer from inherent limitation or bias. Disadvantages of single methodology caused by such limitation or bias can be mitigated when multiple data sources or research methods are combined, a technique called triangulation (Creswell 1994). Triangulation provides opportunities for the researcher to seek convergence of results and to observe overlapping and different facets of a phenomenon that emerge from multiple sources (Creswell 1994). Furthermore, triangulation adds scope and breadth to the study. Therefore, I conducted the research using a combined research design—mini case studies and a survey that was distributed to a larger sample. 5.1 CASE STUDIES A case study methodology was chosen for the following reasons(Creswell 1994; Yin 1993; Yin 1994). First, there have been a few prior empirical studies on knowledge in IT outsourcing partnerships, and the concept of IT outsourcing partnerships as a form of social capital is “immature” due to a lack of previous research. Second, since I question the adequacy of existing theories applied to IT outsourcing research and propose an alternative and complementary theoretical lens, there is a need to explore and describe the IT

81

outsourcing phenomenon in greater detail to provide preliminary evidence for the proposition. Due to the scale of the phenomenon of interest and resource constraints, I conduct only two case studies and used a theoretical sampling method for the research design, an approach focusing efforts on theoretically useful cases that can highlight, replicate, and/or extend the theory (Eisenhardt 1989b). In March 2005, I visited two organizations in China thathave been involved in a strategic IT partnership through outsourcing for several years. Both are top-ranking firms on the 2004 iPower500 list, which consists of business organizations that best utilize information technologies in the fields of IS planning, decision support, business processes, and electronic business. The 2004 iPower500 firms are also the population which I draw my survey sample from. I conducted on-site interviews with two employees of each firm: the CIO and the project manager for the outsourcing project, and studied the IT infrastructure of both organizations. All interviews were based on open-ended questions chosen from the interview protocol (as shown in Table 7). Each interview lasted about 30 to 45 minutes, so not all questions in the protocol were addressed. These interviews provide preliminary evidence to support the proposed theory. Findings from the two mini case studies are reported below based on the interview transcripts.

82

Table 7: Interview Questions
Related Construct General Descriptive Resource Endowment of Partner Interview Questions Please describe your role in your firm? To whom do you report to? What are the major determinants when you make the decision of partner selection? Please describe the contract between your firm and your IT partner (e.g., long- vs. short-term contracts, tightly vs. loosely defined contracts). Does each side play an equally important role in the decision making and problem solving? Please describe the interaction between your firm and the partner firm. What is your perception of your partner? How would you describe the relationship between your firm and the partner at all levels? How would you describe your firm’s business vision? Are you aware of the partner firm’s vision? In terms of the partnership, to what extent do you believe these two visions overlap? To what extent would you say that your firm’s expertise is overlapping with your partners? To what extent do the employees of your firm share a similar knowledge structure with your partner? What does your firm want to gain from this partnership? When you were making the outsourcing decision, was learning an important determinant? Aside from the services your firm got from the partner firm, do you think that your firm gained anything else? Do you think that your firm obtained knowledge that you did not possess before? What is the knowledge that you firm gained? Do you think that your firm has a strong capability of integrating new knowledge with the existing knowledge? How would you describe your firm’s ability to utilize technology? How would you describe the benefit of the IT outsourcing service you received from the partner? How would you describe the overall outcome of the project? Does this partnership help you achieve your pre-specified goals? Would you please describe the innovations generated from the IT outsourcing partnership, if there is any? All IT Executive of Focal Firm Potential Respondents

Trust

Shared Vision

IT Executive of Focal Firm Project Manager of Focal Firm Partner Firm Manager Business Executive of Focal Firm Partner Firm Manager IT Executive of Focal Firm Project Manager of Focal Firm IT Executive of Focal Firm IT Executive of Focal Firm Project Manager of Focal Firm

Shared Cognition

Strategic Intent Knowledge Acquisition

Combinative Capabilities IT Value

IT Executive and Business Executive of Focal Firm Project Manager of Focal Firm

83

5.1.1

IT Outsourcing at COSCON COSCO Container Lines Co., Ltd. (COSCON) is a company that specializes in

domestic and international container transportation. Operating over 60 international shipping routes connecting more than 100 ports in over 30 countries and regions across the world, COSCON is the biggest container carrier in China and ranks among the top liners in the world. Mr. Ma, CIO of COSCON, talked about his understanding of IT outsourcing and the history and future of IT outsourcing at COSCON. Mr. Ma says that Chinese firms have a different understanding of IT outsourcing from the firms in the U.S. U.S. firms outsource to reduce cost, and IT is becoming a utility service that can be obtained from outsourcing service providers at a lower cost. However, a lot of Chinese firms are obtaining outsourcing services from established foreign firms, which charge premium prices for services provided. Therefore, cost reduction is not the major motivation for IT outsourcing for most Chinese firms. COSCON uses IT outsourcing as a strategic vehicle to develop its own IT capabilities and skills. According to Ma, development of IT capabilities was achieved through different phases. When COSCON was founded in 1998, the IT staff did not have the expertise to develop required systems in-house. Therefore, COSCON started to use IBM for its MIS and SAP for its ERP system in 2000. During the implementation processes, COSCON obtained the products, implementation services, and staff support from the outsourcing service providers, but had the system customization done by internal IT staff. The internal IT staff gained familiarity with the systems and developed required skills and knowledge about the systems during the customization processes. By 2003, the number of COSCON IT employees reached 160, compared with 30 in 2000. Among them, 70 worked in the IT R&D

84

area, which focused on the internal development of information systems and provision of IT services. As the internal IT employees became more capable and knowledgeable about the systems, COSCON adjusted its IT outsourcing strategy to a more selective one. Now it keeps the lower-level IT services such as programming and maintenance in house, while outsourcing the value-laden, enterprise-wide IT services to a couple of strategic IT partners. COSCON maintains close relationships with its strategic IT partners, and constantly communicates with them about its business plans and strategies, which are driven by COSCON’s business needs. COSCON is very selective about the functions that are outsourced to the strategic IT partners. The corporate guideline is to outsource implementation of software packages while retaining the development and adaptation of customized modules in-house. This IT outsourcing strategy enables COSCON to utilize its specialized knowledge in the logistics and transportation industry, and keep up with the cutting-edge technologies to improve IT services. “We use this strategy to obtain knowledge and skills from our IT partner, and develop stronger industry-specific knowledge about IT”, says Ms. Ma. The goal of the IT department is to best serve the business needs of COSCON, provide enterprise-wide IT services, and devote time to R&D in new IT services that can be deployed by the organization. Now COSCON uses IT-BAT (Business Analysis Team), a virtual system to identify the business needs and find the best technological solution for them. It has also established a mechanism for outsourcing contract management, service provider evaluation, relationship management, and internal auditing, and maintains frequent communications between business departments and the IT department at all levels. As a result of the IT outsourcing

85

strategy, COSCON has benefited with increased profits and more efficient business operations. In addition, the IT department is playing a more important role in the organization. IT has enabled radical changes in COSCON’s traditional business, and provided more opportunities for new business forms. 5.1.2 GD Post Office: Value Creation through IT GD Post Office is a state-owned, provincial organization that operates as any other for-profit business organization. Before being spun off from GD Post & Telecom in 1998, GD Post had been operating on deficit for years, and provided limited postal services with poor quality. The financial problems of GD Post became more obvious when it could no longer use GD Telecom’s profits to cover its deficits after the spin-off. The imminent financial pressure pushed GD Post to carry out a series of business reengineering activities, including IT-enabled new services and business models. Mr. Zeng, Director of Enterprise IT Planning at GD Post, with great enthusiasm and pride, narrated the rejuvenation process of GD Post during our meeting in the GD Post office building in the central business district of Guang Zhou. The reengineering process of GD Post started with increased investments in assets that are essential for the provision of postal services. Starting from 1998, GD Post has invested over 30 billion RMB to improve its assets, especially technological assets, and developed a business reengineering plan in which core competency and technology go handin-hand. Right after the spin-off, GD Post started to build its own IT unit to support the business areas. Two subdivisions (IT Planning & Design Institute and Information Division) were subsequently established to provide IT support, maintenance, and system development

86

services to GD Post. IT investments were madeto build a technological platform of IT infrastructure that enables telecommunication, broadband, and video-conferencing. At the same time, GD Post heavily deployed information technologies to improve its traditional businesses and provide new services. In addition to automation and computerization of the front-end postal services, GD Post undertook revolutionary efforts in new business areas. Specifically, it developed three new businesses: financial services (payment system), telephone banking, and electronic commerce. GD Post recognized the upsurge of dot-coms and e-commerce in the late 1990s as a business opportunity, and the utilized its logistic facilities and distribution networks to develop e-commerce-based services. The concept of “logistics-based e-commerce” has great impact on other postal service offices nationwide, and has fundamentally changed the way that GD Post runs business. Mr. Zeng says, “GD Post did not gain competitive advantage through the World Wide Web, but through our core competency—the mail distribution networks!” The combination of the World Wide Web and GD Post’s core competency allows it to provide around-the-clock services. In addition to its traditional postal services, GD Post now processes orders online and provides delivery services for flight tickets, flower and special gifts, AVON direct-selling products, built-todemand Lenovo PCs, and even passports. All of these services are enabled by an awardwinning software system developed in-house. Mr. Zeng and his colleagues have adopted a very selective IT outsourcing strategy. For information systems and IT functions that are closely related to its core business, GD Post keeps system development and maintenance in-house. On the other hand, it carefully chooses outsourcing partners for performing more generic IT functions such as call centers, IT infrastructure, and programming. For example, GD Post developed the structure and data

87

dictionary of its logistic information system in-house, and had the IT unit integrate this system with other systems within the organization. Detailed programming for the logistic information system was outsourced. Because logistic services rely heavily on information technologies and require very context-specific knowledge, a widely accepted system that is ready to be adopted does not exit. “Due to the lack of standards and protocols to follow in this industry, it is not easy to outsource logistic-related IT functions. We have to develop and customize our own systems”, says Mr. Zeng. In addition, the less developed IT outsourcing market and lack of business integrity are major concerns when GD Post formulates its outsourcing strategy. Seven years after the spin-off, GD Post is making considerable profits with an innovative, award-winning business model that combine traditional mail delivery services and new services enabled by information technology. “IT is not the only thing that made the revival of GD Post possible, but it definitely has been a catalyst and enabler”, says Mr. Zeng. 5.1.3 Summary of Cases The interviews with IT executives at these two firms provide some preliminary evidence of the relationship between knowledge and value creation in the proposed research model. The COSCON case confirms that IT outsourcing can be used to obtain knowledge and skills from outside. In addition, the cumulative knowledge and skills can be used to develop in-house IT capabilities. The GD Post case highlights the importance of industryand business-specific knowledge as well as information technologies in the value creation process. GD Post has done an especially good job in utilizing IT to strengthen its core competency and develop new services. In the sections that follow, I further test the proposed research model using a survey methodology.

88

5.2

SURVEY METHODOLOGY I conducted an empirical test of the proposed research model with a larger sample

using a survey methodology. The research design, sampling methodology, and data collection procedures of the empirical study are discussed below. 5.2.1 Overview of Research Setting and Procedures Data to test the research model was gathered from firms in China. This research was conducted in cooperation with the National Informatization Evaluation Center of China (NIEC) during a three-month period starting from March 2005. NIEC, an affiliation of the Ministry of Information, is dedicated to research and consultancy in diffusion and evaluation of information systems in government and businesses. Based on its research and evaluation metrics, NIEC publishes iPower500 annually, a list of organizations nation-wide that best utilize information technologies in the fields of IS planning, decision support, business processes, and electronic business. This project provided a unique opportunity to administer a survey to over 300 iPower500 organizations and their IT outsourcing partners in about two dozen provinces/districts in China. For each organization and its IT outsourcing partner, data were collected through a detailed questionnaire using a cross-sectional design. A key informant from each organization responded to the questionnaire. Two research associates at NIEC assisted in contacting sample firms and administering returned questionnaires. I describe detailed research procedures and sample characteristics below. 5.2.2 Sampling Procedures Ideally, target sample firms of this study should be large firms that (1) use information technology in business operations to a great extent, and (2) outsource at least one IT project that has extensive impact at the enterprise level. Based on these criteria, I used a

89

convenience sampling technique for data collection, and selected sample firms from the 2004 iPower500. Since the iPower500 firms are mostly large state-owned or private firms that efficiently utilize information technology in their business operations, the probability that these firms use outside service provider to perform IT functions is much higher than a general population. In addition, large and well-established firms are more likely to have financial resources to deploy large-scale information technologies that will have enterprisewide impacts. The NIEC assessment schemes and evaluation metrics had been refined since their first publication of iPower500 in 2002, and the 2004 iPower500 list represents the most up-to-date snapshot of IT competition among Chinese firms. The 2004 iPower500 list consists of business organizations in industries such as manufacturing, financial services, software and technology services, transportation and logistics, mining, and construction. Consistent with the industry structure of a developing country, about 80% of the iPower500 organizations are in sectors of the manufacturing industry. Sample firms were selected in two phases. In early March 2005, I selected sample firms from the first 300 organizations in the 2004 iPower500 list. In early April 2005, I used organizations ranked from 301 to 500 as the second batch of the entire sample. The purpose of dividing the sampling phases into phases was to work on a sample of a manageable size in a period of time. 5.2.3 Contact Protocol This study was conducted using a cross-sectional survey methodology. The purpose was to collect matched-pair data from both client firms and their corresponding IT outsourcing partners. Therefore, the data collection process involved two phases. In Phase

90

1, I distributed the client-version of the questionnaire to the key informant of each iPower500 firm via email. In the survey, I provided a specific definition of IT outsourcing, and asked the key informant to specify a particular IT outsourcing project accordingly. At the end of the questionnaire, I also asked the key informant to provide the contact information of a key informant at the corresponding outsourcing partner firm. The NIEC research associates and I sent email reminders and make phone calls to confirm the email delivery of questionnaires at least once every week about 2 weeks after the questionnaires were sent out. The client version of the questionnaire is shown in Appendix 2. In Phase 2, based on the contact information provided by the key informant at the client firm, I sent the vendor-version of the questionnaire to the key informant at the IT outsourcing partner of the client firm. In each email sent to the key informant at the vendor firm, I mentioned the source where I obtained the contact information and explained the purpose of this research project. Follow-up phone calls were made one week after the questionnaire was sent out. The vendor version of the questionnaire is shown in Appendix 3. A majority of the returned questionnaires are in the format of Word documents as email attachments. A couple of questionnaires that could not be opened properly were printed out by the respondents, and faxed to the NIEC office. I chose to use electronic mail and telephone as the major communication channel for two reasons. First, electronic mail and telephone is the most rapid way of communication, given the time constraints of the project. The goal of data co llection was to get responses from both client and vendor firms within a three-week period. Second, I considered electronic mail a more reliable approach of communication than the traditional postal services in China. With electronic email, I could avoid delays due to lost mail or address

91

changes. Data collection via email turned out to be successful. I received returned questionnaires as email attachments within as short a period as 24 hours after the first emails were sent out. In addition, I was able to quickly get in touch with respondents who had changed contact information. 5.2.4 Respondents: Client Firms Among the 500 iPower firms, I eventually used 367 firms that had valid contact information of the key informants. I visited 4 organizations to conduct on-site interviews with the CIOs, so they were not included in the survey sample. I was not able to get in touch with the contact persons of 9 firms. Of the remaining 354 firms, 44 were not able to provide valid information because they did not outsource IT at all, and 42 firms declined to participate due to tight work schedules, concerns of data confidentiality, different understanding of IT outsourcing, etc. A total of 160 organizations returned questionnaires, with a response rate of 45.2%. I further eliminated responses of 9 firms due to missing data, yielding a final sample of valid and usable responses of 151 (a 42.7% response rate). The final sample consists of firms in a variety of industries. As shown in the Figure 2, more than three quarters of the sample firms are in the manufacturing sector, which is consistent with the industry distribution in the 2004 iPower 500 firms.

92

Figure 2: Industry Composition of Sample Firms

5.3 Transportation and Logistics

2.6 Other

4 Software and Technology 3.3 Financial Services

Software and Technology Financial Services Manufacturing Mining Transportation and Logistics Other

6.6 Mining

78.1 Manufacturing

The key informants of the client firms include CIOs, director of information technology, IT manager, IT staff, project manager, manager or staff of non-IT departments. As shown in Figure 3, 50% of the respondents work at the top or middle management level in the IT area. It is reasonable to believe that most of these respondents are actively involved in the IT outsourcing projects and therefore were able to respond to the questionnaire with relatively accurate answers.

93

Figure 3: Profile of Key Informants

CIO Department Manager
4 Project Manager 0.7 Other 9.9 Staff 5.3 Not Specified

Director of Information Technology Engineer
8.6 CIO 11.9 Department Manager

IT Manager IT Staff Not Specified Other Project Manager Staff

7.3 IT Staff

7.9 IT Manager 33.1 Director of Information Technology

11.3 Engineer

Due to the convenience sampling strategy, most of the sample firms are large firms, according to the criteria (i.e., number of employees and annual sales revenue) posted by the National Bureau of Statistics of China. The sample firms, however, do vary in terms of number of full-time IT employees. As shown in Figure 4, about 78% of the firms have 50 or less full-time employees. Of the 125 firms that provided financial information in the past three years (2002-2004), 45% have an average IT budget below 5 million RMB, 45% have an average IT budget between 5 million and 50 million RMB, and 6% have an average IT budget more than 1 billion RMB. One hundred and forty-one firms responded to the question about their scale of IT outsourcing. As shown in Figure 5, about 60% of the 141

94

firms with valid responses outsource 50% or more IT functions, indicating a high propensity of the sample firms to use IT services from outside. Figure 4: Number of Full Time IT Employees

14

12

Frequency
10

8

6

4

2

0
2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 3 3 3 4 4 4 5 5 5 6 6 7 8 8 1 1 1 1 1 1 1 1 1 2 2 3 4 5 1 1 1 0 1 2 3 5 6 8 0 1 2 4 5 6 7 8 0 5 6 0 5 9 0 2 8 0 1 0 0 3 0 1 2 3 5 6 6 7 8 0 5 0 1 7 0 2 5 0 0 0 0 0 2 9 0 0 0 0 0 2 0 0 0 9 1 0 1

Number of IT Employees

95

Figure 5: Scale of IT Outsourcing

20

15

Percent

10

5

0 2 3 5 8 10 20 25 30 32 40 45 50 60 70 80 85 87 90 95 96 98 100

Percentage of IT Functions Outsourced

In the questionnaire, I asked the respondents to answer questions with regard to the history of the relationship between the client and the vendor, IT spending, scale of IT outsourcing, and characteristics of the IT outsourcing contract. Of the 151 firms in the sample, about 46% had engaged with the IT outsourcer in previous a business relationship. The IT outsourcing projects specified by the respondents can be categorized as: (1) enterprise-wide transformation, (2) functional area transformation, and (3) automation. Examples of IT outsourcing projects in the first category include ERP, CRM, and CIS projects that will have extensive impact on all units within an organization. Information systems that are implemented to change business processes of specific functional areas such as human resources, finance and accounting, and manufacturing processing are considered as projects in the second category. The third category of IT outsourcing project does not require

96

significant changes in business processes and employee participation, therefore yielding the least impact at the organizational level. Examples of IT outsourcing projects in this category include office automation, data integration, web and PC maintenance, and help desk. Among the 151 firms, 45% had enterprise-wide transformation IT outsourcing projects, 28% had functional area transformation IT outsourcing projects, and 21% had automation IT outsourcing projects (see Figure 6). Although this study started with an intention to examine IT outsourcing projects that were more transformational in nature, responses from the full sample do not fully satisfy this requirement. However, over three quarters of the sample reported on projects that are consistent with high impact, transformational outsourcing. Figure 6: Nature of IT Outsourcing Project

Enterprise-Wide Transformation Functional Area Transformation Automation 6.62% Did Not Provide Information

20.53%

45.03%

27.81%

97

The respondents also answered questions about how much of the IT function was outsourced to this particular IT outsourcer and how much the project accounted for the annual IT spending. About 74% of the 133 firms that responded to this question outsourced up to 50% of IT functions to the specific IT outsourcer. Correspondingly, about 80% of the 135 firms spent up to 50% of the annual IT spending on the specified IT outsourcing project. Such evidence indicates a reasonably close relationship between the client firm and its vendor, without the significant presence of a lock-in scenario. A majority of the firms (70%) had signed IT outsourcing contracts that had an expected duration of less than 4 years (see Figure 7). At the time of the study, about 80% of the firms were less than 4 years into the contract terms, whereas some other firms had been involved with their vendors in an extended duration as long as a decade (see Figure 8). This indicates that firms wanted to start with a shorter, more flexible contract term to get to know the vendor better. When the relationship goes on well for both parties, they tend to renegotiate the contract and extend their relationship to a longer term.

98

Figure 7: Expected Duration of Current Contract of IT Outsourcing Project

Less than 4 years Between 4 and 7 years More than 7 years
7.28% 1.32%

Did not provide information

21.85%

69.54 %

5.2.5

Respondents: Vendor Firms Of the 151 client firms that provided valid and useful responses, 5 firms explicitly

declined to provide contact information of the key informant at their vendor firms. Eventually, I received responses from vendors of 79 firms (a vendor response rate of 54.1%).

99

Figure 8: Duration to Present of Current IT Outsourcing Contract

40

30

Frequency
20

10

0 0 30 60 90 120 150

Mean = 36.72 Std. Dev. = 26.142 N = 142

Duration to Present (Months)

The summary of vendor information suggests that the IT outsourcing market in China is served by a variety of players. Although several local IT service providers (such as UFSoft, King Dee, and Hand China) and a couple of foreign players (such as IBM, Bearing Point, and HP, Oracle, and SAP) appear to be more popular to the client firms, none have a dominant market presence. In addition to the general IT solution providers, several vendors in the sample have specialized expertise in particular industries. For example, Shanghai Baosight, a spin-off of the Bao Steel Group, has extensive knowledge about IT in the steel manufacturing industry and had provided outsourcing services to other steel mills in China. A profile of IT outsourcing service providers of the sample firms is summarized in Table 8.

100

Table 8: Profile of IT Outsourcers (N=141) Vendor Frequency Percent UFSoft 19 13.5% IBM 9 6.4% King Dee 7 5% Hand China 5 3.5% Hanpu 4 2.8% Langchao Software 4 2.8% Lenovo 4 2.8% Botone 3 2.1% Shanghai Baosight 3 2.1% Bearing Point 2 1.4% CAS Chengdu 2 1.4% Donghua Hechuang 2 1.4% HP 2 1.4% Oracle 2 1.4% SAP 2 1.4% Shanghai Sipu 2 1.4% Zhongke Software 2 1.4% Others 67 47.5% Total 141 100%

The key informants on the vendor side appeared to be more willing to share information. Compared their counterparts who usually responded in 10 to 14 days or even longer, most of the vendor informants responded to the questionnaire within a week. A majority of the vendor informants were project managers of IT outsourcing projects. 5.2.6 Late Response Bias and Non-Response Bias The length of time that firms took to respond to the questionnaire varied from one day to several weeks. In addition, I did not get responses from the vendors of some firms. Therefore, to detect the possibility of late-response biasor non -response bias in the client firms, I used one-way ANOVA analyses to compare the means of all variables across subsamples. The first ANOVA analysis was performed to compare firms that responded within 2 weeks with those that responded in more than 2 weeks. ANOVA results in Table 9 suggest that firms that responded to the survey late were not significantly different from those that 101

responded early on most of the variables, except for the success in business operations. This indicates that more successful firms tended to respond early, perhaps because they were more willing to disclose their success. The second ANOVA analysis was performed to compare client firms that had vendor responses with those that did not have vendor responses. As shown in Table 10, firms in the two subgroups were significantly different on the variables trust and learning intent. This indicates that client firms that had greater trust in the vendor and learning intent were more willing to share information about their outsourcing relationships with the vendor.

