225

Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing
Page 2: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

Prelims.qxd 3/1/05 12:29 PM Page i

Page 3: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 4: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

Ian Tho

AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD

PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO

Prelims.qxd 3/1/05 12:29 PM Page iii

Page 5: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

iv

Elsevier Butterworth-HeinemannLinacre House, Jordan Hill, Oxford OX2 8DP, UK30 Corporate Drive, Burlington, MA 01803, USA

First published 2005

Copyright © 2005, Ian Tho. All rights reserved

No part of this publication may be reproduced in any material form (including photocopying or storing in any medium by electronic means and whether or not transiently or incidentally to some other use of this publication) without the written permission of the copyright holder except in accordance with the provisions of the Copyright, Designs and Patents Act1988 or under the terms of a licence issued by the Copyright LicensingAgency Ltd, 90 Tottenham Court Road, London, England W1T 4LP.Applications for the copyright holder’s written permission to reproduce any part of this publication should be addressed to the publishers

British Library Cataloguing in Publication DataA catalogue record for this book is available from the British Library

Library of Congress Control Number 200592252A catalogue record for this book is available from the Library of Congress

ISBN 0 7506 65742

Typeset by Charon Tec Pvt. Ltd, Chennai, Indiawww.charontec.comPrinted and bound in United Kingdom

For information on all Elsevier Butterworth-Heinemann publications visit our web site at www.books.elsevier.com

Prelims.qxd 3/1/05 12:29 PM Page iv

Page 6: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

About the author xiii

Preface xv

Section I: Language of IT Outsourcing (ITO) 1

Chapter 1: Common terms and concepts used inoutsourcing 3

1.1 The need to manage risks in IT outsourcing 41.2 The practice of outsourcing 51.3 Agreeing the definition of outsourcing 71.4 Contracting versus outsourcing 91.5 Blurred organizational boundaries 111.6 Differences in emphasis 12

Risk transfer difference 12Buyer/Supplier relationship difference 12Changes in process model difference 13

1.7 Process changes 161.8 Acceptance of information technology

outsourcing (ITO) 18Early adopters and failures 19

1.9 Benefiting from ITO 20Supplier benefits 23Common (buyer and supplier) benefits 24Buyer benefits 24

1.10 Outsourcing models 25Outsourcing types 27Complete/Selective outsourcing 28Keiretsu 29

1.11 Outsourcing partnerships 30

v

Contents

Prelims.qxd 3/1/05 12:29 PM Page v

Page 7: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

1.12 Outsourcing contracts 341.13 Outsourcing and the implications for human

resource development 37

Chapter 2: Outsourcing the IT function 39

2.1 The ‘core competency’ argument 41Performance of the IT function 42Distinctive competency 44Diversification and specialization 45Outsourcing to derive the benefits of corecompetency 46

2.2 The ‘economies of scale’ argument 472.3 Commoditization of IT 492.4 The role of IT in the organization 492.5 Outsourcing and the unique role(s)

of the IT function 50The IT productivity paradox and outsourcing 53Hidden costs 54

2.6 Information technology outsourcing risk 56

Section II: Measuring and understandingIT outsourcing risks 61

Chapter 3: Measuring risks in IT outsourcing 63

3.1 Risk definition 653.2 Investigating risk 65

Intrusive factors (exogenous and endogenous risks) 66Operational and relationship risks 67

3.3 IT outsourcing risks (causes and effects) 69Causality and random activity concept 70

3.4 Measuring risk exposure 71Quantifying risk exposure 72Risk exposure (RE) boundaries 72

3.5 Examples of risk management models 743.6 Difficulties in measuring risks and risk exposure 763.7 Measuring IT outsourcing (ITO) risks by

group/category 773.8 So why group risks? 79

Associating similar risk types 79Evaluating over time 80Considering risk characteristics and focus 80Risk classification 81

Contents

vi

Prelims.qxd 3/1/05 12:29 PM Page vi

Page 8: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

3.9 Identifying risk groups for IT outsourcing (ITO) 82Recommended risk groups/dimensions 82

3.10 Visualizing risk patterns from arbitrary risk dimensions 85

Linking risk dimensions with operational and relationship risks 85Illustrating risk exposure 86Mapping possible risk dimensions against the risk landscape 88

3.11 Constructing the signature 913.12 Graph types 91

Categorical scales on the axes 93Rank-ordered scales on the axes 93Likert scales on the axes 94

3.13 IT outsourcing and the risk dimension signature (RDS) 94

Chapter 4: The challenge of understanding risks when outsourcing the IT function 95

4.1 Interpreting the RDS 964.2 Computation of total risk exposure 98

Comparing buyer and supplier risks on the RDS 100Interpreting the buyer and supplier RDSs 100Further observations from risk signaturesor risk dimension signatures 101

4.3 Additional RDSs and patterns 103Sample RDS patterns and interpretation 103

4.4 IT outsourcing (ITO) measurement framework 104Considering multiplicity of risks 105Considering contract periods 105Considering buyer and supplier 106

4.5 Shifting the ‘effects of risk’ 107Risk-shifts between buyer and supplier 107

4.6 Observing risks in an ITO environment 1094.7 Winner’s curse 1104.8 Agency theory 112

Chapter 5: Risk interaction in IT outsourcing 119

5.1 Interaction between supplier and buyer in IT outsourcing 119

The paradox effect 120Relationship dynamics between buyer and supplier 121

Contents

vii

Prelims.qxd 3/1/05 12:29 PM Page vii

Page 9: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

5.2 Implications of relationship for risk 121Interplay between buyer and supplier RDSs 122Sharing of risks between buyer and supplier 123

5.3 Sharing risks within one organization, betweenvalue activities 123

Risk signature/RDS – supplier 124Risk signature/RDS – buyer 125

5.4 Tolerance for risk exposure (risk appetite) 1265.5 Mapping the risk signature 1285.6 Evaluation dimensions 1295.7 Analysing risk with the RDS 131

Empirical measurement 134Data on risks and risk exposure 134Interaction between categories 135

Section III: Mitigating (& managing) risks inIT outsourcing 137

Chapter 6: Risk characteristics and behaviour in an ITO exercise 139

6.1 Behaviour of risks 1416.2 Risk appetite 1436.3 Fundamental assumptions in understanding

risks 143Cause & effect 143Internal/external influences 144Accuracy of risk classification/grouping 144

6.4 Effects of influences 1446.5 Relationships between risk dimensions 145

Risk balancing 146Changes in risk exposure (RE) 146State of equilibrium 147

6.6 Game theory 1496.7 Chaos theory 1516.8 The perfect project 152

Chapter 7: Mitigating risks in an ITO environment 154

7.1 The ITO risk ecosystem 1547.2 Predicting the behaviour of risks with the RDS 1567.3 Depiction of the risk profile 1577.4 Risk frameworks 157

Interplay between risk dimensions 159

Contents

viii

Prelims.qxd 3/1/05 12:29 PM Page viii

Page 10: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Interaction of intrusive factors 1597.5 Using the concepts 159

Overcoming difficulties that may be encountered 160Limitations 161Important assumptions 163

7.6 Insights into risk behaviour using the RDS tool 1647.7 Further remarks 166

Chapter 8: A case study – ITO risks 168

8.1 Case study background 1688.2 Risks identification 1708.3 Internal (endogenous) risks 174

Buyer risks 175Supplier risks 175

8.4 External (exogenous) risks 177Buyer risks 177Supplier risks 177

8.5 Risk profiles from participants in individualand group sessions 180

8.6 Using the risk dimensions 1838.7 The buyer & supplier RDS profiles 184

At the start of the ITO exercise 184RDS for supplier S1 186RDS for supplier S2 188Qualitative assessment of the buyer RDS 191Quantitative assessment of the buyer RDS 195

8.8 Concluding remarks 197

References 199

Index 203

Contents

ix

Prelims.qxd 3/1/05 12:29 PM Page ix

Page 11: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 12: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Tomy darling wife Cynthia,

my loving parents Yow Pew and Irene, andmy only sister, Su-fen.

xi

Prelims.qxd 3/1/05 12:29 PM Page xi

Page 13: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 14: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

About the author

Ian Tho is a practising management consultant. He has overeighteen years of international consulting experience and workswith both buyers and suppliers in the area of IT outsourcingservices. He is a graduate of the University of Melbourne,Australia, where he earned a BEng. He received his MBA fromMonash University, Australia, and earned his PhD in the area ofrisks in IT outsourcing, at Deakin University, Australia. He isalso a Fellow of the Australian Institute of Management.

Ian works in the area of IT outsourcing and is the National Headof Healthcare with KPMG. He works with healthcare providers,suppliers, regulators, insurance, pharmaceuticals and equipmentmanufacturers. He has also worked with Andersen Consulting(now Accenture) for over eleven years in its Chicago, New York,Melbourne, Paris, Singapore and Kuala Lumpur offices. Ian wasthe Managing Director for Asia with Datacom Asia (Outsourcingand Call Centres) where he was responsible for Datacom officesin Malaysia, Singapore, Thailand, Hong Kong, the Philippinesand Indonesia. His clients include Microsoft; 3Com; Palm;Toshiba; Compaq; Dell Asia Pacific; Citibank; United ParcelService Inc.; Carlsberg; Colgate; Shell; Jet Propulsion Laboratory,USA; Vlassic Pickles, USA; Malaysia buyer organizations;Malayan Banking; National Heart Institute, Malaysia; Telstra,Australia; the Alfred Hospital, Australia; the State ElectricityCommission of Victoria, Australia; the Commonwealth Bank ofAustralia; and United Energy, Australia. His other clients includemajor organizations in healthcare, manufacturing, oil & gas andtechnology. Ian can be reached via e-mail at [email protected]

xiii

Prelims.qxd 3/1/05 12:29 PM Page xiii

Page 15: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 16: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Preface

Buyers or suppliers of IT outsourcing services are constantly tor-mented by the prospect of having to deal with the vicissitudes ofrisks in their projects. In today’s business environment, theprecipitous rates of technological change have outpaced the abil-ity of many organizations to support the IT function. These organ-izations are faced with the ‘usual’ challenge to maintain an ITfunction and to simultaneously manage in an environment ofbrisk change and perpetual uncertainty. All of this, however, inaddition to the vagaries of risk and its effects, makes managing theIT function an exceptionally challenging task for many managers.As a result, these managers and the organizations they representsuccumb by using outsourcing as an opportunity to de-focus fromthe IT function, something that is, commonly, also not an activityof core competence (Prahalad and Hamel, 1990). IT outsourcingpromises to lower operating costs, lower risk exposure and takeadvantage of best practices that are introduced when workingwith the supplier of IT services. These organizations plan to trans-fer the IT function outside the organization and also to reap thepayback of the IT function, through the use of outsourcing.

The term outsourcing conjures up several different meaningsdepending on how it is viewed. To potential and existing users ofthis concept, it may contain a connotation of a loss of control; anda fear that a third party would take over jobs, work and responsi-bility for what used to be an internal function. To others, it carriessuggestions of a takeover; and to yet another group, outsourcingimplies additional work that will be required to supervise add-itional personnel that are brought ‘on-board’. Many managers, itseems, attempt to seek consolation by rejecting the concept ofoutsourcing altogether. Further, ideas are devised and thoughtsrationalized to address this feeling of trepidation through com-monly heard reasons not to outsource. Common reasons that mayinadvertently or unintentionally be used to reinforce these con-cerns include, for example, ‘IT outsourcing results in an unaccept-able loss of control’, ‘intolerable increases in security issues [e.g.loss of corporate information]’ or just ‘undesirable increases inoperational risk’. Most importantly and central to this environ-ment, is the notion of risks introduced in Section I of this book.

xv

Prelims.qxd 3/1/05 12:29 PM Page xv

Page 17: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Operational risks are transferred away when the IT function isoutsourced, but other risk types that were formerly dormantbecome active and, in addition, new risks are introduced. Thisnew uncertainty and risk has deterred many organizations con-sidering IT outsourcing. A tool is introduced in Section II of thisbook that may help alleviate some of this anxiety. The tool isused in conjunction with existing risk frameworks to improvethe management of risks in this environment.

Risks have seldom been addressed directly. The importance ofrisks, however, highlights a shift in emphasis that has takenplace, as there is a realization of the significance of quantifyingand understanding risks in an IT outsourcing exercise. Forexample, there is a grossly uneven experience level (experience ofan IT outsourcing exercise) between the supplier and buyer thatskews advantage toward the supplier. In response, it is impor-tant that participants in an IT outsourcing exercise understandand anticipate changes in the behaviour of activities that cancause harm (risks) within the complex and often inexact environ-ment of IT outsourcing. This is illustrated in the case study inSection III of this book.

A supplier is often loath to share proprietary material and experi-ence, possibly because of a fear that its competitors would takeadvantage of the way it manages its risks. As a result there arefew, if any, publicized or ‘shared’ attempts to address the area ofrisks in an IT outsourcing exercise for the supplier. Buyers thatneed this information are not able to easily obtain it without firstengaging with an outsourcing services supplier. Then again, it isthe supplier that takes on the operational risks in an IT outsourc-ing exercise. The supplier is able to manage risk exposure, espe-cially in the operational risk dimension, better than the buyergiven its focus and dedicated resources on the IT function. So theargument continues.

This book focuses on both the supplier and buyer of IT outsourc-ing services. It guides the reader through the creation of risk pro-files for both these entities; these profiles are of equal importancefor a successful IT outsourcing contract and arrangement. The‘risk dimension signature’, or 1RDS instrument introduced in thisbook, can be deployed quickly as a tool to depict the complex

Preface

xvi

1The acronym for the risk dimension signature (RDS) used throughout thisbook should not be confused with the neonatal respiratory distress syndrome(RDS), also called hyaline membrane disease, which is discussed in the areaof healthcare risks.

Prelims.qxd 3/1/05 12:29 PM Page xvi

Page 18: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

risks in any IT outsourcing environment in a simple, graphicalway for both the buyer and supplier. This is used in conjunctionwith the more tried and proven risk management approaches.Readers will find that many concepts introduced with the RDSleverage on some of the new concepts and ways of measuringrisk, which is explained in Section I. Sample approaches andinstruments are mentioned as complementary tools that supportthe RDS. The RDS may then be used as a tool to ensure equal dis-tribution of risks between the buyer and supplier in the IT out-sourcing exercise.

Foundational concepts and terms used in IT outsourcing areexplained in Section I ‘Selected terms in the language of IT out-sourcing’. This exercise establishes a common baseline for readersfrom various backgrounds, and serves to highlight nuances in theterminology, which can be quite confusing at times. With this as abackground, a simplified risk measurement and managementapproach called the ‘Measure, Understand and Mitigate’, orMUM method in this book, is introduced in Sections II and III.This provides a framework for the reader to quickly capture andproactively manage risks in the IT outsourcing environment. Themathematical equations introduced in Section II represent thecomputation of simple risk exposure (RE). There has also been avery conscious effort to avoid the use of more-complex equationsbut readers who are inclined are encouraged to extend these con-cepts further with the author. The three sections of the book areintended to methodically introduce the reader to some of the keyconcepts of managing risks but importantly also, introduce thenew instrument to represent the range of risks in the IT outsourc-ing environment. Chapter 8 provides the reader with a ‘walk-through’ of a live example of an IT outsourcing exercise. Many of the concepts introduced in the book are referred to and usedin the case study. With this, it is hoped that the reader is able touse the basic concepts to build better risk mitigation frameworksand enjoy more fully the concept and benefits of outsourcing.

IAN THO

Preface

xvii

Prelims.qxd 3/1/05 12:29 PM Page xvii

Page 19: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 20: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Language of IT Outsourcing (ITO)

Section I

Chap-01.qxd 3/1/05 12:29 PM Page 1

Page 21: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 22: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The information technology (IT) function is multifaceted andcomplex. This complexity is increased as components and infra-structure built using new technology advances at a dizzyingpace. The rate of adoption of new technology to enable organ-izations’1 business processes to be differentiated from those ofthe competition, and, ultimately, to deliver products and ser-vices to customers, is just as feverishly brisk. IT components are,in addition, pervasive, and have become a mandatory functionin most business operations.

As organizations realize the need for the IT function, they arefaced with a new problem, i.e. the increasing challenge of main-taining a fully operational IT function within the organization.This is challenging because the IT function is often not a corefunction and continues to distract organizational activities froma main focus. Outsourcing the IT function then becomes a tantal-izing prospect, which allows organizations to maintain a fullyoperational IT function that will have predicable outcomes andcosts and that will allow them to maintain a focus on core busi-ness operations. Allowing a third party to maintain the IT func-tion solves the difficulty. Or so it seems.

When the IT function is combined with outsourcing activity, therisks that are introduced form a new set of risks (or risk profile),one that is rarely observed in any other environment. For example,in this situation, elements of agency theory are observed where

3

Common terms and concepts used in outsourcing

All colours will agree in the dark.Francis Bacon (1561–1626)

English philosopher, statesman, and lawyer

1

1 The term organization is used synonymously with generic terms like firm, enterprise, business, operation, establishment or company throughoutthis book.

Chap-01.qxd 3/1/05 12:29 PM Page 3

Page 23: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

two entities (the buyer and supplier) are contracted in an envir-onment where there is a complex combination of tasks. Thisgives rise to organizational and environmental risks that areoften neglected in performance measurement or paymentschemes. The interaction of the environment and various factorsexternal to either the buyer or the supplier also contributes tothis complexity because of the extended duration of the con-tract. This combination of factors provides for a risk profile thatis constructed from multiple risk types.

1.1 The need to manage risks in IToutsourcing

Managing the risks of IT outsourcing is a combination of the artof management and the science of measuring an indefinite event,i.e. risk. Risks must never be ignored but addressed proactivelyto ensure that their effects are never realized. Managing risks inan IT outsourcing (ITO) exercise is, in addition, not a discre-tionary activity. The management of risks involves active stepsto reduce, to acceptable levels, the probability of an unwantedevent occurring. It also requires an overall understanding of theoperations, the environment and the possible effects as variousfactors interact.

Despite the importance of risks, many managers have either noopportunity to consider risks because of more urgent oper-ational concerns or little understanding of how to manage some-thing that has not yet happened. In fact, many would consider ita waste of time because it is difficult to do. In addition, currentmethods are inadequate for guiding and evaluating the journeythat these organizations must make when working on the long-term ‘deal’ with a supplier and vice versa. There are many riskmanagement tools. There are, however, few if any that allow themanager to take a snapshot of risks that occur in his/her specificenvironment or project. And there are fewer tools available toallow the manager to forecast and predict the behaviour of risksin the ITO environment.

If there is so much consternation over the outsourcing of the ITfunction, why is there significant and growing evidence for thepopularity of ITO? One reason is the overwhelming number ofbenefits that outsourcing offers to organizations that buy and usethis concept (buyers) and others that offer it (suppliers). Beforetaking on the concept of risks in ITO, there are some key termsand concepts where common understanding must be established.

Managing the Risks of IT Outsourcing

4

Chap-01.qxd 3/1/05 12:29 PM Page 4

Page 24: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

It is very important to do this before we begin to introduce newideas. This is especially so in this situation as expressions andnomenclature are inadvertently substituted depending on thesituation. This section starts by establishing the background andhighlights selected terms that are commonly used.

1.2 The practice of outsourcing

Many tasks that were once performed at home are now assumedto be more capably done by an external expert or an outsideparty. After all, where does one go to in order to mend one’sshoes but to a cobbler; or to a clothes retailer/tailor to buy adress; or to a barber to have one’s hair cut? We now find it sim-ply more convenient and cost-effective, and less risky, to get theproducts and services we need from someone who ‘does it for aliving’. In these situations, the risks are so minuscule that theyare often not considered at all. Outsourcing of the IT function,conversely, can involve multifaceted risks and the managementof a very complex set of processes, a mix of technology productsand a highly trained group of people. It also involves medium- tolong-term planning and a business strategy for a function that isvital for the optimal performance of the many component partsof a typical organization.

Commercially, the notion of outsourcing has also been anaccepted practice for organizations such as those in the manu-facturing industry. Manufacturers who practise outsourcing maychoose to use third-party suppliers to provide a substantialnumber of components (nearly finished products) to be assem-bled. An example is the multinational computer manufacturerand retailer, Dell Corporation. Dell successfully assembles hard-ware components for its personal computers (PCs) for retail.This ensures that its PCs are often more price competitive thanthose of many other manufacturers. Dell purchases hard drives,monitors, memory sticks and CPUs from original equipmentmanufacturers (OEMs) or suppliers that manufacture and thensupply the finished products to similar organizations. By sour-cing the bulk of its manufacturing activity, Dell is able to securedeals that ensure better quality, on-time delivery and a morecost-effective supply chain. In this outsourcing model, productsare purchased from an external party in addition to services thatare provided outwith Dell. The risks of poor quality, lack oftimeliness and variable cost of products become measurementcriteria that Dell uses for its suppliers. This way, the outcomes of

Common Terms and Concepts Used in Outsourcing

5

Chap-01.qxd 3/1/05 12:29 PM Page 5

Page 25: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

the outsourcing arrangement include products and services thatare almost guaranteed to be of a minimum acceptable quality.

The experience with outsourcing is, most typically, for routineactivity. There are many examples, however, where strategicoutsourcing is used for ‘high value’ activity including the devel-opment and maintenance of cutting edge technology within verysuccessful organizations. Outsourcing includes the delivery ofproducts where the outcomes are goods that are of a minimumacceptable quality. Outsourcing also extends to services wherethe outcomes include key performance indicators (KPIs), whichare measurable based on a set of predetermined criteria. In theoutsourcing of product components the value is measured by thequality of the tangible goods over a period of time. Service deliv-ery though, is often measured through a ‘moment of value’. It isonly during the encounter (or moment of value) between theservice provider and the buyer that value is perceived.

Outsourcing is loosely defined as the use of a third party to per-form tasks normally performed independently (within the organ-ization). This idea is not new. In fact, the combination of outsideexpertise and internal resourcing to perform selected tasks iscommonly used and has been around for a very long time. Theregular use of outsourcing for the IT function, on the other hand,is a development that is relatively recent and that is in line withthe use and commoditization of selected IT components overthe past few decades.

Value provided in an IT outsourcing situation is generally notavailable until both the supplier and buyer are interacting; wherethe quality is subjective and quite difficult to measure fairly. Thedefinition and subsequent measurement of value from the pro-vision of services in the IT function therefore need to be agreedand determined via specific measurement criteria such as systemdowntime, transaction response times, help-desk support andother functions that support the IT function to deliver its contri-bution to the organizational processes. This becomes a risk factorwhen organizations have inadequate resources and are unpre-pared to measure the delivery of the supplier’s services in thisway. Suppliers, on the other hand, often take advantage of thisinadequacy by reducing the level of service and accept some ofthe uneven trade in exchange for the increased possibility ofunwanted events (risks) such as the delivery of unsatisfactoryresults for larger profit. This, however, jeopardizes both the sup-plier and the buyer as both parties are now confronted by higherrisk exposure!

Managing the Risks of IT Outsourcing

6

Chap-01.qxd 3/1/05 12:29 PM Page 6

Page 26: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

1.3 Agreeing the definition of outsourcing

The definition of outsourcing is no longer as straightforward asbefore. Each scenario carries unique flavours and nuances.Again, the formal definition of outsourcing is an activity wherethe supplier provides for the delivery of goods and/or servicesthat would previously have been offered in-house by the buyerorganization in a predetermined agreement (Elfing and Baven,1994; Domberger, 1998). This definition implies also that out-sourcing involves a buyer and supplier, where the supplier takesover a selected portion or a whole organizational function forthe buyer under a set of agreed conditions.

Variations in the outsourcing process model have been presented.Further, more obvious differences in the approach become veryapparent when new words or adjectives are used as modifiers ofthe word ‘outsourcing’ to convey subtle differences in meaning.The term outsourcing can be accompanied by adjectives such as‘selective’, ‘strategic’ and ‘competitive’. In addition, the functionbeing outsourced often acts as a further descriptor of ‘outsour-cing’. Common examples include payroll outsourcing, IT out-sourcing and sales force outsourcing. Other terms that havebeen used synonymously with outsourcing include terms suchas out-tasking and contracting. To establish differences inprocess models, terms like insourcing and cosourcing have beenrecognized.

Further differences in definition and scope are highlighted toshow the intensity of use of IT outsourcing in various settingsand for a variety of purposes. In each case, the implications ofrisks that are noticed changes. Each change needs to be man-aged individually.

An important difference in the definition of outsourcing needsto be emphasized and appreciated in order to continue with therisks in this environment. This lies in the ability to distinguishprocess ownership from outcomes control. Early thinking definedoutsourcing quite broadly, as allowing external groups to man-age an organization’s operations. At that time, there was noneed to maintain expertise and capabilities internally wherethese could be obtained from a better source.

Outsourced functions can span multiple departments, units andproject locations. Large outsourcing projects link the outsourcedoperation to other business processes in rich and often penetrat-ing ways. This means that activities within the IT function that encompass other functions within the organization like

Common Terms and Concepts Used in Outsourcing

7

Chap-01.qxd 3/1/05 12:29 PM Page 7

Page 27: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

manufacturing, design and procurement can also be covered.Metrics and incentives for the supplier become the focus of thebuyer organization; measurement for reward and penalty iscovered in its governance activities. The routine tasks of man-aging the processes within the IT function have been removed;the need for flexibility adds to this complexity. The suppliernow needs to be assessed, rewarded for success or penalized forfailure against this baseline.

Most organizations outsource primarily to save on overheadscosts and/or induce short-term cost savings. Others do so simplybecause no expertise in IT exists in the organization. ‘Internal’operations and administrative functions that were previouslydone within the organization are done outside it in outsourcingarrangements. The prevalence of IT services and their use inmany organizations whose main business activity is not IT,catalysed the use of outsourcing. Supplier(s) emerged and offeredbenefits that the organization’s internal IT organization was notable to deliver.

The definition and understanding of outsourcing in differentsettings, therefore, have different emphases. The emphasis onthe shift in responsibility could be assumed but this point wasnot as clearly articulated in earlier research as in that in the laterhalf of the 1990s. Many earlier models of outsourcing empha-sized the use of an external party but there was little to describethe responsibility structures or governance of the supplierorganizations. A significant portion of the literature mentionsthe risks involved, along with the benefits and costs; but there isinsufficient detail in our understanding to describe the nature ofthe risks or methods used to mitigate these risks. The nature ofrisks that arise between the buyer and supplier when the oper-ational functions are either contracted or outsourced is not welldocumented in the literature. In most of the definitions, ITObenefits the buyer through time- and cost-savings directlyrelated to the IT function. Outsourcing is observed also as atrade-off between lower production costs (provided the sup-plier possesses lower-cost technology) and higher monitoringcosts (Lewis and Sappington, 1991).

As the buyer provides management and supervisory content,there are restrictions imposed on the activities performed in theoutsourced function. Along with this definition, a fee-for-servicemodel is described where outsourcing services are an arrange-ment whereby a third-party provider assumes responsibility for

Managing the Risks of IT Outsourcing

8

Chap-01.qxd 3/1/05 12:29 PM Page 8

Page 28: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

performing functions at a predetermined price and according topredetermined performance criteria. It is implied that agreedterms and contractual conditions for the services performedhave a service level, fee components and a deliverable that ismeasured against a set of measurement criteria. This extendsthe earlier definition to include a measurement method and aform of governance, both by the buyer and by the supplier.

Elements of this ‘view’ have changed since the early 1990s toinclude significantly more emphasis on outcomes-based agree-ments. The idea that a portion of responsibilities in IT can becontracted to an individual or organization on a piecemeal basiswas accepted with the rise of large-scale ITO arrangementsexemplified by Eastman Kodak and Xerox Corporation a decadeago. Managers questioned whether the traditional paradigm of‘owning’ the factors of production is the best way to achievecompetitive advantage.

In the case when responsibility and control is handed over, thereis an inevitable loss of management control and responsibilityover the detailed processes. Control over the IT function is relin-quished voluntarily by the buyer to the supplier. There is a per-ception that this loss of control over the process is sometimesnot adequately compensated for by increased control over theoutcomes. The buyer is no longer able to directly manage all ofthe outsourced processes but has final control over the qualityof services that are delivered through an agreement and com-pensation process. The outcomes of the activities in the IT functioncould mean defining response times for specific applications, ordetermining turn-around times for maintenance activities. Thesupplier is compensated or penalized, based on the set of agreedservice levels. In this way the control over the outcomes, whichis essential, remains with the buyer of the outsourcing services.

A very significant difference in meaning, however, arises whencontracting is compared with outsourcing.

1.4 Contracting versus outsourcing

The terms contracting and outsourcing are often observed to beused synonymously. Although the difference is not immediatelynoticeable, a clear distinction needs to be made between theseterms by way of control of the processes and outcomes by thebuyer organization.

Common Terms and Concepts Used in Outsourcing

9

Chap-01.qxd 3/1/05 12:29 PM Page 9

Page 29: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The difference between the different terms is important espe-cially when risks are considered. For example, in a contractingsituation, the operational processes and risks remain with thebuyer of contract services. The organizational boundaries are distinct where both the buyer and supplier have no integra-tion. The tasks, deliverables and processes are defined andagreed.

In an outsourcing situation, the processes are shifted away andbecome the responsibility of the supplier. In this situation theboundaries are no longer clear. The outsourced function thatcomprises people, processes and technology belongs to the sup-plier but works for, and in the interests of, the buyer organization.

Another more subtle difference is that, in contracting, there is asignificant level of management effort and supervision. In out-sourcing, the supplier provides a good or a service independentof the buyer management. The outsourced services are pro-vided based on a set of performance metrices and are based on aset of outcomes rather than detailed supervision in a contractingsituation. With outsourcing, the independence allows the buyerresources to be released or redeployed.

A further difference in the resourcing model using the definition,is where the processes are delegated to the supplier and almostall the staff or resources no longer belong to the buyer organiza-tion. The supplier organization fulfils this role. The motiv-ation for streamlining processes and reducing staff resourceshas been shifted to the supplier. Along with this responsibility,operational risks are shifted to the supplier. The benefits to thebuyer are obvious. Key benefits to the supplier come from asteady income stream over a fixed period, focus on its own corecompetency and an opportunity for optimal utilization of itsresources. The risks that are carried are mitigated through legalagreements that set the boundaries of responsibility as well asthrough key factors involving reduced financial and businessrisks.

Process controls are ‘owned by’ and remain the responsibility ofthe buyer of the outsourcing services. The responsibility for theoutcomes of the processes and ultimate ownership remains withthe original buyer organization. The outside party or supplierassumes responsibility for the operations within the function,promising to deliver the outcomes previously defined by thebuyer. The concept for outsourcing places emphasis on the bene-fits of the buyer organization through the ‘removal’ of non-essential or non-core competence functions from the organization.

Managing the Risks of IT Outsourcing

10

Chap-01.qxd 3/1/05 12:29 PM Page 10

Page 30: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

1.5 Blurred organizational boundaries

The boundaries of the organization are redefined with the use ofoutsourcing. There is an observable change in the relationshipof many organizations, i.e. from an external supplier of prod-ucts and services to that of an entity that is networked to thebuyer organization in the form of a partnership. Organizationalboundaries are being redefined and expanded. The businesscommunities today are observed to be increasingly networked.The motivation or need for new outsourcing services is integralto this new, networked community. Few single organizationscan now operate independently given the need to provide morecomprehensive services. The implications of the definition canbe far-reaching, including the creation of virtual organizationswhere all activities and functions are outsourced. At the core,apart from the owners and shareholders of the organization, onlythe outsourcing managers remain.

Organizations, however, still struggle with the use of outsourcingto support IT. IT has been seen as the domain of a single organ-ization because of the specialized functions it supports as well asthe unique expertise required to support its operations. The abil-ity to choose whether to outsource or not, then selecting the rightIT supplier, determining the right terms, ensuring that the plannedbenefits are achieved and managing risks, are critical to a success-ful outsourcing agreement. Until the 1990s, the major drivers foroutsourcing were primarily cost-effective access to specializedskills. The costs of hiring, firing, training and motivating skilledpeople in the area of IT representing indirect overhead costs,which are ‘non-core competencies’, are increasingly being outsourced.

The motivating factors and working relationships of the buyerand supplier of outsourcing services provide the backgroundrequired to understand the risks as a result of ‘human factors’ asdefined in agency theory (see subsequent section). While thisbook also serves to illustrate knowledge already known andpublished, it provides an opportunity to guide the reader to makeobservations of new areas that have received little or no atten-tion in many ITO projects. These areas are highlighted as theelements of ITO are illustrated. There is a shift in emphasis thathas taken place, as there is a realization of the importance ofquantifying and understanding risks. This is especially so whenthere is an uneven experiential level between the supplier andbuyer that could skew advantage toward the supplier. There areseveral chapters in the book that are devoted to the areas of risk

Common Terms and Concepts Used in Outsourcing

11

Chap-01.qxd 3/1/05 12:29 PM Page 11

Page 31: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

that influence the decision to outsource the IT function, and thesubsequent governance thereof is highlighted. The forces thatdetermine equilibrium in the risk profiles for the buyer and sup-plier are of specific interest.

Finally, it is important to highlight a key difference in terminologyand concept between what may appear to be virtually the sameat first, but which in fact have significant differences. Differencesin emphasis are discussed next.

1.6 Differences in emphasis

Risks are observed to derive from the way an exercise is managed,the very definition of the term outsourcing and the use of ITwithin the organization. The transfer of risks is different in onescenario compared to another, and the buyer/supplier relation-ships are different. In addition, changes in the process model andrelated risk profiles depend on this definition of outsourcing.

Risk transfer difference

The risks previously borne by the buyer in a contracting exercisefor the management and supervision of a particular function arerelinquished to the supplier in an outsourcing exercise. In thecontext of evaluating the risks and risk exposure of the supplierand buyer organizations, risks are transferred from the buyer tothe supplier along with processes, assets and personnel manage-ment. The majority, if not all, of the buyer’s resources are no longerrequired and will no longer exist. In another outsourcing/con-tracting situation the work functions might still belong to theoutsource supplier and the operations risk exposure still remainswith the buyer organization.

The reductions in operational risks when a function is removeddo not mean that the total risk exposure of the buyer organizationhas decreased. There are increased legal, financial and strategicrisks as a result of the outsourcing exercise. The agreementbetween the buyer and supplier organization is a source of newrisks. The variation in emphasis shifts operational risk to thesupplier; this changes the relationship between the buyer andsupplier. In addition there are the implications of the relation-ship between the buyer and supplier organizations to consider.

Buyer/Supplier relationship difference

The relationship between the buyer and supplier changes withthe type of contract or commercial arrangement. Assuming the

Managing the Risks of IT Outsourcing

12

Chap-01.qxd 3/1/05 12:29 PM Page 12

Page 32: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

supplier is able to deliver the same activities as the buyer but ata lower cost, the difference in costs translates to a profit marginfor the supplier. In the outsourcing model discussed in the pre-vious sections, the supplier is no longer required to follow theprocesses previously owned by the buyer. In this way, the supplieris now free to make modifications to the original process, motiv-ated by profitability.

The buyer and supplier relationship forms a key component thatwill make the outsourcing arrangement either a success or a fail-ure. The questions that are posed remain relevant in a dynamicbuyer–supplier relationship. Some key examples include ques-tions like: What prevents the supplier from compromising onquality and delivering lower-quality work to derive higher mar-gins (gains)? How can the buyer manage the activities of thesupplier to ensure that the promises of quality services aredelivered? What is the buyer going to do in order to manage thesupplier, who will be motivated only to reduce its own costs?Will the supplier’s methodology be acceptable to the buyer? Howis the supplier going to manage its risks and where are the risksgoing to come from?

This raises the need to have ongoing supplier and buyer govern-ance procedures. When considering the relationship, each party(the buyer and supplier) needs to consider managing their indi-vidual risk profiles to within acceptable risk tolerance levels.

As the buyer and supplier interact, components of agency theoryapply. In the governance of outsourcing, both the buyer and supplier work in an agency environment. There are variousmodels propounded by researchers and practitioners for man-aging this relationship. The ‘potential contract’ relationshipmodel addresses the organizational needs of control and flexibil-ity. Here, commercial arrangements including multiple suppliercontracts, joint ventures, individual and joint-venture spin-offs,consortia and shared service structures re-emphasize the import-ance of the quality of supplier–buyer relationships.

Changes in process model difference

‘Changes’ in this section refers to the specific process differencesbetween outsourcing and contracting. To examine the alternativesources of risks within the ITO exercise, changes in the processmodel are reviewed. The need for control over the processesbeing outsourced stems from a variety of other requirements,like the need to maintain quality in the processes as well as con-trol of the risks. Managers of organizations are anxious when key

Common Terms and Concepts Used in Outsourcing

13

Chap-01.qxd 3/1/05 12:29 PM Page 13

Page 33: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

functions are performed outwith the organization. At the sametime, these managers require flexibility in moulding the servicesin order to deliver optimum service. In a situation where max-imum control and flexibility is needed, the buyer and supplierrelationship is in a state of close partnership (Figure 1.1).

Managing the Risks of IT Outsourcing

14

Flexibility

Control

Short-term contract

Partial ownership, jointdevelopment, retainer

and long-termcontracts

Outsourcingpartnership

Full ownership

Figure 1.1Relationshipbetween buyer andsupplier in acontract setting(Tho, 2004)

In situations where the need for control is low and flexibility ishigh, short-term contracts are suitable. Conversely, in situationswhere the need for flexibility is low and the need for control ishigh, a full ownership contract is the overriding factor in theagreement. In between these extremes lie alternative arrange-ments involving partial ownership, joint development, retainerand long-term contracts.

As was noted earlier, to the buyer, there is concurrently greatercontrol over the outcomes of processes as the supplier of ser-vices is directly accountable to the buyer for the outcomes of theprocesses. The benefit to the buyer is, then, a smaller organ-ization, reduced attention to extraneous processes and strictercontrol over the critical outcomes. When engaged in an outsour-cing exercise the buyer organization utilizes the external sup-plier’s investments, innovations, and specialized professionalcapabilities. The supplier provides multiple organizations withthe services and benefits from economies of scale. This would beprohibitively expensive to achieve for any single organizationoperating independently. These concepts support the view thatactivities such as the IT capability, for which the organization hasno crucial strategic need, could be and should be outsourced.

An external supplier that can provide superior services is used where service quality improvement, the need for strategicflexibility and the focus on core competencies are primary

Chap-01.qxd 3/1/05 12:29 PM Page 14

Page 34: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

If the ability to provide business value is mapped against theflexibility or degree of customization required, then severalother variants of the relationship appear (see Figure 1.2). Highbusiness value and high customization (top right quadrant) isdelivered only when there is a close partnership or integration;much like an in-house process unit.

There would be very little business value if the services were massproduced (bottom left quadrant). In a service provider model(bottom right quadrant) where the contracts are made based oncommoditized services, business value would be high but rela-tively lower than in an integrated or partnership model. In amade to order situation (top left quadrant), business value isstill low but this would be compensated for by a higher degreeof fit, or specificity. The customer or buyer would then have amore-tailored business solution. The model that provides themaximum return is the integrated solution where, together withhigh specificity or an ability to customize, the services to thebuyer organization have a high degree of business value. Thisoutsourcing partnership arrangement is characterized by a con-stant transfer of operations risk between the buyer and supplier.

Common Terms and Concepts Used in Outsourcing

15

Made to orderHigh

Specificity/Degree of customization

Businessvalue

Low

Low High

Partnership/Integration

Mass production(off the shelf)

Serviceprovider

Figure 1.2A model foroutsourcingrelationships

concerns for sourcing decisions. The need for quality servicesand improved operational efficiencies is consistent and remainsas the core reason to outsource the IT function (on core compe-tency and economies of scale). In addition, the strategic require-ment to focus on core competency has been an additionalcatalyst for outsourcing services. Figure 1.2 is an attempt to sum-marize some of the views expressed here.

Chap-01.qxd 3/1/05 12:29 PM Page 15

Page 35: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Outsourcing is an almost ubiquitous concept, which is used indifferent scenarios and in different industries to achieve businessbenefits including an impact not only on direct cost but on thebusiness and strategic drivers. The strategic impact involves valuecreation through strategic relationships, freeing up investments,increased flexibility and scalability, and the ability to build onstrategic capabilities. For some organizations with high specificity,the significant nature of inseparable supplementary services maywarrant the need for internal sourcing to ensure tighter qualitycontrol.

The quality of the final deliverable or outcome is dependent onthe supplier being able to deliver an improved service comparedto services that have been performed in-house. To do this effi-ciently, suppliers have an advantage over the buyer organiza-tion. For example, the supplier has more access to competencein new technologies, access to better IT professionals, and betterprocesses for IT integration and development. In all these models,however, there is still scant detail on how the risks are trans-ferred between the buyer and supplier, what the risks are, whenthey occur and the extent to which each party can tolerate therisks before an existing relationship is irreparably severed (as aresult of the outcomes of these risks).

1.7 Process changes

The processes that are enabled by the use of the IT function arechanging and complex. Those that are driven by IT, change as aresult of this. Figure 1.3 represents an attempt to summarizesome of the dynamics of this change.

Managing the Risks of IT Outsourcing

16

Drives

IT functionBusiness

function(s)

Outsourced function

Systems integration(IT outsource process)

Business objectives(IT outsource outcome)

Changing &complex

Variable &ambiguous

Buyer definesSupplier providesEnables

Figure 1.3 Business functions/processes are the drivers for information technology (IT) development.IT in turn, enables the creation of more-efficient business processes, including ‘outsourcing processes’(Tho, 2004)

Chap-01.qxd 3/1/05 12:29 PM Page 16

Page 36: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

An attempt made to illustrate the coexistence of IT and businessprocesses in a tightly linked relationship demonstrates interde-pendence between business processes and the IT function. Theorganization’s business objectives drive the IT function in orderto deliver the expected outcomes – where the IT function enablessuccessful outcomes.

Figure 1.3 consists of two halves. On the left, the illustrationshows the IT function enabling a group of business functions.The business functions, in turn, drive the design of the IT function.This continuous loop identifies the changes that constantly occurin an organization’s IT support function.

On the right, the IT function is outsourced. The outsourcedprovider controls the systems integration (SI) process. It is bothchanging and complex because of the need to satisfy the busi-ness function requirements of the buyer organization as well asthe profit motives of the supplier organization. On the far rightof the diagram, the business objectives have now become theoutcome that is required when the IT function is outsourced.The buyer defines these processes and sets appropriate stand-ards that need to be achieved by the IT function that has beenoutsourced to the supplier. The objectives are often variable andambiguous because of the business conditions that drive theorganization.

Along with the changes in IT, new business processes emerge andneed to be designed. New platforms, operating systems, networksand applications are driven by changes in the competitive busi-ness environment. This influences business operations as infor-mation needs become more urgent. As competitive pressuresmount, business objectives drive the development of further ITcomponents. The changes in processes and functions are in turndriven more quickly by the use of more-efficient IT components.

The extremely fast rate of change of IT components creates areversing effect. IT is the catalyst for process change and out-sourcing. Instead of the business functions driving change (seeFigure 1.3), the direction of the arrows now shows the reverse.Outsourcing processes rely on IT for access to organizationalinformation accurately, quickly and cost-effectively. It is recog-nized that IT facilitates the reduction of transaction costs withoutincreasing transaction risks. This in turn drives further out-sourcing activities.

In addition to illustrating the differences in meaning of the con-cepts in outsourcing, it is equally important to collectively agree

Common Terms and Concepts Used in Outsourcing

17

Chap-01.qxd 3/1/05 12:29 PM Page 17

Page 37: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

some of the motivating factors of the buyer and supplier organ-izations in order to discuss the risks that both these parties face.The fundamental criteria for buyer and supplier motivation arethe acceptance of the ITO exercise and the benefits derived.

1.8 Acceptance of information technologyoutsourcing (ITO)

A primary objective of a buyer of ITO services is very often toreduce operational risk. The risks that accompany the oper-ations are moved outside the organization when the IT functionis moved away. ITO is then a way to reduce operational risks aswell as manage IT costs while, at the same time, retaining thebenefits of the IT function that is so crucial, within the control ofthe buyer organization. Much of the argument to outsource theIT function also arises as current management ideology empha-sizes the need to optimize the organization’s resources; thenotion of being able to completely remove the need to maintainan in-house IT function while being able to enjoy the benefits ofthe services and use of a world-class IT capability (supplied byan external ‘expert’) is a very tempting proposition.

Many commercially available reports agree and predict that largeoutsourced IT markets will develop. These global markets arecollectively expected to hit approximately US$1 trillion over thenext 5 to 6 years (or by the year 2010) as many more organiza-tions choose to implement ITO. The reach and richness of thisinfluence is significant. The acceptance of outsourcing of the ITfunction provides some indication of the level of satisfactionthat organizations have with the concept, the benefits derivedand also importantly, the ability to manage the risks within thisenvironment.

The IT function is more ubiquitous than any other we have seen.Early in the 1980s many tasks involving the use, maintenanceand upgrade of computer systems required knowledge only privyto a few. There was no choice but to employ specialist help tomaintain the IT function within the organization. The use of IT,however, has become prevalent over the last two decades. Themachines or computers that enable IT to function have becomeuniversal, and much easier to use and maintain; yet, the samecomputers have become more complex. As such, it is suggestedthat the influence of risks on so many significant parts of theorganization has hitherto not been experienced to this level ofseverity and extent.

Managing the Risks of IT Outsourcing

18

Chap-01.qxd 3/1/05 12:29 PM Page 18

Page 38: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

For the most part, however, the published experience with theoutsourcing of the IT function indicates a dismal track record.Also, it has been suggested that as the nature of IT is not consistentacross organizations, industry groups and country settings, theacceptance and use of outsourcing of the IT function has createdfurther confusion. The risks are not easy to measure let aloneunderstand; it is no wonder then that many organizations experience severe anxiety when considering the option to out-source the IT function.

Early adopters and failures

Substantial market size does not necessarily imply that there aresatisfied buyers. Nearly seventy per cent of organizations thathave outsourced say that they are unhappy with one of moreaspects of their suppliers. International research shows that onlyabout half of ITO contracts deliver the previously promisedtwenty to thirty per cent cost savings. Even back in the early1990s, a considerable number of organizations expressed dissat-isfaction with outsourcing (Currie and Willcocks, 1997). Otherstudies indicate that fifty-three per cent of organizations attemptto renegotiate the original terms of the contract with their part-ners, and that twenty-five per cent of those renegotiations endin the termination of the relationship (Caldwell, 1997). Otherestimates show that outsourcing clients spend fifteen per cent oftheir IT budget on litigation (Goodridge, 2001).

The Gartner report (Murphy, 2004) mentioned that, by 2005,there would be a sixty per cent probability that seventy-five percent of organizations that fail to recognize and mitigate riskthroughout the outsourcing life-cycle will fail to meet their out-sourcing goals because of misaligned objectives, unrealizedexpectations, poor service quality and cost overruns. While manyof the data justify this fear of outsourcing, a view can be takenfrom an alternative perspective. The qualitative evidence of ITOimplementation displays symptoms of an industry in turmoil.The track record that is available has its share of success andfailures. Much of the literature on the benefits to the supplier,for example, has not been published or is not available. Could itbe that the information remains a source of competitive advan-tage and hence is being kept ‘secret’? Could it be that this fearfulnotion of impending failure is, just possibly, exacerbated andmade to proliferate by an unintentionally one-sided press, byresearch papers and by word of mouth? Whatever the case, theelements of risk of information-loss exist. Risks need to be

Common Terms and Concepts Used in Outsourcing

19

Chap-01.qxd 3/1/05 12:29 PM Page 19

Page 39: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

measured, understood and then mitigated to ensure that thebenefits of ITO have the best chance of being reaped.

