Rise and Fall of an Information Technology Outsourcing Program: a qualitative Analysis of a Troubled Corporate Initiative
Download 1.05 Mb. Pdf ko'rish
|
Rise and Fall of an Information Technology Outsourcing Program A
Crisis and revolution.
Practitioners continually employ the tools and ideologies of an existing paradigm as long as those tools adequately solve the problems the paradigm defines. Scientific retooling comes at a cost to the existing rules, which is fraught with debate and anxiety among the community of practitioners. Existing rules, methods, and theories become increasingly vague and less useful during these crises. Research guided by the once previously established rules of the paradigm begins to produce more problems than solutions (Kuhn, 2012). Kuhn (2012) offered three possible conclusions to all crises. Occasionally the science of the current paradigm ultimately handles the anomaly—what appeared to be the end of a paradigm proved to be a tough but solvable puzzle. Another path is that the anomaly resists traditional and more radical approaches and is thus set aside for a future generation to solve with perhaps more advanced instruments. Lastly, if the crises cannot be solved after successive attempts and cannot be set aside, the emergence or shift toward a new paradigm candidate and a battle for its acceptance is likely. 36 Scientific revolutions often break communities into different camps who seek to either maintain the old paradigm or legitimize the new order. Each group defends and views its respective paradigm as evidence refuting the other’s paradigm. No paradigm solves all of the problems it uncovers, and no two competing paradigms leave the same problems unsolved. Therefore, the resolution of paradigm revolutions generally involves considerable debate over which are the most significant problems to be resolved, and which paradigm can win the allegiance of the majority of the community (Kuhn, 2012). In this study there was a scientific revolution, of sorts, which was the nature of doing information technology work in digital retailing during the early twenty-first century. In their attempt to resolve it, Icarus executives determined they could no longer follow their “normal science” of traditional project management with employee engineers and vendors in a staff augmentation model. In this new era, Icarus executives developed a model of evidence testing and decision making for outsourcing dubbed the Global Staffing Strategy (GSM). This strategy led to the creation of a bold managed services outsourcing project known as the Strategic Staffing Program (SSP) that was aimed at solving a perceived IT labor shortage or “capacity problem.” However, the upcoming chapters of this dissertation will discuss how executives failed to consider SSP as the next step in a revolution toward a new ITO paradigm at Icarus. What executives did instead was to look backward at an earlier attempt at a managed services agreement known as Project Phoenix. Three years prior to SSP, executives launched Phoenix as an intended managed services outsourcing project; however, it quickly devolved into a large- scale staff augmentation relationship. Executives knew that Phoenix was not working as intended. Nevertheless, they in effect approached SSP as if adding “bells and whistles” to the 37 Project Phoenix approach would make their latest attempt at a managed services agreement a success. Executives did not examine the reasons why Project Phoenix never became a jewel in the crown the Icarus IT department—they were unexplored anomalies. Instead IT executives attempted to implement a new managed services approach to software development (SSP) that co-existed with an IT organization still operating in a siloed “software factory” and largely dependent upon on the Project Phoenix approach to staff augmentation. In Kuhnian terms (2012), Icarus IT executives only half engaged in the scientific revolution of digital retail, and broke into different camps of support and non-support for SSP, which left them unprepared to address the new anomalies that would arise under this misguided approach. 38 CHAPTER THREE RESEARCH METHODS This research departs from the broader canon of quantitative-based Information Technology Outsourcing (ITO) diffusion studies and follows a grounded theory case study methodology. As discussed in Chapter 1, Beverakis et al., (2009) presented research of a similar scope, which I discuss further here. I begin with a methods review of previous quantitative ITO diffusion studies followed by an appraisal of the qualitative ITO diffusion studies I discovered in my literature review. Next, I discuss grounded theory and case study methodologies as approaches for the present study. I then review my study timeline, data collection sources, modes of data analysis, validity and generalizability matters, and ethical and confidentiality considerations. Download 1.05 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling