政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/35436
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113318/144297 (79%)
Visitors : 51011265      Online Users : 900
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/35436


    Title: 資訊委外關係管理之研究- 企業如何利用資訊委外獲得最大綜效
    Reap From IT Outsourcing -- Effective Relationship Management
    Authors: 吳愷暉
    Wu, Kai-Hui
    Contributors: 尚孝純
    Shang, Shari
    吳愷暉
    Wu, Kai-Hui
    Keywords: 資訊科技委外
    委外關係
    市場變化
    資訊中心支援能力
    委外期望
    Information Technology Outsourcing
    Outsourcing Relationship
    Business Dynamics
    IT Competence
    Outsourcing Expectation
    Date: 2007
    Issue Date: 2009-09-18 15:01:20 (UTC+8)
    Abstract: 摘要
    在資訊科技服務的市場,資訊科技委外(ITO)在市場佔有顯著的地位。過去有許多的報告研究資訊委外廠商的選擇,以及有效的合約管理方法,鮮少針對企業資訊委外合約簽訂之後,企業與委外伙伴之間的互動進行研究。然而依據許多個案報導案例顯示,大多數委外案例的失敗,不是由於雙方關係管理的不適當,就是無法滿足委外企業最初委外目標的期盼。
    我們使用在過去的二十六年中臺灣資訊科技委外市場的四十個案例來研究探討如何利用資訊委外關係管理來獲取預期綜效。經過分析與研究,發現四種資訊科技委外的合作關係。這四種合作關係型態分別為:夥伴關係(Partner)、倚賴關係(Dependent)、隨需存取關係(Utility)、以及附屬關係(Subordinate)。不同的委外關係含概了不同的委外服務內容,也含概了不同的關係管理。夥伴的合作關係,企業的期望不止雙方合作達成企業的策略目標,同時也期望委外廠商支援科技創新而提升企業的市場競爭力;倚賴的合作關係,企業對委外廠商支援達成企業策略目標高度倚靠;隨需存取的合作關係,企業期望資源的取得是隨需存取,完全以成本考量;附屬的合作關係,企業則認為該委外廠商僅僅是依附於資訊中心的下包廠商,委外與否完全由企業的資訊中心自行決定。此外,本研究顯示不同的委外關係是由於不同的委外關係無法達成期盼,以及無法交付最終策略利益、經濟利益、或資訊科技利益而終止。
    本論文透過文獻探討與深度個案研究,來瞭解影響不同合作關係資訊科技委外的相關因素,和期盼的資訊科技委外的結果。不同型態資訊科技委外關係的管理需要瞭解委外企業對所需服務的期望,以及在合作期間,彼此關係的管理需不斷的注意市場以及資訊科技的變化而提出相對應的策略來因應彼此合作關係,以期從中獲取最大效益。
    關鍵字:資訊科技委外,委外關係,市場變化,資訊中心支援能力,委外期望。
    Information Technology Outsourcing (ITO) has gained a big share of the world IT service market. There are many studies about ITO vendor selection and contract management but a lack of understanding of the after-contract practice between the ITO parties. According to reported cases many outsourcing failures were due to either improper relationship management or unable to meet customer expectations. For effective management of this long-term inter-organizational relationship there is a need for understanding the features, affecting factors, expectations and termination of ITO relationship so that the desired outcomes can be achieved and relationship can be sustained throughout the life of the ITO.

    The above propositions were tested on all existing and changed ITO projects in Taiwan in the past twenty five years. A total of fourty cases were examined and the results show four kinds of IT outsourcing relationship: dependent, utility, partner and subordinate. Different kinds of ITO relationship have different expectations for the ITO services and require different management on the relationships. The dependent type ITO customers rely highly on ITO vendors for supporting strategic moves. The utility ITO customers use ITO as a utility and measure vendors by cost performance. The partner type ITO customers consult vendor for business strategic moves and urge vendor for technology innovation. The subordinate type ITO customers consider ITO vendors as a sub-contractor of IT department and leave decisions to the IT department. Those terminated cases were mainly due to conflicts in the expected and delivered outcome in the three ITO benefit areas.

    This study provides useful instrument for assessing major ITO factors and understanding expected ITO outcomes. ITO relationship management requires a careful understanding of the expected benefits of the service and continuous monitoring of the business and IT environment.

    Keywords : Information Technology Outsourcing;Outsourcing Relationship;Business Dynamics;IT Competence;Outsourcing Expectation。
    Reference: 
    壹、 英文部分
    1.Anderson, E., and Weitz, B. (1989). "Determinants of Continuity in Conventional Industrial Channel Dyads." Marketing Science, 8(4), 310-323.
    2.Anderson, J. C., and Narus, J. A. (1990). "A Model Of Distributor Firm And Manufacturer Firm Working P." Journal of Marketing, 54(1), 42.
    3.Ang, S., and Straub, D. W. (1998). "Production and transaction economies and IS outsourcing: A study of the U.S. banking industry." MIS Quarterly, 22(4), 535.
    4.Aron, R., Clemons, E., and Reddi, S. (2005). "Just Right Outsourcing: Understanding and Managing Risk." Journal of Management Information Systems, 22(2), 37-55.
    5.Auberl, B., Patry, M., and Rivard, S. (1998). "Assessing the Risk of IT Outsourcing." Proceedings of the 31st Annual Hawaii International Conference on System Sciences, pp. 685-691.
    6.Bensaou, M., and Venkatraman, N. (1995). "Configurations of Interorganizational Relationships: A Comparison between US and Japanese Automakers." Management Science, 41(9), 1471-1492.
    7.Bharadwaj, A. S. (2000). "A resource-based perspective on information technology capability and firm performance: An empirical investigation." MIS Quarterly, 24(1), 169.
    8.Chaudhury, A., Nam, K., and Rao, H. R. (1995). "Management of information systems outsourcing: A bidding perspective." Journal of Management Information Systems, 12(2), 131.
    9.CIO. (2003). "When the Mission Changes, IT Does Too ; For Washington Mutual, a passion for customers prompted the bank to reinsource all of its IT functions that directly affected its customers." CIO, 16(10), 1.
    10.Cross, J. (1995). "IT Outsourcing: British Petroleum`s Competitive Approach." Long Range Planning, 28(4), 128-128.
    11.Cullen, S., and Willcocks, L. (2003). Intelligent IT outsourcing: eight building blocks to success, Butterworth-Heinemann.
    12.Currie, W., and Willcocks, L. (1998). "Analysing four types of IT sourcing decisions in the context of scale, client/supplier interdependency and risk mitigation." Information Systems Journal, 8(2), 119-143.
    13.De Looff, L. (1995). "Information systems outsourcing decision making: a framework, organizational theories and case studies." JIT. Journal of information technology(Print), 10(4), 281-297.
    14.Dibbern, J., Goles, T., Hirschheim, R., and Jayatilaka, B. (2004). "Information systems outsourcing: a survey and analysis of the literature." ACM SIGMIS Database, 35(4), 6-102.
    15.DiRomualdo, A., and Gurbaxani, V. (1998). "Strategic Intent for IT Outsourcing." Sloan Management Review, 39(4), 67.
    16.Earl, M. J. (1996). "The Risks of Outsourcing IT." Sloan Management Review, 37(3), 26.
    17.Feeny, D. F., and Willcocks, L. P. (1998). "Core IS Capabilities for Exploiting Information Technology." Sloan Management Review, 39(3), 9.
    18.Fitzgerald, G., and Willcocks, L. (1994). Outsourcing Information Technology: Contracts and the Client/vendor Relationship., Oxford Institute of Information Management.
    19.Goles, T., and Chin, W. W. (2005). "Information Systems Outsourcing Relationship Factors: Detailed Conceptualization and Initial Evidence." Database for Advances in Information Systems, 36(4), 47.
    20.Grover, V., and Teng, J. (1993). "The Decision to Outsource Information Systems Functions." Journal of Systems Management, 44(11), 34-38.
    21.Grover, V., Cheon, M. J., and Teng, J. T. C. (1996). "The effect of service quality and partnership on the outsourcing of information systems functions." Journal of Management Information Systems, 12(4), 89.
    22.Heide, J., and John, G. (1990). "Alliances in Industrial Purchasing: The Determinants of Joint Action in Buyer-Supplier Relationships." Journal of Marketing Research, 27(1), 24-36.
    23.Henderson, J. C. (1990). "Plugging Into Strategic Partnerships: The Critical IS Conne." Sloan Management Review, 31(3), 7.
    24.Huang, B. (2006) “Service Market Opportunity Newly Update” IBM xGMV.
    25.Huber, R. L. (1993). "How Continental Bank outsourced its "crown jewels"." Harvard Business Review, 71(1), 121.
    26.Kern, T., and Willcocks, L. (2002). "Exploring relationships in information technology outsourcing: the interaction approach." European Journal of Information Systems, 11(1), 3-19.
    27.Kern, T., and Willcocks, L. (2002). The Relationship Advantage: Information Technologies, Sourcing, and Management, Oxford University Press.
    28.Klepper, R. (1995). "Outsourcing relationships." Managing information technology investments with outsourcing table of contents, 218-243.
    29.Konsynski, B. R., and McFarlan, F. W. "Information Partnerships - Shared Data, Shared Scale." Harvard Business Review, 68(5), 114.
    30.Lacity, M., and Hirschheim, R. (1993). "The Information Systems Outsourcing Bandwagon." Sloan Management Review, 35(1), 73-86.