102

Table 9: ANOVA Results to Test Non-Response Bias Based on Response Time (N=151)
Variable Between Groups IT Outsourcing Within Groups Experience Total Between Groups Within Groups Role of IT Total Between Groups Partner Resource Within Groups Endowment Total Between Groups Social Interaction Within Groups Total Between Groups Within Groups Trust Total Between Groups Within Groups Shared Vision Total Between Groups Shared Cognition Within Groups Total Between Groups Within Groups Learning Intent Total Between Groups Knowledge Within Groups Acquisition Total Between Groups Combinative Within Groups Capability Total Between Groups Success in Business Within Groups Operations Total Between Groups Success in Within Groups Innovation Total Sum of Squares .237 104.680 104.917 .256 92.287 92.543 .074 83.520 83.594 .225 72.076 72.300 .001 58.946 58.947 .658 91.390 92.049 .189 105.221 105.410 .143 106.562 106.705 .000 59.520 59.520 .947 60.123 61.070 3.134 62.233 65.368 .089 74.612 74.701 df 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 Mean Square .237 .703 .256 .619 .074 .561 .225 .484 .001 .396 .658 .613 .189 .706 .143 .715 .000 .399 .947 .404 3.134 .418 .089 .501 F .338 Sig. .562

.414

.521

.133

.716

.465

.497

.002

.963

1.073

.302

.267

.606

.199

.656

.000

1.000

2.346

.128

7.504 .007***

.178

.673

***: Significant at =.01; **: Significant at =.05; *: Significant at =.10 Responded within 2 weeks: n=67 Responded after 2 weeks: n=84

103

Table 10: ANOVA Results to Test Non-Response Bias Based on Vendor Response (N=151)
Sum of Squares Between Groups .852 IT Outsourcing Within Groups 104.065 Experience Total 104.917 Between Groups .337 Within Groups Role of IT 92.206 Total 92.543 Between Groups .008 Partner Within Groups Resource 83.587 Endowment Total 83.594 Between Groups .829 Social Within Groups 71.472 Interaction Total 72.300 Between Groups 1.749 Within Groups Trust 57.198 Total 58.947 Between Groups 1.150 Shared Vision Within Groups 104.259 Total 105.410 Between Groups 452.035 Shared Within Groups 63008.759 Cognition Total 63460.795 Between Groups 2.184 Learning Intent Within Groups 104.521 Total 106.705 Between Groups .331 Knowledge Within Groups 59.189 Acquisition Total 59.520 Between Groups .900 Combinative Within Groups 60.170 Capability Total 61.070 Between Groups .414 Success in Within Groups Business 64.953 Operations Total 65.368 Between Groups .263 Success in Within Groups 74.438 Innovation Total 74.701 **: Significant at =.05; *: Significant at =.10 Firms with vendor response: n=79 Firms without vendor response: n=72 Variable df 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 1 149 150 Mean F Square .852 1.220 .698 .337 .619 .008 .561 .545 Sig. .271

.462

.014

.907

.829 1.728 .480

.191

1.749 4.557 .034** .384 1.150 1.644 .700 452.035 1.069 422.878 2.184 3.114 .701 .331 .397 .833 .202

.303

.080*

.363

.900 2.229 .404 .414 .436 .263 .500 .950

.138

.331

.527

.469

104

5.3

OPERATIONALIZATION OF CONSTRUCTS Survey items were developed based on a literature review and interviews with a half

dozen IT outsourcing project managers. I used both sets of responses to refine construct measures that examine dimensions of social capital, knowledge acquisition, and success of IT outsourcing. All constructs were measured using multiple items. The original instrument was pilot tested with a small sample of subjects (5 IT outsourcing project managers and 6 doctoral students). Based on feedback provided by the pilot test subjects, I dropped the items that were originally intended to measure the construct trust because they were viewed as being too general, and replaced them with items that were more relevant and more specific in a partnership context. In addition, survey items that were used to measure long-term IT capabilities were dropped and were replaced by items that measure more tangible outcomes such as success in business operations. I also rephrased some other items that were ambiguous to the respondents. I translated the refined questionnaire into Chinese, and conducted a second pilot test among 11 firms in China. I used feedback from the second pilot test and obtained alternative opinions on the translation to make sure that there was no confusing wording in the final questionnaire. Except for questions about details of the IT outsourcing project, most of the survey items utilized a seven-point Likert scale to indicate the respondent’s level of agreement with each statement. Constructs in the research model are summarized in Table 11, and detailed scales and descriptions of each construct are summarized in Appendix 5.

105

Table 11: Operationalization of Research Variables
Variable Structural Dimension of Social Capital Relational Dimension of Social Capital Measurement Reputation and material capital possessed by partner Willingness of partners to reciprocate in information exchange Mutual respect and friendship that reside at multiple levels between partners Expectation that alleviates the fear that one’s exchange partner will act opportunistically Extent to which partners have common beliefs and understanding regarding the importance of motives, goals, and objectives. Knowledge structure held by partners that enable them to form accurate explanations and expectations for the task, and in turn, coordinate their actions and adapt their behavior to demands of the task and other team members Propensity to view the partnership as a strategic vehicle to internalize knowledge and capabilities from external sources Extent of various types of knowledge acquired Level of fitness between the firm’s economic goals and outsourcing outcomes Extent to which development in new products/services and/or new markets is enabled by the use of IT Propensity and extent to which the firm practiced IT outsourcing in the past years The role that IT plays in daily operation and business strategy of a firm Source Adapted from Hitt et al (2000) and Stuwart (2000) Adapted from Lee et al (1999) Adapted from Kale et al (2000) and YliRenko et al (2001) Adapted from Carson et al (2003) Adapted from Tsai et al (1998) and YoungYbarra et al (1999) Adapted from Carson et al (2003)

Cognitive Dimension of Social Capital

Learning Intent Knowledge Acquisition

Adapted from Lei (1997) and Parise et al (2001) Adapted from Bassellier et al (2003), Kale et al (2000), and Simonin (1999) Adapted from Lee et al (1999) Adapted from Tallon et al (2003) Self-developed Adapted from Grover et al (1994b)

IT Outsourcing Success

IT outsourcing experience Role of IT

106

5.3.1

Structural Dimension of Social Capital The structural dimension of social capital was measured by two scales representing

resource endowment of partner and information reciprocity between partners. Resource endowment of partner measures the characteristics of the outsourcing partner in terms of social and material capital possessed by it. Six items were developed for this study, based on the elaboration of scales used to measure partner reputation by Hitt et al (2000). These items focused on the partner reputation accrued from expertise, experience, service, and social status. Information reciprocity reflects structure of information flow in the partnership, i.e., willingness of partners to reciprocate in information exchange. I used four items adapted from Lee et al (1999) to measure the extent of participation and communication in the relationship. 5.3.2 Relational Dimension of Social Capital The relational dimension of social capital, manifested as assets created and leveraged through relationships, was measured by two scales representing trust and social interaction. Based on the definition that trust is a type of expectation that alleviates the fear that one’s exchange partner will act opportunistically, I did not use previously used items that measured trust in a more general sense. Instead, I adapted items developed by Carson et al (2003) that measures trust in a partnership context in greater depth. Specifically, these items measure to what extent one entity expect its partner to act benevolently when opportunities arise. Social interaction measures mechanisms that sustain social relationships between partners at all levels. Items were adopted from Kale et al (2000) and Yli-Renko et al (2001), and focused on mechanisms such as personal interaction, mutual respect, friendship, trust, and reciprocity.

107

5.3.3

Cognitive Dimension of Social Capital The cognitive dimension of social capital is manifested as resources providing shared

representations, interpretations, and systems of meaning among parties. In this study, the cognitive dimension of social capital was measured by two scales: shared vision and shared cognition. A shared vision facilitates a common understanding of collective goals and common beliefs regarding the importance of motives and goals of the partnership. In this study, shared vision was measured by items adapted from Tsai et al (1998) and YoungYbarra et al (1999). These items focused on ambition, enthusiasm, motive, and proper action shared between partners. Shared cognition represents the extent to which a partner’s knowledge structure enables it to form accurate explanations for joint tasks and to coordinate its actions with its partner. I adapted items developed by Carson et al (2003) and Tippins et al (2003) to measure similarity between prior experience of employees at one partner and the nature of the other partner’s job. 5.3.4 Knowledge Acquisition In this study, knowledge acquisition reflects the incremental stock of knowledge in three areas: technical, business, and networking. Knowledge acquisition was measured by adapting established items from several studies (Bassellier et al. 2003; Kale et al. 2000; Simonin 1999) as well as new items. These items focused on whether the client firm had acquired new knowledge or information with regard to technology, business processes, and the capability to manage partnerships. 5.3.5 IT Outsourcing Success Firms outsource IT functions to realize IT value—cost savings, customer satisfaction, or business process improvement—through the introduction of new technologies or new

108

processes (Smith et al. 2003), which requires the employees to work differently, learn new skills, and develop new understanding of how and where information, technology and people fit together (Chircu et al. 2000). Therefore, knowledge plays an important role in facilitating value realization. Although knowledge is widely considered as the underlying force of ultimate business success, it has been neglected in prior IT outsourcing research. Knowledge acquired from outsiders through IT outsourcing can not only bring direct benefits in business (Lee 2001; Lee et al. 1999) such as cost reduction and economies of scale in human and technological resources, but also lead to IT-enabled innovation (Tallon et al. 2000). In this study, I adapted items from Lee et al (1999) to measure direct success of IT outsourcing in business operations. The measures of IT-enabled innovation, specifically focused on value, quality, design, and support of new products/services, were adapted from Tallon et al (2000). 5.3.6 Moderating Variables In the proposed conceptual model, there are two moderating variables: learning intent and combinative capability. Learning intent, defined as the propensity to view the partnership as a strategic vehicle to internalize knowledge and capabilities from external sources, was measured by items adapted from Lei (1997) and Parise et al (2001) as well as new items. These items focused on the extent to which the client firm expected to learn from its partner. Combinative capability measures a firm’s capabilities to synthesize and apply existing and acquired knowledge. I developed new items based on the measures of combinative capability proposed by Van den Bosch et al (1999), focusing on a firm’s system capabilities, coordination capabilities, and socialization capabilities (Van den Bosch et al. 1999).

109

5.3.7

Control Variables In any study, it is important to control for variables that may affect the relationships

in the research model, in order to eliminate any extraneous noise in the relationships. I also want to control any variables that might otherwise explain the predicted relationships between the independent variables and the dependent variables. Specifically, I expect that more IT outsourcing experience would make the client firm more familiar with the IT outsourcing processes; therefore, the client firm would be better able to acquire knowledge from an outsider and obtain successful outcomes from IT outsourcing. Items that measured IT outsourcing experience were developed based on items used in previous IT outsourcing studies. The role of IT in an organization plays an important role in IT functions outsourced. Grover et al (1994) found a significant moderating effect of role of IT on the relationship between resource gap and the decision to outsource. I expect that when IT plays a more strategic role in the organization, the organizations tends to utilize IT to achieve higher level goals. Items for role of IT were developed based on the definition and categorization by Grover et al (1994). I also use industry as a control variable to examine if there is any industry specific difference in the sample. 5.4 DATA REDUCTION AND SCALE VALIDATION The measurement model was tested by examining discriminant validity, the internal consistency of constructs, and the reliability of individual items. 5.4.1 Exploratory Factor Analysis: Test of Discriminant Validity The psychometric properties of all scales were established using factor analysis and test for reliability. First, I performed exploratory factor analyses with SPSS, using the principal component technique for factor extraction and Varimax rotation. Factor analyses

110

were performed for two subsets of data: one with client responses and all other variables, and the other with vendor response and all other variables. After several iterations of item elimination, the analysis extracted 12 factors with Eigenvalues greater than 1 (see Table 12) that together explained about 73% of the variance. I was able to obtain a similar factor pattern of items when I performed factor analysis on the vendor response items and items of all other variables (see Table 13). As shown in Table 12 and Table 13, each item loads more strongly on its corresponding construct than on other constructs in the model, indicating discriminant validity. In Appendix 5, items that were dropped as a result of factor analysis are marked with asterisks. The last two items of success in innovation cross-loaded on a second factor. Although this factor was not proposed in the original model, the two items that loaded on this factor are both related to the detection of new market trends and consumer’s needs, which can as well be considered a form of innovation. The market trends related factor was listed in Table 13 for clarification purpose, but it was not used in the analyses that followed. All items for information reciprocity were dropped due to the lack of clean loading.

111

Table 12: Exploratory Factor Analysis Results—Client (N=151)
ITEMS suc15 suc16 suc18 suc17 suc13 suc14 suc11 suc12 suc8 tknow5 bknow2 tknow4 bknow3 bknow1 tknow6 nknow3 combcap3 combcap1 combcap2 combcap4 combcap6 itrole1 itrole2 itrole3 itrole6 itrole7 trust7 trust6 trust8 trust5 li1 INNOSUC .861 .825 .779 .766 .748 .747 .684 .641 .527 .239 .211 .276 .260 .356 .175 .326 -.012 .091 .194 .214 .314 .094 .182 .222 .093 .321 .028 .098 .121 .043 .097 KNOW .130 .154 .154 .163 .289 .167 .249 .244 .301 .815 .737 .716 .692 .684 .612 .494 .098 .099 .047 .149 .134 -.003 .051 .074 .142 .180 .178 .114 .076 .173 .147 COMBCAP .029 .170 .065 .199 .080 .133 -.017 .180 .212 .071 .062 .166 .182 .071 .021 .156 .852 .752 .752 .700 .669 .106 .083 .185 .174 .222 .090 -.037 .154 .149 .099 ITROLE .183 .202 .038 -.014 .105 .127 .125 .249 .200 .050 .083 .009 .138 .058 .076 .177 .135 .069 .107 .260 .181 .831 .791 .739 .649 .623 .176 .027 .084 .285 .023 TRUST .066 .048 .195 .107 .052 -.151 .065 .080 .111 .266 .045 .122 .011 .121 .073 .018 .047 .002 .121 .048 .108 .081 .162 .155 .134 -.131 .787 .686 .672 .661 .137 LI .103 .094 -.052 -.026 .118 .152 .002 .173 .104 .103 .080 .207 -.129 .272 .420 .213 .019 .182 .143 -.003 .115 .120 .018 .062 .042 -.008 .080 .055 .226 .227 .853 RSENDOW .099 .074 .122 .148 .017 .156 .117 .085 .035 .033 .029 .090 .068 .057 .273 .023 .007 .060 .065 .112 .038 .104 .087 .070 .107 .211 .114 .227 .067 .127 .178 VISION .164 -.004 -.039 -.161 .135 .080 .231 .234 .070 -.009 .142 .031 .151 .197 -.074 .231 .164 .057 .146 .078 .065 .088 .037 .033 .095 -.064 .082 .012 .257 .290 .029 RELAT .029 .122 .039 .137 .001 .150 .184 -.038 .247 .021 -.009 -.025 .045 .159 .163 .313 -.032 .091 -.017 .136 .137 -.042 .033 .073 .192 .035 .115 .137 .183 .129 .061 COGN .016 -.035 .116 .025 .195 .101 .098 -.012 .028 .013 .108 .026 .199 .084 -.147 .141 .106 .281 .177 .093 .020 -.028 -.009 .083 .029 .235 .135 .153 -.111 .022 .040 OSEXP .084 .090 .067 .070 -.044 .137 .074 .120 -.002 -.007 .135 .094 .096 .013 .012 .078 .106 .064 -.007 -.020 .161 .116 .048 .089 .205 -.112 .153 .021 .131 -.032 .001 BUSSUC -.024 -.068 .213 .172 .015 .002 .234 .127 .088 -.003 .174 .098 .186 -.107 -.018 .141 .095 .012 .036 .111 .064 .172 .085 .083 -.084 -.122 -.068 .151 -.041 -.052 .085

112

ITEMS li2 li3 rsendow4 rsendow1 rsendow2 rsendow5 rsendow3 vision3 vision1 vision2 relat5 relat3 relat2 relat4 cogn3 cogn2 cogn1 osexp3 osexp2 osexp1 suc3 suc4

INNOSUC .124 .106 .192 .094 .247 .172 .022 .118 .089 .276 .121 .228 .224 .215 .091 .052 .331 .115 .026 .264 .311 .371

KNOW .125 .247 .125 .062 .045 .267 .026 .214 .128 .108 .103 .072 .035 .080 .048 .155 .074 .027 .199 .043 .231 .255

COMBCAP .106 .181 .166 -.067 .055 .287 -.032 .134 .283 .307 .043 .109 .121 .113 .241 .207 .210 .046 .121 .083 .217 .193

ITROLE .086 .080 .141 .205 .135 .095 .152 .048 .095 .087 .046 .133 .078 .086 .041 .076 .050 -.016 .186 .241 .154 .153

TRUST .128 .138 .146 .194 .161 .081 .367 .341 .175 .171 .100 .409 .341 .419 -.033 .079 .224 .038 .137 .075 -.006 .067

LI .842 .817 .059 .240 .166 .211 .359 .049 .103 .130 .115 .167 .093 -.018 -.003 -.072 -.016 .058 .076 -.038 .078 .149

RSENDOW .143 .077 .736 .678 .676 .497 .464 .139 .220 .125 .158 .258 .014 .392 -.002 -.124 .135 .017 .077 .121 .099 .031

VISION .191 .013 -.066 .265 .219 .371 .070 .707 .689 .602 .056 .128 .290 .234 .008 -.132 .264 .019 .114 .049 .032 .208

RELAT .118 .046 .059 .269 .094 .068 .155 .084 .219 .262 .746 .633 .586 .546 .044 .204 -.097 .220 -.125 -.021 .168 .176

COGN -.105 .016 -.113 .094 .052 .126 -.165 -.005 -.050 .073 .240 -.149 .078 -.065 .806 .741 .617 .014 -.058 .195 .158 .102

OSEXP .080 .026 .018 .070 .087 .055 .241 .024 .096 .188 .075 .021 .030 .026 .085 .014 -.020 .789 .765 .679 -.055 .066

BUSSUC .023 .024 .063 -.033 .097 -.121 .069 .185 -.104 .201 .085 .016 .149 .114 .136 -.014 .065 -.045 -.075 .190 .718 .597

Extraction Method: Principal Component Analysis. Rotation Method: Varimax with Kaiser Normalization. Rotation converged in 8 iterations. OSEXP = IT Outsourcing Experience, IT ROLE = Role of IT, RSENDOW = Partner Resource Endowment, RELAT = Social Interaction, TRUST = Trust, VISION = Shared Vision, COGN = Shared Cognition, LI = Learning Intent, KNOW = Knowledge Acquisition, COMBCAP = Combinative Capability, BUSSUC = Success in Business Operations, INNOSUC = Success in Innovation

113

Table 13: Exploratory Factor Analysis Results—Outsourcer (N=79)
ITEMS suc16 suc15 suc14 suc13 suc8 suc12 suc11 suc17 suc18 bknow2 tknow5 bknow3 bknow1 tknow4 tknow6 nknow3 vrelat3 vrelat2 vrelat4 vrelat5 itrole1 itrole2 itrole3 itrole6 itrole7 combcap4 combcap3 combcap2 combcap1 combcap6 vvision1 INNOSUC .870 .857 .789 .750 .638 .624 .533 .590 .496 .037 .271 .066 .439 .377 .326 .237 .112 .111 .056 .091 .096 .100 .208 .109 .313 .189 .017 .313 .118 .412 .112 KNOW .139 .185 .122 .313 .274 .242 .297 .086 .147 .814 .789 .769 .721 .676 .671 .537 .141 -.081 .059 .041 -.016 .132 .025 .027 .153 .154 .019 .023 .175 .090 .012 VRELAT .021 .083 .096 .153 -.124 .126 .217 .193 .234 .139 .029 .169 -.043 -.069 -.101 -.042 .816 .796 .789 .778 .016 .132 .028 .034 .104 -.107 .219 .142 -.073 -.057 .222 ITROLE .130 .154 .099 .081 .219 .239 .212 -.091 .100 -.064 .132 -.039 .124 -.039 .258 .134 .101 .002 .195 .006 .782 .767 .765 .670 .581 .138 .026 .193 .106 .137 6.56E-006 COMBCAP .124 .094 .228 .101 .080 .249 .158 .100 .145 .215 -.118 .231 .119 .052 -.006 .098 .003 .065 -.050 .137 .053 .158 .015 .218 .263 .764 .760 .700 .699 .608 .031 VVISION .011 .110 .057 .008 -.017 .057 .072 .071 .140 -.073 -.003 .005 .028 .074 .028 -.012 .291 .089 .369 -.024 .114 -.026 .184 -.066 -.171 .187 .091 -.057 -.073 .051 .799 VTRUST .001 -.032 -.034 -.021 .213 -.167 .091 .096 .030 .127 -.041 .041 -.119 -.019 -.136 .023 .042 .167 .005 .254 .003 -.151 .114 .314 .092 -.058 .052 -.058 .121 .081 .213 VCOGN .022 .008 -.023 .100 -.064 -.027 -.023 -.018 -.025 .115 .138 -.052 -.079 .271 -.107 -.017 .062 .105 .110 .129 .140 .078 -.033 .041 .074 .049 -.135 -.003 -.008 .081 .045 OSEXP .060 .052 .081 .070 .009 .113 .214 .174 .341 .217 -.209 .169 -.008 -.084 -.129 .091 -.062 .215 -.052 -.099 .072 .122 .098 .201 -.149 -.097 .100 -.060 .106 .143 .123 BUSSUC -.022 .051 .029 .028 .214 .215 .371 .113 .027 .011 -.075 .154 .042 .006 .111 .237 .064 -.045 .194 -.046 .209 -.012 .048 -.085 -.002 .083 .121 .087 .057 .121 .064 TRND .262 .038 .092 .062 -.088 -.151 -.183 .597 .491 -.037 .010 -.093 -.079 .164 .316 .380 .150 .032 -.018 -.014 -.122 .099 .085 -.088 .159 .068 -.114 -.036 .108 .322 .064

114

ITEMS vvision3 vvision2 vtrust6 vtrust7 vtrust8 vtrust5 vcogn3 vcogn2 vcogn1 osexp2 osexp1 osexp3 suc4 suc3

