用户名: 密码: 验证码:
企业信息技术外包关系及其演化机理研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着竞争的加剧和信息技术的迅猛发展,越来越多的组织开始意识到为了提高其核心竞争力、改善自身绩效而不得不将复杂的信息技术业务外包给专业的信息技术服务机构。然而,许多研究证明,很多企业与信息技术外包服务商的合作并不顺利,其中主要原因之一是双方对信息技术外包关系的理解与管理不到位,这直接影响着信息技术外包的成功和企业信息化建设的质量。
     尽管对信息技术外包的研究吸引了国内外不少研究学者的目光,并取得了一定的研究进展,但对信息技术外包关系的研究仍然比较少。目前大部分学者将研究集中在信息技术外包关系的分类及信息技术外包关系对外包成功的影响等问题上,对信息技术外包关系的构成要素是什么以及它是如何形成并演化的研究尚未见到,对信息技术外包关系的形成机理和演化机理缺乏理论研究。
     本文主要研究以下四个方面的问题:(1)分析信息技术外包关系的构成要素与类型;(2)揭示信息技术外包关系的形成机理;(3)揭示信息技术外包关系的演化机理;(4)探讨对信息技术外包战略伙伴关系的管理。
     具体来说,本文的创新点主要体现在以下几个方面:
     1.基于IT外包关系的构成要素及关系类型维度的综合分析,构建IT外包关系概念模型。本文将信息技术外包关系的主体、客体、环境三个构成要素作为一个系统进行分析,为全面认识与理解信息技术外包关系奠定了基础;从外包关系客体对企业战略的影响和外包关系主体之间的关系质量两个维度将信息技术外包关系划分为四个类型;构建了信息技术外包关系模型来揭示信息技术外包关系各构成要素之间的逻辑关系。
     本文将信息技术外包关系的主体、客体、环境三个构成要素作为一个系统进行分析,为全面认识与理解信息技术外包关系奠定了基础,它推动了对信息技术外包关系进行全面、系统的理论研究。本文认为,在信息技术外包关系中,外包关系的的主体、客体、环境是关系存在的不可或缺的要素,单纯的只考虑某一要素的研究是片面的;从外包关系客体对企业战略的影响和外包关系主体之间的关系质量两个维度将信息技术外包关系划分为普通市场关系、普通伙伴关系、战略市场关系和战略伙伴关系四种类型并进一步深入剖析了每一种关系类型的内涵和特征;在以上对信息技术外包关系的内涵进行了深入研究和信息技术外包关系类型进行科学划分的基础上构建了完整认识信息技术外包关系的概念模型来揭示信息技术外包关系主体、客体和环境三个构成要素之间的逻辑关系。
     2.以比较优势理论、价值链理论和资源观理论为基础,基于IT外包关系动力因素的分析,构建了IT外包关系形成的内外生机理模型和动力解释结构模型,揭示了IT外包关系的形成机理。本文运用比较优势理论和价值链理论分析了信息技术外包关系形成的理论前提;基于PEST分析和资源观理论构建了信息技术外包关系形成的外生机理模型与内生机理模型,揭示了信息技术外包关系的形成的内外生机理;基于ISM构建了信息技术外包关系形成动力模型来揭示信息技术外包关系各动力因素之间的相互作用及层次关系;基于信息技术外包关系主体双方的综合实力的强、中、弱将信息技术外包关系分为三类九种关系模式。
     本文运用经济学中的比较优势理论和价值链理论作为理论依据探讨了信息技术外包关系的形成原因;基于战略管理中PEST分析和资源观理论深入分析了信息技术外包关系形成的内外生机理,构建了信息技术外包关系形成的外生机理模型与内生机理模型,揭示了信息技术外包关系主体双方是如何在政府、经济、社会和技术四大外部因素的影响下相互吸引而形成外包关系的;基于ISM技术确定了信息技术外包关系动力因素,并构建了信息技术外包关系形成动力模型来揭示信息技术外包关系各动力因素之间的相互作用及层次关系;根据信息技术外包关系主体双方综合实力的强、中、弱将信息技术外包关系分为矩形、T形和凸形三类九种关系模式,并分析了每一类信息技术外包关系模式的特点。
     3.基于系统分岔思想分析了IT外包关系的演化动力机制、演化路径、演化管理与演化趋势,揭示了IT外包关系的演化机理。本文分析了信息技术外包关系演化的内外部动力,构建了信息技术外包关系动力机制模型;阐明了信息技术外包关系的演化过程,构建了信息技术外包关系的演化路径模型;分析了信息技术外包关系破裂的原因,提出了促进信息技术外包关系维系和发展的管理对策;分析了目前信息技术外包的特点并基于博弈论分析了信息技术外包关系的演化趋势是战略伙伴关系。
     本文基于系统分岔思想分析了信息技术外包关系演化的内涵;构建了信息技术外包关系演化动力机制模型,阐明了信息技术外包关系演化的内外部动力,外包动力主要是政府政策的推动、市场同行业企业竞争压力的推动、社会科研机构和咨询机构潮流压力的推动和IT产业技术发展的推动,内部动力包括外包方高层管理、IT部门与业务部门的推动、承包方高层管理与技术部门的推动;从关系质量和外包项目层次两个维度分析了信息技术外包关系的演化过程,构建了信息技术外包关系的演化路径模型,分析了具有代表性的三条演化路径及其与信息技术外包关系模式之间的联系;分析了信息技术外包关系破裂的原因,包括双方不能共担风险、没有建立信任、双方对IT外包项目的实施缺乏合理的管理机制、相互之间存在多方面的不适应、双方之间不注重沟通,并从共同承担风险、保持良好的沟通、相互适应、建立跨组织的管理机制四个方面提出了相应的管理对策来促进信息技术外包关系的维系和发展;分析了目前信息技术外包的特点,包括信息技术外包竞争环境不确定性增大、信息技术外包技术环境不确定性增大、信息技术外包项目层次越来越高和信息技术外包资产专用性增加,并运用博弈论分析了信息技术外包关系的演化趋势是战略伙伴关系。
     4.以合同为依据,结合整合机制与控制机制提出IT外包战略伙伴关系管理对策。本文分析了信息技术外包战略伙伴关系的形成过程;探讨了信息技术外包战略伙伴关系合同管理;提出信息技术外包战略伙伴关系管理过程中的的整合机制与控制机制。
     本文基于过程视角从认知、试探、扩展和承诺四个阶段深入分析信息技术外包关系的形成过程;探讨信息技术外包战略伙伴关系合同管理;探讨了信息技术外包战略伙伴关系的整合机制,包括战略整合、战术整合、操作整合、人际关系整合和文化整合五个方面;分析了信息技术外包战略伙伴关系的控制机制,包括价格控制、权利控制和信任控制三个方面。
As competition intensifies and the rapid development of information technology(IT),more and more enterprises have realized that they have to outsource their complex information technology to the professional information technology service suppliers in order to enhance their core competitiveness and improve their performance. However, many studies suggest that, the cooperation between the outsourcing enterprise and the information technology service supplier is not smooth. One of the main reasons is both sides of outsourcing don’t understand and manage the outsourcing relationship very well, and that directly affect success of information technology outsourcing and quality of enterprise information construction.