There are two sides to this scenario. Managers deciding to use ITOare often very optimistic. These managers have been observedto make decisions to outsource based on a best-case scenario, i.e.based on their individual expectations or based on the instructionsof their superiors (Saunders et al., 1997). This confidence raisesexpectations. This has been observed to result in unpredictableevents, the majority (relative to the optimistic views) of whichyield poor results as compared to the case where the risks areanticipated and managed.

Other managers hesitate when faced with the proposition tooutsource the IT function. This hesitation is expressed as a fear,and, as a result, also a hesitance to lose control over the dailyoperations and routine use of the IT function. This innate fear isoften a result of an absence of a clear understanding of the pos-sible undesirable outcomes (or risk) that may result from a lossof control over the management of the detailed activities in theIT function. With this, unnecessary steps are taken to regain con-trol from the supplier, frequently having disastrous consequences.This is often called organizational risk.

1.9 Benefiting from ITO

It is clear that competition for access to growing amounts ofinformation over geographically disparate locations, over shorterperiods has been a significant inducement for the need to main-tain a more significant and reliable IT capability within the organ-ization. The efficiency and effectiveness of an organization’s ITfunction has become a source of competitive differentiation. In themid-1980s, Michael Porter (1985) propounded and championedthe concept of competitive advantage through lower costs anddifferentiation. He parleyed the concept of the value chain, thepervasive nature of IT in the value chain, and its use as a sourceof differentiation. As the IT function is inextricably connected tomany parts of the value chain, it becomes a vital component thatdifferentiates the organization’s products and services from thoseof its competitors (Blaxill and Hout, 1991; Teng et al., 1995).

There is a noticeable increase in acceptance of outsourcing of theinformation technology (IT) function as a management tool todefray some of the pressures of increasing competition by achiev-ing competitive advantage through lower costs and the abilityto deliver improved IT support. The decision to outsource the IT

Managing the Risks of IT Outsourcing

20

Chap-01.qxd 3/1/05 12:29 PM Page 20

Page 40: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

function is made primarily because it benefits the buyer of ITOservices and also provides benefits for the supplier of the sameservices in a win–win situation. This is also commonly referredto as the ‘make’ or ‘buy’ decision. The decision is not easy tomake as the elements involved in the decision-making processare often varied and peculiar to the specific environment andorganizational needs. There are, however, commonalities thatoften form the main reasons why organizations choose to out-source the IT function to a third-party supplier. These common-alities primarily derive from opportunities to benefit fromspecialization and then from economies of scale and economiesof scope within the context of the IT function. These conceptsare discussed in greater detail, with specific reference to ITO, inthe next chapter. All these elements have been demonstrated toreduce cost and sharpen the organization’s focus on the stra-tegic IT function.

Outsourcing has been increasingly used to provide a tangiblemeans and path for many organizations to reduce costs andimprove the quality of their products, among other consider-ations. In addition, it is used as a tool for strategic advantage. Asummary, from this research, of the two key strategic reasons foroutsourcing the IT services function includes the organization’sneed to:

1. acquire additional competence – the organization cannot sup-port or easily acquire support for the IT function; and,

2. move to be more competitive – the supplier of IT services haslower costs and faster availability for the IT function, which isviewed as a critical but directly substitutable item.

In addition, the key strategic reasons for not seeking a supplierinclude the protection and retention of:

1. Intellectual property – processes and information containedwithin the IT function provide proprietary or competitiveinformation that is crucial to the organization’s performance(Venkatesan, 1992); and,

2. Market differentiation – the organization should retain whatmatters most to the customer or what differentiates its product(s) in the market-place.

The benefits of ITO are often already quite obvious to the indi-vidual involved with the exercise. Some of these benefits

Common Terms and Concepts Used in Outsourcing

21

Chap-01.qxd 3/1/05 12:29 PM Page 21

Page 41: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

accrued by the buyer and supplier are summarized in Table 1.1.Similarly with any business transaction, all the benefits haverelated risks. Organizations that buy services that support the ITfunction commonly do so to secure greater cost savings andimprove performance and, hence, enhance profitability. Alongwith this are to be considered financial, operational and tech-nical risk factors, which are discussed in the next chapter. As apurchaser of ITO services the buyer organization is able todefine the supplier accountability and have control over theoutcomes through a series of legal contracts and agreements.Control is also enhanced through an incentive programmewhereby the supplier’s rewards and penalties are based on a setof predefined and agreed benchmarks. These characteristicsreduce the risk of errant outcomes often observed in a less struc-tured arrangement (see Contracting). The risk of poor govern-ance exists as the contract duration of an ITO exercise is oftenlong and spans multiple financial periods.

The supplier organization also benefits synergistically from theITO exercise. As the supplier provides services, it derives benefitsfrom economies of scale (see later). This source of efficiency nat-urally leads to additional profit for each unit of work performed.A major reason a supplier organization offers ITO services, how-ever, is often always that a predictable income stream is estab-lished over long, contracted periods of time. Again, this makesthe procurement of work processes a great deal more efficient.At the same time, the supplier is able to focus on activities ofcore competency (Prahalad and Hamel, 1990; Quinn, 1993); thisonly serves to enhance the efficiency of its operations. As itdelivers increasingly efficient operations, it is rewarded throughcontract extensions and additional profit from increasing margins.

Managing the Risks of IT Outsourcing

22

Table 1.1 Buyer and supplier interests in outsourcing

Buyer (business objectives Supplier (supplier rewarded Jointaligned with supplier metrics) for increased value)

• Well-defined objectives • Service level targets • Increase value relationship• Internal benchmarking • Financial target costs • Initiative creation• Evaluation rewards & penalties • Revenue growth • External benchmarking• Control • Objective evaluation • Scenario planning• Accountability • Additional profit• Cost savings • Contract extensions• Improved performance• Improved profitability

Chap-01.qxd 3/1/05 12:29 PM Page 22

Page 42: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The organizations involved are legally obliged to follow a seriesof agreed benchmarks and are equally motivated to improvethese benchmarks. Jointly, both the buyer and supplier organ-izations benefit from this synergistic relationship wherein eachorganization exists to deliver common services. This leads to acommon motivation to increase value in the relationship andthe value of the products and services delivered as a result ofthe relationship. This combination also provides an environ-ment wherein both parties initiate new processes, creating morevalue for common benefit.

While the benefits remain quite obvious, the risks that shadoweach of the benefits often remain unnoticed, until the risks revealthemselves as an undesirable outcome. The causes of undesirableoutcomes are obscured in the scenario where each party is sotightly engaged in an environment conducive only to product-ivity. The experienced manager would understand that each ofthe readily observable benefits carries major risk elements. Inorder to examine the risks, some of the commonly accepted def-initions of risk in the ITO environment are introduced here.

The balance of the benefits and the risks or costs needs to beclear when an organization decides to outsource its IT function.This is, however, seldom the case especially when the risks are difficult to understand, let alone quantify. Such an organiza-tion is susceptible to ‘normal operating risks’ and to even morerisks because of the interplay of newly created forces that ariseduring the long-term partnerships that come into being in an outsourcing arrangement. Additional influencing factors or causes of the risks derive from a wide range of possibilities,including failed relationships, malicious action, purposeful or inadvertent contractual obligations, and natural, man-madedisasters.

Supplier benefits

The argument on core competence (discussed in detail inChapter 2) is that the greater specialization in the provision ofservices, through outsourcing, the greater the benefits ofeconomies of scale (also discussed in Chapter 2). As activitiesare shared and contributing cost elements are increased, the nat-ural economies of scale are realized. As costs are known to be amajor consideration in the decision to outsource the IT function,the realization of benefits from economies of scale becomes crit-ical. Until the 1990s, the main drivers for outsourcing IT were pri-marily cost-effective access to specialized skills and avoidance of

Common Terms and Concepts Used in Outsourcing

23

Chap-01.qxd 3/1/05 12:29 PM Page 23

Page 43: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

building in-house IT skills. Cost-savings and freedom to focusupon core business are still major reasons for outsourcing.

Common (buyer and supplier) benefits

The intent of the ITO services is to deliver greater capacity forflexibility, especially in the purchase of rapidly developing newtechnologies and the myriad components of complex systemswithin the IT function. Through economies of scale, benefitsfrom a significantly larger pool of resources are available to boththe supplier and buyer of outsourcing services.

Outsourcing also decreases the product/process design cycletime, and the suppliers provide best-in-class service contributingto greater depth and sophisticated knowledge in specialized areas.Outsourcing makes the full utilization of external suppliers’investments, innovations, and specialized professional capabil-ities available to the buyer, which would be prohibitivelyexpensive to replicate otherwise.

ITO provides organizations with greater capacity for flexibility,especially in the context of the purchase of rapidly developingnew technologies, new people, and myriad components of com-plex systems.

Buyer benefits

An organization’s ability to compete successfully is based onconsistent, superior performance, or the development of assetsof high specificity that create value through differentiation.Many organizations rely on the ability to deliver ‘better’ and/or‘cheaper’ than the competition in order to successfully captureand hold a market. When internal performance (within theorganization) falls below the performance levels of externalsuppliers a ‘surrogate’ arrangement is observed to deliver imme-diate benefits. Many benefits of the surrogate arrangement derivefrom economies of scale.

As organizations faced with intense competitive pressures areforced to shed non-essential functions, outsourcing becomes thedriving force behind the ‘virtual corporation’. The search forgreater flexibility and rapid changes in technology, and theemphasis on concentrating on core competencies have been citedas major drivers for the upsurge in outsourcing activity. The vir-tual organization appears less a discrete organization and morean ever-varying cluster of common activities in the midst of avast fabric of relationships. The network of partners itself is seen

Managing the Risks of IT Outsourcing

24

Chap-01.qxd 3/1/05 12:29 PM Page 24

Page 44: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

as a sequence of value-adding activities in a value chain. Thewell-put case for an organization to outsource its IT functionhas a very significant influence. The question is now not whetherto outsource; rather, what and how to outsource the activitieswhich do not contribute to these objectives.

Suppliers are able to provide a level of responsiveness throughnew technologies that undermine the need for the verticallyintegrated organization and achieve economies of scale. Thistranslates into benefits for the buyer. A network of suppliersprovides the organization with the ability to adjust the scale andscope of its production capability (upward or downward), at alower cost, to changing demand conditions and at a rapid rate.This creates greater flexibility than is the case for the verticallyintegrated organization.

The benefits of outsourcing any service, identified via surveys afew years ago (1998) conducted by the Outsourcing Institute ofthe top 10 reasons why organizations buy outsourcing servicesfor their operations, fall into the following areas:

● Reduction and control of operating costs.● Improvement in organizational focus.● Gain of access to world-class capabilities.● Free internal resources for other purposes.● Resources are not available internally.● Accelerated re-engineering benefits.● Function difficult to manage/out of control.● Capital funds made available.● Shared risks.● Cash infusion.

We have referred to the organizations that use and supply ITOservices as separate entities. In terms of legal setup, corporategovernance, responsibility to shareholders, corporate structureand the like, these organizations are indeed separate. When twoorganizations engage in an ITO exercise, however, the processesthat link both participants make them more logically appear asa single entity. This concept can be confusing as the boundariesthat define each organization are now blurred.

1.10 Outsourcing models

There already exist numerous outsourcing models. Additionalmodels are constantly being formulated as the requirements of

Common Terms and Concepts Used in Outsourcing

25

Chap-01.qxd 3/1/05 12:29 PM Page 25

Page 45: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

each ITO agreement differ. The need to create new models todescribe each flavour and variation is nevertheless important asit serves to highlight also the variations in effort, measurementof risk and treatment of the outcomes. Transformational out-sourcing, for example, provides for a set of partners who have aconsiderable stake in the game, and often that means sharingboth risk and reward. To make the transformation work, thecommercial agreement must fund the necessary investment atthe best possible cost of capital and simultaneously motivate theoutsourcing partners’ commitment by aligning goals. This is quitedifferent from the outsourcing of the commoditized IT function.

Evans and Wurster (2000) describe the new economics of infor-mation where information can be replicated at almost zero cost(in contrast to the economics of items that incur manufacturingcosts). The evolving technological capabilities for sharing andusing information are transforming business definitions, indus-try definitions and competitive advantage where information isthe glue that holds the value chains and supply chains together.This observation impacts on the way organizations are struc-tured. Informational value chains become separate from phys-ical value chains, releasing tremendous economic value. Whenthe trade-off between richness and reach is no longer tenable,traditional structures and relationships throughout the businessworld begin to deconstruct (as new level of richness and reachare attainable). Processes that used to work within an organiza-tion and between organizations, as well as between organiza-tions and their customers, are being transformed.

There are observable changes as organizations deconstruct. Thesame authors, Evans and Wurster, talk about deconstructionthat occurs as organizations dismantle and re-form traditionalbusiness structures. Competitive advantage is de-averaged ascompetition escalates. Information businesses take on new value.New opportunities arise for physical businesses. Wholesalers,retailers and distributors are disintermediated. Navigatorsemerge and incumbents are challenged. The organized supply ofcompetency-based services and products, however, has maturedas an industry over the past two decades. Information is becomingincreasingly accessible across time and space. People, and moreimportantly our collective knowledge, are becoming increas-ingly interlinked via high-speed networks, databases and activedata collection devices. Individual, group and organizationalrelationships have drastically changed. In this environment,however, the stage is set for optimal use of outsourcing servicesgiven the ability to seamlessly share information.

Managing the Risks of IT Outsourcing

26

Chap-01.qxd 3/1/05 12:29 PM Page 26

Page 46: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Very often suppliers of ‘outsourcing’ services have access to avery limited amount of information, just sufficient to completethe work at hand. For example, incomplete personnel data areshared, just sufficient to complete regular payroll for payrolloutsourcing. If information on recruitment, personnel evalu-ation, staffing, strategy and planning were available, the suppliercan more proactively plan for changes in resourcing, provisionof supplies, staffing for its own delivery and investments ininfrastructure.

Outsourcing types

Outsourcing has been used in a variety of ways, those whichinvolve combinations of partnership agreements and duration,payment structures, and service as well as product content. Someof the characteristics of the outsourcing genre are discussed here.

The adjectives that describe outsourcing activity are as varied asthe combinations of outsourcing models that are present. Somecommon types of outsourcing models include total outsourcing(with sole supplier), multiple-supplier sourcing (or with primecontractor and partners), joint venture/strategic alliance sour-cing and insourcing. It is logical also to assume that there is pro-lific variation on the themes given the differences in eachorganization’s situation. Alternative structures include matrix-type models, based on the interrelationships of core competenciesand organization activities, to assist managers with outsourcingdecisions. The effort to reduce costs and exploit new channels ofdistribution like the Internet reveal new organizational forms.Cost-savings and freedom to focus upon core business, however,are still major reasons for outsourcing.

Literature suggests the buyer sourcing choices between carryingout activities in-house, or under ‘hierarchical governance’, andoutsourcing them and placing them under market governancethrough cost–benefit reasoning, is determined by the relativecosts of production and transactions. Economic analysis of theprovision of outsourcing services is limited. It does not, forexample, account for the organization’s management capabilityto structure and manage co-operative relationships crucial tothe effective working of outsourcing arrangements. Further, itdoes not take into account the effectiveness (as opposed to thecost) of acquiring the necessary information. This supports theassumption that a closely integrated network of organizationswill perform better. Learning through alliances can complementendogenous learning to create new competencies.

Common Terms and Concepts Used in Outsourcing

27

Chap-01.qxd 3/1/05 12:29 PM Page 27

Page 47: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The extent to which such strategies are successful is not alwaysclear; for instance it was found that there is no direct effect ofstrategic technology alliances on economic performance in gen-eral. However, it was established that in high-tech industriesresearch-oriented strategic technology alliances are associatedwith higher economic performance. It is often also suggestedthat complementarity is a major driver of partnering behaviour(Hagedoorn, 1993). This suggests that a strategy aimed at creat-ing a rather broad set of alliances that are complementary to thealready existing capabilities could have a more positive effecton organizational performance than the formation of alliancesthat parallel existing capabilities.

The concept was for basic (more routine) operations to be per-formed on behalf of the organization to the extent that theycould be carried out by machines or computers. Some have envis-aged scenarios where mass-produced or ‘off-the-shelf’ productswould eliminate the need for services, whether in-house orexternally sourced.

Complete/Selective outsourcing

Theoretically, the whole organization can be outsourced. Therationale for total outsourcing is to enable the client to concentrateon its core business activities, thus leaving the supplier to managecore business functions more efficiently. Total ITO, as opposed toselective outsourcing, is generally thought to have begun in 1989,when Kodak outsourced its entire IT function to IBM and a fewsmaller suppliers. In the early 1990s approximately twentymajor corporations followed suit, but the general view in thebusiness world was that this total ITO exercise was a mistake.

On the other hand, there are some who argue against completeoutsourcing. Fowler is an advocate of the case against completeoutsourcing (Fowler, 1997). He argues that there is a significantproportion of personnel work that is central to the culture andstrategic objectives of the organization that can be undertakeneffectively only by the organization itself. Hence, personnelshould be retained, at least in part, as an integral part of thebusiness. Further, the occurrence of situations such as industrialdisputes may be quite unpredictable; these issues require imme-diate action. It is all but impossible to specify such tasks preciselyenough to contract them out, or to find an external provider thatcan guarantee the instant and informed response they require.

Selective outsourcing involves outsourcing portions of theprocess, rather than the process in its entirety. The strategy of

Managing the Risks of IT Outsourcing

28

Chap-01.qxd 3/1/05 12:29 PM Page 28

Page 48: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

selective outsourcing where discrete services or functions aresourced to a group of best-of-breed service providers is seen asan appealing alternative to large-scale, single-supplier arrange-ments, which are frequently characterized by excessive fees,unrealized cost-savings, ill-defined contractual terms and ser-vice levels, and inflexibility in response to changing businessrequirements. This is a strategy to mitigate certain of the risksthat were inherent in the ‘deal’. Half-measures, however, wouldprevent the buyer from achieving best practice and introducefurther risks.

Some of the advantages of selective outsourcing include rela-tively lower switching costs and lower probability of failure. Itis also suggested that it is suited for processes which are smallerin scope. The disadvantages, however, include the lowered abil-ity of the supplier to affect the buyer’s business objective orleverage economies of scale. This appears as a low-risk, low-return strategy; it would also lack the strategic perspective andbenefits of outsourcing. Examples include sole-sourcing andindividual out-tasking.

Keiretsu

So far the concepts and models of outsourcing have focused onobservations from Western-type cultures. The practice ofmaquiladora between the United States and Mexico involves workbeing outsourced to factories in a location where the cost oflabour is low. A hybrid concept, which is found to be closelyrelated to the concepts of relinquishing or handing over controlof a function, found in an Eastern-type culture, is Keiretsu.Keiretsu refers to a uniquely Japanese form of corporate organ-ization. Although keiretsu is not, strictly speaking, an outsour-cing model, it is discussed here for the sake of completeness. Agrouping or family of affiliated organizations that form a tight-knit alliance to work toward each other’s mutual success, formsa keiretsu. The keiretsu system is also based on an intimate part-nership between government and businesses. A keiretsu rep-resents an intricate web of relationships that links banks,manufacturers, suppliers and distributors with the Japanesegovernment. The keiretsu model mirrors many outsourcing part-nership models that have been put together. From here, how-ever, the concepts seem to diverge.

Horizontal keiretsu are headed by major Japanese banks andinclude the ‘Big Six’, i.e. Mitsui, Mitsubishi, Sumitomo, Fuyo,Sanwa, and Dai-Ichi Kangyo Bank groups. The two models

Common Terms and Concepts Used in Outsourcing

29

Chap-01.qxd 3/1/05 12:29 PM Page 29

Page 49: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

most often described are the vertical and horizontal keiretsu. Thevertical keiretsu are industrial groups connecting manufacturersand parts suppliers or manufacturers, wholesalers and retailers.Examples of the vertical keiretsu include Toyota, Nissan,Honda–Matsushita, Hitachi, Toshiba and Sony. Distributionkeiretsu, a subgroup of vertical keiretsu, control much of Japaneseretailing, determining what products will appear in stores andshowrooms and at what price.

These organizations would engage in cost-sharing with smallersuppliers much akin to the outsourcing model discussed. Thesharing of costs is via various types of investment in customizingassets and supplier support services and training.

Unlike vertically integrated organizations which deploy certainskills from market to market, Japanese automotive organiza-tions are structured around ‘mother organizations’. The partici-pating organization aims to design and assemble productsthrough a number of independent suppliers and alliance part-ners, but without owning such satellite organizations. Thislong-standing and successful subcontracting culture is based oninter-organizational co-operation. The model, however, doesreflect the outsourcing structure that is practised outside Japan.The relationship, however, carries expectations, as the group of‘buyers’ and ‘suppliers’ work in a keiretsu in symbiosis, involvingmutual gain. This relationship is cultivated at a subsequentstage in an outsourcing relationship.

The divergence in concepts merely demonstrates and confirmsthat diversity in hybrid models exist. The range of options istheoretically unending. What remains central in the theme ofoutsourcing, however, is the commercially viable arrangementbetween the buyer and supplier of these services. In the case ofIT this is complicated by the fact that the very nature of IT isevolving so quickly.

1.11 Outsourcing partnerships

Again, the ability to connect quickly and meaningfully withbusiness partners and customers in order to rapidly improve thequality of goods and services is becoming the competitive impera-tive. Consequently, organizations are rapidly ‘devolving’ frombeing self-contained and vertically integrated to being more vir-tual entities that rely on business partners to fulfil major parts oftheir supply and value chain requirements.

Managing the Risks of IT Outsourcing

30

Chap-01.qxd 3/1/05 12:29 PM Page 30

Page 50: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

While partnership arrangements vary considerably in their oper-ations, from flexibly defined, formal contacts, to loose strategicinitiatives, they also encompass the provision of shared risk andbenefits. Organizations with large, centralized departments thatundertake most of the work in-house may also outsource spe-cific applications to specialist suppliers. Alternatively, otherorganizations may seek to enter into multiple/selective sourcingcontracts with a range of external suppliers to seek to reducetheir internal facilities over time. The relationships so formedare described as ‘strategic alliances’ or ‘strategic partnerships’.

The options range from handing over complete IT operations, topay-as-you-go for single application outsourcing. Notwithstand-ing the options, deep business ties and dependencies are oftenforged between the two organizations, and while partnershipscan solve some workload issues, the biggest problem they faceis how to make these relationships more painless and more col-laborative. However, there exist several disadvantages to adopt-ing outsourcing strategies. These include becoming dependenton outside suppliers for services, failing to realize the expectedhidden cost savings, losing control over critical functions, hav-ing to face the prospect of managing relationships that gowrong and lowering the morale of permanent employees.

Figure 1.4 summarizes the range and intensity of relationships.In the illustration, the intensity of the relationship is plotted

Common Terms and Concepts Used in Outsourcing

31

Managedoperations

ITpartnership

Strategicpartnership

Communitysupplier

(multi-asset)Preferredsupplier

(single asset)

Communitysupplier

Supplier PartnerIntensity of relationship

Cost

Service levels

Economies ofscale

Risk reward

Co-investment

Economicdevelopment

Equity/JV

Deg

rees

of e

cono

mic

free

dom

Figure 1.4 Variations in relationships in the outsourcing of the IT function

Chap-01.qxd 3/1/05 12:29 PM Page 31

Page 51: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

against the type of partnership both the supplier and buyerhave agreed on. The type of partnering relationship is often alsodescribed by suppliers as the degree of economic freedom. Thiscould be a loose arrangement at one end of the scale, such as aprice for service or cost model. At the other end of the scale, thesupplier could be linked to the buyer in the form of a joint ven-ture (JV) where both parties have a stake in the arrangement.The partnership agreement controls the degree of economicfreedom that either the buyer or supplier has during the periodagreed at that time. There are multiple options available, ofwhich six variations are listed in Figure 1.4. The idea behind theillustration is that in a strategic partnership arrangement, thereare also often very tight economic arrangements that bind bothparties into delivering high levels of service and that have verysignificant economic considerations. At the other end of the scale,where it is very much like a contracted situation (see Contractingversus Outsourcing), the model is that of a community supplierthat provides single services for a fee.

To this end, service levels are occasionally used to manage sup-plier operations. As the partnership relationship develops andmore trust exists in the relationship, a preferred supplier statusmaterializes with either one or multiple assets. It is common tosee a risk–reward type compensation structure materialize asthe supplier is trusted to deliver and can occasionally act on itsown initiative. Economies of scale arise as the resources andprocesses are controlled by the supplier. At this point, there is jointinvestment and joint responsibility for the outcomes of the func-tion that has been outsourced. In a partnership situation, at thefar right of the figure, there is equity in the outcomes and anintegrated delivery effort by both the supplier and buyer comesinto being. At this stage, almost all the benefits are observed in asynergistic business environment.

A ‘potential contract’ relationship model addresses the organ-izational needs of control and flexibility. Many new arrange-ments have emerged in the late 1990s, exemplified by multiplesupplier contracts, joint ventures, individual and joint venturespin-offs, consortia and shared service structures. The import-ance of the quality of supplier–client relationships has beenreceiving attention for some time, both in the general manage-ment literature and in operations management research.

The quality of the relationship will also depend on the quality ofinformation sharing and the attitudes and dispositions as wellas the social climate within which relationships are pursued.

Managing the Risks of IT Outsourcing

32

Chap-01.qxd 3/1/05 12:29 PM Page 32

Page 52: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

It is the balance between relationship requirements and relation-ship capabilities that promotes the growth of outsourcedarrangements. While it is critical to find the supplier/partnerwith the same values and principles in order to build a healthyoutsourcing relationship, it is more critical to understand howsuppliers deliver ‘better’ than the organizations they serve.

Ignorance and a lack of collaborative experience often take theblame as the main source of alliance problems and failures. Thiscarries a unique risk in the ITO relationship. The transparencyof the organization and the information available between part-ners can be achieved through active means, including theadopting of policies that enhance information sharing, or thedeployment of shielding mechanisms in order to protect keycompetencies. This leads also to the point that complete integra-tion is often neglected because of political or selfish reasons.

Outsourcing has evolved from spot-contracting to relationshipswhere service providers offer products and services that advancethe organization’s strategic business goals and enhance theprovider organization’s position in the value chain. Organizationsare observed to resort to consortia-based sourcing, namely,sourced service consortia, for the purposes of outsourcing keyfunctions, particularly the IT function. Organizations are choosingfrom niche and speciality shops such as ASPs, Web hosting, ande-commerce providers, as well as network integration experts.

Suppliers of outsourcing services deliver products and servicesmore efficiently than the buyers of these products and services.This is a fundamental assumption that forms the basis of thevalue gained in an outsourcing arrangement by the buyer ofthese services. The ability to ‘buy’ cost savings and efficiencies(in addition to many other things) from the supplier is the cen-tral benefit of outsourcing. However, a reduction in financialrisks does not mean that the operational risks also diminish. It isthis special relationship between the risk categories that becomesthe central theme in Section II of this book.

The incentives for outsourcing suppliers are the increased mar-gins and competitive advantage over competing supplierorganizations. The need to perform at higher standards in termsof speed (volume output), cost of work done (cost of produc-tion) and quality of products/service delivery means that thesupplier must innovate and perform better than the organiza-tion or buyer of these services. The risks of innovation must beconsidered by the supplier. What are the effects of this on thebuyer’s risk profile?

Common Terms and Concepts Used in Outsourcing

33

Chap-01.qxd 3/1/05 12:29 PM Page 33

Page 53: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A supplier of services needs to cater to the needs of the buyer.The buyer of outsourcing services clearly seeks to derive max-imum value directly through the outsourcing services and thepositive effects the services would create in the various parts ofthe organization. While the supplier has profit motives, it seeksalso to provide increased value to the buyer. It is demonstrated,however, that the value, in terms of goals and risk carried by thebuyer and supplier, do not match. This produces a tension thatis neither conducive to either group nor to the ideals originallydesigned to be delivered by strategic outsourcing. The risk pro-files of both the buyer and supplier obviously change.

A further development has been that leading corporationsacknowledge that the top tier of outsourcing organizations can-not be ‘the best’ in all areas, and hence have been contractingwith two and/or a network of suppliers who are expected to co-operate in order to deliver a seamless service on behalf of theirclients. Environmental and organizational risks are consideredin this scenario.

The objectives of a typical outsourcing arrangement can be con-tractually specified. Methods and processes are, however, diffi-cult to incorporate if they are based on tacit knowledge. Tacitknowledge is the result of an accumulation of experience and, assuch, may be difficult to communicate to those without equiva-lent experience. Since contractors control work processes, unlessthey share the required tacit knowledge, they may choose sub-optimal processes. Addressing this limitation may require intenseday-to-day involvement of the organization’s managers withthe HR contractor until the contractor acquires the requisite tacitknowledge. Inefficiencies are likely to result, however, becausemanagers may lack specific authority to direct work processesof contractors. Thus, because many positive HR outcomes dependon tacit knowledge, organizations that believe they have achievedsuch outcomes with in-house HR management are less likely torely on HR outsourcing.

1.12 Outsourcing contracts

Effective contracting reduces the probability of many potentialsources of loss. This serves to control legal risks. Unanticipatedenvironmental changes create unanticipated opportunities forexploitation that were not protected against in the outsourcingcontract. The probability of losses from residual risks is alsodetermined by the unquantified probability that outsourcingpartners will see and exploit these opportunities.

Managing the Risks of IT Outsourcing

34

Chap-01.qxd 3/1/05 12:29 PM Page 34

Page 54: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Contractual and/or informal relationships between the supplierand buyer organizations of these services are often structuredaround the nature of the outsourcing contracts and the use of mar-ket opportunities for competitive advantage. The various attrib-utes of outsourcing contracts in the different types of outsourcingagreement vary. Outsourcing uses contractual mechanisms to helpmanage unique requirements and closely interlinked processes.

There are significant differences between the attributes of a sour-cing contract and those of an outsourcing contract. However,various features encompass the contract mechanisms for boththese concepts. When the price of the services is considered,often there are no ‘market rates’ for long-term contracts, espe-cially with ITO, but often a negotiation process takes place. Inan outsourcing deal, this is structured into a contract where pos-sible formulae form the basis for pricing. In an outsourcingarrangement (versus a sourcing deal), the supplier typically isgiven a contract covering a long period of time (possibly 5 to 10years) to deliver agreed outcomes over this period. In thisinstance there are high switching costs for both the buyer andsupplier.

The services in a sourcing contract are tightly linked with thecontract. When services are sourced (or purchased), the supplierprovides the innovation, service and price at the time of pur-chase. In an outsourcing deal, the buyer determines the strategy,price, and contracted services that are delivered by the supplier.

The governance structure protects both the buyer and supplierin a long-term contract and agreement. During the outsourcingagreement period, the governance process allows for communi-cations and an escalation process to resolve conflict. In a sour-cing process, a supplier can be selected at any time.

Contractual risks are a dominant factor in the outsourcing deci-sion. The drivers of risk derive from information asymmetriesbefore contracting, inability to monitor partners’ actions accur-ately, and exogenous changes that allow one party to behaveopportunistically.

Governance infrastructure that will be in place at the start of theoutsourcing contract will ensure that contracts are administeredand processes are in place. Service level agreements are put intoplace. Service levels will be defined by the business functions andavoid highly technical metrics, as is well understood by businessmanagers. The service levels also have clear and agreed conse-quences associated with failure to meet minimum standards.

Common Terms and Concepts Used in Outsourcing

35

Chap-01.qxd 3/1/05 12:29 PM Page 35

Page 55: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The governance process ensures that the early agreementsbetween the parties are adhered to. Finally, the customer’s chang-ing requirements are administered during the term of the contract,through the governance framework. This ensures appropriatearbitration as the supplier is often reluctant to change the contractwithout concessions or price increases. It also protects the supplierfrom unreasonable changes by the buyer.

The following are some supporting contract-related issues andrelated risks as observed by various experts. Despite the needfor a clear contract, it is important that both the buyer and sup-plier must be ready to modify their means and ends as the out-sourcing relationship develops. Not all aspects of the contractare foreseeable. A lengthy legal contract is not sufficient to man-age this risk and protect what can be billions of dollars investedover an extended period of time. As retrospective documentsthat impose penalties after the fact, contracts are not suitable toolsfor remedying customer satisfaction. The outsourcing process ismore effectively controlled through requirements definitionsand formal change management systems.

The risks associated with the relationships form a key character-istic of the outsourcing agreement. Contractual difficulties canbe grouped into a number of areas, involving precontract infor-mation asymmetries of supplier quality, inability to observecounterparty action, and opportunistic behaviour enabled bythe bilateral relationship in an environment of great uncertaintyand biases against comprehensive risk analysis.

An outsourcing contract between two parties is dictated by anenforceable contract. ‘Contracts’ can take a variety of formsranging from a spot market contract where the terms are estab-lished and immediately satisfied after entering the agreement(for example, to buy or sell an existing mainframe to a predeter-mined deadline), to a long-term relational contract which sim-ply agrees on a set of rules for future conduct without beingexplicit about everything each party is to do in every contin-gency. The critical limitation of contract structure, whatever theform, is that contract terms need to be enforceable. This requiresa higher threshold than merely being observable by a thirdparty. Contractual terms must also pass the more rigorous con-dition that they are verifiable to an outside party such as a court.There are a number of factors that influence the choice of govern-ance structure. The ability to observe, monitor and verify theactivities of both parties places restrictions on how detailed andeffective an explicit contract can be.

Managing the Risks of IT Outsourcing

36

Chap-01.qxd 3/1/05 12:29 PM Page 36

Page 56: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

1.13 Outsourcing and the implications forhuman resource development

Research shows that the success of outsourcing is more likely tobe restrained by human rather than technological problems. Inalmost every situation where outsourcing is implemented, thereis a reduction in the need for people. This often means that per-sonnel are reassigned to another job function or are no longerneeded in any capacity. These changes therefore often involvereductions in personnel in order to improve the efficiency of theorganization in terms of cost disciplines and to maintain com-petitiveness in the market. The resultant organizational setupthus has both positive and negative consequences. Conversely,an ageing IT workforce is a factor for consideration in moremature markets (e.g. in North America) where retirements out-pace the ability of governments to staff important technicalfunctional areas.

Organizational performance can improve in three areas throughthe introduction of new skills and working practices, by redu-cing staff numbers, and by modifying individual incentives,employment terms and attitudes in the workplace. As manage-ment is more able to predict future costs than to predict futurerevenues, reducing costs by decreasing the size of the workforceis often done. Hence, the expected economic benefits of a smallerworkforce include reduced expenses, increased returns on invest-ment, higher profits and improved stock prices. Changes likethese are often very emotive, generating internal fears as well asemployee resistance.

Overall, it is acknowledged that whether the need for change inthe organization is a consequence of a re-engineering of busi-ness processes and/or a focus on core competencies, or an attemptto restructure in order to become more globally competitive,and whether restructuring or outsourcing strategies are utilized,the resultant effect is downsizing. Redundancies and layoffs arecommonplace in outsourcing situations despite the transfer ofpersonnel to service providers, the redeployment of staff withinthe organization, outplacements and voluntary early retirements.

In the long term, the service provider relies more on natural attri-tion and redeployment as a means of aligning manpower to thecontract. Even the transfer arrangements may have an impact onemployment within the organization: on wages, on working con-ditions and on the duration of the contract with the new employer.Employees hence may perceive the prospect of outsourcing as

Common Terms and Concepts Used in Outsourcing

37

Chap-01.qxd 3/1/05 12:29 PM Page 37

Page 57: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

tantamount to a sell-off, often along with capital equipment.Although many employees understand economic reality, i.e.that outsourcing efforts are undertaken for the improvement oforganizational efficiency and to increase value to shareholders,questions are increasingly being asked concerning the emphasison shareholder well-being to the detriment of stakeholders inthe organization, namely employees. Effectively, employee loy-alty to the organization diminishes in such circumstances.

Poaching, for example, is the misuse of information by anotherorganization that has a close working relationship. Poachingoccurs as, unlike the case with a physical asset, information is notsubject to wear and tear and cannot be returned in the same waywhen it has finished being used. This enables organizations toappropriate information without obvious indications as to its use.This constitutes a subset of environmental or organizationalrisk. Organizational risk results from changes to internal organ-izational structures that occur as a result of changing roles. Thisrisk will be reduced as organizations become more flexible,depending less on formal and rigid organizational structures.

The next chapter continues with a definition and description ofrisks that occur in the ITO environment. Risks, together withoutsourcing activity and the unique nature of the IT functionform the basis of first measuring, then understanding and sub-sequently mitigating, risks through planned activities in thishigh-profile environment.

Managing the Risks of IT Outsourcing

38

Chap-01.qxd 3/1/05 12:29 PM Page 38

Page 58: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The outsourcing of the IT function often means that the organ-ization’s information requirements become a joint responsibilityof a third party and the original organization. What is the riskthen, if either the supplier or the buyer does not provide its endof the agreement? If we postpone the response to this question,and take a more optimistic perspective instead, i.e. consider thescenario wherein both sides deliver to expectations, the truevalue of information that can be derived from the IT functionwill be seen to be optimized.

The use of information is very subjective and quite dependent onthe user’s ability to leverage further advantage. Information thatis left idle is not worth anything. If information is well used, thetiniest amount of information that is leveraged can return verysignificant benefits. It is argued that the value of information isderived from its accuracy (reliability), its relevance and its time-liness. Phrases like ‘information is power’, ‘insider information’and ‘business intelligence’ represent attempts to describe thecritical nature of information in many different scenarios to gainascendancy and advantage. When the supplier can provideimproved services from the IT function, the benefits to thebuyer organization are certainly better than they were before.

Given the unique nature of each buyer/supplier encounterdefined in the previous chapter, each ITO project is distinctive.In addition, the risks that become manifest are only applicableto the project at selected points in time. In the previous chapter,common concepts were referred to in the outsourcing environ-ment. In this chapter, a baseline understanding of commonlyused outsourcing frameworks is vital if the risks are to be meas-ured from this common baseline. Each of these unique conceptscontains inherent risks that influence the project. These risks

39

Outsourcing the IT function

Risk-taking is an integral and intrinsic part of success or living a full life.

Malcolm S. Forbes (1919–1990), US publisher

2

Chap-02.qxd 3/1/05 12:30 PM Page 39

Page 59: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

40

need to be managed. The key concepts for illustration includethe following:

● Core competency.● Economies of scale and scope.● Commoditization of the IT components (within the function).● The dual role of IT within the organization.

The nature of IT not only refers to the equipment and relatedcomponents but the nature and value of information. As aresult, IT processes can be delegated but this also carries a levelof risk that varies between organizations. It is difficult enoughto identify the risk types let alone to quantify risk exposure inthis environment. In an outsourced environment further ques-tions need to be asked and answered. What, for example, are thecapabilities/competencies of the parties involved with thedelivery of the product that could introduce key operationalrisks? What are the delivery outcomes that determine a success-ful ITO agenda? How does the product contribute to a success-ful outcome for the buyer and/or the seller?

Many of the services offered to support the ubiquitous IT func-tion are now commoditized. There is little differentiation in com-mon processes, technology and capabilities. Over time, manycommon IT functions such as the maintenance and supply ofroutine software applications become commodity items that canbe purchased as if they were mass produced. The organization’sability to maintain an IT function internally (within its ownrange of functions) has been used to provide a source of advan-tage; few organizations adopted the use of IT in their portfolioof capabilities only a decade ago. This is now no longer the case.For example, an organization may have a critical data warehousefunction that provides information on its customers throughoutthe world. As storage was expensive in the late 1980s, its com-petitors could not afford to maintain large databases. And it wasuncommon for an organization to be able to maintain a large datawarehouse at that time. However, the situation has changed.Data storage has increased in quality and at the same time hasundergone a very significant price reduction. Data storage ser-vices are now being charged on a cost-per-megabyte-per-monthbasis, similar to the way in which we all pay for utilities such as electricity and water. The commoditization of the data ware-housing function has made data storage a commodity (as opposedmerely to a feature that differentiates an organization that hasdata storage facilities).

Chap-02.qxd 3/1/05 12:30 PM Page 40

Page 60: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

As the existence of an IT function, at a generic level, loses its dif-ferentiated advantage relative to its competitors, IT serviceproviders are more likely to increase their reliance on externalsuppliers and redirect their own capabilities to other high value-added areas. This argument supports outsourcing of the ITfunction. At the same time, however, it increases the level ofcompetition among suppliers, who now need to seek ways todifferentiate a generic service. Supplier organizations now needto maintain relevant skills, experience and capabilities to be able to deliver world-class IT services. The suppliers have theability to deliver IT at a much lower cost and of significantlybetter quality than can other organizations without IT as theircore competence.

2.1 The ‘core competency’ argument

Many organizations use outsourcing in the belief that ITO is atool that provides the solution for lowering costs, improvingservice levels, accessing specialized resources and ensuring thesuccess of new business ventures. The justification for the valueprovided by outsourcing the IT function is also made on the basisof the core competency argument. It has even been proposed bypractitioners and researchers in this area that ITO should be anintegral part of the organization’s overall plan in order to focuson its core competence (Quinn and Hilmer, 1994; Venkatraman,1997; DiRomualdo and Gurbaxani, 1998). Specifically, the organ-ization needs to determine the scope of its activities with specificreference to its objectives, as opposed to outsourcing when thereis a pressing need to apply cost disciplines.

The organization’s corporate resources (personnel, computingequipment and other components) will be available to channelenergies into the organization’s core business or core competency.

The key components of core competence as defined by Prahaladand Hamel (1990) include:

● accessing a wide variety of markets;● making a significant contribution to the perceived customer

benefits of the end product; and● making it difficult for competitors to imitate.

The focus on an organization’s competency allows for resourcesto be maximized. Core competencies are like a bundle of corpor-ate skills that cut across traditional functions, such as product or service design, technology creation, customer service and

Outsourcing the IT Function

41

Chap-02.qxd 3/1/05 12:30 PM Page 41

Page 61: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

logistics. It is also suggested that core competencies can beregarded as distinctive competencies with multiple applications.

ITO satisfies cost reduction and enhancement of efficiency. Boththe buyer and supplier organizations which are able to focus oncore competence will more efficiently utilize resources and,hence, also deliver more cost-effective services. Resource-basedorganizational theory focuses on organizational business per-formance that makes efficient use of unique organizational cap-abilities supporting the creation of sustained performance withinindustries. Management ideas that stress the importance ofdownsizing of organizations also focus on key major activities toexplain successful corporate performance (Hoskisson et al., 1994).

In the outsourcing context, Alexander and Young (1996) describecore competency as tasks that are traditionally performed in-house; that are critical to business performance; that create cur-rent or potential competitive advantage; and that will drive fur-ther growth, innovation, or rejuvenation. This definition impliesthat core activities cannot be relinquished to a third party such asin an outsourcing situation. The question, however, whether IT isa core activity (and hence whether it should be outsourced) cannotbe answered in a generalized sense. Core competencies are notseen as being fixed and codified but flexible and evolving overtime. As the organization evolves and adapts to new circum-stances and opportunities, so its core competencies will also adaptand change. In this way the organization will be able to make themost of its given resources and apply them to new opportunities.

Core competencies are those capabilities that are critical to anorganization in its aim to achieve competitive advantage. A com-petence which is central to the organization’s operations butwhich is not exceptional in some way should not be considered asa core competence, as it will not enable differentiation of the busi-ness from another similar type of business. For example, a processwhich requires the use of common computer components and isstaffed by people with only basic training cannot be regarded as a core competence. Such a process is highly unlikely to generatea differentiated advantage over rival businesses. However, it ispossible to develop such a process such that it becomes a corecompetence with suitable investment in equipment and training.

Performance of the IT function

A plethora of tools and techniques are available which can meas-ure the performance of competing IT strategies and investments

Managing the Risks of IT Outsourcing

42

Chap-02.qxd 3/1/05 12:30 PM Page 42

Page 62: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

in processes including the outsourcing of the IT function. Inaddition to metrics like returns on investment (ROI), internalrate of return (IRR) and net present value (NPV), an IT functionof an organization must also meet certain fundamental per-formance criteria including reliability, availability, security andmanageability.

Core competencies are a mix of technological specialization,innovative input, and the degree of diversification or specializa-tion of organizational resources (Markides and Williamson, 1994).Following this argument, core competence suggests the abilityof an organization to provide excellent performance, over andabove normal standards. Additionally, core competencies includea pool of experience, knowledge, and systems developed by theorganization that, together, can be used to create and accumu-late new strategic assets. The focus on the importance of under-standing the performance of the organization is a result of theefficient use of these distinct capabilities that create sustainedperformance and competitive advantage.

While the supplier focuses on its core competence in deliveringthe IT functions, the buyer enjoys relief from not having to focuson non-core competence activities. As both organizations focuson individual core competence or activities (specialization), effi-ciencies are gained. The view from the literature is that servicequality improvement, the need for strategic flexibility and thefocus on core competencies are predominant concerns for sour-cing decisions. Outsource activity improves operations withinthe organization through focus on core competence.

The major drivers for outsourcing, however, include cost-effectiveaccess to specialized skills provided by the new commercialarrangement. Indirect overhead costs or ‘non-core competen-cies’ are outsourced to achieve cost-effective operations througheconomies of scale. Cumulative experience in outsourcingenhances quality improvement, with concomitant cost reduction.

Organizations are now focusing on ‘core’ business in the searchfor greater efficiency. This effort to focus on core products hasalso had the effect of reducing costs and exploiting new chan-nels of distribution, such as the Internet.

If these claims were to be viewed from a more pragmatic per-spective, then having a competence alone does not, on its own,guarantee success. Competitive advantage depends on whetherthe competence helps deliver a product or service that cus-tomers value. It is a differentiation of products/services that

Outsourcing the IT Function

43

Chap-02.qxd 3/1/05 12:30 PM Page 43

Page 63: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

gives the organization its advantage and also allows premiumpricing of its services.

Advantages gained by using outsourcing services are derivedfrom cost leadership and access to lower overheads, and differ-entiation through access to new technology and a supply of morecompetent people. As outsourced services are no longer man-aged within the organization, it follows that its services aremost effective in a highly networked environment where infor-mation flows unhindered. Further, operational efficiencies arederived as organizations focus on core competence or mainactivities. Many non-core activities are reassigned or allocated toanother party in an outsourcing arrangement. This enables thebuyer organization to apply more attention, effort and resourcesto activities that contribute directly to its business. It is arguedthat the organization’s ability to make the decision either tohave a capability to deliver the IT function or to use an externalsupplier is, in essence, its core competency.

Distinctive competency

When the core competence of an organization is sufficiently dif-ferent or distinctive from those which other organizations pos-sess, it allows that organization to command the market in termsof product price; this means that it has a control advantage. Thisdifference or distinctive competency, in turn, allows the organ-ization to earn a return above marginal costs plus cost of capital.IT supports unique processes and the specialist role thereofreinforces this situation.

One of the arguments used to assess the level of technologicalspecialization of an organization lies in the use of patent statis-tics. The concentration of patents indicates choices with regard topriority skills and concentrated innovative capabilities. Patentshave been, arguably, an acceptable indicator of research outputand technological competence. Patents could serve as an indica-tor of whether an organization has been able to turn its researchand other innovative activities into inventions that are worthprotecting. For the purposes of this argument however, many ITfunctions could then be patented.

This discussion on the usefulness of patents, however, has rele-vance to our argument as it does generally show that a compe-tence is worth protecting. The patenting of IT processes is,however, rare as a result of the speed of change and rapidgrowth in the industry. This does not allow for the possibility

Managing the Risks of IT Outsourcing

44

Chap-02.qxd 3/1/05 12:30 PM Page 44

Page 64: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

that there may be several organizations with above-averagecompetencies in an industry constituted by a large number oforganizations. Since, therefore, a particular competence is notunique, it is unlikely to attract a premium pricing strategy. TheIT function hence is a mix of new ideas and knowledge as well asproven and used concepts. Following this argument, each part ofthe function should be investigated thoroughly in an outsourcingexercise. The next argument, however, indicates otherwise.