    31.Lacity, M., and Hirschheim, R. (1993). Information Systems Outsourcing; Myths, Metaphors, and Realities, John Wiley & Sons, Inc. New York, NY, USA.
    32.Lacity, M. C., and Willcocks, L. P. (1998). "An empirical investigation of information technology sourcing practices: Lessons from experience." MIS Quarterly, 22(3), 363.
    33.Lee, J. (2001). "The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success." Information & Management, 38(5), 323-335.
    34.Lee, J.N., and Kim, Y.G. (1999). "Effect of partnership quality on IS outsourcing: Conceptual framework and empirical validation." Journal of Management Information Systems, 15(4), 29.
    35.Levina, N., and Ross, J. W. (2003). "From the vendor`s perspective: Exploring the value proposition in information technology outsourcing(1)(2)." MIS Quarterly, 27(3), 331.
    36.Loh, L., and Venkatraman, N.(1992) “Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect,” Information Systems Research (4:3), 1992, pp. 334-358.
    37.Marcolin, B., and McLellan, K. (1998). "Effective IT Outsourcing Arrangements." Proceedings of the 31st Annual Hawaii International Conference on System Sciences, 654-665.
    38.McFarlan, F., and Nolan, R. (1995). "How to Manage an IT Outsourcing Alliance." Sloan Management Review, 36(2), 9-23.
    39.MICHELL, V. (1997). "The IT outsourcing market-place: vendors and their selection." Journal of Information Technology, 12(3), 223-237.
    40.Mieghem, J. A. V. (1999). "Coordinating investment, production, and subcontracting." Management Science, 45(7), 954.
    41.Mohr, J., and Spekman, R. (1994). "Characteristics of Partnership Success: Partnership Attributes, Communication Behavior, and Conflict Resolution Techniques." Strategic Management Journal, 15(2), 135-152.
    42.Morgan, R., and Hunt, S. (1994). "The Commitment-Trust Theory of Relationship Marketing." Journal of Marketing, 58(3), 20-38.
    43.Nam, K., Rajagopalan, S., Rao, H. R., and Chaudhury, A. (1996). "A two-level investigation of information systems outsourcing." Association for Computing Machinery. Communications of the ACM, 39(7), 36.
    44.Overby, B. S. (2005). "Backsourcing Pain ; JPMorgan Chase`s decision to first outsource IT and then bring it back in-house stands as a cautionary tale for any CIO considering an outsourcing megadeal." CIO, 18(22), 1.
    45.Overby, S. (2003). "In or Out? To outsource or to insource: Here`s how two resourceful CIOs made their decisions." CIO-FRAMINGHAM MA-, 16(21), 75-78.
    46.Paul , J., Derek , S., and Brad , S. (2005). "The Global Outsourcing Marketplace:Key Data, Forecasts & Trends." Kennedy Information.
    47.Pine, B. (1993). Mass Customization: The New Frontier in Business Competition, Harvard Business School Press.
    48.Richmond, W. B., and Seidmann, A. (1993). "Software development outsourcing contract: Structure and business value." Journal of Management Information Systems, 10(1), 57.
    49.Ross, J. W., Beath, C. M., and Goodhue, D. L. (1996). "Develop Long-Term Competitiveness Through IT Assets." Sloan Management Review, 38(1), 31.
    50.Sambamurthy, V., Bharadwaj, A., and Grover, V. (2003). "Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary Firms1." MIS Quarterly, 27(2), 237.
    51.Scarbrough, H. (1995). "Blackboxes, hostages and prisoners." Organization Studies, 16(6), 991-1019.
    52.Sommer, R. (2003). "Business process flexibility: a driver for outsourcing." Industrial Management and Data Systems, 103(3), 177-183.
    53.Weill, P., and Broadbent, M. (1998). Leveraging the new infrastructure: how market leaders capitalize on information technology, Harvard Business School Press Boston, MA, USA.
    54.Willcocks, L., and Kern, T. (1998). "IT outsourcing as strategic partnering: the case of the UK Inland Revenue." Space, 7(1), 29-45.
    55.Willcocks, L., Fitzgerald, G., and Feeny, D. (1995). "Outsourcing IT: The strategic implications." Long Range Planning, 28(5), 59.
    56.Willcocks, L., Lacity, M., and Kern, T. (1999). "Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA." Journal of Strategic Information Systems, 8(3), 285-314.
    Description: 碩士
    國立政治大學
    經營管理碩士學程(EMBA)
    93932609
    96
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0093932609
    Data Type: thesis
    Appears in Collections:[Executive Master of Business Administration] Theses

    Files in This Item:

    File Description SizeFormat
    93260901.pdf43KbAdobe PDF2881View/Open
    93260902.pdf77KbAdobe PDF2855View/Open
    93260903.pdf68KbAdobe PDF27821View/Open
    93260904.pdf32KbAdobe PDF2740View/Open
    93260905.pdf63KbAdobe PDF2749View/Open
    93260906.pdf95KbAdobe PDF2950View/Open
    93260907.pdf208KbAdobe PDF21272View/Open
    93260908.pdf150KbAdobe PDF21489View/Open
    93260909.pdf119KbAdobe PDF2713View/Open
    93260910.pdf172KbAdobe PDF2772View/Open
    93260911.pdf130KbAdobe PDF2937View/Open
    93260912.pdf61KbAdobe PDF2904View/Open
    93260913.pdf329KbAdobe PDF2872View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback