Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Business familiarity as risk mitigation in software development outsourcing contracts

Published: 01 September 2008 Publication History

Abstract

This study examines the role of business familiarity in determining how software development outsourcing projects are managed and priced to address risks. Increased business familiarity suggests both more prior knowledge, and hence reduced adverse selection risk, and increased implied trust about future behavior, and hence implied reduced moral hazard risk. Preferring high business familiarity partners may also alleviate concerns about incomplete contracts. By reducing these risks, higher business familiarity is hypothesized to be associated with higher priced projects, reduced penalties, and an increased tendency to contract on a time and materials rather than a fixed price basis. These hypotheses were examined with objective contractual legal data from contracts made by a leading international bank. Integrating trust theory into agency theory and into incomplete contract theory and examining unique contract data, the contribution of the study is to show that the premium on business familiarity and the trust it implies is not in directly affecting price, but, rather, in changing how the relationship is managed toward a tendency to sign time and materials contracts. Implications about integrating trust into agency theory and incomplete contract theory, as well as implications regarding trust premiums and software development outsourcing, are discussed.

References

[1]
Ang, S., and Straub, D. W. 1998. "Production and Transaction Economics in Information Systems Outsourcing: A Study of the U.S. Banking Industry," MIS Quarterly (22:4), pp. 535-552.
[2]
Artunian, J. 2006. "The Seven Deadly Sins of Outsourcing: These Are the Transgressions That Can Doom You to Outsourcing Hell. Here's How to Avoid Them," Computerworld, May 8 (http://www.computerworld.com/action/article.do?command= viewArticleBasic&articleId=111167&pageN).
[3]
Ba, S., and Pavlou, P. A. 2002. "Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior," MIS Quarterly (26:3), pp. 243-268.
[4]
Bajari, P., and Tadelis, S. 2001. "Incentives Versus Transaction Costs: A Theory of Procurement Contracts," RAND Journal of Economics (32:3), pp. 387-407
[5]
Bakos, J. Y., and Brynjolfsson, E. 1993. "Information Technology, Incentives and the Optimal Number of Suppliers," Journal of Management Information Systems (10:2), pp. 37-53.
[6]
Banerjee, A., and Duflo, E. 2000. "Reputation Effects and the Limits of Contracting: A Study of the Indian Software Industry," Quarterly Journal of Economics (115:3), pp. 989-1017.
[7]
Barki, H., Rivard, S., and Talbot, J. 1993. "Toward an Assessment of Software Development Risk," Journal of Management Information Systems (10:2), pp. 203-225.
[8]
Barthelemy, J., and Geyer, D. 2001. "IT Outsourcing: Evidence from France and Germany," European Management Journal (19:2), pp. 195-202.
[9]
Beizer, B. 1990. Software Systems Techniques, New York: Van Nostrand Reinhold Company.
[10]
Benaroch, M., Lichtenstein, Y., and Robinson, K. 2006. "Real Options in Information Technology Risk Management: An Empirical Validation of Risk-Option Relationships," MIS Quarterly (30:4), pp. 827-864.
[11]
Bolton, P., and Dewatripomt, M. 2005. Contract Theory, Cambridge, MA: The MIT Press.
[12]
Chiappori, P. A., and Salanie, B. 2002. "Testing Contract Theory: A Survey of Some Recent Work," CESifo Working Paper Series, No. 738, CESifo GmbH, Munich.
[13]
Coase, R. 1937. "The Nature of the Firm," Economica (4:16), pp. 386-405.
[14]
Cook, T. D., and Campbell, D. T. 1979. Quasi Experimentation: Design and Analytical Issues for Field Settings, Chicago: Rand McNally.
[15]
Corts, K. S., and Singh, J. 2004. "The Effect of Repeated Interaction on Contract Choice: Evidence From Offshore Drilling," Journal of Law Economics & Organization (20:1), pp. 230-260.
[16]
Cote, J. A., and Buckley, R. 1988. "Measurement Error and Theory Testing in Consumer Research: An Illustration of the Importance of Construct Validation," Journal of Consumer Research (14), pp. 579-582.
[17]
Crocker, K. J., and Reynolds, R. J. 1993. "The Efficiency of Incomplete Contracts: An Empirical Analysis of Air Force Engine Procurement," RAND Journal of Economics (24), pp. 126-146.
[18]
Currie, W. L. 1996. "Outsourcing in the Private and Public sectors: An Unpredictable IT Strategy," European Journal of Information Systems (4:4), pp. 226-236.
