用户名: 密码: 验证码:
服务外包接包方选择与监管风险控制研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
服务外包是有利于企业核心竞争力建设的一种现代化的管理方式,具有广泛适用性。但是服务外包的成功有着独特的前提条件,是在外包业务、市场环境、各个参与企业等一系列影响因素共同作用下实现的。实际研究结果表明,服务外包的成功率并不是很高,60%的公司对外包结果不满意,而40%的公司试图主动地终止外包合同。之所以出现这种情形,很重要的一个原因是发包方和接包方之间存在信息不对称,从而造成发包方不能选择出合适的接包方并对其进行有效监管。
     本论文站在服务外包发包方的角度,对接包方选择和监管阶段的风险因素进行识别,确定其对总风险的影响权重,并针对两阶段的风险设计相应的规避机制。论文目的在于尝试在理论和实践上有所创新,指导企业提高服务外包的管理水平。基于所构建的综合性理论分析框架,论文系统地探讨了服务外包供应商选择和监管的风险控制问题。文章主要分为五个部分,包括以下内容:
     第一部分,首先对近年来服务外包的定义和相关研究做了归纳和总结,并指出了服务外包的研究发展趋势。然后对服务外包风险进行定义,总结了服务外包面临的主要风险,介绍了服务外包风险因素的相关研究。由于信息不对称是造成服务外包供应商选择和监管风险的主要原因,本文对信息不对称理论以及逆向选择和道德风险的相关研究及进展也做了简要总结。
     第二部分,基于服务外包两阶段风险特点,抽取了客户专业性、业务标准化程度、业务可测量性、交流沟通、合同完整性、协同合作等风险因素,研究其对服务外包风险的影响大小,构建了服务外包两阶段风险因素模型,并以问卷调查的方式进行实证研究,借助结构方程分析模型内涵式的检验了各个风险因素对服务外包风险的影响效力。研究发现业务标准化程度、客户专业性、交流与沟通和合同的完整性与服务外包风险直接相关;同时,业务标准化程度、客户专业性和业务的可测量性还通过影响合同的完整性间接作用于服务外包风险。
     第三部分,通过建立基于服务质量的供应商选择模型,本文发现由于发包方不能观察到服务本身的质量,而只能观察到其分布情况,所以推断市场上的服务水准不会高于期望价格对应的服务,从而导致提供高于期望价格服务的接包方纷纷退出市场,市场上的服务质量逐渐下降。于是,本文提出了由第三方提供能力认证的方式传递接包方的服务质量信息,从而避免信息不对称带来的风险。不同于传统理论模型,本文认为接包方可能无法正确评估自身能力,从而选择了错误的认证水平。于是本文在持有错误信念的接包方参与的情况下,构建博弈模型。结果表明能力认证机制的作用体现在传递有关接包方能力信号和提高接包方能力两方面;但随着持有错误信念的接包方占比增加,不同能力接包方在选择认证水平和报酬水平上不断接近,最终使得能力认证的信号传递功能失效。
     第四部分,发包方在对接包方进行监管的过程中,需要设计合理的激励和监督机制以确保接包方按照其期望的方式完成服务外包任务。通过构建最优激励模型和监控模型,本文指出,在信息不对称的条件下,激励机制与监控机制都将发生作用,并指出在合同报酬支付的设计中,将激励机制和监控机制一并纳入进来考虑,对解决发包方与接包方之间的利益冲突问题有着非常重要的作用。发包方在设计报酬合同时一并将激励机制与监控机制考虑进来不仅可以大大提高对信息的依赖程度,而且可以使报酬合同中产出份额与监控信号相互关联;在服务外包交易风险管理中,接包方付出努力的多少与发包方支付的固定报酬无关;发包方如果对接包方采取过多的监控手段,会对接包方产生负面影响。
     第五部分,从管理角度针对风险因素提出具体应对策略。包括提高服务外包业务标准化程度和业务可测量性,不断提高自身的专业性,加强服务外包中的交流和沟通以及签订完善的外包合同。
     围绕论文的主要研究内容,作者在如下三个方面做出了创新的尝试:
     (1)定量得出了风险因素对风险的影响大小:基于文献梳理和定性分析,抽取服务外包风险因素,构建服务外包两阶段风险因素模型,对服务外包选择阶段和监管阶段的风险因素及其关系进行实证研究,找到了各风险因素对风险的影响大小。
     (2)对传统“逆向选择”模型进行了延伸和丰富:在假定接包方完全信息、发包方只具有分布信息的基础上,构建了基于服务质量服从正态分布的接包方选择模型,通过模型分析了信息不对称对服务外包市场交易效率的影响;不同于传统模型,在提出由第三方提供能力认证来传递服务质量信息的前提下,考虑了接包方可能无法正确评估自身能力的情况情形,并对持错误信念参与者对市场的影响进行了分析。
     (3)对“道德风险”模型进行了创新:针对服务外包接包方监管阶段存在的信息不对称,从服务外包市场的特点出发,构建了最优激励模型和监控模型,首次从激励和监控两个维度对风险控制机制作了分析,发现发包方在设计报酬合同时一并将激励机制与监控机制考虑进来不仅可以大大提高对信息的依赖程度,而且可以使报酬合同中产出份额与监控信号相互关联。
Service outsourcing is a modern and workable way to improve company’s core competence. However the success of service outsourcing needs unique preconditions which involve outsourcing business, market environment and corporations participating into the business. The practical researches disclose that the success rate of service outsourcing is not high. 60% companies are not satisfied with outsourcing results and 40% companies want to terminate outsourcing contracts. These phenomena arise from asymmetric information between clients and vendors which result clients couldn’t select out suitable vendors and supervise them effectively.
     This Thesis identifies the risk factors located in vendor selection and supervision process, confirms their weight and designs risk aversion mechanism aiming at vendor selection and supervision process. The thesis explores innovation both on theory and practice to guide company improving outsourcing management level. Based on the comprehensive theory frame the thesis including 5 parts, studies how to control outsourcing risks lied in vendor selection and supervision process.
     Part 1. Firstly we conclude and summarize the definition and related researches about service outsourcing and point out its future research trend. Then we define service outsourcing risk and sum up the main risks faced by outsourcing as well as introduce main studies about service outsourcing risk factor. Finally we summarize related researches about asymmetric information as it is the main reason resulting unsuccessful vendor selection and supervision.
     Part 2. According to the characters of outsourcing two-stage risks we draw out 6 risk factors, professional level of client, outsourcing business standardization, business scalability, communication, contract integrity, collaboration, to study their impacts on outsourcing risk and relationship among themselves through empirical survey research methods and structural equation model. The results testify that professional level of client, outsourcing business standardization, communication and contract integrity have direct impacts on service outsourcing risks while professional level of client, outsourcing business standardization and business scalability have indirect impacts on service outsourcing risks through contract integrity.
     Part 3. Through establishing vendor selection model based on service quality we find that client couldn’t distinguish exact quality of service but its distribution. Then client infer that the service level will not exceed that corresponding to expect price, which results escaping of high level vendors thus debases service quality in the market. To avoid the risks arising from asymmetric information we bring out capability certification method provided by third party. Not like traditional theory model we make the assumption that vendor may not judge their abilities properly thus results choosing unsuitable certification level. Based on this assumption we establish game model which proves two finding. Firstly the role of capability certification has two aspects, transferring signal about vendor ability and improving vendor ability. Secondly with the increase of vendors who possess unsuitable judgement about their abilities the certification level and payment level between different vendors become closer and closer and finally the effect of certification disappears.
     Part 4. In the process of supervising vendors clients need to design reasonable incentive and supervision mechanism to ensure vendors fulfilling service outsourcing in accordance with client’s requirements. Through establishing prime incentive model and supervision model this thesis points out that incentive mechanism and supervision mechanism will work together under asymmetric information. In designing contract payment if both incentive mechanism and supervision mechanism are taken into account the conflict between client and vendor could be overcome to a great extent. Moreover through this way the reliance on information will be enhanced and the output percent of payment contract could be interlinked with supervision signal. In managing service outsourcing risks the effort level of vendors have nothing to do with fixed payment and client overdue supervision will produce negative effect on vendors.
     Part 5. We provide management measures aiming at controlling risk factors in the process of vendor selection and supervision. These management measures include improving business standardization and business scalability, improving professional level of client, enhancing communication and signing perfect outsourcing contract. Around the main content the thesis tries to innovate in below 3 aspects.
     (1) Based on literatures trimming and qualitative analysis we draw out service outsourcing factors and establish service outsourcing two-stage rick models to do empirical study on risk factors located in service outsourcing vendor selection and supervision process. Though this method we get the loaded weights on risks by risk factors and the weights between pairs of risk factors.
     (2) Differing from traditional quality asymmetric information model in service outsourcing vendor selection we assume service quality meeting normal distribution and establish vendor selection model accordingly. With the assumption that vendor possessing complete information while client only possessing part information we analyze the effect of asymmetric information on service outsourcing market efficiency. Not like traditional model, under the premise that third party providing capability certification to pass service quality information we take the condition into account that vendors couldn’t judge their abilities properly and analyze the effect on market coming from participants with wrong beliefs.
     (3) Aiming at asymmetric information in service outsourcing market we start from the characters of service outsourcing market and establish prime incentive model and supervision model. It’s the first time that risk control mechanism is analyzed from two opposite dimensions.We find that in designing contract payment if both incentive mechanism and supervision mechanism are taken into account the reliance on information could be enhanced greatly and the output percent of payment contract could be interlinked with supervision signal.