     Although there has been a great deal of research that has been conducted on IT outsourcing, very little research investigate the outsourcing relationship and the primary focus of that research has been on the classification of outsourcing relationship and the effect of outsourcing relationship to outsourcing success. How many types do relationships among outsourcing enterprise and information technology service supplier have? What is formation and evolution mechanism of Information technology outsourcing relationship? Such problems have become an important research subject of information technology outsourcing field.
     This dissertation studied the formation and evolution of IT outsourcing relationship, mainly focusing on the flowing four contents: first, information technology outsourcing relationship and its elements analysis; second, information technology outsourcing relationships formation mechanism; third, information technology outsourcing relationships evolution mechanism; fourth, strategic partnership management of Information technology outsourcing.
     For details, the innovation points of this dissertation mainly are represented by the following aspects:
     Firstly, this dissertation analyzed IT outsourcing relationship and its elements: subject, object and environment. Based on the relationship quality of IT outsourcing relationship subjects and the impact to outsourcing enterprise’s strategy of IT outsourcing relationship object, it puts outsourcing relationship into four categories. It constructs the model of IT outsourcing relationship to reveal the logical relationship of elements.
     This dissertation analyzed the subject, object and environment of IT outsourcing relationship, and argues that subject, object and environment are essential factors of IT outsourcing relationship. Based on the relationship quality of IT outsourcing relationship subjects and the impact to outsourcing enterprise’s strategy of IT outsourcing relationship object, it puts outsourcing relationship into four types: ordinary market relationship, ordinary partnership, strategic market relationship and strategic partnership, and further analyzes the connotation and feature of each types of IT outsourcing relationship. Based on the theory analysis of above, it constructs the model of IT outsourcing relationship to reveal the logical relationship of elements.
     Secondly, this dissertation analyses the reason of IT outsourcing relationship formation used comparative advantage theory and value chain theory. Based on PEST and RBV theory, it constructs the Exogenous-mechanism and Endogenous-mechanism model of IT outsourcing relationships formation to explain the formation mechanism of IT outsourcing relationships. Based on ISM, it constructs the formation dynamic mechanism model of IT outsourcing relationships to reveal the relationship of the dynamic element. Based on the comprehensive strength of the IT outsourcing relationship subject, it put the outsourcing relationship into three categories and nine types.
     This dissertation analyzed the reason of IT outsourcing relationship formation used comparative advantage theory and value chain theory. Based on PEST and RBV theory, it constructs the Exogenous-mechanism and Endogenous-mechanism model of IT outsourcing relationships formation to explain how does IT outsourcing relationships form under the influence of government, economics, society and technology. Based on ISM, it determine ten dynamic elements, and further constructs the formation dynamic mechanism model of IT outsourcing relationships to reveal the relationship of the dynamic element. Based on the comprehensive strength of the IT outsourcing relationship subject, it put the outsourcing relationship into three categories and nine types, and analyses the characteristics of every category.
     Thirdly, this dissertation reveals the evolution mechanism of IT outsourcing relationships. It clarifies evolution dynamic factors and evolution path of IT outsourcing relationships, and constructs dynamic mechanism model and evolution path model of IT outsourcing relationships. It analyses the broken reasons of IT outsourcing relationship and provides management countermeasures to promote the development of IT outsourcing relationship. It analyzes characteristics of current information technology outsourcing and development trends of information technology outsourcing relationship using game theory.
     This dissertation reveals the evolution mechanism of IT outsourcing relationship. It constructs dynamic mechanism model to clarify the external dynamic elements and internal dynamic elements of IT outsourcing relationship; the external dynamic elements contain promotion of government, market competition, pressure of society and promotion of IT progress, and internal dynamic elements contain the push of outsourcing enterprise and IT supplier. Based on catastrophe theory, it constructs evolution path model to analyses evolution path of IT outsourcing relationships, and further analyses the typical paths. It analyses the broken reasons of IT outsourcing relationship and provides management countermeasures to promote the development of IT outsourcing relationship, which contains risk sharing, keeping communication smoothly, mutual adaptation and establishing common management machismo of both organizations. It analyses characteristics of current information technology outsourcing and development trends of information technology outsourcing relationship using game theory.
     Fourthly, this dissertation analyses the progress of IT strategy partnership formation; It explores the constract management of IT strategy partnership; It provides the integrated mechanism and control mechanism of IT strategy partnership management.
     Based on process view, this dissertation divides the progress into four stages: awareness, exploration, expansion and commitment, and further analyses IT strategy partnership formation; It explores the contract management of IT strategy partnership; It provides the integrated mechanism of IT strategy partnership management, which contains strategic integration, tactical integration, operating integration, interpersonal integration and cultural integration ; It provides the control mechanism of IT strategy partnership management, which contains price control, power control and trust control.
