ABSTRACT - University of Waterlooaccounting.uwaterloo.ca/seminars/old_papers/Stratopoulos... · 3...
-
Upload
nguyentruc -
Category
Documents
-
view
213 -
download
0
Transcript of ABSTRACT - University of Waterlooaccounting.uwaterloo.ca/seminars/old_papers/Stratopoulos... · 3...
Outsourcing Alliances: A Strategic Alternative for IT Capable Companies
By
Theophanis C. Stratopoulos Department of Decisions Sciences
University of New Hampshire [email protected]
Peter Lane
Department of Management University of New Hampshire
And
Mihir A. Parikh Department of Management Information Systems
University of Central Florida [email protected]
ABSTRACT While previous research has focused on choosing between insourcing or outsourcing, no systematic attempt has been made to find a viable alternative for IT capable companies, which need to realize optimum value from their IT capabilities. This study reviews the IT outsourcing and strategic management literature and identifies outsourcing alliances as a strategic alternative to the traditional arms-length outsourcing for IT capable companies. By building an outsourcing alliance with complementary partners, an IT capable company can go beyond its internal market for IT services to provide similar and, even new, IT services to third parties. Grounded in transaction cost economics, relational theory, and the theory on reciprocal learning alliances, this study develops a model in which the IT capable company can earn collaboration-, transaction-, and firm-specific quasi rents through outsourcing alliance. Keywords Outsourcing, Business Value of IT, IT capability, competitive advantage, relational theory, transaction cost economics, reciprocal-learning alliances.
2
1. INTRODUCTION
Over past two decades, IT outsourcing has grown dramatically in terms of both
the volume and the sophistication of deals. The importance of this trend has lead
researchers to examine many aspects of IT outsourcing including best practices (Lacity
and Willcocks 1998), drivers and determinants (Clark et al 1995; Loh and Venkatraman,
1992; Goo, et al 2000), risks and benefits (Lacity and Hirschheim, 1993), hidden costs
(Barthelemy, 2001), and client-vendor relationships (McFarlan and Nolan, 1995; Klepper
1995; Kern, 1997; Kern and Willcocks 2000, 2002; Lacity and Willcock 2000).
These studies have identified two primary reasons for outsourcing: to receive IT
services that are required but not available from the internal IT organization, perhaps due
to the lack of skills or capital; and to reduce the cost of IT operations. For the
organizations that have limited internal IT capabilities, outsourcing provides a quick and
cost-effective way to acquire necessary IT services. However, for the IT capable
organizations, i.e. the organizations with “overall ability to sustain IT innovation and
respond to changing market conditions through focused IT applications” (Bhardwaj, et al.
1999, p. 381), outsourcing is simply a cost-cutting measure. Many studies have found
that outsourcing only for the cost reduction purposes has often not been successful.
In this paper, we discuss an alternate for IT capable companies to reduce cost by
leveraging their internal IT capabilities to explore external markets through outsourcing
alliances. We define outsourcing alliance as, “an alliance formed by a firm’s internal IT
organization with one or more organizations, with marketing, complementary IT, or
other capabilities and resources, for the purpose of using its internal IT capabilities to
3
provide IT services to other organizations.” Outsourcing by Cathay Pacific Airways
provides a good example to illustrate our argument (McFarlan and Young, 2003).
Over the years, this Hong Kong-based airline’s IT organization grew with the
company and was developing and managing internal IT needs. Its data center was
responsible for coordinating fundamental airline IT services such as reservations,
ticketing, cargo handling, etc. These services are critical for all major airlines and require
a robust IT infrastructure. In 1997, during a period when Cathay was under a lot of
pressure to cut costs, it decided to outsource its data center to IBM Global Services. A
few years later, IBM used the former Cathay data center to serve several dozens of
clients, including a number of major airlines in Australia, Korea, and Japan. Evidently,
IBM Global Services combined its own marketing and other expertise with the
‘outsourced’ IT capability of Cathay’s data center and the talented pool of Cathay
employees, to gain a successful regional presence for itself. Meanwhile, Cathay was
preparing for another round of IT outsourcing. An alternate for Cathay might have been
to form an alliance with IBM or similar companies to combine their expertise with its
internal IT capabilities and turn its IT organization into a revenue center by offering the
services to other organization, including other airlines.
While several studies have examined outsourcing as a way of acquiring required
IT capabilities at a lower cost, here we present a unique outsourcing possibility for some
IT organizations in which they increase their contributions beyond simply meeting the
internal IT needs of their parent firms by outsourcing their own IT capabilities through
outsourcing alliances. We develop theoretical basis for such outsourcing alliances
through transaction cost economics, relational theory, and reciprocal learning alliance
4
perspectives. We expect the theoretical base would help researchers to understand better
the diverse and complex set of outsourcing options and unify this unique outsourcing
option with other research in outsourcing (Bacharach, 1989). Building on the work of
Madhok and Tallman (1998), we also articulate transaction-, collaboration-, and firm-
specific quasi rents, which make outsourcing alliance a viable alternative for IT capable
companies.
The remaining paper is organized as follows: The next section presents a
constrained value adding maximization problem faced by IT organizations that service
internal markets. We expand to model to include opportunity cost incurred by IT capable
companies and illustrate the natural shift toward outsourcing as the quantity of the IT
services used by the company increases. The third section offers outsourcing alliance as
an alternative for IT capable companies. Outsourcing alliances provide IT services to
third parties with an aim to realize optimum value for the IT capable company. The
fourth section discusses viability of outsourcing alliances with special focus on quasi
rents generated by them and offers overall value creation framework. The fifth section
identifies implications for research and practice. The final section provides conclusions
and directions for future research.
2. IT ORGANIZATION SERVING INTERNAL MARKETS
The main objective of the IT organization of a company is to maximize the value
of its contribution to the company. This goal will materialize to the extent that the IT
organization delivers the portfolio of desired IT services (the effectiveness aspect) at the
lowest possible cost (the efficiency aspect). Given most IT organizations provide IT
5
services only to their own companies, this can be captured in the following constrained
value adding maximization problem [1]1:
HH
HHHHHHHH
QQts
DQGDQCQDQPVˆ..
)},ˆ(),({*),(max
≤
+−= [1]
Where:
VH is the net value that the IT organization contributes to the company; PH is the
internal transfer price for an IT service delivered; D is the quality of the IT service based
on its design/customization; QH is the quantity of the IT service delivered by the internal
IT organization; Q̂ H is the total quantity of the IT service that the internal IT organization
can profitably deliver; PH(.) represents the internal demand curve for the IT service;
PH(.)QH represents the gross value that the IT service adds to the parent company.
Assuming a typical downward sloping demand curve, the function and shape of PH(.)QH
will be strictly concave.
CH(.) represents the development and support cost of the IT service and it is the
sum of these two costs. Development cost is primarily driven by the quality of the IT
service [ )(DCC tDevelopmen = ]; it is high during the early stages of systems development
lifecycle and reduces as the development lifecycle completes over time. Support cost is
primarily driven by the quantity of the IT service [ )|( DQCC HSupport = ]. It is relatively
low during the early stages and gradually increases over time, because the IT
organization needs to support more users [QH] as they adopt the IT service. Once the
application has been completely adopted within the company the support cost is almost
flat and the only chances for increase will be associated with such things as employee
1 See Appendix A for properties of VH.
6
turnover, training, support etc. Governance cost [ (.)HG ] is the cost of managing the IT
capabilities via an internal hierarchical structure. The cost of managing the IT capability
relates to [ Q̂ H] the total quantity of the IT service that the internal IT organization can
profitably deliver.2
This maximization process is subject to the constraint that the IT service delivered
by the IT organization [QH] is less or equal to the maximum quantity of IT services [ Q̂ H]
the IT organization can profitably deliver. When the IT organization cannot deliver the
quantity of the IT service required by the company at a specific quality, it would have to
pursue an external source for the additional needs, which would be categorized as IT
outsourcing. However, when the IT organization has higher IT capabilities than those
used by the company, there is an opportunity cost of not using those capabilities to
generate additional rents.
2.1. Opportunity Cost
From an economic standpoint, the IT organization ought to utilize its IT
capabilities in areas with the highest value adding potential, i.e., minimize the
opportunity cost. By servicing only the internal market, the IT organization is incurring
the opportunity cost related to not utilizing its capabilities for external markets. While
often ignored by IT organizations and companies, this cost can significantly change the
2 Asset specificity (AS), the degree to which assets can be redeployed without losing their value, is a significant attribute of governance cost when comparing alternative governance structures (Williamson, 1981). AS is not included in GH(.) because we concentrate on the internal IT organization. We will introduce AS in GH(.) and we will discuss its shape in detail in our Discursion of Transaction-Specific Quasi Rents when we compare alternative governance structures.
7
net value added by the IT organization. The equation [1] is revised below to reflect this
opportunity cost.
HH
HHHHHHHHHH
QQts
ASDQODQGDQCQDQPVˆ..
)},,ˆ(),ˆ(),({*),(max
≤
++−= [2]
Where: OH(.) is the opportunity cost of not fully utilizing the IT capabilities of the
IT organization; and AS is the asset specificity, i.e., the degree to which IT assets used by
the IT organization can be redeployed to serve internal and external markets without
losing their value. Opportunity cost is primarily driven by AS [ ),ˆ|( DQASCO HH = ] and
its value increases as AS decreases. High AS implies that the IT assets are unique, hence
useful only to the company (low opportunity cost). Low AS implies that the IT assets are
not unique, hence also useful to external markets (high opportunity cost).
During the early stages of systems development life cycle (planning, analysis and
design, development), when the quantity of IT service delivered by the internal IT
organization [QH ] is low, the AS is high. On the other hand, during the late stages of
systems development life cycle (maintenance and end-user support), when QH is high, the
AS is low (Grover et al., 1996).
We illustrate the decomposition of the IT organization’s cost structure
[CH(.)+GH(.)+OH(.)] as the sum of development Cost [ )(DCC tDevelopmen = ]; support cost
[ )|( DQCC HSupport = ]; Governance cost [ (.)HG ], and opportunity cost
[ ),ˆ|( DQASCO HH = ] in Figure 1.
8
2.2. Overall Value Proposition of IT Organization
Figure 2 captures the incremental net value added [VH] during the lifecycle of a
typical IT service as the difference between the gross value added [PH(.)QH] and cost
structure [CH(.)+GH(.)+OH(.)]. The shape and shifts in the net value added curve will be
driven by changes in the gross value added and cost structure.
As the quantity of the IT service offered by the IT organization increases, the
change in the value added by the IT organization can be partitioned into three stages: 1)
the added value is initially negative but increases with quantity to a breakeven point; 2)
the added value is positive and increasing; 3) the added value is initially positive but
diminishing and eventually becomes negative. During the first stage, the incremental net
Figure 1 Cost Structure
CH+GH+OH
COpportunity
GH
CSupport
CDevelopment
$
QHigh Asset Speficity Low Asset Speficity
9
value added of the IT service is primarily driven by the high development cost. Support
cost is negligible, as the company has not adopted the IT service in its operations. Asset
specificity is high and the opportunity cost is low.
Figure 2 Net Value Added [VH]
$
Q
PH(.)QH
VH
[ STAGE 1 ] [ STAGE 2 ] [ STAGE 3 ]
CH+GH+OH
During the second stage the value added is positive and rising at a decreasing rate.
This rise is fueled by a successful transition of users from an old, inefficient, and
ineffective process to a new one enabled by the IT service. This implies that users can
exploit the IT service to contain the cost per transaction and in operations, as well as to
exploit opportunities for revenue increase (growth). In this second stage, while
development cost is quickly diminishing as major bugs have been removed from the IT
service, support cost is increasing rapidly as new users are added continuously to the new
10
system. Opportunity cost remains relatively low as the IT resources are employed in a
high value-adding project. However, success brings peer-recognition and the competitive
mechanism is set in motion as competitors adopt or start developing similar IT
systems/services leading to a gradual decline of the related IT system’s asset specificity.
In the third and final stage, the value added is initially positive, though
diminishing and gradually approaching zero. However, given the positive relationship
between asset specificity and net value added at low levels of asset
specificity ⎟⎠
⎞⎜⎝
⎛>
∂∂
0ASVH , the continuous decline in AS implies that the net value added
[VH] will eventually become negative. Two empirical studies found evidence relating the
visibility of an IT capability (Dehning and Stratopoulos, 2003) or strategic initiative
(Chen and Miller, 1994) to firm performance. The former study found the higher the
visibility of an IT capability, the smaller the duration of its competitive advantage. The
latter study found that highly visible strategic initiatives potentially had an adverse effect
on financial performance.
In the context of our analysis, the effect of peer recognition will lead to increasing
adoption of the IT service as ‘best practice’ within the industry. This further diminishes
the value of the asset specificity related advantage. In the meantime, while the
development cost is minimal and the support cost has plateau, the opportunity cost is
rising as the IT resources are tied up to what is gradually becoming an industry-best
practice. As asset specificity further decreases, the opportunity cost increases
significantly for the IT organization.
We moved over time from a period when scarcity of the IT service was the source
of rent (Ricardian rent) to a period when the source of rent was associated with the
11
immobility of the resource due to its association with the particular IT capable firm
(Pareto quasi rent). In the end, technological developments and market forces gradually
eroded the asset specificity leading to the commoditization of the IT service and an
elimination of all IT enabled rents.
2.3. Natural Shift Towards Outsourcing
As the net value added decreases over time, the company needs to make a
decision regarding the future governance of the IT service. Either maintain the current
structure (hierarchy governance mode) or outsource the IT service to a vendor (market
governance mode). From a competitive standpoint, trying to maintain a hierarchical
structure in the face of increased commoditization (declining AS) is a Sisyphean task. The
outsourcing option would be to acquire all IT services from the market. Outsourcing
assumes that vendor enjoys economies of scale (e.g. large dedicated IT services
companies like IBM, EDS, and HP) or operates in a low cost environment (e.g. offshore
companies like TCS, Infosys, and Wipro). Thus, they would be able to offer a greater
value proposition. The net value adding maximization problem for the outsourcing
scenario would be:
_..
)},,(),({*),(max
QQts
ASDQGDQCQDQPV
H
HMHMHHMM
≤
+−= [3]
Where: VM is the net value that the company enjoys by acquiring the IT service
through the market, i.e., through an outsourcing vendor; PM(.) is the company’s demand
curve for the externally provided IT service; CM(.) is the cost that the vendor charges for
12
delivering the IT service; GM(.) is the cost of maintaining a arms-length relationship with
the vendor; and _Q is the maximum quantity of IT service that the company can absorb.
Outsourcing would be beneficial for the company if the net value added of the IT
organization is lower than the value of outsourcing [VM > VH]. With assumption of non-
changing demand curves [PH(.)=PM(.)], that would be possible if the vendor’s cost
structure is lower than that of the internal IT organization,
i.e. (.)}(.){ MM GC + < (.)}(.)(.){ HHH OGC ++ .
Companies have made decision regarding outsourcing based on these two polar
governance modes - insourcing and outsourcing. However, in the next section, we
propose outsourcing alliances as an intermediate alternative for IT capable companies.3
3. OUTSOURCING ALLIANCE SERVING EXTERNAL MARKETS
The model in the previous section captures the spirit of the problem that the IT
organization is facing in the sense that it deals with both efficiency and effectiveness in
the context of a limited internal market [ HH QQ ˆ≤ ]. The IT organization is evaluated in
its ability to deliver the optimum amount [QH] and quality [D] of the IT service at an
internally accepted price [PH] while trying to maintain a competitive cost structure.
IT services, historically, have been support activities (Porter and Millar 1985).
Therefore, the market for the IT capabilities of the IT organization is limited within the
domain of the company. From a competitive standpoint, a comparison of the IT
organization with external providers would put it in a position of relative disadvantage
3 Our proposition is inline with the recommendation of Lacity and Willcocks (1998) for selective outsourcing as a more successful outsourcing approach.