Assuming there is a set of distinctive competencies within anorganization’s IT function, many would argue that the cumula-tive and tacit nature of technological knowledge in the IT func-tion is very difficult to transfer from one organization toanother. In an outsourcing situation, the identifiable elements ofdistinctive advantage can in any case be restricted via isolatedscope of work, contracts and other instruments. So, more import-antly, the intellectual property risks involved in an outsourcingexercise should be investigated.

Diversification and specialization

The degree of diversification is relevant for understanding therole of core competencies to the extent that it affects the per-formance of the organization. From a supplier perspective, thebenefits of specialization are essential to deliver better service.From the buyer perspective an outsourcing exercise enhancesthe degree of specialization. Both parties benefit from the out-sourcing exercise. The degree of relatedness of lines of business,which comes closer to specialization in the light of core capabil-ities, is hence observed to be positively related to the economicperformance of diversified organizations. This supports the outsourcing-of-IT argument that organizations should becomefocused and specialized.

There is, however, another view that the diversification oforganizations increases economic performance through riskmitigation. It is difficult to establish a positive relationshipbetween the degree of diversification of organizations and theirprofitability. In fact, there are many examples that indicate thatthe degree of organizations’ diversification is related negativelyto their economic performance. Whether diversification or specialization, the risks involve relate directly to the ability ofeach party to benefit from the advantages inherent in these con-cepts. How then are the risks going to be measured and quanti-fied in order to negotiate the best terms for either the buyer orsupplier?

Outsourcing the IT Function

45

Chap-02.qxd 3/1/05 12:30 PM Page 45

Page 65: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Outsourcing to derive the benefits ofcore competency

Outsourcing allows a key function like IT to be effectivelyremoved (resources, assets and operations) while the organizationstill ‘enjoys’ the selected outcomes from this function (use of ITto enable the flow of information within the organization). Non-core functions therefore can be effectively removed as regularoperations are passed to the supplier of outsourcing serviceswho, in turn, will deliver the desired outcomes to the buyer ofthese services. When organizations focus on core competence,advantages of economies of scale, cost reduction and more-effective operations often result. Among organizations that haveoutsourcing agreements, satisfaction is higher for those that out-source core activities, provided that they incur minimal riskfrom the relationship established.

Organizations should define the areas critical to their success,devote maximum resources to those areas, and outsource every-thing else that is not ‘core’. As defined earlier, the competenciesof the organization provide potential access to a wide variety ofmarkets, make a significant contribution to the perceived cus-tomer benefits of the end product, and are difficult for competi-tors to imitate. A definition of core competence includes activitiesthat the organization is continuously engaged in, while periph-eral activities are those that are intermittent and, therefore, canbe outsourced. If this strategic perspective is adopted, the argu-ment then holds that core activities should stay in-house, whilenon-core activities can be outsourced, in order to preserve corecompetencies. The importance of coherence in corporate cap-abilities that strengthen the competitive advantages of organiza-tions needs to be emphasized. Multi-business organizationswith commonalities based on shared capabilities and know-how are known to be associated with higher economic perform-ance (Prahalad and Hamel, 1990).

To cope with increasingly aggressive environmental pressures,organizations are attempting to reposition themselves higher onthe value chain so as to gain competitive advantage. In an effortto transform cost-based activities into profit centres, someorganizations use separately managed profit centres or businessunits to induce competitive market pressures internally. Thesesupplementary or non-core activities are then spun off into sep-arate organizations with the intent of making them profitable.This, however, appears to be a solution for situations where thereis logical placement of these functions within the organization.

Managing the Risks of IT Outsourcing

46

Chap-02.qxd 3/1/05 12:30 PM Page 46

Page 66: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

For example, organizations that supply outsourcing services forprofit motives leverage on economies of scale to provide cost-effective and resource-efficient services. The ‘economies of scale’argument is discussed below.

2.2 The ‘economies of scale’ argument

Another common reason why organizations choose to outsourceis to achieve economies of scale. Both the buyer and supplier ofthe ITO function would benefit from the effects of economies ofscale and scope.

Outsourcing has moved markedly from attending to a singlefunction more efficiently, to reconfiguring a whole process inorder to achieve greater shareholder value across the organiza-tion. The emphasis is shifting from outsourcing parts, facilitiesand components, towards outsourcing the intellectually basedsystems, such as customer response handling, procurement andmanagement. Herein are the benefits that can be obtainedthrough economies of scale and scope. Equally, however, theperceived risks are greater.

When a buyer has contracted for IT services, it has assured itselfa portion of any profit that would be received from selling excesscapacity on its systems. If the supplier could use the additionalcapacity to serve other buyers, economies of scale are realized.Large suppliers also have the scale to negotiate better acquisitionterms for software and hardware. By purchasing in larger quan-tities to serve simultaneous users, suppliers can lower per-unitcosts. Finally, software developed for a specific application canoften be applied at virtually no incremental cost to other clients.For this reason many large third-party suppliers appear in mar-kets where a service is principally delivered through software.

The effects of economies of scale are significant. For example, asoftware developer would incur a one-time cost in the develop-ment of a software application. Each copy sold subsequentlywould earn a unit cost. Each unit sold would then contribute toa share of the original capital costs. The outsourced supplier,however, would purchase one licence to run the application at aunit cost. Subsequently this supplier would ‘host’ the applica-tion for multiple buyers. Software suppliers have since, how-ever, changed this procedure by licensing software not bymachine, but by ‘concurrent users’ or ‘seats’. This example illustrates some of the magnification effects of scale economiesthat exist in an outsourcing environment.

Outsourcing the IT Function

47

Chap-02.qxd 3/1/05 12:30 PM Page 47

Page 67: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Economies of scale have their limits in an ITO context and are onlyverified for the cost of machine or CPU time and not services. Forexample, a supplier would need a finite number of people to sup-port a particular function. People resources are finite and cannotbe broken down into partial resources. Perfect economies of scalehence do not occur in all aspects of economies of scale. Peoplecosts dominate in governance and service costs; both of which canbe unpredictable as they would only be required when there is aneed. The financial and resource risks that are incurred by the sup-plier need to be accounted for here. Likewise the same risks arepassed on to the buyer if not adequately taken up by the supplier.

Economies of scale can also be observed when network exter-nalities affect the organization’s decisions in a situation where aproduct or service becomes more valuable to all users, as itsadoption grows. For example, the ‘Voice Over Internet Protocol’(VoIP) system is of little use if only one person has access to thenetwork, whereas it has an enormous value if a person from theorganization can call virtually anyone for a low charge. Products,services or systems that exhibit network externalities tend toconverge toward standards. Once a standard has attained crit-ical mass, organizations may recognize that adhering to the stand-ard is critical for survival as economies are realized.

The main advantage the supplier organizations have lies ineconomies of scale and scope. The benefits from economies ofscale arise when costs decline as production increases. The mostcommon form of an economy of scale is when efficient produc-tion involves a large fixed cost, such as the initial capital outlayto procure some of the buyer organization’s assets, amortizedvia a larger quantity of goods or services. Increasingly, out-sourcing suppliers are now looking beyond running IT systemsto business process management (BPM), in which they also takeover functions such as billing, cheque processing and accounting.

The benefits of economies of scope, much like the economies ofscale, are enjoyed by the supplier where shared fixed-costequipment for multiple buyer organizations can be pooled andused for a common core of IT services. Generally the supplierwill negotiate for activities where the total costs of delivering acommon portion of the IT function lie across several buyerorganizations (in a sharing scheme). These costs will be lowerthan the sum of the costs of producing them separately, hencethe benefit from economies of scope. An example of economiesof scope is when core technologies have applications acrossmultiple industries. A detailed study of 186 systems projects

Managing the Risks of IT Outsourcing

48

Chap-02.qxd 3/1/05 12:30 PM Page 48

Page 68: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

between the years 1967 and 1993 in five large organizationswhich implemented new technologies such as fourth-generationprogramming languages, or which required mini-computers ormultiple-computer networks, found that they were more likelyto be outsourced than built in-house (Nelson et al., 1996). Rapidtechnological change, combined with the experience of workingin different settings, often gives suppliers the advantage in pro-viding ‘leading edge’ technology services.

2.3 Commoditization of IT

Many of the discussions around core competency no longerapply when IT becomes a commodity item. The use of IT com-ponents has become prolific and their availability abundant.There is little restriction on access to outsourced services andproducts. Easy access, over time, would result in standardized(mass production, repeat transaction) outsourced services. Thedifferentiation which used to exist with respect to lower cost,resource availability and access to expertise has become diluted.The standardized processes which used to be outsourced nowserve as building blocks or a foundation for a more complexseries of interrelationships and risk elements.

2.4 The role of IT in the organization

The IT function is typically used to perform infrastructure sup-port but it can also be utilized to differentiate an organization’sproducts and services.

It is a support function as it is interwoven or integrated intomany essential organizational processes and is an essential toolthat enables many value-creation activities to go ahead. The ITfunction itself, however, can take on several roles in an organ-ization including that of a strategic function which allows theorganization to differentiate itself from its competitors, i.e. as aprimary function. This ‘dual function and capability’ feature ofIT adds another dimension of complication to the outsourcingdecision, as this function is unsuitable for being outsourced inspecific situations, i.e. when it is a strategic function that differ-entiates the organization from its competitors. The organizationretains control of the strategic function to protect itself againstpossible theft – or other criminal activity (by a competitor) – ofits proprietary information. The operational risk as well as riskof loss of information is higher in this situation.

Outsourcing the IT Function

49

Chap-02.qxd 3/1/05 12:30 PM Page 49

Page 69: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

For example, when an organization’s IT application is used toenable the establishment of a specialized e-commerce channelthat its competitors do not possess, it becomes a strategic func-tion for this organization. In another similar organization inanother country or business setting, the same IT application maybe used by most of the other members of the organization’sindustrial sector. In this setting, it is commoditized and has therole of a support function. The risk profile involved, when astrategic role applies, may be different when compared to thesupporting role scenario.

There are many options available to mitigate the risk of infor-mation loss and operational downtime as well as erosion oftechnical and business advantage. A mechanism to reduce theserisks has traditionally been a legal document called thebuyer–supplier agreement. As this new tier of risks is intro-duced, the magnitude of risk exposure applying to the legal andoperational risk groups increases. It is this fluctuation in risk foreach of the risk groups that will be investigated in this book.

The role IT plays in the organization determines the strategy androute taken when it is outsourced. After the decision to outsourceis made, however, the relevance (of its role) diminishes. The suc-cess of the outcomes of an IT service then comes to the forefront.

2.5 Outsourcing and the unique role(s) of the IT function

As a strategic or primary function, IT networks encourage verti-cal de-integration of organizations by lowering the costs of‘buying’ compared to ‘making’ in-house. Reduced co-ordinationcosts imply an ‘unbundling’ of functions, making it easier andmore efficient to enter into value chains rather than maintain in-house ownership. This provides opportunities for the ITfunction, which has a role as a competitive weapon for the organ-ization. When IT as a supporting function is outsourced, thereare obvious benefits to be gained. When IT is a primary func-tion, however, the competitive advantage is enhanced throughthe strengths of the organization of origin in partnership withthe supplier. The successful performance of the IT functionhence, no longer pertains to the outsourcing organization but tothe supplier that has been selected for its superior delivery of IToutcomes. The ability to provide both a support as well as astrategic role within the organization is unique to the IT func-tion. In both these roles, separate outsourcing models are used.

Managing the Risks of IT Outsourcing

50

Chap-02.qxd 3/1/05 12:30 PM Page 50

Page 70: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

As the role of IT changes, the outsourcing decision and govern-ance tactics change. To illustrate this, Figures 2.1 and 2.2 showsome of the possible choices. In Figure 2.1, the IT function isshown as a primary (strategic) function and as a support func-tion on the x-axis. The organization’s position, i.e. whether theIT function is outsourced or not, is indicated on the y-axis. As ITcan be a strategic or primary function within an organization,outsourcing is seldom optimal (marked with an ‘X’). When IT isused as a competitive weapon, it should not be outsourcedunder most circumstances. This is because the risks of losinginformation and the competitive advantage from the differentialcreated is lost if the supplier ‘leaks’ or shares this informationwith competitors of the buyer organization.

Outsourcing the IT Function

51

Outsourcingbenefits

Isoutsourced

Position

Function

Notoutsourced

Supporting Primary

Inefficient useof resources

Leveragingstrengths butincreased risk

Competitiveweapon

Figure 2.1The role of IT and its position in theorganization valuechain (Tho, 2002)

Outsourcingbenefits

Isoutsourced

Position

Function

Notoutsourced

Supporting Primary

Inefficient useof resources

Leveragingstrengths butincreased risk

Competitiveweapon

A

B

Figure 2.2In the transitionfrom support toprimary function,path A involves highrisk if the supplier–buyer relationship isnot managed, andpath B is optimal(Tho, 2002)

Chap-02.qxd 3/1/05 12:30 PM Page 51

Page 71: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

In the case where IT is a supporting function, shown in the left-hand quadrants in Figure 2.1, a decision to keep the supportingfunction internal often results in inefficient use of resources, lossof focus and unnecessary costs. A decision not to outsource inthis situation is often ‘suboptimal’. Optimal outsourcing bene-fits are realized when supporting functions are outsourced.

In an environment where the outsourced IT function changesfrom a support to a primary (strategic) role within the organiza-tion, the decision to continue to outsource is based very muchon the risk exposure in the operational, business and strategicareas, which influence the decision. The decision to maintainthe strategy to outsource and the risks associated with this nowneed to be considered (path A or path B in Figure 2.2). Path Awould mean that the IT function continues to be outsourced.This will mean that the operational, business and other risksescalate because a third party has access to confidential and pro-prietary information. A decision to discontinue outsourcing,path B, may be selected if the ‘appetite’ of the organization forrisk (‘risk appetite’) is exceeded. In this instance, the organiza-tion then decides to shift its IT function internally and to bemanaged using its internal resources.

Many instances have been cited where organizations which oncehad the IT function performing internal support functions haveshifted this role to facilitate primary e-commerce operations; forexample web channel marketing, purchasing online and supplychain management. A large group of IT functions have becomestandardized, or commoditized; these functions are prime can-didates for outsourcing.

The imposition of unplanned, higher fees backed up by the sup-plier’s threats to discontinue service or by other unmanageablethreats, is frequently termed supplier hold-up. As a result of thecomplex characteristics of IT in the outsourcing situation, thereis a high risk of exposure and a high probability of failure inher-ent in IT operations; this is in addition to the risks of the rela-tionship between the supplier and buyer of outsourcing servicesalso resulting in failure in this activity. There have been manywarnings of organizations experiencing negative consequencesof ITO activity including escalating costs, diminishing servicelevels, loss of expertise, and contract irreversibility.

Which activities should remain within the ‘buyer’ organization,in order to maximize the advantages of outsourcing? Unless theorganization develops best-in-world capabilities, including trans-action cost disciplines, it should purchase goods/services from

Managing the Risks of IT Outsourcing

52

Chap-02.qxd 3/1/05 12:30 PM Page 52

Page 72: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

providers who have best-in-world skills, in order to achieve acompetitive edge. It has also been suggested that ‘ “core” means“keep” ’, or that an organization’s core activities should be keptwithin the organization and never allowed to be performed by athird party.

As a result of the cumulative and tacit nature of technologicalknowledge, which is of particular relevance in so-called high-tech industries, it is assumed that this kind of knowledge isoften very difficult to transfer from one organization to anotherand therefore cannot be acquired easily through arm’s-lengthtransactions but only through very closely integrated networks.

The IT productivity paradox andoutsourcing

There is a choice between carrying out activities in-house andplacing them under market governance (via outsourcing), asdetermined by the relative costs of production and transactions.Not long ago, organizations were observed to have a voraciousappetite for rapidly improving technology. Measured product-ivity gains were insignificant. Businesses have since been revo-lutionized, along with the way we work, with permanent changederived from the use of new technology, computers and relatedcomputer peripheral devices. Only a couple of decades ago,there was heated debate on the value of computers and compu-terization. Could it be argued that businesses are experiencing asimilar phenomenon with the use of the familiar outsourcingservices that now support the complete IT function? There weremajor success stories and equally many impressive failures inthe use of IT only a decade ago, and there have been many casestudies that indicate catastrophic consequences and failures inearly ITO activity.

In a paper from research work at Harvard University, it wasreported that most of the productivity slowdown was concen-trated in the service sector. In the same paper it was argued thatIT is an effectively used substitute for labour in most manufac-turing industries, but has paradoxically been associated withbloating white-collar employment in services, especially finance.At the same time, it was indicated that the apparent paradoxcould be attributed to several basic causes. The reasons usedincluded the inappropriate measurement of outputs and inputs,lags in the learning and adjustment cycle, redistribution anddissipation of profits, and mismanagement of information andtechnology. Possible errors in measurement and statistical or

Outsourcing the IT Function

53

Chap-02.qxd 3/1/05 12:30 PM Page 53

Page 73: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

research error appear to be the main causes of the paradox. Themismanagement of information and technology begs the ques-tion whether managers have improperly managed and used IT.This is particularly relevant to the outsourcing of the IT functionas observations of the current literature on ITO seem to mirrorthese arguments.

There are many examples of mismanagement and misappropri-ation of resources and activities in the IT function. There is alsothe point regarding hidden costs, which is glaringly obviousand high-profile.

Hidden costs

Costs are difficult to measure and quantify for a particular exer-cise in a typical organization. As outsourcing leads to a redefin-ition of organizational boundaries and, by implication, structuraladjustments involving human resources, these changes oftenresult in social as well as financial costs. Although these costsare not permanent and are mitigated through retraining andredeployment of people resources within the organization, theirtransfer to the supplier organization can result in considerableredundancy payouts. The costs of outsourcing are not uni-formly distributed among the stakeholders of the organizationand the effects of contracting out on overall employment levelsin the economy are not well researched or understood.

The costs of outsourcing are composed of the costs of carryingout the transaction and, in addition, hidden costs due to co-ordination difficulties and contractual risks. These hidden costshave often not been accounted for in the outsourcing exercise.This is as a result of the relative inexperience of buyers seekingto use outsourcing services. Unlike suppliers, buyers do nothave the benefit of past experience. The savings gained as aresult of economies of scale are then theoretically translated asdirect savings for the tasks outsourced by the buyer. Sometimesother costs that are incurred as a result of implementing the out-sourcing framework offset these savings. For example, the costsof becoming dependent on outside suppliers for services candestroy all the benefits of outsourcing. When control is lost overa critical function like IT and faced with the prospect of man-aging relationships that go wrong and lowering the morale ofpermanent employees, the move towards outsourcing becomesa significant hidden cost to outsourcing. This eventuality formsthe biggest risk to the buyer, and is seen to outweigh many ofthe other benefits. It is an element of risk, i.e. an event that is

Managing the Risks of IT Outsourcing

54

Chap-02.qxd 3/1/05 12:30 PM Page 54

Page 74: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

driven by a low probability and that therefore may not happen.Outsourcing can also generate other new risks for the buyer,such as the loss of critical skills or developing the wrong skills,the loss of cross-functional skills, and the loss of control oversuppliers. These risks are especially pertinent when the sup-plier’s priorities do not match buyer needs.

For the organization that buys outsourcing services, outsour-cing activity provides it with the ability to adjust the scale andscope of its production capability upwards or downwards, at alower cost, to meet changing demand conditions. In addition,outsourcing decreases the product/process design cycle time.With the use of multiple best-in-class suppliers, who work simul-taneously on individual components of the system, each suppliercontributes greater depth and sophisticated knowledge in spe-cialized areas and thus offers higher-quality inputs than can anyindividual supplier or client. The cost margins that previouslyexisted when the IT function was performed in-house no longerexist as the services from the supplier would either cost the sameor less than when the IT function was performed internally.

Buyers often have no basis or ability to budget for costs of con-tracting for services involving searching for a suitable supplier,negotiating a fair price, writing the contract, monitoring per-formance and enforcing the contract. Other costs include co-ordination among the different organizations, bridging culturalgaps among participants, and risks inherent in contractual rela-tions. Contractual risks pose probably the largest transactioncost in procuring IT services. These benefits appear to be greaterthan the costs of monitoring that arise from supervision andlegal arrangements.

Transferring fixed costs into variable costs by selling assets to anoutsourcing supplier is also considered an advantage for manyorganizations. An organization receives a cash payment andtransfers fixed costs into variable overheads. These overheadsare adjusted in line with increases and decreases in business.This is beneficial in the majority of businesses.

With outsourcing there is a balance between the costs of run-ning a larger, less specialized organization and the costs thatarise from search issues and imperfect contracting. An organiza-tion that decides to outsource its IT components must search fora suitable partner, and then try to provide this partner withincentives to produce service inputs to its specifications and tothe timeliness of the information it demands. Searching is costlyand does not always end in success. When an organization

Outsourcing the IT Function

55

Chap-02.qxd 3/1/05 12:30 PM Page 55

Page 75: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

decides to maintain its IT function (along with others), however,it faces higher costs of producing components and services,because of the many divisions left to manage, and because itcannot benefit from the learning and expertise that is acquiredwith specialization in a single activity.

Financial accounting methods of product costing, aimed mainlyat profit calculation for the whole organization, do not usuallyprovide complete and relevant information of this sort. Hiddencosts come simply from choosing the relevant time period forcomparing own and supplier costs/prices, and choosing the scopeof own and supplier costs/prices for comparison. In addition,the most important decision variables are usually not quantified(e.g. safeguarding own know-how, maintaining hi-tech image).

2.6 Information technology outsourcing risk

Risk is a common feature with any business endeavour. As ITO islike any other business activity, risks are an integral part of theITO exercise. Unlike most business environments, however, ITOinvolves a very long term relationship with a supplier of out-sourcing services. This also means that there is a wide range ofrisks for ITO that need to reflect the dynamics of the arrange-ment, the fast-paced IT industry and changes in people includingleadership, workers and customers. The risks (previously iden-tified as pure risks) occurring in an ITO exercise are unique andrelate specifically to (1) the IT function itself (comprising oper-ations and development of components), and (2) the ITO deal.

ITO arrangements represent promises between a buyer and sup-plier of IT services over an agreed period. Along with this are theassociated contract risks over the same period. A contractualagreement that benefits both the buyer and supplier of ITO ser-vices, therefore, naturally also contributes to a successful out-sourcing relationship. An essential component of this outsourcingrelationship is the governance of the ITO exercise. Inherent inthe governance activities are changes that need to be agreed andsubsequently made in the contract or agreement between theparties. As result of inevitable influences from the dynamic busi-ness and operating environment, changes need to be reflected inthe contracts. This governance process will ensure that both par-ties continue to share maximum benefits and also an equitableportion of the risks that manifest in the ITO exercise.

Managing the Risks of IT Outsourcing

56

Chap-02.qxd 3/1/05 12:30 PM Page 56

Page 76: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

In addition to a consideration of risks of contract amendmentsand disputes leading to litigation, an increased understandingof the different types of risks encountered by each of the con-tracting parties would allow for more effective governance ofcontracts, which mitigates the risks and balances difficultiesbetween the parties.

Before the risks in an ITO are discussed in detail, it is necessaryto establish a common understanding of several key concepts inan ITO exercise. The most common of the concepts misunder-stood is the ‘core competency’ argument and the risk elementsthat are carried along with the use of this notion.

The IT function has a unique role in any organization, especiallyin the current economy. It is different from any other functionwithin the organization. When it is outsourced special consider-ation needs to be given to it.

Many managers, IT practitioners and researchers in this areawarn of risks when embarking on the outsourcing of the organ-ization’s IT function. Part of the reason for this is because thereare very few data available on the organizations’ risk tolerance(or ability to absorb the effects of risk) when embarking on anITO exercise. The innate inability to understand and subsequentlymanage the risks involved is a factor that contributes signifi-cantly to this hesitance. There is scant knowledge on the effectsof actions to mitigate risk exposure in an ITO exercise. Littlewonder, then, why many organizations remain reluctant to out-source the IT function. It is often decided not to outsource the ITfunction at all, or to take only partial measures, in which casethe benefits of outsourcing the IT function are often not fullyrealized.

We know from the work done in the area of outsourcing that oneof the benefits accruing is the ability to move some of the oper-ational risks encountered in the IT function from the buyer to thesupplier organization. This ability to shift the risks to an organ-ization that is more capable of managing the risks is valuable tothe buyer organization. It allows the buyer organization to focuson other tasks and frees resources that would otherwise have tobe allocated to managing the IT operations and associated risks.

The dominant sources of risk derive from information asym-metry (between buyer and supplier), the inherent inability tomonitor the partner’s actions, and exogenous changes that allowone party to behave opportunistically during the period of thepartnership. It is, hence, a gargantuan task to understand the

Outsourcing the IT Function

57

Chap-02.qxd 3/1/05 12:30 PM Page 57

Page 77: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

causes, effects and nature of all the risks that manifest in an ITOexercise. A selected portion of the risks in the ITO exercise ishighlighted in this book to illustrate very specific risks that playa vital role in the decision to outsource the IT function. It is thisnature and behaviour of key risk elements that needs to beaddressed each time an organization outsources its IT function.The risk elements deliver opposing results or yields, i.e. beingeither constructive or destructive to the organizations that par-ticipate in the exercise.

It is known that a certain amount of risk shifts from the buyer tothe supplier of outsourcing services. This is a phenomenon thatis taken advantage of most in a typical ITO exercise and is seenas a benefit by the buyer of the services. The transfer of risksbetween buyer and supplier occurs almost as soon as the out-sourcing exercise commences. As would be expected, oper-ational risks are transferred away from the buyer organizationas risks that accompany the IT operations. The supplier, on theother hand, takes on the new operations and associated risks aspart of the agreement and is compensated through a service fee.

It is observed, however, that despite this obvious benefit, thebuyer organization often hesitates to shift the IT operations out-side the organization for fear that the loss of control may beunsustainable. The buyer is also often anxious over the uncer-tainty caused by a range of new risks that it has to manage as aresult of the ITO exercise. The supplier, on the other hand,appears willingly to absorb the operational risks, which con-tributed to the reason why the buyer initiated the outsourcingexercise in the first place.

These traits provide a background to interesting insights intothe management and nature of shifting risks both within andbetween the buyer and supplier organizations. The final chapterin this book highlights this phenomenon and includes an illus-tration of a set of observable traits that exist between risk group-ings when the IT function of an organization is outsourced.

Managers in the same organizations that purchase the use of ITcomponents argue that the in-house IT function not only com-prises components that are often referred to as ‘commodity’functions, but form an essential and strategic part of the overallcorporate strategy. The IT function, in this instance, differenti-ates the organization’s services and products from those of itscompetitors. The IT function is no longer a commodity but astrategic component. As such, the IT function contains ‘secrets’that are often not shared, to preserve the competitive advantage.

Managing the Risks of IT Outsourcing

58

Chap-02.qxd 3/1/05 12:30 PM Page 58

Page 78: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The supplier of the IT function, however, has established a spe-cial relationship with the buyer organization. Confidentialityand security become very important as areas of high risk. Thisrelationship is more than that of a casual supplier; rather, onewhere the integrity of the information and technology deliveredbecomes vital. It is often argued that, unlike manufacturingindustry where products can be protected via legal instrumentssuch as patents, information flows are more difficult to control.Fraudulent and criminal use of information is often difficult totrace or police; and therefore the risk of sharing one’s informa-tion with a third party is often viewed as an unacceptable risk.

In both these instances (commodity versus strategic roles), how-ever, it is still quite plausible and conceivable that the use of theconcept of ITO along with its many variants, is able to deliversignificant and tangible benefits to both the buyer and supplierorganizations. The difference lies in the ‘integrity and reliability’of the supplier as compared to an in-house maintained IT func-tion. This difference is often observed as it becomes manifest inthe risk exposure and risk profile of the buyer and supplierorganizations. In this chapter, some of the fundamental ideas ofoutsourcing of the IT function have been discussed; they need tobe understood in order to experience, identify and measure therisks that manifest themselves in this environment. For it is onlywhen risks are quantified that they can also be mitigated inorder to enjoy the maximum benefits of true IT outsourcing.This is discussed in Section II.

Outsourcing the IT Function

59

Chap-02.qxd 3/1/05 12:30 PM Page 59

Page 79: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 80: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Measuring and understanding IT outsourcing risks

Section II

Chap-03.qxd 3/1/05 12:31 PM Page 61

Page 81: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 82: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Risks in IT outsourcing (ITO) are often the effects of a combinationof activities and events. These events can arise both at differenttimes and in different geographical locations. For example, anevent in the Head Office in Singapore last month could have verysignificant effects on another event in Sydney, Australia, todayand affect another activity in San Francisco the following week.Various methods and tools are used to help measure and quantifythese activities and events. The risk dimension signature (RDS)instrument proposed in this chapter allows measurements to bemade from the various risk perspectives, and then graphicallyillustrates the risk exposure values (or measured quantities) atdifferent points in time. The risk profiles that are depicted in theRDS then become an essential part of overall risk managementmethodology that allows the manager to understand risks morecompletely and make informed decisions. RDS transforms riskmanagement from an academic or mathematical exercise into anessential and practical tool.

Risks involve events that are characterized by probability anduncertainty. They also stem from possibilities and indeterminatepaths as a result of random events. We know that ITO is charac-terized by:

● multiple variations in outsourcing models (Chapter 1); and● the two very special roles that the IT function plays in an

organization (Chapter 2).

This, combined with the complexities of both the buyer and sup-plier organizations in a synergistic, long-term relationship, cre-ates an environment that is full of events and ‘risk fertile’, or fullof risks.

Measurement activity to capture these risks is more complex thanever before, partly as a result of the intricacies involved with

63

Measuring risks in IT outsourcing

Without measureless and perpetual uncertainty the drama of human life would be destroyed.

Winston Churchill (1874–1965), British prime minister

3

Chap-03.qxd 3/1/05 12:31 PM Page 63

Page 83: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

available options and volumes of information flows that powertoday’s fast-moving organizational processes. The probability ofan event happening, whether with good or bad consequences, isnever predictable to any degree of certainty. In fact, uncertainty inthe economy, in technology, in business and in politics has madeforecasting based on probabilities quite futile and, sometimes,even counter-productive.

In order to understand risks, however, detailed observation andmeasurement is mandatory. So the first step in the process is to beable to take measurements and to illustrate the results in a waythat is meaningful to the ITO manager or practitioner. If the riskcharacteristics that are expressed in the specific ITO assignmentcan be measured, activities to mitigate the risks can be put intoplace for selected risks. A simplified step methodology involvingthree basic steps, Measure, Understand and Mitigate (MUM), asillustrated in Figure 3.1, is used to show the three fundamentalphases that are used to address risks before a more comprehen-sive risk management method is used.

Obviously a complete risk management methodology is com-prehensive but the MUM method addresses the need to quicklydepict and address urgent risks and allows plans to be effectiveas critical risks will need to be addressed urgently. Therefore moredetailed risk management methods should be used in conjunc-tion with the three phases proposed. This approach is designed tobe short, and to be as practicable as possible for easy use. Giventhese assumptions, it should also be used in conjunction withorganizational communications that include policy making, suit-able controls and the promotion of risk awareness programmes(see also samples of widely accepted risk management modelsin Figures 3.5 and Figure 3.6). These items or activities form partof the overall risk management plan (see Chapter 6).

Managing the Risks of IT Outsourcing

64

Risk

Measure

Understand

MitigateFigure 3.1Managing risks inan IT outsourcingenvironment

Chap-03.qxd 3/1/05 12:31 PM Page 64

Page 84: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

3.1 Risk definition

For simplicity, many scholars and researchers agree to define riskin an ITO scenario simply as the possibility of loss or injury.Risks begin as a direct consequence of negative outcomes. Risksare also formed as an extension of factors leading to negativeoutcomes. Risks refer either directly to:

● negative outcomes; or● factors that lead to the negative outcomes.

Negative outcomes include shortfalls in systems performance.For example, in the case of a software development project, poorsystems performance could take the form of disruption of serviceto a customer that depends on IT to support a particular businessprocess function. In an ITO exercise, hidden costs (described inChapter 2) and loss in innovative capacity would constituteexamples of poor systems performance. Factors that lead to thesenegative outcomes include, for example, a continuing stream ofrequirement changes or personnel shortfalls in a systems devel-opment context. In an ITO project, lack of upper managementcommitment to the exercise or inexperienced staff and businessuncertainty are clearly factors that lead to negative outcomes.The existence of vague links between the outcomes and contribu-tory factors does not make the understanding of risks any easieror measurement more straightforward.

Risks can be quantified as expected potential loss. To do this, theexpected potential loss from outsourcing is reckoned as theproduct of two variables, the magnitude of the exposure and the probability of loss.

3.2 Investigating risk

Risks are classified as either speculative or pure risks. Speculativerisks (e.g. gambling) offer both the potential for gain and thepotential for loss, for example in investment in stocks. Pure risks,the kind that occur in an ITO exercise, do not necessarily result inlosses, but they never result in gains and are, for the most part,unwanted.

To reduce the loss or mitigate risks, efforts are focused on redu-cing the probability of the undesirable event itself through, forexample, the use of penalties compensating for delays in systemdelivery. The probability of occurrence of an undesirable out-come is estimated on the basis of historical data. Probabilities

Measuring Risks in IT Outsourcing

65

Chap-03.qxd 3/1/05 12:31 PM Page 65

Page 85: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

are often, however, difficult to determine merely on the basis ofpast performance. In the case study example in Chapter 8, it isobvious that the probabilities estimated by the ITO team representquantitative data based on collective experience.

Intrusive factors (exogenous andendogenous risks)

Further, a distinction that could be made in risk types is the clas-sification of endogenous and exogenous risk. A risk is classifiedexogenous when an undesirable event occurs beyond any formof control and is not affected directly by any actions. Examplesare earthquakes or typhoons. Endogenous risks are those that aredependent directly on people actions. An automobile accident isan example of risk where a large portion of the risk is endoge-nous. The probability of a virus attack is significantly influencedby the user’s behaviour and software use (endogenous). The PCuser controls part of this risk by deciding to expose corporatenetworks through unwanted links on the network. To mitigatethis risk, users are informed of the areas they can control and areadvised on more restrictive practices to adopt when surfing theInternet and performing downloads.

In a business environment, the dynamics of risk exposure canbe, and are, influenced by many variables. The magnitude ofthese variables, in singular or group form, collectively deter-mines their relevance. For example, the effects of risk on thefinances of an organization can be influenced by its shareholderstructure, the business environment (which determines theamount of investment), the technology environment (whichdetermines the capability of performing selected functions) andthe competitive environment (which determines its products,delivery and organizational structure). These factors ‘intrude’into the outsourcing environment. It has been shown that these‘intrusive factors’ contribute to the risk profile of the outsourcedoperation.

Risk dimensions are affected at different levels by external(exogenous) influences of ‘intrusive factors’ discussed earlier aswell as internal (endogenous) influences. An example of theinfluences impinging on risk factors is illustrated in Figure 3.2.Environmental and business risk in the case study (see Chapter8) for example, derives from external influences, discussed indetail here. The organization’s strategic, legal and informationalrisk profiles are influenced most significantly by a mix of bothinternal and external influences.

Managing the Risks of IT Outsourcing

66

Chap-03.qxd 3/1/05 12:31 PM Page 66

Page 86: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Operational and relationship risks

There are two main angles from which risk that is inherent in anITO arrangement is viewed. The first is the operational risk thatinvolves undesirable consequences deriving from the operationsof IT in the organization. The second form of risk stems from therelationship between the buyer and supplier in the form of oppor-tunistic behaviour by the supplier who takes advantage of along-term and ambiguous contract (see also Agency Theory inChapter 4). Both these risk types are illustrated in Figure 3.3. A significant portion of the operational risk is passed on to thesupplier as the IT function is outsourced while the relationshiprisk remains with the buyer. Unlike operations risk, the relation-ship risk is ‘bi-directional’. In this instance, the risk exposurerelating to the relationship can be passed back and forthdepending on the situation and the ‘bargaining power’ of boththe contracting parties at that time. The relationship risk shiftsfrom buyer to supplier and vice versa.

Measuring Risks in IT Outsourcing

67

Technical

Financial*

Operational

Strategic

Legal

Informational

Environmental

Business*

Internal influence

External influence

Stakeholder (buyer/supplier) risk dimension influence sources

Figure 3.2Example of mapping internal(endogenous) andexternal (exogenous)influences with riskdimensions (Tho,2004)

Buyer Supplier

Operations risk‘Pass on’

‘Bi-directional’

Relationship riskFigure 3.3Operations andrelationship risk(Tho, 2003)

Chap-03.qxd 3/1/05 12:31 PM Page 67

Page 87: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Further relationship risk exposure from the outsourcing dealincludes some common areas such as:

● misaligned incentives between supplier and buyer;● insufficient investments from the participants;● market failures from private information not shared;● ineffective bidding mechanisms;● inappropriate use of confidential information;● supplier hold-up, expropriation and loss of bargaining

power; and● supplier’s private information about its capabilities.

This list above contains many of the salient features but is by nomeans exhaustive. In order to examine the risks inherent in anorganization that is considering outsourcing its IT function, the elements that contribute to the risk in the ITO environmentneed to be explored. (See also Agency Theory and the Winner’sCurse phenomenon in Chapter 4.)

The scope of outsourcing includes strategic IT functions togetherwith value activities that differentiate the organization from itssuppliers. As suppliers provide competence in new technologiesand access to better IT professionals, these elements contributestrategically to the buyer’s organizational value chain. Theexpanded role of outsourcing relationships includes relatively bet-ter services and financial performance, and new lines of business.Elements of the e-commerce value chain, including strategy, sys-tems development and integration, payment processing, marketdesign, advertising and customer management, as well as devel-opment of the physical network and web-hosting, are outsourced.

In the ITO scenario, risk carries functions of multiple variables,mathematically expressed as:

Risk � fn(governance, (un)certainty, competitive environment,organizational interconnectedness)

In a ‘cause and effect’ situation, risks also play a role in the effectsof activities engendered by the outsourcing of the IT function.Risks in this instance are concerned with the effect of governance,uncertainty, competitive environment and organizational inter-connectedness (Clemons, 2000). The point raised here is that risksin the ITO exercise appear to have a direct relationship with a setof causes. It is argued that, while some arguments for ITO areintuitively appealing at an analytical and general level, they

Managing the Risks of IT Outsourcing

68

Chap-03.qxd 3/1/05 12:31 PM Page 68

Page 88: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

remain simplistic in practice because they do not account for thecomplexities that permeate the management of informationresources and risks (Earl, 1996). Some different models are exam-ined in the following sections.

3.3 IT outsourcing risks (causes andeffects)

A primary driver or determinant of risk originates from the lackof information (information asymmetry) in the precontract phase,followed by an inherent inability to accurately monitor the otherpartner’s actions. Further, the conditions of an outsourcing con-tract allow either the supplier or the buyer to behave opportunis-tically. Uncertainty, competitive importance and organizationalinterconnectedness are the other contributory drivers of risk inan ITO exercise. The ‘cause’ groupings for risks in ITO derivefrom inabilities to optimally manage the agreement and its sub-sequent change in line with the evolution and heterogeneity ofthe IT function.

It has been consistently argued that large, vertically integratedorganizations need strategic outsourcing measures to remaincompetitive, especially in highly contested and fast-moving mar-kets. In a causal chain of events, there are observable causes forrisks and, equally, measurable effects should the risks occur. The‘cause’ is a situation that exists that sets up a potential risk. Thecause of risks can be proactively managed. The effect(s) of risk arethe likely outcomes if the risk occurs.

In any outsourcing exercise, risk is an essential and critical com-ponent of the formulation of decisions and in the mitigation ofits undesirable consequences. In the outsourcing of the IT func-tion, some of the more well documented and major risks involveescalating costs, diminishing service levels, loss of expertise, andcontract irreversibility.

Some of the ideas developed in the context of a causal reasoningframework, which is investigated and introduced here, are sum-marized in Figure 3.4. In this illustration, we assume that therisks in an ITO exercise are caused directly by a set of risk driversand have a set of effects that are experienced within the organi-zation. In this instance, multiple risk dimensions are possible.The risk types could then lie dormant indefinitely or becomemanifest in the ITO project. The risk outcomes become the riskexposure for the organization.

Measuring Risks in IT Outsourcing

69

Chap-03.qxd 3/1/05 12:31 PM Page 69

Page 89: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Causality and random activity concept

The causality and random activity concept is of particularimportance when determining risks and risk exposure values.Risks should not be dismissed or abandoned on the basis ofambiguity or ‘randomness’ of risks. One of the most distinctivephilosophies of the ancient Greek philosopher and scientist,Aristotle (384–322 BC), was his notion of causality where eachaction or event has more than one ‘reason’ that helps to explainwhat, why, and where things exist. The initial design and thoughtbehind the RDS tool and the research method used was to capturethe risks following logical classification into various dimensions.

Following an early view on the subject of causality, the cause ofany event is a preceding event or events, without which the eventin question would not have occurred. If this rather mechanisticview of causality is translated into context then all the previousactions and events in an ITO exercise would constitute the com-plete cause of the outcomes of the exercise. It is shown that theseeffects do not translate into or summarize the risk dimensions thatare formulated during the RDS creation exercise. Further investi-gation in this chapter reveals that the theory of causality breaksdown as soon as the inherent complexities in organizations withan intricate set of interdependencies are taken into account.Some of the logic breaks down as soon as random occurrencesarise within the framework. Illustrations of the agency theory

Managing the Risks of IT Outsourcing

70

Risk Causes IT outsourcing risk drivers

Risk outcome**(�ϖ) � Pr(�ϖ) � Loss (�ϖ)

**Note: Risk outcome/Exposure equations fromAubert et al., 1998; Boehm,1991

True

FalseIf

RISK, �, occursthen

Risk, �, remainsdormant

A risk category* orA risk dimension*

*(multiple dimensions are possible)

Risk Effects

Figure 3.4 Causes and effects of risks in the IT outsourcing exercise (Tho, 2004)

Chap-03.qxd 3/1/05 12:31 PM Page 70

Page 90: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

and simple game theory, discussed in Chapter 4 on the under-standing of risk measurements, provide some clues to this end.

The philosophy of causality supports determinism; that is everyevent has a cause, and the event follows invariably from the cause.This thinking, however, denies the element of chance or contin-gency. It also does not take into account free will in humanityand the interplay between the sometimes illogical actions ofhuman beings. It is opposed to indifferentism, or indeterminism,which maintains that preceding events do not and cannot def-initely determine subsequent ones. Because determinism is gener-ally assumed to be true of all events except volition, the doctrineis of greatest importance when applied to ethics.

Philosophers deny the ultimate reality, or at least the fundamentalvalidity, of the causal relation. Henri Bergson (1927)1 for example,maintained that neither ultimate reality nor life is bound by exactcausal sequences. He propounds that a process of growth takesplace in which the unpredictable, and therefore the uncaused, con-stantly occurs. No exact repetition happens in real time; andwhere there is no repetition, there is no cause, for cause means thatthe antecedent is repeatedly followed by the same consequence.

The risk dimensions and RDS formulated identify classic reasonsfor more work to be done on the relationships between risksdimensions arising in the outsourcing of the IT function as well asmajor management decisions in today’s business environment.

Before the RDS can be used effectively, the direct influences ofthe operating environment need to be understood. Both exogen-ous and endogenous risks are accounted for with the methodproposed. The participants in and stakeholders of the ITO exer-cise have information on risks as a perceived set of losses andprobabilities. This information is collected and then illustratedusing the RDS.

3.4 Measuring risk exposure

Risk exposure has been defined as the extent and probability ofan undesirable outcome. If the probability is small, i.e. nearlyzero, the risks can be described as almost dormant as they seldombecome manifest in the ITO exercise (see the right hand side ofFigure 3.4). If a risk type occurs regularly (the box in the lowerhalf of the figure), then it is often recognized as a ‘common’ risk

Measuring Risks in IT Outsourcing

71

1 Nobel Laureate, Nobel prize in Literature, 1927. Found on-line onhttp://www.nobel.se/literature/laureates/1927/

Chap-03.qxd 3/1/05 12:31 PM Page 71

Page 91: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

type. Common risk types have been documented as categories ofrisks or risk dimensions.

Quantifying risk exposure

There is a common understanding on total risk exposure at agiven point in time: it is the mathematical sum of all the riskexposure values. If, however, the risks are classified into differ-ent categories, then the sum of the risks occurring in all the cat-egories represents the total risk exposure at a given point intime for the ITO exercise.

The risk exposure is described as the product of the probabilityand the magnitude of the undesirable outcome from the relation-ship, as expressed in the equation below.

RE � Pr(UO) � L(UO)

where RE is the risk exposure; Pr(UO) is the probability of anundesirable outcome; and L(UO) is the magnitude of loss due tothe undesirable outcome.

Considering the variables in the equation above, if the probability(of loss) values were held constant then the risk exposure wouldbe proportional to loss, and vice versa. Practically, however, nei-ther variable (the magnitude of loss nor the probability of loss)is constant over a period of time. So, the total risk exposure forthe ITO exercise over time is dynamic (i.e. it changes over time).At any point in time, however, it is the sum of all the risk exposure (RE) values for all the risk elements experienced in the project. Over time, the total risk exposure is represented bythe following equation.

Total risk exposure � Total (Probability of loss �Magnitude of loss)

(3.1)

where Pr(UO) �L(UO) are the individual risk exposure elements.

Risk exposure (RE) boundaries

The probability values provide the parameters that establish theextremities of the equation. The smallest and largest values ofprobability are zero probability (no chance of occurring) and

Risk Exposurex

x

x

xPr(UO) L(UO)

0 0� �

�→ →

∑ ∑

Managing the Risks of IT Outsourcing

72

Chap-03.qxd 3/1/05 12:31 PM Page 72

Page 92: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

full probability (definitely occurring). Since the maximum pos-sible value for Pr(UO) is a certainty that the undesirable outcome(UO) will occur, then Pr(UO) � 1. This implies that the max-imum, theoretically possible, value of loss due to the undesirableoutcome is always less than or equal to the mathematical sum ofall possible magnitudes of all the risk elements.

(3.2)

To simplify the equation to a single variable for discussion, boththe maximum and minimum values for the probability of lossare taken:

(3.3)

Therefore, given the range of values of probabilities from zerothrough to a unit (1) it can be reasoned that the total risk expos-ure is equal to or less than the sum of the total magnitude of lossas a result of undesirable outcomes, illustrated by the next equa-tion below. The maximum value is, theoretically, infinite.

At one selected point in time,

(3.4)

This equation is significant as it describes the relationshipbetween the total risk exposures in an ITO exercise relating tothe maximum possible risk exposure values. There is an elementof time, in combination with multiple values of loss as a result ofrisk. An infinite value of total risk exposure is mathematicallypossible but, practically, is also improbable. By implication, there-fore, there must also be a finite number of influences and riskelements that are experienced in an ITO exercise at any singlepoint in time. An infinite number, although theoretically pos-sible, implies again an infinite risk exposure value – a subject for

Risk Exposurex

x

x

xL(UO)

0 0≤

→ →

∑ ∑�

Risk Exposurex

x

x

x1 L(UO)max

0max

0� �

�→ →

∑ ∑ MMaximum Value

0 Mmin0

Risk Exposurex

x

�→

∑ iinimum Value

Risk Exposurex

x

xPr(UO) L(UO)max

0max� �

∑00

x→

∑�

Measuring Risks in IT Outsourcing

73

Chap-03.qxd 3/1/05 12:31 PM Page 73

Page 93: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

another book. The risk exposure would otherwise have no theor-etical limit, i.e. infinite value represented by:

(3.5)

In the next section, the possible values for the risk elements arediscussed, these values being based on the assumption just made.