引文
[1] Alborz S, Scheepers R, Seddon P B. Impact of Configuration on IT Outsourcing Relationships [C]. Paper presented at the Tenth Americas Conference on Information System ,New York, 2004
    [2] Ang S, Slaughter S A. Organizational Psychology and Performance in IS Employment Outsourcing and insourcing [C]. Proceedings of the 31st International Conference on System Sciences, Hawaii, 1998:635-643
    [3] Applegate L. Managing in an information age: IT challenges and opportunities [M]. Cambridge: Harvard Business School Publishing, 1995
    [4] Apte U M, Mason R O. Global Disaggregation of Information Intensive Services [J]. Management Science, 1995, 41(7):1250-1262
    [5] Apte U M, Sobol M G, Hanaoka S, Shimada T, Saarinen T, Salmela T, epsalainen A P J. IS Outsourcing Practices in the USA, Japan and Finland: A Comparative Study [J]. Journal of Information Technology, 1997(12): 289-304
    [6] Arnett K P, Jones M C. Firms that Choose Outsourcing: A Profile [J]. Information & Management, 1994(26):179-188
    [7] Aubert B A, Dussault S, Party M, Rivard S. Managing the risk of IT outsourcing [C]. Proceedings of the 32nd Annual Hawaii International conference on System Sciences, 1999:336-350
    [8] Aubert B A, Patry M, Rivard S et al. IT outsourcing risk management at British Petroleum [C]. Proceedings of the 34th Hawaii International Conference on System Sciences, 2001
    [9] Aubert B A, Patry M, Rivard S. Assessing the Risk of IT Outsourcing [C]. Proceedings of the 31st Hawaii International Conference on System Sciences, Hawaii CIRANO,1998
    [10] Aubert B A, Rivard S, Patry M. Development of measures to assess dimensions of IS operation transactions [J]. Omega, 1996, 24(6):661-650
    [11] Aubert B A, Rivard S, Patry M. A Transaction Cost Model of IT Outsourcing [J]. Information & Management, 2004, 41(7):921-932
    [12] Barney J B, Hansen M H. Trust worthiness as a source of competitive advantage [J].Strategic Management Journal, 1994,15(S1):175-216
    [13] Barney J B. Firm resources and sustained competitive advantage: A resource-based view [J]. Journal of Management, 1991, 17(1):99-120
    [14] Barney J B. How a firm's capabilities affect boundary decisions [J]. Sloan Management Review, 1999,40(3):137-145
    [15] Barney J B. Resource-based theories of competitive advantage: A ten-year retrospective on the resource-based view [J]. Journal of Management, 2001, 27(6):643-650
    [16] Barthelemy J. The Hidden Cost of IT Outsourcing [J]. MIT Sloan Management Review, 2001,42(3):60-69
    [17] Bateson P. Trust: Making and Breaking Cooperative Relationship [C]. The Biological Evolution of Cooperation and Trust, New York: Brasil Blackwall:14-30
    [18] Ben L K, Somnath L. International Outsourcing of Services: A Partnership Model [J]. Journal of International Management ,2007,13 (1) :22-37
    [19] Benbassat I, Goldstein D K, Mead M. The Case Research Strategy in Studies of Information Systems [J]. MISQuarterly, 1987, 11(3):369-386
    [20] Bennett A. Case Study Methods: Design, Use, and Comparative Advantages [M]. Ann Arbor :The University of Michigan Press, 2003:20-21
    [21] Bharadwaj A S. A resource-based perspective on information technology capability and firm performance: An empirical investigation [J]. MIS Quarterly, 2000, 24(1):169-196
    [22] Bi X H, Yu C L. A research on synergic and spiral-propulsion mechanism of enterprise information systems growth [C]. Research and Practical Issues of Enterprise Information SystemsⅡ, Berlin: Springer, 2007: 797-806
    [23] Bi X H, Yu C L. Modeling and simulation of enterprise information system growth using system dynamics: from the perspective of absorptive capacity [C]. The Seventh Wuhan International Conference on E-Business, 2008.6, volⅠ: 27-33
    [24] Blumenberg S, Beimborn D, Koenig W. Determinants of It outsourcing Relationships: A conceptual model [C]. The Proceedings of the 4lst Hawaii International Conference on Systems Sciences, 2008:1530-1605
    [25] Bradach J L, Robert E. Price, Authority, and Trust: From Ideal Types to Plural Forms [J]. Annual Review of Sociology,1989,15(1):97-118
    [26] Carmel E, Agarwal R. The Maturation of Offshore Sourcing of Information Technology Work [J]. MIS Quarterly Executive, 2002, 1(2):65-78
    [27] Cha H S, Pingry D E, Thatcher M E. A Learning Model of Information Technology Outsourcing: Normative Implications[J].Journal of Management Information Systems, 2009, 26(2):147-176
    [28] Christopher P H, Ben L. A Stage Maturity Model for Enterprise Resource Planning Systems Use [J]. Communication of the Association for Computing Machinery, 2001, 32(2):34-35
    [29] Coleman JS. Foundations of social theory [M]. Cambridge: Harvard University Press,1990
