Font Size: a A A

It Services Outsourcing Motives And Risks Of Research

Posted on:2007-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:W SunFull Text:PDF
GTID:2199360215482002Subject:Business management
Abstract/Summary:PDF Full Text Request
Since 1990s, the application of the information technology has experienced the stare dumb-founded development, the product of information technology has profoundly influenced the enterprise's core strategy and operating pattern, and along with the time passing, this kind of influence will further penetrate and the deepen. Although the IT technology is extremely important to the enterprise, the majority of enterprise's IT system cannot satisfy the demand. Therefore, since recent years, more and more enterprises favored in outsourcing all or part of theirs IT managementThis paper studies the theoretic reason of IT outsourcing in this tendency. This article profits from the analysis of overseas IT outsourcing experts about the theoretic reason of IT outsourcing, and discovers that these two frames have flaw: they neglect the relationship of organization and the outside contractor and the repeated transaction between them. Therefore, this article supplements the theoretical analysis of IT outsourcing from the division of labor theory as well as the value chain theory, in addition to the core competencies theory and the transaction cost theory, and they well explain the theoretic reason of outsourcing strategic. The division of labor theory is the premise of the IT outsourcing theory, and the division of labor may advance each worker's level of expertise to enhance the labor productivity. As for the enterprise, the division of labor causes the development of core business and scale of economies. The value chain theory makes the enterprise to study the origin of enterprise value, study the compared advantage of enterprise, and concentrates the strength to cultivate and develop the superiority. The core competencies theory causes the enterprise to hold the key in the management, as well as enterprise's core ability, and enable the enterprise process the value increment activity on a lower cost compared to the competitors. The enterprise should place the main energy in the core business, and use core competitive power to maintenance enterprise sustainable competitive advantage. Meanwhile, the enterprise should outsource the non-core competitive function, and use outside provider's specialized technology and the management to enhance the enterprise's own IT operate, and to gain the more competitive advantage. The transaction cost theory causes the enterprise to outsource, when after the judgment, the enterprise discovers that the cost of gaining the resources from using middle organizes is the lowest. The transaction cost theory is the decisive theory about whether to choose outsourcing, and the transaction cost is the measure standard about whether to choose the package of strategy.At the same time, IT outsourcing as one kind of advanced competition strategy has being accepted by the general enterprises because of its obvious superiority, but the enterprise also should note the risk of unreasonable outsourcing. Because the enterprise choose outsourcing, the proxy question possibly bring the risk to the enterprise, such as the high cost risk, the unsymmetrical information risk, as well as opportunity cost risk. The speed of technical renewal is so quick that the technical cost often could fall with the time passing, but the outside contractor has not actually reduced the cost, instead of relative enhancing cost. The IT contractor often grasps more information compared to the enterprise, thus it causes me unsymmetrical information risk between the enterprise and the contractor. Also, the enterprise out sources the IT system to the specialized enterprise, but reduces the opportunity to study the information technology, that is enterprise's opportunity cost risk. Therefore, finally, this article writes the method of guarding and processing the risk of the IT outsourcing, and the guard includes deciding outsourcing from the strategic level, implementing the cost accounting of outsourcing, inspecting and determining the appropriate outside contractor, signing the perfect outsourcing contract, and unceasing study. The process includes establishing the effective IT outsourcing management mechanism, establishing the IT outsourcing business management organization, as well as the close cooperation between the enterprise and the contractor.
Keywords/Search Tags:IT outsourcing, the analysis of the theoretic reason, the analysis of the risk, the risk monitoring to the IT outsourcing
PDF Full Text Request
Related items