引文
[1] Adams R, Bessant J, Phelps R, Innovation management measurement: A review, International Journal of Management Reviews, 2006, 8(1), 21
    [2] Akerlof G A, The market for "Lemons": Quality uncertainty and the market mechanism, The Quarterly Journal of Economics, 1970, 84(3), 488-500
    [3] Ali Babar M, Verner J M, Nguyen P T, Establishing and maintaining trust in software outsourcing relationships: An empirical investigation, Journal of Systems and Software, 2007, 80(9), 1438-1449
    [4] Anderson E, Schmittlein D C, Integration of the sales force: An empirical examination, The Rand Journal of Economics, 1984, 15(3), 385-395
    [5] Anderson L R, Holt C A, Information cascades in the l;aboratory, The American Economic Review, 1997, 87(5), 847-862
    [6] Andrews K R. Can the best corporations be made moral,Harvard Business Review, 1973, 51(3),57-64
    [7] Angeletos G, Pavan A, Efficient use of information and social value of information, Econometrica, 2007, 75(4), 1103-1142
    [8] Anke S Kessler, Revisiting the lemons market, International Economic Review, 2001, 42(1), 25-41
    [9] Anke S Kessler, The value of ignorance, The Rand Journal of Economics, 1998, 29(2), 339-354
    [10] Antras P, Helpman E, Global sourcing, Journal of Political Economy, 2004, 112(3),552-580
    [11] Aron R, Clemons E K, Reddi S, Just right outsourcing: understanding and managing risk, Journal of Management Information Systems, 2005, 22(2), 37-55
    [12] Arrow K J, Information and economic behavior, Federation of Swedish Industries, 1973
    [13] Arrow K J, The Economics of moral hazard: further comment, The American Economic Review, 1968, 58(3), 537-539
    [14] Arya A,Mittendorf B, Sappington DEM, Outsourcing, vertical integration, and price vs quantity competition, International Journal of Industrial Organization, 2008, 26(1),1-16
    [15] Aubert B A, Dussault S, Patry M, Managing the risk of IT outsourcing, Proceedings of the 32nd Hawaii International Conference on System Sciences, Hawaii, 1999
    [16] Aubert B A, Patry M, Rivard S, A framework for information technology outsourcing risk management, SIGMIS Database, 2005, 36(4), 9-28
    [17] Aubert B A, Patry M, Rivard S, et al., Managing the risk of IT outsourcing, Hawaii International Conference on System Sciences, 1999, 7, 7068
    [18] Aubert B A, Patry M, Rivard S, IT outsourcing risk management at British Petroleum, Proceedings of the 34th Hawaii International Conference on System Sciences, Hawaii, 2001
    [19] Aubert B A, Rivard S, Partry M, Development of measures to assess dimensions of IS operation transactions, International Journal of Management Science, 1996, 24(6),661-680
    [20] Aubert B, Houde J F, Patry M, et al., Characteristics of IT outsourcing contracts, 2003
    [21] Avery G, Outsourcing public health laboratory services: A blueprint for determining whether to privatize and how, Public Administration Review, 2000, 60(4), 330-337
    [22] Baccara M, Outsourcing, information leakage,and consulting firms, Rand Journal of Economics,2007, 38(1),269-289
    [23] Bahli B, Rivard S, Validating measures of information technology outsourcing risk factors, Omega, 2005, 33(2), 175-187
    [24] Bailey W, Masson R, Raeside R, Outsourcing in Edinburgh and the Lothians, European Journal of Purchasing & Supply Management, 2002, 8(2), 83-95
    [25] Barney J, Firm resources and sustained competitive advantage, Economics Meets Sociology in Strategic Management, 2007, 17(1), 203-227
    [26] Barthelemy J, Geyer D, IT outsourcing: : Evidence from France and Germany, European Management Journal, 2001, 19(2), 195-202
    [27] Bensaou M, Portfolios of buyer–supplier relationships, Sloan Management Review, 1999, 40(4), 35-44
    [28] Bergkvist L, Johansson B, Evaluating motivational factors involved at different stages in an IS outsourcing decision process, The Electronic Journal of Information Systems Evaluation, 2007, 10(1), 23-30
    [29] Biglaiser G, Ma C A, Price and quality competition under adverse selection: Market organization and efficiency, The Rand Journal of Economics, 2003, 34(2), 266-286
    [30] Boender C G E, de Graan J G, Lootsma F A , Multi-criteria decision analysis with fuzzy pairwise comparisons, Fuzzy Sets and Systems, 1989, 29(2), 133-143
    [31] Buckley J J, Fuzzy hierarchical analysis, Fuzzy Sets and Systems, 1985, 17(3), 233-247
    [32] Cao Q, Wang Q, Optimizing vendor selection in a two-stage outsourcing process, Computers & Operations Research, 2007, 34(12),3757-3768
    [33] Casani F, Luque Má, Rodríguez Pomeda J, et al. , La problemática del outsourcing, Economistas, 1996, XIV(72), 86-98
    [34] Chu P L, International outsourcing and intra-industrial trade, International Journal of Applied Economics, 2005, 2(2), 69-82
    [35] Chu W, Signaling quality by selling through a reputable retailer: An example of renting the reputation of another agent, Marketing Science, 1994, 13(2), 177-189