    [30] Conner K. A historical comparison of resource-based theory and five schools of thought within industrial organization economics: Do we have a theory of the firm? [J]. Journal of Management, 1991,17(1):121–154
    [31] Creed W E D, Miles R E. Trust in organizations: A conceptual framework linking organizational forms, managerial philosophies, and the opportunity costs of controls[C]. Trust in organizations: Frontiers of theory and research, 1996:16-38
    [32] Crosby L A, Evans K R, Cow L D. Relationship Quality in Services Selling: An Interpersonal Influence Perspective [J]. Journal of Marketing, 1990, 54 (3) : 68-81
    [33] Currie W L. A Knowledge-based Risk Assessment Framework for Evaluating Web-enabled Application Outsourcing Projects [J]. International Journal of Project Management, 2003, 21 (3): 207-217
    [34] Damanpour R. Organizational complexity and innovation: Developing and testing multiple contingency models [J]. Management Science, 1996, 42(5):693-716
    [35] Dant R P, Schul P L. Conflict Resolution Processes in Contractual Channels of Distribution [J]. Journal of Marketing, 1992, 56(1):38-55
    [36] Delisi P S. Lessons from the Steel Axe: Culture, technology, and organizational change [J]. Sloan Management Review, 1990, 32(1): 83-93
    [37] Dibbern J, Goles T, Hirschheim R, Jayatilaka B. Information Systems Outsourcing: A Survey and Analysis of the Literature [J]. Data Base for Advances in Information Systems, 2004, 35(4):6-102
    [38] Domberger S, Fernandez P, Fiebig D G. Modeling the Price, Performance and Contract Characteristics of IT Outsourcing [J]. Journal of Information Technology, 2001,15(2):107-118
    [39] Duan W H, Bi X H, Wang Y W. The trend analysis of HRM outsourcing relationship based on game theory [C]. The 2nd international Conference on Knowledge acquisition and modeling,2009: 45-48
    [40] Duan W H, Bi X H, Yu C L. Research on formation mechanism of enterprise IT outsourcing relationship[C].The International Conference on E-health networking, Digital ecosystems and Technologies, 2010: 185-188
    [41] Duan W H, Bi X H, Yu C L. Research on evolution mechanism of enterprise IT outsourcing relationship[C]. The International Conference on Networking and Digital, 2010: 644-647
    [42] Due Richard. The Real Costs of Outsourcing [J]. Information Systems Management, 1992, 9(1):78-81
    [43] Dwyer F R, Schurr P H, Oh S. Developing Buyer-Seller Relationships [J]. Journal of Marketing, 1987, 51(2):11-27
    [44] Earl M J. The Risks of Outsourcing IT [J].Sloan Management Review, 1996, 37(3):26-32
    [45] Eccles R. The Transfer Pricing Problem: A Theory for Practice approaches [M]. Lexington: Lexington books, 1985
    [46] Eisenhardt K M. Agency theory: An assessment and review [J]. Academy of Management Review, 1989, 14(1):57-74
    [47] Emery F E, Trist E I. The causal texture of organizational environments [J]. Human relations, 1965, 18(1): 21-33
    [48] Fichman R G, Kemerer C F. The diffusion and assimilation of information technology innovations [R]. Working Papers, Sloan School of Management, MIT, September 1999
    [49] Fichman R G, Kemerer C F. The illusory diffusion of innovations: An examination of assimilation gaps [J]. Information Systems Research, 1999, 10(3):255-275
    [50] Ganesh D B, Varun G. Types of information technology capabilities and their role in competitive advantage: An empirical study [J]. Journal of Management Information Systems, 2005, 22(2): 253-277
    [51] Goles T, Chin W W. Information system outsourcing relationship factors: detailed conceptualization and initial evidence [C]. ACM SIGMIS Database 2005, 36(4):47-67
    [52] Goles T. The Impact of the Client-Vendor Relationship on Information Systems Outsourcing Success [D]. Texas: Bauer College of Business Houston, 2001
    [53] Grant R M. The resource-based theory of competitive advantage: implications for strategy formulation [J]. California Management Review, 1991, 33(3):114-135
    [54] Gronroos C. Internal Marketing-theory and practice [C]. American Marketing Association services Marketing Conference Proceedings, Donnell, 1982: 41-47
    [55] Grover V, Cheon M J, Teng J T C. The Effect of Service Quality and Partnership on the Outsourcing of Information Systems Functions [J]. Journal of Management Information Systems, 1996, 12(4):89-116
    [56] Gruham R, Perry N. Outsourcing-the major legal issue [C]. Information Security Technical Report, 1996,1(3):51-56
    [57] Gupta U G, Gupta A. Outsourcing the IS function [J].Information Systems Management, 1992, 9(3):44-50
    [58] Haken H. Advanced synergetic [M]. Berlin: Springer-Verlag, 1983
    [59] Honess S. Outsourcing-A Legal Perspective on Contract Critical Success Factors [C]. Information Security Technical Report, 1996, 1(3):57-58