[19]
Economist. 2005. "Time to Bring it Back Home? Outsourcing Has its Limits," The Economist, March 3 (http://www.economist. com/research/articlesBySubject/).
[20]
Eisenhardt, K. M. 1989. "Agency Theory: An Assessment and Review," Academy of Management Review (14:1), pp. 57-74.
[21]
Ethiraj, S. K., Kale, P., Krishnan, M. S., and Singh, J. V. 2005. "Where Do Capabilities Come From and How do They Matter? A Study in the Software Services Industry," Strategic Management Journal (26:1), pp. 25-45.
[22]
Fukuyama, F. 1995. Trust: The Social Virtues and the Creation of Prosperity, New York: The Free Press.
[23]
Gefen, D. 2002. "Nurturing Clients' Trust to Encourage Engagement Success during the Customization of ERP Systems," Omega (30:4), pp. 287-299.
[24]
Gefen, D. 2004. "What Makes ERP Implementation Relationships Worthwhile: Linking Trust Mechanisms and ERP Usefulness," Journal of Management Information Systems (21:1), pp. 275-301.
[25]
Gefen, D., Karahanna, E., and Straub, D. W. 2003. "Trust and TAM in Online Shopping: An Integrated Model," MIS Quarterly (27:1), pp. 51-90.
[26]
Gopal, A., Mukhopadhyay, T., and Krishnan, M. S. 2002. "The Role of Software Processes and Communication in Offshore Software Development," Communication of the ACM (45:4), pp. 193-200.
[27]
Gopal, A., Sivaramakrishnan, K., Krishnan, M. S., and Mukhopadhyay, T. 2003. "Contracts in Offshore Software Development: An Empirical Analysis," Management Science (49:12), pp. 1671-1683.
[28]
Grossman, S. J., and Hart, O. D. 1986. "The Costs and Benefits of Ownership: A Theory of Vertical and Lateral Integration," Journal of Political Economy (94), pp. 691-719.
[29]
Grover, V., Cheon, M. J., and Teng, J. T. C. 1996. "The Effect of Service Quality and Partnership on the Outsourcing of Information Systems Functions," Journal of Management Information Systems (12:4), pp. 89-116.
[30]
Gulati, R. 1995. "Does Familiarity Breed Trust? The Implications of Repeated Ties for Contractual Choice in Alliances," Academy of Management Journal (38:1), pp. 85-112.
[31]
Gulati, R., and Singh, H. 1998. "The Architecture of Cooperation: Managing Coordination Costs and Appropriation Concerns in Strategic Alliances," Administrative Science Quarterly (43:4), pp. 781-814.
[32]
Hofstede, G. 2004. "Business Goals and Corporate Governance," Asia Pacific Business Review (10:3/4), pp. 292-301.
[33]
Hosmer, L. T. 1995. "Trust: The Connecting Link between Organizational Theory and Philosophical Ethics," Academy of Management Review (20:2), pp. 379-403.
[34]
Kalnins, A., and Mayer, K. J. 2004. "Relationships and Hybrid Contracts: An Analysis of Contract Choice in Information Technology," Journal of Law Economics and Organization (20:1), pp. 207-229.
[35]
Keil, M., Rai, A., Mann, J. E. C., and Zhang, G. P. 2003. "Why Software Projects Escalate: The Importance of Project Management Constructs," IEEE Transactions on Engineering Management (50:3), pp. 251-261.
[36]
Kern, T., and Willcocks, L. 2001. The Relationship Advantage: Information Technologies, Sourcing, and Management, Oxford, UK: Oxford University Press.
[37]
Koh, C., Ang, S., and Straub, D. W. 2004. "IT Outsourcing Success: A Psychological Contract Perspective," Information Systems Research (15:4), pp. 356-373.
[38]
Kumar, N., Scheer, L. K., and Steenkamp, J.-B. E. M. 1995. "The Effects of Supplier Fairness on Vulnerable Resellers," Journal of Marketing Research (17), February, pp. 54-65.
[39]
Kutten, L. J. 1998. Computer Software, Protection/Liability/Law/ Forms, St. Paul, MN: West Group.
[40]
Lacity, M. C., and Willcocks, L. P. 1998. "An Empirical Investigation of Information Technology Sourcing Practices: Lessons from Experience," MIS Quarterly (22:3), pp. 363-408.
[41]
Lacity, M. C., Willcocks, L. P., and Feeny, D. F. 1996. "The Value of Selective Sourcing," Sloan Management Review (37:3), pp. 13-25.
[42]
Lee, J.-N., and Kim, Y.-G. 1999. "Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation," Journal of Management Information Systems (15:4), pp. 29-61.
[43]
Lee, J.-N., Miranda, S. M., and Kim, Y.-M. 2004. "IT Outsourcing Strategies: Universalistic, Contingency, and Configurational Explanations of Success," Information Systems Research (15:2), pp. 110-131.
[44]
Levina, N., and Ross, J. W. 2003. "From the Vendor's Perspective: Exploring the Value Proposition in Information Technology Outsourcing," MIS Quarterly (27:3), pp. 331-364.
[45]
Lichtenstein, Y. 2004. "Puzzles in Software Development Contracting," Communication of the ACM (47:2), pp. 61-65.