    [36] Clark Jr T D, Zmud R W, McCray G E, The Outsourcing of information services: transforming the nature of business in the information industry , Journal of Information Technology, 1995,10(4), 221-237
    [37] Collins J, Millen R, Information systems outsourcing by large American industrial firms: choices and impacts, Information Resources Management Journal, 1995, 8(1),5-13
    [38] Cooper R, Ross T W, Prices, Product qualities and asymmetric information: The competitive case, The Review of Economic Studies, 1984, 51(2), 197-207
    [39] Cross J, IT Outsourcing:British Petroleum’s competitive approach , Harvard Business Review,1995,73(3), 94-104
    [40] Cross J, IT Outsourcing:British Petroleum's competitive approach, Long Range Planning, 1995, 28(4), 128
    [41] Currie W L, Outsourcing in the private and public sectors: An unpredictable IT strategy, European Journal of Information Systems, 1996, 4(4),226-236
    [42] De Toni A, Panizzolo R,Product and process standardization in intermittent and repetitiveproduction,International journal of production research,1993,31(6),1371-1385
    [43] Dibbern J, Goles T, Hirschheim R, et al., Information systems outsourcing: A survey and analysis of the literature , The DATA BASE for Advances in Information Systems, 35, Fall 2004 (4), 6-96
    [44] DiRomualdo A, Gurbaxani V, Strategic intent for IT outsourcing, Sloan management review, 1998, 39(4), 67-80
    [45] Djavanshir G R, Surveying the Risks and Benefits of IT Outsourcing, IT Professional, 2005, 7, 32-37
    [46] Doh J P, Offshore outsourcing: implications for international business and strategic management theory and practice, Journal of Management Studies, 2005, 42(3), 695-704
    [47] Doig S, Ritter R, Speckhals K, et al., Has outsourcing gone too far?, The McKinsey Quarterly, 2001, 2001(4)
    [48] Donald F Blumberg, Strategic assessment of outsourcing and downsizing in the service market, Managing Service Quality, 1991, 8(1), 5-18
    [49] Dubois P, Moral hazard, land fertility and sharecropping in a rural area of the Philippines, Journal of Development Economics, 2002, 68(1), 35-64
    [50] Dwyer F R, Schurr P H, Oh S, Developing buyer-seller relationships, The Journal of Marketing, 1987, 51(2), 11-27
    [51] Dyer J H, Singh H,The relational view: Cooperative strategy and sources of interorganizational competitive advantage,The Academy of Management Review, 1998, 23(4),660-679
    [52] Ellram L M, Tate W L, Billington C, Offshore outsourcing of professional services: A transaction cost economics perspective, Journal of Operations Management, 2008, 26(2), 148-163
    [53] Espino-Rodríguez T F, Padrón-Robaina V, A review of outsourcing from the resource-based view of the firm, International Journal of Management Reviews, 2006, 8(1),49-70
    [54] Fiocca R, Account portfolio analysis for strategy development, Industrial Marketing Management, 1982, 11(1), 53-62
    [55] Fomin V, Lyytinen K. How to distribute a cake before cutting it into pieces: Alice in Wonderland or radio engineers' gang in the Nordic countries, Information technology standards and standardization: a global perspective, 2000, 222-239
    [56] Gilley K M, Rasheed A, Making more by doing less: An analysis of outsourcing and its effects on firm performance, Journal of Management, 2000, 26(4), 763-790
    [57] Goles T, Chin W W,Information systems outsourcing relationship factors: detailed conceptualization and initial evidence,ACM SIGMIS Database, 2005, 36(4),47-67
    [58] Goles T, The impact of client-vendor relationship on outsourcing success, Houston: Univ. of Houston, 2001
    [59] Gonzalez R, Gasco J, Llopis J, Information systems outsourcing risks: a study of large firms, Industrial Management & Data Systems, 2005, 105(1), 45-62
    [60] Goo J, Kishore R, Nam K, et al., An investigation of factors that influence the duration of IT outsourcing relationships, Decision Support Systems, 2007, 42(4), 2107-2125
    [61] Govindarajan V, Fisher J,Strategy, control systems, and resource sharing: Effects on business-unit performance,The Academy of Management Journal, 1990, 33(2),259-285
    [62] Graf M, Mudambi S M, The outsourcing of IT-enabled business processes: A conceptual modelof the location decision, Journal of International Management, 2005, 11(2), 253-268
    [63] Graves L M, Swaminathan B, PulseNet standardized protocol for subtyping Listeria monocytogenes by macrorestriction and pulsed-field gel electrophoresis, International journal of food microbiology, 2001, 65(1-2),55-62
    [64] Gray J V, Roth A V, Tomlin B, The influence of cost and quality priorities on the propensity to outsource production, Decision Sciences, 2009, 40(4), 697-726
    [65] Greaver M F, Strategic outsourcing: a structured approach to outsourcing decisions and initiatives, AMACOM, 1999
    [66] Greer C R, Youngblood S A, Gray D A, Human resource management outsourcing : The make or buy decision, Academy of Management, 1999, 13(3),85-96