    [60] Hosmer L T. Trust: The Connecting Link between Organizational Theory and Philosophical Ethics [J]. Academy of Management Review,1995, 20(2):379-403
    [61] Hu Q, Saunders C. Gebelt M. Research Report: Diffusion of Information Systems Outsourcing: A Reevaluation of Influence Sources [J]. Information Systems Research, 1997, 8(3):288-301
    [62] Huff S L. Outsourcing of information services [J]. Business Quarterly, 1991, 54(4):62-65
    [63] Jiang B, Belohiav J A, Young ST. Outsourcing impact on manufacturing firms’value: Evidence from Japan [J]. Journal of Operations Management, 2007, 25(4):885-900
    [64] Jorgensen J. Managing the Risk of Outsourced IT [J]. Internal Auditor, 1996, 53(6):54-59
    [65] Joshi A W, Amold S J. The Impact of Buyer Dependence on Buyer Opportunism in Buyer Supplier Relationships: The Moderating Role of Relational Norms [J]. Psychology & Marketing, 1997, 14(18):823-845
    [66] Judenberg J. Applications Maintenance Outsourcing [J]. Information Systems Management, 1994, 11(4):34-38
    [67] Jurison J. The role of risk and return in information technology outsourcing decisions [J]. Journal of Information Technology, 1995(10):239-247
    [68] Kanter R M. Collaborative advantage: The Art of Alliance [J]. Harvard Business Review,1994,72(4): 96-108
    [69] Kem T, Willcocks L. Exploring information technology outsourcing relationships: theory and practice [J]. Journal of Strategic Information Systems, 2000, 9(4):321-350
    [70] Kem T, Willcocks L. Exploring relationships in information technology outsourcing: the interaction approach. European Journal of Information Systems, 2002, 11(l):3-19
    [71] Kern T, Willcocks L P. The Relationship Advantage: Information Technologies, Sourcing, and Management [M]. Oxford: Oxford University Press, 2001
    [72] Kern T. The Gestalt of an Information Technology Outsourcing Relationship: An Exploratory Analysis [C]. Atlanta, Georgia 18thInternational Conference on Information Systems, 1997:15-17
    [73] Kevin J D. IT outsourcing relationships: An Exploratory Study of Interorganizational Control Mechanisms [M]. Cambridge: Harvard University Graduate School of Business Administration,1996
    [74] King J L, Kraemer K L. Evolution and Organizational Information Systems: An Assessment of Nolan's Stage Model [J], Communications of the Association for Computing Machinery, 1984, 27( 5): 466-475
    [75] Klein H K, Myers M D. A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems [J], MIS Quarterly, 1999, 23(1): 67-93
    [76] Klepper R, Jones W O. Outsourcing Information Technology, Systems & Services [M]. Upper Saddle River, N.J.,Prentice Hall PTR, 1998
    [77] Klepper R. The Management of Partnering development in IS Outsourcing [J]. Journal of Information Technology, 1995, 10(4):249-258
    [78] Lacity M C, Hirschheim R A. Beyond theinformation systems outsourcing bandwagon: theinsourcing response, New York: Wiley, 1995
    [79] Lacity M C, Hirschheim R A. Implementing Information Systems Outsourcing: Key Issues and Experiences of an Early Adopter [J]. Journal of General Management, 1993, 19(1): 17-31
    [80] Lacity M C, Hirschheim R A. Information Systems Outsourcing: Myths, Metaphors, and Realities [M], New York: Wiley, 1993
    [81] Lacity M C, Hirschheim R A. The Information Systems Outsourcing Bandwagon [M]. Sloan Management Review, 1993, 35(1): 73-86
    [82] Lacity M C, Willcocks L P, Feeny D F. IT Outsourcing: Maximize Flexibility and Control [J]. Harvard Business Review, 1995, 73(3): 84-93
    [83] Lacity M C, Willcocks L P, Feeny D F. The Value of Selective IT Sourcing [J]. Sloan Management Review, 1996, 37(3):13-25
    [84] Lacity M C, Willcocks L P. An empirical investigation of information technology sourcing practices: Lessons from experience [J]. MIS Quarterly, 1998, 22(3): 363-408
    [85] Lacity M C, Willcocks L P. Global Information Technology Outsourcing [M]. West Sussex:John Wiley & Sons Ltd, 2001
    [86] Lacity M C, Willcocks L P. InformationSystems Sourcing: Examining the Privatization Option in USA Public Administration [J]. InformationSystems Journal, 1997, 7(2): 85-108
    [87] Lacity M C, Willcocks L P. Interpreting Information Technology Sourcing Decisions from a Transaction Cost Perspective: Findings andCritique [J]. Accounting, Management and InformationTechnologies, 1995, 5(3/4): 203-244
    [88] Lacity M C, Willcocks L. A Survey of IT Outsourcing Experiences in USA and UK Organizations [J]. Journal of Global Information Management, 2000, 8(2):5-23
    [89] Lambert D M, Emmelhainz M A, Gardner J T. Building Successful Logistics Partnerships [J]. Journal of Business Logistics, 1999, 20 (1) : 165-181
    [90] Lee J N, Huynh M Q, Chi W K, Pi S M. The Evolution of Outsourcing Research: What is the Next Issue? [C]. Hawaii International Conference on System Sciences, 2000