13
due to its captive-supplier positional inability [ HH QQ ˆ≤ ]. Thus, the company might not
be able to fully appropriate the potential rents associated with its IT capability due to
internal market limitations. The size of the internal market becomes a binding constraint
that determines the upper limit in terms of gains in both effectiveness and efficiency that
the IT organization can attain. Further gains could be obtained by exploiting economies
of scale and scope. However, this implies offering the IT service to third party clients.
An IT organization may be fully capable in terms of the technical aspects of the
IT service to provide it to third party clients. Nevertheless, given the inherent lack of
marketing and capital structures in internal IT organizations, the IT organization may not
have the skills necessary to market and manage external contracts with third parties. In
some cases, it may even need complementary IT capabilities to offer a stronger value
proposition to third parties. Thus, they need to build an outsourcing alliance with one or
more organizations that have marketing, complementary IT, or other capabilities and
resources. In this alliance, the company contributes its expertise in developing and
supporting an IT service and the alliance partner contributes its expertise in managing
and marketing the sale of the IT service to third party clients. The objective is to use
internal IT capabilities to develop and offer IT services that other organizations may find
valuable.
The option of outsourcing alliances not only removes the “market size” constraint
from the value adding maximization problem but also offers unique competitive
opportunities to the partnering companies to exploit governance efficiency, as well as
economies of scale and scope. While continuing to serve the company’s internal market,
14
the alliance would also provide the IT service to other organizations as well as develop
additional IT service. This leads to the following value added maximization model [4]:
}{00..
),,,,();,,(
*),,(*),,(*),(max
≥>
+++−
−++=
ITNewA
ITNewAHAITNewAHA
ITNewITNewITNewAAAHHHA
QandQts
ASDQQQGSASDQQQC
QASDQPQASDQPQDQPV
[4]
Where:
VA is the portion of the net value that the alliance adds to the company; PH(.)QH is
the gross value that the IT organization adds to the company’s internal market; PA(.) is
the external (alliance’ clients) demand curve for the existing IT service; QA is the quantity
of the IT service sold through the outsourcing alliance to third party clients; PA(.)QA is the
gross value generated for the company by the alliance through its service to third party;
PNew IT (.) is the demand curve for a new, alliance-developed IT service; QNew IT is the
quantity of the new IT service sold through the outsourcing alliance; PNew IT (.)QNew IT is
the gross value generated for the company by the alliance through its new IT service.
CA(.) is the cost of supplying the IT service [QH+ QA+QNew IT ], while capturing the
positive effects of combinatorial economies of scope [S]; GA(.) captures the transactional
governance costs of supplying the IT service through an outsourcing alliance. Since the
alliance enables the IT organization to optimize the allocation of its resources, hence
capture the full rent from its IT capabilities, the opportunity cost is negligible. The
constraint QA>0 captures the fact that the alliance would not exist unless it manages to
generate new clients. The constraint QNew IT ≥ 0 captures the fact that the alliance may
develop new IT services through synergy between the IT organization and its alliance
partner.
15
In the following section, we will leverage various management theories,
transaction cost economies, relational theory view, and reciprocal learning alliances, in
order to better understand the theoretical basis for outsourcing alliances.
4. DISCUSSION
Building on Madhok and Tallman (1998), we argue that IT capable companies
will enter into outsourcing alliances because they are expected to yield superior value
added when compared to alternate governance forms. The value of an outsourcing
alliance arises from its ability to generate transaction-specific, collaboration-specific, and
firm-specific quasi rents for its members.
Transaction-specific quasi rents occur due to the unique transaction undertaken
through the formation of the outsourcing alliance. According to Williamson (1981; pp.
1543-44) transaction costs include “ex ante costs of negotiating and writing as well as ex
post costs of executing, policing, and, when disputes arise, remedying the explicit or
implicit contract that joins them.” An outsourcing alliance will yield transaction-specific
quasi rents for the IT capable company if:
),ˆ(),,(),,,,( DQGASDQGASDQQQG HHHMITNewAHA ≤≤
Collaboration-specific quasi-rents arise from the combination of resources of both
partners into a synergistic bundle that enables them to attain value added levels which the
partners could not have been able attain individually (Madhok and Tallman 1998). An
outsourcing alliance will yield collaboration-specific quasi rents for its members through
three possible venues: First, through revenue growth from optimal utilization, i.e. the
company offers the same IT service to third party clients:
16
0*),,( ≥AAA QASDQP
Second, through revenue growth from economies of scope, i.e. the alliance
partners can develop new IT services:
0*),,( ≥ITNewITNewITNew QASDQP
Third, through production efficiencies:
H
HH
M
HM
ITNewAH
ITNewAHA
QDQC
QDQC
QQQSASDQQQC ),ˆ(),();,,(
≤≤++
++
Firm-specific quasi rents stem from resources and capabilities which are valuable,
rare and not easily replicable by the competition. An outsourcing alliance may generate
such rents for its partners through positive spillovers. The IT capable company may be
able to develop new knowledge which when combined with its unique resources may
increase the company’s rent-generating capacity outside of alliance (Khanna 1998;
Madhok and Tallman 1998; Lubatkin, Florin and Lane 2001). In the following sections
we discuss, how these rents are appropriated and develop specific proposition for each.
4.1. Transaction-Specific Quasi Rents
Transaction cost economics (TCE) provides the foundation for understanding
transaction-specific rents in outsourcing alliances. TCE has been one of the most favored
frameworks when it comes to questioning which activities to perform within the firm,
which to perform outside, and why (Williamson 1981b, 1985) and specifically in IT
outsourcing (Ang and Straub 1998; Aubert, et al. 2004; Ngwenyama & Bryson 1999). It
makes the transaction, rather than the product or service, the basis of analysis to evaluate
the ability of governance structures in determining the most efficient mode of structuring
17
and managing the transaction (Ngwenyama & Bryson 1999). If transaction costs are
substantial and exceed the production cost advantages of market, a firm will make
components in-house and vice versa (Williamson 1991). Thus, as transaction cost
increases, it erodes the benefits of production cost made available by IT outsourcing
vendors (Ang and Straub, 1998). Among the dimensions of transaction costs, asset
specificity has played an essential role in determining the degree of transaction cost and
its corollary on the make-or-buy decisions (Williamson 1991). In IT outsourcing, as
asset specificity increases, the contractual clauses become more complex and numerous
leading to greater transaction cost (Aubert, et al. 2004).
While hierarchies and markets are the main alternatives, Williamson (1991)
introduced the hybrid mode, the equivalent of outsourcing alliance in the context of this
study, as an alternative to the two polarizing governance modes. The hybrid or mixed
mode, is considered as being an in between governance structure with respect to the three
governance characteristics of incentives, adaptability, and bureaucratic costs. In the spirit
of Williamson’s argument we have that the outsourcing alliance, by preserving some
ownership autonomy helps the partners maintain strong individual incentives in their area
of expertise and encourages adaptation to market and technological disturbances to which
one party corresponds efficiently without consulting the other. However, because of the
strong dependency between the partners, long-term contracts are supported by elaborate
contractual agreements. Compared to an arms-length outsourcing deal, the outsourcing
alliance sacrifices individual incentive intensity in favor of superior coordination among
the partners. When compared with the hierarchy, the outsourcing alliance sacrifices
cooperativeness in favor of greater individual incentive intensity.
18
The above argument is summarized in Figure 3, which expresses governance
costs for each one of the considered governance structures – internal IT organization or
hierarchy, outsourcing alliance or hybrid, and market or third party arms-length
outsourcing vendors - as a function of asset specificity.4
Three aspects are important in Figure 3. First, the intercept for market
governance cost is higher than the intercept of the hierarchy and the slope for market
governance cost is dropping at a faster rate than the slope of the hierarchy at the high AS
range. The slope for the hierarchy is relatively flat as asset specificity does not
significantly influence governance cost in the hierarchical forms. High asset specificity
4 Figure 3 is an adaptation of a figure from Williamson 1991, page 284.
Figure 3 Transaction Specific Quasi Rents
19
may require slightly more specialized governance mechanisms than low asset specificity,
but the difference is marginal and insignificant compared to that for other forms.
)|,()|,,,()|,ˆ( maxmaxmax === ≤≤ ASDQGASDQQQGASDQG HMITNewAHAHH
( ) ( ) ( )ASASAS ∂∂
<∂∂
<∂∂ MAH GGG
This reflects the fact that the bureaucratic costs of the market are higher than
those of the internal IT organization, if asset specificity is high, but they fall at a faster
rate as asset specificity is declining. In addition to high asset specificity, the significant
difference in the intercepts between the market and hierarchies can be attributed to
uncertainty and fear of opportunism (Williamson 1979). Assuming that the development
and support of an IT service, which requires investment in highly specialized assets, were
to be arranged to be delivered by a bilateral market agreement, both client and vendor
would want safeguards against the risk of opportunistic behavior. If asset specificity is
high it is not easy for the client to switch to another vendor or for the vendor to find
another client. Safeguarding against such risk increases the governance cost and an
environment of uncertainty can make it higher. The introduction of an innovative IT
service is likely to coincide and contribute to environmental uncertainty. Delivery of
such a service through a market mechanism implies that neither client not vendor could
be able to anticipate all possible contingencies (bounded rationality), and they need
safeguards against such an uncertainty.
Second, the intercept and slope of the governance cost of the outsourcing alliance
is in between those of the internal IT organization and market. The intercept of the
outsourcing alliance will be lower than the market mode and closer to a hierarchy,
because the risk of opportunistic behavior and uncertainty is smaller in a transaction that
20
is determined by a common goal rather than pursuit of individual interests. As the asset
specificity is declining, the slope of the outsourcing alliance will drop at a faster rate than
that of the internal IT organization and closer to that of a market’s governance structure
because the alliance will behave like a market model.
Third, from an economizing standpoint a firm should move along the lower
‘envelope’ of governance structure as asset specificity is declining. The interpretation of
Figure 3 can be seen as an extension of our discussion on Figure 2. At the early stages,
the IT organization introduces an innovative IT service with high asset specificity and the
company will exploit the Ricardian type of rents. The gradual decline in asset specificity
(scarcity) will be counterweighted by the fact that the IT service has been introduced by
an IT capable company leading to a transition from Ricardian to Pareto type quasi rents.
From a governance standpoint, the hierarchical mode remains the most efficient form of
governance. However, as a result of technological developments and increased
competition, the degree of commoditization of the IT service is increasing, and the parent
company will need to start re-evaluating their governance options (hierarchy, hybrid, and
market).
In Figure 3, we are sliding along the hierarchy curve towards point A and the
company will have to choose one of the following paths: Fist, continue offering the IT
service internally. This means a movement along the AB range on the hierarchy curve.
Second, divest the resources related to the IT service by entering into an arms-length
outsourcing deal. This scenario is captured by a movement along the AB range in the
hierarch curve, and then along the BC range on the market curve. The reduction in
governance cost as a result of the switch from a hierarch to a market structure is captured
21
in area between the market and hierarchy curve to the left of point B. In the last path, an
IT capable company that considers an outsourcing alliance will move along the lower
(efficient) frontier by transitioning from hierarchy to hybrid to market. The shaded area
in Figure 3 captures the incremental reduction in governance cost.
∫∫ −+−=∆ C
B
B
A
AS
AS AM
AS
AS AH GGGGG )()(
This leads to the following propositions:
P1a: The likelihood that the outsourcing alliance will be able to appropriate
transaction-specific quasi rents is increasing as asset specificity declines, i.e. the IT
service is approaching the commoditization stage.
P1b: The magnitude of transaction-specific quasi rents decreases as the asset
specificity declines.
4.2. Collaboration-Specific Quasi Rents
One of the limitations of TCE is the fact that it concentrates on transaction costs
and governance efficiencies. This means that the only benefits that the partners of an
outsourcing alliance jointly exploit are associated with transaction specific quasi rents.
Such an approach might have been appropriate had we adopted a more restrictive
definition of outsourcing alliances. However, we have adopted a definition that expands
the a la Gurbaxani (1996); DiRomualdo and Gurbaxani (1998) commercial exploitation
of IT products or services by both partners. The exploitation of such benefits is
contingent on their ability to evaluate and absorb external knowledge and apply it for
22
commercial exploitation in their respective markets (Cohen and Levinthal, 1990) and
production economies of the outsourcing market.
In the following sections we will develop propositions pertaining to collaboration
specific quasi rents. More specifically we will build on relational theory view (RTV) in
order to support our proposition on quasi rents through revenue growth from optimal
utilization; the theory of reciprocal learning alliances (RLA) to support propositions on
revenue growth from economies of scope; and production cost economics to support
propositions on production efficiencies related quasi rents.
4.2.1. Through Revenue Growth from Optimal Utilization
Relational Theory View (Dyer-Singh 1998) has been offered as an alternative to
Industry Structure View and Resource Based View and is built on the premise that a
firm’s capabilities may straddle the firm boundaries and may be embedded in inter-firm
routines and processes. Using the network between firms as the unit of analysis the
theory looks at various aspects of partnerships that have the potential to lead to creation
of collaboration specific rents. Competitive advantage is possible when alliance partners
combine, exchange, or invest in idiosyncratic assets, knowledge and resources, and
employ effective governance mechanisms that lower transaction costs or permit the
realization of rents through the synergistic combination of assets, knowledge, and
capabilities.
The ability of partners to combine synergy-sensitive resources, i.e. resources that
when combined are valuable, rare, and difficult-to-imitate, is a critical determinant of the
alliance’s rent generating potential. This is complemented by investments in
23
collaboration specific assets and inter-firm knowledge sharing routines. However, the
effect of such investments is moderated by the volume of transactions between partners,
the length of the governance arrangement designed to safeguard against opportunism, the
partners’ absorptive capacity, and the alignment of incentives between partners (Dyer-
Singh 1998).
Volume of transactions [QH+QA+QNewIT] relates to the expectations of the
partnering companies regarding the potential of the alliance to generate rents through
revenue growth [ 0*),,( ≥AAA QASDQP ]. The higher are the expectations regarding the
volume of transactions, the more likely that the partnering companies will invest in
relation specific assets. An advantage of the outsourcing alliance is that it starts with an
initial seed [QH] due to high profile captive client (parent company). The partners can
leverage this advantage to attract new clients [QA>0]. In addition to this, the alliance can
leverage its non-adversarial relation with the parent company in order to refine the terms
and conditions of new transactions. The experience can be used in the design of
attractive service level agreements that could be used to attract and retain external clients.
Volume is not enough unless it lasts for a relatively long time. This brings to the
issue of the duration of an outsourcing alliance and an often-visited research topic, the
optimum length of outsourcing contract. Lacity and Wilcock (2000), among several
others, argue that long-term deals tend to be less successful. Difference in incentives
between clients and vendors, as well as lack of flexibility has been the main reasons why
clients should avoid long-term contracts (Harrigan and Newman, 1990; McFarlan and
Nolan, 1995). However, while these limitations are valid in the case of arms-length type
24
of outsourcing, it is clear that they are less binding in the case of an outsourcing alliance,
primarily due to better alignment of incentives between the partners (Lacity et al. 2003).
While the importance of the alignment of incentives has a long history in the IS
research literature (Harrigan and Newman, 1990; McFarlan and Nolan, 1995; Lee, 2001;
and Lacity et al. 2003), the interest in absorptive capacity and knowledge management is
more recent (Sambamurthy and Subramani, 2005; Malhotra et al., 2005). Lee (2001) has
found some empirical evidence validating the effect of the ability of partners to absorb
shared knowledge on outsourcing success.
While the alliance can hope to attract and retain new customers by leveraging its
unique combination of synergistic resources and alignment of incentives, its efforts are
likely to be undermined by a decline in asset specificity. Such a decline implies a
commoditization of the IT service and an increased likelihood that other vendors might
enter the market and offer similar services. Thus, we propose:
P2a: The existence of synergistic resources and alignment of incentives between
the IT capable company and outsourcing alliance partner will positively affect the
volume and length of transactions leading to revenue growth related
rents 0*),,( ≥AAA QASDQP .