    [67] Gupta A, Su B, Walter Z, Risk profile and consumer shopping behavior in electronic and traditional channels, Decision Support Systems, 2004, 38(3), 347-367
    [68] Hancox M, Information technology outsourcing: conceptualizing practice in the public and private sector,Proceedings of the Thirty-second Annual Hawaii International Conference on System Sciences,1999,7067
    [69] Handfield R B, Ragatz G L, Peterson K, et al., Involving suppliers in new product development, California Management Review, 1999, 42(1), 59-72
    [70] Hansen M T,Knowledge networks: Explaining effective knowledge sharing in multiunit companies,Organization science, 2002,232-248
    [71] Harland C, Knight L, Lamming R, et al., Outsourcing: assessing the risks and benefits for organizations, sectors and nations, International Journal of Operations & Production Management, 2005, 25(9), 831-850
    [72] Harrigan K R, Strategies for Intrafirm Transfers and outside Sourcing, The Academy of Management Journal, 1985, 28(4), 914-925
    [73] Hellmann T F, Murdock K C, Stiglitz J E, Liberalization, moral hazard in banking, and Prudential regulation: Are capital requirements enough? American Economic Review, 2000, 90(1), 147-165
    [74] Hendricks K, Kovenock D, Asymmetric Information, Information Externalities, and Efficiency: The Case of Oil Exploration, The Rand Journal of Economics, 1989, 20(2), 164-182
    [75] Herwartz H, Theilen B, The determinants of health care expenditure: testing pooling restrictions in small samples, Health Economics, 2003, 12(2), 113-124
    [76] Hirschheim M C L A, The information systems outsourcing bandwagon, Sloan Management Review, 1993, 35(1),73- 86
    [77] H?lmstrom B, Moral hazard and observability, The Bell Journal of Economics, 1979, 10(1), 74-91
    [78] Holmstr?m B, Moral hazard in teams, The Bell Journal of Economics, 1982, 13(2), 324-340
    [79] Holmstr?m B, Myerson R B, Efficient and durable decision rules with incomplete information, Econometrica, 1983, 51(6), 1799-1819
    [80] Jussi H, Cordon C, Outsourcing: a core or non-core strategic management decision?,Strategic Change, 2002, 11(4), 183-193
    [81] Jarvenpaa S, Staples S, Exploring perceptions oforganizational ownership of information and expertise,Journal of Management Information Systems 2000,18(1),151–8
    [82] Jensen M C, Ruback R S, The market for corporate control : The scientific evidence, Journal of Financial Economics, 1983, 11(1-4), 5-50
    [83] Jiang B, Qureshi A, Research on outsourcing results: current literature and future opportunities, Management Decision, 2006, 44(1), 44-55
    [84] Jiang B, Reinhardt G, Young S T, BOCOG’s outsourcing contracts: The vendor’s perspective, The International Journal of Management Science,2008,36(6),941-949
    [85] Joskow P L, Price Adjustment in Long-Term Contracts: The Case of Coal, Journal of Law and Economics, 1988, 31(1), 47-83
    [86] Jussi L, Kaija L, Sources of sensitization, cross-reactions, and occupational sensitization to topical anaesthetics among general dermatology patients, Contact Dermatitis, 2009, 60(3),150-154
    [87] Kapes J T, Mastie M M E, Whitfield E A, A counselor's guide to career assessment instruments,National Career Development Association, 1994
    [88] Kern T, The Gestalt of an Information Technology Outsourcing Relationship: an Exploratory Analysis, Proceedings of the 18th International Conference on Information Systems, Atlant, Georgia, 1997
    [89] Kern T, Willcocks L, Exploring information technology outsourcing relationships: theory and practice,The Journal of Strategic Information Systems, 2000, 9(4),321-350
    [90] Kern T, Willcocks L, Exploring relationships in information technology outsourcing: the interaction approach,European Journal of Information Systems, 2002, 11,3-19
    [91] Khalfan A M, Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors, International journal of information management, 2004, 24: 29-42
    [92] Kim B, Dynamic outsourcing to contract manufacturers with different capabilities of reducing the supply costs, International Journal of Production Economics, 2003, 86(1),63-80
    [93] Kirsch L J,The management of complex tasks in organizations: Controlling the systems development process,Organization Science, 1996,1-21
    [94] Klepper A, Outsourcing relationships, 1995, 218-243
    [95] Klepper A, The management of partnering development in I/S outsourcing, Journal of Information Technology, 1995, 10, 249-258
    [96] Kotabe M, Global Sourcing Strategy: R&D, Manufacturing, and Marketing Interfaces, {Quorum Books}, 1992
    [97] Kouvelis P, Milner J M, Supply chain capacity and outsourcing decisions: the dynamic interplay of demand and supply uncertainty, IIE Transactions, 2002, 34(8), 717-728
    [98] Krapfel R E, Salmond D, Spekman R, A strategic approach to managing buyer-seller relationships, European Journal of Marketing, 1991, 25(9), 22-37