    [91] Lee J N, Kim Y G. Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation [J]. Journal of Management Information Systems. 1999,15(4):29-61
    [92] Lee J N, Shaila M M, Kim Y M. IT Outsourcing Strategies: Universalistic,Contingency, and Configurational Explanations of Success [J]. Information Systems Research, 2004, 15(2):110-131
    [93] Lee J N. The Impact of Knowledge Sharing, Organizat ional Capability and Partnership Quality on IS Outsourcing Success [J]. Information & Management, 2001, 38 (5): 323-335
    [94] Lee M K O. IT Outsourcing Contracts: Practical Issues for Management [J]. Industrial Management & Data Systems, 1996,96(1):15-20
    [95] Levina N, Ross J. From the Vendor's Perspective: Exploring the Value Proposition in IT Outsourcing [J]. MIS Quarterly, 2003, 27(3):331-364
    [96] Loh L, Venkatraman N. Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis [J]. Journal of Management Information Systems, 1992, 9(1): 7-24
    [97] Loh L, Venkatraman N. Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect [J]. Information Systems Research, 1992, 3(4): 334-358
    [98] Macneil I R. The new social contract [M]. New Haven: Yale University Press, 1980
    [99] Mahoney J T, Rajendran P. The Resource-Based View within the Conversation of Strategic Management [J]. Strategic Management Journal, 1992, 13(5):363-385
    [100] Martinez SA, Vela JMJ, De LCP, Perez PM. Managerial perceptions of workplace flexibility and firm performance [J]. International Journal of Operations & Production Management, 2007, 27(7):714-734
    [101] McAllister D J. Affect and cognition based trust as foundations for interpersonal cooperation in organizations [J]. Academy of Management Journal,1995, 38(1):24-59
    [102] McFarlan F W, Nolan R L. How to Manage an IT Outsourcing Alliance [J]. Sloan Management Review, 1995,36(2): 9-23
    
    [103] McGowan M K, Madey G R. The Influence of Organization Structure and Organizational Learning Factors on the Extent of EDI Implementation in U.S.Firms [J]. Information Resources Management Journal, 1998, 11(3):17-27
    [104] McLellan K L, Marcolin B L, Beamish P W. Financial and Strategic Motivations Behind IS Outsourcing [J]. Journal of Information Technology, 1995(10):299-321
    [105] McNurlin B C, Ralph H, Sprague J. Information Systems Management in Practice [M]. Massachusetts: Prentice-Hall International, 1998
    [106] Mellewigt T, Madhok A, Weibel A. Trust and formal contracts in inter-organizational relationships-substitutes and complements [J]. Managerial& Decision Economies, 2007, 28(8):833-847
    [107] Michael A M. Transnational Architecture A Reengineering Approach [J], Information Management. 1995, 12(1):17-25
    [108] Michael G, Wonseok O. Analyzing IT Outsourcing Relationships as Alliances among Multiple Clients and Vendors [C]. Hawaii International Conference on System Sciences, 1999
    [109] Mohr J, Spekman R. Characteristics of partnership success: Partnership at tributes, communication, behavior, and conflict resolution techniques [J]. Strategic Management Journal, 1994, 15(7) :135-152
    [110] Nam K, Rajagopalan S, Rao H R, Chaudhury. A two-level investigation of information system outsourcing [J]. Communications of ACM 7, 1996,39(7):36-44
    [111] Nancy B D. Beyond Opportunism: A Resource - based View of Outsourcing Risk [C]. Proceedings of the HCISS, 1998:675
    [112] Ngwenyama O K, Bryson N. Making the IS Outsourcing Decision: A Transaction Cost Approach to Analyzing Outsourcing Decision Problem [J]. European Journal of Operational Research, 1999,115(2):351-367
    [113] Nolan R L. Managing the Crises in Data Processing [J]. Harvard Business Review, 1979,57(2):115-126
    [114] Osei B K M, Ngwenyama O K. Managing risks in information systems outsourcing: An approach to analyzing outsourcing risks and structuring incentive contracts [J]. European Journal of Operational Research, 2006,174(1):245-264
    [115] Penrose E. The Theory of the Growth of the Firm [M]. Basl black well & Molid, 1959
    [116] Pepper B. Obtaining Assurance About Your Security [C].Information Security Technical Report,1996,1(3):38-47
    [117] Peter F D. The Changing World of the Executive [M]. New York: Perseus Distribution Services, 1982
    [118] Petter G, Hans S S. Critical success factors from IT outsourcing theories: an empirical study [J], Industrial Management & Data Systems, 2005, 105 (6):685-702
    [119] Pfeffer J, Salanicik G R. The External Control of Organizations [M]. Pittman Boston, 1978
    [103] McGowan M K, Madey G R. The Influence of Organization Structure and Organizational Learning Factors on the Extent of EDI Implementation in U.S.Firms [J]. Information Resources Management Journal, 1998, 11(3):17-27