P2b: The positive effect on revenue growth will be mitigated by a decline in asset
specificity.
4.2.2. Through Revenue Growth from Economies of scope
The theory of Reciprocal Learning Alliances (Lubatkin, Florin and Lane’s 2001)
is built on the concept of cooperative learning in the sense that both partners co-learn and
25
co-experiment by simultaneously being students and researchers. The primary goal of
partnering firms engaging in a reciprocal learning alliance (RLA) is to leverage each
others’ knowledge structure in order to develop products or services that neither one of
the partners could develop individually in a competitive manner.
Economies of scope are a simple example of how reciprocal learning could
generate additional benefits for the alliance. The vendor has the expertise to foresee the
fact that when modified the IT service could be offered to clients outside the area of
expertise associated with the parent company and the IT organization could deliver the
necessary changes leading to the creation of the new IT service.
To accomplish this goal both companies can agree that the IT capable company
would become the testing ground. The place where both partners develop their unique
expertise, such as fine tuning the service, developing the delivery and support
mechanism, service level agreements, pricing, etc. Once the product has been developed,
the initial benefits will come from the excess earnings of the parent company (short term
benefits). However, the long term benefits stem from the selling of the services to third
party clients. Hence, the outsourcing alliance has the potential to evolve into a RLA that
can generate firm as well as collaboration specific quasi rents.
0*),,( ≥ITNewITNewITNew QASDQP .
According to Lubatkin et al. (2001) the prerequisites for successful cooperative
learning are resource, goal, and task interdependence. Resource and task
interdependence means that each learning partner contributes an important and unique
piece of the information puzzle and specialize their efforts towards activities at which
they are individually most competent. Continuing with our economies of scope example,
26
one may be led to believe that the contribution of the IT capable company (know hows) is
neither important nor unique. However, such a belief is inaccurate. Empirical and
anecdotal evidence points to the contribution of effectively deployed IT on firm
performance (Sambamurthy 2000; Dehning and Stratopoulos 2003). The ‘know hows’ of
the IT capable company reside in a form of tacit knowledge in the IS area of the parent
firm. Such knowledge is built over a period of time and it is the result of a good
understanding of the parent firm’s production processes information needs, and
idiosyncratic developments (Nam et al. 1996).
Goal interdependency is the third prerequisite for successful cooperative learning.
In the context of an outsourcing alliance it is clear that while, theoretically, either one of
the partners could develop the knowledge structure individually, such an approach may
not be the most appropriate given the rate or technological innovation and competition
surrounding IT services. Both partners, client and vendor, understand that the potential
for modifying an existing IT service for a new market class or developing a break
through innovation are much higher compared to what each one of them could have
accomplished individually. In the process of working together they accomplish more.
Another characteristic of an outsourcing alliance that contributes to its probability
to evolve into successful reciprocal learning alliances is the fact that, by default, the two
partners operate in two different markets.5 Hence the risk of directly competing with
each other is minimal. This means that the risk of opportunistic behavior is relatively
5 The above discussion is based on the assumption that the outsourcing alliance is between the IT capable company and the vendor. However, if one considers the alliance as being between the IT department of the client and the vendor then there is the potential market overlap and subsequently a risk of opportunistic behavior.
27
small and the partners are more likely to disclose their knowledge disclosure and be more
forthcoming (Lubatkin et al. 2001). Thus, we propose:
P3a: The synergy in the outsourcing alliance leads to the development of new IT
services supporting revenue growth [ 0*(.) ≥ITNewITNew QP ] from economies of scope
P3b: The ability of the alliance partners to exploit economies of scope related
rents [ 0*(.) ≥ITNewITNew QP ], increases with resource, goal, and task interdependence.
P3c: The ability of the alliance partners to exploit economies of scope related
rents [ 0*(.) ≥ITNewITNew QP ], increases with their absorptive capacity.
4.2.3. Through Production Efficiencies
While a sustained higher volume of repeating transactions is one of the sufficient
conditions for the success of an outsourcing alliance, relating higher volume to revenue
growth captures only half of the desired effect. It is equally important to examine the
role of volume and length in the context of the cost structure of the IT service6.
Production cost related rents that the IT capable company can exploit by transitioning
from an internal (hierarchical governance) structure to an outsourcing alliance. Such
quasi rents are feasible if the long-run production cost of the IT service follows
increasing economies of scale (increasing returns) pattern.
Understanding the nature of long run operations of the offered IT service is
important for illuminating the production cost related quasi rents. In general, there are
three scenarios related to returns to scale: increasing, decreasing, and constant returns to
6 In the rest of the discussion instead of saying the operating cost of the IT service offered by the IT department through an outsourcing alliance, we simply say the operation cost of the IT department.
28
scale. A company is operating under increasing returns to scale or economies of scale if
its product (IT service in this study) more than doubles with a doubling of the inputs. If
the IT outsourcing market is described by such operating conditions we are more likely to
observe a small number of large outsourcing vendors offering IT services at a relatively
low cost per unit of transaction. Vendors (and IT organizations) unable to attain the
desired volume will fall in a position of competitive disadvantage, as they will find
themselves operating at a relatively high cost per unit.
For companies that are subject to constant returns to scale, an increase in all
inputs will lead to a proportional increase in output. In other words, the size of the
vendor’s (and the client’s IT organization) operations does not affect the productivity of
its resources. The per-unit cost of an outsourcing vendor servicing a large number of
clients/transactions is more or less the same as that of an internal IT organization serving
the limited, in terms of quantity demanded [QH] needs of its parent company.
Under decreasing returns to scale the increase in output is proportionally smaller
than the increase in inputs. Obviously, in an outsourcing market characterized by such
operating conditions, small vendors and/or internal IT organizations are better suited to
meet the market’s needs for IT services since they can operate at a relatively lower cost
per unit.
Recent studies point to the increasing maturity of both the demand and supply in
the outsourcing market (Carmel and Agarwal 2002; Rottman and Lacity 2004), leading
to simultaneous increase in the supply and demand of outsourcing IT services. This trend
is reinforced by the fact the smaller firms (internal IT organizations) are unable to
compete against the larger firms (outsourcing vendors) in terms of cost. In the context of
29
long run production costs this implies that the outsourcing market – at least for IT
services which are approaching or close to their commoditization stage – is experiencing
increasing economies of scale.
Overall, the difference, drop, in the per unit production cost of the IT services will
reflect the production-related quasi rents that the IT capable company can enjoy and the
alliance can leverage to support a low cost strategy in the promotion of the service to
external clients. Thus, we propose:
P4: With increased volume of IT services [ ITNewAHH QQQQ ++≤ ], an outsourcing
alliance will be able to attain lower per unit operating cost than the IT organization
might attain by offering the service internally to the company.
H
HH
M
MM
ITNewAH
ITNewAHA
QDQC
QASDQC
QQQSASDQQQC ),ˆ(),,();,,(
≤≤++
++
4.3. Firm-Specific Quasi Rents
In our discussion on quasi rents through revenue growth from economies of
scope; we built on the theory of reciprocal learning alliances in order to support our
argument that partners could jointly develop new IT services. The process of jointly
developing new services is likely to generate two types of positive spillover effects
leading to firm-specific quasi rents for the IT capable company.
We can visualize the first round of positive spillover effects if we assume a
scenario, a la BAE Systems and Xchanging.7 In this scenario, one of the partners - the IT
capable company in our case - would become the greenhouse for the development and 7 See Lacity et al. 2003
30
fine tuning of this new IT service. Hence the company will be the first among its
competitors to use the new service and its users will benefit from their close interaction
with the development team. While the valued adding contribution of the former of these
benefits might be contested, the importance of the latter has been well accepted in both
academic and practitioner circles (McFarlan 1981; Hoper, 1990).
The primary goal of partnering firms engaging in a reciprocal learning alliance
(RLA) is to leverage each others’ knowledge structure in order to develop products or
services that neither one of the partners could develop individually in a competitive
manner. Nevertheless, this is only one aspect of success; RLAs have great potential for
strategic value as they make it possible for firms to jointly develop and leverage
competencies that they could not develop alone (Lubatkin, Florin and Lane’s 2001).
