Table of Contents Author Guidelines Submit a Manuscript
Discrete Dynamics in Nature and Society
Volume 2015, Article ID 325890, 10 pages
http://dx.doi.org/10.1155/2015/325890
Research Article

A Novel Dynamic Algorithm for IT Outsourcing Risk Assessment Based on Transaction Cost Theory

1School of Tourism and City Administration, Zhejiang Gongshang University, Hangzhou 311018, China
2College of Computer Science & Information Engineering, Zhejiang Gongshang University, Hangzhou 311018, China

Received 23 July 2014; Accepted 12 August 2014

Academic Editor: Zhigang Jiang

Copyright © 2015 Guodong Cong and Tinggui Chen. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. Ju and T. Chen, “Simplifying multiproject scheduling problem based on design structure matrix and its solution by an improved aiNet algorithm,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 713740, 22 pages, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  2. T. Chen and R. Xiao, “A dynamic intelligent decision approach to dependency modeling of project tasks in complex engineering system optimization,” Mathematical Problems in Engineering, vol. 2013, Article ID 398123, 12 pages, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  3. T. Chen and R. Xiao, “Enhancing artificial bee colony algorithm with self-adaptive searching strategy and artificial immune network operators for global optimization,” The Scientific World Journal, vol. 2014, Article ID 438260, 12 pages, 2014. View at Publisher · View at Google Scholar · View at PubMed
  4. F. Wiengarten, M. Pagell, and B. Fynes, “The importance of contextual factors in the success of outsourcing contracts in the supply chain environment: the role of risk and complementary practices,” Supply Chain Management, vol. 18, no. 6, pp. 630–643, 2013. View at Google Scholar
  5. L. M. Abdullah and J. M. Verner, “Analysis and application of an outsourcing risk framework,” Journal of Systems and Software, vol. 85, no. 8, pp. 1930–1952, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. H. Barki, S. Rivard, and J. Talbot, “Toward an assessment of software development risk,” Journal of Management Information Systems, vol. 10, no. 2, pp. 203–225, 1993. View at Google Scholar · View at Scopus
  7. T. Herath and R. Kishore, “Offshore outsourcing: risks, challenges, and potential solutions,” Information Systems Management, vol. 26, no. 4, pp. 312–326, 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Agrawal, G. Hariharan, H. R. Rao, and R. Kishore, “Competition in mediation services: modeling the role of expertise, satisfaction and switching costs,” Journal of Organizational Computing and Electronic Commerce, vol. 23, no. 3, pp. 169–199, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. W. L. Currie, “A knowledge-based risk assessment framework for evaluating web-enabled application outsourcing projects,” International Journal of Project Management, vol. 21, no. 3, pp. 207–217, 2003. View at Publisher · View at Google Scholar · View at Scopus
  10. M. H. A. Tafti, “Risks factors associated with offshore IT outsourcing,” Industrial Management and Data Systems, vol. 105, no. 5, pp. 549–560, 2005. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Welborn, “Using FMEA to assess outsourcing risk,” Quality Progress, vol. 40, no. 8, pp. 17–21, 2007. View at Google Scholar · View at Scopus
  12. Z. P. Fan, W. Suo, and B. Feng, “Identifying risk factors of IT outsourcing using interdependent information: an extended DEMATEL method,” Expert Systems with Applications, vol. 39, no. 3, pp. 3832–3840, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Kuo and S. Lu, “Using fuzzy multiple criteria decision making approach to enhance risk assessment for metropolitan construction projects,” International Journal of Project Management, vol. 31, no. 4, pp. 602–614, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Samantra, S. Datta, and S. S. Mahapatra, “Risk assessment in IT outsourcing using fuzzy decision-making approach: an Indian perspective,” Expert Systems with Applications, vol. 41, pp. 4010–4022, 2014. View at Google Scholar
  15. J. Goo, R. Kishore, H. R. Rao, and K. Nam, “The role of service level agreements in relational management of information technology outsourcing: an empirical study,” MIS Quarterly: Management Information Systems, vol. 33, no. 1, pp. 119–146, 2009. View at Google Scholar · View at Scopus