[46]
Lichtenstein, Y., and McDonnell, A. 2003. "Pricing Software Development Services," in Proceedings of the 11th European Conference on Information Systems, Naples, Italy, pp. 1-12.
[47]
Luhmann, N. 1979. Trust and Power, London: John Wiley and Sons.
[48]
Mayer, R. C., Davis, J. H., and Schoorman, F. D. 1995. "An Integrative Model of Organizational Trust," Academy of Management Review (20:3), pp. 709-734.
[49]
McDougall, P. 2006. "Dexterity Required," InformationWeek, June 19, pp. 34-39.
[50]
McKnight, D. H., Choudhury, V., and Kacmar, C. 2002. "Developing and Validating Trust Measures for E-Commerce: An Integrative Typology," Information Systems Research (13:3), pp. 334-359.
[51]
McKnight, D. H., Cummings, L. L., and Chervany, N. L. 1998. "Initial Trust Formation in New Organizational Relationships," Academy of Management Review (23:3), pp. 473-490.
[52]
Mishra, D. P., Heide, J. B., and Cort, S. G. 1998. "Information Asymmetry and Levels of Agency Relationships," Journal of Marketing Research (35), pp. 277-295.
[53]
Nam, K., Rajagopalan, S., Rao, H. R., and Chaudhury, A. 1996. "A Two-level Investigation of Information Systems Outsourcing," Communication of the ACM (39:7), pp. 36-44.
[54]
Neter, J., Wasserman, W., and Kutner, M. H. 1990. Applied Linear Statistical Models: Regression, Analysis of Variance, and Experimental Design (3rd ed.), Homewood, IL: Richard D. Irwin.
[55]
Pavlou, P., and Gefen, D. 2004. "Building Effective Online Marketplaces with Institution-Based Trust," Information Systems Research (15:1), pp. 37-59.
[56]
Pearson, H. E. 1984. Computer Contracts: An International Guide to Agreements and Software Protection, London: Computer Law Series, pp. 113-130.
[57]
Pisano, G. P. 1989. "Using Equity Participation to Support Exchange: Evidence from the Biotechnology Industry," Journal of Law, Economics, and Organization (5:1), pp. 109-126.
[58]
Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., and Podsakoff, N. P. 2003. "Common Method Bias in Behavioral Research: A Critical Review of The Literature and Recommended Remedies," Journal Of Applied Psychology (88:5), pp. 879-903.
[59]
Rao, A. R., and Bergen, M. E. 1992. "Price Premium Variations as a Consequence of Buyers' Lack of Information," Journal of Consumer Research (19:3), pp. 412-423.
[60]
Rogerson, W. P. 1994. "Economic Incentives and the Defense Procurement Process," Journal of Economic Perspectives (8), pp. 65-90.
[61]
Salanie, B. 1997. The Economics of Contracts: A Primer, Cambridge, MA: MIT Press.
[62]
Saunders, C., Gebelt, M., and Hu, Q. 1997. "Achieving Success In Information Systems Outsourcing," California Management Review (39:2), pp. 63-79.
[63]
Simon, H. A. 1951. "A Formal Model of the Employment Relationship," Econometrica (19), pp. 293-305.
[64]
Snir, E. M., and Hitt, L. M. 2003. "Costly Bidding in Online Markets for IT Services," Management Science (49:11), p 1504.
[65]
Snir, E. M., and Hitt, L. M. 2004. "Vendor Screening in Information Technology Contracting With a Pilot Project," Journal of Organizational Computing and Electronic Commerce (14:1), pp. 61-88.
[66]
SPSS. 2004. SPSS 13.0 for Windows, Chicago: SPSS Inc.
[67]
Taylor, H. 2007. "Outsourced IT Projects from the Vendor Perspective: Different Goals, Different Risks," Journal of Global Information Management (15:2), pp. 1-27.
[68]
Tirole, J. 1999. "Incomplete Contracts: Where Do We Stand," Econometrica (67:4), pp. 741-781.
[69]
Walden, E. A. 2005. "Intellectual Property Rights and Cannibalization In Information Technology Outsourcing Contracts," MIS Quarterly (29:4), pp. 699-720.
[70]
Wang, E. T. G., Baron, T., and Seidmann, A. 1997. "Contracting Structures for Custom Software Development: The Impacts of Informational Rents and Uncertainty on Internal Development and Outsourcing," Management Science (43:12), pp. 1726-1744.
[71]
Wilcocks, L. P., and Kern, T. 1998. "IT Outsourcing as Strategic Partnering: The Case of The UK Inland Revenue," European Journal of Information Systems (18:1), pp. 29-45.
[72]
Williamson, O. E. 1979. "Transaction Cost Economics: The Governance of Contractual Relations," Journal of Law, Economics, and Organization (11), pp. 335-361.
[73]
Zucker, L. G. 1986. "Production of Trust: Institutional Sources of Economic Structure, 1840-1920," Research in Organizational Behavior (8), pp. 53-111.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image MIS Quarterly
MIS Quarterly  Volume 32, Issue 3
September 2008
230 pages