3.5 Examples of risk management models

There are numerous risk assessment and risk managementmodels. Two extensively used examples are illustrated here toshow commonality in some of the components in the latter. Thefirst example is the model used by the US Government Account-ing Office for the management of IT risk (US GAO, 1999). Asample risk management programme is illustrated in Figure 3.5.This model involves an iterative loop that starts with riskassessment (the upper box in Figure 3.5).

Risk assessment involves identifying possible risks and deter-mining the needs of the particular situation wherein the riskmanagement methods are used. The process then continues withimplementation of policies and controls, followed closely by thepromotion of awareness of the same risks within the workinggroup or organization. Both awareness and policy actions willbe targeted towards mitigating the effects of the risks, should theyoccur. In an ITO exercise, the same risk assessment and manage-ment model is applied. The model assumes that the risks experi-enced in the exercise are mitigated through a series of actions.

L(UO)0x

x

�→

Managing the Risks of IT Outsourcing

74

Promoteawareness

Implement Policies&

Controls

Monitor&

Evaluate

Assess risk&

Determine needs

Figure 3.5Sample risk management modelA (Source: adaptedfrom the USGovernmentAccounting Office(GAO) documentGAO/AIMD-00-33Information SecurityRisk Assessment,1999.)

Chap-03.qxd 3/1/05 12:31 PM Page 74

Page 94: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Risk management elements in this model include establishing acentral management focal point, implementing appropriatepolicies and related controls, promoting awareness, and monitor-ing and evaluating policy and control effectiveness. After risksin an ITO exercise are identified, the appropriate monitoring andevaluation activities work in conjunction with the appropriategovernance structures to manage risks. In a mature governancemodel, policies and controls can be implemented in order tostreamline the tasks of risk mitigation.

The second model is used by the organization KPMG2, and is pub-lished as its ‘risk maturity framework’. The activities and compon-ents are very similar to those of the previously mentioned USGovernment Accounting Office model. Both models contain elem-ents of determination of risks, followed by measurement andmonitoring, then a process for implementing controls and pol-icies. The risk plan or strategy incorporates the overall organiza-tional strategy, which encompasses all the steps outlined above.

The model described in the framework proposed by KPMGappears to take on three active approaches. This includes thereactive, tactical and strategic stance that an organization canadopt as its risk management approach.

Each of these positions will have a plan or approach to riskmanagement that includes the following:

● A risk strategy for associating and managing risks based onthe organization’s business strategies.

● A risk structure that supports the risk strategy and providesfor accountabilities in the structure.

Measuring Risks in IT Outsourcing

75

Risk strategy STEP 1

STEP 2

STEP 3

STEP 4

STEP 5

Risk structure

Risk measurement & Mentoring

Risk mitigation and optimization

Risk portfolio management

Figure 3.6Sample riskmanagement model B(Source: Adapted andsimplified from KPMGRisk Managementmethodology [Donner,2001])

2 KPMG is an international professional services organization that providesrisk advisory services

Chap-03.qxd 3/1/05 12:31 PM Page 75

Page 95: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

● Measurement and monitoring that establishes measurementcriteria and continuous improvement.

● Portfolio management for identifying, assessing and categor-izing risks across the organization.

● Optimization to balance potential risks against opportunitieswithin the established portfolio based on the organization’stolerance for risks.

The two models describe a very similar methodology andapproach to managing risk. The relationships between the vari-ous actions and risk-mitigating activity are monitored as a whole;the risk-reducing effects of one set of risks can often be observedto affect another set of risks. A key point that is raised is the meas-urement and monitoring of risks using specific criteria from acentral component of the risk management models.

The model by KPMG extends the ‘actions’ component by pro-posing three types of reaction to risk including reactive, tacticaland strategic action plans. These plans, however, are all alsodependent on the measurement of risks and risk exposure. Theissues arising in the measurement of risks are illustrated in thefollowing section.

3.6 Difficulties in measuring risks and risk exposure

Reliably assessing outsourcing risks can be more difficult thanassessing other types of risks. The elements that contribute tothe causes of risks are extremely variable in this environment.Project requirements (IT), environment (people) and technologychange more quickly in this environment that in any other giventhe intensity of development in this area (see The role of IT in theorganization, Chapter 2). This results in significant shifting inrisk profiles for both the supplier and buyer. The lack of reliableand current data makes the determination of outsourcing-risksestimates inconsistent. Risk controls and their extent are often alsoquestionable for the same reason. Because of these limitations, itis important that organizations identify and employ methods thatefficiently achieve the benefits of risk assessment while avoidingcostly attempts to develop seemingly precise results that are ofquestionable reliability.

Risks in ITO are often neglected because the effects are not feltby the IT department or the designated area responsible for the

Managing the Risks of IT Outsourcing

76

Chap-03.qxd 3/1/05 12:31 PM Page 76

Page 96: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

operation of ITO. For example, financial risks are sometimesjust ignored because the Accounting and Finance department isresponsible. Environmental risks that include the effects of com-petitors, suppliers, and, simply, the operating environment, arealso often not considered, simply because they are not includedin the purview of the manager’s responsibility.

Risk factors are also constantly changing. In an ITO environmentwhere technological change is very rapid and market volatilityis high, efficient capacity planning and utilization of internal orfixed assets, for example, need a significant amount of organiza-tional effort. When considering outsourcing elements of theorganization, it is this very nature of the effects of risk that mustbe analysed to be understood and subsequently managed.Delimiting all the ways the possible risks can occur is seldomeasy, just as determining the probability of loss is not straightfor-ward. The difficulties are often attributable to problems in obtain-ing accurate data on probabilities and costs associated withoutsourcing risk factors.

The probability of occurrence of an undesirable outcome can beestimated on the basis of past performance characteristics of therisk element, or subjective probabilities already assessed.However, in several areas, probabilities are impossible to assesson the basis of past performance. Consequently, risk assessmentmethods adopt the approach of approximating the probabilityof undesirable outcomes by identifying and assessing factorsthat influence their occurrence. In a software development con-text, for instance, factors belong to five broad categories: techno-logical newness, application size, lack of expertise on the part ofthe software development team, application complexity, andorganizational environment. The degree to which each factor ispresent in a software project will contribute to an increase in theprobability of the occurrence of an undesirable outcome.

3.7 Measuring IT outsourcing (ITO) risks by group/category

There are various models and methods available for assessingand managing risks, as discussed previously. The scope of theanalysis and the amount of resource to be expended variesdepending on the type and extent of the assessment to be made.The availability and reliability of data on risk factors and theireffects also contribute to determining the type of risk analysismethod to be used.

Measuring Risks in IT Outsourcing

77

Chap-03.qxd 3/1/05 12:31 PM Page 77

Page 97: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The basic concepts generally involve estimates of the monetarycost of the effects of risk and risk reduction techniques based on:

● the likelihood that a damaging event will occur (probability);● the costs of potential losses (loss quantum); and● the costs of mitigating actions that could be taken.

Reliable data on likelihood and costs are often not available andthere needs to be a ‘feel’ of the risks involved as well as theextent of risk exposure that must be borne by the organizationin the outsourcing exercise. A qualitative approach can be takenby defining risk in more subjective and general terms such ashigh, medium and low risk. In this regard, qualitative assess-ments depend more on the expertise, experience and judgementof those conducting the assessment. It is also possible to use acombination of quantitative and qualitative methods.

The grouping of risks into categories3 or dimensions is not anew concept. Risk grouping or the classification of risks in asimilar category is routinely applied and an integral part of theinsurance industry for the purposes of quantifying risks andsubsequently defining the insurance premiums to be charged.Actuaries use risk classification to price and design financialsecurity systems. The concept of representing and illustratingthe effects of risk in an exercise to outsource the IT function is aderivation of this idea. Risk grouping has the intention of pla-cing individual risks bearing reasonably similar expectations ofloss in a group or class of risks. This exercise estimates risksfrom probabilities associated with the occurrence, timing andmagnitude of events using concepts borrowed from the insur-ance industry in its classification of risk profiles.

The term causality referred to above is not used in the strictestor rigorous sense of cause and effect, but in a general sense, i.e.where there is a plausible relationship between the characteris-tics of a risk grouping and the hazard for which an outsourcingactivity or task is provided. For example, outsourcing the main-tenance of the customer database would not by itself cause lossof privacy or data, but it does bear a reasonable relationship tothe risk hazard of operational risk, and thus would be a reason-able basis for grouping risks for the outsourcing of the IT func-tion. The concept is nevertheless important when considering

Managing the Risks of IT Outsourcing

78

3 American Actuarial Standard of Practice (ASOP) No. 12, (1990), ConcerningRisk Classification, Actuarial Standards Board (ASB), 15th January, 1990

Chap-03.qxd 3/1/05 12:31 PM Page 78

Page 98: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

the individual elements of risk categories (see also the Case Studyexample in Chapter 8).

Considering types of risk will help in classifying them into groups(i.e. categories or dimensions) as a method of quantifying, reduc-ing or simplifying the many risks in any particular outsourcingarrangement. This is not to say that risks are going to be ‘boxed’ orcan be encapsulated into categories, as this would be grossly mis-leading. The intention, however, is to be able to simplify theunderstanding of all of the risks that occur during the differentphases of an ITO exercise in order to be able to manage, manipu-late and reduce the effects of risks. By classifying risks in specificgroupings, the risk landscape will be more easily understood.

3.8 So why group risks?

It is both impossible and unnecessary to predict what the experi-ence would be for individual risks in all activities concerned inthe outsourcing of the IT function. There are a finite number ofrisk elements that contribute to the total risk exposure in an ITOexercise. In addition, if the occurrence, timing and magnitude ofan event were known in advance, there would be no economicuncertainty and therefore no reason for management of uncer-tainty. Predictions of risk experience in ‘groups or classes of risk’provide a sufficient compromise, as data on experiencing indi-vidual risk elements are not deemed to be accurate.

Associating similar risk types

Estimates are typically made through the use of past experience,coupled with projections of future trends, for groups with simi-lar risk characteristics. The grouping of risks with similar riskcharacteristics builds and maintains an equitable system regard-ing the pricing system that determines insurance premiums.This concept of grouping of risks to determine averages and theapplication of these averages is also used to classify risks in thedetermination of risks for the outsourcing of the IT function.

A difficulty in risk classification derives from trying to handleissues of ‘fairness’ and ‘similar risk characteristics’. The assump-tion, based on experience, is that every outsourcing activity,individual, business (even within one industry group), and out-sourcing contract is unique. This makes any particular risk clas-sification process unworkable to the extent that the riskclassification process attempts to identify and measure every

Measuring Risks in IT Outsourcing

79

Chap-03.qxd 3/1/05 12:31 PM Page 79

Page 99: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

characteristic of every activity engaged in by the organization.On the other hand, as there are differences in risk characteristicsbetween contracts and between businesses that bear signifi-cantly upon cost, to ignore all such differences would be‘unfair’. These issues compound the difficulty surrounding riskclassification as it is not clear where lines should be drawn.

Evaluating over time

Defining the uncertainty of an occurrence and of its timing, and of the magnitude of a particular event, albeit in this processwith a price peg, does not make the unquantified known; nor need it. By outsourcing the IT function, the organizationassumes the financial uncertainty. It is not able to ‘fix’ the occur-rence or the magnitude of a specific risk merely because itassumes that risk. With a price tag on risk, it would be easier to make decisions during the process of evaluating options in the outsourcing exercise. One way to estimate a price is torely exclusively on heuristics, i.e. experience, insight and judge-ment concerning the nature of the particular hazard involvedand the exposure to loss. This method is not optimal but revealsthe ‘recentness’ of the concepts in complete outsourcing of the IT function (historical data are scarce, and often do not even exist). A more critical approach would be, theoretically, to observe the actual losses associated with the risk over an extended period of time. The nature of the risks identifiedhere is unique. Hindsight often suggests there is little or no costas the individual risk within the IT environment moves to alikely or even certain eventual realization. Hazards change sorapidly over the period of observation that the informationobtained by past observations may not be applicable to the cur-rent or future exposure to financial uncertainty. The develop-ment of IT and the changing nature of this industry are a subjectof a separate discussion.

Considering risk characteristics and focus

An alternative method of grouping risk would be to observe thelosses associated with groups of individual risks with similarcharacteristics, which frequently can be done over a moreacceptable period of time. The notion of risk groups is identifiedwith this concept. While any individual risk in a given class isno more predictable than it was before the transferring or pool-ing of the risk occurred, a reasonable price may be established

Managing the Risks of IT Outsourcing

80

Chap-03.qxd 3/1/05 12:31 PM Page 80

Page 100: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

by observing the losses of the group of risks and relating theprice to the average experience of the group. Perfect conditionsare seldom achieved. The risk characteristics defined here hencereflect both observed fact and informed judgement. The methodused to collect data on the probability and magnitude of loss isdescribed in the next chapter.

Risk classification

Risks encountered in the outsourcing of the IT function and theireffects on the organization such as higher cost levels, degradedservice levels and loss of expert resources have been identifiedfrom past experience and discussed in various formats as wellas in the literature. It is recognized that the probability of occur-rence and loss resulting from the undesirable outcome can beeffectively mitigated by early identification of the risk areas andformulating specific strategies. Risk mitigation therefore activelyseeks to reduce undesirable consequences by implementing risk-reducing measures and disaster-recovery plans already in placefor rapid deployment.

Insurance, for example, is commonly used to mitigate the eco-nomic uncertainty associated with chance occurrences. ‘Insuranceexchanges the uncertainty of the occurrence, the timing, and the financial impact of a particular event for a predeterminedprice.’ (Actuarial Standards Board, 1989; American Academy ofActuaries, 1980, p. 2.)

Risk classification is used to group individual risks having reasonably similar expectations of loss. It is important to notethat the determination of an average experience for a particularclass of risk is not the same as predicting the experience for anindividual risk in the class. It is not humanly possible and is,arguably, unnecessary, to predict experience for individualrisks. In this exercise, the risk groups or classes occurring in theoutsourcing of the IT function are brought together. Observationof interaction between the risk groups are then used to derivestrategies for maintaining an ‘equal’ risk profile based onacceptable levels of risk or acceptable tolerance levels for theparticular exercise.

The classifications of risks are used to illustrate, for example, therisk groupings and negotiation strategies between the buyerand supplier. Information on the interaction of risk groupsbecomes input for the initial decision to select a suitable out-source supplier. It is also important that this information isavailable for decisions on ongoing governance of the ITO

Measuring Risks in IT Outsourcing

81

Chap-03.qxd 3/1/05 12:31 PM Page 81

Page 101: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

arrangement. A point of equilibrium in the risk profiles issought. In this exercise, the organization’s tolerance for risk andcompromises can then be supported by a set of tangible riskprofiles, which are discussed in this chapter.

3.9 Identifying risk groups for IT outsourcing (ITO)

If risks are to be grouped, the next task is to identify the riskgroups that should be used. Although the risks identified in theprevious section specifically address some risk areas, larger risksgroupings have been identified through the use of subject head-ers such as financial, business, technical, strategic, operations,and political areas of risks (DiRomualdo and Gurbaxani, 1998).The risk groups observed earlier can be classified under finan-cial risk and operational risk types. Business, strategic, andpolitical risks have involved new business start-ups, process re-engineering, refocus on the client’s core competencies, assis-tance in managing mergers or globalization, and diminishing theoften political debates about new IT projects (Sobol and Apte,1998). The technical risks commonly offered have includedaccess to expertise, improved services, new technologies, andtechnological innovation (Kern and Willcocks, 2001). The risksoften accompany benefits in similar situations and similar areas.

For use in an ITO project for example, list of risk categories willbe determined. This list is specific to and characteristic of theITO project. Risk profiles of all ITO projects differ. The approachnormally used is to group risks by proposing frameworks thatsegment the types of ITO related risk for analysis (Clemons,1995; Earl, 1996).

Recommended risk groups/dimensions

A common set of eleven risk elements or areas that are mostexposed or prone to undesirable outcomes were used. Theseareas appear in the majority of ITO projects; they are listed onthe left of the table in Table 3.1. For the purposes of describingthe risk groups accurately, the term risk dimensions is used.

Along with these risk elements, the risk groups4 are arranged ina matrix. The technical risk group for example, covers elements

Managing the Risks of IT Outsourcing

82

4 Which can also be called risk categories or risk dimensions withsynonymous meaning

Chap-03.qxd 3/1/05 12:31 PM Page 82

Page 102: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Measurin

g R

isks in

IT O

uts

ourc

ing

83

Table 3.1 Example of mapping risk elements into categories or dimensions (Tho, 2004)

Risk elements (Source: Earl, 1996) Risk categories/Dimensions

Technical Financial Legal Operational Business Environmental Information Strategic

Possibility of weak management ✓

Inexperienced staffBusiness uncertainty ✓ ✓ ✓

Outdated technology skills ✓ ✓ ✓

Endemic uncertainty ✓ ✓ ✓ ✓

Hidden costs ✓ ✓ ✓

Lack of organizational learning ✓ ✓

Loss of innovative capacity ✓ ✓

Dangers of eternal triangle ✓ ✓

Technological indivisibility ✓ ✓

Fuzzy focus ✓ ✓ ✓ ✓

Risk elements (Source: Earl, 1996)

Chap-03.qxd 3/1/05 12:31 PM Page 83

Page 103: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

like outdated technology skills, loss of innovative capacity and technological indivisibility. As each risk group is mappedagainst the elements shown in Table 3.1, the accuracy of the riskgroups is verified. For each risk group proposed, each of the riskelements is cross-checked against the others. This approachassists in quickly identifying possible risk groups or dimen-sions. There is only one checkpoint for the business risks cate-gory. The data here suggest that this category would capture the‘other’ risk factors that would arise in the data collection of riskelements.

The same risk elements, once identified, enable actions to betaken that mitigate risks. This adds a focus to the possibilities offailure on the decision on whether to outsource or not. The risksof not outsourcing, interestingly, carry similar risk factors. Thefocus is on the risks of outsourcing of the IT function. These riskareas can also be mapped into the categories or dimensions pro-posed in Table 3.1.

Risk categories and risk types vary between projects. In anotherproject for example, ten groupings of risk identified were finan-cial, technical, project, political, contingency, non-use, internalabuse, external abuse, competitive, reputation, and governmen-tal. These risk groups are, again, collections of risk elements ofsimilar nature. In this example ideas of possible trade-offsbetween the risk areas or groups was raised. This is an impor-tant assumption that is carried forward in the development of the interrelationships between such risk groups. Thesegroups can be mapped into the eight that have been proposed inTable 3.1.

In considering the risk dimensions, the ability to predict andanticipate an undesirable event occurring is important since theconsequences of this event are irreversible. Proactive action canbe taken by focusing on the data that are used to determine theevents or activities that influence these probabilities. For example,by choosing a reputable supplier, the outsourcing project has alower probability of failure.

Technological newness, application size, lack of expertise on thepart of the software development team, application complexity,and organizational environment have been contributory eventsto the possible failure of software development. The extent ofinfluence of each event in a software project will contribute tothe increased probability of the occurrence of an undesirableoutcome (that is, project failure).

Managing the Risks of IT Outsourcing

84

Chap-03.qxd 3/1/05 12:31 PM Page 84

Page 104: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Measuring Risks in IT Outsourcing

85

3.10 Visualizing risk patterns fromarbitrary risk dimensions

The task of presenting the risk data in a meaningful and easilyunderstandable format needs to be addressed to assess the riskprofile. To do this, the information on the probability and riskexposure form data points that are plotted along multiple risk dimensions.

Linking risk dimensions with operationaland relationship risks

A summary of the risk dimensions based on previous work inthe area of unwanted outcomes is then distilled down to costsand changes in scope, which leads to the following eight riskgroups along three risk dimensions (i.e. financial, operationaland legal) proposed in Table 3.2.

Table 3.2 Proposed risk groupings for IT outsourcing based on evidence of loss as a result of riskelements described in this section

Dimension Description Characteristic Influence

C1 Technical Possible loss from the use of existing and new technology Internal– Complexity of the new and emerging technology

and interfaces– Uncertainty– Technological discontinuity– Task complexity

C2 Financial Possible loss from unbudgeted events Internal– Lack of experience and expertise of the enterprise

with the activity– Lack of planning and inaccurate budgeting– Uncertainty

C3 Legal Possible loss from legal disagreements or legal challenges External/– Lack of experience and expertise of the enterprise internal

with the activity– Lack of experience of the client with outsourcing– Uncertainty about the legal environment

C4 Operational Possible loss from poor operations quality or mishap Internal– Lack of experience and expertise of the client

with contract management– Measurement problems– Lack of experience and expertise of the supplier

with the activitycontinued

Chap-03.qxd 3/1/05 12:31 PM Page 85

Page 105: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

86

Table 3.2 continued

Dimension Description Characteristic Influence

C5 Business Possible loss from adverse changes in business External– Asset specificity– Small number of suppliers– Scope– Interdependence of activities

C6 Environment Possible loss from factors external to organization External– Measurement problems– Lack of experience and expertise of the organization

and/or of the supplier with OS contracts– Poor cultural fit

C7 Information Possible loss from insufficient or inaccurate information External– Interdependence of activities– Lack of experience and expertise of the supplier

with the activity– Supplier size– Supplier financial stability– Measurement problems– Task complexity

C8 Strategic Possible loss from errors in direction or tactical mistakes Internal/– Loss of organizational competency external– Scope– Proximity of the core competencies– Interdependence of activities

Financial risks1. Management costs (unbudgeted/unbudgetable transition costs)2. Lock-in (switching costs)3. Hidden costs (uncertainty and absence of complete information)4. Increased cost of services.

Operational/Legal risks5. Contract amendments6. Disputes and litigation7. Loss of competency(ies)8. Service debasement.

Illustrating risk exposure

In this example, taking the eight risk groups proposed and illus-trated in Table 3.2, and values for the probability of an undesir-able outcome as well as loss due to the undesirable outcome, wederive the sample data illustrated in Table 3.3.

Chap-03.qxd 3/1/05 12:31 PM Page 86

Page 106: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Each risk group carries information on risk exposure. The riskexposure comprises elements of the probability of undesirableoutcomes (on a probability scale) and the magnitude of losses(on a financial scale) owing to undesirable outcomes. Using therelationship equation defined earlier (i.e. the product of theprobability and loss magnitude) the risk exposure values ineach of the risk groups can be plotted (see Figure 3.7).

The graph in Figure 3.7 illustrates the risk exposure as defined bythe example scenario described. In this example, if the loss due tothe undesirable outcomes were held constant but probabilities(other than the maximum and minimum value) were reduced to1 (or 10%), then the effects of the shape of the curve as a result ofreduced risk exposure would be that shown in Figure 3.8.

Measuring Risks in IT Outsourcing

87

Risk exposure

00 1 2 3 4 5 6 7 8

1

2

3

4

5

6

7

Pr (UO)

Lo

ss (

UO

)

Figure 3.7Risk exposure as a function of the Pr (UO) and Loss(UO). (With valuesfrom Table 3.3.)

Table 3.3 Sample data for measurement of risk exposure

Risk exposure 14 18 29.25 27.5 21 19.2 28.8 24.5Probability 2.8 4.5 6.5 5.5 3.5 4 6 7of undesirable outcome

Loss due 5 4 4.5 5 6 4.8 4.8 3.5to undesirable outcome

Adapted from Aubert et al., 1998, with arbitrary values for Probability and Loss Magnitude in this example

Transition/M

anagement costs

Lock-in

Contractu

al amendments

Disputes &

Litigatio

n

Hidden co

sts

Service

debasement

Incre

ased co

st of s

ervice

s

Loss of o

rganiza

tional

compete

ncies

Chap-03.qxd 3/1/05 12:31 PM Page 87

Page 107: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

As risk exposure values change, different methods are used tomanage the risks that occur. These methods make use of theinformation (see Figure 3.7 and Figure 3.8) from this frameworkto measure and illustrate the changes before and after manage-ment actions have been taken.

The common method used for representing multivariable datavia two-dimensional charts illustrates key movements of riskexposure along the key dimensions. A possible limitation here isthe ability to illustrate risk movements along the key groupingsof risk. The accuracy of the data that describe the risk exposureas a result of the difficulties in measuring probability and lossmagnitude also affects the results. By collecting the risk elem-ents into groups or risk dimensions, the qualitative examinationof the risks include, rather arbitrarily, the collective risks alongany one grouping. This is not to say that the accuracy of theresults has improved. By grouping the risks, the errors are alsogrouped.

The shape of the ‘curve’ formed by the graph is described as therisk profile. The term risk profile describes the unique shape orcontour that is formed when the risk exposure data points areplotted. A new risk profile for the risks in the outsourcing exer-cise is observed when the risks are plotted against the eight riskdimensions in Table 3.2. The tool described then can be used toillustrate a risk profile at one point in time. This allows separaterisk profiles to be compared.

Mapping possible risk dimensionsagainst the risk landscape

To establish the relevant risk dimensions for analysis, other per-spectives of risk are reviewed. An alternative perspective of risk

Managing the Risks of IT Outsourcing

88

0

1

2

3

4

5

6

7

876543210

Risk exposure

Pr (UO)

Lo

ss (

UO

)

Lower risk

Original

Lowerrisk

curveFigure 3.8As risk exposurereduces, the graphindicates changes(in the direction ofthe arrows) inwardsthe lower left cornerof the chart

Chap-03.qxd 3/1/05 12:31 PM Page 88

Page 108: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

is to equate it to the variance of the distribution of outcomes.The extent of the variability in results (whether positive or neg-ative) is the measure of risk. Risk is sometimes also defined asthe volatility of a portfolio of activities and its value. This tech-nique is borrowed from the area of finance where ‘the highestexpected return for a given level of risk, and the lowest level ofrisk for a given expected return’ applies (Schirripa and Tecotsky,2000). Here, risk exposure is also defined as both a loss and aprobability function.

Another variant in the perspective of risks from these defin-itions and arguments is the popularized and widely used bal-anced scorecard proposed by Norton and Kaplan (1996); fourrisk ‘perspectives’ are derived: financial, customer, internal andinnovation and learning risks. Similarly, additional risk sets ortypes of risks that affect inter-organizational information systems(IOIS) include technical, asset, organizational, and environmen-tal risk. There are project, capability, financial, and maintainabilityrisks, caused by a variety of technical, organizational, and envir-onmental factors (Sherer, 1995). These risk sets then extend tomore subtle risk sets.

For the purposes of this exercise, a hybrid meaning in the group-ing of risks is used. The concepts described here are adaptedwith input from the various other perspectives discussed. Asthe risks and risk exposure information will be collected andmeasured, the term ‘risk dimension’ more accurately depicts thenew meaning and intention. A risk dimension will show a group-ing of risks with similar business function and expectation ofloss. The following provides descriptions of the risk dimensionsthat will be used (see also Table 3.2).

Technical risk (C1 in Table 3.2) is a combination of risks result-ing from the use of technology. Besides the characteristics listedin Table 3.2, other possible losses in this area could derive frominterconnectivity problems and as more open systems are devel-oped, key technical risks arise from security issues.

A major category of risks is in the Financial dimension (C2 inTable 3.2). The losses occurring as a result of poor planning andexperience are major contributors to losses in this group whenoutsourcing the IT function. To guard against variation clausesin outsourcing contracts, specialized techniques are employedincluding the use of instruments like additional resourcecharges (ARCs) and reduced resource charges (RRCs) to accom-modate fluctuations in demand from that specified in the cap-acity plan. This leads to the next risk dimension.

Measuring Risks in IT Outsourcing

89

Chap-03.qxd 3/1/05 12:31 PM Page 89

Page 109: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The use of agreements and legal instruments is designed to miti-gate risks along most of the risk groups. Legal risks (C3 in Table3.2) themselves, however, are significant as a result of increasinguse of agreements and contracts.

Operational risk (C4 in Table 3.2) includes possible losses in oper-ations when the supplier takes over responsibility for the out-comes. It is typical for the risks in this dimension to be ‘passed on’from the buyer to the supplier organization when the outsourcingcontract is activated. The shifting risk has been described earlier.

Outsourcing involves a close partnership between two or moreorganizations. Business risks (C5 in Table 3.2) arise from therelationship between the partners operating in an environmentwhere there is also interaction between other competing organiza-tions, threat of substitute products, competitive barriers to entryand exit, and competitor rivalry. Environmental risks (C6 in Table3.2) are closely related to the business risks and become manifestas a result of factors external to the organization. Environmentalrisk includes dependence risk, where one organization becomesdependent on another that attempts to change the terms of thecontract or fails to perform adequately, and competitive risk,where one organization attempts to ‘steal’ competitive informa-tion from another. With more-open systems in rapidly changingenvironments and the use of information technology’s monitor-ing capabilities, dependence risk will decrease. However, com-petitive risk will become more significant as functionality andaccessibility of shared information increases.

Informational risk (C7 in Table 3.2) is very significant when theIT function is outsourced. The worst-case scenario would be acomplete loss of the organization’s information. Other losses areincurred as a result of inaccurate or insufficient informationwhen a third party manages the IT function.

Finally, the strategic risks (C8 in Table 3.2) involve tactical mis-takes made by the organization in outsourcing the IT functionitself. An example of a significant tactical mistake would be whena supplier organization begins to ‘leak’ sensitive informationrelating to the organization to the latter’s competitors. The out-sourcing of the data component and the selection of the supplierare the tactical decisions made that resulted in the loss.

Risks are associated with all forms of outsourcing decisions. Therisk ‘signature’ for the buyer of outsourcing services is larger thanthat for the supplier in the majority of cases. The risk profilereflects the importance of the relationship and the sharing of the

Managing the Risks of IT Outsourcing

90

Chap-03.qxd 3/1/05 12:31 PM Page 90

Page 110: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

risk profiles. While significant client/external service provider(ESP) interdependency is not in itself a risk, the risks to the clientorganization may increase when disagreements emerge about theprovision of outsourcing services. To the extent that some large-scale IT sourcing deals are successful, others are less so. Servicelevel agreements (SLAs) and other forms of service contractsspecify a series of measurable activities that suppliers provide.

Outsourcing can generate new risks, such as the loss of criticalskills or developing the wrong skills, the loss of cross-functionalskills, and the loss of control over suppliers. Also, outsourcing hasled to a loss of skills and corporate memory. These risks are espe-cially pertinent when the supplier’s priorities do not match thebuyer’s requirements. Short-term contracts, based on the principleof the lowest winning bid, stifle incentives to innovate becauserewards for innovation cannot be secured by the supplier.

3.11 Constructing the signature

The eight risk dimensions shown in Table 3.2 are proposed asthe starting point, for the majority of ITO projects, to analyse thebasic risk sets that will be used to construct the risk profile. Eachtime these dimensions are used, they should be reviewed andanalysed for relevance and accuracy. This exercise shouldalways be done, especially if the organization in question isfrom another industry or the scope of the IT function being outsourced is different. The risk profile would illustrate all therisk dimensions (comprising the total risk exposure for the out-sourcing exercise) on one diagram.

3.12 Graph types

To do this, several options and visualization techniques werereviewed including the star graph, radar plot and stereo-rayglyphs of Carr and Nicholson (1998). The star plot, for example,was tested as a means of showing multivariate visualization orrisk dimensions in which the multiple measurements of riskexposure would be plotted on equally spaced radii extendingfrom the centre of a circle and linked to form a star. In the radarplot, these radii also represented the value of the measurement.In this instance, however, each radius stands for a risk dimen-sion instead of a variable. The risk (dimension) response, therisk exposure on each variable, is displayed by points of differ-ent shapes or colours, or both.

Measuring Risks in IT Outsourcing

91

Chap-03.qxd 3/1/05 12:31 PM Page 91

Page 111: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The risk exposure values in Table 3.3 and Figure 3.7 are re-plottedusing the radar graph in Figure 3.9. The risk profile now describesthe risk exposure along multiple axes representing risk dimen-sions. The resulting risk profile illustration is unique for an ITOproject at any given point in time. For reference, this profile willbe called the ‘risk signature’ (see Figure 3.9).

The risk signature illustrates the sum of all the risk exposure val-ues derived from the tools previously proposed. What was notobvious through the linear diagrams (Table 3.3 and Figure 3.7) ismore easily observed with the multivariate graph. The areabounded by the curve in Figure 3.8 will therefore also representthe total risk exposure experienced by the organization at thatpoint in time.

An assessment of the overall risk exposure along each of theeight risk dimensions would allow the changes in risk exposurealong one dimension (a group of risks with similar characteris-tics) to be manifested on another dimension. This will promptanswers to questions such as, ‘What are the effects of reducingthe risk of transition costs5, for example on the risks in organi-zational competencies through more attention to the skills being outsourced?’ or ‘What are the effects of reducing the risk

Managing the Risks of IT Outsourcing

92

5 Where transition costs are the costs that are incurred at the time the suppliertakes over the IT outsourcing function

Risk exposure

0

5

10

15

20

25

30Transition/Management costs

Lock-in

Contractual amendments

Disputes & Litigation

Service debasement

Increased cost of services

Loss of organizationalcompetencies

Hidden costs

Figure 3.9The risk signatureor radar plot of riskexposure withreference to Table3.3 and Figure 3.7

Chap-03.qxd 3/1/05 12:31 PM Page 92

Page 112: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

exposure to disputes and litigation if we paid more attention to the services (increasing the relatively low risk on costs ofservices)?’

In the case of a reduction in risk exposure, the area enclosed by thecurve would simply decrease proportionately. The risk expos-ure of transition cost escalation for example is not nearly as highas that for contract amendments of loss of organizational com-petencies. The graph shows the frequencies of data series rela-tive to one another. The correlation of one dimension to anotheris also visible, i.e. where there is a relationship between the riskdimensions.

Three methods can be considered for preparing the scales alongeach of the axes on the graphs as the data on risk exposure arecaptured. These options are measurement in categorical, in rank-ordered and in continuous format.

Categorical scales on the axes

When the categorical scales (or nominal scales) are used to quan-tify the risks, the values in each dimension are taken by tallyingup the numbers along each of the risk dimensions. For example,the values are made up of two components, i.e. high- and low-riskitems. Other variables with more than two categories includingmedium–high, very high, medium–low and very low, are alsoplotted on the categorical scales. This method provides an illus-tration of the risk profiles. It may be too inaccurate to indicatechanges in the risk profile/signature as a result of changes madein the outsourcing exercise. To be of any use, the risk profilerequires more-accurate readings to allow a meaningful analysisof changes in risk and for a comparison of different profiles.

Rank-ordered scales on the axes

The second method uses rank-ordered scales (or ordinal scales),which quantify each dimension by giving each data point arank. For example, the eight dimensions might be ranked from 1 to 8 in terms of order of risk severity. The dimensions would beranked 1st, 2nd, 3rd, 4th, etc. in a rank-ordered scale. This optionwould serve to provide relative risk weightings of the individualdimensions in terms of criticality and need for attention. Thiswould be used to prioritize management attention along thedimensions but is not useful in the examination or comparison ofthe different profiles. Data on the relative weightings may then becollected from interviews with individual personnel involved

Measuring Risks in IT Outsourcing

93

Chap-03.qxd 3/1/05 12:31 PM Page 93

Page 113: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

with the outsourcing exercise. There is little consensus, however,with regard to the relative weighting of each dimension.

Likert scales on the axes

The third method uses continuous scales, which quantify thequalitative assessment risk severity at equal intervals along a 5-point yardstick. The scale information would be scored againstthe criteria as follows:

No risk � 1Little risk � 2Expected risk � 3High risk � 4Very high risk � 5Unacceptable risk � 6

The Likert scale, with a numeric index of 1 to 6 based on anempirical severity of the exposure to risk, was used. A ‘1’ wouldrepresent no risk, and a ‘6’ unacceptable risk. Given the subject-ive nature of the assessment, an even number has been allocatedto the Likert scale to avoid ‘fence sitting’ and force the results ofthe evaluation to either side of the risk scale. This method of col-lecting data was the most effective. This is discussed further inthe next chapter along with the methods employed to acquirethe data for the risk signature diagrams.

3.13 IT outsourcing and the risk dimensionsignature (RDS)

A ‘risk signature’, as defined previously, is derived from the pat-tern of risk exposure along the dimensions of an arbitrary eightrisk dimensions that provides an intuitive interface to allow fur-ther assessment and analysis. The risk signature, comprising therisk exposure values along each risk dimension, also shows thetotal risk exposure experienced in the outsourcing exercise.

The characteristics of the risk dimension describe each risk dimen-sion and the rationale for selecting the individual risk elementsto be grouped into the risk dimensions. The ‘influence’ providesclues as to the origin of the causes, as illustrated in Figure 3.2.Following the construction of the RDS, the risk profile needs tobe illustrated and salient messages translated or understood.This is the subject of the following chapter.

Managing the Risks of IT Outsourcing

94

Chap-03.qxd 3/1/05 12:31 PM Page 94

Page 114: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The risks that occur in an IT outsourcing (ITO) exercise are com-plex and understanding the interaction of risks after measuringthe varieties of risks can be a daunting task. It is important for a manager in this situation, therefore, to be able to visualize(metaphorically) the intensity and range of current risks inorder to effectively control activities and determine the out-comes. This involves the ability to understand risk exposure. Todo so, it is necessary to be able to appreciate the quantitativenature of risks, compare risks (and changes) over time, observerisk patterns and then actively reduce the effects of selected riskelements. As has already been highlighted in Section I, manyrisks originate from failures to successfully monitor the relation-ship between supplier and buyer, the element of uncertainty inthe IT function itself, the level of competitive importance thathas been imposed on the IT function that is being outsourced,and the level of interconnectedness between the buyer and sup-pler organizations.

Risks in ITO are unwelcome. Risks represent the worst thatcould happen, especially when the benefits and reasons why anorganization used ITO could be jeopardized or the success ofthe enterprise could be threatened. There would be a successfuloutcome when buyers of ITO services have the IT products andservices delivered both on time and to budget. Likewise, sup-pliers want to deliver to the buyer’s expectations. Risks, therefore,are an inherent component of ITO and must be understood inorder to be mitigated.

95

The challenge of understanding riskswhen outsourcing the IT function

Where observation is concerned, chance favours only the prepared mind.Louis Pasteur (1822–1895), French scientist

At an Inauguration lecture, Faculty of Science, University of Lille

Digital tools magnify the abilities that make us unique in the world: the ability to think, the ability to articulate our thoughts, the ability to

work together to act on those thoughts.Bill Gates (1955–), US business executive

4

Chap-04.qxd 3/1/05 12:32 PM Page 95

Page 115: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

In this chapter, the notion of a ‘portrait’ of the risk landscape forthe ITO exercise will be introduced from the RDS illustrations con-structed in Chapter 3. The ‘risk portrait’ is a description of all therisks that are exhibited during an ITO exercise. It is displayed withthe use of star graph, radar plot and stereo-ray glyphs. It can beused also as an instrument to illustrate complex risks. In a graph-ical format, the risk portrait communicates the risk complexity ina manageable format to the person working on risks in this envir-onment. With this, the shifting of risks between supplier andbuyer that was discussed previously in Section I can be observedwith the oscillation between both buyer and supplier entities.

Also, in order to understand, manage and mitigate the complexand varied risks that become manifest, the concept of ‘groupedrisks’ or ‘categorization’ is borrowed from the insurance indus-try in the formulation of its insurance products and premiums.The ‘risk portrait’ introduced illustrates the changes in thenature and severity of risks, over time, as both the supplier andbuyer of ITO services interact. To measure and show risk expos-ure, the risk categories are collected and assembled into risk port-folios that provide a set of comprehensive information on risksfor both the supplier and buyer of ITO services. This notionextends further to enable the illustration and comparison of thevarious interactions or relationships between actions in a typicalITO scenario. It is shown that the information can then subse-quently be used as a means to plan negotiations that aim toarrive at more-equitable ITO arrangements between the buyerand supplier organizations. This tool is called the risk dimen-sion signature or RDS (Tho, 2003) (see below).

4.1 Interpreting the RDS

A risk signature can also be construed to mean a particular riskprofile that is created using a number of different methods. Todifferentiate the risk signature that is constructed from riskdimensions, the term risk dimension signature (RDS) is coined.It is an imprint of the risks from risk dimensions or groupsalready identified for a specific ITO arrangement. The risk dimen-sion signature represents a unique picture of the risks at onepoint in time during the ITO project. It uniquely differentiatesthe project from any other. It would be very unlikely for twoidentical RDS patterns to co-exist.

The risk signature is a tool that will assist the organization tobetter understand risks to business operations and avoid risky

Managing the Risks of IT Outsourcing

96

Chap-04.qxd 3/1/05 12:32 PM Page 96

Page 116: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

practices, such as allowing scope creep and development of avariety of alternative supplier practices, and to be alert for otherevents streaming from agency theory. It also provides an effi-cient means for communicating assessment findings and recom-mended actions to business unit managers as well as to seniorcorporate officials. Standard report formats and the periodicnature of the assessments have provided organizations with ameans of readily understanding reported information and com-paring results among units over time. The RDS will be the primary tool to support the notion that there is a set of interrela-tionships between the actions and effects of actions that influ-ence the risks.

When the risk profiles for both the supplier and buyer are super-imposed on the same chart, the relative risk exposures also revealareas where negotiations for trading one party’s risk for anothercan be made. In Figure 4.1 for example, the buyer-risks (indi-cated using the solid line) along risk dimensions A, B, D, E, Fand H are relatively larger than those of the supplier (indicatedusing dotted lines), which are seen as having a relatively ‘safe’risk profile. Along dimensions C and G however, the supplier ismore at risk relative to the buyer organization.

Understanding Risks When Outsourcing the IT Function

97

012345

Risk dim A

Risk dim B

Risk dim C

Risk dim D

Risk dim E

Risk dim F

Risk dim G

Risk dim H

BuyerSupplier

Figure 4.1Examples ofdissimilarsignatures (or risk dimensionsignatures) of thebuyer and supplierorganizations alongeight arbitrary riskdimensions

A more detailed discussion can follow, given more informationon the nature of the risk dimensions; the buyer could tradesome the risks in A, B, D, E, F and H for C and G.

While it is clear that the buyer experiences more risk along thedimensions along the vertical axes, and the supplier has increasedrisk along the dimensions on the horizontal axes, a question thatneeds to be asked is if the total risk exposure for the buyer andthe supplier is the same. Knowing that the area bounded by the

Chap-04.qxd 3/1/05 12:32 PM Page 97

Page 117: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

risk signature reveals the total risk exposure for the buyer andsupplier organizations in this example of an outsourcing agree-ment, the total risk exposure can be measured and computed(see next section).

4.2 Computation of total risk exposure

To compute the area bounded by the risk signature or profile,the formula for the area under the curve, given multiple dimen-sions (eight in this case), is constructed from basic mathematicalprinciples. The angle between each risk dimension, A throughH, is 45°, derived from 360° divided by eight (corresponding tothe number of equal angles). Hence the total risk, or areaenclosed by the graph under this profile, can easily be com-puted as in equation (4.1) below.

Total risk � Area enclosed by the graph (risk here represents the risk exposure, RE)

therefore

Total risk � � [� (product of adjacent risk exposure magnitudes)] (4.1)

where � is a constant depending on the number of risk dimen-sions (see Table 4.1).

Given that the risk profiles or risk signatures are multi-sidedshapes, the area under the graph is computed as follows.

Managing the Risks of IT Outsourcing

98

0

2

4

6

8a

b

c

d

e

f

g

h

Buyer

Supplier

Figure 4.2Sample risksignature (RDS)demonstrating keyvalues for thecomputation of totalrisk exposure

Chap-04.qxd 3/1/05 12:32 PM Page 98

Page 118: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

But � � 45° where there are 8 dimensions therefore,

where � � 0.3536

The total risk exposure changes are the total risk profilechanges. When the number of risk dimensions change, then thevalue of the constant � also changes, where

� � sin [360/(# risk dimensions)]

Table 4.1 illustrates the possible values of � given the changes inthe number of risk dimensions.

risk risk risk (risk riski (i 1) 1 81

7� � � ��

� ( ) )i

i

∑∑∑⎡

⎣⎢⎢

⎦⎥⎥

risk 0.5sin risk risk (risk riski (i 1) 1 8� � � ��� ( ) )ii

i

1

7

∑∑⎡

⎣⎢⎢

⎦⎥⎥

Understanding Risks When Outsourcing the IT Function

99

Table 4.1 Sample computation of the constant � for use in the computationof the total risk exposure in a construct of the risk profile in equation (4.1)and as illustrated in Figure 4.2

No of risk 3 4 5 6 7 8 9dimensions

Angle theta 120 90 72 60 51 45 40Constant alpha 0.4330 0.5000 0.4755 0.4330 0.3909 0.3536 0.3214

The number of risk dimensions in Table 4.1 ranges from three tonine. To graphically illustrate risk, or negative outcomes, eightselected dimensions of risk were arbitrarily chosen. Thesedimensions were plotted along equally spaced axes, all at 45°angles in a radar plot. These dimensions were selected based ona rationale for classifying risks into categories. In proposingeight risk dimensions (see Table 3.2), the number 8 rather coinci-dentally matched the optimal value. This is supported by Miller(1994): while discussing the bandwidth dilemma in data repre-sentation, he introduced the rule of ‘seven plus and minus two’during the presentation on multivariate, multidimensional visu-alization techniques. Keller and Keller (1993) also endorsed thisrule during their discussion on radar and spider plots. Thisappears to be the optimal number of risk dimensions to visualizeor depict the risk profile of an outsourcing project. Also, as will

Chap-04.qxd 3/1/05 12:32 PM Page 99

Page 119: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

be seen in the following sections, it is observed that 8 seems tobe the optimal number of risk dimensions representative of acollection of many risks of a similar nature.

As mentioned in Chapter 1, visualization is a process of balan-cing noise and smoothness. Instead of following some generalizedcognitive rules, we should process data representation along thenoise–smoothness continuum owing to different research goalsand data types.

Comparing buyer and supplier risks on the RDS

From the RDS example in Figure 4.2, the total risk exposure forthe buyer’s risk exposure is computed as 82.4 and the supplier’srisk exposure as 82.05 using the following formulae derived fromequation (4.1). The actual computation is shown here.

Buyer risk�risk � 0.5 � 0.7071 [(Dim A.Dim B) � (Dim B.Dim C)

� (Dim C.Dim D) � (Dim D.Dim E)� (Dim E.Dim F) � (Dim F.Dim G)� (Dim G.Dim H) � (Dim H.Dim A)]

� 0.5 � 0.7071 (30 � 20 � 24 � 30 � 15 � 18 � 48 � 48)� 82.4

Supplier risk�risk � 0.5 � 0.7071 [(Dim A.Dim B) � (Dim B.Dim C)

� (Dim C.Dim D) � (Dim D.Dim E)� (Dim E. Dim F) � (Dim F.Dim G)� (Dim G.Dim H) � (Dim H.Dim A)]

� 0.5 � 0.7071 (20 � 12 � 18 � 36 � 36 � 30 � 40 � 40)� 82.05

Interpreting the buyer and supplier RDSs

From the RDS in Figure 4.2, it is also quantitatively or empiricallyobserved that both the supplier and buyer experience almostidentical1 total risk exposure from the outsourcing arrangement.When the charts are analysed from the perspective of the riskdimensions however, the supplier is over-exposed along riskdimensions E and F. The buyer, on the other hand, carries morerisk along all the remaining risk dimensions. The supplier hence

Managing the Risks of IT Outsourcing

100

1 The difference between 82.4 and 82.05 is insignificant for this purpose

Chap-04.qxd 3/1/05 12:32 PM Page 100

Page 120: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

carries an advantage along all but two of the risk dimensions.This would otherwise be unknown if it was not charted. Theincrease in risk is not linear but a quadratic function indicatingincreasing exposure on the part of the organization.

If the magnitude of risk exposure (RE�) along any one dimen-sion changes, the difference in total risk profile to the organiza-tion or organization project is:

(R.E.� � R.E.�) � � (product of adjacent R.E. magnitudes) � �(4.2)

where is a constant given the risk profile, and � defines therisk categories.

Equation (4.2) is the same as equation (4.1) except that it showsthe difference and change in the total risk exposure. This meansalso that when risk dimensions are held constant, i.e. � (adjacentRE) � , the risk profile relationship is linear or can also bemeasured directly from either the probability or magnitude ofrisk exposure, i.e. read directly from the axes of risk dimensions.This is worth while noting for making simple analyses. More-complex charts would require equation (4.2) to be used.

Further observations from risksignatures or risk dimension signatures

There are many specific observations that describe the dynam-ics of the risks along each of the predetermined dimensions thatrelate to the RDS for the ITO exercise. A specific observation thatis highlighted, i.e. the extent to which the risk can be ‘stretched’,identifies the organization’s tolerance of risk, or ‘risk appetite’,along each dimension. Risk appetite is the preference and toler-ance for risk of the supplier and/or the buyer organization. Anorganization’s risk appetite is also referred to by the extent towhich it tolerates risks as described by performance indicators,operational parameters and process controls. The organization’stolerance for risk or risk appetite is highlighted when the risksare discussed and demonstrated in an illustration of a risk profile.

This risk tolerance can be mapped as an additional RDS plot. It willindicate the extent of risk exposure along each of the dimensionsthat the organization is prepared to tolerate. The actual RDS thenwill illustrate areas where this tolerance is either exceeded or iswithin the limits set. For example, when a customer relationshipmanagement (CRM) application is developed by an IT developerfor a retail chain, there are significant risks along the technicaldimension; there is high risk (level 4) here but low risk on the

Understanding Risks When Outsourcing the IT Function

101

Chap-04.qxd 3/1/05 12:32 PM Page 101

Page 121: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

financial parameter (level 1). The signature clearly identifies ‘stress’loads in the area of technology (new, unproven technology). Thisexample is illustrated in Figure 4.3 where the risks and total riskexposure along the technical dimension are high. Coincidentally,the risks in the financial area are lower than those in the others.

Managing the Risks of IT Outsourcing

102

Technical

Financial

Legal

Operational

Business

Environmental

Informational

Strategic 3

2

1

0

4Supplier

Buyer

Figure 4.3Scenario A wherethe technical risk tothe buyer is high(the supplier riskhas been heldconstant for thepurposes ofillustration)

Technical

Financial

Legal

Operational

Business

Environmental

Informational

Strategic 3

2

1

0

4Supplier

Buyer

Figure 4.4Scenario A wheresome technical riskhas been ‘traded’for financial risk (thesupplier risk hasbeen held constantfor the purposes ofillustration)

To reduce the stress loading on technology, perhaps moremoney can be allocated to additional expertise, to experiencedconsulting assistance and perhaps also to further investigationin the area of CRM. This increases the finance risk but the risksignature looks more evenly distributed; the overall risk loadingis also more evenly distributed.

When more money is spent to ‘fix’ the technical problem, therisk profile as indicated by the RDS in Figure 4.4, indicates a pro-file that is much more evenly distributed. The other dimensionscan be compared similarly. For example, the interrelationships

Chap-04.qxd 3/1/05 12:32 PM Page 102

Page 122: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

and impact of operations, business and information are recipro-cal in nature.

4.3 Additional RDSs and patterns

The risk profiles and patterns also illustrate information on thelevel of risk exposure or risk severit; risk dimensions for atten-tion; and dimensions that are missing. For example, an acute anglealong any single axis could represent a significant variance inrisk levels between dimensions, which causes undue stresses tooutsourcing agreements for either the buyer or supplier.

Sample RDS patterns and interpretation

An obtuse angle, on the other hand, typically defines a more-balanced risk-sharing profile between risk dimensions (seeFigure 4.5). The star and arrowhead topologies have features incommon, i.e. have extreme risks along the north–south- andeast–west-facing risk dimensions compared to the other shapes.This indicates severe risk exposure at each ‘point’ or ‘tip’ com-pared to the central area of the ‘star’.

The circular topology shown demonstrates the ‘ideal’ risk profilewhere the magnitude of risk is similar along all the risk dimen-sions. This indicates some degree of risk sharing and managementfor the outsourcing arrangement. When risk is drastically reducedalong selected risk dimensions, for example arbitrary dimensionsC and G along the horizontal axis, a squeezed rectangular shapeemerges. The stresses placed on the other risk dimensions wouldbe high. This is discussed further in the following sections.

A circular topology for the buyer indicates even risk sharingbetween the risk dimensions, and an arrowhead indicates sig-nificantly lower risk along two dimensions. When one topologyis superimposed on another, the mismatch causes significantstrain on the contracting and governance processes necessary toequalize the risk profiles. Even though the buyer would be con-tent, the uneven risk exposure will create a handicapped situation.

Therefore, to summarize, the RDS profile will also allow severalcharacteristics to be monitored and observed. These include thefollowing:

1. An illustration or measure of total risk exposure (by computation).

2. A ‘feel’ of the areas which are subject to additional or reducedrisk (by comparison).

Understanding Risks When Outsourcing the IT Function

103

Chap-04.qxd 3/1/05 12:32 PM Page 103

Page 123: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

3. An understanding of the areas subject to unduly high or lowlevels of risk and risk exposure (by reviewing the RDS on astand-alone basis); and

4. An assurance that the ‘gut feel’ for risks is correct (by carefuland detailed observation of the negotiating parties and theenvironment).

4.4 IT outsourcing (ITO) measurementframework

The intrinsic risks need to be considered in any outsourcing situ-ation. For example, the need to retain the ability to change strategy

Managing the Risks of IT Outsourcing

104

Figure 4.5 Sample RDS or risk profile topologies (with arbitrary dimensions)

Star topology

Risk dim A543210

Risk dim B

Risk dim C

Risk dim D

Risk dim E

Risk dim F

Risk dim G

Risk dim H

Buyer Supplier

Circular topology

3

1

2

0

Risk dim A

Risk dim B

Risk dim C

Risk dim DRisk dim F

Risk dim E

Risk dim G

Risk dim H

Squeezed rectangle topology

5432

01

Risk dim A

Risk dim B

Risk dim C

Risk dim DRisk dim F

Risk dim E

Risk dim G

Risk dim H

Arrowhead topology

543210

Risk dim A

Risk dim B

Risk dim C

Risk dim DRisk dim F

Risk dim E

Risk dim G

Risk dim H

Buyer Supplier

Buyer SupplierBuyer Supplier

Chap-04.qxd 3/1/05 12:32 PM Page 104

Page 124: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

and options can lead to risks of increases in hidden costs, costs ofservices and management costs, which are difficult to forecast orbudget for. Additional reasons that have been cited include therisk of loss of intellectual property, the risk of loss of competencyand the ‘lock-in’ phenomenon where the contractual obligationsimpose limitations on both the buyer and the supplier in seekingalternative means to perform the outsourced task. It can be shown,however, that a few key risk areas dominate, i.e. have larger riskexposure than have other risks, in the ITO environment.

Considering multiplicity of risks

To make the measurement of the assortment or multiplicity of riskelements easier, the risks are sorted into groups with similar riskcharacteristics. IT-related risks have been classified to includeelements such as operational failure or lack of reliability (Markusand Tannis, 2000), security breaches, reputation damage to anorganization owing to its failure to safeguard the privacy of cus-tomer data, and strategic risk (such as adopting a new IT too soonor too late). These risks form the most significant portion of risks inthe IT exercise. Risks involved with the IT function in combinationwith an outsourcing exercise are unique. They are quite differentfor each area considered separately. In the outsourcing of the ITfunction within an organization, the complex operations of boththe IT function and the outsourcing exercise need to be consideredtogether. The risks in the outsourcing of the IT function are alsoexacerbated by the fact that IT (and its components) characteris-tically evolves very rapidly and has very short product life cycles.

Considering contract periods

ITO agreements cover relatively very long periods (many ITOagreements span 5 to 10 years). Implicit in this observation, theproducts and services that are supplied and used relating to the outsourcing of the IT function also change many times overthe period of the outsourcing agreement. By inference then, theinevitable changes in the operating environment (includingpeople, technology, processes and supporting business require-ments) become natural catalysts that give rise to an environ-mental risk consideration. Consequently also, risk effects thatare experienced in the ITO exercise are directly related to theorganization and its IT policies.

In an ITO exercise these IT risks, together with the risks inherentin an outsourcing exercise, come together and are experiencedby both the supplier and buyer of outsourcing services. The

Understanding Risks When Outsourcing the IT Function

105

Chap-04.qxd 3/1/05 12:32 PM Page 105

Page 125: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

effects of ITO risks have been shown (Aubert et al., 1998) alongtwo main measurement metrics, i.e. ‘the importance of potentialloss’ and ‘the probability of undesirable outcomes’. The frame-work for risks built by these researchers allows an assessment of the level of risk exposure for each ITO decision. There is alsoa group of risks that form the most significant portion of risks inthe ITO exercise. Together, the most significant IT project-risks,along with the ITO-risks, form the basis for the most significantmeasurements of risk exposure that the framework deals with.

Considering buyer and supplier

The information in the frameworks allows a comparisonbetween the elements of risk exposure for both the buyer andsupplier organizations. It does not demonstrate, however, thedynamics of the interaction that exists between the causes andeffects of the decisions that are made to mitigate the risks. Also,the effects of changes in risk exposure levels are often inter-related. The effects and relationships in this interaction requirenew methods, tools and frameworks for their observation and measurement. Outsourcing arrangements are partnershipsbetween the buyer and supplier organizations over an agreedperiod. They constitute alternatives to the more traditionaltransaction-based contracts, which are usually shorter anddefined to deliver specific services or products. An ITO arrange-ment, for example, may span a period of 10 years or ten finan-cial periods wherein new budgets, strategies and plans will beformulated to balance the forces in a competitive environment.

The risks are often passed from the supplier to the buyer andvice versa (see previous chapter). Risk exposure is also observedto be passed from one risk dimension to another within the virtualconfines of either entity. In many examples, the organizations(both buyer and supplier) become increasingly reliant on thestructures and, in particular, on the dependencies of a net-worked environment. As more organizations adopt outsourcingpractices, the interconnected systems, processes and people net-works increase the inherent risks created in partnership andjoint working relationships. Developments in principal-agencytheory discussed in the previous section (Chapter 3) have givensome insight into the incentive mechanisms used inside organiza-tions, and, by extension, into the role of information and infor-mation technology. However, because the same models applyequally well to contracts between organizations, agency theory byitself cannot explain the boundaries of organizations or the rela-tive advantages of different institutional or ownership structures.

Managing the Risks of IT Outsourcing

106

Chap-04.qxd 3/1/05 12:32 PM Page 106

Page 126: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

4.5 Shifting the ‘effects of risk’

One reason why organizations outsource their IT function is toshift some elements of risk from the customer (buyer) to thesupplier. The buyer of outsourcing services hopes to transferaway its operational and technical risks by passing them to asupplier organization that will, effectively, take them over andagree to deliver a set of outcomes.

During an ITO exercise, however, actions performed by eitherthe supplier or buyer of outsourcing services can change thenature and severity levels of risk experienced by either party.There are compromises made by both parties in the outsourcingexercise. Anecdotal evidence can be found in examples of ITOfailures that have been partly attributed to insufficient focus onan area that was neglected or ‘unacceptably exposed’ to risk fac-tors. As risks are transferred away, other risk elements appear toenlarge (see examples below). If separate RDS profiles were tobe taken for the buyer and the supplier over two different pointsin time, especially at different stages in the outsourcing exercise,the shifts in risk would become very apparent. An example isillustrated in Chapter 8 in the case study.

Risk-shifts between buyer and supplier

As the risks are shifted from the buyer to the supplier and viceversa, the RDS profiles indicate that each of the risk dimensionsalso change. This interaction between buyer and supplier actionsand the risk exposure can be observed qualitatively. An exampleto illustrate the risk-shift phenomenon is now discussed. Considera situation where the amount of money budgeted for use in thepurchase of essential backup disks is insufficient or untimely.This means that copies of the ‘live’ operating data cannot betaken and stored. Operational risk is hence increased becausethere is no duplicate copy of the ‘live’ data. Here, an action fromthe area of finance has affected the area of operations along asequential chain of events. Financial risk needs to be reduced;costs have to be controlled; insufficient money is allocated foractivities which are not urgently required (i.e. purchase of disksfor copies); disks for copies hence have not been purchased andcopies of the ‘live’ data not made. These factors cause the oper-ational risks to increase because there is no contingency planshould the data on the computers be destroyed or corrupted byan event like a malicious attack by a computer virus or a naturalcalamity like a fire. There are no duplicate copies available toreplace originals that might be destroyed. In this case, the risks

Understanding Risks When Outsourcing the IT Function

107

Chap-04.qxd 3/1/05 12:32 PM Page 107

Page 127: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

in the area of operations are elevated in an effort to reducefinancial exposure and risk. Financial risks have been traded offagainst operational risks.

Another example of interrelationships between activities andrisks is illustrated in the area of contract management. Oftencontracts are made between the supplier and buyer of outsourc-ing services at the beginning of the contract, which might onlybe a few years old. These contracts have a short ‘shelf-life’, and,unless updated, become quickly outdated because new technol-ogy has replaced the old, skills required have changed, andprocesses and delivery mechanisms are different. MicrosoftCorporation’s almost ubiquitous Windows operating system forbasic personal computers for example, has had major changeson no less than three occasions in the last 5 years, i.e. fromWindows 98, Windows Me, and Windows XP. New features andfunctions often translate into new performance measurementcriteria for the supplier of IT services. This may seem trivial atfirst but when an organization has hundreds of personal com-puters in its inventory in geographically disparate locations,any exercise to upgrade IT components often becomes a majortask and an area of operational risk. As a buyer of outsourced ITservices, however, the technical and operational risks appear tohave decreased as a result of the deployment of better and moreefficient technology, but the legal and operational risks areincreased in a complex set of interrelationships.

So what are the implications of these observations on shiftingrisk? How are the risks in one area traded off against another, ifat all? What constitutes an acceptable risk for any one area?What are the levels of risk that each area of the organization can,or should, carry? While heuristics and the cumulative experi-ence that managers of organizations who are involved with theoutsourcing of the IT function have applied for years have provenuseful in responding to these questions, the dramatic and ever-increasing changes brought about by new components in ITcoupled with the increasing scope of outsourcing exercises makethis experience an untrustworthy guide.

A typical outsourcing agreement or arrangement often involvesneglect of the relationship and interaction between the buyerand supplier organizations. The risk of the buyer organizationincreases when disagreements emerge about the provision ofthe outcomes of outsourcing services. Without a systematic ana-lytical approach to the outsourcing decision, the organizationmay make arbitrary choices on the decision to outsource, based

Managing the Risks of IT Outsourcing

108

Chap-04.qxd 3/1/05 12:32 PM Page 108

Page 128: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

on historic norms, cash flow difficulties, political considerationsor misperceptions of the benefit–risk trade-off. Also, given thatthere is an agency model in operation, many of the activitiesand risks involved are derived from the fact that people have atendency to cheat and take advantage of a situation, as articu-lated in what is known as agency theory (Eisenhardt, 1989).Agency theory explains how to best organize relationships inwhich one party (the buyer) determines the work which anotherparty (the supplier) undertakes. The theory argues that underconditions of incomplete information and uncertainty as occursin an ITO environment, agency problems arise.

4.6 Observing risks in an ITO environment

It is understood from the review that while partnership arrange-ments vary considerably in their operations, from flexibly defined,formal contracts, to loose strategic initiatives, they also include theprovision of shared risk and benefits. As observed in Chapter 1(Figure 1.4) strategic or transformational outsourcing provides fora set of partners who have a considerable stake in the game, andoften that means sharing both risk and reward. How is the dis-proportionate weighting of risk between the supplier and buyer,if any, then quantified? How are the risks of the disproportion-ate experience levels of the buyer and supplier mitigated?

The phenomenon of winner’s curse (Kern et al., 2002), asdescribed below, is the situation where extreme cost cutting isundertaken by the winning supplier based on the risks to supplierwhen it agrees to enter into the outsourcing contract. What are therisks involved? How are the risks quantified and decisions made?

As this chapter opened by discussing foundational conceptsand what has been learned about what works and what doesnot, as well as the conceptual models for understanding whenorganizations should and should not outsource, it concludes byfocusing on the key area of risks within the ITO environment.

It is simply not possible for this book to attempt to answer allthe possible questions posed in an ITO exercise. It recognizes,however, the central theme of risk measurement and manage-ment that needs to be addressed, and aims to provide the readerwith the appropriate tools and information to be able to manageeach individual situation that arises as a separate case. Further,it recognizes that there is a lack of cohesive evidence, supportedby any tools or methods, that allows the recognition of riskswithin the framework of decision-making in an outsourcing

Understanding Risks When Outsourcing the IT Function

109

Chap-04.qxd 3/1/05 12:32 PM Page 109

Page 129: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

exercise. Specifically, the outsourcing of the IT function introducesunique features that add to the complexity of the risks argument.

A series of complex factors including operational, strategic and environmental factors influence risk. In addition, less-predictable human factors, explained through the presence ofagency theory as well as observable factors between both thesupplier and buyer, affect the behaviour of risks. In order toassess the effect of these complex sets of influences on the riskprofile, a tool needs to be developed.

The IT environment is unique and the nature of the outsourcingof the IT function is arguably distinct between industries and alsobetween the operational and business functions that are out-sourced; therefore the application of the concepts of risk needs tobe made for each of the projects that the reader is involved with.

There are also two very important observations that arise fromthe RDS profiles and discussion of risks in the ITO exercise. Thefirst is the notion of the winner’s curse which very aptly describesa situation where the winner actually loses because of the bid-ding framework that is typically used in an ITO scenario. Thisprovides an added reason why the RDS profile is critical for thesupplier of ITO services as it will provide both early warning aswell as a tool to compute the basic risks that would be encoun-tered in such an activity. The supplier would then be able toassess the impact of increases in risks that exceed its risk toler-ance or risk appetite.

The other observation is founded on the agency theory. Agencytheory describes the behaviour of people who work with eitherthe buyer or supplier organization. This ‘human’ behaviour isdemonstrated very clearly in the RDS profiles in almost all therisk dimensions. It is possibly the most significant cause of riskswithin the ITO framework and is described below.

4.7 Winner’s curse

Very often, in search of cost savings, the buyer drives the sup-plier’s prices down, resulting in winner’s curse (which is also aloss for the buyer as services deteriorate in compensation).Alternatively the process is abandoned because the costs of pro-viding the services are too high.

The tender process described is quite similar to a bidding orauction process where the lowest price (not the highest) is

Managing the Risks of IT Outsourcing

110

Chap-04.qxd 3/1/05 12:32 PM Page 110

Page 130: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

sought by the buyer of outsourcing services. Acceptance of a bidis often based on the information provided by the buyer. Failureto incorporate relevant and correct information into the biddingstrategy can lead to excessively low bids and subsequent losses.Each bidder then works through a series of decisions to pricethe outsourcing services. As information is not always forth-coming, the risk of the winner paying more, on average, thanthe prize is worth, is something found to happen quite often inpractice. This series of actions leads to the ‘winner’s curse’ phe-nomenon. It occurs in normal auctions, in which the auctioneeris the seller or represents the seller and the bidders are the buyers,who have evaluated the object(s) sold.

The incidence of this phenomenon has been increasing with therecent development of business-to-business (B2B) exchanges andon-line auctions. In all sorts of markets, a winner’s curse can haveconsequences for several parties, over months or even years. Insuch circumstances, auctions themselves may well be better con-ceived as relationship-building exercises rather than one-off bids.

The theory of auctions would suggest that the winner’s curse isasymmetric, i.e. it only affects the supplier or the winning bid.In this case however, the winner’s curse in a procurement auc-tion of ITO contracts and its impact on and consequences for therelationship between the customer and the winning bidderstarts the interplay of risk-shifting. The supplier winning a‘cursed’ deal may well cut losses by supplying lower-qualityproducts or services to the customer. Then the buyer, winningwhat turns out to be a cursed deal, may well drive a muchharder bargain in terms of service guarantee rather than price.The upshot may be that the buyer removes the offending sup-plier from its supplier listing.

Inexperienced suppliers tend to make unrealistic bids. Othersuppliers make bidding promises to ‘buy’ the contract.Subsequently however, the risks on not being able to recovertheir tendering, business, and operational costs could becomesignificant problems. The risk therefore has shifted back fromthe buyer to the supplier.

In an effort to recover their costs, the suppliers would eitherattempt to offer additional services from their portfolio of tech-nology capabilities, service management, and consultancy ser-vices over the life of the contract or, under pressure, to makesufficient margins in unfavourable circumstances and trade-offsin the quality of service. The risk, hence, is shifted back from thesupplier to the buyer. Case studies confirm that when a supplier

Understanding Risks When Outsourcing the IT Function

111

Chap-04.qxd 3/1/05 12:32 PM Page 111

Page 131: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

seeks to decrease its costs, this can result in decreases in servicequality and additional costs for the client.

Further, the supplier’s disproportionate concern for keeping itscosts down could lead to inflexibility in the interpretation of thecontract, and subsequently lead to adversarial relationships.Operational performance and the client–buyer relationship willreceive less attention and suffer; the success and effectiveness ofthe operations and outsourcing relationship will be comprom-ised. The focus of the supplier will be primarily on recoveringcosts, and not on developing and maintaining the relationshipand mutual objectives.

The process wherein suppliers are asked to bid in an ‘auction’provides a mechanism whereby the procurement of ITO ser-vices from lowest supplier induces the suppliers to disclose theirprivately known cost structures. As illustrated earlier, the auc-tion mechanism enables the buyer and supplier to match ser-vices and goods with an optimal price, especially in this instancewhere a standard market price is unavailable. While a discus-sion on auction mechanisms and variations in auction designsare not dealt with here, the risk profile identifies the tolerancelimits for both the supplier and the buyer organizations as inputinto the design for auction mechanisms. Costs and the relatedfinancial risks are important factors for a business organizationand the auction allows it to procure services at more competi-tive prices. In addition, ‘market solutions are viable for reducingdifferences in information and hidden action when these differ-ences are limited to a single dimension or when intermediariesexist to disseminate credible information regarding counter-party behaviour’. The supplier governance procedures are con-structed by the organization to mitigate informational and legalrisks. The RDS, once again, reveals this to the managers at an earlystage in both supplier and buyer organizations if the tool is used.

4.8 Agency theory

Agency theory provides a background to the interaction andmotivation of the supplier and buyer of outsourcing services.Opportunism, or the tendency to cheat as a means to gainadvantage, is an inherent characteristic of many relationshipswhere there is an agent and ‘buyer’. In the outsourcing relation-ship, this leads the supplier to adopt opportunistic behaviourwhenever the chance arises, to its own benefit. The assumptionis the tendency of the supplier to behave in this way despite the

Managing the Risks of IT Outsourcing

112

Chap-04.qxd 3/1/05 12:32 PM Page 112

Page 132: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

existence of moral and social norms as well as the constant riskof prosecution. Opportunism in turn manifests in terms ofmoral hazard, adverse selection, and imperfect commitment.

An essential area in the discussion of the main relationship risksin an ITO scenario is the relationship itself, from the viewpointof agency theory. This applies to both participants (the buyerand the supplier) within the ITO scenario. Agency theory men-tioned earlier postulates that because people are self-interested,they will have conflicts of interests over at least some issues.This occurs any time they attempt to engage in co-operativeendeavours. Some of the salient points of the behaviours thatmanifest are summarized in Figure 4.6.

Understanding Risks When Outsourcing the IT Function

113

Asset specificityUncertainty

Measurement problemsFrequency

Interdependence of activitiesProximity of core competencies

Technological discontinuity

Opportunism (moral hazard,adverse selection, imperfectcommitment)

Lack of experience/expertise with the activity to be outsourced

Lack of experience/expertise in managing outsourcingcontracts

Supplier interface

Lack of experience/expertise with the

activity to be outsourced

Lack of experience/expertise in managingoutsourcing contracts

Buyer Supplier

Figure 4.6 IT outsourcing risk factors between buyer and supplier (Tho, 2003)

Moral hazard arises as a consequence of the buyer not beingable to accurately monitor the activities of the supplier withoutincurring prohibitive costs. The buyer hence cannot easilydetermine whether a problem is the result of negligence on thepart of its supplier or to an unforeseeable event. This is a signifi-cant risk factor borne by the buyer, as the supplier has the‘excuse’ that poor performance is beyond its control. This leadsto an increased risk for the buyer over the supplier. The suppliercan choose to assign his best staff to a project or use his most inex-perienced teams without a thorough background check on everyperson placed on a project at every point in time. The existence

Chap-04.qxd 3/1/05 12:32 PM Page 113

Page 133: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

of the latter scenario is difficult to detect, but it may manifestitself in decreased reliability, excessive cost or project delays.

It can also manifest itself as a consequence of the supplier notbeing able to monitor the buyer. A buyer of outsourcing servicesmay undertake hidden investments even before the contract issigned. Many outsourcing agreements are based on an initialbenchmarking period where actual cost is measured, and thesupplier is given a bonus for cost reduction. Buyers excessivelyinvest in cost reduction before contract initiation in order tolimit supplier bonuses from cost de-escalation clauses.

Given the contractual nature of outsourcing, the service qualityis not as flexible as would be the case if the services were to bedelivered without the outsourcing services. These services,however, change over time, leading to discrepancies in the ser-vices requested and delivered. Switching-costs are high, and theinevitable loss of competence arises at all stages of the outsour-cing exercise.

The heterogeneity of the ITO market justifies the examination ofdifferent facets of the outsourcing market. For each segment ofthe market, different relationships between client and supplierform a vital portion of the framework in which risks in this envir-onment are examined. Contractual risks between the buyer andsupplier are a prime source of risks and a factor in the outsour-cing decision. The fundamental drivers of risk are informationasymmetries before contracting, inability to monitor partners’actions accurately, and exogenous changes that allow one partyto behave opportunistically. Reviewing the comprehensive con-tracting literature in economics and adapting it to the unique areaof ITO provide the basis for prescriptions on efficient and effectivecontractual arrangements. These prescriptions are in the formboth of governance structures that emphasize the importance ofownership of critical assets and of contractual remedies to pro-vide sufficient incentives to align parties’ interests.

If all actions that affect the value of a relationship are fullyobservable and verifiable, an outsourced contract is based on adocumented set of agreed requirements and the payments con-tingent on completing them. Incentive payments are then neces-sary to align interests between the buyer and supplier. Much ofthe economics of the agreement is about the incentive systemsand how they perform under different conditions.

Another critical economic issue in an outsourcing contract isrisk sharing. Both the buyer and supplier may have different

Managing the Risks of IT Outsourcing

114

Chap-04.qxd 3/1/05 12:32 PM Page 114

Page 134: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

preferences for risk, which generates opportunities for gains inthe contract exercise. As parties become increasingly risk averse,so too can the cost of very highly attractive contracts becomeexpensive because of the high-risk premium required.

Mutually unobservable behaviour may lead to inter-organizationalproblems associated with imperfect commitment. This fre-quently manifests itself through the problem of ‘double-sidedmoral hazard’ or mutual shirking.

‘Adverse selection’ arises when the buyer has difficulty choosinga supplier based on a given set of characteristics. Informationasymmetries can be so severe that markets for certain goods cancompletely disappear or only low-quality goods become avail-able for purchase. The appearance of selection errors that mayresult from an exaggeration of the facts by the supplier is com-mon and is known as ‘hubris’ or ‘over-exuberance’. This expec-tation gap between the supplier’s performance at the time ofselection and performance of work is a risk borne by the buyer.

When performance is not to the level expected and disputesoccur, both buyers and suppliers may not honour commitmentsthat were made at the time of contract agreement for reasons ofchanged circumstances. Imperfect commitment and unclearand/or incomplete contracts are often used as reasons. Again,the buyer carries significantly more risk, given that the ultimateresponsibility originated with and still resides with the buyer.

This risk from an inexperienced buyer could be to severely under-estimate transition and management costs. This puts the buyerorganization at risk and vulnerable to the supplier’s opportunisticbehaviour. On the other hand, the people resources taken overby the supplier from the buyer to manage legacy systems maynot carry over sufficient expertise to enable the management ofnewer systems. The inexperience of the buyer of outsourcingservices in the area of contract and supplier management alsointroduces a risk, particularly in the area where a relationshipexists between the buyer and a wide range of suppliers that pro-vide services for a prime supplier. The buyer ultimately carriesthe risks of diluted responsibility and opportunism.

The other risk factors relate to the transactions themselves. Assetspecificity is the degree to which an asset can be reused once thesupplier takes over operations, i.e. the extent to which its valueneeds to be sacrificed. Neither the buyer nor the supplier can predict with enough certainty the activities to be performedin the agreement. This is particularly true in the area of IT

Understanding Risks When Outsourcing the IT Function

115

Chap-04.qxd 3/1/05 12:32 PM Page 115

Page 135: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

management where the complex set of applications, hardware,networks and new technology is thrown into the mix constantly.This is aggravated by the fact that businesses are constantlychallenged to use this ‘IT mix’ to enable the proper functioningof core business strategy and operations. Unclear business object-ives cannot drive IT development. Subsequently also, IT cannotenable the appropriate business functions to deliver businessobjectives, which remain ambiguous. For example, electronicticketing has been seen as a strategic business enabler for com-petitive advantage. In a more remote setting, however, access tothe Internet is restricted to a section of the community as a resultof poor communications and social profile. Even if IT systemswere able to deliver Internet ticketing successfully, the strategywould still fail as a result of an ambiguous business objective.

Measuring the value of the activities, processes and itemsexchanged is therefore also a challenge. The frequency of activ-ities needs to be understood. It is beneficial to carry the risksassociated with investments or uncertainty rather than invest intransactions that only occur once. Outsourcing interdependentactivities within the IT function already causes serious difficul-ties. When IT is used to enable the running of business func-tions, this risk factor is compounded. For example, disputationover poor response time would then need to be attributed tomore than one system, and ownership would be difficult toidentify. Further, a risk factor arises if the supplier does not pro-vide the latest technology that enables the buyer organization tomaintain competitive advantage over its competitors.

A risk factor that is often highlighted and often not satisfactorilyinvestigated is when the core competence of a buyer organizationis outsourced. The buyer risks that the suppliers could either takeit over in its own market space, or move in directions differentfrom the ones the buyer might take strategically. Outsourcing an activity at the core of the organization could be potentiallydisruptive to the learning capabilities of its staff and reduce itsoverall competitiveness.

The governance structures set up during an outsourcing arrange-ment, the contracts, and the informal arrangements created toreduce conflict, to govern relations, and to increase the extent ofco-operation and benefits, will provide the framework of con-trols in the buyer’s arsenal to mitigate the ‘human’ risks presentedin an outsourcing agreement. A contract in itself, however, isalso an area of risk exposure. The same contract will inducechanges in behaviour and methods used, and hence also reduce

Managing the Risks of IT Outsourcing

116

Chap-04.qxd 3/1/05 12:32 PM Page 116

Page 136: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

the losses incurred associated with undesirable outcomes orreduce the probability of occurrences of such outcomes.

Amendments to the outsourcing contract are routine, eitherbecause the buyer organization’s needs are changing, or becausemost contracts are indeed incomplete. As a result, many sup-pliers have used high charges. New services or changes are thenrenegotiated for services rendered. The uneven risk profile isskewed against the buyer.

A lock-in situation often results from specific investments thatwere made by the supplier when the contract was first signed.At contract renewal time, if no other supplier is ready to makespecific investments, the client has no alternative but to continueits relationship with the current supplier. The supplier can thenincrease its fees because of this lack of an alternative. The lock-insituation is more likely to occur in an industry where there arespecialized IT requirements (buyer organizations for example)and there are only a small number of suppliers that are capableof managing the IT function. When the time comes to renew thecontract, the buyer organization will not have many alternativesto consider. The supplier can then almost dictate the conditionsof the contract and the risks to the buyer are escalated.

Service quality and service costs are two major issues in ITO.The literature shows examples of degraded service levels result-ing from outsourcing, including poor response time, poor turn-around time, late software updates and applications that do notmeet requirements. Along with service degradation, service costsrise. This imposes a more significant risk on the buyer than on thesupplier of outsourcing services. Financial penalties are oftenimposed for non-compliance with service quality arrangements.These contracts, however, also impose a formidable resourcerequirement for measurement and governance. This imper-fection, discussed earlier, does not help to mitigate this risk.

People- or resource-risks are also higher for the buyer comparedwith the supplier. After an outsourcing agreement is reached,often very few IT resources or little expertise remains in thebuyer organization. This creates an initially advantageous costposition. It can, however, also be viewed as dangerous, since theorganization will have lost its ability to use IT efficiently andeffectively, and will remain dependent on an external supplier.Again, the risk profile is highly skewed against the buyer.

Given that the RDS profiles measure the risk exposure value andallow the managers in the ITO exercise to understand the risks

Understanding Risks When Outsourcing the IT Function

117

Chap-04.qxd 3/1/05 12:32 PM Page 117

Page 137: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

dynamics, the next chapter provides some insight into theobserved relationship between risk dimensions that is evidentwhen the RDS is used. It is observed that the risk dimensionsare interrelated to a significant extent. This observation alsoreveals an opportunity that can be exploited in order to mitigaterisks, as explained in Section III (Mitigating (& managing) risksin IT outsourcing), the final component of the MUM methodproposed earlier.

Managing the Risks of IT Outsourcing

118

Chap-04.qxd 3/1/05 12:32 PM Page 118

Page 138: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managers who work with IT outsourcing (ITO) without usingthe risk dimension signature (RDS) tool or similar instrumentdescribed in the previous section, are often confronted with the predicament of having to rely on instinct and ‘gut feel’ forthe impending risks. Some organizations will have a higherpropensity for risk than others, and form a group of earlyadopters of the ITO concept. These organizations are not able toreap the maximum benefit of ITO as risk diminishes the benefitsaccruing to the ITO participants. There is, therefore, significantadvantage to be gained from understanding the workings of theRDS and its implementation in this environment.

5.1 Interaction between supplier and buyer in IT outsourcing

Risks are transferred via instruments like legal contracts andprocess changes between the supplier and buyer of outsourcingservices, and vice versa, on multiple occasions during the termof an outsourcing agreement. This extends the original observa-tion in this area on the shifting risks from the buyer to the sup-plier in the operations dimension. When the identified risks aretracked between the pair of stakeholders in a typical ITO exer-cise, an obvious ‘to-ing’ and ‘fro-ing’ of risk between the buyerand supplier is observed along several sets of risks. Importantly,however, in a ‘musical chairs’ fashion, the party left with therisk when the undesirable event occurs is stuck with the conse-quences. Supplier organizations experience a set of risks that areadopted from the buyer, and vice versa. A reasonable conclu-sion hence could be that, in an outsourcing arrangement, thereare no exclusive supplier or buyer risks, merely risks that areshared or remain with one party temporarily (then passed on tothe other party).

119

Risk interaction in IT outsourcing

When the head aches, all the members partake of the pain.Miguel de Cervantes (1547–1616)

Spanish dramatist and writer of Don Quixote

5

Chap-05.qxd 3/1/05 12:32 PM Page 119

Page 139: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

The paradox effect

There is also a ‘paradox effect’ that is observed. For example,when organizations outsource to save money, they often get moreworried about being exploited on cost; when they outsource toimprove service, they fear it may deteriorate; and when theyoutsource to avoid the hassle of management, they still need tocontrol.

The risks are either shared between the supplier and buyerthrough a series of agreements and activities or passed betweenrisk sets or types in the individual organizational risk-landscape.The objective of the tool proposed is to assist in illustrating andidentifying these risk sets and then determining the level ofrisks that can be tolerated at any single point in time. It allowsthe appropriate decisions and mitigating activities to be imple-mented early, in order to avoid often unbearable consequences.

Assume an organization has made the decision to outsource itsIT function to derive competitive advantage in its market spaceand improve operations and performance. Further assume thatthere are suppliers that have sufficient economies of scale andsuperior IT management practices to deliver improved servicesat a lower price, and that the resulting savings are those that theclient will benefit from.

A typical outsourcing selection process exists where a list of sup-pliers is created through advertising for an ITO project. Suppliersare invited to make submissions. They are then short-listedthrough a process where likely suppliers are identified based ona set of requirements. Once short-listed, suppliers are issuedwith a Request For Information (RFI) document that outlinesthe buyer’s objectives, services, assets, transfers, and issues ofrelevance to the outsourcing exercise. Suppliers respond bymatching the buyer’s expectations with their own capabilities,track record, reference sites, and associated information. Thoseselected are then ‘invited to tender’ and issued a Request ForProposal (RFP) or Request For Tender (RFT). The process maydiffer slightly as a result of probity and procurement regulationsoften already set out in the buyer’s corporate policies.

A supplier would likely undertake opportunistic behaviour, seek-ing to reduce its own operational costs, often at the expense of theclient. Social actors will behave opportunistically if it is advanta-geous for them to do so. This opportunism denotes the capabilityand willingness of organizations to pursue their own interests atthe expense of partners by withholding, for example, information.

Managing the Risks of IT Outsourcing

120

Chap-05.qxd 3/1/05 12:32 PM Page 120

Page 140: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Relationship dynamics between buyerand supplier

The selection process for a suitable supplier takes on the form ofan auction where several suppliers are invited to tender for theoutsourcing activity. As in an auction situation however, whenthe winner of the auction or bidding event systematically bidsabove the actual value of the objects or service, the bidder incurslosses. The suppliers are ‘squeezed’ to provide the lowest prices.The difficulty in such bidding circumstances is to select thosesuppliers that offer the best deal. There is little or no differenti-ation between suppliers that is obvious during the selectionprocess. Selection of the supplier hence tends to be based onwhat cost efficiencies suppliers can deliver.

The interplay of winning and losing scenarios is illustrated inFigure 5.1 where the ideal scenario would be for the buyer toobtain the best service delivery from the supplier, who in turnmust be paid a ‘correct’ price.

5.2 Implications of relationship for risk

To derive a win–win situation (Figure 5.1), the relative risks ofthe ‘supplier’ and the ‘buyer’ of services in the outsourcing ofthe IT function are expected to be shared almost equally. This isnot the case. While identifiable operational risks are transferredto the supplier, there are significant risks and inherent businessrisks that remain with the buyer. In addition to this, the risksassociated with the relationship make the risk scenario or profileoften too difficult to bear.

Risk Interaction in IT Outsourcing

121

Supplier

Buyer

Cost too high forbuyer

(Supplier securesprofit margin)

Lose–Lose

Lose(Negative impact)

Win(Positive impact)

Win–Win

Cost too high forsupplier(services

compromised)

Lose(loss-making)

Win(profitable)

Figure 5.1Interaction betweensupplier and buyerin the selectionprocess

Chap-05.qxd 3/1/05 12:32 PM Page 121

Page 141: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Interplay between buyer and supplier RDSs

That the buyer carries a larger RDS or risk profile in comparisonwith the supplier needs to be recognized by both sides in orderto derive a synergistic relationship. The emergence of partner-ship or alliance arrangements as alternatives to the formerlymore popular transaction-based contracts1 indicates a shift tocloser interactions between buyer and supplier. While partner-ship arrangements vary considerably in their operations, fromflexibly defined, formal contacts, to loose strategic initiatives,they also include the provision of shared risk and benefits.Transformational outsourcing provides for a set of partners whohave a considerable stake in the game, and often that meanssharing both risk and reward.

The need for successful outsourcing decisions and contractualarrangements in an ITO deal involves the understanding andmanagement of risks inherent in the deal. Risk assessment andrisk management are consequently critical contributors to thesuccess and/or failure of an ITO venture. The understanding ofthe relative risk profile or signature between the buyer and sup-plier of services will enable appropriate action to be taken tomanage the relationship.

While the direct financial benefits2, in terms of cost reduction,are a major driver to divest the organization’s ‘non-core activ-ities’, there is a clear move to the outsourcing of products and/orservices in consideration of scale and costs, that is, financial con-siderations. The risk, however, is often not qualified and canresult in losses not recognized in an organization’s financialstatements. This can be, however, qualitatively measured.

The outsourcing decision ultimately breaks down into a cost–benefit trade-off. Again, the important benefits that the organ-ization achieves when outsourcing include economies of scale,scope and specialization. To achieve these benefits, it incurscosts such as supplier organization search, negotiations, and legalfees to establish the relationships. ‘Outsourcing can ease manymaladies – people shortages, skills gaps, and over-ambitiouscorporate plans. But increasingly, it can also improve your chanceof seeing the inside of a courtroom’ (Goodridge, 2001). Thesecosts, however, are often dwarfed by contractual risks associatedwith inefficient contracts, owing to differences in information

Managing the Risks of IT Outsourcing

122

1 Usually a shorter and more tightly defined contract arrangement2 Often over a period of (5) to 10 years

Chap-05.qxd 3/1/05 12:32 PM Page 122

Page 142: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

between the parties (asymmetric information), inability toobserve actions comprehensively; and the inherent incomplete-ness of IT contracts. These risks are often driven by the largeuncertainty surrounding IT investments, parties’ inherent riskaversion and bounded rationality.

Sharing of risks between buyer andsupplier

When the buyer’s operational risks are being shared with thesupplier, this is often perceived as an advantage to the buyer.This is because the resources now required to support risk miti-gation for the buyer are reduced (as they are now shared withthe supplier). Along with the sharing of operations risk, theresponsibility for recovery from adverse activities as a result ofthe risk is also shared. These advantages provide support forthe argument for outsourcing. There are a number of criticalrisks of ITO, including cost increases, management issues, ser-vice failures, loss of expertise and negative business impacts,including loss of innovation. Finally, there are questions as towhether the potential benefits of outsourcing offset the manage-ment risks that it introduces.

If just the buyer side of the agreement is observed, then the oper-ational risks are qualitatively and arguably reduced. The otherrisks, including financial risk, risk on reliance of the supplierand environmental risks such as the catastrophic risk of busi-ness failure as a result of failure by the supplier to deliver, arearguably increased. The interplay between the risks and sever-ity of risks along each of these dimensions or risk sets appears totake on several characteristics including the ability to trade offone for the other and interdependence. Importantly also how-ever, the risks appear also to be able to be managed as a result ofcertain sets of actions taken by the contracting organizations inthe risks landscape.

5.3 Sharing risks within one organization,between value activities

Much has been said in the literature about the linkages withinthe organization value chain regarding the sharing of risks. Thevalue chain is a concept introduced by Michael Porter (1985),where the organizational activities, both primary and support,are grouped into various categories. Porter identified the link-ages between value activities that are interdependent and that

Risk Interaction in IT Outsourcing

123

Chap-05.qxd 3/1/05 12:32 PM Page 123

Page 143: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

provide the organization with competitive advantage throughcost or functional differentiation. By extrapolation, the linkagesstill exist for the risks involved when one of the major supportactivities like technology is intentionally removed for perform-ance by an external party. By implication, then, the risk profilesof the related value activities also change. The profiling graphprovides another analytical tool to monitor this change.

The value activities are linked through intricate relationships.For example, the implementation of a computerized organiza-tion resource planning (ERP) application tool will affect pri-mary activities such as supply chain activities, logistics withinand external to the organization and, finally, the complete cus-tomer experience. This is an anecdotal generalization but isfounded on many examples in the literature that can provideempirical evidence. A complete analysis is outwith the scope ofthis book. The point that needs to be emphasized, however, isthat the information gained through the use of technology isfundamental to exploiting value linkages. The downstreameffect of this exploitation of technology means that the risks arealso shared and spread between the activities in the value chain.

Risk signature/RDS – supplier

By focusing on the competence areas that are essential to the for-mation of competitive advantage through product innovation,marketing, and brand development, organizations become relianton specialized suppliers for providing best-in-class production

Managing the Risks of IT Outsourcing

124

Business

Operational

Legal

Financial

Technical6.0

5.0

4.0

3.0

2.0

1.0

0.0

Strategic

Business

Operational

Legal

Financial

Technical6.0

5.0

4.0

3.0

2.0

1.0

0.0

Strategic

Informational

Environmental

Firm infrastructure

Human resource management

Procurement

Inbo

und

logi

stic

s

Ope

ratio

ns

Out

boun

d lo

gist

ics

Mar

ketin

g &

Sal

es

Ser

vice

Technology development

Technical

Financial

Legal

Operational

Business

Environmental

Informational

Strategic

5.0

4.0

3.0

2.0

1.0

0.0

Business

Operational

Legal

Financial

Technical6.05.04.03.02.01.00.0

Strategic

Informational

Environmental

Figure 5.2 Example illustration of risk profiles in interdependent value activities in the organizationalvalue chain (value chain adapted from Porter, 1985)

Chap-05.qxd 3/1/05 12:32 PM Page 124

Page 144: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

services to quickly reap value from innovations and spread riskat the same time.

This in itself is a risk that needs at least to be understood to existand then managed in order to avoid unforeseen and often sur-prising events that could result in disastrous consequences. Arather straightforward example is when a buyer relies ‘blindly’on selected equipment (assets) and specialist services of an out-sourcing services supplier who in turn now chooses to raise theprices for its services. There are few choices open to the buyer ifthis event were not planned for and mitigated either through acontract, through a multi-supplier strategy or even through rig-orous governance processes.

Risk signature/RDS – buyer

Using a similar risk of reliance on an organization (see above),the supplier organization would invest in selected equipment(assets) and specialist skills to provide the relevant services.This increases its risk if the single buyer were to terminate theoutsourcing agreement prematurely. With the right mix of cap-abilities however, a supplier could reduce its business riskthrough structuring a multiple customer and/or multiple busi-ness profile.

In a typical IT support function, modularization of functionshelps suppliers to reduce the degree of asset specificity whilemaintaining the capability to offer customized services. Havingsuch capabilities, a supplier could further expand its customerbase and serve new application areas.

Suppliers, then, are able to ramp output up and down accordingto changes in demand. Similarly, suppliers are able to achieverelatively stable demand profiles, high capacity utilization rates,and low costs by pooling demand from a large number of customers (buyer organizations) if process technology depends

Risk Interaction in IT Outsourcing

125

a

b

c

d

e

f

g

h

12345

0

a

Supplier(s) Enterprise (Buyer)

b

c

54

210

3

d

e

f

g

h

Figure 5.3 A one-to-many relationshipbetween the buyerorganization and itssupplier(s) ofoutsourcing servicesas a strategy tomitigate operationalrisk of dependence

Chap-05.qxd 3/1/05 12:32 PM Page 125

Page 145: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

not on specific assets, but on generic assets, assets that are widelyapplicable to the entire customer pool, and suppliers have thecapacity to identify and meet the complex requirements of mul-tiple customers and transform that data into a format usable bytheir generic processes. With the commoditization of IT equip-ment, processes and techniques, more supplier organizationsare finding outsourcing a lucrative business.

To graphically illustrate risk or the negative outcomes, the dimen-sions of risk to be illustrated are technical, financial, legal, oper-ational, business, environmental, informational and strategic.The loss due to an undesirable outcome can be approximatedeither via quantitative analysis3 or via qualitative assessment ofthe organizational impact of each negative outcome.