    [99] Kumar M, Vrat P, Shankar R, A fuzzy goal programming approach for vendor selection problem in a supply chain, Computers and Industrial Engineering, 2004, 46(1), 69-85
    [100] Lacity M C, Willcocks L P, Relationships in IT outsourcing: a stakeholder perspective, Framing the Domains of IT Management: Projecting the Future through the Past, 2000, 355-384
    [101] Lacity M C, Willcocks L P, The value of selective IT sourcing, Sloan management review, 1996, 37(3), 13-25
    [102] Laffont J J, Martimort D, The theory of incentives: the principal-agent model, Princeton University Press, 2002
    [103] Laurini R, Thompson D,Fundamentals of spatial information systems, Academic press London, 1992
    [104] Lazear E P, Rosen S, Rank-Order tournaments as optimum labor contracts, The Journal of Political Economy, 1981, 89(5), 841-864
    [105] Lee J N, Huynh M Q, Kwok R C W, et al., IT outsourcing evolution—past, present and future , Communications of the ACM, 46, 2003 (5), 84-89
    [106] Lee J N, Kim Y G, Effect of partnership quality on IS outsourcing success: Conceptual framework and empirical validation, Journal of Management Information Systems, 1999, 15(5),29-61
    [107] Lee Y H, Jeong C S, Moon C, Advanced planning and scheduling with outsourcing in manufacturing supply chain, Computers & Industrial Engineering, 2002, 43(1-2), 351-374
    [108] Lei D, Hitt M A, Strategic restructuring and outsourcing: The effect of mergers and acquisitions and LBOs on building firm skills and capabilities, Journal of Management, 1995, 21(5), 835-859
    [109] Levin J, Information and the market for lemons, The Rand Journal of Economics, 2001, 32(4), 657-666
    [110] Levina N, Ross J W, From the vendor's perspective: Exploring the value proposition in information technology outsourcing, MIS Quarterly, 2003, 27(3),331-364
    [111] Lewis T R, Sappington D E M, Supplying information to facilitate price discrimination, International Economic Review, 1994, 35(2), 309-327
    [112] Linder J C,Transformational outsourcing,MIT Sloan Management Review, 2004, 45(2),52~58
    [113] Loh L, Venkatraman N, Determinants of information technology outsourcing: A cross-sectional analysis, Journal of Management Information Systems, 1992, 9(1), 7-24
    [114] Lyons R K, Tests of microstructural hypotheses in the foreign exchange market, Journal of Financial Economics, 1995, 39(2-3), 321-351
    [115] Marcolin B L, Mclellan K L, Effective IT outsourcing arrangements, Proceedings of the 31th Hawaii International Conference on System Sciences, Hawaii, 1998, 6, 654-665
    [116] Markowitz H, Markowitz H M, Portfolio selection: efficient diversification of investments,Wiley, 1991
    [117] Marshall D, McIvor R, Lamming R, Influences and outcomes of outsourcing: Insights from the telecommunications industry, Journal of Purchasing and Supply Management, 2007, 13(4), 245-260
    [118] Martimort D, Moreira H, Common agency and public good provision under asymmetric information, Theoretical Economics, 2010, 5(2), 159-213
    [119] Martinez-Miera D, Repullo R, Does competition reduce the risk of bank failure?,Review of Financial Studies, 2010, 23(10), 3638-3664
    [120] Mason S J, Cole M H, Ulrey B T, et al., Improving electronics manufacturing supply chain agility through outsourcing, International Journal of Physical Distribution & Logistics Management, 2002, 32(7), 610-620
    [121] McCarthy I, Anagnostou A, The impact of outsourcing on the transaction costs and boundaries ofmanufacturing, International Journal of Production Economics, 2004, 88(1), 61-71
    [122] McFarlan F W, Nolan R L, How to manage an IT outsourcing alliance, Sloan Management Review, 1995, 36(2), 9-23
    [123] Meyer M, Milgrom P, Roberts J,Organizational prospects, influence costs, and ownership changes,Journal of Economics & Management Strategy, 1992, 1(1),9-35
    [124] Michell V, Fitzgerald G, The IT outsourcing market-place: vendors and their selection, Journal of Information Technology, 1997, 12(3), 223-237
    [125] Mirrlees J A, The optimal structure of incentives and authority within an organization, The Bell Journal of Economics, 1976, 7(1),105-131
    [126] Mirrlees J A,Optimal accumulation under uncertainty: the case of stationary returns to investment,Allocation under Uncertainty: Equilibrium and Optimality, 1974
    [127] Mohr J, Spekman R,Characteristics of partnership success: partnership attributes, communication behavior, and conflict resolution techniques,Strategic management journal, 1994, 15,135-152
    [128] Mol M J, Van Tulder R J M, Beije P R, Antecedents and performance consequences of international outsourcing, International Business Review, 2005, 14(5), 599-617
    [129] Nam K, Rajagopalan S, Rao H R, et al., A two-level investigation of information systems outsourcing, Communications of the ACM, 1996, 39(7),36-44
    [130] Narus J A, Anderson J C, Distributor contributions to partnerships with manufacturers,Business Horizons, 1987, 30(5),34-42