INNOSUC -.044 .114 -.056 -.073 .157 .078 -.022 -.009 .065 .010 .302 .359 .298 .045

KNOW -.020 -.017 -.102 .063 .062 .018 .042 .226 -.036 .174 -.001 -.207 .134 .118

VRELAT .179 .201 .142 .151 .257 .480 .094 .219 .165 -.026 .004 .006 -.039 .196

ITROLE -.057 .148 .090 .047 .061 .053 -.020 .319 .138 .229 .337 -.108 .008 .146

COMBCAP .132 .068 .088 .090 -.104 -.144 -.078 -.017 .035 .052 .036 .032 .275 .196

VVISION .714 .706 .001 .355 .431 .362 .154 -.005 .335 -.001 .059 .201 .025 .062

VTRUST -.040 .283 .815 .750 .573 .502 .001 .172 .011 -.106 .051 .195 -.010 .149

VCOGN .432 .101 .070 -.060 .080 .136 .867 .677 .627 .020 .117 .073 .132 .114

OSEXP -.126 .145 -.021 .067 .006 -.015 .077 -.030 .148 .826 .661 .575 -.041 -.049

BUSSUC -.152 .080 .040 -.082 .218 .162 .102 -.082 .310 -.085 .128 -.032 .791 .741

TRND .084 -.052 -.018 .159 -.056 -.013 .019 -.109 .063 .005 .262 -.009 -.088 .369

Extraction Method: Principal Component Analysis. Rotation Method: Varimax with Kaiser Normalization. Rotation converged in 9 iterations. OSEXP = IT Outsourcing Experience, IT ROLE = Role of IT, RSENDOW = Partner Resource Endowment, RELAT = Social Interaction, TRUST = Trust, VISION = Shared Vision, COGN = Shared Cognition, LI = Learning Intent, KNOW = Knowledge Acquisition, COMBCAP = Combinative Capability, BUSSUC = Success in Business Operations, INNOSUC = Success in Innovation

115

5.4.2

Confirmatory Factor Analysis I also performed confirmatory factor analysis (CFA) by fitting congeneric

measurement models for each construct in AMOS (Childers et al. 2001). Confirmatory factor analysis seeks to determine whether the number of factors and the loadings of measured variables (indicators) on them conform to what is expected on the basis of preestablished theory. I used CFA to determine whether the measures created to represent a latent variable really belong together. Table 14 shows the result of CFA for all latent variables with the absolute measure of fit (CMIN/df), which indicates a good fit if the statistic value falls between 1 and 3 (Carmines et al. 1981). The RMR (root mean square residual) measures how much the sample variances and covariances differ from their estimates obtained under the assumption that the model is correct, and a small RMR, preferably below .05 indicates a good model fit (Joreskog 1993). Additionally, I also obtained the goodness of fit index (GFI) and the adjusted goodness of fit index (AGFI) from the confirmatory factor analysis. Both indices are bound between 1 and 0, where 1 indicates a perfect fit. A GFI of .90 or above and an AGFI of .80 or above indicate a reasonably good fit (Joreskog 1993). Fit indices for comparisons to a baseline model, such as normed fit index (NFI), relative fit index (RFI), incremental fit index (IFI), Tucker-Lewis coefficient (TLI) and comparative fit index, were generated from the CFA results. All of these indices have a recommended level of .90 to suggest a good model fit (Chin 1998; Chin et al. 1995). I also used a population-based goodness of fit index RMSEA, which is relatively insensitive to sample size (Loehlin 1998). A value of .08 or less for RMSEA is usually considered to indicate a reasonably good fit (Brown et al. 1993), although some times the threshold value can be the lifted up to .10 (Steiger 1989). As shown in Table 14, most of the latent variable

116

models have fit indices that pass the recommended threshold level, indicating a relatively good fit. The latent variables with 3 or fewer indicators make the models just identified, with zero degrees of freedom. When the model is perfectly fit, most of the fit indices equal to 1.00. In this case, results from exploratory factor analysis and reliability test (reported below) were used to examine the validity of the measurement scales (Childers et al. 2001). The last two columns of Table 14 show the standardized regression weight of each item, and the p values indicate that all items have significant standardized regression weight at a .01 level, except for items that have regression weights set to 1.00.

117

Table 14: Results of Confirmatory Factor Analysis with AMOS
Construct CMIN DF CMIN/DF (1 to 5) .914 RMR (.90) .994 AGFI (>.80) .971 NFI (>.90) .990 RFI (>.90) .971 IFI (>.90) 1.001 TLI (>.90) 1.003 CFI (>.90) 1.000 RMSEA (.80) .897

NFI (>.90) .949

RFI (>.90) .915

IFI (>.90) .999

TLI (>.90) .999

CFI (>.90) .999

RMSEA (.80) .939

NFI (>.90) .981

RFI (>.90) .962

IFI (>.90) .994

TLI (>.90) .988

CFI (>.90) .994

RMSEA (|z| 95% Confidence Interval Err. LI .136 .086 1.58 .113 -.032 .304 Electronics -.267 .211 -1.27 .206 -.682 .147 Finance .222 .320 .69 .488 -.405 .849 Transportation -.422 .284 -1.49 .137 -.980 .135 Construction -.085 .196 -.43 .664 -.468 .298 Mining -.021 .483 -.04 .966 -.967 .925 OSEXP -.079 .075 -1.05 .294 -.225 .068 ITROLE .057 .085 .67 .504 -.109 .223 RSENDOW .289 .102 2.84 .005** .089 .488 RELAT .104 .103 1.01 .311 -.097 .305 TRUST -.094 .110 -.85 .393 -.309 .121 VISION .012 .098 .12 .902 -.180 .204 COGN .125 .076 1.65 .099 -.023 .273 RSENDOWxLI -.063 .106 -.60 .549 -.270 .147 RELATxLI .050 .171 .29 .769 -.285 .385 TRUSTxLI -.015 .193 -.08 .939 -.392 .363 VISIONxLI -.132 .168 -.79 .432 -.462 .198 COGNxLI .237 .068 3.51 .000*** .105 .370 Constant 2.247 .694 3.24 .001 .887 3.607 Electronics -.142 .250 -.57 .569 -.632 .347 Finance -.502 .376 -1.34 .181 -1.239 .234 Transportation -.085 .323 -.26 .792 -.718 .548 Construction -.156 .237 -.66 .512 -.621 .310 Mining -.862 .527 -1.64 .102 -1.894 .171 OSEXP -.044 .085 -.52 .602 -.211 .122 ITROLE .020 .100 .20 .844 -.177 .217 CC .523 .175 2.99 .003** .180 .866 KNOW .594 .315 1.89 .059 -.023 1.210 KNOWxCC .115 .313 .37 .713 -.4982 .728 Constant .787 .784 1.00 .316 -.750 2.323 Electronics .291 .195 1.49 .135 -.091 .674 Finance -.256 .294 -.87 .384 -.831 .320 Transportation .245 .252 .97 .331 -.249 .740 Construction -.287 .185 -1.55 .122 -.650 .077 Mining -.223 .412 -.54 .587 -1.030 .583 OSEXP .192 .066 2.90 .004** .062 .322 ITROLE .048 .078 .61 .543 -.106 .201 CC .287 .136 2.11 .035* .020 .553 KNOW 1.170 .301 3.88 .000*** .579 1.760 KNOWxCC -.231 .243 -.95 .343 -.708 .246 Constant -.892 .612 -1.46 .145 -2.091 .306 OSEXP: Outsourcing Experience; ITROLE: Role of IT; RSENDOW: Perceived Partner Resource Endowment; RELAT: Social Interaction; VISION: Shared Vision; COGN:: Shared Cognition; LI: Learning Intent; KNOW: Knowledge Acquisition; CC: Combinative Capabilities ***: p < .001; **: p.70) on their respective constructs. Recommended for analysis using PLS to further evaluate the discriminant validity of all the constructs (Agarwal et al. 2000; Wasko et al. 2005), an inter-construct correlation matrix was created for each model using the partial least square technique (see Table 23). The values on the diagonal are the square root of the average variance extracted (AVE) of each construct, and the off-diagonal values are the inter-construct correlations. As shown in Table 23, the AVE value of each construct is larger than its

146

correlations with all other constructs, indicating that the average variance shared between the construct and its indicators is larger than the variance shared between the construct and other constructs (Fornell et al. 1981). Based on the results of exploratory and confirmatory factor analyses, I conclude that all constructs in the model demonstrate satisfactory convergent and discriminant validity.

147

Table 22: PLS Outer Model Loadings (N=151)
Construct IT Outsourcing Experience Indicators OSEXP1 OSEXP2 ITROLE1 ITROLE2 ITROLE3 ITROLE6 ITROLE7 RSENDOW1 RSENDOW2 RSENDOW4 RSENDOW5 RELAT2 RELAT3 RELAT4 RELAT5 TRUST5 TRUST6 TRUST7 TRUST8 VISION1 VISION2 VISION3 COGN1 COGN2 COGN3 LI1 LI2 LI3 TKNOW4 TKNOW5 TKNOW6 BKNOW1 BKNOW2 BKNOW3 NKNOW3 COMBCAP1 COMBCAP2 COMBCAP3 COMBCAP4 COMBCAP6 SUC3 SUC4 SUC8 SUC11 SUC12 SUC13 SUC14 SUC15 SUC16 SUC17 SUC18 Client Model .8774 .8823 .7987 .8022 .8340 .7811 .7647 .8160 .7924 .7298 .8131 .8063 .8840 .8443 .7630 .8491 .7147 .8745 .8054 .8538 .8820 .8779 .8409 .7749 .8111 .9089 .9295 .9218 .8113 .8388 .7130 .8516 .7941 .7630 .7679 .8133 .8258 .8366 .8259 .8202 .9041 .9238 .7206 .8196 .7949 .8276 .8176 .8825 .8580 .7925 .8113 Model Aggregate Model .8772 .8824 .7987 .8023 .8340 .7810 .7647 .8159 .7924 .7299 .8131 .8310 .9024 .8920 .7804 .8584 .7075 .8747 .8177 .8779 .8974 .8932 .8319 .8154 .8530 .9089 .9205 .9219 .8123 .8394 .7140 .8512 .7942 .7624 .7666 .8133 .8258 .8366 .8259 .8202 .9041 .9238 .7206 .8195 .7949 .8276 .8176 .8825 .8580 .7925 .8113

Role of IT

Partner Resource Endowment

Social Interaction

Trust

Shared Vision Shared Cognition Learning Intent

Knowledge Acquisition

Combinative Capability

Success in Business Operations

Success in Innovation

148

Table 23: Inter-construct Correlations for Client Sample (N=151)
Reliability(# of Indicators) .873 (2) OSEXP .897 (5) ITROLE .868 (4) RSENDOW .897 (4) RELAT .886 (4) TRUST .904 (3) VISION .851 (3) COGN .943 (3) LI .922 (7) KNOW .914 (5) COMBCAP .910 (2) BUSSUC .947 (9) INNOSUC 1 .880 .378 .303 .212 .296 .320 .195 .170 .322 .310 .225 .339 2 .796 .445 .341 .379 .334 .284 .248 .380 .475 .384 .485 3 .789 .568 .521 .579 .241 .467 .470 .403 .365 .479 4 5 6 7 8 9 10 11 12

.828 .622 .585 .247 .355 .412 .358 .439 .465

.813 .567 .252 .414 .418 .342 .278 .326

.871 .273 .370 .476 .490 .451 .445

.810 ..080 .336 .470 .396 .371

.920 .472 .328 .299 .325

.792 .426 .824 .548 .471 .914 .647 .468 .605 .815

1—OSEXP: Outsourcing Experience; 2—ITROLE: Role of IT; 3—RSENDOW: Partner Resource Endowment; 4—RELAT: Social Interaction; 5—TRUST: Trust; 6—VISION: Shared Vision; 7—COGN: Shared Cognition; 8—LI: Learning Intent; 9—COMBCAP: Combinative Capability; 10—BUSCUS: Success in Business Operations; 11—SUCINNO: Success in Innovation

149

6.3.1

Client Sample PLS results for the client sample suggest that the perceived shared vision and shared

cognition between the client firm and its vendor significantly influence knowledge acquisition in the IT outsourcing partnership. Additionally, learning intent also demonstrates significant interaction effects with social interaction and shared cognition. Knowledge acquisition is strongly related to both success in business operations and success in innovation, but combinative capabilities of the client firm do not show a strong moderating effect on these relationships. Altogether, the independent variables can explain about 49.2% of the variance in knowledge acquisition, which in turn explains 36.9% of the variance in success in business operations and 46.3% of the variance in success in innovation. Figure 16 is a path model of the client model with estimated path coefficients. 6.3.2 Paired Sample PLS results of the paired sample suggest that partner resource endowment, shared vision, and shared cognition have significant relationships with knowledge acquisition in the IT outsourcing partnership. The relationship between shared vision and knowledge acquisition is in the opposite direction as predicted. An explanation of this is that high similarity of vision between the client firm and the outsource partner confines client firm’s willingness and capability to explore opportunities that are beyond the scope of the shared vision in this relationship. Additionally, learning intent also demonstrates significant interaction effects on the relationships between shared cognition and knowledge acquisition.

150

Figure 16: PLS Path Diagram—Client Sample Structural Dimension Partner Resource Endowment Relational Dimension Social Interaction Trust
.055 -.010 .001 -.178 .492

Learning Intent
.077 -.116 .225 .315 .038 .548 .032 .647

Combinative Capabilities

.291

.369

Direct Success

Knowledge Acquisition

.235 .463

Cognitive Dimension Shared Vision Shared Cognition

.195

.206

Success in Innovations

.167

..124 .073

Role of IT IT Outsourcing Experience

151

Knowledge acquisition is strongly related to both success in innovation and success in business operations. Combinative capabilities of the client firm do not show a strong moderating effect on these relationships, but have significant direct relationships with both success in business operations and success in innovation. Altogether, the independent variables explain about 49.6% of the variance in knowledge acquisition, which in turn explains 25% of the variance in success in business operations and 47.7% of the variance in success in innovation. Figure 17 is a path model of the aggregate model with estimated path coefficients. 6.4 SUMMARY In Chapter 6, I discussed the analytical techniques that were used for hypothesis testing and the analysis results. I use Three-Stage Least Squares (3SLS) regression as the major analytical method to test the hypotheses, and use Ordinary Least Squares (OLS) regression to further examine the mediating effect of knowledge acquisition. I also ran PLS analysis to test the robustness of the regression results. The results of3SLS regression analysis and PLS are summarized in Table 24. Hypotheses about the exogenous variables partner resource endowment, shared vision, and shared cognition and the endogenous variables knowledge acquisition, success in business operations and success in innovation are fairly consistent across samples and analytical methods. The results of hypotheses about social interaction and trust are not consistent across analytical methods or sub-samples. In the chapter that follows, I further discuss the findings and their implications. I also elaborate on the limitations and contributions of the study, as well as future research directions.

152

Figure 17: PLS Path Diagram—Paired Model Structural Dimension Partner Resource Endowment Relational Dimension Social Interaction
1

Learning Intent
.322 -.037 .158 .332 .247 -.002 -.310 .068 .496 .029 .212 .045 .465 .358 .384

Combinative Capabilities

.372

.122

Direct Success

Trust

Knowledge Acquisition

Cognitive Dimension Shared Vision Shared Cognition

-.091

.345

Success in Innovations

.120

.162 -.074

Role of IT IT Outsourcing Experience

153

Table 24: Summary of Hypothesis Testing
Hypothesis 1a: Partner Resource Endowment Knowledge Acquisition (+) 1b:Partner Resource Endowment x Learning Intent Knowledge Acquisition (+) 2a: Social Interaction Knowledge Acquisition (+) 2b: Social Interaction x Learning Intent Knowledge Acquisition (+) 3a: Trust Knowledge Acquisition (+) 3b: Trust x Learning Intent Knowledge Acquisition (+) 4a: Shared Vision Knowledge Acquisition (+) 4b: Shared Vision x Learning Intent Knowledge Acquisition (+) 5a: Shared Cognition Knowledge Acquisition (non-linear) 5b: Shared Cognition x Learning Intent Knowledge Acquisition (+) 6a: Knowledge Acquisition Success in Business Operations (+) 6b: Knowledge Acquisition x Combinative Success in Business Operations Capability (+) 7a: Knowledge Acquisition Success in Innovation (+) 7b: Knowledge Acquisition x Combinative Capability Success in Innovation (+) Regression PLS Client Sample Paired Sample Client Sample Paired Sample Supported? Direction Supported? Direction Supported? Direction Supported? Direction Yes n.s Yes Yes n.s. Yes Yes n.s Yes Yes Yes n.s. Yes n.s. (-) Yes n.s. n.s. n.s. n.s. n.s. n.s. n.s. Yes Yes Yes n.s. Yes n.s. n.s. n.s. n.s. n.s. n.s. n.s. Yes n.s. Yes Yes Yes n.s. Yes n.s. Yes n.s. n.s. n.s. n.s. n.s. Yes n.s. Yes Yes Yes n.s. Yes n.s. (-)

154

CHAPTER 7: DISCUSSION In this chapter, I first discuss the implications of the research findings. Then I elaborate on the contributions and limitations of the dissertation study. The chapter concludes with a discussion of future research opportunities. 7.1 IMPLICATIONS OF RESULTS A consistent finding of this research is that knowledge acquisition is an important antecedent of successful outcomes in business operations and innovation. In addition, knowledge seems to correlate more with innovation than with business operation, which echoes the prevailing view in the literature that knowledge is the basis for both knowledge exploitation and exploration for innovation. Results show that combinative capabilities have a significant direct relationship with success, but do not moderate the effect of knowledge acquisition. A possible explanation of this finding is that combinative capabilities, by definition, may have high correlation with knowledge and reflect an interaction between knowledge and capabilities. Overall, findings of this study show strong evidence that knowledge is a critical factor for a firm to achieve successful outcomes in IT outsourcing. This study provides empirical support for a recent focus on the knowledge-related aspects of IT outsourcing (Lee 2001; Lee et al. 2002; Willcocks et al. 2004). In addition, the results differentiate between outcomes related to business operation and innovations in products and business processes, suggesting that knowledge has more explanatory power for higher-level success. The results also indicate that different dimensions of social capital may not be equally important in knowledge creation and each may play a different role in the outsourcing process. The structural dimension (partner resource endowment) and cognitive dimension of

155

social capital (shared vision and shared cognition) are highly related to both knowledge acquisition and the success of IT outsourcing. For outcomes that require intensive knowledge input, the cognitive dimension of social capital exhibits its effect via mediation by knowledge acquisition. Shared vision was found to be a critical antecedent for knowledge acquisition, although it mightresult in less learning effort on the client side due to a confined set of goals or objectives. Shared cognition does not exhibit a hypothesized curvilinear relationship with knowledge acquisition. Rather, it has a strong linear relationship with knowledge acquisition, and also interacts with learning intent. Shared cognition helps the client firm acquire knowledge from the outsourcing partner. When the employees at the client lack skills and expertise in the relevant domains, it is difficult for them to absorb knowledge from the outsourcing partners. The learning results can be achieved only when the client has adequate background knowledge and required skills to understand and assimilate what the outsourcing partner does in this partnership. The linear rather than curvilinear relationship between shared cognition and knowledge acquisition suggests that maybe the learning dynamics in an IT outsourcing partnership is different from those in a strategic alliance or technology partnership. Usually the strategic alliances or technology partnerships are characterized by pre-established goals and expectation of knowledge exchange and creation. At the same time, each partner in the alliance wants to protect itself from opportunistic behaviors of its partner, which may deter it from fully disclosing specialized knowledge and information to the partner. The similarity of the knowledge input to the alliance may yield decreasing returns, resulting in an inverted U-shape curve that represents the value of knowledge. In an IT outsourcing partnership, the IT outsourcing partner is obliged to provide information and

156

services at the client’s request. Since the IT outsourcing partner does not have interest conflict with the client, it is more willing to provide information and knowledge. When there is no boundary limit on what knowledge and information can be transferred to the client, the client can benefit from such intellectual input as long as it has the absorptive capacity to assimilate the knowledge, resulting in a linear relationship between shared cognition and knowledge acquisition. This explanation highlights the importance of the client firm to maintain an IT staff that possesses solid background knowledge in order to integrate technological service provided with the IT outsourcing partner and the internal business processes. Results reveal some interesting findings about the relational dimension of social capital. Surprisingly, the relational dimension of social capital seems to have a much stronger direct impact on success than on knowledge acquisition. The results suggest that high levels of trust may not necessarily be helpful for knowledge acquisition. Indeed, too much trust may result in too little effort on the part of the client to get involved and learn when the partner is trusted to be able to handle the work. Delegation to the outsourcing partner may lead to immediate desirableoutcomes when success does not require active involvement by the client firm. Findings about trust show no significant relationship between trust and knowledge acquisition and limited support for its interaction with learning intent. Path analysis shows that social interaction has a strong direct impact on success and very low correlation with knowledge acquisition. This result indicates that higher levels of social interaction allow effective communications between the client and the outsourcing partner, but do not necessarily ensure that the client will learn. An explanation of this result

157

is that the design of the measurement scales. The survey questions mainly focus on informal social interactions, but did not obtain any information about formal training. Without formal training and systematic learning about the information system and tasks involved, social interactions among employees may lose the foundation of a clear goal of what information is expected to be exchanged and how the information should be deployed. Therefore, informal social interactions may only result in unorganized and ineffective piecemeal acquisitions of knowledge and information that may not be very helpful. This suggests that social interactions may be complementary to formal training and may not have significant impact on knowledge acquisition by itself. In addition, the survey questions do not ask specifically whether social interactions between the client and outsourcer are work- or knowledgerelated. It is possible that employees of the client and the outsourcer develop personal friendships at work and maintain such relationships at a non-work-related level. When social interactions are not information-laden and work-related, it can breed trust among employees, but cannot facilitate knowledge transfer among them. By acknowledging the limited information captured in the survey, I interpret the results about social interactions with caution. The structural dimension of social capital, partner resource endowment, exhibits both direct impact and indirect effects (through knowledge acquisition) on success. Partner resource endowment is a significant predictor of knowledge acquisition. Path analyses suggest that changes in knowledge acquisition can be attributed to its correlation with partner resource endowment, indicatin g that an experienced outsourcer with required domain of expertise can bring rich knowledge about a specific industry or a product, which in turn can be critical to the success of the outsourcing project. Partner resource endowment also has a

158

direct relationship with success, which is particularly true in more traditional outsourcing cases where most of the work is delegated to the capable outsourcer. Learning intent exhibits both interaction effects with the exogenous variables and direct impact on knowledge acquisition. Path analyses suggest that learning intent is a critical antecedent of knowledge acquisition by the client firm, and a larger part of changes in success can be attributed to the mediating factor—knowledge. This is corroborated by evidence found in the mini case study interviews. Firms such as COSCON and Bao Sight set clear goals of learning and knowledge acquisition at the time of outsourcing, and used IT outsourcing as a vehicle to obtain experience and skills and to develop capabilities. Such learning-oriented outsourcing projects result in second-order benefits such as improved business processes and development of new business models and new products and services. Moreover, some non-IT firms start their own IT outsourcing services in conjunction with their specialized knowledge and expertise in specific domains of business. There is an emerging trend that firms spin-off the IT unit and establish a subsidiary or a separate entity (e.g. Bao Steel and Bao Sight, Lenovo and AsiaInfo), which willundertake the majority of the IT functions of the parent company and provide specialized IT outsourcing services to other firms in the same industry as well. These IT outsourcing service providers have strong competitive advantage in the niche markets of specialized industries because they have both IT skills and first-hand industry-related knowledge. In summary, the dissertation proposed a social capital perspective on IT outsourcing, and emphasized the mediating role of knowledge acquisition between social capital and success of IT outsourcing. It provided empirical evidence of how social capital facilitates knowledge acquisition, which in turn results in successful outcomes at the firm level. Results

159

of the empirical study show different levels for support to hypothesized relationships and suggest that alldimensions of social capital may not be equally important in facilitating knowledge acquisition and rendering successful outcomes. Findings imply that partner resource endowment, high levels of shared vision, shared cognition, and learning intent are critical factors that influence the level of knowledge acquired by a firm. In addition, a firm’s knowledge stock in conjunction with combinative capabilities can have high impact on the outcomes of IT outsourcing, especially IT-enabled innovation. 7.2 CONTRIBUTIONS This dissertation study proposed a relational perspective on IT outsourcing through the theoretical lens of social capital, and provided empirical evidence of the importance of knowledge in the IT outsourcing context. It contributes to the IT outsourcing literature in the following ways. First, this dissertation extends the research on social capital and IT outsourcing by applying the concept of social capital and knowledge-based theory to an IT outsourcing context. This empirical study has found evidence of the important impact of social capital on both knowledge acquisition and success, consistent with findings of prior studies (Lee 2001; Tsai 2001; Tsai et al. 1998).