5.4 Tolerance for risk exposure (risk appetite)

An outsourcing contract represents a long-term partnership(possibly over 5 years) where the constantly changing businessenvironment and conditions are managed through a govern-ance structure. Both the buyer and supplier [or external ser-vices provider (ESP)] has different preferences and tolerance forrisk, also described as the ‘risk appetite’. The risk premiumsrequired and costs for appropriate risk mitigation activities thatneed to be factored into the total project costs will differ given

Managing the Risks of IT Outsourcing

126

3 For instance, by evaluating the amount of sales lost due to disruption ofservice to customers

a

a

a

b

c

de

f

g

h

b54321 c

d

ef

g

h

5543210

4321

b

c

d

ef

g

h

Supplier(s)

Buyer (Enterprise(s))

Enterprise

Figure 5.4A reversedrelationship where asupplier’s risk profilechanges in line withits development ofmultiple relationshipswith manyorganizations/IToutsourcing projects

Chap-05.qxd 3/1/05 12:32 PM Page 126

Page 146: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

the individual project characteristics and the appetite for riskshown by the contracting organizations.

Risks indicate decision limits in an outsourcing context. The tol-erance for risk or risk appetite for uncertainty varies from oneorganization to another; hence it is important that, first, the levelsof tolerance are determined and the risk levels are then man-aged within these boundaries. For example, risk aversion haspaid off for many organizations in an increasingly complexbusiness environment as organizations seek to avoid risksrather than profit from them. As a result, they often overlook thehighest-value IT initiatives while spending money on safer butless valuable ideas. To what extent can these organizations, how-ever, tolerate the levels of risk or uncertainty? To remain com-petitive, organizations need to weigh the ‘safety’ currentcapabilities and assets against risks and ‘dangers’ of increasedefficiency and cost-cutting. It is not easy continually to change,as this requires a significant amount of energy, courage andinnovative use of new tools.

The RDS proposed earlier is a method to identify and presentthe multidimensional nature of risk that will enable subsequentunderstanding of its nature and the forces that either magnify orreduce risk. It is important for management to take a moreproactive role in the understanding of risk and its subsequentmitigation.

The elements of risk exposure and risk appetite of the buyer andsupplier are also contributory factors. Here, a project with shorterpayback period is considered better because of the lower per-ceived risks. The internal rate of return (IRR) of the ITO projectis focused on the stream of the future cash flows and is notimpacted by the cost of capital. If the cost of capital equals theIRR there will be no financial benefit from investing in the exer-cise. Therefore, IRR effectively creates a ceiling for the cost ofcapital as an example of one component that contributes to thefinancial risk appetite of the buyer organization. In a separaterisk dimension, the IRR is related to the level of operational riskexperienced. Generally, the higher the operational risk, the higherthe IRR. The IRR, however, reaches a stage where the increase inIRR is no longer acceptable or has exceeded the organization’sappetite for risk given the risk levels that are experienced (seeFigure 5.5).

In the example used for the illustration of this concept (seeFigure 5.5) it is arbitrarily assumed a Level 4 risk is the maximumreasonable exposure to a dimension of risk for, say, the technical

Risk Interaction in IT Outsourcing

127

Chap-05.qxd 3/1/05 12:32 PM Page 127

Page 147: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

dimension. The IRR estimated would then be about 45%. Shouldthe risk exposure decrease, in this example the IRR would alsodecline. If the supplier were prepared to take risk exposure upto an arbitrary level of 4, then it would need to be prepared toestimate its financial gains for such a risk exposure before agree-ing to perform the outsourced function. Another way of review-ing the ‘make or buy’ decision entails estimating that theexpected economic loss (transaction costs and contractual risks),given optimal contractual risk mitigation that can result from anoutsourcing contract, exceeds the expected economic gains (dif-ference in production costs). So long as the risks associated withthe outsourcing of any single activity do not have expected lossesthat exceed the expected gains, then, on average, the organiza-tion’s portfolio of activities should be economically neutral.

5.5 Mapping the risk signature

If arbitrary risk dimensions are then taken in the areas of risk,namely strategic, technical, financial, legal, operational, business(overall performance), environmental (business interaction) andinformational (access), one view of risk is fairly well represented.To measure risk sensitivity, a Likert scale on a multidimensional,numeric, empirical index of 0 to 5 is used where 0 represents zerorisk and 5, very significant risk. The risk signature (sample inFigure 5.6) can then be used to identify risk type, risk exposureand mix of risks for the organization at that point in time.

Empirical information is available from risk strategies and plan-ning documents. However, this methodology does not provide

Managing the Risks of IT Outsourcing

128

IRR unacceptable for averagerisk level greater than 4

4

3.5

4.5

2.5R

isk

leve

l

1.5

0.5

3

2

1

00 5 10 15 20 25 30 35 40 45

IRR

50 55 60

IRR too low for risk level(High risk, Low IRR)

IRR is reasonable for risk level(Low risk, High IRR)

Figure 5.5A reasonable risktolerance/exposurelevel could be ameasure of financialinternal rate ofreturn (IRR)(example witharbitrary data forillustration only)

Chap-05.qxd 3/1/05 12:32 PM Page 128

Page 148: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

precise measurements. The critical information derived repre-sents relative weightings of the risk in the key dimensions iden-tified. The difference between the risk profile of the supplierversus that of the buyer is already visible from a plot of relativeweight differences on each of the identified dimensions. Theresultant risk signature for the example used in this book isillustrated in Figure 5.6.

A version of the risk landscape would appear as a risk ‘signa-ture’ for the buyer of outsourcing services. Similarly the risk sig-nature for the supplier could be mapped. What is observed hereis that the signature for the buyer is relatively larger than thatfor the supplier in relation to risk areas that need to be consid-ered. A larger area denotes either a higher probability of risk ora higher loss as a result of the risk experienced. Importantlyhowever, the risk signatures paint a picture of the relative risksalong the risk dimensions, allowing for subsequent analysis andmanagement.

5.6 Evaluation dimensions

The data for the supporting dimensions will be derived fromthe supplier proposals and the organization’s executives. Thepreparation of the weighting criteria would, however, need tobe accomplished as part of the development of the assessmenttool. The weights applied to the different evaluation elementsneeded to be reasonable and applicable to the organization, itsindustrial sector and the IT function.

Risk Interaction in IT Outsourcing

129

Technical

Financial

Legal

Operational

BuyerSupplierBusiness

Environmental

Informational

Strategic

Figure 5.6The risk profiles of atypical supplier andbuyer of outsourcingservices show ahigh skew towardthe supplier (lowerrisk)

Chap-05.qxd 3/1/05 12:32 PM Page 129

Page 149: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

In Figure 5.7, there are four risk types that have been high-lighted for the simplicity of illustration. The resultant matrixwhen the probability of occurrence (likelihood) is mappedagainst the severity level (potential impact) defines the organi-zation’s risk portfolio (US Government Accounting Office,1999). What it reveals also is the risk tolerance boundary for theorganization. This imaginary boundary lies roughly at the bor-der between risk 2 and risk 3. This concept can then be trans-posed to the risk profile where all the risk exposure elements arealready plotted.

The potential impact on the business would logically form theweighting for the evaluation items. This is also proportional tothe risk exposure. The revised approach takes into account theproposed methodology already used in industry.

The dimensions for measurement would also need to be con-sidered. Given the objectives of the outsourcing exercise for theorganization, the basic outsourcing services as well as the busi-ness transformation work need to be compiled to show the bene-fits that would accrue from this exercise. The basic outsourcingof the IT function would derive from infrastructure (e.g. hard-ware, operating systems and databases) and applications (soft-ware that perform business functions). The additional valuethat is sought after, however, lies in the transformation of theorganization through the best practices delivered by the (worldclass) supplier. The transformation practices would be viewedfrom a systems and business integration perspective. Systemsintegration would deliver both the traditional services (includingfamiliarity and ability to deliver the infrastructure to operate thebusiness) and new directions (including new architecture for ITcomponents, processes and functions). The business integration

Managing the Risks of IT Outsourcing

130

Severity level

IIIIIIIV

High

Low

Risk 1 Undesirable and requires immediate attention

Risk 2 Undesirable and requires corrective action, but some management discretion allowed

Risk 3 Acceptable with review by management

Risk 4 Acceptable without review by management

Frequent

Source: US Government Accounting Office, ‘Information Security Assessment – Practices of Leading Organizations’, June 1999

Probable Occasional Remote ImprobableProbability of occurrence

Figure 5.7 The risk tolerance levels from the relationship between the probability of occurrence andseverity levels

Chap-05.qxd 3/1/05 12:32 PM Page 130

Page 150: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

advantage would come from the supplier’s understanding of theorganization’s business and business process re-engineering skills.

5.7 Analysing risk with the RDS

The analogy of a risk landscape alluded to in this chapter represents the rich mix of risk dimensions assembled to showthe interaction of risk exposure experienced by both the sup-plier and buyer of ITO services.

As discussed earlier, the RDS is based on various risk analysisframeworks. These risk analysis framework methods are con-structed from the measurement of loss and the probability of loss.

The grouping of risks along risk dimensions provides a stage onwhich risks of a similar nature can be brought together. As wasdiscussed earlier, this implies that the impact of minor vari-ations in measurement as a result of uncertainties in probabilityof loss magnitudes will be reduced.

With the ability to group risks, the RDS is formulated to illus-trate the various dimensions in which risks become manifest inthe ITO exercise. The variety of components of IT, the rapidchanges in the nature of each component, and the role of the ITfunction is accommodated because the RDS can be reused whenrequired. Specific areas from the outsourcing of the IT functioncan be researched and this allows for comparison between riskdimensions.

The information from the RDS is qualitatively illustrated and keyfeatures include:

● limits of risk or risk tolerance that can be borne by the organization;

● relative severity of risks between the one stakeholder andanother;

● areas where risk dimensions can be ‘traded’ for another;● mix of risks and areas of high risk stress (unacceptable risk

areas);● important risk dimensions (as defined by the organization).

Risk profile snapshots at two different points in time revealinformation on the effects on risks to the organization alongseparate dimensions as a result of these actions. The iterativeprocess then continues and becomes an input into the riskassessment methodology, defined in the following chapters,

Risk Interaction in IT Outsourcing

131

Chap-05.qxd 3/1/05 12:32 PM Page 131

Page 151: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

where the concepts and the tool are tested. Importantly also, therisk profile also allows the organization’s ITO governance teamto steer the activities in outsourcing knowing the stresses on therisk profile relative to these risk dimensions.

It is expected that various nuances and hues on the risk land-scape are discernible from the details in the case study (seeChapter 8), giving rise to points of contention. This, however,should not distract attention from the main objective of the exer-cise, which is to observe possible interaction between riskdimensions that arise in the outsourcing of the IT function. Theuse of the eight risk dimensions in Figure 3.8 needs to be veri-fied and substantiated each time the RDS is applied.

The RDS described in the previous two chapters is a tool developed specifically for the purpose of examining risks in theITO environment and examining risk profiles, as described earl-ier. The RDS was introduced in Chapter 3 to be used as the pri-mary tool for observation of changes in risk profiles. Thesechanges can be measured and observed by applying the RDS atspecific times during the ITO exercise.

The patterns portrayed by the risk profile in the previous chap-ter show risk exposure characteristics including the abnormallyhigh (peaks) or low (troughs) risks encountered at particularpoints in time. As the set of interrelationships change over time,the mix of risk exposure elements and their relative ‘weights’along each of the risk dimensions are also observed to change.The RDS illustrates risks along multiple dimensions and thenqualitatively describes the relationships between the risk dimen-sions that arise in the outsourcing of the IT function. This is doneby comparing two versions of the RDS for the same ITO exerciseusing the same parameters, which change because of eventsthat have occurred in between each recording. During an ITOexercise, the RDS tool can then be used to illustrate the risk pro-files that will verify the objectives stated at the start of the book.

The most significant changes in the risk signature are expected tooccur when there are new activities or significant changes madeto existing processes that occur during the course of the out-sourcing exercise. The changes in the RDS profile will demon-strate and validate previous observations and hypotheses on risksharing and risk transfer between the buyer and supplier. Thechanges in the risk exposure along each of the risk elements(grouped by risk dimension) are recorded in the RDS illustra-tion; observations of changes in the risk patterns over time showthe existence of relationships between the risk dimensions.

Managing the Risks of IT Outsourcing

132

Chap-05.qxd 3/1/05 12:32 PM Page 132

Page 152: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

When changes are made via programmed activities, risks in therisk dimensions also change. The patterns of risk signature andthe size of the total risk exposure throughout the outsourcingexercise are observed to remain constant. The risk exposure val-ues are observed to change within an organization as the natureand use of the IT function change (owing to changes in the pro-file of the IT components, people or processes). The conclusionis that there exists a set of interrelationships between actionsand the effects of these actions that influence the risks along keyrisk dimensions, so keeping the total risk exposure for the exer-cise constant.

For illustrative purposes, the buyer and supplier have beenassigned arbitrary risk exposure levels of 6 and 5 respectively in Figure 5.8. In the equally spaced, octagonally shaped RDSexample, equal risk exposure on all eight risk dimensions isillustrated. The total risk that the buyer is exposed to is largerthan that of the supplier.

The risk signature patterns that take shape then provide visualclues to the relationships between the various risk categories ordimensions. For example, an octagonal (almost circular) RDS inFigure 5.8 represents equal risk levels in all dimensions and aprotrusion from this circle would represent a point of stress,where the risk is higher than in any other dimension.

The choices made by either the buyer or supplier of ITO servicesthen influence the effects of risks directly; they also indirectlyinfluence the shape of the risk signature along the risk dimensions,forming new risk dimension signatures (RDSs). For example, therisk exposure values are illustrated according to the characteris-tics of risks along the eight dimensions that are relevant to theoutsourcing exercise for the case study (see Chapter 8).

Risk Interaction in IT Outsourcing

133

Technical

Financial

Buyer

Supplier

Risk

Operational

Business

Environmental

Informational

Strategic

6

4

2

0 LegalFigure 5.8Risk levels for bothbuyer and supplierRDSs indicate equalrisks along alldimensions

Chap-05.qxd 3/1/05 12:32 PM Page 133

Page 153: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Empirical measurement

As this tool is empirically based, detailed observation of riskswithin the ITO environment will need to be collected and pre-sented. Risk exposure values for any ITO activity are influencedby a very complex set of factors. Environmental factors such asorganizational politics, people issues, changes in policies andglobal events directly affect a business organization and its deci-sions on competition. These complexities overlay such mattersas IT governance and radical changes in IT hardware, softwareand the networking environment. Hygiene factors and behav-ioural factors that contribute to the elements comprising agencytheory also add to the possible outcomes in the permutationsthat can be made in this already complex environment (summa-rized in Figure 5.8).

To obtain data for the RDS, informal, semi-structured interviewsare conducted. As opposed to the formal or structured interviewsthat have an explicit agenda, informal interviews have a specificbut implicit research agenda. Informal interviews can be used todetermine the categories of meaning in a culture and are use-ful in discovering what people think and how one person’s per-ceptions of risk compare with another’s. There is no standardmeasure of default values or tolerance levels in organizationalperformance. The empirical qualitative research method henceis suggested for the collection of risk data for the project. Theobservations can include nuances of behaviour of key stake-holders and key risk drivers following the specific observations.

Data on risks and risk exposure

Primary data can be gathered using planned and structuredinterviews, focus group sessions and the Delphi technique. Thistechnique was developed by the Rand Corporation in the late1960s as a forecasting methodology. Later, the US Governmentenhanced it as a group decision-making tool using the results of Project HINDSIGHT, which established a factual basis for the workability of Delphi. Planned and semi-structured per-sonal interviews were conducted with current personnel fromvarious departments as well as business consultants in theteam. The interviews were designed to assess the interviewees’responses to the risks involved in the outsourcing exercise. Theinformation gathered was then used to construct question-naires, develop the risk dimensions and subsequently measuresome of the risk exposure values. In the focus group sessions for example, the personnel from the IT planning area gathered

Managing the Risks of IT Outsourcing

134

Chap-05.qxd 3/1/05 12:32 PM Page 134

Page 154: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

specific information on risks in the area of IT planning. The Delphitechnique was subsequently used to ‘guide’ debate through thediscussion sessions in order to obtain the relevant informationon the risks and risks dimensions required.

The research involved data accumulated through the author’swork with multiple organizations on ITO projects. Secondary datawas obtained from commercial project documentation as well ascommonly available sources such as project reports, the Internetand other available data on the IT function within the organiza-tion. Certain key assumptions and concepts provide the basisfor the exercise. The first is the concept of causality and randomactivity used when observing the risks that occur during theITO exercise, as previously discussed. The other idea used isthat of external influences on activities in the same exercise.

Interaction between categories

Inherent in the operations of the organization are technical,financial and operational risk. An interpretation of the types ofrisks that are categorized in each of these areas is subjective.This can change as the exercise changes. It is most relevant andcritical, however, that use of the tool and its concept is observedand applied throughout the ITO exercise.

The tool that is proposed has been used to identify previouslyneglected areas of risk that the buyer organization may carry.For example, the business risks that increase as a result of theoutsourcing exercise include the responsibility for the resultsdelivered by the supplier organization. Should the supplier notdeliver as promised, it is the buyer organization that ultimatelysuffers. The increased risk that the buyer organization carriesneeds to be mitigated. Before this step, however, it must identifywhere its tolerance for risk along the business risk dimension lies.

In many instances, as outsourcing is an accepted way of gettingsuperior results, the specialist services offered by the suppliermust be ‘better’ than those of the buyer. Often the ability to focus(core competency), economies of scale and financial support areadvantages that the supplier has in its arsenal to assist in provid-ing these services. Many ITO agreements fail, however, whenthere are disagreements on the use of these resources as bothbuyer and supplier require unfettered access. The RDS also pro-vides a scenario where the benefits and risks can be illustratedand thus fairly shared. This means that the patterns or signaturesare modified to the extent that both organizations benefit.

Risk Interaction in IT Outsourcing

135

Chap-05.qxd 3/1/05 12:32 PM Page 135

Page 155: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

It is proposed that the RDS exercise is not one that should beconducted procedurally without an understanding of the exer-cise through observation, involvement and application of artis-tic management. It has been demonstrated that the complexitiesand variables involved are far too intricate for a mathematicalmodel to be derived. This does not in any way contradict theuse of the methodology for the construction of the RDS describedpreviously. It is the combined use of heuristics, current observa-tions and qualitative findings that plays a vital role in achievingan accurate and usable result.

Managing the Risks of IT Outsourcing

136

Chap-05.qxd 3/1/05 12:32 PM Page 136

Page 156: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Mitigating (& managing) risks in IT outsourcing

Section III

Chap-06.qxd 3/1/05 12:33 PM Page 137

Page 157: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 158: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

There is a need to control the characteristics and behaviour ofrisks to reduce the effects of those risks. Risk mitigation activityis an essential component part of the process of ensuring pre-dictable outcomes for the ITO exercise, and consequently also ofbeing able to derive maximum benefits from the ITO exerciseitself. Risk mitigation tasks are part of good project management.It is more effective, however, if project managers have the abilityto translate information on possible risks into useful knowledge.With this knowledge, both the buyer and the supplier organiza-tions can formulate a set of practical responses to reduce theeffects of risk. Targeted communications programmes, actionsand policies can then be put into place using this information, toreduce the effects of risks. This will, in turn, increase confidencelevels and allow ITO to be more readily accepted.

In an ITO exercise, the RDS tool introduced earlier allows risks tobe identified and illustrated in order to make it possible to controlthem. The information gathered is used to examine risk behav-iour and the various forms of risk profiles formed. Additionalsteps can then be taken to reduce the anticipated harmful effectsof risks on the range of departments in and functions of anorganization.

It is, however, often impracticable to measure events or risksthat have not yet even taken place. In addition, there are manyrisks that are not yet defined but may, nevertheless, occur. Asdemonstrated in the previous chapters, the RDS tool allows theselected risk elements, together with causes and influencing fac-tors, to be differentiated for management attention and subse-quent control. This again is occasionally insufficient to representall the risks dimensions, which may change over time. Change

139

Risk characteristics and behaviour inan ITO exercise

Who controls the past controls the future: who controls the present controls the past.

George Orwell (1903–1950), author of Nineteen Eighty-Four

6

Chap-06.qxd 3/1/05 12:33 PM Page 139

Page 159: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

makes the one-time portrait or snapshot of risks constructedwith the RDS quickly obsolete. In order, therefore, to anticipaterisk patterns over time, the interaction between risk dimensionsand the behaviour of risks in an ITO exercise needs to beobserved and mapped to identify specific patterns or trends, aswill be illustrated in this chapter.

The old adage ‘to expect the unexpected’ can be invaluable advicein a situation like IT outsourcing (ITO). Frequently, the occurrenceof unexpected events directly influences other events, which even-tually thwarts the objectives of the outsourcing process. It ischallenging to monitor all facets of risk without using an instru-ment like the RDS. Many cases of ITO failures have been reportedand, as a consequence, outsourcing projects are quickly seen to beof dubious worth or, even worse, deemed to be unworthy ofconsideration; therefore, in the latter scenario, managers preferto avoid this topic altogether. This means that outsourcing pro-jects and, therefore, also the business benefits thereof, are nevertaken advantage of.

With the RDS tool, risks are measured and translated in a mean-ingful format for the people who manage the projects and drivethe organization’s activities to work with. Having measured andunderstood (see the MUM methodology in Figure 6.1) the risksthat become manifest in the ITO project, managers will thenneed to formulate a specific action agenda to mitigate theserisks using the RDS instrument. Figure 6.1 is repeated belowfrom Chapter 2.

This chapter introduces new ideas, possibly abstract in naturebut important in the process whereby risks can be mitigated.Techniques based on research and practical experience gainedfrom multiple ITO projects are introduced as the ideas are pre-sented. A peculiar phenomenon described in this chapter appears

Managing the Risks of IT Outsourcing

140

Risk

Measure

Understand

Mitigate

Figure 6.1Managing risks inan IT outsourcingenvironment (Tho, 2003)

Chap-06.qxd 3/1/05 12:33 PM Page 140

Page 160: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

to consistently portray the behaviour of risks in the ITO envir-onment. This observation is then used to predict some of thechanges and behaviour of risks that manifest themselves in theITO scenario. A significant part of this chapter is devoted to con-cepts and ideas, because this is an area that bridges the gapbetween the understanding of risks and actually mitigating them.

Risks behave by nature unpredictably but, if a structured andmethodical analytical process is followed, it has been discoveredthat certain patterns can be identified that allow predictability,albeit with selected constraints. It is very important to intelli-gently apply the concepts introduced here and not to use them‘as-is’. To assist in this process, I have also included a case studyin Chapter 8 that shows some of the concepts being applied. Theslight modification of what is described in this chapter illus-trates and reinforces the point that the framework proposed actsonly as a guide and must be customized to the reader’s ownrequirements.

6.1 Behaviour of risks

As with the definition of outsourcing given in Chapter 1, it isoften taken as a benefit that operational risks are mitigated by thebuyer organization ‘passing’ them to the supplier of ITO services.As such, operational risks are ‘passed’ from the buyer to the sup-plier organization when the IT function is outsourced (Bensaou,1999). When the operational risks are transferred out, however,the risks along the legal, financial and strategic risk dimensionsare observed to increase (see also examples in Chapter 8).

Although the other risks that exist are totally unrelated to oper-ational risks, the risk dimensions that relate to them appear tochange as if to compensate for the loss in operational risks. Thesechanges occur to the extent that the total risk exposure for theparticular ITO exercise remains relatively constant. This apparentinterrelationship is always observed (see also further observa-tions in Chapter 7). The various assumptions and suppositionsthat have been made are outlined in this chapter and in Chapter 7.

Many of the estimates of the probability of an occurrence, andalso the possibility or prospect of loss, are based on heuristics orprevious experience. To qualify an observation made, we need acomprehensive set of data. The structured approach suggestedin Section II provides a framework in which risks can be identi-fied. This does not mean, however, that all possible risks can beidentified. Some risks that will not have been included would

Risk Characteristics and Behaviour in an ITO Exercise

141

Chap-06.qxd 3/1/05 12:33 PM Page 141

Page 161: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

account for a shortfall or access risk exposure for the organiza-tion. It was also proposed in the previous chapter that if the rela-tionship between cause and effect could be determined, then notall the risks would have to be defined at the outset.

Another important observation is that a specific relationship existsbetween several risk dimensions in an ITO exercise at any point intime. This implies the presence of linkages or a correlationbetween these risk dimensions. The complex causal models intro-duced in the previous section and illustrated via one-to-manyand many-to-one relationships also contribute to a suppositionthat the risk dimensions exhibit some form of risk relationshippattern. Observations made from a variety of perspectives pro-vide evidence to show the presence of definitive links betweenthe risk dimensions in a relationship of this type.

Risks do not react or move on command. Instead, risks gener-ally appear to change according to various causes and extrane-ous factors. Although the causal framework has the connotation ofdeterminism and necessity, in practice causal relations are muchmore subtle and less straightforward than they may initiallyappear. An example of a causal relationship is the scenariowhere drinking alcohol and/or talking on a mobile phone whiledriving causes accidents. This does not actually mean that theconsequences are likely or certain. By way of analogy, it is moreaccurate to say that the probability of an accident increases whendriving under the influence of alcohol or driving while having a conversation on a mobile phone. The accident risk exposurehowever, has increased in these circumstances.

Failure to make IT system backups, to look at another example,does not imply an inability to recover from a hard-disk failure.The practical notion of causation requires the ability to expressit in various degrees of likelihood or probability. In the instanceof ITO, the causality assumption can also be observed throughthe myriad factors that influence the ITO exercise. This is mademore complex over time as the combination of events and activ-ities also change. The effects of events and actions are related toobservable causes. Multiple causes, however, also overlay oneanother at different points along a timeline and blur the abilityto observe a direct relationship in this phenomenon. It is import-ant that causality is embedded and mixed within the original con-cepts of creation and random occurrence. In comparison withthe development of models explaining the effects of empiricalobservations, there has been relatively little development of for-mal models to account for the effects of such prior knowledge.

Managing the Risks of IT Outsourcing

142

Chap-06.qxd 3/1/05 12:33 PM Page 142

Page 162: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

6.2 Risk appetite

Imagine an individual managing an IT operation for an organ-ization wishing for the mythical ‘perfect project’, i.e. the projector business venture that carries no risks. In this fabricated scen-ario, all activities proceed as planned. The organization in thisinstance has no risk appetite and cannot tolerate any risks at all.It is a situation where there is either a zero probability of anyundesirable outcome, or a situation where the loss incurred as aresult of an undesirable outcome is always zero.

A more reasonable and realistic view of things, however, is ascenario where the project is barraged with outcomes that areboth undesirable and unsolicited. We also find that most organ-izations have a certain level of tolerance for things that may gowrong, i.e. a level or appetite for risks; the risk exposure valuesare actively managed within ‘acceptable’ or tolerable levels.These tolerable levels of risk are referred to as the ‘appetite forrisk’ of the organization (see also ‘risk appetite’ in Chapter 5).

An organization’s appetite for risk is distinctive as it is largelydependent on selected characteristics of the organization. Forexample (largely exaggerated to convey the point), a diversifiedconglomerate that is heavily funded may have a relatively highertolerance for financial risk (or a larger appetite for risk) comparedto a small organization that is owned by an individual, with arelatively lower appetite for financial risks. The smaller organ-ization would not have the capability to recover from a financialdisaster as well as the larger organization with significantlygreater monetary reserves that it can call upon.

6.3 Fundamental assumptions inunderstanding risks

Three fundamental assumptions have been made so far, whichare outlined below.

Cause & effect

The first is that all risks are subject to a cause and effect relation-ship. The causes, however, manifest themselves as either natur-ally occurring or through direct intervention (i.e. throughcareful planning and deliberate action). The observable inter-action between internal and external influences on the risk expos-ure features cause and effect. This shows the existence of adirect relationship between the risk dimensions. For example,

Risk Characteristics and Behaviour in an ITO Exercise

143

Chap-06.qxd 3/1/05 12:33 PM Page 143

Page 163: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

we say ‘A caused B’. We know A occurred and B occurred, and ifA had not occurred then neither would B. Bayesian theory woulddetermine the probability of the occurrence. In this instance,however, extending these notions on categorization, we assumethat the effects of the risks categorized in risk dimensions arepooled and already considered when observing the empiricaldata. Simply put, the risk dimensions hence have already pooledthe effects of the risks. This assumes that the risks in the samecommon pool have common causes.

Internal/external influences

In the second assumption, the internal-influences phenomenonis limited to an individual organization as opposed to a group ofinteracting organizations. For example, where the RDSs for twosuppliers competing for the same project are illustrated, theinteraction between internal influences is only for the individualsuppliers (or intra-organizational). The same logic is extendedto assume the alternative situation; that is, there is a relationshipbetween external influences only in an inter-organizational situ-ation. This assumption is different from the other two as it breaksdown quickly in practice. The classification of influences as‘internal’ and ‘external’ does not apply; the influences combinein effects on risks. This assumption is deliberately maintained,however, to show the distinction between the competing envir-onment (external influences) and organizational strategy (inter-nally controlled).

Accuracy of risk classification/grouping

The third major assumption is that the risk classifications reflectthe risks in the ITO exercise sufficiently to provide an accurateillustration of the risk landscape. Risks experienced in an ITOexercise are categorized into the eight dimensions crafted, dis-cussed, tested and verified against several scenarios in the pre-vious chapters. While these dimensions apply to the majority ofITO exercises, in others and for some types of organization, thismay not be the case as risks are subject to and have a relation-ship with the prevailing conditions (as discussed in Chapter 3).

6.4 Effects of influences

Suppose all the risks experienced are caused by events andactions, whether purposeful or otherwise. These events andactions become influences, originating from either internal or

Managing the Risks of IT Outsourcing

144

Chap-06.qxd 3/1/05 12:33 PM Page 144

Page 164: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

external sources. It is intuitive then to assume that the risks experi-enced in an ITO exercise are related to changes in the environ-ment, practices in the market and internal operations. Since therisk dimensions proposed correlate to the influences, the riskdimensions themselves may be used as indicators for the factorsinfluencing the risks. To investigate the difference in externalinfluences, the RDS profile for one organization is taken overtwo separate points in time (see case study in Chapter 8).Differences would be expected to originate predominantly fromexternal influences.

It is the specific nature of this relationship between risk dimen-sions that is observed. Clues to its behaviour are sought byobserving changes in the RDS patterns. Although the risk expos-ure values are dynamic, it is not certain if the total risk exposure1

for the project itself changes. The background and reasons for astatic total risk exposure cannot be expounded in this book but,supposing there is an observed state of stasis over time, then thedynamics of the changes in risk exposure can be managed moreeffectively.

6.5 Relationships between risk dimensions

Many propositions have been raised that cover the relationshipsbetween the supplier and buyer organization in an ITO exerciseincluding agency theory and possibilities of some sharing ofrisks between the participating organizations. While there arerelationships between the risk dimensions observed within anorganization (i.e. either buyer or supplier), there are also rela-tionships between risk dimensions between organizations (i.e.both the buyer and supplier).

The changes in the risk dimensions also appear to be time-related functions. That is to say, the dynamics of change along allthe dimensions change with time. At any single point in time, allthe risk dimensions in the RDS profile are constant. The magni-tude of risk exposure (RE) along any of the risk dimensionschanges. The changes hence are also functions of magnitude.The degree of interrelatedness between each risk dimension alsoappears to change, giving rise to a third function. The changes area function of degree of relatedness. A brief discussion on notion ofrisk balancing later in this chapter provides further background.

Risk Characteristics and Behaviour in an ITO Exercise

145

1 Previously defined as the mathematical sum of risk exposure along all therisk dimensions in an IT outsourcing exercise

Chap-06.qxd 3/1/05 12:33 PM Page 145

Page 165: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Further, there are three key characteristics that are exhibited bythe risks in this situation. These characteristics include the riskbalancing phenomenon, the concept of total risk exposure andthe existence of a state of equilibrium.

Risk balancing

In an ITO environment, risk profiles are often short-lived, i.e.they change rapidly in response to changes in the environment.Peculiar to outsourcing, there are two very closely linked organ-izations: the buyer and the supplier. Both these organizationswork towards a ‘win–win’ situation where the risks are almostequally shared. This state of ‘risk balance’ provides the mostequitable form of partnership where both parties are motivatedto jointly reduce the risk exposure. In a ‘risk balanced’ state, therisk areas (bounded by the risk signature) for the buyer and sup-plier are almost the same, and a state of equilibrium is reachedwhere both participants share almost equal risks.

Changes in risk exposure (RE)

As previously proposed, the risk exposure depicted by the RDSis demonstrated by the equation simplified in Chapter 4 and re-illustrated below for reference.

Managing the Risks of IT Outsourcing

146

Risk dim A

Risk dim H

543210

Risk dim B

Risk dim C

Risk dim D

Risk dim E

Risk dim F

Risk dim G

Buyer

Supplier

Figure 6.2Re-illustration of theRDS equation (fromFigure 4.2 inChapter 4)

But � � 45° where there are 8 dimensions. Therefore,

Risk 0.5sin risk risk (risk riski (i 1) 1 8� � � ��� ( ) )ii

i

1

7

∑∑⎡

⎣⎢⎢

⎦⎥⎥

Chap-06.qxd 3/1/05 12:33 PM Page 146

Page 166: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

where � � 0.3536

The equation carries a constant �, that is dependent on the num-ber of risk dimensions in the ITO exercise. The value of � is cal-culated. The total risk exposure changes are the total risk profilechanges. When the number of risk dimensions change, then thevalue of � also changes, where � � sin(360/(# risk dimensions)).Sample values of � are listed in Table 4.1 in Chapter 4.

Through simplification the total risk exposure, �, or area under the RDS with a selected profile, can be easily computed as � �� (� (product of adjacent risk magnitudes)), where � is a con-stant depending on the number of risk dimensions. Then,assuming {� [� (product of adjacent risk magnitudes)]} is a con-stant at one point in time we can represent this signature as aconstant, beta (�). These changes are therefore observed to bealmost zero over time for any particular ITO exercise. This isalso demonstrated in the case study exercise in Chapter 8, and isobserved to apply to the buyer organization and its total riskexposure profile over time.

State of equilibrium

When both the buyer and supplier are considered together andassuming a natural state where �� (buyer) � �� (supplier), thenthe objective is to achieve a situation of equilibrium where therisks are described mathematically as

over time, for both the supplier and buyer organizations. Anyfluctuations in risk exposure for � (buyer) should, throughnegotiations, control and governance, be also reflected for ��(supplier). The use of the infinite limit is for illustrative pur-poses only, i.e. to show that over time the buyer and supplierwould reach agreements that determine equity for both sides.

In summary, the equation describes a situation over a significantamount of time, when the buyer and the supplier profileswould be the same. In an RDS, there are an infinite number ofvariables that need to be accounted for; also risks are not forcesof nature but a humanly derived concept. The concept of a state

(buyer). (supplier). 00

dt dt� ���

∫∫0

Risk risk risk (risk riski (i 1) 1 81

7� � � ��

� ( ) )i

i

∑∑∑⎡

⎣⎢⎢

⎦⎥⎥

Risk Characteristics and Behaviour in an ITO Exercise

147

Chap-06.qxd 3/1/05 12:33 PM Page 147

Page 167: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

of equilibrium also exists when the RDS is perfectly octagonal(for eight risk dimensions). This is the state where the risk expos-ure in all the dimensions is the same and there is no further needto trade one risk off against another. The magnitude of the riskexposure, i.e. the area bounded by the octagonal RDS profile,then needs to be reduced.

By way of comparison, the analogy of the lever, where the mag-nitude of the force and distance away from the fulcrum can becontrolled, can be applied to both the risk exposure (�) signa-ture, and time (t), through an understanding of the relationshipsbetween risk dimensions. The fact that the two equations involvedsimplify to two controllable variables is completely coinciden-tal. The main assumption, however, is that the variables can becontrolled via the manipulation of events, actions or activities.

The RDS profiles in this chapter can be extended to show the riskbalancing phenomenon which was observed during the exercise.Risk balancing occurs when several events are made to occur inorder to mitigate the risks along one of the risk dimensions, whichaffects other risk dimensions to the extent that an almost perfectoctagon is achieved. By way of analogy, this is much like a see-saw where there is a relationship between the load and dis-tance from the fulcrum where Work (W) � Load (L) � Distance(D) from the fulcrum (Figure 6.3). This is a simplistic examplewhere the see-saw will come to rest in a horizontal state whenW1 and W2 are equal.

The analogy ends where there are a finite number of variables inthe equation for the lever; moreover the lever is governed by thelaws of motion. This is, however, consistent with the observa-tions made during this exercise. Each time the risk factors andrisk exposure are high (indicated by a spike in the RDS), therisks from another risk dimension can be used to reduce the firstdimension. The case study (see Chapter 8) describes a suitableenvironment to observe this phenomenon. It has been shown

Managing the Risks of IT Outsourcing

148

D1 D2

L2L1

W1 � L1 � D1 W2 � L2 � D2

Figure 6.3The lever and forcesin equilibrium

Chap-06.qxd 3/1/05 12:33 PM Page 148

Page 168: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

that there is a direct and immediate relationship between therisk dimensions to the extent that the risk exposures along eachof them compensate for the increase or reduction in the othersuntil the total risk exposure for the organization’s ITO exercisereverts to the original value.

There is a period over which the total risk exposure appears con-stant. There is also a period, which could be many times longer,when the total risk exposure for both the supplier and the buyeris the same. Two major areas where the new understanding ofthese characteristics of risk dimensions could be helpful includethe determination of strategies to shape the risk profile to withinan organization’s tolerance limits, and the optimal duration ofITO contracts.

6.6 Game theory

Game theory is another perspective that can be used to describeconditions in which different types of organizational arrange-ments develop and change. It involves the interaction betweenindividuals or organizations. McMillan (1992) mentions thatgame theory ‘is a study of rational behaviour in situationsinvolving interdependence’. The notion of equilibrium and astate of constancy observed in the scenarios in this chapter arearguably closely coupled with game theory.

Game theory is not concerned with defining objectives, design-ing the alternatives or assessing the consequences where these areconsidered as being of external derivation or previously deter-mined from the RDS data. It offers two main approaches. Thefirst exploits criteria of choice developed in a broader context by game theory, as for example the max–min rule, where wechoose the alternative such that the worst possible consequenceof the chosen alternative is better than (or equal to) the best pos-sible consequence of any other alternative. The second approachis to reduce the uncertainty in the case of risk by using subjectiveprobabilities, based on expert assessments or on analysis of previ-ous decisions made in similar circumstances. With informationfrom the RDS and relationships between each risk dimension,the alternative actions by the team will have one of several pos-sible consequences. The probability of occurrence for each con-sequence can be computed and hence each alternative can beassociated with a probability distribution. The decision-makershence can make choices among probability distributions. Whenthe probability distributions are unknown, one speaks aboutdecision under uncertainty. Game theory then ranks the possible

Risk Characteristics and Behaviour in an ITO Exercise

149

Chap-06.qxd 3/1/05 12:33 PM Page 149

Page 169: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

decisions using a set of criteria consistent with the decision-maker’s objectives and preferences.

The payoffs for the variety of situations that occur between thebuyer and supplier also represent various conflicts. In this situ-ation, gains and losses may be unequally distributed, which allowsthe representation of numerous competitive and conflict situ-ations. Game theory then proposes several solutions, e.g. in amin–max strategy each of the participants minimizes the max-imum loss the other can impose on him; a mixed strategyinvolves probabilistic choices. Experiments with such gamesrevealed conditions for co-operation, defection and the persist-ence of conflict. If we combine this scenario with the theory pos-tulated earlier, i.e. that the total risk exposure is in a state ofconstancy throughout the exercise where the dynamics of therisks along each risk dimension compensate for one another inthe course of the exercise, then there is a state where there is anequilibrium to be reached. There is no overriding winning strat-egy that either the buyer or the supplier needs to make.

When the observations and theories proposed in the previoussections are compared with the component parts of game theory,then the connection is not as far fetched as it may initially appear.It lies very much in the interaction between the supplier and thebuyer organizations which, in turn, determine and influence therisk profiles. This was used in the context of formulating a tool forthe understanding of information services outsourcing (Elitzurand Wensley, 1997). A situation in game theory arises where theNash equilibrium is observed (Nash, 1951; 1953). A Nash equi-librium situation arises where a set of strategies of all players ina game exists when no player has incentive to deviate from hisstrategy given that the other players do not deviate. The math-ematical principles of game theory involve an analysis of inter-actions among various economic players. This is highlightedhere for comparative purposes in relation to the ITO exercise.

The point needs to be raised that a situation might develop inwhich the total risk exposure remains constant despite the changesin the risk profile. This supports the argument where the strate-gies of both the supplier and the buyer also reach equilibriumwith knowledge of this state. This concept can be explored fur-ther to include the ability and interaction of the parties – buyerand supplier – to influence the RDS. In his paper, Nash focusedon rivalries in which all players could benefit, showing thatthere were solutions to game theory problems in which noplayer would be able to do better than any other player, even if

Managing the Risks of IT Outsourcing

150

Chap-06.qxd 3/1/05 12:33 PM Page 150

Page 170: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

one player knew what the other players were doing. Nash distin-guished between co-operative games, in which binding agree-ments are made, and non co-operative games, in which bindingagreements are not feasible. The Nash equilibrium appearsappropriate in the context of this discussion as it provides fur-ther explanation for equilibrium in the risk profiles. This situa-tion also involves two (or more) players over a period of time,and in constant negotiation with each other, allowing the appli-cation of Nash’s theory.

In order to take this argument further, extensive experimentalevidence and data will need to be collected from both buyer andsupplier organizations. In this context, however, it is noted thatthe experiment would need to cover all the parameters men-tioned in the earlier chapters including the factors influencingthe creation of the RDS in the first place. In combination, manyof the simplistic and theoretical examples made in this sectionwould provide the complete picture that is theorized, to followthe equilibria proposed by Nash. This would have to be the sub-ject for another book.

6.7 Chaos theory

If the risk profiles are taken and viewed from yet another per-spective, that is, as chaotic systems (Baker and Gollub, 1990) andusing chaos theory (Lorenz, 1993), the initial observations, curi-ously, are also substantiated. It is known that even the smallestimaginable discrepancy between two sets of initial conditionswould always result in a huge discrepancy at later or earliertimes in any system following chaos theory. Here, chaotic sys-tems are mathematically deterministic, that is, they follow pre-cise laws. The irregular behaviour of chaotic systems appears tothe casual observer to be random. The presence of chaotic systemsin nature also appears to place a limit on our ability to applydeterministic physical laws to predict risks with any degree ofcertainty. The discovery of chaos therefore implies that random-ness lurks at the core of any deterministic model such as the onediscussed in this book. The complexity and uncertainty of therisk influences notion made earlier were designed to argue thefact that a conclusive link may never be found.

Amid the apparent confusion, however, patterns of natural equi-librium were observed. There were clues that become evidence insupport of a form of constancy in the total risk exposure in thepatterns in the RDS illustrations. The observed equilibrium overtime supports the observations of constancy in the data that

Risk Characteristics and Behaviour in an ITO Exercise

151

Chap-06.qxd 3/1/05 12:33 PM Page 151

Page 171: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

were examined. If there is a state of equilibrium, then the idea of arelationship between the risks dimensions that compensates forchanges between them is also supported. This, in turn, supportsthe thinking and general notion that a clear relationship existsbetween risk dimensions in an ITO exercise that allows the total risk exposure levels to reach a state of equilibrium over time.

The arguments for development of the notion that risk relation-ships exist are strengthened as observations are made from alter-native perspectives. There is no defeat in admitting to chaos;rather, facing the problem provides the practitioner with a man-agement challenge that is integral to managing in this environ-ment. Outsourcing arrangements in their simplest forms involvetwo organizations, the buyer and supplier. The models that wereintroduced included agency theory and game theory, whichhave already been used to describe many of the situations inwhich the ITO arrangement operates. The association with gametheory (between the buyer and supplier organizations) and semb-lances of the Nash equilibrium does not completely justify this butsupports the observations of an equilibrium in the risk profilesoccurring in the ITO exercise. Authors Elitzur and Wensley(1997) followed a similar path and placed emphasis on theobservable phenomenon of risk sharing in an ITO exercise. Theyalso attempted to provide game theory interpretations of keyaspects of ITO arrangements. This study provides an alternativeand comprehensive view of this theory through specific modelsthat have been constructed in the ITO arrangement.

6.8 The perfect project

There has never been an attempt to describe the illusory ‘perfectproject’ described at the start of the chapter, nor any endeavourto predict risks. The observations described in this chapter weredesigned to build additional rigour into the risk assessmentframework, which is constantly being reconstructed and refined.The manager’s idealistic dreams mentioned earlier may neverbe realized but the observations from the RDS support the prop-osition that the relationship between the selected risk dimensionsthat arise in the outsourcing of the IT function results in a constanttotal risk exposure for both the supplier and buyer organizations.

There appears to be no set of ‘rules’ that govern the interrela-tionship. The interrelationships between each of these eventsand the risk exposure can be described as being ‘complementarilyinterconnected’, i.e. they affect each other. There is no direct

Managing the Risks of IT Outsourcing

152

Chap-06.qxd 3/1/05 12:33 PM Page 152

Page 172: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

cause-and-effect relationship that can be observed. The essentialcharacteristics of the interaction cannot be neglected either as somefeatures can be used to mitigate some effects of risk. Althoughrules provide some structure for the analysis, they also divertattention from key observations; i.e. risks are outcomes or a setof events that by their very nature cannot be predeterminedaccurately. The concept of risk balancing involves the proposi-tion that risk exposure tends to settle into a state of equilibriumafter a period of time. This supports the notion that all risks inall dimensions are interrelated.

Over a period of time relationships are observed to reach a stateof equilibrium. A natural state of equilibrium for total risk expos-ure is proposed. In this natural state, the total risk exposure for anorganization (either the buyer or the supplier) remains constantover time. This is also the state in which the fluctuations in riskexposure for the buyer are mirrored for the supplier. In themidst of all the activities, events and changes in the environ-ment, the total risk exposure for the buyer equals that for thesupplier. The apparent harmonious relationship between theorganizations is reached where both organizations have a mutu-ally beneficial and synergistic existence. Examples of this areobserved in many outsourcing relationships that have survivedover significant periods of time. If these observations are true,this is expected for ITO relationships (which are relativelyrecent) moving forwards.

After the rigour of developing models and defining risk cat-egories, conclusions were reached using a set of heuristics andtrends from observations of risk exposure and outcomes withinthe boundaries of an ITO exercise, also incorporating both internaland external features of the business landscape influencing theinteraction between the actions and subsequent events. Thenext chapter describes this risk relationship notion further andconcludes the study with some final observations before thecase study is introduced to show the application of these con-cepts in the management of risks in this environment.

Risk Characteristics and Behaviour in an ITO Exercise

153

Chap-06.qxd 3/1/05 12:33 PM Page 153

Page 173: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

154

An enduring task of a manager in a typical ITO exercise is toreduce risks. There is no discrimination regarding the type ofrisks that will need attention, and risks along any of the dimen-sions where risk exposure has obviously exceeded the organiza-tion’s appetite for risk may need to be mitigated. A managermight also proactively forecast risks that may eventually exceedthe organization’s risk tolerance limits. The task is never-endingbecause risks are dynamic and risk influences are always present.

As risks are transferred to the supplier benefit derived by thebuyer organization arises through reduction in risk exposurealong, for example, the operational and technical risk dimensions,for which the supplier is compensated with a fee. In addition, thesupplier’s financial and business risks relating to the ITO exer-cise are observed to decrease. This shift in risk exposure valuesis a phenomenon that is fairly predictable.