The ability of the outsourcing alliance partners to develop and leverage new
competencies is the second type of positive spillover effects that the company may enjoy.
For years it has been observed by IT consultants ( Tristram, 1998) and CIOs (Dragoon
2004; Cramm, 2006; Levinson 2006) that the success of IT organizations depends on
their ability to market their services to the rest of the company. The process of partnering
between the IT organization and the vendor for the development and marketing of new IT
service offers a unique learning environment for the IT organization. One in which the
IT organization develops a competency that might not have been able to develop on its
own. The IT organization can leverages this new knowledge to promote its services to
the parent company The experience that the alliance offers could be helpful and generate
the good will which is so important for creating a close relationship between the IT
organization and the parent company. The ability of the IT organization to develop and
31
leverage this new knowledge will depend on its relative absorptive capacity (Lubatkin,
Florin and Lane’s 2001). Thus, we propose:
P5a: The synergy in the outsourcing alliance leads to the development of new
competencies that partners could not develop alone.
P5b: The ability of the IT organization to exploit these new competencies
internally increases with the organization’s absorptive capacity.
4.4. Overall Outsourcing Alliance Value Creation Framework
The outsourcing alliance framework – summarized in Appendix B - offers a
strategic alternative, a wider spectrum of possibilities, to IT capable companies.
Traditionally, outsourcing success, even for the so-called strategic alliances or strategic
partnerships, has been defined in terms of the ability of the vendor to satisfy the
requirements of the client. Obviously, while this is an important element for the client it
is, nevertheless, a myopic one, especially for IT capable companies. In the context of the
outsourcing alliance framework, this means that the client participates and exploits only a
fraction of the potential rents. The outsourcing alliance framework, proposes that senior
managers take a more holistic approach and evaluate the collaboration as well as the
transaction-specific potential sources of revenue in their decision making process.
In the following, section we will discuss the implications of the proposed
outsourcing alliance framework for managers and researchers.
32
5. IMPLICATIONS
The proposed outsourcing alliance value creation framework constitutes a
significant deviation from the traditional approach to IT outsourcing, and as a result it is
likely to encounter either skepticism or enthusiasm from IT and non-IT managers.
However, we see the repeat of the Cathay’s approach in many other examples. A similar
story has been with EDS and Continental Airline’s System One. EDS recognized that the
on-line reservation system could be used to attract clients outside the airline industry such
as car-rentals and hotels (Dibbern et al. 2004). The normative aspect of this study offers
the option of an outsourcing alliance as a reasonable alternative, to such arm’s-length
outsourcing deals, for IT capable companies. However, this option requires considering
outsourcing alliance as a strategic option and not an ad hoc solution during periods of
financial pressure.
A key to the acceptance of outsourcing alliances is visioning IT organizations as
revenue centers. While this requires adjustment in the traditional thinking in which IT
organizations are considered cost centers, a significant percent of companies have their
IT organizations generate revenue. Every year, Information Week compiles a list of the
most innovative companies (users) in the area of IT. While the list does not explicitly
relate IT innovation to our definition of IT capability, it is reasonable to assume that these
companies are more likely to have developed their IT capability. A glimpse at the
practices of these companies would serve as an indicator of what would have been the
attitude of IT capable companies towards the notion of seeing IT organizations as
revenue centers. Among the Information Week 500 surveyed companies, as high as 40%
of them report that their IT organizations generate revenues through sales of products or
33
services.8 Therefore, we can conclude that the idea of an IT organization operating as a
revenue center is not a terra incognita, at least not for IT capable companies.
Carmel and Agarwal (2002) identify four stages of maturation of the offshore
outsourcing market: no outsourcing, experimenting, seeking corporate-wide leverage of
cost efficiencies through outsourcing, and proactively seeing outsourcing as a strategic
imperative. The authors estimate that the majority of the large companies will transition
towards the third and fourth stage. This trend refines the spatial, and defines the
temporal, boundary of our study as an attempt to develop a theoretical framework for
outsourcing alliances for IT capable companies. However, while the justification is
adequate for the academic aspect of this study, we will be remiss if we do not point to the
managerial effects that prompted this study, especially, since they add to its practical
contribution. Support is coming from two sources (Economist, and McKinsey) and two
directions (cost and revenues).
The first argument comes from an editorial in the Economist (April 23-29, 2005)
on the issue of strategic management. The author of the article calls the companies to
shift their strategic focus from cost cutting to business building. After the collapse of the
dot com bubble most companies focused on cost cutting and outsourced business
processes to vendors who could operate at a lower per unit cost. This approach delivered
the desired results at the time. However, ‘many companies seem to have become so
hooked on cost-cutting that a sort of anorexia has set in.’9 The editor is concerned with
this approach because cost cutting, while a good approach to improve the bottom line in
the short term, is not a long term solution. 8 Source: Information Week 500 for years 2002, 2003 and 2004. 9 Economist, April 23-29, 2005, p. 14.
34
A similar argument, though from the revenue side, was raised in the recent report
of the McKinsey on Strategy (Smit et al. 2005). The study followed a cross industry
sample of over one hundred large companies over the two most recent business cycles in
order to explore the challenges of revenue growth. The authors found that while cost
improvement can drive earnings and shareholder value in the short term, companies that
raise their shareholders value without increasing their revenue had the worst long term
odd of survival.
The two approaches – cost cutting vs. business building – are similar to the two
main choices that the IT capable company will have to consider – arms length
outsourcing vs. outsourcing alliance. As we have seen in our analysis, the potential
benefits of an outsourcing alliance are higher than those of an arms length outsourcing
deal. In the following paragraph, we will try to relate the above positions, Economist
and McKinsey, in the context of the outsourcing alliance framework.
In a typical arms-length outsourcing deal, the initial benefits for the client are
significant and tangible. The benefits are associated with the liquidation of resources
previously associated with the delivery of the IT service. On the other hand during the
early stages the vendor carries the burden and the expenses. Later on, the roles shift and
the vendor will start enjoying the benefits while the client is facing the stream of
expenditures (McFarlan and Nolan 1995). Figure 4, captures the net cash flow (from a
client’s standpoint) with the downward sloping curve called market.
35
On the other hand, in an outsourcing alliance the initial expenditures are high and
may extend over a period of time before the partners start collecting any significant
stream of revenues.10 While some revenues may occur shortly after the formation of an
outsourcing alliance, the incremental revenues will not materialize until the two partners
learn how to interact and to apply their expertise to attract and service third party clients.
This is captured in the upward sloping curve in Figure 4. In a similar fashion as in the
two sources, Economist and McKinsey, we argue that: For IT capable companies the
benefits of an arms-length outsourcing deal might be limited and myopic in nature. On
the other hand, an outsourcing alliance, as a business building solution, offers a more
rewarding and long-term option.
The risk of opportunistic behavior leading to the failure of an outsourcing alliance
is one of the most significant managerial concerns. While the temptation of opportunistic 10 This pattern is not unique to an outsourcing alliance and it should be expected in all alliances (Madhok and Tallman, 1998)
Figure 4 Alliance (Business Building) vs Market (Cost Containment)
36
behavior may appear to be high for both parties in an outsourcing alliance, its opportunity
cost is too high to justify it as a rational approach. Keep in mind that the firm specific
benefits are only a fraction of the total benefits that partners stand to enjoy as a result of
the outsourcing alliance. The transaction and collaboration specific benefits are equal or
more important than the firm specific benefits (Madhok and Tallman 1998). In addition
to this, the outsourcing alliance has a trait that reduces the risk of opportunistic behavior,
namely the fact that risk that each of the alliance members may step into the partner’s
territory is relatively low. We will elaborate on this in the following paragraphs.
The main premise behind the outsourcing alliance framework is that the alliance
is formed between an IT capable company and an outsourcing vendor. In addition to this
the main objective and priority of the IT organization is to provide the desired IT services
to the parent company. Both the IT organization and its parent company would consider
offering, through the outsourcing alliance, the products/services that approach the
commoditization stage.