    [131] Nayyar P R, Performance Effects of information asymmetry and economies of scope in diversified service firms, The Academy of Management Journal, 1993, 36(1), 28-57
    [132] Nellore R, S?derquist K, Portfolio approaches to procurement: Analysing the missing link to specifications, Long Range Planning, 2000, 33(2), 245-267
    [133] Nelson P, Information and Consumer Behavior, The Journal of Political Economy, 1970, 78(2), 311-329
    [134] Niederman F, International business and MIS approaches to multinational organizational research: The cases of knowledge transfer and IT workforce outsourcing, Journal of International Management, 2005, 11(2), 187-200
    [135] Olsen R F, Ellram L M, A portfolio approach to supplier relationships, Industrial Marketing Management, 1997, 26(2), 101-113
    [136] Ottaviani M, Prat A, The Value of public information in monopoly, Econometrica, 2001, 69(6), 1673-1683
    [137] Ouchi W G,A conceptual framework for the design of organizational control mechanisms,Management science, 1979, 25(9),833-848
    [138] Peng M W, Identifying the big question in international business research, Journal of International Business Studies, 2004, 35(2), 99-108
    [139] Perry C R, Outsourcing and union power, Journal of Labor Research, 1997, 18(4), 521-534
    [140] Peterson R, Balasubramanian S, Bronnenberg B, Exploring the implications of the internet for consumer marketing, Journal of the Academy of Marketing Science, 1997, 25(4), 329-346
    [141] Pfeffer J, Salancik G R,The external control of organizations,New York, 1978, 263
    [142] Poppo L, Zenger T,Do formal contracts and relational governance function as substitutes orcomplements?,Strategic Management Journal, 2002, 23(8),707-725
    [143] Porter M E,From competitive advantage to corporate strategy,Harvard business review, 1987, 5(3),43-59
    [144] Prencipe A, Technological competencies and product's evolutionary dynamics a case study from the aero-engine industry, Research Policy, 1997, 25(8), 1261-1276
    [145] Quélin B, Duhamel F, Bringing together strategic outsourcing and corporate strategy: outsourcing motives and risks, European Management Journal, 2003, 21(5), 647-661
    [146] Quinn J B, Strategic outsourcing: leveraging knowledge capabilities, Sloan management review, 1999, 40(4), 9-21
    [147] Radner R, Monitoring cooperative agreements in a repeated principal-agent relationship, Econometrica, 1981, 49(5), 1127-1148
    [148] Ramakumar A, Cooper B. Process standardization proves profitable, Quality, 2004, 43(2), 42-45
    [149] Riley J G, Silver Signals: Twenty-five years of screening and signaling, Journal of Economic Literature, 2001, 39(2), 432-478
    [150] Roberts K, Weitzman M L, Funding criteria for research, development, and exploration projects, Econometrica, 1981, 49(5), 1261-1288
    [151] Ross S A, The economic theory of agency: The principal's problem, The American Economic Review, 1973, 63(2), 134-139
    [152] Rothschild M, Stiglitz J, Equilibrium in competitive insurance markets: An essay on the economics of imperfect information, The Quarterly Journal of Economics, 1976, 90(4), 629-649
    [153] Rubinstein M, Leland H E, Replicating options with positions in stock and cash, Financial Analysts Journal, 1981, 37(4), 63-72
    [154] Sabherwal R, The relationship between information system planning sophistication and information system success: An empirical assessment, Decision Sciences, 1999, 30(1), 137-167
    [155] Sabherwal R, The role of trust in outsourced IS development projects, Communications of the ACM, 1999, 42(2),80-86
    [156] Sacristán N M, Consideraciones teóricas del outsourcing, Boletín económico del ICE, 1999, 1, 27-41
    [157] Saunders C, Gebelt M, Hu Q, Achieving success in information systems outsourcing, California Management Review, 1997, 39(2),63-79
    [158] Schaeck K, Cihak M, Wolfe S, Are competitive banking systems more stable?,Journal of Money, Credit and Banking, 2009, 41(4), 711-734
    [159] Sharma A, Professional as agent: Knowledge asymmetry in agency exchange, Academy of Management Review, 1997, 22(3),758-798
    [160] Sharma D, Benton W C, Srivastava R, Competitive strategy and purchasing decisions, Proceedings of the 1989 annual conference of the decision sciences institute, 1989
    [161] Sharpe M, Outsourcing, organizational competitiveness, and work, Journal of Labor Research, 1997, 18(4), 535-549
    [162] Shi Y, Today's solution and tomorrow's problem: The business process outsourcing risk m,anagement puzzle, California Management Review, 2007, 49, 27-44
    [163] Smith M A, Mitra S, Narasimhan S, Information Systems Outsourcing: A Study of Pre-EventFirm Characteristics, Journal of Management Information Systems, 1998, 15(2), 61-93
    [164] Snir E M, Hitt L M, Vendor screening in information technology contracting with a pilot project, Journal of Organizational Computing and Electronic Commerce, 2004, 14(1),61-88