Publisher

Society for Information Management and The Management Information Systems Research Center

United States

Publication History

Published: 01 September 2008

Author Tags

  1. agency theory
  2. business familiarity
  3. contractual governance
  4. fixed price
  5. incomplete contract theory
  6. software development outsourcing
  7. time and materials
  8. trust

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)The Role of Vendor Legitimacy in IT Outsourcing PerformanceInformation Systems Research10.1287/isre.2021.105933:1(337-361)Online publication date: 1-Mar-2022
  • (2021)The Power of Renegotiation and Monitoring in Software OutsourcingInformation Systems Research10.1287/isre.2021.102632:4(1236-1261)Online publication date: 1-Dec-2021
  • (2018)Single-sourcing versus multisourcingMIS Quarterly10.25300/MISQ/2018/1406742:4(1171-1186)Online publication date: 1-Dec-2018
  • (2017)An empirical analysis of intellectual property rights sharing in software development outsourcingMIS Quarterly10.25300/MISQ/2017/41.1.0741:1(131-161)Online publication date: 1-Mar-2017
  • (2017)Strategic risk analysis for information technology outsourcing in hospitalsInformation and Management10.1016/j.im.2017.02.01054:8(1049-1058)Online publication date: 1-Dec-2017
  • (2017)IS auditor characteristics, audit process variables, and IS audit satisfactionInformation Systems Frontiers10.1007/s10796-015-9612-z19:3(577-591)Online publication date: 1-Jun-2017
  • (2016)A response to "Transaction Cost Economics on Trial Again"The Journal of Strategic Information Systems10.5555/2912258.291252925:1(57-63)Online publication date: 1-Mar-2016
  • (2016)Trust in Cloud ComputingACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/2963175.296317947:2(58-96)Online publication date: 24-Jun-2016
  • (2016)Theoretical Foundations to Information Technology Outsourcing Research in the Public SectorProceedings of the 17th International Digital Government Research Conference on Digital Government Research10.1145/2912160.2912182(136-145)Online publication date: 8-Jun-2016
  • (2016)The Dual-sided Effect of Project Failure on IT ProfessionalsProceedings of the 2016 ACM SIGMIS Conference on Computers and People Research10.1145/2890602.2890610(33-37)Online publication date: 2-Jun-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media