160

Table 25: Summary of Recent Studies on Social Capital
Author (Oh et al. 2004) Level of Study Group Conceptualization of Social Capital Inter-group horizontal bridging conduit Inter-group vertical bridging conduit Intra-group network (closure) Number of relations Strength of relations Findings Group effectiveness is maximized via optimal configurations of different conduits. Having too much of one mode of group social capital can have negative effects on group performance. The number of exchange partners has a quadratic (inverted U-shaped) relationship with knowledge creation. The strength of relationships has a quadratic (inverted U-shared) impact on knowledge creation. Specified boundary conditions associated with each network type, with respect to inter-member knowledge transfer. Aspects of social capital may have different impact on knowledge transfer in different types of networks. Each network type has distinct social capital dimensions.

(McFadyen et al. 2004)

Individual

(Inkpen et al. 2005)

(Hoffman et al. 2005)

Intra-corporate networks, strategic alliances, industrial districts Organization

(Lang 2004)

Individual Organization

(Batjargal et al. 2004)

Venture capital decision

Structural dimension: network ties, network configuration, network stability Cognitive dimension: shared goals, shared culture Relational: trust Information channels Social norms Identity Obligations and expectations Moral Infrastructure Value introjections Reciprocity Generalized trust Bounded solidarity Prior relationship Third-party referral Strong ties

Social capital can enhance the entire knowledge management process because it makes collective action more efficient. Organizations with high levels of social capital have more knowledge management capabilities than organizations with low levels of social capital. Social contexts and social capital enable knowledge integration. Different social contexts combined with different types of social capital enable different types of knowledge integration. Entrepreneurs’ social capital has significant effects on investment selection decisions of social venture capitalists. Strong ties between entrepreneurs and venture capitalists have significant direct effects on investment process decisions.

161

An interesting finding of the present research is that different aspects of social capital play different roles in the IT outsourcing process, echoing several recent studies on social capital (Inkpen et al. 2005; Koka et al. 2002; McFadyen et al. 2004; Oh et al. 2004; Wasko et al. 2005). As summarized in Table 25, recent studies have found that social capital is not always beneficial for the social actor (McFadyen et al. 2004; Oh et al. 2004). Sometimes, too much focus on certain aspects of social capital can lead to suboptimal results. Inkpen et al (2005) posit that different aspects of social capital may have different impact on different types of networks. Wasko and Faraj (2005) found that not all aspects are equally important in facilitating knowledge exchange. This study found empirical evidence to further support findings from prior literature, questioning a universalistic view of social capital. Although social capital in general is considered to be able to create an enabling environment for knowledge transfer and creation, in the research context of this dissertation, it is the cognitive and structural dimensions of social capital that play the most important role. Although both social interaction and trust influence success, their influence on knowledge acquisition is marginal. Contrary to findings of prior studies on social capital in strategic alliances, results of the present research indicate that too much trust can cause over-dependency on the partner, complacency, and learning inertia, thereby becoming a hindrance to knowledge acquisition and learning. Results suggest that boundary conditions have to be specified when one interprets the impacts of social capital (Inkpen et al. 2005). Specifically, in an IT outsourcing arrangement, maintaining a close relationship with the outsourcer may not be the most important determinant of knowledge acquisition. Rather, the client firm needs to find outsourcers that possess required resources and skills and at the same time have adequate absorptive

162

capabilities to assimilate resources and skills obtained from outside. Findings of this study suggest that each dimension of social capital should be examined at a more granular level to achieve a more in-depth understanding of each, and calls for research that explores the reasons for this phenomenon to a greater extent. Second, this study developed measurement scales for social capital in the context of IT outsourcing partnerships. The definition and measurement of social capital seem to vary across different research contexts and levels of study (Nahapiet et al. 1998), and there has not been a consistent set of constructs or measurement scales proposed. This study has developed context-specific measures and provided empirical evidence of construct validity and reliability. Most of the measurement scales are very detailed and allow the researcher to gain deeper understanding of the phenomenon. The research findings also suggest that there might be some missing factors that are beyond the scope of the proposed research model but can be incorporated in future theorizing and research to provide a better insights for both the research community and practitioners. Additionally, this dissertation introduces learning intent as a moderator between social capital and knowledge acquisition. Results show that strong learning intent may further help enhance the facilitating role of social capital in knowledge acquisition. Third, the empirical study obtained a matched sample for the social capital constructs, and the outsourcers’ responses were used to corroborate those of the client firms. A matched sample also allows comparisons between sub-samples and enables me to examine perceptions of the relationship by the partners. The matched pair test reveals that the outsourcers tend to have more positive perceptions of relationships in IT outsourcing partnership than the client firms. The vendor firms in the sample provided systematically

163

high ratings on trust, social interaction, and shared vision than their counterparts. This finding suggests that vendor may be over-optimistic about their relationships with the clients when the clients are actually less satisfied with the relationships. On the other hand, the matched pair test also shows that the clients tend to over rate their cognitive capabilities, while the outsourcers perceive that the vendors have lower shared cognition. These findings also yield some managerial implications for both the client firms and the outsourcers. To the extent that social capital in an IT outsourcing relationship can be malleable, the client firm can intentionally develop different aspects of social capital to achieve different goals. Although the client firm may achieve desirable business outcomes via building strong relational social capital in an IT outsourcing relationship, it can be successful in capability development or innovation if it utilizes this partnership as a learning vehicle to acquire knowledge from the outsourcing partner. Successful knowledge acquisition requires the client firm to locate the source of needed knowledge and skills outside the organizational boundary and maintain an internal IT st aff with a solid knowledge background, in order to assimilate and integrate the acquired knowledge within the client firm. The outsourcer should also recognize thatit takes tremendous effort to satisfy the client firm, even if the outsourcer may not be aware that the client’s perception of the relationship is not as optimistic as that of its own. The outsourcer should proactively make efforts to build a strong and long-term oriented relationship with the client firm. 7.3 LIMITATIONS I acknowledge several limitation of this study and interpret the results with caution. First, I used a cross-sectional research design to study a phenomenon that evolves over time. The responses of the survey capture a snapshot of aspects of a firm’s social

164

capital, knowledge stock and outcomes of IT outsourcing at the time of data collection. Due to the nature of the research design, the causality among the constructs is not clear. However, I have found supporting evidence of causality from social capital to knowledge and knowledge to success in the interviews with IT executives of several organizations. Therefore, all hypothesized relationships are interpreted as correlations and associations. Longitudinal studies or detailed case studies are needed to depict the evolutionary trajectory of the IT outsourcing process in order to establish causality among constructs in the proposed research model. Second, I used a convenience sampling method to gain access to potential sample firms. All of the sample firms are large and successful business organizations located in China. Due to the specific geographical region and lack of variation in terms of firm size, the research findings have limited generalizability to firms in other countries or of different size. However, I have confidence that this sample is representative of the large Chinese firms, which are the major user of IT outsourcing services at the present. Third, survey responses are based on self-reported measures of one key informant as the single respondent of the firm. Common method bias may arise because most of respondents are IT executives or IT managers who are actively involved in the IT outsourcing projects, and their reputation and performance evaluation may depend on the outcome of the projects. Therefore, there is a possibility that respondents tend to report in favor of his/her own interests in order to make the results look better. A close examination of the data suggests that most of the respondents are reasonably truthful about their perceptions of the IT outsourcing aspects under study.

165

Finally, some of the survey items are broad and may fail to capture details of the phenomenon understudy. For example, the items that measure social interaction focus on informal social interactions only and do not extract information about the content exchanged during the social interaction, which could be critical in determining the impact of social interaction on knowledge acquisition. 7.4 FUTURE RESEARCH DIRECTIONS This empirical study allowed me to obtain a rich set of data to understand social capital in the IT outsourcing partnerships. Based on the research finding and the discussion of contributions and limitations above, there are several avenues to conduct research on IT outsourcing in the future. First, given the finding about different roles of social capital dimensions on knowledge and success, researchers can test if the findings can be replicated in a different research setting with a different sample. If similar study can be conducted on firms in countries where IT outsourcing is more mature and widely practiced, a cross-cultural comparative study with findings from different sources to isolate differences that are specific to the sample would be useful. In addition, future research can be conducted to address the above-mentioned limitations of the present study. A longitudinal study and detailed case studies will help further our understanding of the IT outsourcing process. Second, the proposed model can be applied to the IT outsourcing partner as well. To the outsourcer, providing IT outsourcing services can also be viewed as an opportunity to learn from its partner. Can social capital play a similar role in the outsourcer’s learning process and success? Will the client firm be willing to share knowledge and information? How can the partnership achieve a win-win situation in which each gets what it wants?

166

These questions address the duality of knowledge acquisition in the IT outsourcing, but remain unanswered in prior research. Research that tackles these problems will further our understanding of the relationship between partnerships and learning in IT outsourcing. Third, the present study has detected an interesting trend of the IT outsourcing business model, in which clients of IT outsourcing services learn through the IT outsourcing experience to become IT outsourcing service providers. How does a firm identify and develop IT capabilities through a learning-oriented IT outsourcing strategy, and how does such a strategy evolve over time? Longitudinal studies that track the trajectory of a learningoriented IT outsourcing strategy may provide a much richer set of information about how knowledge and learning through IT outsourcing can reshape the competitive landscape of an organization.

167

Appendix 1: Summary of IT Outsourcing Literature
Outsourcing Trends Role of Knowledge Function /Degree Deciding Factors Relationships

Motivations

Advantages

Downsides

Guidelines

Study

Major Contention

Method

Theory

Constructs

(Loh et al. 1992a)

Outsourcing is dependent on business governance, particularly financial leverage. Degree of IT outsourcing is negatively related to IT performance. Presents a framework examining the relationship between corporate restructuring and outsourcing of key value-adding activities. Continued reliance on outsourcing can lock out firms from participating in new technologies and new industries Examines relationships between sourcing typology, sourcing strategy, and procurement performance. Presents a comparison of global sourcing strategies between US and Japan. Global sourcing strategy requires close global coordination of R&D, manufacturing, and marketing. Examines factors influencing global sourcing of services by U.S. service firms and the effect of such strategy on market performance.

Secondary data Strategic alliance, organizational learning Conceptual

Business cost structure, business performance, business governance, IT competence, IT performance M&A, LBO

(Lei et al. 1995)

(Bozarth et al. 1998)

Global sourcing Survey Global sourcing Conceptual

Procurement strategy

None

(Kotabe 1998)

Global sourcing

(Kotabe et al. 1998)

Survey

Innovativeness of core/supplementary services, external availability of core/supplementary services, service quality, strategic/financial performance

168

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

Develops and tests competing hypotheses regarding boundary choice and governance performance. (Poppo et al. 1998) Survey

Transaction cost theory, knowledge-based view, agency theory, institutional theory Transaction cost economics, capabilities None

Asset specificity, measurement difficulty, technological uncertainty, economies of scale, magnitude of skill set, market/firm performance, boundary choice

(Barney 1999) (Kessler et al. 1999)

(Murray et al. 1999) (BadenFuller et al. 2000) (Insinga et al. 2000) (Logan 2000)

Describes conditions under which a firm’s boundary choice should be affected by its capabilities and capabilities of its potential partners. Examines employee responses to outsourcing and three factors that influence the response. Uses a modified transaction cost analysis to examine the location and ownership aspects of service sourcing strategy.

Conceptual

Case Survey

Existing context, new context, and experience. Asset specificity, capital intensity, inseparability, uncertainty, transaction frequency, and market performance Catch-up, changing value chains, technology shifts, emerging markets Internal capability, external competitive advantage None

Survey

Transaction cost analysis, global sourcing

Challenges the traditional view that outsourcing core activities is risky. Proposes a systematic methodology that can guide at the operational level to achieve strategically appropriate actions Addresses failed outsourcing relationships and suggested two possible solutions.

Case study

Conceptual

Strategic capability & competency Strategic capability & competency Agency Theory

Conceptual

169

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Petersen et al. 2000)

Establishes the importance of and relationships between several factors that drive the effectiveness of global sourcing strategies. Strategically outsourcing innovation can put a company in a sustainable leadership position. Outsourcing of services necessitates lateral leadership and lateral leadership capabilities required for outsourcing. The balance of power in an exchange relationship can shift over time to favor the supplier. Investigates the importance of asset specificity for buyer-supplier relationships in outsourcing decisions. Outsourcing is considered a powerful influence on the development of organizations, and the nature of best practice outsourcing is examined.

Global sourcing Survey

Innovation Conceptual Leadership capabilities

TMT commitment, structures and processes, international language skills, global sourcing capabilities None

(Quinn 2000)

(Useem et al. 2000)

Interview

(Lonsdale 2001)

Transaction cost economics Case study

Strategic thinking, deal making, partnership managing, and managing change Asset specificity, uncertainty, information asymmetry

None

(Katabadse et al. 2003)

Survey

(Linder 2004)

Proposes a typology of initiatives of transformational outsourcing

None Case study

Outsource-ready, integrative skills, managing transactional agreements, managing supplier relations, managing internal relations, performance Start-ups, pathway to growth, change catalyst, and radical renewal

170

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Clemons et al. 1993) (Ketler et al. 1993) (Lacity et al. 1993a) (Lacity et al. 1993b) (Reponen 1993) (Altinkemer et al. 1994) (Arnett et al. 1994) (Grover et al. 1994a)

IT has the ability to lower coordination cost without increasing the associated transactions risk, leading to more outsourcing and less vertically integrated firms. Examines factors that influence the outsourcing decision. Summarizes factors that influence the IS outsourcing motivation, decision and outcome. Questions the widespread endorsement of outsourcing by exposing several myths generated by press reports. Identifies a growing trend toward a mixed mode of operation, combining outsourcing and insourcing. Attempts to determine the perceived value of outsourcing based on how outsourcing information is communicated to the shareholders. Survey of CIOs reveals structural and managerial characteristics of organizations that outsource IS activities. Presents an overview of outsourcing phenomenon.

Transaction Cost Economics Conceptual

Governance structure, coordination cost, operation risk, opportunism risk None None

Case study Case study

None None

None Case study None Case study None Content analysis None Survey None Survey Resource-based view, organizational strategy

None

None

None

None

Size, industry, information intensity, and degree of outsourcing

(Grover et al. 1994b)

An early attempt to understand motivations of IT outsourcing.

Survey

171

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(McLellan et al. 1994)

(Patane et al. 1994) (Venkatrama n et al. 1994)

(Apte et al. 1995) (Behara et al. 1995) (Chaudhury et al. 1995)

(Clark et al. 1995)

Two challenges will provide future growth and rationale for IT outsourcing. For IT outsourcing to be a powerful tool in financial industry, it has to be structured, promoted, and perceived as such. The growing trend of offshore programming has raised concerns about the future of the US software industry. Breaks IT-enabled transformation into five levels, describes the characteristics of each level, and provides guidelines for maximizing benefits. Proposes taxonomy of disaggregation and develops a theoretical framework for selecting service activities, choosing location and managing culture. Reviews trends in IT outsourcing and evaluated its implications for management. Describes the process of outsourcing and identifies various stages involved. Proposes a bidding mechanism to reduce expected outsourcing costs. Reviews the structure of outsourcing decision and analyzes the driving forces.

None Conceptual

None

Survey

Global sourcing, labor market None

None

None

Conceptual Service disaggregation Information intensity, customer contact needs

Conceptual

None Conceptual None Modeling None Interview

None

None

Technology forces, technology management forces, industry forces, organizational forces

172

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Collins et al. 1995)

(Cross 1995)

(DeLoof 1995)

(Klepper 1995)

(Lacity et al. 1995b) (Lacity et al. 1995c)

Investigates the extent and effects of IS outsourcing among users of large firms in the US, as well as outsourcing plans of nonusers. Describes how British Petroleum Exploration Operation achieved seamless service from multiple suppliers. Highlights the IT outsourcing strategy with multiple suppliers acting as one. Presents a framework to describe different types of outsourcing. Derives a theoretical foundation for IS outsourcing decision from organizational theories. Partnering relationships are advantageous under some circumstances. Examines the development of partnerships from the client firm’s perspective and investigates the possibilities for managing the partnering process. Seeks to apply TCE to IT outsourcing context. Proposes a framework to replace the flawed strategic-versus-commodity approach. Suggests when to outsource and how to structure and manage the outsourcing alliances. It is most important to view outsourcing agreement as a strategic alliance and manage it as such.

None Survey None Case study

None

None

Case study

Summary of multiple theories

None

Cooperative interfirm relationship Case studies

Attraction, communication and bargaining, expectation, norm, power and justice, and commitment Asset specificity, frequency of recurrence, number of suppliers None

Case study

Transaction Cost Economics None

Case study Strategic alliance Conceptual None

(McFarlan et al. 1995)

173

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Pinnington et al. 1995)

(Willcocks et al. 1995a)

(Willcocks et al. 1995b)

(Willcocks et al. 1995c)

(Earl 1996)

(Grover et al. 1996)

(Lacity et al. 1996)

Investigates IT outsourcing by large firms. The growth of IT vendor industry is creating a new professional service firm relationship for the IS function. Focuses on total IT outsourcing to examine the structure of cooperation, the relationship formed, Proposed a revised model for strategic partnerships. Examines factors to be considered when determining how outsourcing should be used. Suggests that a strategic approach toward IT sourcing can pay long-term dividends. Focuses on the economics of outsourcing, and contracting and performance measurement issues. Rephrases the IT sourcing question to: “Why should we not insource IT services?” and presents risks of outsourcing. Examines the relationships between IT functions and outsourcing success. Both service quality and elements of partnership are important for outsourcing success. Examines sourcing decisions and develops a set of frameworks to clarify sourcing options and aid managers in deciding which IT functions to outsource.

None Case study Strategic alliance, cooperation

None

None

Case study

None Case study

None

None Case study None Conceptual Transaction Cost Economics, resource-based view, network interaction theory None

None

None

Survey

Strategic/economic/techn ological benefits, service quality, partnership, outsourcing success None

Case study

174

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Meadows 1996) (Slaughter et al. 1996)

(Ang et al. 1997)

Presents a framework for sourcing software development in emerging economies. Examines the reasons for outsourcing from a labor market economics perspective. Examines critical contingencies arising from hyper-competition that moderate institutional influences on IT outsourcing in commercial banks.

Global sourcing Conceptual Labor market, employment Institutional theory Survey

Task partitioning, task integration Environment change, technical change Perceived gain in production economies, financial capacity, specific assets, functional complexity, technological uncertainty, supplier presence None

Survey

(Apte et al. 1997)

(Hu et al. 1997) (Michell et al. 1997)

Presents results of empirical study comparing practices of domestic and global IT outsourcing in US, Japan and Finland. Explores the sources of influence in the adoption of IS outsourcing. Compares different models that describe the diffusion process of IT outsourcing. Focuses on outsourcing vendors, their characteristics, and the vendor selection process. Reports on issues involved in selective sourcing of maintenance operations.

None Survey Diffusion of innovation

Empirical, modeling

External influence, internal influence

None Conceptual None Case study

None

(Ramanujan et al. 1997)

Technical, organizational factors, quality of maintenance, user attitude, successful outsourcing implementation

175

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Saunders et al. 1997)

Organizations need to look beyond simple recipes to ensure outsourcing success. Conditioned prescriptions are needed.

None Case study

Sobol & Apte (1997) (Venkatrama n 1997)

(Ang et al. 1998) (Antonucci et al. 1998a) (Antonucci et al. 1998b) (DiRomuald o et al. 1998)

Presents results from CIOs about IT outsourcing perspectives and views of IT outsourcing. Synthesizes observation and analysis of IT organization into a framework for managing IT resources and activities as a value center. Examines economic determinants of IT outsourcing.

None Survey None Conceptual Production economies, transaction economies None None Conceptual None Case study None Conceptual

Perceptions of service provider, nature of contract, type of IT function, type of relationship None

Cost center, service center, investment center, profit center Production cost, transaction cost, financial slack, and degree of outsourcing None None

Survey

(Feeny et al. 1998)

Summarizes pros and cons of IT outsourcing. Presents results of a survey of firms about IT outsourcing, trends, reasons, benefits, and risks. Three objectives—improving IS, enhancing business performance, and generating new revenue—can help a company assess outsourcing. Instead of focusing on IS as core or noncore, the debate should center on which IS capabilities are core to the business’s future capacity to exploit IT successfully.

Conceptual

IS improvement, business impact, commercial exploitation Nine core IS capabilities

176

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Hays 1998) (Lacity et al. 1998) (Smith et al. 1998)

(Willcocks et al. 1998)

(Finlay et al. 1999)

(Lee et al. 1999)

(McCray et al. 1999)

Before making IT outsourcing decisions, firms should make effort to turn around the performance of the internal IT unit. Examines organizational factors that influence the success of IT outsourcing. Firms outsource to reduce costs and generate cash. Firms are more likely to outsource when they have lower cash reserves, higher debt, or declining growth. Organizations have begun to consider vendors as their partners. Many firms enter into more intricate deals that include both contractual and informal issues. TCE fails to take into account the special features of knowledge-intensive goods and services. Proposes a framework for IT sourcing decision making. Establishes partnership quality as a key predictor of outsourcing success. Proposes a theoretical framework for outsourcing partnership based on a social perspective. Uses system dynamics to capture the inherent complexity of the outsourcing decision and construct a computer-based model of an outsourcing decision process.