Risks along each of the dimensions demonstrate distinctive pat-terns of behaviour. For example, in the previous chapter, it wasshown that a relationship exists between risk dimensions to theextent that, in one instance, the total risk exposure for a projectremained constant over time. This was repeatedly observed inthe same ITO exercise, and the same phenomenon is seen overmany different projects. As illustrated in Section II, the RDS toolallows risk exposure to be mapped on the various risk dimen-sions. The method for mitigating the risks described here, util-izes this unique behaviour.

7.1 The ITO risk ecosystem

The state of equilibrium mentioned earlier is where the total riskexposure is constant. This applies when variables like the type oforganization, time and selected ITO exercise remain constant.

Mitigating risks in an ITO environment

Mitigate: origins lie in the Latin mitigare, to make mild; mitis, gentle or soft; and agere; to do.

15th century vocabulary

7

Chap-07.qxd 3/1/05 12:33 PM Page 154

Page 174: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Mitigating Risks in an ITO Environment

These variables are found in what is described as an ITO ‘riskecosystem’. The risk ecosystem borrows the term ‘ecosystem’,which was coined in 1935 by the British ecologist Sir ArthurGeorge Tansley, who described the living and nonliving parts ofnatural systems as being in ‘constant interchange’. In this ecosys-tem, the sum total of risks is constant as the risk dimensions arein a constant state of flux and interchange. The correspondencewith the ITO scenario allows the RDS tool to be used and fairlyaccurate predictions to be made based on the notion that spe-cific relationships exist between the risk dimensions in the out-sourcing of the IT function. The relationship between the riskdimensions allows changes to take place along each risk dimen-sion to the extent that the mathematical sum total of all the riskexposure elements remains constant. The state of equilibriumexists to the extent that a natural state of equilibrium exists, pre-viously described mathematically and restated here as:

where � represents the total risk exposure.

Risks are, to a reasonable extent, naturally occurring. The riskecosystem is a balance between forces. The analogy of nature’secosystem illustrates this point. A popular predator–prey modelis a concept where, initially, there are a given number of preda-tors that feed on a given number of prey. As the number of preyreduce because of hunting activity, the scarcity of food (prey)forces a reduction in the number of predators. Fewer predatorsmeans that more prey have a chance to survive as the prey isthen not hunted. The numbers of prey subsequently increase.The cycle then repeats. As the number of prey increases, so doesthe number of predators. The predator/prey ecosystem sustainsa relatively stable number of prey and predators at any givenpoint in time. The concept of the risk ecosystem appears toexhibit similar, although not identical, behaviour. Both the sup-plier and buyer risk profiles appear to fluctuate as the risk ispassed from one organization to the other. Over time, thereappears to be a stable total risk profile for both buyer and supplier.

The notion of equilibrium and a state of constancy was com-pared earlier with game theory in a situation where the buyerand supplier organizations were exposed to a series of decisionsover the life cycle of the ITO exercise. This was previously pro-posed by Elitzur and Wensley (1997). In this case, however, the

� �(buyer). (supplier). constant0

dt dt� ���

∫∫0

155

Chap-07.qxd 3/1/05 12:33 PM Page 155

Page 175: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

156

emphasis was on a state of equilibrium in the total risk exposureexperienced by the buyer and supplier organizations. New insightinto this case is gained through observing a state of equilibriumthat exists as the influences or causes of risks are considered.The result was equilibrium in the totality of the state of riskexposure.

7.2 Predicting the behaviour of risks with the RDS

The behaviour of risks in an ITO exercise, using the RDS, cantherefore be summarized as follows. In an ITO exercise, risks aretransferred from one organization to another over the periodagreed under an earlier defined contract. The total risk exposureof the contracting parties remains relatively constant within theselected risk ecosystem. Within the risk ecosystem that has beendefined, the constancy of the total risk exposure patterns doesnot appear to be affected by either internal or external risk influ-ences. This special relationship between risk dimensions appearsto remain and is only affected by the functions of time, magni-tude of risk types and the degree of interrelatedness of riskdimensions.

The function of time is a dominant feature as the effects of riskoccur over varying lengths of time. For each risk effect to com-pletely express itself, the variable of time needs to be taken intoaccount as much as the variability of the effect of the risk itself.If a risk type is known to take effect over a longer period, and the time variable can be controlled, then the risk may bemitigated using this variable.

The magnitude of risk is a component of the risk exposure definedearlier, and a high risk exposure carries along with it a high riskmagnitude. If the impact of risks along a dimension is of highmagnitude, this often overrides concerns for risks with relativelylower magnitude. For a given organizational risk appetite, riskswith low magnitudes may sometimes also be considered imma-terial and ignored. Hence the risk relationship equation can beput into effect to mitigate risks. For example, mitigation of a riskof low magnitude may be ignored altogether given an organiza-tion with high risk appetite for this type of risk.

Often also, risks of different types and from different dimen-sions relate to each other closely. For example, the risk dimen-sions for strategy, business and environment are very frequentlygrouped together because of the very close relationship they enjoy.

Chap-07.qxd 3/1/05 12:33 PM Page 156

Page 176: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Mitigating Risks in an ITO Environment

157

All three affect each other very closely. Other cases, operationsfor example, may not be affected at all by the environment.

There are many major factors that have a role in the interactionbetween the selected risk dimensions. Attention has been drawnhere to the three salient variables which emerge as more signifi-cant than the others.

7.3 Depiction of the risk profile

Despite steps taken to verify all the elements that contribute tothe risk profiles, it is arguable how well the description or pos-tulation of the behaviour of the interaction between the risks inthe various risk dimensions identified can be used in other ITOprojects. A major assumption made is that the profiles provide asufficiently accurate illustration of the profiles that are observed.The consistency of methods in the process, standardized meas-urement techniques and common tools negate possible errors inmeasurement. While the risk patterns and observed interactionbetween the risk dimensions are verified against theoreticalmodels, many of the pragmatic answers come from experienceand heuristics. The use of theoretical models is useful to theextent that they predict certain types of behaviour and becomepowerful tools when used in conjunction with experience and alittle common sense.

The RDS, simply used, can already provide a graphical illustrationthat highlights these risk dimensions that require urgent andimmediate reaction. For a more proactive stance, the RDS can alsoprovide a framework for risk mitigation through the recognitionof risk patterns that arise from the interaction between supplierand buyer. Strategic interaction can be validated with game the-ory. The behaviour of people and interaction derives from agencytheory. The risk variation and behaviour of relationships betweenthe risks can be related to Nash’s theory. The extent of risk expos-ure can then often be predicted via the theory that the total riskexposure remains constant over time in a risk ecosystem (Tho,2004). In combination this allows the manager to forecast, to a limited degree, the behaviour of risks in the ITO space.

7.4 Risk frameworks

There are critiques that may be made of the existing techniquesand frameworks. First, the models are limited in the ability tocapture and illustrate all the risks that occur. Then again, the

Chap-07.qxd 3/1/05 12:33 PM Page 157

Page 177: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

models are focused on specific risks, which leads to argumentsabout accuracy and determination in an environment whereuncertainty and a high degree of change are prevalent. Finally,the assumptions made using the existing models possibly donot allow for the specialized need for observations in the trans-ferability of risks across organizations. While these points are trueto a limited extent, there are also those that need to be raised indefence of the use of these frameworks that highlight the signifi-cant advantages that outweigh these points.

In order to observe the interaction of the group of identifiedrisks, an alternative perspective is recommended. Instead ofviewing risks within an organization, an outside or macro-viewof the total risk profile (all of the risks combined) can be taken.The difference is that both the environmental and internal riskscan be viewed together. This addresses some of the shortcom-ings of the earlier framework in the ability to capture all therisks. The method of grouping risks into categories (which referto both internal and external risks) allows a summary illustra-tion of the majority of risks that are perceived to become mani-fest in one illustration.

Many of the rules and frameworks used originate from existingrisk frameworks. As the risks are studied from a complete riskprofile perspective, the nuances of each risk item are consideredas part of the collective for the risk group or risk dimension.This reduces the complexity of the study and allows a clearerview of the phenomenon where risks appear to be ‘transferred’from one organization to another in an ITO agreement.

From the new perspective, risks are viewed as a whole where allthe risks that affect the ITO project are taken. Following detailedobservation of the new risk profile, the total risk profile of theITO project remains constant over time. Information that supportsthis argument includes observations of empirical data from theRDS that show changes in the individual risk dimensions. Theprofiles from observations of the RDS profile show that changesoccur along risk dimensions, appearing to compensate forchanges along other risk dimensions that have arisen earlier.

The shifts in magnitude of total risk exposure value from thebuyer to the supplier in the operational and technical risksdimensions are ‘compensated for’ by movements in the risksalong other dimensions for both organizations. As the supplieraccepts the transfer of risk in the operation and technical dimen-sions (i.e. increases along these risk dimensions), the supplierorganization is also observed to experience less risk exposure

Managing the Risks of IT Outsourcing

158

Chap-07.qxd 3/1/05 12:33 PM Page 158

Page 178: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Mitigating Risks in an ITO Environment

159

from the business, strategic and financial risk perspectives. Bothbuyer and supplier organizations experience many changes alongthe individual risk dimensions but the total risk profile remainsconstant. The supplier is able to enter into a long-term agree-ment with the buyer because its risk profile is fairly uniform.

Interplay between risk dimensions

Assuming that the eight dimensions mentioned earlier accuratelydepicted the different risks that become manifest in the ITO, theinterplay between the risk dimensions was investigated. In orderto limit the number of assumptions that could be made, the inves-tigation was peculiar only to the outsourcing of the IT function.

In addition, the significance of IT was explained as it was uniqueand displayed characteristics different from those of other support or strategic functions in a typical organization. Forexample, given the extremely dynamic nature of the IT function,the interplay between the risk dimensions may have beenaffected. The ability to continually observe the total risk profilemay have been influenced by the nature of the IT function in anoutsourcing environment.

Interaction of intrusive factors

The interaction that exists as a result of intrusive factors (exogen-ous and endogenous) was assumed to play a role in the interre-lationship between the risk dimensions. The risk dimensionsproposed in this study provide an empirical framework to illus-trate the interaction of the elements and the nature of the inter-action within the risk frameworks proposed by other researchers.The evidence supports the proposition that relationships existbetween these risk dimensions. The interaction of the intrusivefactors assumes that the majority of the factors have beenincluded.

7.5 Using the concepts

General theories that attempt to explain the implicit relation-ships that exist provide a framework, based on which furthertests can be made. The methodology used in this book alreadyenables detailed observation of the influences and risk elementsfor one ITO exercise. The work already completed also allowsfor subsequent research to be done to confirm or build upon theobservations made in this study. To facilitate its use in anotherenvironment, the theories on risk relationships and interaction

Chap-07.qxd 3/1/05 12:33 PM Page 159

Page 179: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

between risk dimensions in an ITO exercise have been formu-lated in this chapter.

Overcoming difficulties that may beencountered

Possible difficulties may be encountered in selected areas whenattempting to work through the risk frameworks. One such areacould be the issue of uncertainty in the environment and the sig-nificant variation and dynamics in the way the risk elementsbecome manifest. The situations mentioned included a cleardirection when there were high levels of certainty and discreteoutcomes through a situation involving ‘true ambiguity’. Thesituation where the ITO exercise is conducted probably lies inbetween, i.e. where there is a range of possible outcomes. Themethods proposed are an attempt to render the quantification ofrisk elements a more consistent method of monitoring and man-aging risks. While ideas are drawn from various sources, thefinal derivative that is proposed is the risk dimension signature(RDS) tool. The RDS allows the focus on all risks to be managedand the focus to be shifted to critical risk elements, grouped intorisk categories. As these change over the life cycle of the ITOexercise, the RDS allows the capture of the major changes in riskelements and fluctuations in risk exposure. It is not, however, asubstitute for a thorough knowledge of the environment and isnot a replacement for experience and judgement.

Another area of difficulty that can be encountered is project logis-tics and access to the appropriate sources of information (e.g.documents, people and stored data) in the organization that isin the midst of a major ITO exercise. In addition, access to therelevant information and people can prove to be extremely diffi-cult if this is treated as a separate activity. This impediment canbe reduced by appropriate initiation as an integral part of the ITOexercise itself (and executed by the ITO team). Also, given thesensitive nature of the results and the need for very senior man-agement attention, it is recommended that there is senior manage-ment involvement and sponsorship throughout the exercise.

Yet another area of difficulty could be encountered in an ITOexercise, one that needs to be highlighted to avoid the sameerrors and mistakes each time this exercise is repeated: this con-stitutes a combination of issues starting with the logistics of thedata gathering exercise, then the determination of the appropri-ate number and description of the risk dimensions, followed byconsensus on the risk values that would be used. The sequence

Managing the Risks of IT Outsourcing

160

Chap-07.qxd 3/1/05 12:33 PM Page 160

Page 180: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Mitigating Risks in an ITO Environment

161

of events that is planned may result in the determination of therisk dimensions conducted prior to the collection of data for riskexposure along the risk dimensions. To avoid this, it should bedone simultaneously to streamline logistics (i.e. time and effort).The difficulties in logistics start when some of the participantswho contribute to the development of the risk dimensions areno longer on the team at the time the data are collected. The‘buy-in’ and discussion time that is spent talking about the riskdimensions may prove challenging. It can be seen then that thepeople involved add to the subtle differences in each definitionembedded in the risk dimensions. In another project, the changeswere so subtle that there were up to thirty different risk dimen-sions at one stage. Again, based on reason and theory describedat length earlier, the rational number of risk dimensions hasbeen summarized to a manageable eight.

Limitations

A discussion on difficulty would not be complete if the limita-tions of the exercise were not incorporated. Limitations, in thisinstance, arise from the difficulties that are anticipated whenusing the RDS tool.

A limitation in any study of risks is the estimates made of theprobabilities of losses from these risks. It would be extremelydifficult, if not impossible, to accurately guess the probability ofan occurrence. The number of participants is usually significant.In projects undertaken, over a hundred individuals representingapproximately 10% of the organization and possibly up to threequarters of the IT division were interviewed. As a result, manyof the responses provided a class ‘average’. In addition, the cate-gorization of the risk types also provided a further ‘average’value. In many instances, such an exercise is not possible. Such alimitation needs to be taken into account in the results.

A further limitation of the exercise is the description of the riskexposure (RE) profile and comparison of the shapes. The areaenclosed by the risk profile in the RDS represented the total riskexposure at a particular point in time. Although changes in shapecan be identified through observation, more subtle changes aredifficult to quantify or illustrate accurately.

There is some use of ‘fuzzy logic’ where the outcome of the riskelements is expressed as a probability rather than as a certainty.For example, in addition to being either true or false, the prob-ability expressed by a participant of the exercise, to the best oftheir knowledge and based on heuristics, were, in relation to

Chap-07.qxd 3/1/05 12:33 PM Page 161

Page 181: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

162

outcome, probably true, possibly true, possibly false, and prob-ably false. This is a matter of heuristics because the probabilitieswere expressed based on experience, knowledge of the environ-ment and the situation. In an analogous example, if a coin wereto be tossed ten times and the results indicated ten occurrencesof ‘head’, the statistical result would be ‘1’ for head (or 100%chance of the occurrence of ‘head’). We know that in an ideal-ized example, it would be ‘0.5’ (or 50% chance of the occurrenceof ‘head’). Heuristics was used in a situation where there was adecision based on judgement. In a situation where the probabil-ities of risks occurring were uncertain, deriving responses fromthe participants in the exercise involved group discussions aswell as the methods discussed in the previous section.

A limitation of cognitive heuristics is the probability of error. In asituation where the probability of risk is uncertain, the bias pro-vided by the participants based on prior and existing knowledgefurnishes the platform for the data to be collected. This is alsorelated to the first point made in this section. The assumption thathas been used in all the cases discussed here was that the sameerrors were negated in the grouping and classification process.

Many of the limitations that have been encountered are exhibited as a result of uncertainty in the environment and inthe concepts of management under uncertainty. Hamel andPrahalad (1994) have repeatedly proposed that no paradigm oridea would be useful in formulating a strategy. They mentionthat in an environment of uncertainty there is ‘no comfort’ thatcan be gained and that plans and strategies are indeed limitedand cannot ‘be reduced to eight rules for excellence, seven S’s,five competitive forces, four product life cycle stages, threegeneric strategies, and innumerable two-by-two matrices’.

This provides a setting in which my proposition can be furtheranalysed and extrapolated in future studies. A stand on the viewof the knowledge paradigm is taken to ensure that the theoriesdeveloped are ‘valid’. The notion of validity or credibility of thecase presented by the researcher provides a foundational elementfor new theory. Ultimately, however, validity depends on thecollective judgement of the community that a construct and itsmeasure are valid. In the end, we are all left to deal with theeffects of our judgement, which is just as it should be.

It must be mentioned that the validity of an argument should bedistinguished from the truth of the conclusion. If one or more of the premises is false, the conclusion of a valid argument thatfollows may also be false. With this in mind, several key

Chap-07.qxd 3/1/05 12:33 PM Page 162

Page 182: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Mitigating Risks in an ITO Environment

163

assumptions have been made during the course of the argu-ments in this book that need to be highlighted.

Important assumptions

Several important assumptions were made in pursuing workthat guided the direction of the recommendations made specif-ically with regard to the use of the RDS. Some of these assump-tions relate to general activities and behaviour of the entities beingstudied and are included here for completeness. For example, itwas assumed that the buyer and supplier organizations approachthe exercise as rational business entities. The decisions and actionsthat follow are designed to enhance profitability and increasethe effectiveness of the individual organizations.

It is assumed that the major theories were applicable and accur-ate in the context of the ITO exercise. While the exercise servedto re-validate many theories, others could not be validated. Forexample, it was assumed that risks did not occur randomly. Thetheory of causality was used where there was a notion of defini-tive causes and effects of risks in the ITO exercise coming fromboth within and outwith the organization. While the causalitytheory could not be validated, it was assumed that it was applic-able and accurate in this context.

It was further assumed that the models used to derive the experi-mental constants and variables for the risk profiles were suffi-ciently accurate. There were three sets of constant values usedand two of variables. The constant figure of 8 for the risk dimen-sions was assumed for the project. Another constant �, (seeequation (4.1), p. 98) used to compute the area under the RDSgraph was based on straight lines between the risk dimensions.Finally, a constant number of supplier and buyers was assumed.Although the implications for these values carry little conse-quence for the final recommendation, they are highlighted toenable appropriate changes to be made the next time the exer-cise is run in another environment. Other values that were usedincluded those in the six-point Likert scale, used for measure-ment. The other major variables that could be altered were thethree major factors that appear to have influenced the relation-ship between the risk dimensions. The experimental constantsshould be reviewed each time the exercise is repeated.

The assumptions made in using the methods pertained to thearea of consistency. Specifically, arguments were made on theneed to group risks into categories for measurement. A keyassumption arrived at was that the risk exposure measurements

Chap-07.qxd 3/1/05 12:33 PM Page 163

Page 183: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

164

could be categorized. Examples from insurance and otherindustries were also assumed to be applicable in this context.Although the concept of categorization is accepted, there is noclear proof of the ability to compartmentalize risks and noextensive study to show that risks can be grouped.

Many of the definitions, concepts and notions were derived fromthe literature and were validated so far as was possible againstnatural laws, reason and common sense. There were three elem-ent definitions that were difficult to validate. This included adefinitive meaning for the major terms used, including a uni-versally accepted meaning for the terms outsourcing and riskexposure as well as the term organization. The researcher’s def-inition was highlighted and clearly defined at an early stage inthe book. The assumption was that the minor ambiguities in thedefinitions would not significantly alter the development of themain theory and ideas.

In addition, the recommendations are based on multiple casestudies conducted in Asia and Australia. An assumption madeis that the management style and the cultures of the individualsinvolved did not play a significant role in the judgement of risks,which in turn might have influenced the measurement of risks.Despite obvious documented differences in terms of Western andAsian cultures regarding ‘power distance’ and ‘individualism’,sufficient evidence was not found to differentiate the decisionsmade in Asia from those in Western cultures, other than the‘experience’ factor. Individualism is characterized as a preferencefor a loosely knit social framework in societies wherein individ-uals are supposed to take care of themselves and their immedi-ate families only: the ‘I’-concept (Hofstede, 1980; Brislin, 1999).

Besides the major assumptions above, there were three main areaswhere the impact of the assumptions could have made somedifference to the outcomes. These areas included the creation ofthe risk profile with risk dimensions, depiction of the risk pro-file and the construction of the theory that is discussed here.

7.6 Insights into risk behaviour using the RDS tool

Given the new insight into the behaviour of risk, measured asrisk exposure values through the life cycle of the ITO exercise,the manager will have accumulated a greater appreciation ofthe risks involved whether directly through the RDS or indir-ectly through the use of the methods described.

Chap-07.qxd 3/1/05 12:33 PM Page 164

Page 184: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Mitigating Risks in an ITO Environment

165

The IT function was outsourced to derive significant benefits forthe buyer organization, generally by leveraging economies ofscale and the ability to focus on core competence. In most cases,the buyer is observed to pass its operational risks to the supplierand derive maximum benefit from the expertise of the supplier interms of resources, knowledge and processes. The supplier in turnwould be compensated for its participation in the exercise witha steady stream of revenue over a contracted period. The supplierthen shares its resources and leverages on its own economies ofscale. The question remains, however, if the supplier wouldcarry too much risk since the operational and technical riskswould be taken over from the buyer organization. The conceptof the winner’s curse described in Section I is a repeated phe-nomenon where the supplier underestimates the costs of pro-viding the services in its zeal to capture a larger market share.

Buyers and suppliers have arrived at outsourcing agreements inmany different scenarios. The outsourcing of the IT function,however, is something that has relatively recently been resortedto. It can be shown that the risk profiles of two different suppli-ers with different backgrounds typically are very similar. This isoften because both supplier organizations operate in the sameenvironment. In most cases, this demonstrates consistency inthe perception of risk profiles by different organizations at agiven point in time.

Studies that were made also demonstrate that both the buyer andsupplier maintain the same total risk exposure, despite signifi-cant differences in the risk profile at different stages in the ITOexercise. Given a long-term contract (over many years), it wasalso theoretically demonstrated that a state of equilibrium isreached where, over time, the total risk exposure would remainconstant. The buyer’s risk profile is measured at several separatepoints in time over the life cycle of the outsourcing exercise. Mostof the changes in the risk profile can then be explained throughactions giving rise to environmental as well as internal influenceson the project. Importantly, the total risk exposure remainsfairly constant during all these events. The main theory can beexpressed in the form of the fundamental equations following:

(buyer).

and

(supplier).

1

20

dt

dt

0

t

t

Chap-07.qxd 3/1/05 12:33 PM Page 165

Page 185: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

166

where �1, �2 are constants specific to the particular ITO exercisethat is being undertaken.

7.7 Further remarks

The IT function is a ‘necessary evil’ that many organizationsrequire just to stay in the market. It is a matter of survival in thecurrent economy. Organizations use IT to enable the develop-ment and use of faster and more efficient processes and to keepthe costs of production low. Some organizations use the IT func-tion as a strategic tool that differentiates products and servicesfrom those of the competition. The majority of organizations,however, need to maintain a complex and very dynamic ITfunction just to support routine operations. It is these organiza-tions that primarily are resorting to outsourcing arrangements.A new market is created where organizations seize the opportun-ity to supply IT services to other organizations.

For the many organizations that seek to relieve themselves ofthe operational risks inherent to the IT function, this study sup-ports the notion that the operational and technical risks areindeed ‘shifted’ to the supplier organization. The benefit to themany organizations starting an ITO contract is the ability toshift unwanted operational and technical risks that becomemanifest specifically in the IT function, to the supplier.

At the same time, as the IT function changes, organizations thatneed to realize the strategic advantage of the IT function in dif-ferentiating services and products are also resorting to outsour-cing arrangements. The strategic risks are mitigated via the useof more effective governance processes and an understanding ofthe total risk exposure. The results of this study also provideanother perspective wherein the total risk exposure remains thesame for these organizations; while some areas of risk mayexceed the organization’s appetite for risk, the total risk expo-sure is unaltered. As there are areas of high risk, there will berisk areas where the risk exposure will have reduced to com-pensate for the high risk effects; again, the total risk exposure isunchanged. Over time, purposeful action will shift the risksfrom the areas where exposure is high to the areas where expo-sure is low.

If the perspective of the supplier of ITO services is taken, itappears to be able to take on the new risks, although sometimesto its peril. The winner’s curse phenomenon is one of severalresults of the neglect of the risks involved, plus an overzealous

Chap-07.qxd 3/1/05 12:33 PM Page 166

Page 186: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Mitigating Risks in an ITO Environment

167

attitude by suppliers to win work and underprice their services.Again, if the concept of a relationship between the risk dimen-sions introduced here is used, the total risk profiles observed willreach a state of equilibrium. And, as areas of very high risk expos-ure appear, other areas of risk will be observed where there willbe a reduction in risk exposure that compensates for theincreased risk. The total risk exposure remains constant overtime. Again, with management focused on mitigating risk in theareas of high exposure, the total risk profile remains unchanged.This means that in the areas of low risk exposure additionalrisks will be taken on in further compensation for reductions inrisk in the areas of high risk exposure.

Finally, as with many other theories and propositions, the riskrelationship concept in any exercise must not stand alone but besubject to ‘common sense’ and logical tests in environments thatextend beyond the one that has been suggested here. The casesdiscussed here have been subject to predetermined limitationsand conditions, so other tests must be used to introduce a newset of parameters.

Section II began as an attempt to explain the singular phenom-enon of risk transfer that had attracted many organizations toconsider the use of outsourcing to provide further benefits forthe IT function. This was based very much on an organization’sunderstanding of the nature of ITO and general concepts of risk.There are few tools or risk frameworks available to measure therisk profile of an organization in an ITO environment. The con-cepts of pooling risks in the insurance industry led to the notionof categorizing risks into risk dimensions. This led to the intro-duction of the risk dimension signature (RDS), which is unique toany individual ITO exercise; the RDS allowed observations of therisk profile to continue. The notion that there exists a relation-ship between changes in risk dimensions in the ITO environmentwas then introduced. The internal and external influences of riskswere considered along with the behaviour of the risks over time.

It is therefore my hope that some of the concepts discussed in thisbook will be useful to the reader. Again, there is no substitutefor experience, common sense and logical reasoning. The RDS,when employed in conjunction with all the concepts and ideasappearing in this book, should prove to be useful in under-standing, measuring, illustrating and anticipating the risks thatwill ultimately become manifest in the ITO environment.

Chap-07.qxd 3/1/05 12:33 PM Page 167

Page 187: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

168

The case study presented here is about a multinational organ-ization that has embarked on an ITO exercise, and which has beenreferred to already in several chapters of this book. It serves as apractical example that re-illustrates the concepts introducedearlier. Unlike the situation in other ITO exercises, the organiza-tion in this case study has an unusually high incidence of riskcharacteristics from environmental (political environment), busi-ness, and strategic risk dimensions. These dimensions are con-spicuous set against the discussion on pure operational risks.This natural exaggeration is appropriate as it amplifies some ofthe concepts discussed in previous chapters and allows thedetails to be more clearly observed.

To protect the privacy of individuals and the organization, pseu-donyms have been intentionally used for purposes of the casestudy. The data presented, however, are real. Actual data werecollected by a team of individuals over a period of 5 monthswhile working on the ITO exercise.

The team that worked on the project was one that would normallybe found on an ITO exercise. It consisted mainly of personnel witha background in IT who had worked in the IT department prior tothe exercise, and managers from every department in the organ-ization. The Board and Senior Management team were the spon-sors for the ITO programme. The project ‘champion’ was the ChiefInformation Officer (CIO) for the organization and she had therole of maintaining the focus of the team. She provided the‘energy’ from the start of the ITO exercise to its completion.Although there are multiple facets of the ITO exercise that couldbe highlighted, only the risk capture and management activitiesare highlighted, as applicable to the subject matter in this book.

8.1 Case study background

The case study organization provides clinical investigative ser-vices for regional tertiary care centres (acute care hospitals). Theservices provided include the processing of samples, analysisand results reporting. To facilitate this, the organization has

A case study – ITO risks8

Chap-08.qxd 3/1/05 12:34 PM Page 168

Page 188: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

maintained an in-house IT function for over 10 years. In order tosave costs and focus on its core competence the managementteam has recently decided to embark on an ambitious project tooutsource all the major components of the IT function.

Clinical investigative services is a discipline within the healthcareindustry that include both laboratory and radiology functions.Together, these functions require processes that are informationintensive. Data are collated, stored and disseminated on everysample collected and results are reported and stored in thepatients’ medical records. Subsequently, the analysis and pre-sentation of the outcomes of the tests also require significant useof the IT function. This forms one of the most important sourcesof current information for diagnosis by a clinician. The laboratorytests that are performed by the organization for its clients includethose involving haematology, chemical pathology, cytology andmicrobiology. The various modalities covered in radiologyinclude X-rays, CT scans, ultrasound and MRI. As such, theoperations and reporting requirements are complex, and theaccuracy and timeliness of the information provided are vital.Clients are predominantly healthcare centres including hospitals,clinics and centres for rehabilitative care and allied health, whichare situated in geographically disparate locations spread overthree time zones.

So, the organization itself is an outsourcing services supplier asit performs tests for outsourcing services buyers, the healthcareinstitutions. It is, however, also a buyer of outsourcing services.In this case, it is buying outsourcing services for its IT function.The risks in the IT function will be discussed here.

As a business entity, it needs to deliver value for its shareholdersin the form of profitability and return on investment. Also, likeany other business, it is not immune to pressures for cost reduc-tion. As a professional services organization in the healthcareindustry, the cost objective and expenditure priorities for patientsafety and accuracy of information need to be balanced througha series of management activities that operate to maximize theefficiency of all the organization’s resources.

In addition to industry pressures, the organization is subject toenvironmental influences – it has the added pressure from theGovernment to provide services at cost for many social projectsincluding participation in operations relating to bio-terrorism;disease outbreaks; and more recently the avian flu epidemic thatthreatened the nation. To make matters worse, this organizationwas the only one in the country to have specialized facilities for

169

Chap-08.qxd 3/1/05 12:34 PM Page 169

Page 189: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

170

selected medical tests. The need to collect, maintain and dissem-inate information through its IT function was distracting its peoplefrom the core business of providing medical testing services.

Finally, heightened competition in the industry had resulted ingreater yield and price pressure on the organization’s productsand services. It had to re-engineer and urgently change (trans-form) current operations with attention to lowering operatingcosts and increasing margins through focus on customer care,improved services and increased reach. Competitive pressuresprovided the catalyst for change.

It had used contract workers to perform specific functions likethe installation of the local area network (LAN) and short-termcontractors to write small computer programs. The managementteam had devoted a significant amount of time to supervise andmanage these contracts. The same team has now decided that its IT function is not a core competence function and that itwants only to benefit from the outcomes of this function1. It will outsource the IT operations along with the attendant operationalrisks. The IT operations, however, are strategically important tothe organization because of the need for accurate and real-timeinformation. This need to keep selected components (for exam-ple, the information on the Oracle™ database and electronicinterfaces between some of the test machines and the computersystem) of the IT function confidential and proprietary was recognized early. To satisfy both these requirements, the out-sourcing supplier had to have a strategic relationship with this organization (see ‘Outsourcing Partnerships/Contracts’ inChapter 1). Organizational boundaries between the ITO supplierand this organization would merge as the outsourcing and supplier organizations would share in the performance and out-comes of the very important IT function.

8.2 Risks identification

The organization was not immune to risks. In fact it would besubject to a very diverse and complex set of risks that would haveto be managed and mitigated to allow the ITO project to proceed.The framework that was used to capture risks in the project wasderived from work by Earl (1996), as described in Chapter 3,where the risk elements are mapped against the eight risk dimen-sions, as illustrated in Table 8.1 below. Each risk element is discovered through an interview process, which is described in

1 See differences between contracting and outsourcing in Chapter 1

Chap-08.qxd 3/1/05 12:34 PM Page 170

Page 190: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

171

Table 8.1 Mapping common risk elements with risk dimensions

Risk elements (Source: Earl, 1996) Risk categories/Dimensions

Technical Financial Legal Operational Business Environmental Informational Strategic

Possibility of weak management ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓

Inexperienced staff ✓ ✓

Business uncertainty ✓ ✓ ✓ ✓

Outdated technology skills ✓ ✓ ✓ ✓

Endemic uncertainty ✓ ✓ ✓ ✓ ✓

Hidden costs ✓ ✓ ✓

Lack of organizational learning ✓ ✓ ✓

Loss of innovative capacity ✓ ✓ ✓

Dangers of eternal triangle ✓ ✓ ✓ ✓

Technological indivisibility ✓ ✓ ✓

Fuzzy focus ✓ ✓ ✓ ✓

Chap-08.qxd 3/1/05 12:34 PM Page 171

Page 191: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

172

Table 8.2 Buyer risks in the ITO project (case study organization)

Major risk dimensions

Internal External

Technical Financial Operational Strategic Legal Informational Business Environmental

Environmental InfluencesCompetitive pressure

Within the healthcare ✓ ✓ ✓ ✓

industry (clinical tests)Buyers ✓ ✓ ✓

Suppliers ✓ ✓ ✓

Substitutes ✓ ✓ ✓

New Entrants ✓ ✓ ✓ ✓

Nationalism, Politics, Structure ✓ ✓ ✓

Global Events ✓

Hedging against currency ✓ ✓ ✓ ✓

fluctuation

Industry PracticesFollow-the-leader phenomenon ✓ ✓ ✓

Using IT as a primary function ✓ ✓ ✓ ✓ ✓

(cf supporting role)Governance of IT within ✓ ✓ ✓

structureShorter planning cycles ✓ ✓

Reasons for outsourcing ITCost reduction ✓ ✓ ✓

Improved customer service ✓ ✓ ✓

Improved revenue generation ✓ ✓ ✓

Speeding adoption of new ✓ ✓ ✓

technology

Chap-08.qxd 3/1/05 12:34 PM Page 172

Page 192: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

173

Improved integration with ✓ ✓ ✓

business partnersImproved security ✓ ✓ ✓

(regulatory requirements)Sharing Information ✓ ✓ ✓

Contract negotiation & ongoing ✓ ✓ ✓

governance

Organization’s operations(outsourced)

Company’s past 5 year ✓ ✓ ✓

track recordManagement team ✓ ✓ ✓ ✓

performanceCompany’s strategic plans ✓ ✓ ✓ ✓

Lack of information on risks ✓ ✓ ✓ ✓ ✓

Budgeting and demand ✓ ✓ ✓ ✓

managementPoor technical resources ✓ ✓

Outsourcing all its IT ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓

operationsWorking with a strategic IT ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓

outsourcing partner

Page 193: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

174

Figure 8.2 Risk assessment matrix

Severity level

IIIIIIIV

High

Low

Risk 1 Undesirable and requires immediate attention

Risk 2 Undesirable and requires corrective action, but some management discretion allowed

Risk 3 Acceptable with review by management

Risk 4 Acceptable without review by management

Frequent

Source: US Government Accounting Office, ‘Information Security Assessment – Practices of Leading Organizations’, June 1999

Probable Occasional Remote ImprobableProbability of occurrence

the following section. The matrix also allows the risk elements tobe verified against the risk categories and vice versa.

As elements are collected and each risk dimension is verified,the probability of occurrence and the magnitude of loss informa-tion are used to compute the risk exposure along each dimension.In addition, each risk dimension is related to a source of influence,whether internal or external to the organization. The source ofthe risk is identified early and documented for subsequent riskmitigation activity (see below).

2 See also Figure 3.2 in Chapter 3

Figure 8.1Sources of risks(risk dimension)mapping to sourcesof influence

Technical Internal

Financial Internal

Operational Internal

Strategic Internal/External

Legal External/Internal

Informational External

Business External

Environmental External

Once the risks elements can be confirmed, the probability ofoccurrence and severity levels can be determined to allow com-putation of the total risk exposure values.

The risk elements were grouped under three key headings: envir-onmental influences, industry practices and the organization’soperations (ITO exercise). Figure 8.2 shows the summary illus-tration of the matrix obtained from this case study. Some of theelements are further described here.

8.3 Internal (endogenous2) risks

The organization in the case study, like others in the industry,carries high fixed costs, and experiences an unpredictable cash

Chap-08.qxd 3/1/05 12:34 PM Page 174

Page 194: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

175

flow and low margins as a result of price competition and theinevitabilities of unforeseen regional and global events. Theradical and strategic decision to outsource its IT function wasbased on three key factors: the need to focus on core compe-tence, the need to reduce operational risks and the need tosimultaneously derive optimal outcomes from the IT function ata lower cost.

Buyer risks

Operational risks were never really fully quantified, or were partially ignored as the management team never appeared to consider the effects of failure of the IT function. It had main-tained a fully operational IT department with over 100 trainedIT personnel. The first computerized application had beeninstalled over 12 years ago. The management team wanted toreduce technical risks by working with an ITO partner whowould guarantee the performance of the IT function and includeupdated technology.

The organization had incurred excessive expenditure on excesscapacity that did not match up to returns. Burdened with a largeoperation and high capital costs in a plummeting global econ-omy, the organization had huge cash outflows as a result of thepurchase of new equipment for specialized testing. Obviousimplications included difficulty in repaying its debts. There waspoor evidence of increasing volumes of medical tests and man-agement literally gambled on increasing demand and regionaland global orders based on trends for long-term diseases suchas hypertension, stress, and cancer. Despite this evidence,orders were confirmed for more new equipment (approxi-mately 25% increase in testing capability) to be delivered over a5-year period. Demand for medical tests from existing and newcustomer bases remained uncertain. The financial risks weremounting and the strategic risks were close to the organization’spoint of intolerance.

Supplier risks

Two prospective suppliers had been considered in the selectionprocess. Subsequently, only one supplier3 was selected to performthe ITO task for the complete IT function.

3 There are models where multiple supplier organizations work together toprovide ITO services (see Chapter 1)

Chap-08.qxd 3/1/05 12:34 PM Page 175

Page 195: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

176

Initially, during the selection and proposal consideration process,both suppliers were vying to win this potentially lucrative newbusiness. The organization would outsource the major func-tional areas of IT including Cross-Platform Services, Help DeskServices, Mainframe Data Centre Computing, Midrange DataCentre Computing, Desktop Services, Network Services (voiceand data), Application Development, Application Maintenanceand Station Support (regional). The key strategic core activitiesto be retained by the management team would be the develop-ment, maintenance and control of IT strategy, IT policy and newsolutions provision and systems integration. The Business Unitswould be accountable for business integration. Oddly also, giventhat mobile telephones, walkie-talkies and other equipment wereunder the control of the IT function, with the new structure,these were ‘out of scope’.

The IT operation at the organization was logically separated intoeight ‘service towers’. These were functional areas that comprisedmultiple services: the Data Centre (mainframe, midrange anddatabase) Processing Services, Network (server support) andDesktop Support Services, Help Desk Management Services,Application Management, Governance Services, Transition andTransformation Services, Business Continuity and DisasterRecovery Services, and Exit Management and Assistance Services.Each of these services towers had been derived from a previouslycreated document from an exercise commissioned by the organ-ization to identify key parts of the business.

The suppliers are familiar with the organization and its manage-ment. When bidding for the project, the immediate risk the sup-pliers accept includes a significant number of applications thathave been unaccounted for or are unknown. This poses both athreat and a risk as the supplier would be bidding for anunknown quantity of work. This risk is classified as a technicalrisk. Also, there is a financial risk when there is competition forthe work. The lowest bidder often wins the work but may be leftto take on several unaccounted-for but contracted pieces of workthat would quickly erode any profits (see Winner’s Curse Phe-nomenon in Chapter 4). The load of operational risks would needto be covered when the transition from the buyer to the suppliertakes place. The transition planning and governance of the pro-ject becomes a critical activity and is the responsibility of thesupplier. The compensation for the supplier is the long-term,steady income stream that it begins to enjoy after the ITO projecthas commenced. Its strategic risks now need to be considered asother buyer organizations in the same industry area, for example,

Chap-08.qxd 3/1/05 12:34 PM Page 176

Page 196: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

177

would be hesitant in allowing it to take over their IT functionlest there be collusion or sharing of information (see also AgencyTheory, Chapter 4 and Outsourcing Contracts, Chapter 1).

8.4 External (exogenous4) risks

The buyer and supplier organizations in the case study work ina similar environment and share some of the external risks andexperience. The external risks typically derive from the legalframework, the environment, information availability and thebusiness milieu.

Buyer risks

The legal risks to which the buyer is exposed stem directly fromcontract amendments that appear in almost all outsourcing con-tracts5 as conditions change and the measurement criteria foroutcomes of the IT function change (see Role of IT and theProductivity Paradox, Chapter 2). A governance process isimplemented to ensure that flexibility in the contract takes theinevitable changes into account. This action mitigates the legalrisks but does not cater for possible disputes and litigation, andpossible service debasement.

As the buyer organization ventures into a new ITO exercise, it isexposed to regular business risks, which are much like the risksin any significant business venture. The ITO exercise is uniqueas it ‘locks’ the buyer and supplier into a long-term partnershipand the business risks that are encountered will need to be man-aged even more meticulously. In addition, the risks from theenvironment change.

In this situation, the buyer organization also suspected that thesuppliers had provided inaccurate information in an effort towin the bid. The exposure along the information risk dimensionwas not substantial but the risk of possible loss therefromwould lead to a threat of legal and financial risk.

Supplier risks

The suppliers on the other hand were facing a difficult time try-ing to differentiate their products and services offering. The ITfunction that was going to be outsourced was relatively generic

4 See also Figure 3.2 in Chapter 35 From the author’s experience

Chap-08.qxd 3/1/05 12:34 PM Page 177

Page 197: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

and did not have many speciality services that would easilyshow that one supplier was better than the other.

Both organizations were large multinationals that had very sig-nificant technical expertise and capability, reputations for excel-lent service and solid track records to show that both wereperfectly suited to manage the IT function for the buyer organ-ization. Therefore only the price of the services to be contractedwould tilt the decision in favour of one or the other.

The threat of legal risks was significant as the buyers would lockin to a long-term contract with the buyer and commit resourcesand time to deliver a set of very tangible outcomes that thebuyer had already determined. In addition, the risk exposurealong the business risk dimension was high given that the priceof the services would be reduced significantly to beat the com-petition. The environmental and informational risk factors werevery similar for both supplier organizations, which were operat-ing under very similar sets of rules.

The risk dimension signature (RDS) would show the changes inrisk profiles for the buyer as well as the two supplier organiza-tions. This would also facilitate the negotiations process, whichwould be based on risks, resulting in a winning situation for allthree parties. As risks are passed on from the buyer to the (win-ning) supplier, the buyer would need to adequately compensatethe supplier as it would be interested in gaining the best out-comes. The supplier, on the other hand, would be forced to pro-vide a reasonable price as it would need to clinch the deal. Thecriteria for the winning deal hence would be a relatively honestevaluation of the extent of risk that either supplier could toler-ate for a reasonable outcomes set. In this situation, the larger ofthe two suppliers declined to bid citing unacceptable businessand technical risks. It did not have a sufficient risk appetite to take on the work. The smaller, more nimble supplier organ-ization had a higher risk appetite and was willing to take onmore risks in the hope of gaining market share ahead of thecompetition.

The RDSs for both suppliers are constructed based on discus-sions and qualitative assessments made by representatives fromthe suppliers, together with input from the consulting team andbuyer’s project team. This formed the core business, or func-tional requirements, with the following core services:

● Cross-Platform Services● Help Desk

Managing the Risks of IT Outsourcing

178

Chap-08.qxd 3/1/05 12:34 PM Page 178

Page 198: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

179

● Mainframe Data Centre Computing● Midrange Data Centre Computing● Desktop Services● Network Services (WAN and LAN)● Application Maintenance and Development● Disaster Recovery● Organization Transformation Management● Services to be retained by the buyer organization● Facilities.

Arrangements by the buyer and supplier would also be carriedout for the approach to the scope of services, definitive set ofservice levels, structure and management approach, roles andresponsibilities, transition management, governance, long-termservice approach and, finally, the value proposition as a targetfor the exercise. The human resources arrangements wouldinclude staffing plans and supplier personnel, who would beresponsible for delivering the functionality required. The finan-cial agreements would include an agreement on the term, pricingrequirements and pricing structure, any retained expenses to beagreed and the transition services fees (which is often forgottenor omitted). The contractual considerations then also include allthe items listed here but the details would carry the elementsranging from an agreement and description of the current envir-onment, the buyer organization’s requirements, a detaileddescription of the services to be provided, service level defin-itions and reporting requirements. Speciality requirementsinclude software licensing agreements, voice and data networkrequirements (both domestic and international), the reportingand status requirements for activities that require development(i.e. work-in-progress requirements) and, finally, governanceprinciples.

After all the components of the IT function have been outsourced,the remaining tasks that are ‘left over’ for the buyer organiza-tion include the critical components of the IT function, whichare the IT policy and IT strategy, as well as the overview tasksfor new systems selection, implementation and maintenance.This is illustrated in Figure 8.3 where the larger filled circlesindicate greater responsibility. For example, the buyer organiza-tion’s IT unit would still be responsible for the policy and strat-egy but not the systems implementation or maintenance.

The responsibilities of the buyer organization versus those ofthe supplier would need to be strategically delineated to deliverthe maximum advantage to both parties. This, however,

Chap-08.qxd 3/1/05 12:34 PM Page 179

Page 199: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

180

exposes a number of key risk areas in the strategic, business andinformational dimensions (referred to in the risks above).

The buyer organization would maintain primary accountabilityfor its business units and the IT policies and overall IT strategy(see Figure 8.3). The IT requirements definition for the applica-tions to be developed or purchased remains with the businessunit and the buyer organization’s core IT unit. After the out-sourcing agreement has been agreed and is proceeding, theselection of the systems integrator also remains with the buyerorganization. This is to ensure it retains the governance of theoutsourced supplier. It still has control over, and overall respon-sibility for, the outcomes of all IT projects. The actual systemsimplementation and systems maintenance work is to be movedto the outsource supplier. In addition however, as illustrated inFigure 8.3, the supplier has a role of contributing to the decisionson IT policies and strategy and to other selection decisions.

8.5 Risk profiles from participants inindividual and group sessions

The quantitative method was used in the previous section toderive one view of the risk profiles experienced by the buyerorganization (buyer) as it engages with another organization(the supplier). A schematic of the methodology is also illus-trated in Figure 8.4 initially proposed by Jones and Hunter (1995)for medical and health systems research. It has been adapted foruse in the process discussed here. The method is straightforwardwhere the ‘Input’ process will provide information for ‘process-ing’ and ‘output’ as an RDS profile.

The results of the analyses were subject to a lack of consensus bythe participants and stakeholders primarily as a result of incon-sistencies in perception, private agendas and hidden information.

Buyer's business unit

IT function New systems selection New systems integration

Policy Requirements Application Selection MaintenanceImplementationStrategy

Buyer's IT unit

Supplier resources

Other resources

Figure 8.3 Allocation of tasks between supplier and buyer (source: IT outsourcing projectdocumentation)

Chap-08.qxd 3/1/05 12:34 PM Page 180

Page 200: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This was expected. Selected individuals were given opportunitiesduring individual and group sessions to allow the researcher togain consensus on the risk ‘readings’. The extent of agreement(consensus measurement) as well as resolution of disagreements(consensus development) were organized through a group facili-tator. The discussions also provided a framework for qualitativeassessment of evidence (though they are often concerned withderiving quantitative estimates from the evidence; for example,estimating probabilities for the risks experienced). The partici-pants in the individual and group sessions comprised a selectedgroup of individuals who represented the buyer organization’soperations. The senior managers each represented a focus area inthe buyer organization, and the senior manager from the ITdepartment participated. The CIO, who was also an avid sup-porter of this exercise, selected each individual. The managersthen also nominated participants. The exact numbers varied (andare identified prior to the results in the next section) but finally apool of 38 participants was used.