The outsourcing alliance reinforces the specialization of partners and this means
that the IT organization would continue focusing on the continuous improvement of its IT
capability. This guarantees the high quality of IT services for both the parent company
and the clients of the alliance, as well as a continuous stream of new services that are
likely to be offered through the alliance as they enter the commoditization phase. This
focus is consistent with the mantra of some of the most successful among the IT capable
companies, such as Wal-Mart, will state that they are in the retail business not in the IT
business (Lundberg 2002). Obviously, maintaining such focus posses no threat to the
vendor and increases the long-term potential of the alliance.
37
The high specialization of f the IT organization serves as the safety mechanism
for the vendor too. It is unlikely that the vendor would want to absorb the entire IT
organization especially if the latter is characterized by high asset specificity to the parent
company. Like the IT organization, the vendor is interested in products or services that
approach the commoditization stage. It is only through such IT services that the alliance
can attain its potential through economies of scale and or scope.
However, unlike the IT organization of the parent company, the vendor has an
incentive to bring new IT services to the market sooner than later. If the vendor were to
proceed with such an opportunistic behavior the opportunity cost would be high. The
vendor would risk the client’s commitment and future cooperation. The opportunity cost
would be proportional to the amount of specific resources that the vendor has committed
to the outsourcing alliance. These resources are likely to lose their value if the alliance
were to fail. Since their use is tied to the co-specialized delivery of the services that only
the IT organization could deliver.
Obviously, there are several weaknesses associated with a client’s choice to enter
into an outsourcing deal. On the top of the list is the issue of flexibility, the ease of
exiting a current alliance and replacing it with another vendor or even insourcing
(Venkatraman and Henderson, 1998; Ybarra and Wiersema, 1999). The risk of
opportunistic behavior is high when the client organization is limited to a long-term
alliance with a single vendor. It is likely that the vendor will have little or no incentive to
accommodate unanticipated changes.
Another issue that has been raised in the literature is with regard to governance
inseparability (Argyres and Liebeskind, 1999). The governance of new transactions
38
becomes inseparably linked to governance of transactions that have been previously
contracted for with the vendor. Clients are also concerned about losing the skills that
they outsource (Quinn, 1999). Last but not least, measuring the vendor’s contribution
and monitoring vendor’s activities to ensure alignment with the client’s interests is more
difficult in outsourcing alliances (Kishore et al. 2003). However, these limitations are
inherent in outsourcing and they are not unique in outsourcing alliances. One could
argue that the adverse effect of some of these limitations would be less in outsourcing
alliance as compared to an arms-length outsourcing deal.
6. CONCLUSION
With the commoditization of IT and the inability of many companies to align IT
with their business strategy, executive managers increasingly believe that traditional
arms-length outsourcing is the only viable solution. This paper offers a viable alternative
or a bargaining point for IT capable companies. It argues that through outsourcing
alliances those companies can realize additional quasi rents leading to greater value
addition by their IT organizations.
This study contributes to our knowledge of the IT outsourcing literature in several
areas. According to Dibbern et al. (2004) in spite of the spike in IT outsourcing research,
further research is ‘critically needed’ in order to enhance our knowledge in areas as: the
evolving definition of outsourcing success, the need to define outsourcing success in a
way that accounts for both the client and vendor perspective, and the understanding of the
client vendor relationship.
This paper contributes to the development of a theoretical model of strategic IT
alliance performance by examining the implications for several economic and strategic
39
management theories on that type of collaboration. We have proposed a new definition
of it based on the ways in which strategic management has defined alliance performance.
Our definition stresses the importance of outsourcing success as the common ground of
client and vendor benefits. Finally, the focal point of our research, outsourcing alliances,
is one of emerging phenomena in the outsourcing literature (Dibbern et al. 2004).
The outsourcing alliance framework offers a fertile ground for more theoretical
and empirical research that could try to enhance, improve, and empirically test some of
our proposition. For example;
1. Future studies could try to empirically validate the value-adding proposition of the
outsourcing alliance framework. This could be accomplished with the help of cross-
sectional longitudinal study that could compare the rent generating ability of
outsourcing alliance versus arms-length outsourcing deals.
2. This study considers the outsourcing alliances from the standpoint of the IT capable
companies. A future study might approach the issue from the standpoint of
outsourcing vendors.
3. The model that we have developed does not address the issue of what to outsource.
Additional research/fine tuning will be needed in order to evaluate the conditions
under which an outsourcing alliance may be successful or not once you consider IT
service/products that are associated with core versus support activities.
4. In our discussion we concentrated in transaction costs as determinant of the make-or-
buy decision. However, firm facing similar transaction costs actually makes various
make-or-buy decisions (e.g., Leiblein and Miller 2003).
40
REFERENCES 1. Ang, S. and Straub, D. W. (1998) “Production and transaction economies and IS
outsourcing: A Study of the U.S. banking industry,” MIS Quarterly, pp. 535-552. 2. Argyres, N. S. and J.P. Liebeskind, (1999) “Contractual commitments, bargaining
power and governance inseparability: Incorporating history into transaction cost theory,” Academy of Management Review, 24, 49-63.
3. Aubert, B. A., Rivard, S., and Patry, M. (2004) “A transaction cost model of IT outsourcing,” Information & Management, 41, pp. 921-932.
4. Chen, M-J, and D. Miller. (1994) “Competitive Attack, Retaliation and Performance: An Expectancy Valence Framework,” Strategic Management Journal, 15(2), pp. 85-102.
5. Bacharach, S. (1989) “Organizational Theories: Some Criteria for Evaluation.’ Academy of Management Review, Oct89, Vol. 14 Issue 4, pp. 496-515
6. Barthelemy, J, (2001) “The Hidden Costs of IT Outsourcing,” Sloan Management Review, Spring, 60-69.
7. Bharadwaj, AS, V. Sambamurthy, and RW. Zmud (1999). “IT Capabilities: Theoretical Perspectives and Empirical Operationalization,” International Conference on Information Systems 1999, pp. 378-385.
8. Carmel, E, and R. Agarwal, (2002) “The maturation of offshore sourcing for information technology work,” MIS Quarterly Executive, 1(2), June, 65-76.
9. Clark, TD, Zmud RW, and McCray GE. (1995). “The Outsourcing of Information Services: Transforming the Nature of Business in the Information Industry,” Journal of Information Technology, 10, pp. 221-237.
10. Cohen, WM.and D. Levinthal (1990) “Absorptive Capacity: A New Perspective on Learning and Innovation.” Administrative Science Quarterly, Mar1990, Vol. 35 Issue 1, p128-152
11. Cramm, S. (2006) “IT Marketing Smarts”, CIO Magazine, 2/1/2006, http://www.cio.com/archive/020106/coach.html
12. Dehning, B, and T, Stratopoulos, (2003) “Determinants of a Sustainable Competitive Advantage Due to an IT–Enabled Strategy,” The Journal of Strategic Information Systems, 12(1), 7–28.
13. Dibbern, J., T. Goles, R. Hirschheim, and B. Jayatilaka, (2004) “Information systems outsourcing: a survey and analysis of the literature,” ACM SIGMIS Database, November 2004, Volume 35, Issue 4, pp. 6-102.
14. DiRomualdo, A. and V. Gurbaxani (1998) “Strategic Intent for IT outsourcing.” Sloan Management Review, Summer98, 39(4), pp. 67-80
15. Dragoon, A (2004) “The Secret Weapon: Internal Marketing” CIO Magazine, 5/1/2004, http://www.cio.com/archive/050104/marketing.html)
16. Dyer, J., and H. Singh, (1998) “The Relational View: Cooperative strategy and sources of interorganizational competitive advantage,” Academy of Management Review, 23(4), 660-679.
17. Economist (the), (2004) “A world of Work. A Survey of Outsourcing,” The Economist, November 13th.
41
18. Goo, J. Kishore, R, and Rao, HR (2000). “A Content Analytic Longitudinal Study of the Drivers for Information Technology and Systems Outsourcing” Proceedings of the 21st ICIS, Brisbaine, Australia, pp. 601-611.