None Conceptual Case study None None Secondary data Relational perspective, interaction approach Augmented TCE

None

Expected cost saving achieved Cost effectiveness, productivity, profitability, growth, cash management, market ratio None

Case study

Conceptual Social exchange theory, power political theory

Survey

Economic, market, knowledge, organizational, and environmental factors Partnership quality, determinants of partnership quality, outsourcing success None

System dynamics model experiment

None

177

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Ngwenyama et al. 1999)

(Shepherd 1999)

(King et al. 2000)

Compares single vendor vs. multiple vendor strategies in IT outsourcing decision making. Develops a framework for managers to model outsourcing decisions to maximize profit and minimize risk. Examines various IT outsourcing approaches and their respective effectiveness in facilitating change. Develops a framework for the consideration of internal market as an alternative to IT outsourcing. Compares alternatives in terms of operational, tactical, and strategic impacts. Studies current market practices and experience by surveying CIOs. Investigates underlying motives and decision-making process that influenced a bank to outsource its IS. Unforeseen costs can undercut anticipated benefit from outsourcing. Conducts a cross-national study of IT outsourcing and highlights major differences between French and German IT outsourcing practices. Explores the supply side of IT in application outsourcing and how application outsourcing changes the nature of contract and relationship.

Transaction Cost Economics Modeling

Outsourcer’s value function, outsourcing strategy, outsourcer’s profit

None Case study Internal market approach Conceptual

None

(Lacity et al. 2000) (Baldwin et al. 2001) (Barthelemy 2001) (Barthelemy et al. 2001)

Survey Case study Conceptual

None Call for theory beyond TCE None None

IS outsourcing, internal market, short-term operational impact, midterm tactical impact, long-term strategic impact None Economic, political, and organizational issues None Attitude towards outsourcing, type of activities, motivation, decision-making Waves of IT outsourcing, taxonomy of ASPs, performance criteria for ASPs

Survey None Survey, case study

(Currie et al. 2001)

178

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Lee 2001)

Examines the relationship between knowledge sharing and outsourcing success. Develops a typology of IS employment strategies. Specific dimensions that differentiate among the various forms of employment strategies are discussed and elaborated. Defines the concepts of risk and of risk exposure and applies them to the context of IT outsourcing. Presents a framework of IT outsourcing risk exposure. Identifies four stages of offshore outsourcing maturation and describes managerial tactics associated with each stage. Deduces critical determinants of IS outsourcing based on multiple theories, and presents a multi-theoretical framework. Examines different types of interactions in various outsourcing arrangements. Focuses on the knowledge flow from the outsourcing company to the vendor.

Survey

Knowledge sharing, strategic alliance Employment & labor market

(Ang et al. 2002)

Conceptual

Knowledge sharing, organizational capability, partnerships quality, outsourcing success Locational detachment, temporal detachment, and administrative detachment Risk factors

Risk management Case study None Interviews Transaction cost economics, resource-based view, power Game theory

(Aubert et al. 2002)

(Carmel et al. 2002)

(Dibbeern et al. 2002)

Survey

Offshore bystander, offshore experimenter, proactive cost focus, and proactive strategic focus Outsourcing behavior, human asset specificity, strategic significance, resource deficits, power None

(Elitzur et al. 2002)

Conceptual

179

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Goles et al. 2002)

Uses relational view to lay a conceptual basis for identifying individual constructs that comprises a relationship. Develops a set of items to measure constructs. Survey

Relational exchange theory

(Jayatilaka 2002)

(Jurison 2002)

(Kern et al. 2002b) (Kern et al. 2002c)

Analyzes the change paths that firms have taken to look at the dynamic nature of the sourcing arrangements. Majority of the firms had considered cost as an initial criteria and later had shifted their perspective on outsourcing.. Describes a conceptual framework for IT outsourcing decisions and show how it can be extended from a cost oriented type of outsourcing to strategic outsourcing. Offers a framework for considering outsourcing risk in a systematic way. Seeks to understand the operational characteristics of IT outsourcing relationships. Presents an example of a winner’s curse scenario, in which both supplier and client converted the relationship into a “no curse” arrangement.

Institutional theory Case study

Relationship attributes (commitment, consensus, cultural compatibility, flexibility, interdependence, trust), relationship processes (communication, conflict resolution, coordination, cooperation, integration) Vendor, mode of outsourcing, degree of outsourcing, contract

Conceptual

Financial theory, transaction cost economics

Risk, return, cost

Case study

Interaction approach Auction theory

Case study

Interaction process, parties involved, environment, atmosphere Strategic intent, technical capability

180

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Klein 2002)

(Lee et al. 2002)

(Marcolin 2002)

(Poppo et al. 2002a)

Summarizes theoretical perspectives and research methods used in IT outsourcing research. Identifies strengths and weaknesses of current outsourcing research and points out future research directions. Lays an integrative groundwork for the understanding of outsourcing based on an extensive review of past and current outsourcing research. Illustrates different behaviors and business objectives with two extreme cases. Relationship management is shown to benefit all and gains control of the spiraling effects. Shows how mangers have learned to mediate hazards by better choices, better contracts, and better relationship management.

Summary of multiple theories Conceptual

None

Partnership Conceptual Joint venture and relationships Case study

None

None

Transaction cost economics Survey, case study

(Saaksjarvi 2002)

Proposes and applies the strategic alignment model and presents an integrative view of the interplay between business and IT in organizations. Focuses at the organizational level on the outsourcing provider and at the individual level at the workers who are subcontracted to do the outsourcing work.

Strategic alignment Survey

(Saunders 2002)

Case study

Employment & labor market

Performance, negotiation costs, relational norms, contractual complexity, asset specificity, measurement difficulty, technological change Success of IS outsourcing, IS effectiveness, internal alignment mode, integration mode Contractual and normative activities of providers and IT workers

181

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Choudhury et al. 2003)

Examines the evolution of portfolio of controls over the duration of outsourced IS systems development projects. Studies the determinants of contract choice in offshore software development projects and examines how the choice of contract and other factors in the project affect project profits accruing to the vendor. Examines the response to institutional influences on IS outsourcing in light of hypercompetition.

Control Case study Incomplete contract Survey

(Gopal et al. 2003)

Control modes, task characteristics, participant knowledge, role expectation Task uncertainty, incomplete contracts, bargaining power, contract type, actual performance Perceived gain, financial capacity, asset specificity, functional complexity, technical uncertainty, supplier presence None

Institutional theory Survey

(Ho et al. 2003)

(Lacity et al. 2003)

(Lee et al. 2003) (Levina et al. 2003)

Discusses pros and cons of approaches to transformation: DIY, management consultants, fee-for-service outsourcing, joint venture, and enterprise partnership. Reviews the history of IT outsourcing practices and summarizes the driving theories behind various stages of the history. Examines value propositions of the vendor in its strategy and practices in a long-term outsourcing engagement.

None Case study Strategic, economic, social perspectives Organizational design

None

Conceptual

Case study

Complementarity, clientvendor relationship

182

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Outsourcing Trends

Study

Major Contention

Method

Theory

Constructs

(Lacity et al. 1995a)

(Lacity et al. 2001) (Kern et al. 2002a)

Vendors submit bids based on efficient managerial tactics, which internal IS department should be able to implement without outsourcing to a third party vendor. Summarizes trends, presents models of outsourcing decision and relationship management, and identifies best practices in IT outsourcing. Provides an overview and guidelines of the third wave of netsourcing practices.

None Case study

None

None Case study None

None

NA

None

183

Role of Knowledge

Function /Degree

Deciding Factors

Relationships

Motivations

Advantages

Downsides

Guidelines

Contract

Appendix 2: IT Outsourcing Practices Survey (Client)
Thank you for your participation in this study. Please note that all data are completely confidential and will be reported only in aggregate form. We will be glad to share a report of findings upon completion.

1.

Please specify your business affiliation: ____________________________________________________________ and job title: _______________________________.

The following questions focus on general information about your firm. If your parent company is a multi-divisional organization, please answer the following questions at the level of strategic unit where the IT outsourcing practices were actually conducted. 2. Please specify the industry sector that your firm belongs to:

Financial services Manufacturing and distribution Consumer services and retail Information & communications technology Healthcare Public utility Media industries Education Transportation & logistics Other. Please specify:______________________________ 3. 4. Please specify the number of employees in your firm: _______________ What was the annual sales revenue of your firm in each of the past three fiscal years? 2001: $________; 2002: $________; 2003: $________ Please specify the annual IT budget of your firm in each of the past three fiscal years: 2001: $________; 2002: $________; 2003: $________ Approximately, how many internal IT employees does your firm have? ________ Approximately, ___% of IT functions in our firm is outsourced. The following statements are about your firm’s outsourcing experience. Please indicate your level of agreement with each of the following. Statements Our firm has had extensive experience in IT outsourcing in the past 10 years. Our firm has had interactions with various IT outsourcers in the past 10 years. Senior management is always open to the option of outsourcing whenever it is needed. Strongly Disagree Neutral Strongly Agree

5.

6. 7. 8.

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

184

The following statements are about the role of IT in your firm. Please indicate your level of agreement with each of the following. Statements IT supports operations and helps decision support and administrative functions. The IS group actively supports organizational strategies. The IS group and corporate management work together on applications that create competitive advantage. The role of IT is to replace human labor and enhance human productivity through automation. The role of IT is to provide information that helps employees gain better insights into their own activities. The role of IT is to provide information that allows a clear and organized management view of the state of the business. The role of IT is to fundamentally alter the industry or organization through new products or business strategies. Strongly Disagree Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

Please answer the following questions with regard to outsourcer ABC. In the following questions, “the outsourcer” refers to ABC. 9. Please specify one IT outsourcing project in which ABC is involved: ___________________

10. Has your firm previously been engaged with ABC in any other interorganizational relationship? ___ No ___ Yes If yes, how long did the previous relationship with ABC last? ___ Years If this interorganizational relationship is ongoing, how long is it supposed to last? ___ Years The following questions focus on the outsourcing project XYZ that your firm and outsourcer ABC are involved in. 11. The major impetus for the outsourcing decision of this project came from (Please check all that apply): ___ Top Management (senior business executives) ___ Functional Area Managers (VP of Finance, Marketing, etc.) ___ IT Management 12. The champion for this outsourcing project is (are) (Please check all that apply): ___ Top Management (senior business executives) ___ Functional Area Managers (VP of Finance, Marketing, etc.) ___ IT Management 13. Please choose one from the following contract types that best describes the contract for this outsourcing project. The outsourcer’s off-the-shelf contract A contract that contains special contractual clauses for service scope, service levels, measures of performance, and penalties for non-performance A contract that contains specified requirements for only the first few years and unspecified requirements afterwards Strategic alliance/partnership, a collaborative interorganizational relationship involving resource investment and risk sharing

185

None of the above. Please specify:____________________________________________ 14. Please choose from the following according to the expected duration of the contract for this outsourcing project. ____< 4 years ____4-7 years ____ > 7 years; 15. How long has your firm been involved in this outsourcing relationship: __ Year(s) __ Month(s) 16. What percentage of your IT spending did this outsourcing project account for? ____% 17. What percentage of your IT functions is outsourced to the outsourcer? ____% 18. How many employees have been involved in the outsourcing relationship? _____ 19. Please choose from the list below that the IT functions outsourced fall into. Please check all that apply. Systems operations/data center Telecommunication/networks Applications development, implementation and maintenance Help desk/user support/information center IS planning and IS management 20. The following statements are about characteristics of the outsourcer. Please indicate your level of agreement with each of the following statements. Strongly Disagree The outsourcer has strong technical skills. The outsourcer provides outstanding services in a timely manner. We value the outsourcer’s specialization in the specific domain. The outsourcer has extensive experience in our industry. The outsourcer has a central and prominent status in the IT vendor community. The outsourcer has broad associations with other firms that our firm can be referred to in time of need. We and the outsourcer encourage each other to solve business problems. We and the outsourcer solve most problems through mutual discussion. We discuss our long-range planning with the outsourcer. We reflect on the outsourcer’s opinions about unexpected problems. Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

21. Based on your opinion, please indicate the level of importance of the following motives for IT outsourcing. Motives for IT Outsourcing A B C D E F Reduce IT cost Focus on core competence Gain knowledge from outsiders Gain a technology edge over competitors Improve technology or technical service Gain access to special expertise Not Very Neutral Important Important 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

186

G H I J K L M N

Reduce risk of unscheduled downtime Speed up delivery Relieve resource constraints Provide access to new technologies Eliminate a problem area/function Reduction in IT staff More profitable use of in-house IT talent Other: Please specify: ___________________

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

Among the above motives, please use the assigned alphabetical letters to indicate the top two (2) most important motives for this outsourcing project: ____ and ____. 22. The following statements are about the interactions between your firm and the outsourcer. Please indicate your level of agreement with each of the following statements. Statements We maintain close relationships There is close, personal interaction between our firm and the outsourcer at multiple levels. The relationship between our firm and the outsourcer is characterized by mutual respect at multiple levels. The relationship between our firm and the outsourcer is characterized by personal friendship at multiple levels. Strongly Disagree Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

23. The following statements are about the relationship between your firm and the outsourcer. “We” or “us” refer to “your firm and the outsourcer”. Please indicate your level of agreement with each of the following statements. Statements We hold mutual expectations about the outsourcer’s responsibilities that go beyond what was specified in our formal agreements. We expect that conflicts would be resolved fairly, even if no guidelines are given by our formal agreements. We understand and accept that there are performance goals for the outsourcer’s work even though not specified in our formal agreements. When an unexpected situation arises, we have a mutual understanding that a win-win situation will be found, even if it contradicts our formal agreements. We expect to share useful information to an extent beyond what is required by our formal agreements. We hold mutual expectations that each would be flexible and responsive to requests by the other, even if not obliged by our formal agreements. We understand that problems arising during the relationship will be solved jointly through communication and cooperation rather than reference to our formal agreements. We understand that each will adjust to changing circumstances, even if not bound to change by formal agreements. Strongly Disagree Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

187

24. The following statements are about your firm’s vision and domain of expertise. “Both parties” refer to “your firm and the outsourcer”. Please indicate your level of agreement with each of the following. Statements The outsourcer shares the same ambition and vision as us. Our people are enthusiastic about pursuing the collective goals and missions of our relationship with the outsourcer. Our goals and objectives for this outsourcing relationship are shared by the outsourcer. The outsourcer understands our firm’s strategy and needs. Employees of both parties have positive attitudes toward a cooperative relationship. Our firm and the outsourcer tend to agree on how to make the relationship work. Most employees of our firm have prior personal experience with the type of work the outsourcer performed for us. The outsourcer’s work is very similar to work regularly done throughout our firm. Employees of our firm could have easily learned the skills needed to perform the outsourcer’s job. Our employees need the same background as the outsourcer’s people to communicate effectively with them Strongly Disagree Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

25. Please indicate the level of your agreement with each of the following statements. As a result of our relationship with the outsourcer, … Statements We have learned or acquired some new or important information from the partner. We have learned or acquired some critical capability or skill from the partner. This alliance has helped us enhance our existing capabilities/skills. We have obtained knowledge about various types of technologies available in the market. We have obtained knowledge about various types of IT application. We have learned about how a specific type of information technology works. We have learned about how to apply a specific type of information technology to the business processes. We have learned about business practices in the industry. We have learned about why a change in our business operations/processes can help us compete with our rivals. We have learned about factors to be considered when choosing the outsourcer. We have learned knowledge about how to manage interorganizational relationships with an outsourcer. We have learned about why interorganizational relationships can be valuable to our firm. Strongly Disagree Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

188

26. The following statements are about your firm’s goals for outsourcing. Please indicate your level of agreement with each of the following statements. Statements Knowledge transfer is one of the benefits that we expected to gain through the outsourcing relationship. Aside from our goals and objectives, learning from the outsourcer is a potential outcome that we expect. We consider the relationship with the outsourcer as an opportunity to learn. Strongly Disagree Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

27. The following statements are about general capabilities within your organization. Please indicate your level of agreement with each of the following statements. Statements Employees of our firm are proficient at combining and exchanging ideas to solve problems or create opportunities. Employees of our firm have learned to effectively pool their ideas and knowledge. Our firm has the ability to lay down rules, procedures, and instructions in formal documents to integrate knowledge. Our firm has the ability to use lateral ways of coordination to integrate knowledge. In general, our firm has the capability of knowledge assimilation. In general, our firm has the capability of knowledge application to various business areas. Strongly Disagree Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

189

28. Please circle one number in each row according to your agreement with each of the following statements. As a result of participating in this outsourcing relationship, our firm has achieved (or expects to achieve): Statements We have been able to refocus on core business. We have increased access to skilled personnel. We have enhanced economies of scale in human resources. We have enhanced economies of scale in technological resources. We have increased control of IS expenses. We have reduced risks of technological obsolescence. We are satisfied with our overall benefits from outsourcing. We have improved production or service volumes. We have enhanced operating flexibility. We have improved production of labor. We have reduced cost of tailoring products or services. We have enhanced product/service value through increased IT embeddedness. We have decreased cost of designing products/services. We have reduced time to market for new/products/services. We have enhanced product/service quality. We have achieved support for product/service innovation. We have achieved the ability to identify new market trends. We have achieved increased ability to anticipate customer needs. Strongly Disagree Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

THANK YOU FOR YOUR PARTICIPATION!

190

Appendix 3: IT Outsourcing Practices Survey (Vendor)
Thank you for your participation in this study. Please note that all data are completely confidential and will be reported only in aggregate form. We will be glad to share a report of findings upon completion.

1.

Please specify your business affiliation: ____________________________________________________________ and job title: _________________________________.

Please indicate one IT outsourcing project that you have been working on: _________________, and the client firm in this project: ________________________. Please answer the following questions based on the relationship between your firm and your client firm in the above mentioned IT outsourcing project. 2. The following statements are about the characteristics of the relationship between your firm and the client firm. Please indicate your level of agreement with each of the following statements. Statements We and the client firm encourage each other to solve business problems. We and the client firm solve most exceptional problems through mutual discussion. The client firm discusses their long-range planning with us. The client firm reflects on our opinions about unexpected problems. We maintain close relationships with the client firm There is close, personal interaction between our firm and the client firm at multiple levels. The relationship between our firm and the client firm is characterized by mutual respect at multiple levels. The relationship between our firm and the client firm is characterized by personal friendship at multiple levels. Strongly Disagree Neutral Strongly Agree

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

191

3.

The following statements are about the relationship between your firm and the client firm. “We” or “us” refer to “your firm and the client firm”. Please indicate your level of agreement with each of the following statements. Statements Strongly Disagree Neutral Strongly Agree

We hold mutual expectations about our firm’s responsibilities that go beyond what was specified in our formal agreements. We expect that conflicts would be resolved fairly, even if no guidelines are given by our formal agreements. We understand and accept that there are performance goals for our firm’s work even though not specified in our formal agreements. When an unexpected situation arises, we have a mutual understanding that a win-win situation will be found, even if it contradicts our formal agreements. We expect to share useful information to an extent beyond what is required by our formal agreements. We hold mutual expectations that each would be flexible and responsive to requests by the other, even if not obliged by our formal agreements. We understand that problems arising during the relationship will be solved jointly through communication and cooperation rather than reference to our formal agreements. We understand that each will adjust to changing circumstances, even if not bound to change by formal agreements. 4.

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

The following statements are about your firm’s vision and domain of expertise. “Both parties” refer to “your firm and the client firm”. Please indicate your level of agreement with each of the following. Statements Strongly Disagree Neutral Strongly Agree

We share the same ambition and vision as the client firm. Our people are enthusiastic about pursuing the collective goals and missions of our relationship with the client firm. We share our goals and objectives for this outsourcing relationship with the client. We understand the client firm’s strategy and needs. Employees of both parties have positive attitudes toward a cooperative relationship. Our firm and the client firm tend to agree on how to make the relationship work. Most employees of client firm have prior personal experience with the type of work we performed for them. The service we provide is very similar to the work regularly done throughout the client firm. Employees of the client firm could have easily learned the skills needed to perform the service that we provide. The employees of the client firm need the same background as our employees to communicate effectively.

1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7 1-----2-----3-----4-----5-----6-----7

THANK YOU FOR YOUR PARTICIPATION!

192

Appendix 4: Application for Initial Review of Research Using Human Subjects 1. Abstract The study attempts to examine the strategic partnerships in transformational IT outsourcing projects. Notwithstanding the ubiquity of IT outsourcing in today’s organizations, theoretical understanding of this phenomenon has been limited mainly to the economic or strategicaspects of it. This study adopts a social perspective to examine the IT outsourcing phenomenon and focuses on outsourcing projects that are relationship-oriented rather than transaction-oriented. By incorporating the knowledge based view (KBV) of the firm and the concept of social capital, I attempt to explain how IT outsourcing relationships generate value for organizations. I argue that IT outsourcing partnerships constitute a form of social capital for the firm that chooses to outsource, which facilitates knowledge exchange and transfer. The increased knowledge stock as a result of knowledge exchange and transfer, in turn, forms the foundation for IT value, which is manifested as IT capabilities and ITenabled innovation. This study seeks to find evidence that helps further our understanding of the IT outsourcing phenomenon through an alternative theoretical lens, and emphasizes the non-economic value that organizations may garner through IT outsourcing partnerships. Participation of human subjects in this study is based solely on their own willingness to do so. 2. Subject Selection The level of analysis of this study is at the firm level. Each pair of firms (the focal firm and its partner) constitutes a data point. Several key informants from each dyadic relationship will be the potential respondents of the study. The subjects of this study include the IT executive, the project manager, and the business executive of the focal firm, and the project manager of the partner firm. We will enlist the subjects through the contact with firms that provide IT outsourcing services (IT service providers). If an IT service provider is willing to participate in the study by providing a list of its client firms, we will further contact the potential respondents of each client firm. Their participation in the study depends solely on their willingness to provide relevant information to the researchers. We do not plan to advertise for subjects. The subject selection will be only based on their job responsibilities and involvement in the IT outsourcing projects. We will send a letter to the potential subjects to solicit participation, which is presented at the end of this document. We believe that each potential respondents of the study can provide information pertinent to the research questions. For example, project managers of the focal firm and the partner firm should have detailed information about the IT outsourcing project, such as how the relationship between the focal firm and the partner firm works and what kind of knowledge has been transferred. The IT executive of the focal firm oversees the IT functions at the organizational level, therefore can provide information such as the general role of IT within the firm and the vision of IT. The business executive of the focal firm can provide information about how IT is applied to business functions. Subjects will not be selected based on any other characteristics, such as age, gender, race, ethnic origin, religion, or any other social or economic qualifications.