    [104] McLellan K L, Marcolin B L, Beamish P W. Financial and Strategic Motivations Behind IS Outsourcing [J]. Journal of Information Technology, 1995(10):299-321
    [105] McNurlin B C, Ralph H, Sprague J. Information Systems Management in Practice [M]. Massachusetts: Prentice-Hall International, 1998
    [106] Mellewigt T, Madhok A, Weibel A. Trust and formal contracts in inter-organizational relationships-substitutes and complements [J]. Managerial& Decision Economies, 2007, 28(8):833-847
    [107] Michael A M. Transnational Architecture A Reengineering Approach [J], Information Management. 1995, 12(1):17-25
    [108] Michael G, Wonseok O. Analyzing IT Outsourcing Relationships as Alliances among Multiple Clients and Vendors [C]. Hawaii International Conference on System Sciences, 1999
    [109] Mohr J, Spekman R. Characteristics of partnership success: Partnership at tributes, communication, behavior, and conflict resolution techniques [J]. Strategic Management Journal, 1994, 15(7) :135-152
    [110] Nam K, Rajagopalan S, Rao H R, Chaudhury. A two-level investigation of information system outsourcing [J]. Communications of ACM 7, 1996,39(7):36-44
    [111] Nancy B D. Beyond Opportunism: A Resource - based View of Outsourcing Risk [C]. Proceedings of the HCISS, 1998:675
    [112] Ngwenyama O K, Bryson N. Making the IS Outsourcing Decision: A Transaction Cost Approach to Analyzing Outsourcing Decision Problem [J]. European Journal of Operational Research, 1999,115(2):351-367
    [113] Nolan R L. Managing the Crises in Data Processing [J]. Harvard Business Review, 1979,57(2):115-126
    [114] Osei B K M, Ngwenyama O K. Managing risks in information systems outsourcing: An approach to analyzing outsourcing risks and structuring incentive contracts [J]. European Journal of Operational Research, 2006,174(1):245-264
    [115] Penrose E. The Theory of the Growth of the Firm [M]. Basl black well & Molid, 1959
    [116] Pepper B. Obtaining Assurance About Your Security [C].Information Security Technical Report,1996,1(3):38-47
    [117] Peter F D. The Changing World of the Executive [M]. New York: Perseus Distribution Services, 1982
    [118] Petter G, Hans S S. Critical success factors from IT outsourcing theories: an empirical study [J], Industrial Management & Data Systems, 2005, 105 (6):685-702
    [119] Pfeffer J, Salanicik G R. The External Control of Organizations [M]. Pittman Boston, 1978
    [137] Willcocks L P, Lacity M C. Strategic Sourcingof Information Systems [M]. New York: Wiley, 1998
    [138] Willcocks L P, Sykes R. The role of the CIO and IT function in ERP [J]. Communications of the ACM, 2000,43(4):32-38
    [139] Willcocks L, Cullen S. The Outsourcing Enterprise: A CEO Agenda Briefing[M]. London: LogicaCMG press, 2005
    [140] Willcocks L, Feeny D F. IT Outsourcing and Core Capabilities: Challenges and Lessons at Dupont [J]. Information Systems Management, 2006, 23(1):49-56
    [141] Willcocks L, Fitzgerald G. A BusinessGuide to Outsourcing Information Technology [M].London: Business Intelligence, 1994
    [142] Willcocks, L P, Fitzgerald G, Lacity M C. To Outsource IT Or Not? Recent Research on Economics and Evaluation Practice [J]. EuropeanJournal of Information Systems, 1996, 5(3): 143-160
    [143] William R K. Outsourcing Becomes More Complex [J]. Information System Management , 2005,22(2):89-90
    [144] Williamson O E. Markets and Hierarchies, Analysis and Antitrust Implications: A Study in the Economics of Internal Organization [M].New York: FreePress, 1975
    [145] Williamson O E. The economic institutions of capitalism [M]. New York: Free Press, 1985
    [146] Williamson O E. The Economics of Organization: The Transaction Cost Approach [J]. American Journal of Sociology, 1981, 87(3):548-577
    [147] Williamson O E. Transaction cost Economics: the Governce of Contractual Relations [J]. Journal of Law and Economics, 1975,22(2):233-261
    [148] Xu S, Zhu K, Gibbs J. Global technology, local adoption: A cross-country investigation of internet adoption by companies in the United States and China [J]. Electronic Market, 2004, 14(1): 13-24
    [149] Yin R. The Case Study Crisis: Some Answers [J]. Administrative Science Quarterly, 1981, 26(1):58-65
    [150] Zheng Z S, et al. IS outsourcing management competence dimensions instrument development and relationship exploration [J]. Information & Management 2005,42(6): 901-919
    [151]彼得·德鲁克.大变革时代的管理[M].上海:上海译文出版社,1999
    [152]毕新华.企业信息系统建设与管理变革[M].长春:吉林大学出版社,2002: 76-80,191-196
    [153]毕新华,尚伟昌,徐杨.信息系统成长理论模型的比较分析[J].情报科学, 2005,23(11):1601-1605
    [154]毕新华,余翠玲.信息技术吸纳能力及其过程模型研究[J].科学学与科学技术管理,2006,27(12):42-46
    [155]毕新华,余翠玲.信息技术吸纳能力的演化机理及过程研究[J].图书情报工作,2010, 54(4):34-37
    [156]曹航.资源外包的形成与演进机理研究[D].上海:复旦大学管理学院,2007
    [157]陈国青,蒋镇辉.中国企业信息化的阶跃式发展过程[J].计算机系统应用,1999(9):2-4