19. Grover, V, MJ Cheon, and Teng, J., (1996) “The effect of service quality and partnership on the outsourcing of information systems functions,” Journal of Management Information Systems, Spring96, 12(4), pp. 89-116.
20. Gurbaxani, V. (1996), “The New World of Information Technology Outsourcing” Communications of the ACM, July 1996, 39(7), pp. 45-46
21. Harrigan, KR and WH Newman (1990) “Bases of interorganization co-operation: propensity, power, persistence,’ Journal of Management Studies, 27(4), pp. 417-435.
22. Hopper, MD. (1990) “Rattling SABRE--New Ways to Compete on Information.” Harvard Business Review, May/Jun90, 68(3), pp. 118-125
23. InformationWeek Research (2004) – InformationWeek 500, 1-15. 24. Kern, T. (1997) “The Gestalt of an Information Technology Outsourcing
Relationship: An Exploratory Analysis” - Proceedings of the eighteenth ICIS, 1997 25. Kern T. Willcocks L. (2000) “Exploring information technology outsourcing
relationships: theory and practice,” Journal of Strategic Information Systems, Volume 9, Number 4, December 2000, pp. 321-350
26. Kern T. and Willcocks L. (2002) “Exploring relationships in information technology outsourcing: the interaction approach” European Journal of Information Systems, Volume 11, Number 1, 1 March 2002, pp. 3-19
27. Khanna, T. (1998). “The Scope of Alliances” Organization Science, 9(3), May-June 1998, 340-355..
28. Kishore, R. HR Rao, K. Nam, S. Rajagopalan, and A. Chaudhury. (2003) “A relationship perspective on IT outscourcing.” Communications of the ACM, December 2003, 46(12), pp. 87-92.
29. Klepper, R, (1995) “The Management of Partnering Development in I/S Outsourcing,” The Journal of Information Technology, 10(4), 249-258.
30. Lacity, M, and R. Hirschheim, (1993) “The Information Systems Outsourcing Bandwagon,” Sloan Management Review, Fall, 73-86.
31. Lacity, MC, Willcocks, LP. And Feeny, DF. (1996) “The Value of Selective Outsourcing,” Sloan Management Review, Vol. 37. No. 3, pp. 13-25.
32. Lacity, M, and L. Willcock, (1998) “An Empirical Investigation of Information Technology Sourcing Practices: Lessons from Experience.” MIS Quarterly, 22(3), 363-408.
33. Lacity, M, and L. Willcock, (2000) “Relationships in IT outsourcing: A Stakeholder Perspective,” in Framing the Domains of IT Management. Projecting the Future... Through the Past, R. Zmud Editor, Pinnaflex, Ohio, 355-384.
34. Lacity, M, D, Feeny and LP, Willcocks, (2003) “Transforming a Back Office Function: Lessons from BAE Systems Experience with an Enterprise Partnership,” MIS Quarterly Executive, 2(2), 86-103.
35. Lee, JN, (2001) “The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success,” Information and management, April 2001, 38(5), pp. 323-335.
42
36. Leiblein, MJ and DJ Miller, (2003) “An Empirical Examination of transaction and firm-level influences on the vertical boundaries of the firm,” Strategic Management Journal, September 2003, 24(9), 839-859.
37. Levinson, M. (2006) “Inside an IT Marketing Campaign: CIO Magazine, 2/1/2006, http://www.cio.com/archive/020106/marketing.html
38. Loh, L., and N. Venkatraman, (1992) “Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis,” Journal of Management Information Systems, 9(1), 7-24.
39. Lubatkin, M., J. Florin, and P. Lane (2001) “Learning together and apart: A model of reciprocal interfirm learning,” Human Resources, 54(10), 1353-1382.
40. Lundberg, A. (2002) “The I.T. inside the world’s biggest company,” CIO Magazine, July 1st, 2002.
41. Madhok, A., and SB Tallman (1998) “Resources, Transactions and Rents: Managing Value Through Interfirm Collaborative Relationships,” Organization Science, 9(3), May-June 1998, 326-339.
42. McFarlan, FW (1981) “Portfolio approach to information systems.” Harvard Business Review, Sep/Oct81, 59(5), pp. 142-150.
43. McFarlan, FW and RL, Nolan, (1995) “How to manage an IT Outsourcing Alliance,” Sloan Management Review, winter, 9-23.
44. McFarlan, FW and F. Young (2003) “Cathay Pacific: Doing More with Less” Harvard Business School case study # 9-303-106, Boston, MA. 2003
45. Nam, K, S. Rajagopalan, HR Rao, and A. Chaudhury, (1996) “A Two level investigation of Information Systems Outsourcing,” Communications of the ACM, July 1996, 30(7), 36-44.
46. Ngwenyama, OK and Bryson, N “Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problem,” European Journal of Operational Research, 115, pp. 351-367.
47. Porter, ME and VE, Millar, (1985) “How information gives you competitive advantage” Harvard Business Review, 63, 149-160
48. Quinn, JB, (1999) “Strategic outsourcing: leveraging knowledge capabilities,” Sloan Management Review 40(4), 9-21.
49. Rottman, JW and MC, Lacity, (2004) “Twenty Practices for Offshore Outsourcing,” MIS Quarterly Executive, 3(3), 117-130.
50. Sambamurthy, V. (2000) ”Business Strategy in Hypercompetitive Environments: Rethinking the Logic of IT Differentiation,” in R. W. Zmud (Ed.), Framing the Domains of IT Management, Pinnaflex Educational Resources: Cincinnati, OH, pp. 245-261.
51. Sambamurthy, V. and M. Subramani (2005) “Special issue on information technology and knowledge management,” MIS quarterly, Vol. 29, No. 2, pp. 193-195.
52. Smit, S. Thompson, C. and SP Viguerie, (2005) “The do-or-die struggle for growth,’ The McKinsey Quarterly 2005, Number 3. Accessed on 10/15/05 http://www.mckinseyquarterly.com/article_page.aspx?ar=1636&L2=21&L3=34&srid=253&gp=1
53. Tristram, C (1998) “Sell Yourself”, CIO Magazine 6/15/1998, http://www.cio.com/archive/061598/market.html#http://www.cio.com/archive/061598/market.html#
43
54. Venkatraman, N. and Henderson, J.C. (1998) "Real Strategies for Virtual Organizing," Sloan Management Review, Fall 1998, 33-48.
55. Williamson, O. (1979). “Transaction cost economics: The governance of contractual relations.” Journal of law and Economics. 22(2), Oct. 1979, pp. 233-261.
56. Williamson, O. (1981) The modern corporation: Origins, evolution, attributes. Journal of Economic Literature. 19, 4 (Dec. 1981) 1537-1568
57. Williamson, O. (1981b). "The Economics of Organization: The Transaction Cost Approach," American Journal of Sociology, Vol. 87, No. 3, pp. 548--577.
58. Williamson, O. E. (1985). The Economic Institutions of Capitalism : Firms, Markets, Relational Contracting, New York, London: Free Press, Collier Macmillan.
59. Williamson, O. (1991) “Comparative Economic Organization: The Analysis of Discrete Structural Alternatives,” Administrative Science Quarterly, June 1991, 36(1991), 269-296.
60. Ybarra, C. and W. Wiersema, (1999) “Strategic flexibility in information technology alliance. The influence of transaction cost economics and social exchange theory,” Organization Science, Vol. 10, No. 4, pp. 439-459.
44
APPENDIX A
The derivatives for the first equation:
HH
HHHHHHHH
QQts
DQGDQCQDQPVˆ..
)},ˆ(),({*),(max
≤
+−=
where:
0<′HQP , 0>′′
HQP
0>′DP , 0>′′DP
and,
SupporttDevelopmenH CCC +=(.)
)Q|C(D H=tDevelopmenC
0>′DC , 0>′′DC
D)|C(Q H=SupportC
0>′HQC , 0<′′
HQC
)Q D,|C(AS H=yOpportunitC
0<′ASC , 0>′′ASC
The additional derivatives for opportunity cost:
AS) D,,Q̂C( H=HO
0<′ASHO , 0>′′
ASHO