193

3. Procedures This study is to perform an empirical test of the proposed research model with a larger sample using statistical methods. We will use both previously tested and new operational measures of the research constructs in the research model. We will conduct a survey study with a larger sample of firms that are involved in IT outsourcing projects. The level of data collection is at the level of the focal firm-IT partner dyad. A sample questionnaire is attached as Appendix 2. As mentioned above, the ideal respondents to the questionnaire are: the IT executive, the project manager, and the business executive of the focal firm, and the project manager of the partner. A copy of the questionnaire along with a cover letter will be sent to the potential respondents by mail. A second copy of the questionnaire and a reminder will be mailed out to the potential respondents about 4 weeks after the first questionnaire is sent out. After getting the questionnaires back, I will pool responses to thequestionnaire from various data sources within a particular firm to form a single data point for the focal firm. Responses to the questionnaire from data sources in the partner firm will be used as a cross-reference to its counterpart at the local firm. Because responses from multiple data sources will be pooled and aggregated to form a single data point, a modest sample size, 50 to 70 dyadic relationships, is expected. We will use structural equation modeling and regression-based techniques to analyze the data set. 4. Risks and Benefits Although it is expected to take about 30-45 minutes for a respondent to fill out the questionnaire, the study will not cause any risk to the respondents. The respondents will need to retrieve some information that they are familiar with from their memories, and they always have the freedom of not answering a particular question. This study is not designed to benefit the individual respondents. However, results of the study, at an aggregated level, will provide a detailed overview of the relationship between each partnering dyad and how each participating IT service provider has helped its clients in value generation. Additionally, results of the study will help further our understanding of the phenomenon through an alternative theoretical lens. 5. Confidentiality We will keep any information about the participating firms collected from the questionnaire confidential. The data collected will be stored in a secured place where only the principal investigator and the student investigator have access. Data handling and analysis will be performed only by the principal investigator and the student investigator. We will not release any specific information about the participating firms to a third party. Results of the study will only be reported in an aggregated and anonymous fashion. By the end of the data analysis, the data will be destroyed without any further revelation to a third party. 6. Information and Consent Forms We will provide the following information to the subjects about this study. (1) the purpose of the study, (2) procedures of the study, (3) confidentiality of information, (4) benefits, risks, freedom to withdraw, and ability to ask questions, and (5) contact information of investigators and contact information of Institutional Review Board. The consent form that we propose to utilize is attached in this document.

194

7. Conflict of Interest This investigation does not involve potential conflict of interest. There is no significant financial interest that would constitute a potential conflict of interest in the conduct or reporting of the proposed research. 8. HIPAA Compliance We do not plan to use any protected health information for this study. 9. Solicitation for Participation May 10, 2004 Dear Sir/Madam,

We would like to invite you to participate in a research project that focuses on strategic IT partnerships in transformational outsourcing projects. The IT outsourcing service provider of your firm, XYZ, is very supportive in helping us conduct this study. Attached is a questionnaire with questions regarding your own perspectives about the particular IT outsourcing project in which both your firm and XYZ are involved Your responses to the questionnaire will help the investigators better understand the IT outsourcing phenomenon and help XYZ provide improved services. It will take 30-45 minutes to complete the questionnaire. You may fill it out at your convenience and then send it back to the investigators in the pre-stamped envelope. Your participation and cooperation will be highly appreciated.

Sincerely Yours,

Ritu Agarwal

Fei Ye

195

Appendix 5: Measurement Scales
Construct Partner Resource Endowment Items RSENDOW1: The outsourcer has strong technical skills. RESNDOW2: The outsourcer provides outstanding services in a timely manner. RSENDOW3*: We value the outsourcer’s specialization in the specific domain. RSENDOW4: The outsourcer has extensive experience in our industry. RSENDOW5: The outsourcer has a central and prominent status in the IT vendor community. RSENDOW6*: The outsourcer has broad associations with other firms that our firm can be referred to in time of need. RECIP1*: We and the outsourcer encourage each other to solve business problems. RECIP2*: We and the outsourcer solve most problems through mutual discussion. RECIP3*: We discuss our long-range planning with the outsourcer. RECIP4*: We reflect on the outsourcer’s opinions about unexpected problems. VRECIP1*: We and the client firm encourage each other to solve business problems. VRECIP2*: We and the client firm solve most exceptional problems through mutual discussion. VRECIP3*: The client firm discusses their long-range planning with us. VRECIP4*: The client firm reflects on our opinions about unexpected problems. RELAT1*: We maintain close relationships. RELAT2: There is close, personal interaction between our firm and the outsourcer at multiple levels. RELAT3: The relationship between our firm and the outsourcer is characterized by mutual respect at multiple levels RELAT4: The relationship between our firm and the outsourcer is characterized by trust at multiple levels. RELAT5: The relationship between our firm and the outsourcer is characterized by personal friendship at multiple levels. VRELAT1*: We maintain close relationships with the client firm. VRELAT2: There is close, personal interaction between our firm and the client firm at multiple levels. VRELAT3: The relationship between our firm and the client firm is characterized by mutual respect at multiple levels. VRELAT4: The relationship between our firm and the client firm is characterized by trust at multiple levels. VRELAT5: The relationship between our firm and the client firm is characterized by personal friendship at multiple levels.

Information Reciprocity (Client) Information Reciprocity (Vendor) Social Interaction (Client)

Social Interaction (Vendor)

196

Construct

Trust (Client)

Items TRUST1*: We hold mutual expectations about the outsourcer’s responsibilities that go beyond what was specified in our formal agreements. TRUST2*: We expect that conflicts would be resolved fairly, even if no guidelines are given by our formal agreements. TRUST3*: We understand and accept that there are performance goals for the outsourcer’s work even though not specified in our formal agreements. TRUST4*: When an unexpected situation arises, we have a mutual understanding that a win-win situation will be found, even if it contradicts our formal agreements. TRUST5: We hold mutual expectations that each would be flexible and responsive to requests by the other, even if not obliged by our formal agreements. TRUST6: We understand that problems arising during the relationship will be solved jointly through communication and cooperation rather than reference to our formal agreements. TRUST7: We understand that each will adjust to changing circumstances, even if not bound to change by formal agreements. TRUST8: We expect to share useful information to an extent beyond what is required by our formal agreements. VTRUST1*: We hold mutual expectations about our firm’s responsibilities that go beyond what was specified in our formal agreements. VTRUST2*: We expect that conflicts would be resolved fairly, even if no guidelines are given by our formal agreements. VTRUST3*: We understand and accept that there are performance goals for our firm’s work even though not specified in our formal
agreements.

Trust (Vendor)

VTRUST4*: When an unexpected situation arises, we have a mutual understanding that a win-win situation will be found, even if it
contradicts our formal agreements.

VTRUST5: We hold mutual expectations that each would be flexible and responsive to requests by the other, even if not obliged by our
formal agreements. VTRUST6: We understand that problems arising during the relationship will be solved jointly through communication and cooperation rather than reference to our formal agreements. VTRUST7: We understand that each will adjust to changing circumstances, even if not bound to change by formal agreements. VTRUST8: We expect to share useful information to an extent beyond what is required by our formal agreements.

Shared Vision (Client)

VISION1: The outsourcer shares the same ambition and vision as us. VISION2: Our people are enthusiastic about pursuing the collective goals and missions of our relationship with the outsourcer. VISION3: Our goals and objectives for this outsourcing relationship are shared by the outsourcer. VISION4*: The outsourcer understands our firm’s strategy and needs. VISION5*: Employees of both parties have positive attitudes toward a cooperative relationship. VISION6*: Our firm and the outsourcer tend to agree on how to make the relationship work.

197

Construct Shared Vision (Vendor)

Shared Cognition (Client) Shared Cognition (Vendor) Learning Intent

Knowledge Acquisition

Items VVISION1: We share the same ambition and vision as the client firm. VVISION2: Our people are enthusiastic about pursuing the collective goals and missions of our relationship with the client firm. VVISION3: We share our goals and objectives for this outsourcing relationship with the client. VVISION4*: We understand the client firm’s strategy and needs. VVISION5*: Employees of both parties have positive attitudes toward a cooperative relationship. VVISION6*: Our firm and the client firm tend to agree on how to make the relationship work. COGN1: Most employees of our firm have prior personal experience with the type of work the outsourcer performed for us. COGN2: The outsourcer’s work is very similar to work regularly done throughout our firm. COGN3: Employees of our firm could have easily learned the skills needed to perform the outsourcer’s job. COGN4*: Our employees need the same background as the outsourcer’s people to communicate effectively with them. VCOGN1: Most employees of client firm have prior personal experience with the type of work we performed for them. VCOGN2: The service we provide is very similar to the work regularly done throughout the client firm. VCOGN3: Employees of the client firm could have easily learned the skills needed to perform the service that we provide. VCOGN4*: The employees of the client firm need the same background as our employees to communicate effectively. LI1: Knowledge transfer is one of the benefits that we expected to gain through the outsourcing relationship. LI2: Aside from our goals and objectives, learning from the outsourcer is a potential outcome that we expect. LI3: We consider the relationship with the outsourcer as an opportunity to learn. TKNOW1*: We have learned or acquired some new or important information from the partner. TKNOW2*: We have learned or acquired some critical capability or skill from the partner. TKNOW3*: This alliance has helped us enhance our existing capabilities/skills. TKNOW4: We have obtained knowledge about various types of technologies available in the market. TKNOW5: We have obtained knowledge about various types of IT application. TKNOW6: We have learned about how a specific type of information technology works. BKNOW1: We have learned about how to apply a specific type of information technology to the business processes BKNOW2: We have learned about business practices in the industry. BKNOW3: We have learned about why a change in our business operations/processes can help us compete with our rivals. NKNOW1*: We have learned about factors to be considered when choosing the outsourcer. NKNOW2*: We have learned knowledge about how to manage interorganizational relationships with an outsourcer. NKNOW3: We have learned about why interorganizational relationships can be valuable to our firm.

198

Construct

Combinative Capability

Outsourcing Success

IT Outsourcing Experience

Items COMBCAP1: Employees of our firm are proficient at combining and exchanging ideas to solve problems or create opportunities. COMBCAP2: Employees of our firm have learned to effectively pool their ideas and knowledge. COMBCAP3: Our firm has the ability to lay down rules, procedures, and instructions in formal documents to integrate knowledge. COMBCAP4: Our firm has the ability to use lateral ways of coordination to integrate knowledge. COMBCAP5*: In general, our firm has the capability of knowledge assimilation. COMBCAP6: In general, our firm has the capability of knowledge application to various business areas. SUC1*: We have been able to refocus on core business. SUC2*: We have increased access to skilled personnel. SUC3: We have enhanced economies of scale in human resources. SUC4: We have enhanced economies of scale in technological resources. SUC5*: We have increased control of IS expenses. SUC6*: We have reduced risks of technological obsolescence. SUC7*: We are satisfied with our overall benefits from outsourcing. SUC8: We have improved production or service volumes. SUC9*: We have enhanced operating flexibility. SUC10*: We have improved production of labor. SUC11: We have reduced cost of tailoring products or services. SUC12: We have enhanced product/service value through increased IT embeddedness. SUC13: We have decreased cost of designing products/services. SUC14: We have reduced time to market for new/products/services. SUC15: We have enhanced product/service quality. SUC16: We have achieved support for product/service innovation. SUC17: We have achieved the ability to identify new market trends. SUC18: We have achieved increased ability to anticipate customer needs. OSEXP1: Our firm has had extensive experience in IT outsourcing in the past 10 years. OSEXP2: Our firm has had interactions with various IT outsourcers in the past 10 years. OSEXP3*: Senior management is always open to the option of outsourcing whenever it is needed.

199

Construct

Role of IT

Items ITROLE1: IT supports operations and helps decision support and administrative functions. ITROLE2: The IS group actively supports organizational strategies. ITROLE3: The IS group and corporate management work together on applications that create competitive advantage. ITROLE4*: The role of IT is to replace human labor and enhance human productivity through automation. ITROLE5*: The role of IT is to provide information that helps employees gain better insights into their own activities. ITROLE6: The role of IT is to provide information that allows a clear and organized management view of the state of the business. ITROLE7: The role of IT is to fundamentally alter the industry or organization through new products or business strategies.

200

Appendix 6: Path Analyses Path analysis is an extension of the regression model, which examines the causal relationships using regression. I use path analysis to decompose the effect of each independent variable on the dependent variable. Specifically, effect decomposition can help compare the proposed research model and the alternative model, testing the significance of the effect of the mediating variable: knowledge acquisition. Path analysis incorporates several assumptions (Loehlin 1998). First, relationships in the model are linear, additive, and causal. Curvilinear, multiplicative, and interaction relationships should be excluded. Therefore, the models I use to perform path analyses contain main effects only, and the interaction effects of learning intent and combinative capabilities are excluded. Second, the path model is recursive and contains only one-way causal flow. Third, the residuals are uncorrelated with all other variables or residuals. Fourth, the variables used as predictors are measured without error. Based on these assumptions, I constructed the proposed research model with the mediating variable knowledge acquisition and the alternative model. In both models, I assume that each social capital variable is correlated with others, shown as double-head arrows in the model. In path analysis, each correlation can be decomposed into four effects. The direct effect is the path coefficient from one variable to the other without mediation. The indirect effect represents the sequence of paths that go through one or more intermediate variables. The spurious effect arises when variables under study share a common cause. The unanalyzed effect is caused the causes of the variable are correlated. The sum of direct and indirect effects is the total causal part of the correlation between two variables, and the sum of the spurious and unanalyzed effects is the total non-causal part of the correlation between

201

two variables. I focus on only the causal part of the correlation between two variables in the path analyses. I used the statistical software AMOS to perform path analysis, and use a Maximum Likelihood method for parameter estimation. Client Sample Figure 18 can be viewed as the alternative model superimposed on the simplified research model, where interaction effects are not accounted for. As a combination of two competing models, the model in Figure 18 can help decompose and compare different effects of correlations between the exogenous variables and the endogenous variables. The results of path analysis are summarized in Table 26, in which the columns represent the exogenous variables and the rows represent the endogenous variables. All effects are expressed in standardized terms, independent of the measurement units of the variables. The results can be interpreted as: when there is one unit of increase in the exogenous variable a, there will be an x unit of increase (or decrease) in the endogenous variable b, where x is between 0 and 1. In Table 26, for each endogenous variable, the effect is decomposed in direct effect and indirect effect, and the total effect is the causal part of the correlation between the exogenous variable and the endogenous variable. For example, the total effect of learning intent on knowledge acquisition is the same as the direct effect of learning intent on knowledge acquisition because learning intent only has a direct, nonmediated relationship with knowledge acquisition. Resource endowment has two effects on success in business operations: a direct effect and an indirect effect through knowledge acquisition. The effect of resource endowment on knowledge acquisition through its correlation with other variables is beyond the consideration of the path analysis of this study.

202

Figure 18: Path Analysis –Client Sample

.22 v1 1

KNOW .09 .50 RSENDOW .06 .05 .06 .09 .03 .02 .04 COGN .71 .13 LI .40 COMBCAP .01 .01 TVISION .70 .07 -.04 .01 TTRUST .04 TRELAT .01 .23 .26 .07 .23 .02 .80 .20 .15 -.17 .16 .12 .97 .02 -.85 .00 .16 1 .03 SUCINNO v3 .25 .53 TBUSSUC .00 v2 1 .01

203

Table 26: Decomposition of Effects—Client Sample (N=151)
Effects Knowledge Acquisition Success in Innovation Success in Business Operations Total Direct Indirect Total Direct Indirect Total Direct Indirect Learning Intent .331 .331 .000 .110 -.045 .155 .125 .018 .107 Shared Vision .264 .264 .000 .170 .046 .124 .267 .181 .085 Trust .047 .047 .000 -.131 -.153 .022 -.146 -.161 .015 Social Interaction .062 .062 .000 .236 .206 .029 .236 .216 .020 Shared Cognition .215 .215 .000 .193 .092 .101 .219 .149 .069 Resource Endowment .105 .105 .000 .222 .172 .049 .038 .004 .034 Combinative Capabilities .000 .000 .000 .126 .126 .000 .162 .162 .000 Knowledge Acquisition .000 .000 .000 .469 .469 .000 .323 .323 .000

Table 27: Decomposition of Effects—Paired Sample (N=79)
Effects Knowledge Acquisition Success in Innovation Success in Business Operations Total Direct Indirect Total Direct Indirect Total Direct Indirect Learning Intent .457 .457 .000 .224 .057 .167 .122 .059 .063 Shared Vision -.112 -.112 .000 -.098 -.057 -.041 -.084 -.069 -.015 Trust -.092 -.092 .000 -.049 -.015 -.034 -.005 .008 -.013 Social Interaction .162 .162 .000 .225 .165 .059 .096 .074 .022 Shared Cognition .199 .199 .000 .210 .137 .073 .355 .328 .027 Resource Endowment .196 .196 .000 .309 .237 .072 .044 .017 .027 Combinative Capabilities .000 .000 .000 .281 .281 .000 .320 .320 .000 Knowledge Acquisition .000 .000 .000 .366 .366 .000 .137 .137 .000

204

Effect decomposition of the client sample shows that knowledge acquisition is more correlated with both success in business operations and success in innovation than any exogenous variable. A one-unit change in knowledge acquisition is associated with .323 unit change in success in business operations and .469 unit change in success in innovation in the same direction. This suggests that knowledge plays a more important role in business areas that are information-laden and knowledge-driven. Combinative capabilities have a higher correlation with success in business operations than with success in innovation. This implies that combinative capabilities resource may not be the most important antecedent of success, and other factors or interactions between combinative capabilities and other factors may have a stronger effect on successful outcomes. In the proposed research model, one unit of change in learning intent will lead to .331 unit of change in knowledge acquisition in the same direction, indicating the impact of a firm’s willingness to acquire knowledge on the learning outcomes. Learning intent correlates with both successful outcomes to a lesser extent. the effect decomposition of the correlation between learning intent and success in business operations suggests that learning intent has a stronger indirect effect (.107) on success in business operations through knowledge acquisition than the direct effect (.018). Learning intent has a negative correlation with success in innovation through the direct path, suggesting that higher learning intent does not guarantee successful outcomes such as it-enabled innovation. This negative correlation is cancelled out when the indirect effect is taken into account. Learning intent correlates with success in innovation through knowledge acquisition (.155), reassuring the significance of mediating effect of knowledge acquisition on the relationship between learning intent and success in innovation.

205

Partner resource endowment has a correlation of .105 with knowledge acquisition, indicating that a unit change in perceived partner resource endowment is associated with .105 unit of change in knowledge acquisition. However, it seems to be marginally correlated with success in business operations (.038), a correlation that can largely be explained by the mediating effect of knowledge acquisition (.034). Perceived partner resource endowment is highly correlated with success in innovation (.222), i.e., a unit change in perceived partner resource endowment will lead to .222 unit change in success in innovation. A large part of this correlation (.172) can be explained by the direct path between perceived partner resource endowment and success in innovation, while the rest is explained by the path through knowledge acquisition. This suggests that a well-established partner that processes the skills and expertise in the domain area is very important to the successful outcomes of a firm such as innovation. However, such successful outcomes may not be a result of active learning by the firm. Successful innovations can be achieved by the effort of the partner without much involvement and participation of the client firm. Social interaction has a marginal correlation with knowledge acquisition (.062), but has high correlations with both success in business operations (.236) and success in innovation (.236), which suggests that the alternative model seems to be superior. The correlations between social interaction and both success outcomes can be largely explained by direct effects (.216 and .206), while the indirect effects through the intermediary knowledge acquisition (.020 and .029) seem insignificant. This suggests that social interaction alone does not necessarily lead to learning. It does, however, play a significant role in achieving successful outcomes in business operations and innovation. This means that successful outcomes can be obtained solely by the partner when the client firm’s intentions and goals are effectively communicated to the partner

206

through frequent social interactions. The results suggest that social interaction is more important in relationship management than in knowledge acquisition, and it allows the client firm to achieve successful outcomes with minimal requirements of learning and involvement. Trust seems to have a relatively marginal correlation with knowledge acquisition (.047). Surprisingly, it is negatively correlated with both success in business operations (-.161) and success in innovation (-.153), indicating an association between high levels of trust and high failure rates in business operations and innovations. The indirect effects through knowledge acquisition are both positive (.015 and .022) and help reduce the negative impact of trust on success outcomes, but the total effects remain negative because of the small magnitudes of the indirect effects. The results suggest that trust may sometimes be hurtful to the client firm. High levels of trust may reduce the client firm’s willingness to learn because it can rely too much on the partner to do everything. In addition, when the client firm trusts the partner and leaves all work to be done by the partner, its limited participation and involvement may result in unexpected outcomes due to the lack of supervision or performance evaluation. Shared vision has a high correlation with knowledge acquisition (.264), i.e., a unit change in shared vision is associated with .264 unit change in knowledge acquisition. It can also explain both success outcomes—.267 for success in business operations and .170 forsuccess in innovation. Shared vision has a stronger direct effect on success in business operations (.181) than an indirect effect through knowledge acquisition (.085). This suggests that successful outcomes may require higher level of shared vision than knowledge acquisition for more operational-oriented business tasks, but higher levels of knowledge and learning for tasks such as innovation, which are more information- and knowledge-intensive.

207

Shared cognition has a relatively high correlation with knowledge acquisition (.215). Similar to shared vision, its impact on the success outcomes can be explained differently according to the nature of tasks involved. The total effect of shared cognition on success in business operations (.219) can be broken down to a larger direct effect (.149) and a smaller indirect effect (.069) through knowledge acquisition, indicating that knowledge is not the most critical antecedent of success in business operations. The total effect of shared cognition on success in innovation (.193) can be decomposed into a direct effect of .092 and an indirect effect of .101 through knowledge acquisition. This implies that for outcomes that require more knowledge related-input, knowledge acquisition plays a more important mediating role in the relationship between shared cognition and success in innovation. To summarize, path analyses with the client sample confirms the importance of knowledge acquisition to both success outcomes. However, the exogenous variables appear to have different magnitude of correlations with knowledge acquisition and the success outcomes. Particularly, shared vision, shared cognition, and learning intent have higher correlations with knowledge acquisition, and show different direct and indirect effects for outcomes that require different levels of knowledge involvement. The results suggest that these are important factors to explain knowledge acquisition by the client firm and knowledge-related outcomes. Partner resource endowment, social interaction, and trust, on the other hand, seem to have stronger relationship with the success outcomes than with knowledge acquisition. Socialinteraction and trust have stronger direct effects than indirect effects on both success outcomes, suggesting that knowledge may not be the critical factor to explain their relationships with success.

208

Paired Sample I also performed path analysis for the paired sample (N=79). With aggregate measurement scales based on the responses from both the client and the partner, path analysis results for the paired sample, summarized in Table 27, seem to be less conclusive. Figure 19 shows the path coefficients of the paired sample. The correlations between knowledge acquisition and both success outcomes are consistent with the results for the client sample, suggesting a more important role of knowledge in success in innovation than in success in business operation. Learning intent is highly correlated with knowledge acquisition (.457), and has correlations with both success outcomes with lesser magnitudes. The correlations between learning intent and the success outcomes can be explained more by indirect effects through knowledge acquisition than by direct effects, confirming the important role of knowledge in success. Combinative capabilities seem to correlate more with success in business operations than with success in innovation, indicating that there might be some missing factor or interaction effects that can explain the successful outcomes. Resource endowment and social interaction have high correlations with success in innovation but low correlations with success in business operations. They correlate with success in innovation more than they correlate with knowledge acquisition, and have strong direct effects on success in innovation. Trust and shared vision have negative correlations with all three endogenous variables. This finding is inconsistent with the results for the client sample and contradictory to the hypotheses. Similarly, shared cognition seems to be highly correlated with both success in business operations and success in innovation, with strong direct effects on both correlations, which is inconsistent with findings for the client sample. I suspect that these

209

contradictions may be a result of the aggregate scales for the exogenous variables. For the same matched pair, the client firm may have a view of the social capital constructs that is very different from the vendor’s, resulting in low correlations between the responses from the client and the vendor for the same constructs. Aggregating the responses of the matched pair may correct the self-reporting bias to some extent, but may also have a diluting effect on the measurements, which may cause distortion or changes in magnitude of relationships.