    [158]陈劲,王焕祥.演化经济学[M].北京:清华大学出版社,2008
    [159]陈静,蔡敏,陈敬贵.企业异质性:一种基于演化经济学视角的解释.西南民族大学学报(人文社科版),2007(5):198-200
    [160]程源,雷家骕.企业技术源的演化趋势与战略意义[J].科学学与科学技术管理2004,25(9):74-77
    [161]丛国栋.企业IT外包风险评价模型与控制策略研究[D].武汉:华中科技大学管理学院,2008
    [162]崔婷.企业能力系统涌现机理及层次演进研究[D].天津:天津大学管理学院,2006
    [163]董俊武,黄江圳,陈震红.基于知识的动态能力演化模型研究[J].中国工业经济, 2004,(2):77-85
    [164]杜娟.基于PEST的中国企业信息系统宏观成长过程研究[D].长春:吉林大学管理学院,2010
    [165]段伟花,毕新华,王雅薇.基于博弈论的企业信息技术外包关系趋势分析[J].社会科学占线,2009(10):262-264
    [166]段伟花,毕新华.基于非对称信息理论的人力资源外包风险管理[J].现代管理科学,2008(10):107-109
    [167]胡浩,王永日.基于交易成本分析的信息技术外包行为研究[J].科技进步与对策,2005,22(7):83-86
    [168]怀劲梅.基于柔性的设备维护外包合同管理研究[D].武汉:华中科技大学管理学院,2006
    [169]黄斐.IT外包的利益相关方面的整体决策思考[J].中国管理信息化,2008,11(17):74-78
    [170]江冰,夏辉,刘洪.企业信息技术外包的策略分析[J].管理工程学报,2002,16(2):38-41
    [171]李钢.基于企业基因视角的企业演化机制研究[M].上海:复旦大学出版,2007
    [172]李怀祖.管理研究方法[M].西安:西安交通大学出版社,2004:27
    [173]李猛.信息技术外包项目绩效影响因素实证研究[J].科学与管理,2010,30(3):73-77
    [174]李猛.信息系统外包关键成功因素探讨[J].商业研究,2010(2):66-69
    [175]李小卯,寇纪淞.战略性信息技术外包[J].中国软科学,1998(10):114-118
    [176]李小卯,张建军.基于Internet的资源外包与企业创新[J].中国软科学,2003(1):93-99
    [177]李小卯.信息技术外包套牢问题的研究[J].系统工程理论与实践,2002,22(3):26-31
    [178]梁新弘.论信息技术(IT)外包的动因、风险及防范[J].科技管理研究,2004,24(1):64-66
    [179]林建宗.应用服务提供商模式外包关系的建立与协调[D].厦门:厦门大学管理学院,2001
    [180]林则夫,陈德泉,温珂.试论信息技术外包中的风险管理策略[J].科学学与科学技术管理,2004,25(2):135-137
    [181]刘贵富.产业链基本理论研究[D].长春:吉林大学管理学院,2006
    [182]刘建兵,柳卸林.企业研究与开发的外部化及对中国的启示[J].科学学研究,2005,23(3),366-371
    [183]刘晓文,胡克瑾.企业IT外包关系治理框架研究[J].情报杂志,2009,28(3):112-116
    [184]刘英姿,吴昊,林伟.企业信息化阶段的发展模式及阶段特征分析[J].科技管理研究,2004,24(2):101-103
    [185]罗伯特·克莱珀,温德尔·琼斯.信息技术、系统与服务的外包[M].北京:电子工业出版社,2003
    [186]迈克尔·波特.国家竞争优势[M].北京华夏出版社,2002
    [187]毛美叶,王文涛.国外信息技术外包关系研究综述[J].管理现代化, 2006(2):4-6
    [188]聂规划,周晓光,张亮.企业信息技术外包的风险与防范[J].科技进步与对策,2002,19(4):66-67
    [189]齐晓云.我国企业信息系统宏观成长过程的实证研究[D].长春:吉林大学管理学院,2008
    [190]谯谊,甘仞初.信息系统外包关系框架及其影响因素分析[J].科学学与科学技术管理,2007,28(1):33-37,43
    [191]秦仪.IT外包关系质量研究[J].管理学报,2006,3(6):669-672
    [192]苏敬勤,孙大鹏.资源外包战略决策模型研究[J].科学学研究,2006,24(2):64-68
    [193]孙剑斌,李盈盈.信息技术外包模式比较分析[J].商业时代,2008(31):85-86
    [194]谭跃进.系统工程原理[M].长沙:国防科技大学出版社,1999
    [195]田安意.企业信息化的动力机制研究[D].北京:中国社会科学院,2008
    [196]田红云,宋新平.IT外包伙伴关系理论研究前沿探析及未来展望[J].图书情报工作, 2010, 54(22):131-134
    [197]田红云,杨海.IT外包伙伴关系质量关键影响因素实证研究[J].图书情报工作, 2010, 54(16):82-86
    [198]涂静.服务外包关系的治理研究[D].武汉:华中科技大学管理学院,2009
    [199]汪应洛.系统工程[M].北京:机械工业出版社,2002:84-89
    [200]汪应洛.系统工程理论方法与应用[M].北京:高等教育出版社,1998:35-49
    [201]汪云峰.战略性信息技术外包的对象选择与目标设计研究[D].上海:复旦大学管理学院,2003
    [202]王建军,杨德礼.企业信息系统外包机理研究[J].大连理工大学学报(社会科学版),2006,27(3):49-55
    [203]王欣荣,樊治平.信息系统外包决策的一种模糊决策方法[J].东北大学学报(自然科学版),2002,23(8):750-753
    [204]王兴元,程涛.企业信息化递进发展模型及其水指数[J].山东大学学报(工学版), 2002,32(4):337-341
    [205]吴大刚.基于信息流控制的信息技术外包产业发展模式与战略研究[D].长春:吉林大学管理学院,2007
    [206]吴锋,李怀祖.外包环境下的知识管理与控制[J].研究与发展管理,2004,16(4):31-36
    [207]吴金希,于永达.浅议管理学中的案例研究方法-特点、方法设计与有效性讨论[J].科学学研究,2004,12(22):105-111
    [208]吴彤.自组织方法论研究[M].北京:清华大学出版社,2001
    [209]伍蓓,陈劲,吴增源.研发外包的模式、测度及其对企业创新绩效的影响研究[J] .科学学研究,2009,27(2):302-309
    [210]伍蓓.企业研发外包的模式_机理及动态演化特征研究[D].广州:浙江大学管理学院,2009
    [211]谢怀军.银行信息技术外包及其风险管理[J].上海金融,2004(1):38-40
    [212]谢识予.经济博弈论[M].北京:机械工业出版社,2002:56
    [213]徐姝.IT外包绩效及其管理研究评介[J].湖南商学院学报,2008,15(3):21-23
    [214]许国志.系统科学[M].上海:上海科技教育出版社,2000
    [215]许正良.管理研究方法[M].长春:吉林大学出版社,2004
    [216]杨波,彭思立.伙伴关系——信息技术外包的演变趋势[J].管理学报,2005,2(S):254-258
    [217]杨波,左美云,方美琪.信息技术外包理论和实务评述[J].外国经济与管理,2003,25(9):7-11
    [218]杨波.IT外包的控制机制研究[J].管理学报,2005,2(5):572-575
    [219]杨波.IT外包关系管理[D].北京:中国人民大学商学院,2004
    [220]杨农.信息系统外包的决策和风险分析[J].学术界,2003 ,103(6) :184-193
    [221]杨锡怀,冷克平,王江.企业战略管理[M].北京:高等教育出版社,2009:47-58
    [222]杨英,霍国庆.企业信息技术资源外包及其风险分析[J].中国软科学,2001(3):98-102
    [223]尹建华,王兆华,苏敬勤.资源外包理论的国内外研究述评[J].科研管理,2003 24(5) :133-137
    [224]尹建华.资源外包结构特性、决策与企业绩效:一个理论述评[J].工业技术经济,2005,24(3):70-72
    [225]于宝君.企业信息系统成长过程及演化机理研究[D].长春:吉林大学管理学院,2008
    [226]于立,刘慧兰.信息技术外包的成因分析——信息技术外包服务商的视角[J].情报杂志,2006,25(10):13-15
    [227]余翠玲,毕新华,于宝君.信息技术吸纳能力演进的动力机制研究[J].情报科学,2009,27(12):1880-1884
    [228]余翠玲,毕新华.企业信息系统成长的动力学机理模型研究[J].情报杂志,2008,27(7):6-8
    [229]余翠玲.信息技术吸纳能力理论模型与实证研究[D].长春:吉林大学管理学院,2010
    [230]袁璐,杨含草.企业信息技术外包关系研究现状及测量方法[J].科技信息,2009(36):87-89
    [231]张鹤达.基于资源观的IT能力对企业绩效的影响机制研究[D].长春:吉林大学管理学院,2008
    [232]张洪瀚,王维.IT外包项目的协同管理流程分析[J].哈尔滨商业大学学报(社会科学版),2011(1):44-47
    [233]张璐琼,刘明杞,郭东强.企业信息技术外包理论的研究综述[J].情报杂志,2008,27(8):44-46
    [234]张培,曾珍香.信息技术外包特征及其演进趋势研究[J].情报杂志,2008,27(5):44-91
    [235]张培.企业信息技术外包决策模型与仿真研究[D].石家庄:河北工业大学管理学院,2008
    [236]张维迎.博弈论与信息经济学[M].上海:上海人民出版社,1996
    [237]张莹,杨超.基于信任及知识共享与IT外包的关系模型研究[J].科技情报开发与经济,2010,20(30):151-154
    [238]张园林,匡兴华,刘鹏.IT外包研究现状述评[J].中国管理信息化,2008,11(4):75-79
    [239]张云川.IT外包服务及其执行过程风险回避的研究[D].武汉:华中科技大学管理学院,2005
    [240]周清杰.演化经济学企业理论的基本逻辑与分析框架[J].外国经济与管理,2006,28(4):9-6
    [241]朱琳,吕本富.解释结构模型的简便方法[J].系统工程与电子技术,2004,26(12):65-67,141

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700