  16. L. Rusu and G. Hodosi, “Assessing the risk exposure in IT outsourcing for large companies,” International Journal of Information Technology and Management, vol. 10, no. 1, pp. 24–44, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. F. K. Alaghehband, S. Rivard, S. Wu, and S. Goyette, “An assessment of the use of transaction cost theory in information technology outsourcing,” Journal of Strategic Information Systems, vol. 20, no. 2, pp. 125–138, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. K. Osei-Bryson and O. K. Ngwenyama, “Managing risks in information systems outsourcing: an approach to analyzing outsourcing risks and structuring incentive contracts,” European Journal of Operational Research, vol. 174, no. 1, pp. 245–264, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. B. Bahli and S. Rivard, “The information technology outsourcing risk: a transaction cost and agency theory-based perspective,” Journal of Information Technology, vol. 18, no. 3, pp. 211–221, 2003. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Bahli and S. Rivard, “Validating measures of information technology outsourcing risk factors,” Omega, vol. 33, no. 2, pp. 175–187, 2005. View at Publisher · View at Google Scholar · View at Scopus
  21. A. S. Bharadwaj, “A resource-based perspective on information technology capability and firm performance: an empirical investigation,” MIS Quarterly, vol. 24, no. 1, pp. 169–193, 2000. View at Publisher · View at Google Scholar · View at Scopus
  22. R. Kishore, M. E. Swinarski, E. Jackson, and H. R. Rao, “A quality-distinction model of IT capabilities: conceptualization and two-stage empirical validation using CMMi processes,” IEEE Transactions on Engineering Management, vol. 59, no. 3, pp. 457–469, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. M. J. Earl, “The risks of outsourcing IT,” Sloan Management Review, no. 3, pp. 26–32, 1996. View at Google Scholar
  24. R. Santhanam and E. Hartono, “Issues in linking information technology capability to firm performance,” MIS Quarterly, vol. 27, no. 1, pp. 125–153, 2003. View at Google Scholar · View at Scopus
  25. N. Melville, K. Kraemer, and V. Gurbaxani, “Information technology and organizational performance: an integrative model of it business value,” MIS Quarterly, vol. 28, no. 2, pp. 283–322, 2004. View at Google Scholar · View at Scopus
  26. P. P. Tallon, “A process-oriented perspective on the alignment of information technology and business strategy,” Journal of Management Information Systems, vol. 24, no. 3, pp. 227–268, 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. N. Shin, “The impact of information technology on the financial performance of diversified firms,” Decision Support Systems, vol. 41, no. 4, pp. 698–707, 2006. View at Publisher · View at Google Scholar · View at Scopus
  28. S. Gregor, M. Martin, W. Fernandez, S. Stern, and M. Vitale, “The transformational dimension in the realization of business value from information technology,” Journal of Strategic Information Systems, vol. 15, no. 3, pp. 249–270, 2006. View at Publisher · View at Google Scholar · View at Scopus
  29. W. Oh, M. J. Gallivan, and J. W. Kim, “The market's perception of the transactional risks of information technology outsourcing announcements,” Journal of Management Information Systems, vol. 22, no. 4, pp. 271–303, 2006. View at Publisher · View at Google Scholar · View at Scopus
  30. L. Qin, H. Wu, N. Zhang, and X. Li, “Risk identification and conduction model for financial institution IT outsourcing in China,” Information Technology and Management, vol. 13, no. 4, pp. 429–443, 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. H. Xia, D. Li, J. Zhou, and J. Wang, “Fuzzy LINMAP method for multiattribute decision making under fuzzy environments,” Journal of Computer and System Sciences, vol. 72, no. 4, pp. 741–759, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  32. Y. L. P. Thorani, P. P. B. Rao, and N. R. Shankar, “Ordering generalized trapezoidal fuzzy numbers,” International Journal of Contemporary Mathematical Sciences, vol. 7, pp. 555–573, 2012. View at Google Scholar