210

Figure 19: Path Analysis—Paired Sample

KNOW .15 .52 RSENDOW .20 .19 .22 .01 .13 .16 .15 PCOGN .67 .32 LI .24 COMBCAP .20 .20 PVISION .52 .11 .04 .18 PTRUST .39 PRELAT .30 .31 .16 -.09 .33 -.10 .07 .16 .01 .19 -.06 .16 .26 -.02 .04 -.05 1 .38 SUCINNO v3 .36 SUCDIR .01 1 .23 v1 .14 v2 1 .24

.18

211

REFERENCES Abernathy, W.J., and Clark, K.B. "Innovation: Mapping the Winds of Creative Destruction," Research Policy (14) 1985, pp 3-22. Adam, F., and Roncevic, B. "Social Capital: Recent Debates and Research Trends," Social Science Information (42:2) 2003, pp 155-183. Adler, P.S. "Market, Hierarchy, and Trust: The Knowledge Economy and the Future of Capitalism," Organization Science (12:2) 2001, pp 215-234. Adler, P.S., and Kwon, S. "Social Capital: The Good, the Bad, and the Ugly," in: Knowledge and Social Capital: Foundations and Applications, E.L. Lesser (ed.), ButterworthHeinemann, Boston, 2000. Adler, P.S., and Kwon, S. "Social Capital: Prospects for a New Concept," Academy of Management Review (27:1) 2002, p 17. Agarwal, R., and Karahanna, E. "Time Flies When You're Having Fun: Cognitive Absorption and Beliefs about Information Technology Usage," MIS Quarterly(24:4) 2000, pp 665 694. Agarwal, R., and Sambamurthy, V. "Principles and Models for Organizing the IT Function," MIS Quarterly Executive (1:1) 2002, pp 1-16. Ahuja, G., and Katila, R. "Technological Acquisitions and the Innovation Performance of Acquiring Firms: A Longitudinal Study," Strategic Management Journal (22:3) 2001, pp 197-220. Altinkemer, K., Chaturvedi, A., and Gulati, R. "Information Systems Outsourcing: Issues and Evidence," International Journal of Information Management (14) 1994, pp 252-268. Anand, B.N., and Khanna, T. "Do Firms Learn to Create Value? The Case of Alliances," Strategic Management Journal (21) 2000, pp 295-315. Anand, V., Glick, W.H., and Manz, C.C. "Thriving on the Knowledge of Outsiders: Tapping Organizational Social Capital," Academy of Management Executive (16:1) 2002, pp 87101. Ang, S., and Cummings, L. "Strategic Response to Institutional Influences on Information Systems Outsourcing," Organization Science (8:3) 1997, pp 235-255. Ang, S., and Slaughter, S. "A Taxonomy of Employment Insourcing and Outsourcing Strategies in Information Systems," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Ang, S., and Straub, D. "Production and Transaction Economies and Information Systems Outsourcing: A Study of the US Banking Industry," MIS Quarterly(22:4) 1998, pp 535 552. Antonucci, Y.L., Lordi, F.C., and Tucker, J.J. "The Pros and Cons of IT Outsourcing," Journal of Accountancy) 1998a, pp 26-30. Antonucci, Y.L., and Tucker, J.J. "IT Outsourcing: Current Trends, Benefits, and Risks," Information Strategy: The Executive's Journal (14:2) 1998b, pp 16-25. Apte, U.M., and Mason, R.O. "Global Disaggregation of Information-Intensive Services," Management Science (41:7) 1995, pp 1250-1262. Apte, U.M., Sobol, M.G., Hanaoka, S., Shimada, T., Saarinen, T., Salmela, T., and Vepsalainen, P.J. "IS Outsourcing Practices in the USA, Japan, and Finland: A Comparative Study," Journal of Information Technology (12) 1997, pp 289-304.

212

Araujo, L. "Knowing and Learning as Networking," Management Learning (29:3) 1998, pp 317336. Argote, L. Organizational Learning: Creating, Retaining and Transferring Knowledge Kluwer, Academic Publishers, Norwell, MA, 1999. Arnett, K.P., and Jones, M.C. "Firms that Choose Outsourcing: A Profile," Information & Management (26:4) 1994, p 179. Aubert, B.A., Patry, M., and Rivard, S. "Managing IT Outsourcing Risk: Lessons Learned," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Baden-Fuller, C., Targett, D., and Hunt, B. "Outsourcing to Outmaneuver: Outsourcing Redefines Competitive Strategy and Structure," European Management Journal (18:3) 2000, pp 285-295. Baldwin, L.P., Irani, Z., and Love, P.E.D. "Outsourcing Information Systems: Drawing Lessons from a Banking Case Study," European Journal of Information Systems (10) 2001, pp 1524. Barney, J. "Firm Resources and Sustained Competitive Advantage," Journal of Management (17:99-120) 1991. Barney, J. "How a Firm's Capabilities Affect Boundary Decisions," Sloan Management Review (40:3) 1999, pp 137-145. Baron, R.M., and Kenny, D.A. "The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations," Journal of Personality and Social Psychology (51:6) 1986, pp 1173-1182. Barthelemy, J. "The Hidden Cost of IT Outsourcing," Sloan Management Review), Spring 2001, pp 60-69. Barthelemy, J., and Geyer, D. "IT Outsourcing: Evidence from France and Germany," European Management Journal (19:2) 2001, pp 195-202. Bassellier, G., Benbasat, I., and Reich, B.H. "The Influence of Business Managers' IT Competence on Championing IT," Information Systems Research (14:4) 2003, pp 317336. Batjargal, B., and Liu, M. "Entrepreneurs' Access to Private Equity in China: The Role of Social Capital," Organization Science (15:2) 2004, pp 159-172. Behara, R.S., Gundersen, D.E., and Capozzoli, E., A. "Trends in Information Systems Outsourcing," International Journal of Purchasing and Materials Management), Spring 1995, pp 46-51. Bensaou, M., and Venkatraman, N. "Configurations of Interorganizational Relationships: A Comparison Between U.S. and Japanese Automakers," Management Science (41:9) 1995, pp 1471-1492. Bharadwaj, A.S. "A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation," MIS Quarterly (24:1) 2000, pp 169-196. Blau, P.M. Exchange and Power in Social Life Wiley, New York, 1964. Blyler, M., and Coff, R.W. "Dynamic Capabilities, Social Capital, and Rent Appropriation: Ties That Split Pies," Strategic Management Journal (24:7) 2003, pp 677-686. Boland, R.J., and Tenkasi, R.V. "Perspective Making and Perspective Taking in Communities of Knowing," Organization Science (6) 1995, pp 350-372.

213

Bolino, M.C., Turnley, W.H., and Bloodgood, J.M. "Citizenship Behavior and the Creation of Social Capital in Organizations," Academy of Management Review (27:4) 2002, p 505. Bozarth, C., Handfield, R., and Das, A. "Stages of Global Sourcing Strategy Evolution: An Exploratory Study," Journal of Operations Management (16) 1998, pp 241-255. Brown, J.S., and Duguid, P. "Organizational Learning and Communities of Practice: Toward a Unified View of Working, Learning, and Innovation," Organization Science (2:1) 1991, pp 40-57. Brown, M.W., and Cudeck, R. "Alternative Ways of Assessing Model Fit," in: Testing Structural Equation Models, K.A. Bollen and J.S. Long (eds.), Sage, Newbury Park, CA, 1993. Burt, R. Structural Holes: The Social Structure of Competition Harvard University Press, Cambridge, MA, 1992. Burt, R. "The Network Structure of Social Capital," in: Research in Organizational Behavior, R.I. Sutton and B.M. Staw (eds.), JAI Press, Greenwich, CT, 2000. Cannon-Bowers, J.A., Salas, E., and Converse, S. "Shared Mental Models in Expert Team Decision Making," in: Individual and Group Decision Making: Current Issues, N.J. Castellan (ed.), Lawrence Erlbaum, Hillsdale, NJ, 1993, pp. 221-246. Carmel, E., and Agarwal, R. "The Maturation of Offshore Sourcing of Information Technology Work," MIS Quarterly Executive (1:2) 2002, pp 65-77. Carmines, E.G., and McIver, J.P. "Analyzing Models with Unobserved Variables," in: Social Measurement: Current Issues, G.W. Bohrnstedt and E.F. Borgatta (eds.), Sage, Beverly Hills, 1981. Casale, F. "IT Index 2001: Now, More Than Ever," The Outsourcing Institute. Chatterjee, D., Grewal, R., and Sambamurthy, V. "Shaping up for E-Commerce: Institutional Enablers of the Organizational Assimilation of Web Technologies," MIS Quarterly (26:2) 2002, pp 65-89. Chaudhury, A., Nam, K., and Rao, H.R. "Management of Information Systems Outsourcing: A Bidding Perspective," Journal of Management Information Systems (12:2) 1995, pp 131159. Childers, T.L., Carr, C.L., Peck, J., and Carson, S. "Hedonic and Utilitarian Motivations for Online Retail Shopping Behavior," Journal of Retailing (77) 2001, pp 511-535. Chin, W.W. "Issues and Opinion on Structural Equation Modeling," MIS Quarterly (22:1) 1998, p VII. Chin, W.W., and Todd, P.A. "On the Use, Usefulness, and Ease of Use of Structural Equation Modeling in MIS Research: A Note of Caution," MIS Quarterly (19:2) 1995, pp 237-246. Chircu, A., and Kauffman, R.J. "Limits to Value in Electronic Commerce-Related IT Investments," Journal of Managemeng Information Systems (17:2) 2000, pp 59-80. Choudhury, V., and Sabherwal, R. "Portfolios of Control in Outsourced Software Development Projects," Information Systems Research (14:3) 2003, pp 291-314. Chung, S., Singh, H., and Lee, K. "Complementarity, Status Similarity and Social Capital as Drivers of Alliance Formation," Strategic Management Journal (21:1) 2000, p 1. Clark, T.D., Zmud, R.W., and McCray, G.E. "The Outsourcing of Information Services: Transforming the Nature of the Business in the Information Industry," Journal of Information Technology (8:1) 1995, pp 5-13. Clemons, E.K., and Reddi, S.P. "The Impact of Information Technology on the Organization of Economic Activity"," Journal of Management Information Systems (10:2) 1993, pp 9-36.

214

Cohen, S.S., and Fields, G. "Social Capital and Capital Gains in Sillicon Valley," California Management Review (41:2) 1999, p 108. Cohen, W.M., and Levinthal, D.A. "Absorptive Capacity: A New Perspective on Learning and Innovation," Administrative Science Quarterly (35) 1990, pp 128-152. Coleman, J.S. "Social Capital in the Creation of Human Capital," American Journal of Sociology (94) 1988, pp S95-S120. Collins, J., and Millen, R. "Information Systems Outsourcing by Large American Industrial Firms: Choices and Impacts," Information Resources Management Journal (8:1) 1995, pp 5-13. Creswell, J.W. Research Design: Qualitative & Quantitative Approaches Sage Publications, Thousand Oaks, CA, 1994. Cross, J. "IT Outsourcing: British Petroleum's Competitive Approach," Harvard Business Review (73:3) 1995, p 94. Currie, W.L., and Seltsikas, P. "Exploring the Supply-Side of IT Outsourcing: Evaluating the Emerging Role of Application Service Providers," European Journal of Information Systems (10) 2001, pp 123-134. Das, T., K., and Teng, B.S. "A Social Exchange Theory of Strategic Alliances," in: Cooperative Strategies and Alliances, F.J. Contractor and P. Lorange (eds.), Elsevier Science, Ltd., Oxford, 2002. De Looff, L.A. "Information Systems Outsourcing Decision Making: A Framework, Organizational Theories and Case Studies," Journal of Information Technology (10) 1995, pp 281-297. Decarolis, D.M., and Deeds, D.L. "The Impact of Stocks and Flows of Organizational Knowledge of Firm Performance: An Empirical Investigation of the Biotechnology Industry," Strategic Management Journal (20) 1999, pp 953-968. DeLoof, L.A. "Information Systems Outsourcing Decision Making: A Framework, Organizational Theories and Case Studies," Journal of Information Technology (10) 1995, pp 281-297. Dibbeern, J., and Heinzl, A. "Outsourcing Information Systems in Small and Medium Sized Enterprises: A Test of a Multi-Theoretical Casaul Model," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, J. Dibbeern (ed.), Springer-Verlag, New York, 2002. Dierickx, I., and Cool, K. "Asset Accumulation and Sustainability of Competitive Advantage," Management Science (35) 1989, pp 554-571. DiRomualdo, A., and Gurbaxani, V. "Strategic Intent for IT Outsourcing," Sloan Management Review (39:4) 1998. Dyer, J.H. "Does Governance Matter? Keiretsu Alliances and Asset Specificity as Sources of Japanese Competitive Advantage," Organization Science (7:6) 1996, pp 649-666. Dyer, J.H., and Nobeoka, K. "Creating and Managing a High-Performance Knowledge-Sharing Network: The Toyota Case," Strategic Management Journal (21) 2000, pp 345-367. Dyer, J.H., and Singh, H. "The Relational View: Cooperative Strategy and Sources of Interorganizational Competitive Advantage," Academy of Management Journal (23:4) 1998, pp 660-679. Earl, M. "The Risks to IT Outsourcing," Sloan Management Review (37:3) 1996, pp 36-32. Eisenhardt, K.M. "Agency Theory: An Assessment and Review," Academy of Management Review (14:1) 1989a, p 57.

215

Eisenhardt, K.M. "Building Theories from Case Study Research," Academy of Management Review (14:4) 1989b, pp 532-550. Eisenhardt, K.M., and Santos, F. "Knowledge-Based View: A New Theory of Strategy?," in: Handbook of Strategy and Management, A. Pettigrew, H. Thomas and R. Whittington (eds.), Sage, 2000. Elitzur, R., and Wensley, A.K.P. "Further Thoughts on Information Structure, Knowledge Management and Outsourcing," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Feeny, D.F., and Willcocks, L.P. "Core IS Capabilities for Exploiting Information Technology," Sloan Management Review (39:3) 1998, pp 9-21. Finlay, P.N., and King, R.M. "IT Sourcing: A Research Framework," International Journal of Technology Management (17:1/2) 1999, pp 109-128. Foley, M.W., and Edwards, B. "Is It Time to Disinvest in Social Capital?," Journal of Public Policy (19:2) 1999, pp 141-173. Fornell, C., and Larcker, D.F. "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research (8) 1981, pp 39-50. Gibson, S. "GM "Third Wave" in the Works," eWeek), June 23, 2003 2003. Goles, T., and Chin, W.W. "Relational Exchange Theory and IS Outsourcing: Developing a Scale to Measure Relationship Factors," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Goolsby, K. "Collaboration Wins Outsourcing: Removing "Risk" from Calculated Business Risks," Everest Partners, L. P., 2003. Gopal, A., Sivaramakrishnan, K., Krishnan, M.S., and Mukhopadhyay, T. "Contracts in Offshore Software Development: An Empirical Analysis," Management Science (49:12) 2003, pp 1671-1683. Gouldner, A.W. "The Norm of Reciprocity: A Preliminary Statement,"American Sociological Review (25) 1960, pp 161-178. Gover, V., Cheon, M., and Teng, J.T.C. "An Evaluation of the Impact of Corporate Strategy and the Role of Information Technology in IS Functional Outsourcing," European Journal of Information Systems (3:3) 1994, pp 179-190. Granovetter, M.S. "The Strength of Weak Ties," American Journal of Sociology (78) 1973, pp 1360-1380. Granovetter, M.S. "Economic Action and Social Structure: The Problem of Embeddedness," American Journal of Sociology (91:3) 1985, pp 481-510. Grant, R.M. "Prospering in Dynamically-Competitive Environments: Organizational Capability as Knowledge Integration," Organization Science (7:4) 1996a, pp 375-387. Grant, R.M. "Toward a Knowledge-Based Theory of the Firm," Strategic Management Journal (17:Winter Special Issue) 1996b, pp 109-122. Greene, W.H. Econometric Analysis, (5th Edition ed.) Pearson Education, 2002. Grix, J. "Social Capital as a Concept in the Social Sciences: The Current State of the Debate," Democratization (8:3), Autumn 2001 2001, pp 189-210. Grover, V., Cheon, M., and Teng, J.T.C. "The Effect of Service Quality and Partnership on the Outsourcing of Information Systems Functions," Journal of Management Information Systems (12:4) 1996, pp 89-116.

216

Grover, V., Cheon, M.J., and Teng, J.T.C. "A Descriptive Study on the Outsourcing of Information Systems Functions," Information & Management (27) 1994a, pp 33-44. Grover, V., Cheon, M.J., and Teng, J.T.C. "An Evaluation of the Impact of Corporate Strategy and the Role of Information Technology in IS Functional Outsourcing," European Journal of Information Systems (3:3) 1994b, pp 179-190. Grover, V., Cheon, M.J., and Teng, J.T.C. "An Evaluation of the Impact of Corporate Strategy and the Role of Information Technology in IS Functional Outsourcing," European Journal of Information Systems (3:3) 1994a, pp 179-190. Grover, V., Cheon, M.J., and Teng, J.T.C. "A Descriptive Study on the Outsourcing of Information Systems Functions," Information & Management (27) 1994b, pp 33-44. Gulati, R. "Does Familiarity Breed Trust? The Implications of Repeated Ties for Contractual Choice in Alliances," Academy of Management Journal (38:1) 1995a, pp 85-112. Gulati, R. "Social Structure and Alliance Formation Patterns: A Longitudinal Analysis," Administrative Science Quarterly (40) 1995b, pp 619-652. Gulati, R. "Network Location and Learning: The Influence of Network Resources and Firm Capabilities on Alliance Formation," Strategic Management Journal (20:397-420) 1999. Gulati, R., Nohria, N., and Zaheer, A. "Strategic Networks," Strategic Management Journal (21) 2000, pp 203-215. Gupta, A.K., and Govindarajan, V. "Knowledge Flow within Multinational Corporations," Strategic Management Journal (21) 2000a, pp 473 - 496. Gupta, A.K., and Govindarajan, V. "Knowledge Flows Within Multinational Corporations," Strategic Management Journal (21) 2000b, pp 473-496. Hamel, G., Doz, Y.L., and Prahalad, C.K. "Collaborate with Your Competitors and Win," Harvard Business Review (67:1) 1989, pp 133-139. Hays, R.D. "IT Performance Turnaround," Information Systems Management (98:15), 84 1998, p 1. Helfat, C.E., and Raubitschek, R.S. "Product Sequencing: Co-Evolution of Knowledge, Capabilities and Products," Strategic Management Journal (21) 2000, pp 961-979. Henderson, J.C. "Plugging into Strategic Partnerships: The Critical IS Connection," Sloan Management Review (31:3) 1990, pp 7-18. Henderson, R., and Cockburn, I. "Measuring Competence? Exploring Firm Effects in Pharmaceutical Research," Strategic Management Journal (15:Special Issue) 1994, p 63. Henderson, R., and Cockburn, I. "Scale, Scope, and Spillovers: The Determinants of Research Productivity in Drug Discovery," Rand Journal of Economics (27:1) 1996, pp 32-59. Hirschheim, R., and Dibbern, J. "Information Systems Outsourcing in the New Economy: An Introduction," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Ho, V.T., Ang, S., and Straub, D. "When Subordinates Become IT Contractors: Persistent Managerial Expectations in IT Outsourcing," Information Systems Research (14:1) 2003, pp 66-86. Hoffman, J.J., Hoelscher, M.L., and Sherif, K. "Social Capital, Knowledge Management, and Sustained Superior Performance," Journal of Knowledge Management (9:3) 2005, pp 93100.

217

Hu, Q., Saunders, C., and Gebelt, M. "Research Report: Diffusion of Information Systems Outsourcing: A Reevaluation of Influence Sources," Information Systems Research (8:3) 1997, pp 288-301. Huber, G.P. "Organizational Learning: The Contributing Processes and The Literatures," Organization Science (2:1) 1991, pp 88-115. Hurley, R.F., and Hult, T.M. "Innovation, Market Orientation, and Organizational Learning: An Integration and Empirical Examination," Journal of Marketing) 1998, p 44. Inkpen, A.C. "Creating Knowledge through Collaboration," California Management Review (39:1) 1996, pp 123-140. Inkpen, A.C. "Learning, Knowledge Management, and Strategic Alliances: So Many Studies, So Many Unanswered Questions," in: Cooperative Strategies and Alliances, F.J. Contractor and P. Lorange (eds.), Elsevier Science, Oxford, 2002. Inkpen, A.C., and Tsang, E.W.K. "Social Capital, Networks, and Knowledge Transfer," Academy of Management Review (30:1) 2005, pp 146-165. Insinga, R.C., and Werle, M.J. "Linking Outsourcing to Business Strategy," Academy of Management Executive (14:4) 2000, pp 58-70. Itami, H. Mobilizing Invisible Assets Harvard Business Press, Cambridge, MA, 1987. Jayatilaka, B. "IT Sourcing--A Dynamic Phenomenon: Forming an Institutional Theory Perspective," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Joreskog, K.G. "Testing Structrual Equation Models," in: Testing Structrual Equation Models, K.A. Bollen and J.S. Long (eds.), Sage Publications, Inc., Newbury Park, CA, 1993. Jurison, J. "Applying Traditional Risk-Return Analysis to Strategic IT Outsourcing Decisions," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Kale, P., Singh, H., and Perlmutter, H. "Learning and Protection of Proprietary Assets in Strategic Alliances: Building Relational Capital," Strategic Management Journal (21) 2000, pp 217-237. Karl, K.A. "Achieving Success Through Social Capital: Tapping the Hidden Resources in Your Personal and Business Networks," The Academy of Management Executive (15:3) 2001, p 146. Katabadse, A., and Katabadse, N. "Outsourcing Best Practice: Transformational and Transactional Considerations," Knowledge and Process Management (10:1) 2003, pp 6071. Kenis, P., and Knoke, D. "Academy of Management Review," 27 (2:275-293) 2002. Kern, T., Lacity, M.C., and Willcocks, L.P. Netsourcing: Renting Business Applications and Services over a NetworkFinancial Times Prentice Hall, Upper Saddle River, New Jersey, 2002a. Kern, T., and Willcocks, L.P. "Exploring Relationships in Information Technology Outsourcing: The Interaction Approach," European Journal of Information Systems (11) 2002b, pp 319. Kern, T., Willcocks, L.P., and van Heck, E. "The Winner's Curse of IT Outsourcing: Strategies for Avoiding Relational Trauma," California Management Review (44:2) 2002c, pp 4769.