    [165] Spence M, Job Market Signaling, The Quarterly Journal of Economics, 1973, 87(3), 355-374
    [166] Spence M, Zeckhauser R, Insurance, information, and individual action, The American Economic Review, 1971, 61(2), 380-387
    [167] Stiglitz J E, The theory of "screening," education, and the distribution of income, The American Economic Review, 1975, 65(3), 283-300
    [168] Stiglitz J E, Weiss A, Credit rationing in markets with imperfect information, The American Economic Review, 1981, 71(3), 393-410
    [169] Stump R L, Heide J B, Controlling supplier opportunism in industrial relationships, Journal of Marketing Research, 1996, 33(4), 431-441
    [170] Su D. Adverse-selection versus signaling: evidence from the pricing of Chinese IPOs. Journal of Economics and Business, 2004, 56(1), 1-19
    [171] Suhaimi M A, Hussin H, Mustaffa M, Information systems outsourcing: Motivations and the implementation strategy in a Malaysian bank, Business Process Management Journal, 2007, 13(5), 644-661
    [172] Ulset S, R&D outsourcing and contractual governance : An empirical study of commercial R&D projects, Journal of Economics Behavior & Organization, 1996, 30(1), 63-82
    [173] Useem M, Harder J, Leading laterally in company outsourcing? Sloan Management Review, 2000, 41(2),25-36
    [174] Wadhwa V, Ravindran A R, Vendor selection in outsourcing, Computers & Operations Research, 2007, 34(12), 3725-3737
    [175] Weber C A, Current J, Desai A, An optimization approach to determining the number of vendors to employ, Supply Chain Management: An International Journal, 2000, 2(5), 90-98
    [176] Willcocks L P, Kern T, IT outsourcing as strategic partnering: The case of the UK Inland Revenue, European Journal of Information Systems, 1998, 7(1), 29-45
    [177] Willcocks L P, Lacity M, Strategic sourcing of information systems, Chichester: Wiley, 1998
    [178] Willcocks L P, Reynolds P, Feeny D, Evolving IS capabilities to leverage the external IT services market, MIS quarterly executive, 2007, 6(3), 127-145
    [179] Williamson O E,Markets and hierarchies: analysis and antitrust implications: a study in the economics of internal organization,Free Press New York, 1975
    [180] Wilson R B, Competitive bidding with disparate information, Management Science, 1969, 15(7), 446-448
    [181] Woodall J, Scott-Jackson W, Newham T, et al., Making the decision to outsource human resources, Personnel Review, 2009, 38(3), 236-252
    [182] Wüllenweber K, Weitzel T,An empirical exploration of how process standardization reduces outsourcing risks,IEEE, 2007
    [183] Zahay D, Griffin A, Information antecedents of personalisation and customisation in business-to-business service markets, The Journal of Database Marketing, 2003, 10(3), 255-271
    [184]曹兴,石中华,基于机制设计理论的企业技术委托开发道德风险防范研究,系统工程,2005(11),85-90
    [185]陈菲,服务外包动因机制分析及其发展趋势预测-美国服务外包的验证,中国工业经济,2005(06),67-73
    [186]陈翔,王小丽,我国医疗保险领域逆向选择的成因及对策,广西社会科学,2010(05),32-35
    [187]江小涓,服务全球化与服务外包:现状、趋势及理论分析,人民出版社,2008
    [188]江小涓,中国对外开放进入新阶段:更均衡合理地融入全球经济,经济前沿,2007(06),2-9
    [189]姜凌,文俊伟,夏奇峰,中印软件外包业务比较研究,经济师,2006(02),87-89
    [190]姜荣春,我国承接服务外包:现状、趋势与对策,开放导报,2009(01),67-71
    [191]荆林波,质疑外包服务降低成本及引起实业的假说—以信息技术外包服务为例,经济研究,2005(01),117-123
    [192]科尔尼,2009年科尔尼全球离岸服务目的地指数,2009
    [193]李琴,郑辉,风险投资家的逆向选择、道德风险及契约设计,广西经济管理干部学院学报,2007(03),42-46
    [194]李元旭,吴晨,银行业务外包问题初析,国际金融研究,2000(12),34-38
    [195]李志群,朱晓明,中国服务外包发展报告2007,上海交通大学出版社,2007
    [196]李志群,朱晓明,中国服务外包发展报告2008,上海交通大学出版社,2008
    [197]刘宝宏,信息不对称条件下的消费者行为,商业经济与管理,2001(07),18-21
    [198]刘翡,不对称信息下的服务外包契约设计研究,西安电子科技大学,2009
    [199]卢峰,我国承接国际服务外包问题研究,经济研究,2007(09),49-61
    [200]卢锋,当代服务外包的经济学观察:产品内分工的分析视角,世界经济,2007(08),22-35
    [201]邵鲁宁,生产性服务外包管理研究,同济大学,2007
    [202]宋寒,但斌,张旭梅,服务外包中双边道德风险的关系契约激励机制,系统工程理论与实践,2010(11),1944-1953
    [203]孙明贵,日本汽车产业的构造特征与发展趋向,现代日本经济,2005(03),31-35
    [204]涂静,服务外包关系的治理研究,华中科技大学,2009
    [205]汪应洛,中国服务型制造的项目管理,科学中国人,2008(02),32-35
    [206]王建军,业务外包决策模型研究,大连理工大学,2006
    [207]王淑云,物流外包成本的决定要素及企业的战略选择,经济问题探索,2004(07),52-54
    [208]邬适融,国外服务外包产业政策效应研究,外国经济与管理,2009,30(9),62-64
    [209]邬适融,战略与路径:服务外包产业的发展,人民出版社,2008
    [210]徐姝,企业业务外包绩效影响因素分析,技术经济,2006(04),68-70
    [211]徐姝,我国第三方物流发展的对策思考,技术经济,2005(11),63-65
    [212]徐新,邱菀华,道德风险与基于委托-代理理论的最优保险契约模型,系统工程理论与实践,2001(03),26-30
    [213]杨英,霍国庆,企业信息技术资源外包及其风险分析,中国软科学,2001(03),98-102
    [214]曾国安,李秋波,论解决信息不对称问题中的市场与政府,当代经济研究,1999(05),51-56
    [215]曾人魁,童汝根,企业财务外包业务运作探讨,金融经济,2007(02),185-186
    [216]曾志耕,苟骏,金子才,金融机构业务外包的风险及监管,理论与改革,2005(05),91-93
    [217]张南雪,基于信息不对称理论对服务外包的影响因素分析,中国商贸,2010(19),203-204
    [218]张维迎,博弈论与信息经济学,上海三联书店,上海人民出版社,1996
    [219]张维迎,企业的企业家—契约理论,上海三联书店,上海人民出版社,1996
    [220]赵晋,张建军,霍佳震,多期博弈下服务外包道德风险的声誉模型研究,2009
    [221]赵曙明,李海霞,中小企业人力资源管理外包研究,南京社会科学,2004(01),1-7
    [222]赵晓雷,现代公司产权理论与实务,上海财经大学出版社,1997
    [223]甄炳禧,经济全球化背景下的国际服务外包,求是杂志,2005(09),61-62
    [224]周文彬,服务外包在中东欧国家的发展及对中国的启示,俄罗斯中亚东欧市场,2006(09),23-27
    [225]朱晓明,服务外包—把握现代服务业发展新机遇,上海交通大学出版社,2006
    [226]朱晓明,转移与承接—把握服务外包发展新机遇,上海企业,2006(12),14-15

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700