The participants’ main qualification was their knowledge of andinvolvement with the ITO decision and exercise. The initialmeeting was called to explain what the research project con-sisted of and how it linked with the actual project activity to be

A Case Study – ITO Risks

181

Questions

Participants

Information

Measuring ofstructured interaction

Integratingindividual

judgements

Risk exposure from probability & loss estimates

Senior managers, managers

Ranking sheets, project documentation

Second round: participants are grouped and resultsare re-ranked following feedback and resultsfrom the supplier response

Second round: participants are grouped and resultsare re-ranked following feedback and resultsfrom the supplier response

Results collated after general agreement

Results compared using the RDS for consistency

INPUT

OUTPUT

PROCESS

Figure 8.4 Qualitative survey methodology (adapted from Jones and Hunter, 1995)

Chap-08.qxd 3/1/05 12:34 PM Page 181

Page 201: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

conducted with the buyer organization. Each ‘wave’ of activitywas also explained, as the RDS information would be collectedat different points in time.

The main survey instrument was a questionnaire consisting ofLikert scale ratings, asking the participants to rate the probabil-ity of occurrence and extent of loss that could be experienced bythe buyer organization along the separate risk dimensions.Approximately half of the respondents were interviewed face-to-face, the other half via telephone or e-mail given theremoteness of the various sites. Minor editing was carried outfor clarity and consistency. For the discussion questions, theresponses were edited and discussed within the risk frameworkof the exercise since ideas, clarifications, and elaborations wererequired.

Various assumptions have been made and validated. A majorassumption is that the exercises in this chapter adequately illus-trate the use of a tool that enabled the collection of readily avail-able information from both the supplier and buyer organizationsto develop the risk profile at separate points in time: for example,the existence of direct internal and external influences on thepre-established risk dimensions for the ITO exercise at the buyerorganization along the eight risk dimensions initially proposed.The relationship between the influences and risk dimensions is valid only if there are no other factors to be considered. Thisassumption is valid if the environment is controlled. In a dynamicbusiness environment this may not hold true. The assumptionnevertheless can be made based on the absence of any other input.The exercise hence can be said to provide some validity for the riskdimension and classification of risks.

Another major assumption is that the frameworks created byprevious authors and researchers are adequate for the definitionof risk exposure. It assumes that the work that has been done todate can be reused in this context and purpose. The risk expos-ure frameworks are extended and form the foundational elem-ents of the RDS profile.

A further assumption is that the risk transfer mechanism is valid.When the operations are transferred from one organization toanother, the nature of the risks is multidimensional. It is assumedthat the risks do not actually physically move but are experiencedby the party that takes over the activities that result in the risks.

Given the methods, processes and assumptions made in thischapter, the RDS profile was then used at several points in the

Managing the Risks of IT Outsourcing

182

Chap-08.qxd 3/1/05 12:34 PM Page 182

Page 202: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

183

activities timeline in the outsourcing of the IT function at thebuyer organization. The various technical, financial, legal, oper-ational, business, environmental, informational and strategicrisk elements would be considered and changes observed.

8.6 Using the risk dimensions

The processes that were initiated to create an RDS profile havebeen carefully illustrated in this chapter. The ‘subject’, i.e. thebuyer organization in the case study, for the creation of the risksprofile, was selected to allow maximum opportunity to collateand process the risk information in an appropriate outsourcingenvironment. This allowed the researcher to be deeply involvedwith the daily activities that were linked directly to the decisionto outsource the IT function, selection of the supplier organization,justification of the business case for the outsourcing exerciseand engaging with the supplier in order to commence the out-sourcing exercise.

The methods used allowed very detailed observations of therisks from perspectives intimate to the buyer organization andthe specific ITO situation. The measurement scales weredevised to allow the capture of risks from the eight selected,summary risk dimensions. All eight dimensions were verifiedagainst the causes and influences of risk both from within andexternal to the organization at the time of the readings. Theprocesses involved required the gathering of data, and the pro-cessing of the information to provide meaningful risk exposurevalues, standardized with the use of a computer program writ-ten specifically to obtain the information sought. The programand the algorithms were subject to the regular software applica-tion tests.

In Chapter 2, some of the pertinent and existing concepts ofrisks inherent in an ITO project were illustrated. It was empha-sized there that the IT environment was uniquely differentgiven its rapid change and ‘fluid’ definition both as a support-ing and a driving function within the organization in a competi-tive environment. Risks in this area included both operationaland relationship risks. Further work by several researchers andpractitioners suggested risk evaluation frameworks and otherspropounded a range of risk exposure measurement techniquesfor the ITO environment. The information at hand is thereforesufficiently substantiated to allow the risk profiles and thenegotiations process to be addressed directly.

Chap-08.qxd 3/1/05 12:34 PM Page 183

Page 203: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

184

8.7 The buyer & supplier RDS profiles6

The results of the RDS tool comprised a risk profile for both thebuyer and supplier organizations at predetermined points intime. Following this, the results of the RDS would be used toobserve changes in the risk profile as the risk transfer phenom-enon became manifest in the outsourcing exercise.

This evidence provides support for a comparison of the RDSs oftwo suppliers against what is perceived as an acceptable risk byboth these organizations. It also provides confidence that therisk dimensioning is representative of the risks encountered.Movements and a presumed relationship between the riskdimensions provide early warning for both the supplier andbuyer on possible outcomes and ways of mitigating risks.

At the start of the ITO exercise

The illustration in Figure 8.5 represents the RDS profiles for allthe participants of the ITO exercise at two points in time. Point#1 was an RDS reading taken prior to the selection of the sup-plier. The risks elements were captured via the use of responsesto a ‘Request for Proposal’ (RFP) document and material fromthe project. These were used in conjunction with the methodsdiscussed earlier. At this juncture, the RDS profile for the buyerorganization was also taken to assess the risk profile prior to thehandover of the IT function to the suppliers, as well as to gaugethe level of risks that were being experienced by all the partici-pants of the ITO exercise. The difference in risk exposurebetween supplier S1 and supplier S2 is illustrated in Figure 8.6.The RDSs at point #1 were also used to form the basis of thenegotiations between the parties.

After the conclusion of the selection process, that is at point #2,another RDS profile was taken only for the buyer organization.Point #2 was at a time when the ITO exercise was about to com-mence, after the selection of one successful supplier. The differ-ences in the buyer organization’s risk profile are shown inFigure 8.7.

When the risk profiles were being created and examined, anarbitrary ‘acceptable’ risk level of 3 was allocated to all the

6 The supplier names have been withheld at the request of the buyerorganization in the case study and arbitrarily named S1 and S2 for thepurposes of this discussion

Chap-08.qxd 3/1/05 12:34 PM Page 184

Page 204: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

185

participating organizations. This would allow a benchmark tobe established when the team members were interviewing theemployees and stakeholders at both the buyer and supplierorganizations for risk exposure values. For example, when level 3was acceptable risk, then any number above this would indicatedegrees of higher risk and any number below would indicateless risk or almost no risk to the organization. In Figure 8.5, forexample, if the RDS profile for the suppliers were examined, then

Technical

Technical

6

5

4

3

2

1

0

6

5

4

3

2

1

0

Legal

Legal

Financial

Financial

Operational

Supplier 1Supplier 2Buyer‘Acceptable’

Operational

Business

Business

Environmental

Environmental

Point #1

Point #2

Informational

Informational

Strategic

Strategic

Supplier 1Supplier 2BuyerAcceptable risk

Figure 8.5 Buyer and suppliers’ RDS data at point #1 (prior to the selection of the supplier) and atpoint #2 (after the supplier had been selected and the ITO exercise commenced)

Chap-08.qxd 3/1/05 12:34 PM Page 185

Page 205: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

186

the levels of legal risk exposure (along the legal risks dimen-sion) for both suppliers S1 and S2 are very low and below theacceptable threshold for both organizations. The buyer organ-ization, however, was experiencing unacceptable levels of legalrisks as it was exposed to significantly more experience from thesuppliers, who could potentially take advantage of the ‘deal’.

For all three participants in the ITO exercise, the risk profiles atthe time prior to the selection of the supplier organization, thatis below point #1, are discussed in turn.

RDS for supplier S1

The unique feature about supplier S1 was that it had previouslyworked very closely with the buyer organization. S1 was themain supplier of IT equipment and services for the buyer organ-ization and even had multiple outstanding contracting agree-ments with it to supply labour, parts and support services forthe mainframes and computer equipment. Supplier S1’s existingknowledge of the buyer gave it an unfair advantage over the othersupplier organizations. Its risk in bidding for the outsourcedexercise was expected to be lower given its existing knowledgeof the operations.

The opposite is observed in Figure 8.5. Risk exposure scoredhigh for all the risk dimensions except for strategic and legal.This was possibly because the supplier had prior knowledge ofpending issues, including severe technical problem areas itwould encounter when taking over the operations from thebuyer organization (see the introduction to the case study out-lining some of the problems facing the buyer organization). Thenoticeably high risk exposure (in both S1 RDS profiles) alongthe financial risk dimension also provides a clue as to S1’sjudgement on the propensity to make a financial loss from thisexercise.

Coincidentally, S1 had proposed a preliminary approach to divideoutsourcing activities into two phases. Phase 1 would allow thesupplier time to conduct appropriate audit and assessment of theenvironment before proposing a final outsourcing solution. PhaseII would then be the actual outsourcing exercise. This may be con-strued as a clever strategy by S1 to mitigate its operational, infor-mational and technical risks. It turned out that the proposal wouldimpose unacceptable business and operational risk on the buyerorganization as the final supplier would have been selected andthe bargaining power would have been diffused significantly.

Chap-08.qxd 3/1/05 12:34 PM Page 186

Page 206: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

187

To maintain a fair and unbiased process, the buyer organizationhad already carried an element of business and legal risk givenits industry position nationally and degree of risk imposed bythe Government. This also placed some stress on S1, which isconspicuous in the high risk exposure in the environmental riskdimension in Figure 8.5.

In addition, other environmental risks were very high. The rea-sons for this are not discernible from the RDS illustration inFigure 8.5, given the uncertainty in the domestic environment(as discussed earlier) as well as in the industrial sector with theonset of global terrorist activity (at the time of the case study in2002), the regional SARS epidemic in 2003 and regional instabil-ity (in 2003/2004). This also affected business and operationalrisks. Some of the operational risks, however, were mitigatedthrough the use of new equipment, better use of existing per-sonnel and stringent checking procedures.

The relationship between S1 and existing local providers wasalso another risk factor. As S1 was an American organization,the risk was that it would have an insufficient track record withlocal vendors to attract local assistance should this be required7.For example, if the buyer organization had to work with a localtransport organization that did not have a working relationshipwith S1, then this would place increased and undue pressure onthe logistics of the buyer organization. This risk is environmental,and would have been unacceptable to the buyer organizationand also to the supplier. Given the role of the buyer organiza-tion and its relationship with the Government, concerns overnot being seen to be loyal to national interests by working withan organization located overseas also created risk in the envir-onmental risks area, especially at a time when the threat of ter-rorist activity was high. The buyer organization had close linkswith the Government and it would have been politically incor-rect to be seen as having little interest in the domestic scene. Therisk exposure along the strategic risk dimensions was withinacceptable limits. Again, this could be construed as a ‘goodaccount’ for S1 as it would increase its market share in the out-sourcing market in the country.

The supplier was to assume a position as a prime contractor and in this role it would be managing relationships with other

7 Many IT components can be sourced locally, i.e. within the country; andlocal relationships would mean that the components could have beensourced at favourable rates and conditions

Chap-08.qxd 3/1/05 12:34 PM Page 187

Page 207: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

188

suppliers. S1 was a very large multinational IT organization. Inthis capacity, and in its ability to source for other suppliers, itwas superior to many other organizations in the country.Noticeably, its technical risk exposure was within the bounds ofwhat was considered acceptable.

S1 had a large legal team reviewing the contracts. Legal agree-ments and contracts bind the prime contractor with the buyer ofoutsourcing services. Other legal agreements and contracts bindthe prime contractor with other contractors in back-to-backdelivery promises. Penalty clauses would apply the appropriatepressure on the suppliers to comply. The RDS showed that riskexposure along the legal risks dimension was very low.

RDS for supplier S2

The RDS for supplier S2 was derived using a program similar tothe one conducted for supplier S1, illustrated in Figure 8.5. InFigure 8.6, the RDSs for both S1 and S2 are illustrated simulta-neously to allow a comparison between the two suppliers at thesame point in time during the ITO exercise. Both the supplierswere competing for the same work.

Technical

Financial

Legal

Operational

S1 Risk exposureS2 Risk exposureAcceptable risk

Business

Environmental

Informational

Strategic

6

5

4

3

2

0

1

Figure 8.6Suppliers’ RDS datacomparison at point#1 (similar toFigure 8.5 exceptthat the buyer RDShas been removedfor clarity)

The information from S2 is also unique. Although the RDS wasconstructed from interviews with six representatives from sup-plier S2 along with the supplier response to Request forProposal (RFP) document, unlike S1, the people interviewed forS2 were not from the country (i.e. they flew into the country for

Chap-08.qxd 3/1/05 12:34 PM Page 188

Page 208: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

this assignment only). This meant that their background know-ledge of the buyer organization and working knowledge wasobtained through literature and briefings from their local repre-sentatives. They would not have had the same working know-ledge of the buyer environment and advantages as would thepeople from S1.

Like the RDS for S1, that for S2 indicated how the supplierwould perceive the risk to the buyer organization. In this case,S2 had a fresh view of the buyer organization and did not haveprior knowledge of the IT environment. It was not aware of thecomplexities or details of the troubles the buyer organizationwas experiencing. And it did not have the time or the resourcesto familiarize itself with the buyer organization’s IT operations.(Over a 2-month period, the buyer organization had dissem-inated as much information as possible via briefing sessions andvia multiple ‘Question and Answer’ sessions to provide infor-mation for both suppliers prior to the negotiations.)

Both the RDSs for S1 and S2 are compared on similar bases inFigure 8.6. On examination, the basic patterns for both signa-tures (RDSs) were seen to be fairly similar. This similarity in thesignatures suggests that the perception of risk by both the suppliers was also fairly similar. This also implies that the information sessions that the buyer organization had conductedmay have provided sufficient information to allow both thesuppliers to have almost equal perception of the outsourcingexercise. In this case, a bias toward S1 by way of informationand perception may have been minimized through extensiveconversations with the supplier representatives during the exercise.

The risks in the operational, business, environmental, informa-tional and strategic risk dimensions were almost the same forthe two suppliers. Assuming that the suppliers S1 and S2 had noinherent advantage, this observation suggests validation of anearlier proposition wherein the relationship between the riskexposure and both internal and external influences on the twosuppliers was consistent. The risks along the dimensions justmentioned were influenced by external factors.

Both S1 and S2 were placed in the same environment where theexternal influences, i.e. the buyer organization, environmentand bidding structure (IT outsourcing project), were commonfor the two suppliers. If Figure 8.6 were reviewed again, the riskdimensions most affected by internal influences would be tech-nical, financial and strategic. In Figure 8.6, the largest difference

189

Chap-08.qxd 3/1/05 12:34 PM Page 189

Page 209: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

190

in risk exposure between S1 and S2 lies in the technical andfinancial risk dimensions.

The financial, technical and strategic risks are affected by supplierinternal influences. The ‘spike’ in the financial dimension for bothS1 and S2 could also point to an early warning for risks in the areaof the budgeting and financial modelling that need to be done.

Equation (4.1) for total risk exposure derived in Chapter 4, thetotal Risk Exposure, �� � � [�(product of adjacent risk magni-tudes)] is reused here. � is a constant with a value that is a func-tion of the number of risk dimensions. The total risk exposure(rounded to the nearest decimal place for consistency with thedata input) hence is computed for both S1 and S2 as Risk(S2) � 38.6, and Risk (S3) � 36.2.

The results also indicate that there is an almost equal risk expos-ure for the two suppliers that are working in the same environ-ment with the same buyer organization. Despite the obviousdifferences in risk exposure along the technical and financialrisk dimensions, the small differences in the other risk dimen-sions appear to compensate for these differences.

Acceptable risk exposure indicated by the fine dotted line inFigure 8.6, is computed as Risk (acceptable) � 25.4. Both sup-pliers appear to be ‘over-exposed’ by 52% and 42% respectively(see Table 8.3). This indicates a project that has ‘high risk’ and aninherent need to reduce risks in all the areas other than the legal,strategic and technical, wherein the suppliers appear to be mostcomfortable. The term high risk also presupposes the notionthat the suppliers’ appetites for risks are lower than the 42%over-exposure value computed.

Unacceptable risks occur in five of the eight dimensions identi-fied in this exercise. From observation of the shapes of the RDSs,it appears that there is least exposure in the area of legal risks. Ifthe theory that total risk exposure remains constant is true, therisk exposure along the legal risk dimensions can be used tocompensate for over-exposure along the other risk dimensions;

Table 8.3 Risk exposure levels for S2, S3 against ‘acceptable’ risk

Supplier S2 Supplier S3 Acceptable

Risk exposure 38.6 36.2 25.5% Over-exposed 52 42

Chap-08.qxd 3/1/05 12:34 PM Page 190

Page 210: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

191

i.e. this is a risk area where some trade-off can occur. Practically,this means that it is possible for legal instruments or agreementsto be crafted and used to offset or reduce the informational,environmental and business risks. For example, the supplierscould arrange indemnity clauses, promising to deliver certainactivities or deliver certain products in exchange for certainassurances in the business and environmental dimensions.

Qualitative assessment of the buyer RDS

The risk exposure (rounded to the nearest decimal place for con-sistency with the input data) for the buyer at point #1 is definedmathematically as �� � 41.1. This measurement derives fromthe risk exposure computation following the equation for totalrisk exposure derived in Chapter 4, where

�� (total risk exposure) � � [�(product of adjacent riskmagnitudes)]

as also reused here. �, in this instance, is equal to 0.3536.

The acceptable risk exposure (marked by the dotted line inFigure 8.5), is Risk (acceptable) � 25.4. Through similar compu-tation the Risk (maximum) � 101.8. A possible interpretationcould be that the current risk profile is 15% over the acceptablerisk tolerance level.

The least significant risks areas are business and strategic. Allother areas appear to have risks that are unacceptably high.From the interactions with individuals at the buyer organization,the most prominent feature, which was repeatedly highlightedin the discussions, was concern that the buyer organization wasin turmoil because of uncertainty in its industrial sector and inits current political setting. The environment was most signifi-cant to the outsourcing of the IT function as the suppliers wereUS companies and were subject to intense scrutiny from localgovernment (being overseas companies). This was a unique risksituation, highlighted in this case with a very high reading forrisk exposure along the environmental dimension.

Risk exposure along the informational risk dimension was apossibility because the IT infrastructure that supported the buyerorganization’s operations was almost non-functional. ‘Systemsare not integrated and other components practically not working’(CIO, personal communication, 5 November 2002). Operationalrisks were high generally as a result of poor information (i.e. late

Chap-08.qxd 3/1/05 12:34 PM Page 191

Page 211: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

or incorrect information). This extended to high legal risks (fromsuits as a result of negligence). Technical risks were also high as aresult of non-performance issues. Many of these issues, however,were interrelated. When the suppliers were invited to bid forthe outsourcing exercise, each organization was assessed for itsability to deliver superior IT results for the buyer organization.

The buyer RDS profiles were measured at two points in time,point #1, i.e. when the suppliers were being selected, and point#2, i.e. when the ITO exercise had commenced using the supplierselected.

Managing the Risks of IT Outsourcing

192

Technical6

5

4

3

2

1

0

Financial

Operational

Legal

Business

Environmental

Informational

Strategic

RE stage 1RE stage 2‘Acceptable’

Figure 8.7Buyer RDS datacomparison at twopoints in the ITOexercise

Just after the commencement of the ITO exercise, the risk dimen-sion signature for the buyer organization was tested again. Thistime around, the risks appeared to exist along similar dimen-sions but were manifest in different ways and in magnitude ofexposure.

Many of the issues had already been addressed through jointworking sessions where both the supplier and buyer teams hadhad thorough discussions and undergone exchange of docu-mentation, and had completed due diligence with respect toeach other’s organization. Both parties were aware of the typesof risk that were going to be ‘passed-on’ from the buyer to thesupplier. Negotiations had already progressed to the stage whenthe supplier had also quoted its ‘fee’ for services to be renderedaccording to the agreed scope and scale of the exercise. The sup-plier’s risks would have been taken into account already. This is

Chap-08.qxd 3/1/05 12:34 PM Page 192

Page 212: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

193

referred to as point #2 for the purposes of measuring the RDS ofthe buyer.

There were sixteen selected participants from the buyer organ-ization for this round of data collection. The CIO was in thegroup, together with eight senior general managers, and seniormanagers from the IT, audit and risk groups as well as fromfunctional areas that utilize IT in routine operations.

The risk exposure computed at point #2 yields Risk (buyer @ pt 2)� 36.6 (see Figure 8.7) as compared to the previous risk exposureat point #1 (see previous section) of Risk (buyer @ pt 1) � 41.1.The risk exposure decreased along multiple risk dimensions.This confirms an earlier expectation that the total risk exposurewould decrease as a result of selecting supplier S1. On examin-ation, the topology of the RDS also illustrates a very dramaticreduction (from 4.1 to 1.3) in the informational risk dimension.With minimal contractual problems (see legal risk dimension),the buyer organization is expecting to reap the benefits throughthe supplier including economies of scale, scope or specializa-tion in the form of improved quality, lower cost or faster time tomarket of all its operations, translating roughly into lower infor-mational risks. This has also been observed in the literature(Quinn and Hilmer, 1994).

Some researchers observe lower informational risks where thesupplier provides a multitude of easily measured activities thatare specified in the service contract (Shachtman, 1998), allowingthe buyer organization to generate greater outsourcing opportun-ities and stronger incentives for its partner (Holmstrom andMilgrom, 1991). The ability to monitor services from the IT func-tion eases the monitoring exercise. This could explain the signifi-cant reduction in informational risk from the perspective of themonitoring dimension.

The buyer organization, unlike in a situation where there existsa large degree of uncertainty with respect to various factors ofservices provided and the external environment, faces a consist-ent environment wherein the IT components and functions havebeen long in use and are familiar to both supplier S1 and the buyerorganization. Issues of poor monitoring raised by researcherssuch as Quinn and Hilmer (1994) are not as pronounced in thisinstance.

Uncertainty is a constant in IT-based processes, making outsour-cing inherently difficult, owing to the expectation that current‘facts’ will no longer be relevant soon after the commencement

Chap-08.qxd 3/1/05 12:34 PM Page 193

Page 213: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

194

of a relationship. As the buyer organization is also trying to raiseits IT capabilities, the uncertainty in the technical environmenthas also been de-emphasized. Indeed when the technical riskdimensions between point #1 and point #2 are compared, thetechnical risks have decreased as a result of uncertainty.

Supplier S1 had a high reputation for delivery and the percep-tion was that it would deliver to the required standards. It wasknown that the losses from insufficient or inaccurate informa-tion as a result of poor performance from the IT function washigh but the dramatic reduction in the probability and extent ofloss as a result of the outsourcing of this function to supplier S1was surprisingly high. The highest reduction in risk exposureamong all the risk dimension changes was seen here.

The RDS topology at point #2 also looks rather dramatic, with anextremely acute angle for the environmental risk dimension (seeFigure 8.7). This is probably misleading as the risks for thoseadjoining, informational and business, had decreased fromunacceptable levels to within the acceptable risk limit of 3.0.Discussions at that time, however, revealed qualitative informa-tion that contributed to the significantly high environmental risksincluding information privy to the supplier only, i.e. asymmet-ries in intelligence information before contracting, imperfectmonitoring of the supplier’s actions, and external or exogenouschanges that allow the supplier to behave opportunistically (seealso Agency Theory in Chapter 4).

The levels of risk in the financial and legal risk dimensionsappear to have increased as a result of the outsourcing activity.There are transactions costs associated with reliance on the mar-ket, including the explicit co-ordination costs and more complexcontractual risks. This is evident in this exercise. Although thecontrol over the outcomes has increased through contractualinstruments, the mitigating factor was recourse through thelegal system. This increased the anxiety levels of managementand the perception of legal risks. Also, although the loss of con-trol over the process itself was intentional, this was the pointthat was highlighted throughout the discussion and interviewsessions; it had contributed to additional (or access) precaution-ary measures that raised the internal or endogenous influencesthat contribute to financial risks.

It is worthwhile noting that the outsourcing exercise hadincluded a range of risk mitigating activity built into the govern-ance contract as well as the service level agreements. A more

Chap-08.qxd 3/1/05 12:34 PM Page 194

Page 214: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

A Case Study – ITO Risks

195

meaningful observation would be if both the RDSs (points #1and #2) were compared simultaneously.

Quantitative assessment of the buyer RDS

When both the RDSs are superimposed and compared, the dif-ferences as a result of the planning activity become more obvi-ous. The illustrative comparison (Figure 8.7) clearly shows thechanges in risk exposure between the measurement from point #1to point #2. The percentage change in total risk exposure from41.1 to 36.6 is measured against the maximum possible riskexposure, i.e. 101.8. By way of computation, this indicates a 4%reduction in total risk exposure.

Although this is a very rough measure of the total risk exposure,it also provides a perspective on the relative amount of changein the overall risk landscape that is being discussed. The buyerorganization, it appears, is not expecting its risk profile tochange significantly after the ITO exercise. In fact, if the topolo-gies are compared, it is also obvious that some of the risks haveincreased along several critical dimensions, e.g. financial risks(see Figure 8.7).

The main difference is the change in risk exposure in the areasof financial and operational risk. The financial risks seemed tohave escalated significantly (by 24%) through loss from unbud-geted events as a result of lack of experience and expertise onthe part of the buyer organization’s personnel in relation to theoutsourcing activity. In addition, the general uncertainty in thebudgeting process did not raise the confidence of the financepersonnel or of the general managers in their various oper-ational positions. The supplier was expected to take up theoperational risks. This perception resulted in the lowering of oper-ational risks (16% reduction). The biggest improvement notedfrom the RDS was the extreme improvement in informationalrisk (approximately 47%). This quantum leap corresponds to thebuyer organization relinquishing operational control to theexternal party. This also implies that there was a significant lackof trust in the internal IT operations legacy in respect of deliver-ing accurate and timely information.

In the previous section the total risk exposures between points#1 and #2 were compared instead of the risk profiles from therespective RDSs. If the difference between each individual riskdimension were compared to the ‘acceptable’ risk level of 3, the

Chap-08.qxd 3/1/05 12:34 PM Page 195

Page 215: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

196

risk difference or risk variance between acceptable and actualrisks would be obtained. The average difference between actualand acceptable risks in all the risk dimensions represents thelevel of risks above ‘risk appetite’ for the buyer organization. Atthe beginning of the exercise (point #1), the difference was quitesignificant (0.9 of 6.0), i.e. an average of about 15% over the tol-erance limit. At the end of the negotiations and at the com-mencement of the contract with the supplier, the average risksdropped (0.6 of 6.0), i.e. an average of 10% over the tolerancelimit. This 5% difference in average reduction in risk level,approaching ‘acceptable’ risk levels, was used to show that thedecision of the buyer organization to outsource the IT functionwas indeed advantageous.

The industrial environment of the buyer organization is turbulent.Many buyer organizations install new systems in anticipation ofexternal changes, with few data on the nature of change. Boundedrationality often impedes comprehensive contracting in thesesituations, resulting in contracts with misaligned incentives orsignificant changes in bargaining power, allowing the supplierto appropriate fees from the buyer. Contractual risks are great-est for those projects that are critical to the buyer organization’scompetitive advantage. These systems often provide the buyerwith unique benefits that cannot be achieved without the con-tracted services. This trait increases the case study buyer organiza-tion reliance on supplier S1, increasing the possibility of supplierhold-up. The effects of these influences have been discussedextensively but appear, however, to cause minimal concern at thebuyer organization, where an increase in legal risks is observed.

As mentioned before, supplier S1 has been working with thebuyer organization in the capacity of hardware supplier. Concernsexisted over the supplier’s access to confidential data andprocesses that provided it with competitive advantage. A majorobjective of the outsourcing exercise, however, was to be able toleverage the supplier for its superior systems and processes.This element was de-emphasized as the concerns were borne bythe supplier.

The financial risk dimension had increased. One observationrelates to the interconnectedness of the exercise within the buyerorganization. The exercise requires the supplier to be intimatelyfamiliar with procedures from various sources at the buyerorganization that may be quite difficult to implement. The ITfunction affects multiple stakeholders within the buyer organ-ization, making it difficult to specify desired requirements and

Chap-08.qxd 3/1/05 12:34 PM Page 196

Page 216: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

functionality. A specific example is the standard operating PCenvironment (SOE-PC) where responsibility for the desktop isoutsourced component-wise. Co-ordination difficulties andmultiple standards in use throughout the buyer organization,plus peculiar levels of autonomy, increase the complexity. Whileinternal IT providers may be generally familiar with the oper-ations of an organization, data collection and the mastering ofspecific procedures throughout the organization by an outsidevendor are costly and increase the overall levels of financialrisks arising from uncertainty and scope creep.

8.8 Concluding remarks

The premise of the discussion on managing the risks of IT out-sourcing began with a comment that this activity involved acombination of the art of management and the science of meas-uring an indefinite event, risk. The notion of capturing andillustrating risks with the RDS tool-set and interpreting the riskprofiles was shown to provide the basis for measurement.Several theories were then used to assist in translating some ofthe characteristics of risk into predictable trends. With the ratherlengthy discussion made in the past few pages, it is hoped thatthe reader gains an alternative view and a further appreciationof the use of the RDS and of the concepts where the risk dimen-sions share a relationship in any typical ITO project, and will seethat the risks are indeed measurable and manageable.

The art of management of the risk events that occur then takesover as activities and programmes are put in to place to mitigatethe effects of the risks, to manipulate the influences or origins ofthe risk events, and to control the internal and external factors thatcould result in events that in turn give rise to unwanted out-comes. There is no substitute for experience and the innate abil-ity to manage an organization’s resources, the environmentalfactors and the factors that influence other organizations in thesame sector.

It is therefore my hope that the concepts introduced and toolsthat can be developed using the RDS will help in your currentITO exercise or the next time you are involved with an ITO exer-cise and activity.

A Case Study – ITO Risks

197

Chap-08.qxd 3/1/05 12:34 PM Page 197

Page 217: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

This page intentionally left blank

Page 218: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

199

Alexander, M. and Young, D. (1996) Strategic outsourcing. Long Range Planning 29 (1): 116–119.

Aubert, B.A., Patry, M. and Rivard, S. (1998) Assessing the Risk ofIT Outsourcing, Proceedings of the Thirty-First Hawaii InternationalConference on System Sciences (HICSS), IEEE, Hawaii.

Baker, G.L. and Gollub, J.P. (1990) Chaotic Dynamics. CambridgeUniversity Press, London.

Bensaou, M. (1999) Portfolios of Buyer-Supplier Relationships.Sloan Management Review 40 (4): 35–44.

Blaxill, M.F. and Hout, T.M. (1991) The fallacy of the overheadquick fix. Harvard Business Review 69 (4): 93–101.

Boehm, B.W. (1991) Software Risk Management: Principles andPractices. IEEE Software, January 1991, pp. 32–42.

Brislin, R. (1999) Communicating Information about Cultureand Personality in Formal Cross-Cultural Training Programs.Personality and Person Perception Across Cultures. LawrenceErlbaum, Mahwah, New Jersey, pp. 255–277.

Caldwell, B. (1997) Why Outsource? – Some Organisations FindSwitching Doesn’t Lower Costs. Information Week, 659.

Carr, D.B. and Nicholson, W.L. (1988) A program for exploringfour-dimensional data using stereo-ray glyphs, dimensionalconstraints, rotation, and masking. In W.S. Cleveland and M.E. McGill (eds), Dynamic Graphics for Statistics, Wassworth,Belmont, CA, pp. 309–329.

Clemons, E.K. (1995) Using scenario analysis to manage the strate-gic risks of reengineering. Sloan Management Review 36 (4): 61–71.

Clemons, E.K. (2000) The Build/Buy Battle – Balancing the risksand rewards of information serve outsourcing. CIO Magazine(1st December, 2000).

Currie, W.L. and Willcocks, L.P. (1997) New Strategies in ITOutsourcing: Major Trends and Global Practice Report. BusinessIntelligence Ltd, London (December, 1997).

References

References.qxd 3/1/05 3:29 PM Page 199

Page 219: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Managing the Risks of IT Outsourcing

200

DiRomualdo, A. and Gurbaxani, V. (1998) Strategic intent for IToutsourcing. Sloan Management Review 39 (4): 67–80.

Domberger, S. (1998) The Contracting Organisation: A StrategicGuide to Outsourcing. Oxford University Press, Oxford, UK.

Donner, S. (2001) KPMG’s Risk Management Services. KPMGLLP (June), New York, NY.

Drucker, P.F. (1995) Managing in a Time of Great Change.Butterworth–Heinemann.

Earl, M.J. (1996) The risks of outsourcing IT. Sloan ManagementReview 37 (3): 26–32.

Eisenhardt, K. (1989) Agency Theory: An Assessment andReview. Academy of Management Review 14 (1): 57–74.

Elfing, T. and Baven, G. (1994) Outsourcing technical services:stages of development. Long Range Planning 27 (5): 42–51.

Elitzur, R. and Wensley, A. (1997) Game theory as a tool forunderstanding information services outsourcing. Journal ofInformation Technology 12: 45–60.

Evans, P. and Wurster, T.S. (2000) Blown to Bits. HarvardBusiness School Press, Boston, MA.

Fowler, A. (1997) How to outsource personnel. People Manage-ment (Feb 20, 1997): 40–42.

Goodridge, E. (2001) Outsourcing makes work for lawyers. Information Week [online] http://www.techweb.com/wire/story/TWB20010102S0004; accessed 15th April, 2003.

Hagedoorn, J. (1993) Understanding the rationale of strategic technology partnering: inter-organisational modes of cooper-ation and sectoral differences. Strategic Management Journal14: 371–385.

Hamel, G. and Prahalad, C.K. (1994) Competing for the Future.Harvard Business School Press, Boston, MA.

Hofstede, G. (1980) Motivation, leadership, and organizations:do American theories apply abroad? Organizational Dynamics(Summer, 1980).

Holmstrom, B. and Milgrom, P. (1991) Multitask principal-agentanalysis: incentive contracts, asset ownership and job design.Journal of Law, Economics and Organisations 7 (2): 24–52.

Hoskisson, R., Johnson, R.A. and Moesel, D.D. (1994) Corporatedivesture intensity in restructuring organisations: effects ofgovernance, strategy, and performance. Academy of Manage-ment Journal 37: 1207–1251.

Jones, J.M.G. and Hunter, D. (1995) Consensus methods formedical and health services research. British Medical Journal311: 376–380.

Kaplan, R.S. and Norton, D.P. (1996) The Balanced Scorecard.Harvard Business School Press, Boston, MA.

References.qxd 3/1/05 3:29 PM Page 200

Page 220: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Keller, P.R. and Keller, M.M. (1993) Visual Cues: Practical DataVisualization. IEEE Press, New Jersey, p. 24.

Kern, T. and Willcocks, L. (2001) The Relationship Advantage:Information Technologies, Sourcing and Management. OxfordUniversity Press, Oxford.

Kern, T., Willcocks, L.P. and van Heck, E. (2002) The winner’scurse in IT outsourcing: strategies for avoiding relationaltrauma. California Management Review 44 (2): 6–24.

Lewis, T. and Sappington, D. (1991) Technological change andthe boundaries of the organisation. American Economic Review(September): 887–900.

Lorenz, E.N. (1993) The Essence of Chaos, reprint edition (April1996). University of Washington Press, USA.

Markides, C.C. and Williamson, P.J. (1994) Related diversi-fication, core competences and corporate performance.Strategic Management Journal 15 (Special Issue, Summer):149–165.

Markus, M.L. and Tanis, C. (2000) The organisation systemsexperience – from adoption to success. In R.W. Smud (ed.),Framing the Domains of IT Research: Glimpsing the FutureThrough the Past. Pinnaflex, Cincinnati, OH.

McMillan, J. (1992) Games, Strategies and Managers. OxfordUniversity Press, New York, NY, p. 6.

Miller, G.A. (1994) Reprint of the magical number seven, plus orminus two: some limits on our capacity for processing infor-mation. Psychological Review 101: 343–349.

Murphy, J. (2004) Management update: evaluating and mitigat-ing Outsourcing risk. Gartner Outsourcing Report [online],http://www3.gartner.com/ps/asset_61461_1535.jsp;accessed 5th May, 2004.

Nash, J.F. (1951) Noncooperative Games. Annals of Mathematics54: 289–295.

Nash, J.F. (1953) Two-person cooperative games. Econometrica21: 128–140.

Nelson, P., Richmond, W. and Seidmann, A. (1996) Two dimen-sions of software acquisition. Communications of the ACM 39(7): 29–35.

Porter, M.E. (1985) The Competitive Advantage. The Free Press,New York, NY.

Prahalad, C. and Hamel, G. (1990) The core competence of thecorporation. Harvard Business Review 68 (3): 79–91.

Quinn, J.B. and Hilmer, F.G. (1994) Strategic outsourcing. SloanManagement Review 35 (4): 43–55.

Quinn, J.B. (1993) The Intelligent Organisation. The Free Press,New York, NY.

References

201

References.qxd 3/1/05 3:29 PM Page 201

Page 221: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Roach, S.S. (1991) Services under siege – the restructuringimperative. Harvard Business Review 69 (5): 82–92.

Saunders, C., Gebelt, M. and Hu, Q. (1997) Achieving success in information systems outsourcing. California ManagementReview 39 (2): 63–79.

Schirripa, F. and Tecotsky, N. (2000) An optimal frontier. TheJournal of Portfolio Management 26 (4): 29–40.

Shachtman, N. (1998) Measure success – careful metrics helpbusinesses get what they need from their outsourcing deals.Information Week 706 (October 26, 1998).

Sherer, S. (1995) The Three Dimensions of Software Risk:Technical, Organisational, and Environmental. HICSSProceedings (January 1995), IEEE Press, New Jersey, pp.369–378.

Sobol, M. and Apte, U. (1998) Outsourcing practices and viewsof America’s most effective IS users. In L.P. Willcocks andM.C. Lacity (eds), Strategic Sourcing of Information Systems,Wiley, Chichester.

Teng, J.T.C., Cheon, M.I. and Grover, V. (1995) Decisions to outsource information systems functions: testing a strategy-theoretic discrepancy model. Decision Sciences 26 (1): 75–103.

Tho, L.I. (2004) An investigation of the interaction between risktypes in the outsourcing of the information technology func-tion. Deakin University Thesis, Australia.

Venkatesan, R. (1992) Strategic sourcing: to make or not to make.Harvard Business Review 70 (6): p. 101.

Venkatraman, N. (1997) Beyond outsourcing: managing ITresources as a value centre. Sloan Management Review 38 (3):51–64.

Managing the Risks of IT Outsourcing

202

References.qxd 3/1/05 3:29 PM Page 202

Page 222: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Actuarial Standards Board, 81Additional Resource Charges, 89Adverse selection, 113Agency Theory, 67, 68, 112, 152Alpha

constant, 147Ambiguity, 160Application

development, 180maintenance, 179

ARC. See Additional Resource ChargesAssumptions, 163Auction, 110, 111, 112, 121

Baseline, 8, 39Benefits

Buyer, 24Common, 24Supplier, 23

Bi-directional, 67Blurred organizational boundaries, 11Business continuity, 176Business intelligence, 39Business process management, 48Business-to-business, 111Buyer relationship, 13

Buyer RDS, 192

Catalyst, 170Causality. See Cause and effectCause and effect, 68, 78, 142, 143, 153Cellphone. See Mobile telephoneChange management, 36Chaos theory, 151Chaotic systems, 151Chief Information Officer, 168

Competence, 21Competitive, 21Conflict, 35Constant alpha. See Risk ExposureContract irreversibility, 69Contract mechanism, 35

penalty clause, 188Contract periods, 105Contracting, 9

prime contractor, 187Co-operative games, 151Core Competency, 10, 15, 22, 41, 42, 44,

49, 57, 135benefits, 46core business, 170distinctive competency, 44diversification, 43specialization, 43

Corporate memory, 91Cosourcing, 7Creation, 142Cross Platform Services, 176

Dai-Ichi Kangyo, 29Data centre, 176Degree of diversification, 45Degrees of economic freedom, 32Dell, 5Delphi technique, 134Desktop, 176Determinism, 71Differentiation, 20Diminishing service levels, 69Disaster recovery, 176, 179Dissatisfaction. See Outsourcing failuresDivergence, 30

203

Index

Index.qxd 3/1/05 12:34 PM Page 203

Page 223: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Early adopters, 19E-commerce, 52Economies of scale, 14, 21, 22, 23, 24, 25,

29, 43, 46, 47, 48, 54, 120, 122, 135, 165Ecosystem

risk, 151Employee resistance, 37Equilibrium, 12, 82, 146, 147, 148, 149 150, 151,

152, 154, 155, 156, 165, 167Escalating costs, 69External influences. See InfluenceExternal Service Provider, 91

Facilities, 179Fulcrum, 148Fuyo, 29Fuzzy logic, 161

Gambling, 65Game theory, 149Gartner, 19Governance, 8, 9, 12, 13, 22, 25, 27, 35, 36, 48,

51, 53, 56, 68, 75, 81, 103, 112, 114, 116, 117, 125, 126, 132, 134, 147, 166, 179, 180, 194

Graph types, 91Grouping risks, 78

Handphone. See Mobile telephoneHandy. See Mobile TelephoneHealthcare industry, 169Helpdesk, 176Heuristics, 80, 108, 136, 141, 153, 161, 162

cognitive, 162Hidden Costs, 54, 86Hitachi, 30Honda, 30HR outsourcing, 34Hubris, 115

Imperfect commitment, 113Incentives, 33Individualism, 164Influence

external, 144internal, 144

Information asymmetry, 69In-sourcing, 7Intellectual Property, 21Intellectual Property risks, 45Interaction, 135Internal influences. See InfluenceInternal Rate of Return, 127

Intrusive factors, 66IRR. See Internal Rate of ReturnIT function, 42

commoditization, 49outsourcing, 50performance, 42productivity paradox, 53role, 49

Joint development, 14Joint Venture, 32

Keiretsu, 29horizontal, 30vertical, 30

Key Performance Indicators, 6Kodak, 9KPI. See Key Performance IndicatorsKPMG, 75

Laboratory, 169LAN. See Local Area NetworkLever, 148Likelihood, 130Litigation, 57Local Area Network, 170Lock-In, 86Loss of control, 9Loss of expertise, 69Loyalty, 38

Magnitude of loss, 72Mainframe, 176Management Costs, 86Mapping, 88Maquiladora, 29Market differentiation, 21Matsushita, 30Measurement framework, 104Methodology, 180Midrange, 176Mitsubishi, 29Mitsui, 29Mobile telephone, 142Moral hazard, 113MUM model, 64

Natural state, 153Net Present Value, 43Network Services, 179Nissan, 30NPV. See Net Present Value

Index

204

Index.qxd 3/1/05 12:34 PM Page 204

Page 224: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Obtuse angle, 103Octagonal, 133Operating costs, 25, 170Oracle, 170Organizational interconnectedness, 68Original Equipment Manufacturers, 5Outsourcing

allocation of tasks, 180competitive, 17contracts, 34definition, 7failures, 19human resource implications, 37models, 27partnerships, 30payroll, 7relationships, 11sales force, 7selective, 7, 28, 29strategic, 7

Out-tasking, 29

Paradox effect, 120Partial ownership, 14Partial resources, 48Past performance, 66Patents, 44Payoffs, 150Perfect project, 152Performance criteria, 9, 43Poaching, 38Potential contract. See RelationshipsPotential impact, 130Predator, 155Premium pricing, 44Prey, 155Probability, 72Process change. See Process modelProcess model, 13Profit margin, 13Proposition, 18

Quadrant, 15

Radar plot, 91Radiology, 169RAND Corporation, 134Random Activity. See Cause and effectRandom occurrence, 142RDS. See Risk Dimension SignatureReduced Resource Charges, 189Relationships, 11, 31Request For Proposal, 120, 184Request For Tender, 120

Retainer, 14Returns On Investment, 43Risk

characteristics, 79classification, 79difficulty in measuring, 76endogenous, 66exogenous, 66models, 74multiplicity, 105operational, 67patterns, 85pure, 65relationship, 67speculative, 65

Risk appetite, 101, 126, 143Risk Assessment Matrix, 174Risk balancing, 146, 148Risk controls, 76Risk definition, 65Risk Dimension Signature, 63, 94, 96, 101, 119,

133, 160Risk dimensions, 66,69, 70, 82

business risk, 90environmental risk, 90financial risk, 90informational risk, 90legal risk, 90operational risk, 90strategic risk, 105technical risk, 90

Risk Exposure, 6, 71, 98, 146,boundaries, 72risk factor, 6, 107, 115

Risk landscape, 88Risk portrait, 96

buyer risks, 175supplier risks, 175

Risk profile, 3, 33, 50, 59, 63, 66, 76, 78, 81, 85, 88, 90, 91, 92, 93, 94, 96, 99, 101, 103, 110, 112, 117, 122, 124, 129, 130, 131, 132, 139, 150, 152, 155, 157, 159, 161, 163,164, 165

Risk relationshipinterrelatedness, 156magnitude, 156time, 156

Risk shifts, 107Risk signature, 90, 92, 94, 96, 98, 101, 102,

124, 125, 128, 129, 132, 133, 146Risk transfer, 12ROI. See Returns On InvestmentRRC. See Reduced Resource Charges

Index

205

Index.qxd 3/1/05 12:34 PM Page 205

Page 225: Managing the Risks of IT Outsourcing - Alex Kornev...About the author xiii Preface xv Section I: Language of IT Outsourcing (ITO) 1 Chapter 1: Common terms and concepts used in outsourcing

Sanwa, 29Scales

categorical, 93Likert, 94, 183rank ordered, 93

Scope creep, 197Service costs, 48, 117Service debasement, 86Service level, 29Service quality, 114Severe Acute Respiratory Syndrome, 187Shelf-life, 108Shirking, 115Social actors, 120Sony, 30Sourcing, 35Spot-contracting, 33Star graph, 91State of equilibrium, 146Stereo-ray glyphs, 91Strategic alliances, 31Strategic partnership, 31Stress

points of, 133Sumitomo, 29Supplier relationship, 12

advantage, 189reputation, 194

Supply chain management, 52Survey, 182Symbiosis, 30Systems Integration, 17

Taskallocation. See Outsourcing, allocation of tasks

Theoretical limit, 74Tolerance limits, 112Topology, 103

arrow head, 103circular, 103squeezed rectangle, 103star, 103

Toshiba, 30Total risk, 12, 72, 73, 79, 91, 92, 94, 97, 98, 99,

100, 102, 103, 133, 141, 145, 146, 147, 149,150, 152, 153, 154, 155, 156, 157, 158, 159,161, 165

Toyota, 30

Value chain, 20Vertically integrated, 25Virtual organizations, 11Voice Over Internet Protocol, 48VoIP. See Voice Over Internet Protocol

Web channel marketing, 52Winner’s curse, 68, 109

example, 176Win-win

situation, 146

Xerox, 9

Zero probability, 72

Index

206

Index.qxd 3/1/05 12:34 PM Page 206