218

Kessler, I., Coyle-Shapiro, J., and Purcell, J. "Outsourcing and the Employee Perspective," Human Resource Management Journal (9:2) 1999, pp 5-19. Ketler, K., and Walstrom, J. "The Outsourcing Decision," International Journal of Information Management (13) 1993, pp 449-459. Kim, B., Park, K., and Kim, J. "Satisfying Different Customer Groups for IS Outsourcing: A Korean IS Company's Experience," Asia Pacific Journal of Marketing and Logistics (15:3) 2003, pp 48-69. King, W.R., and Malhotra, Y. "Developing a Framework for Analyzing IS Outsourcing," Information & Management (37:6) 2000, pp 323-334. Klein, H.K. "On the Theoretical Foundations of Current Outsourcing Research," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Klepper, R. "The Management of Partnering Development in I/S Outsourcing," Journal of Information Technology (10:4) 1995, pp 249-258. Knight, L. "Network Learning: Exploring Learning by Interorganizational Networks," Human Relations (55:4) 2002, pp 427-454. Kogut, B. "The Network as Knowledge: Generative Rules and the Emergence of Structure," Strategic Management Journal (21:405-425) 2000. Kogut, B., and Zander, U. "Knowledge of the Firm, Combinative Capabilities, and the Replication of Technology," Organization Science (3:3) 1992, pp 383-397. Kogut, B., and Zander, U. "What Firms Do? Coordination, Identity, and Learning," Organization Science (7:5) 1996, pp 502-518. Koka, B.R., and Prescott, J.E. "Strategic Alliances as Social Capital: A Multidimensional View," Strategic Management Journal (23:9) 2002, pp 795-816. Kotabe, M. "Efficiency vs. Effectiveness Orientation of Global Sourcing Strategy: A Comparison of U.S. and Japanese Multinational Companies," Academy of Management Executive (12:4) 1998, p 107. Kotabe, M., Murray, J.Y., and Javalgi, R.G. "Global Sourcing of Services and Market Performance: An Empirical Investigation," Journal of International Marketing (6:4) 1998, p 10. Koza, M.P., and Lewin, A.Y. "The Co-Evolution of Strategic Alliances," Organization Science (9:3, Special Issue: Managing Partnerships and Strategic Alliances) 1998, pp 255-264. Lacity, M.C., Feeny, D.F., and Willcocks, L.P. "Transforming a Back-Office Function: Lessons from BAE Systems Experience with an Enterprise Partnership," MIS Quarterly Executive (2:2) 2003, pp 86-103. Lacity, M.C., and Hirschheim, R. "Implementing Information Systems Outsourcing: Key Issues and Experiences of an Early Adopter," Journal of General Management (19:1) 1993a, pp 17-31. Lacity, M.C., and Hirschheim, R. "The Information Systems Outsourcing Bandwagon," Sloan Management Review), Fall 1993b, pp 73-86. Lacity, M.C., and Hirschheim, R. Beyond the Information Systems Outsourcing Bandwagon: The Insourcing Response John Wiley & Sons, Ltd., Chichester, UK, 1995a. Lacity, M.C., and Willcocks, L.P. "Interpreting Information Technology Sourcing Decisions from a Transaction Cost Perspective: Findings and Critique," Accounting, Management, & Information Technologies (5:3/4) 1995b, pp 203-244.

219

Lacity, M.C., and Willcocks, L.P. "An Empirical Investigation of Information Technology Sourcing Practices: Lessons from Experience," MIS Quarterly ) 1998, pp 363 -408. Lacity, M.C., and Willcocks, L.P. "Survey of IT Outsourcing Experiences in US and UK Organizations," Journal of Global Information Management (8:2) 2000. Lacity, M.C., and Willcocks, L.P. Global Information Technology Outsourcing John Wiley & Sons Ltd., Chichester, UK, 2001. Lacity, M.C., Willcocks, L.P., and Feeny, D.F. "IT Outsourcing: Maximize Flexibility and Control," Harvard Business Review (73:3) 1995c, pp 84-93. Lacity, M.C., Willcocks, L.P., and Feeny, D.F. "The Value of Selective IT Sourcing," Sloan Management Review), Spring 1996, pp 13-25. Lahiri, K., and Schmidt, P. "On the Estimation of Triangular Structural Systems," Econometrica (46:5) 1978, pp 1217-1221. Landry, R., Amara, N., and Lamari, M. "Does Social Capital Determine Innovation? To What Extent?," Technological Forecasting & Social Change (69) 2002, pp 681-701. Lane, P.J., and Lubatkin, M. "Relative Absorptive Capacity and Interorganizational Learning," Strategic Management Journal (19) 1998, pp 461-477. Lang, J.C. "Social Context and Social Capital as Enablers of Knowledge Integration," Journal of Knowledge Management (8:3) 2004, pp 89-105. Larson, A. "Network Dyads in Entrepreneurial Settings: A Study of the Governance of Exchange Relationships," Administrative Science Quarterly (37:1) 1992, p 76. Lasher, D.R., Ives, B., and Jarvenpaa, S.L. "USAA-IBM Partnerships in Information Technology: Managing the Image Project," MIS Quarterly(15:4) 1991, pp 551 -565. Lee, J. "The Impact of Knowledge Sharing, Organizational Capability, and Partnership Quality on IT Outsourcing Success," Information & Management (38) 2001, pp 323-335. Lee, J., Huynh, M.Q., Kwok, R.C., and Pi, S. "Current and Future Directions of IS Outsourcing," in: Information Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Lee, J., Huynh, M.Q., Kwok, R.C., and Pi, S. "IT Outsourcing Evolution--Past, Present, and Future," Communications of the ACM (46:5) 2003, pp 84-89. Lee, J., and Kim, Y. "Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation," Journal of Management Information Systems (15:4) 1999, pp 29-61. Lee, J., Miranda, S.M., and Kim, Y. "IT Outsourcing Strategies: Universalistic, Contingency, and Configurational Explanations of Success," Information Systems Research (15:2) 2004, pp 110-131. Lei, D., and Hitt, M. "Strategic Restructuring and Outsourcing: The Effect of Mergers and Acquisitions and LBOs on Building Firm Skills and Capabilities," Journal of Management (21:5) 1995, pp 835-859. Levina, N., and Ross, J.W. "From the Vendor's Perspective: Exploring the Value Proposition in Information Technology Outsourcing," MIS Quarterly ) 2003. Liedtka, J.M., Haskins, M.E., Rosenblum, J.W., and Weber, J. "The Generative Cycle: Linking Knowledge and Relationships," Sloan Management Review), Fall 1997, pp 47-58. Lin, N. "Building a Network Theory of Social Capital," in: Social Capital: Theory and Research, N. Lin, K. Cook and R.S. Burt (eds.), Aldine de Gruyter, New York, 2001, pp. 3-29. Linder, J.C. "Transformational Outsourcing," Sloan Management Review (45:2) 2004, pp 52-58.

220

Loehlin, J.C. Latent Variable Models: An Introduction to Factor, Path, and Structural Analysis, (3rd Edition ed.) Lawrence Erlbaum Associates, Inc., Mahwah, NJ, 1998. Logan, M.S. "Using Agency Theory to Design Successful Outsourcing Relationships," International Journal of Logistics Management (11:2) 2000, pp 21-32. Loh, L., and Venkatraman, N. "Determinants of Information Technology Outsourcing: A CrossSectional Analysis," Journal of Management Information Systems (9:1) 1992a, pp 7-24. Loh, L., and Venkatraman, N. "Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect," Academy of Management Journal (34) 1992b, pp 869892. Lonsdale, C. "Locked-In to Supplier Dominance: On the Dangers of Asset Specificity for the Outsourcing Decision," Journal of Supply Chain Management), Spring 2001, pp 22-27. Lorenzoni, G., and Lipparini, A. "The Leveraging of Interfirm Relationships as a Distinctive Organizational Capability: A Longitudinal Study," Strategic Management Journal (20) 1999, pp 317-338. Lynskey, M.J. "The Transfer of Resources and Competencies for Developing Technological Capabilities--The Case of Fujitsu-ICL," Technology Analysis & Strategic Management (11:3) 1999, pp 317-336. Mahnke, V., Overby, M.L., and Vang, J. "Strategic Outsourcing of IT Services: Theoretical Stocktaking and Emperical Challenges," Industry and Innovation (12:2), June 2005, pp 205-253. Malone, T.W., Yates, J., and Benjamin, R.I. "Electronic Markets and Electronic Hierarchies," Communications of the ACM (30:6) 1987, pp 484-497. Marcolin, B.L. "Spiraling Effect of IS Outsourcing Contract Interpretations," in: Information Systems Outsourcing: Enduring Themes, Emergent Patters, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Mason, R.O., McKenny, J.L., and Copeland, D.G. "Developing an Historical Tradition in IS Research," MIS Quarterly(21:3) 1997, pp 257 -278. McCray, G., and Clark, T.D. "Using System Dynamics to Anticipate the Organizational Impacts of Outsourcing," System Dynamic Review (15:4) 1999, pp 345-373. McDowell, M.A. "Outsourcing in the Digital Economy," Accenture, Washington DC. McFadyen, M.A., and Cannella, A.A. "Social Capital and Knowledge Creation: Diminishing Returns of the Number and Strength of Exchange Relationships," Academy of Management Journal (47:5) 2004, pp 735-746. McFarlan, F.W., and Nolan, R.L. "How to Manage an IT Outsourcing Alliance," Sloan Management Review), Winter 1995, pp 9-23. McLellan, K., and Beamish, P. "The New Frontier for Information Technology Outsourcing: International Banking," European Management Journal (12:2) 1994, pp 210-215. Meadows, C.J. "Globalizing Software Development," Journal of Global Information Management (4:1) 1996, pp 5-14. Michell, V., and Fitzgerald, G. "The IT Outsourcing Market-Place: Vendors and Their Selection," Journal of Information Technology (12) 1997, pp 223-237. Morrison, M., and Mezentseff, L. "Learning Alliances: A New Dimension of Strategic Alliances," Management Decision (35:5) 1997, p 351. Mowery, D.C., Oxley, J.E., and Silverman, B.S. "Strategic Alliances and Interfirm Knowledge Transfer," Strategic Management Journal (17:Winter Special Issue) 1996, pp 77-91.

221

Murray, J.Y., and Kotabe, M. "Sourcing Strategies of U.S. Service Companies: A Modified Transaction Cost Analysis," Strategic Management Journal (20:9) 1999, pp 791-809. Nahapiet, J., and Ghoshal, S. "Social Capital, Intellectual Capital, and the Organizational Advantage," Academy of Management Review (23:2) 1998, pp 242-266. Nam, K., Rajagopalan, S., Rao, H.R., and Chaudhury, A. "A Two-Level Investigation of Information Systems Outsourcing," Communications of the ACM (39:7) 1996, p 36. Nevis, E.C., DiBella, A.J., and Gould, J.M. "Understanding Organizations as Learning Systems," Sloan Management Review) 1995, pp 73-85. Ngwenyama, O., and Bryson, N. "Making the Information Systems Outsourcing Decision: A Transaction Cost Approach to Analyzing Outsourcing Decision Problems," European Journal of Operational Research (115:2) 1999, pp 351-367. Nonaka, I. "A Dynamic Theory of Organizational Knowledge Creation," Organization Science (5:1) 1994, pp 14-37. Nonaka, I., and Takeuchi, H. The Knowledge Creating Company Oxford University Press, New York, 1995. Nunnaly Psycometric Theory McGraw-Hill, New York, 1978. Oh, H., Chung, M., and Labianca, G. "Group Social Capital and Group Effectiveness: The Role of Informal Socializing Ties," Academy of Management Journal (47:6) 2004, pp 860875. Osborn, R.N., and Hagedoorn, J. "The Institutionalization and Evolutionary Dynamics of Interorganizational Alliances and Networks," Academy of Management Journal (40:2) 1997, pp 261-278. Ouchi, W.G. "Markets, Bureaucracies, and Clans," Administrative Science Quarterly (25:1) 1980, p 129. Parise, S., and Henderson, J.C. "Knowledge Resource Exchange in Strategic Alliances," IBM Systems Journal (40:4) 2001, pp 908-924. Patane, J.R., and Jurison, J. "Is Global Outsourcing Diminishing the Prospects for American Programmers?," Journal of Systems Management), June 1994, pp 6-10. Pennings, J.M., and Harianto, F. "Technological Networking and Innovation Implementation," Organization Science (3:3) 1992, pp 365-382. Pennings, J.M., Lee, K., and van Witteloostuijn, A. "Human Capital, Social Capital, and Firm Dissolution," Academy of Management Journal (41:4) 1998, p 425. Pennington, A., and Woolcock, P. "The Role of Vendor Companies in IS/IT Outsourcing," International Journal of Information Management (17:3) 1997, pp 199-210. Petersen, K., J., Frayer, D.J., and Scannel, T.V. "An Empirical Investigation of Global Sourcing Strategy Effectiveness," Journal of Supply Chain Management), Spring 2000, pp 29-38. Pinnington, A., and Woolcock, P. "How Far is IS/IT Outsourcing Enabling New Organizational Structure and Competencies?," International Journal of Information Management (15:5) 1995, pp 353-365. Pisano, G. "In Search of Dynamic Capabilities: The Origins of R&D Competence in Biopharmaceuticals," in: The Nature and Dynamics of Organizational Capabilities, G. Dosi, R.R. Nelson and S.G. Winter (eds.), Oxford University Press, New York, 2000. Polanyi, M. Personal Knowledge: Towards a Post-Critical Philosophy Routledge and Kegan Paul, London, 1962. Poppo, L., and Lacity, M.C. "The Normative Value of Transaction Cost Economics: What Managers Have Learned about TCE Principles in the IT Context," in: Information

222

Systems Outsourcing: Enduring Themes, Emergent Patterns, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002a. Poppo, L., and Zenger, T. "Testing Alternative Theories of the Firm: Transaction Cost, Knowledge-Based, and Measurement Explanations for Make-Or-Buy Decisions in Information Services," Strategic Management Journal (19) 1998, pp 853-877. Poppo, L., and Zenger, T. "Do Formal Contracts and Relational Governance Function as Substitutes or Complements?," Strategic Management Journal (23:8) 2002b, p 707. Portes, A. "Social Capital: Its Origins and Applications in Modern Sociology," Annual Review of Sociology (24) 1998, pp 1-24. Powell, W.W. "Learning from Collaboration: Knowledge and Networks in the Biotechnology and Pharmaceutical Industries," California Management Review (40:3) 1998, pp 228240. Powell, W.W. "Neither Market Nor Hierarchy: Network Forms of Organization," Research in Organizational Behavior (12:295-336) 1999. Powell, W.W., Koput, K.W., and Smith-Doerr, L. "Interorganizational Collaboration and the Locus of Innovation: Networks of Learning in Biotechnology," Administrative Science Quarterly (41:1) 1996, p 116. Preece, J. "Supporting Community and Building Social Capital," Communications of the ACM (45:4) 2002, p 37. Putnam, R.D. Making Democracy Work: Civic Traditions in Modern Italy Princeton University Press, Princeton, NJ, 1993. Quinn, J.B. "Outsourcing Innovation: The New Engine of Growth," Sloan Management Review:Summer 2000) 2000, pp 13-28. Quinn, J.B., Anderson, P., and Finkelstein, S. "Leveraging Intellect," Academy of Management Executive (10:3) 1996, pp 7-27. Ramanujan, S., and Lou, H. "Outsourcing Maintenance Operations to Off-Shore Vendors: Some Lessons from the Field," Journal of Global Information Management) 1997, pp 5-15. Reagans, R., and Zuckerman, E.W. "Networks, Diversity, and Productivity: The Social Capital of Corporate R&D Teams," Organization Science (12:4), Jul/Aug 2001 2001, p 502. Reponen, T. "Outsourcing or Insourcing," Fourteenth International Conference on Information Systems, Orlando, FL, 1993, pp. 103-116. Ring, P.S., and Van de Ven, A.H. "Developmental Processes of Cooperative Interorganizational Relationships," Academy of Management Review (19:1) 1994, pp 90-118. Rockart, J.F., Earl, M.J., and Ross, J.W. "Eight Imperatives for the New IT Organization," Sloan Management Review) 1996, pp 43-55. Saaksjarvi, M. "Success of Outsourcing and Strategic Alignment as Predictors of IS Effectiveness," in: Information Systems Outsourcing: Enduring Themes, Emergent Patters, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), SpringerVerlag, New York, 2002. Saunders, C. "Outsourcing: A View from Those Doing the Work," in: Information Systems Outsourcing: Enduring Themes, Emergent Patters, and Future Directions, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer-Verlag, New York, 2002. Saunders, C., Gebelt, M., and Hu, Q. "Achieving Success in Information Systems Outsourcing," California Management Review (39:2) 1997, pp 63-79. Schumpeter, J.A. Capitalism, Socialism and Democracy Haper and Row, New York, NY, 1950.

223

Shepherd, A. "Outsourcing IT in a Changing World," European Management Journal (17:1) 1999, pp 64-84. Simonin, B.L. "The Importance of Collaborative Know-How: An Empirical Test of the Learning Organization," Academy of Management Journal (40:5) 1997, pp 1150-1174. Simonin, B.L. "Ambiguity and the Process of Knowledge Transfer in Strategic Alliances," Strategic Management Journal (20) 1999, pp 595-623. Slaughter, S., and Ang, S. "Employment Outsourcing in Information Systems," Communications of the ACM (39:7) 1996, pp 47-54. Smith, H.A., and McKeen, J.D. "Developments in Practive VII: Developing and Delivering the IT Value," Communications of the Association for Information Systems (11) 2003, pp 438-450. Smith, M.A., Mitra, S., and Narasimhan, S. "Information Systems Outsourcing: A Study of PreEvent Firm Characteristics," Journal of Management Information Systems (15:2) 1998, pp 61-93. Spender, J.C. "Making Knowledge the Basis of a Dynamic Theory of the Firm," Strategic Management Journal (17:Winter Special Issue) 1996, pp 45-62. Steiger, J.H. EzPATH: Causal Modeling SYSTAT Inc., Evanston, IL, 1989. Stuart, T.E. "Interorganizational Alliances and the Performance of Firms: A Study of Growth and Innovation Rates in a High-Technology Industry," Strategic Management Journal (21) 2000, pp 791-811. Subramani, M.R., and Venkatraman, N. "Safeguarding Investments in Asymmetric Interorganizational Relationships: Theory and Evidence," Academy of Management Journal (46:1) 2003, pp 46-62. Szulanski, G. "Exploring Internal Stickiness: Impediments to the Transfer of Best Practice Within the Firm," Strategic Management Journal (17:Winter Special Issue: Knowledge and the Firm) 1996, pp 27-43. Tallon, P.P., Kraemer, K.L., and Gurbaxani, V. "Executives' Perceptions of the Business Value of Information Technology: A Process-Oriented Approach," Journal of Management Information Systems (16:4) 2000, pp 145-173. Teece, D., and Pisano, G. "Collaborative Arrangements and Technology Strategy," Conference on New Technology and New Intermediaries, 1987. Tsai, W. "Social Capital, Strategic Relatedness and the Formation of Intraorganizational Linkages," Strategic Management Journal (21:9) 2000, p 925. Tsai, W. "Knowledge Transfer in Intraorganizational Networks: Effects of Network Position and Absorptive Capacity on Business Unit Innovation and Performance," Academy of Management Journal (44:5) 2001, pp 996-1004. Tsai, W., and Ghoshal, S. "Social Capital and Value Creation," Academy of Management Journal (41:4) 1998, pp 464-476. Tsang, E.W.K. "Organizational Learning and the Learning Organization: A Dichotomy Between Descriptive and Prescriptive Research," Human Relations (50:1) 1997, pp 73-89. Useem, M., and Harder, J. "Leading Laterally in Company Outsourcing," Sloan Management Review), Winter 2000, pp 25-36. Uzzi, B. "The Sources and Consequences of Embeddedness for the Economic Performance of Organizations: The Network Effect," American Sociological Review (61) 1996, pp 647698.

224

Uzzi, B. "Social Structure and Competition in Interfirm Networks: The Paradox of Embeddedness," Administrative Science Quarterly (42) 1997, pp 35-67. Van den Bosch, F.A.J., Volberda, H.W., and de Boer, M. "Coevolution of Firm Absorptive Capacity and Knowledge Environment: Organizational Forms and Combinative Capabilities," Organization Science (10:5) 1999, pp 551-568. Venkatraman, N. "Beyond Outsourcing: Managing IT Resources as a Value Center," Sloan Management Review (38:3) 1997, pp 51-64. Venkatraman, N., and Loh, L. "The Shifting Focus of the IS Organization: From Technical Portfolio to Relationship Portfolio," Information Strategy: The Executive's Journal (10:2) 1994, p 5. von Hippel, E. The Sources of Innovation MIT Press, Cambridge, 1988. Wasko, M.M., and Faraj, S. "Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice," MIS Quarterly (29:1) 2005, pp 33-57. Whitten, D. "User Information Satisfaction Scale Reduction: Application in an IT Outsourcing Environment," Journal of Computer Information Systems (45:2) 2004, pp 17-26. Willcocks, L.P., and Choi, C.J. "Co-operative Partnership and Total IT Outsourcing: From Contractual Obligation to Strategic Alliance?," European Management Journal (13:1) 1995a, pp 67-78. Willcocks, L.P., Fitzgerald, G., and Feeny, D.F. "Outsourcing IT: The Strategic Implications," Long Range Planning (28:5) 1995b, pp 59-70. Willcocks, L.P., Hindle, J., Feeny, D.F., and Lacity, M.C. "IT and Business Process Outsourcing: The Knowledge Potential," Information Systems Management (21:3) 2004, pp 7-15. Willcocks, L.P., and Kern, T. "IT Outsourcing as Strategic Partnering: The Case of the UK Inland Revenue," European Journal of Information Systems (7) 1998, pp 29-45. Willcocks, L.P., Lacity, M.C., and Fitzgerald, G. "Information Technology Outsourcing in Europe and the USA: Assessment Issues," International Journal of Information Management (15:5) 1995c, pp 333-351. Williamson, O.E. Markets and Hierarchies, Analysis and Antitrust Implications: A Study in the Economics of Internal Organization Free Press, New York, 1975. Williamson, O.E. The Mechanisms of Governance Oxford University Press, New York, 1996. Yin, R.K. Applications of Case Study Research Sage, Newbury Park, CA, 1993. Yin, R.K. Case Study Research, (Second Edition ed.) Sage Publication, Inc., Thousand Oaks, CA, 1994. Yli-Renko, H., Autio, E., and Sapienza, H.J. "Social Capital, Knowledge Acquisitions, and Knowledge Exploitation in Young Technology-Based Firms," Strategic Management Journal (22:6/7) 2001, p 587. Yoshino, M., and Rangan, U.S. Strategic Alliances: An Entrepreneurial Approach to Globalization Harvard Business School Press, Boston, MA, 1995. Young-Ybarra, C., and Wiersema, M. "Strategic Flexibility in Information Technology Alliances: The Influence of Transaction Cost Economics and Social Exchange Theory," Organization Science (10:4) 1999, pp 439-459. Zahra, S.A., and George, G. "Absorptive Capacity: A Review, Reconceptualization, and Extension," Academy of Management Review (27:2) 2002, pp 185-203. Zellner, A., and Theil, H. "Three-Stage Least Squares: Simultaneous Estimation of Simultaneous Equations," Econometrica (30:1) 1962, pp 54-78.

225



doc_746217688.pdf
 

Attachments

Back
Top