Rise and Fall of an Information Technology Outsourcing Program: a qualitative Analysis of a Troubled Corporate Initiative
Download 1.05 Mb. Pdf ko'rish
|
Rise and Fall of an Information Technology Outsourcing Program A
- Bu sahifa navigatsiya:
- Contributions to information technology outsourcing research.
Implications and Recommendations
As previously stated, I did not include any ComTech employees in the interviews for this study due to my position at Icarus. Although I was able to marginally represent ComTech’s role in SSP through the responses of Icarus employees and executives who worked directly with 218 them, one of this study’s limitations was ComTech’s exclusion from the interviews. An opportunity for future research would be extending or amending this study with ComTech employee interviews. Additionally, because it would have represented a conflict of interest, I was unable to include details from either Icarus or ComTech regarding their approach to the actual contract negotiation process. A future study may add further value by examining this aspect of the overall information technology outsourcing (ITO) process. Contributions to information technology outsourcing research. This study followed a qualitative approach to examine the outcome or how a single ITO program turned out as it did, versus the quantitative diffusion methodologies (i.e. Bass, 1969, 2004; Davidson & MacKinnion, 1981; Mahajan & Peterson, 1985) employed by ITO diffusion studies (Loh & Venkatraman, 1992; Hu et al., 1997) that assessed why outsourcing diffused as a business strategy, or what IT functions firms choose to outsource. In doing so, this study contributes to a growing number of more recent ITO studies utilizing grounded theory methodologies (Strauss & Corbin, 1998; Charmaz, 2006) such as Clott (2007), Hong and O (2009), Lacity and Rottman (2009), and Beverakis et al. (2009). The previously published research discussed in Chapter One examined the influence of external factors such as copying competitor strategy and external research on why firms choose to implement information technology outsourcing (ITO) strategies. Icarus executives’ determination to not repeat the IT outsourcing mistakes made by one of their competitors supported Loh and Venkatraman’s (1992) findings suggesting the strong influence of “institutional isomorphism” (DiMaggio & Powell, 1983) on executives to pursue ITO strategies. Rather than mimicking a successful strategy, Icarus executives attempted to avoid repeating the mistakes of another firm. But in process, they too ended up with a failed ITO program. 219 In addition to the influence of external dynamics on Icarus executives’ decision-making, this study also revealed the strong role played by internal, cultural elements. Most notably, the Icarus habitus was a fundamental influence on Richard’s pursuit of a risky ITO strategy. A successful SSP would have represented a major milestone in Richard’s moral career and added to his cultural capital at Icarus. In using the infocentric GSM ouija board to attempt to advance his moral career, Richard positioned SSP as a silver-bullet solution to the capacity problem. The qualitative data in this research show Richard and Icarus would have fared better by taking an incremental approach toward addressing the initial capacity problem. However, the Icarus habitus was more likely to recognize and reward elegant or grand solutions than those allowing for greater degrees of freedom in their implementation. At least at the upper levels of the taxonomy, demonstrating restraint and prudency were less likely to advance one’s moral career than attempting to flawlessly execute a more risky strategy. Lunblad (2003) suggested Rogers (2003) theory of “innovation diffusion” focused primarily on diffusion and adoption by individuals rather than organizations. Lunblad (2003) called for future diffusion studies to look deeper into organizational dynamics by describing “the interaction between the innovation, the adopter, the social system, and the other influencers of adoption” (p. 59). This study’s articulation and inclusion of the Icarus IT habitus partially addresses the role of the “social system” as discussed by Lunblad (2003). Additionally, this research considered the role of the innovator (Richard) and suggests his attempts to advance his moral career as having a strong influence on outcome of the “innovation” at the center of this research (i.e. the Strategic Staffing Program). As first discussed in Chapter Three, this research followed McMaster’s (2001) suggestion to flatten Rogers’s (2003) normally-distributed bell curve of innovation adopter categories 220 (innovators, early adopters, early majority, late majority, and laggards) into a binary pair of innovators and recipients (executives and employees in this study). The findings of this study also support McMaster’s (2001) criticism that relying on a diffusion-theory approach to change or innovation adoption downplays the impact of human weaknesses and costs common within the corporate domain. This research determined that the Icarus IT habitus in many ways cultivated “bad habits” among its leaders, thus suggesting leaders’ foibles (versus adopters’ characteristics) played a stronger role on why SSP turned out as it did. Most closely aligned to this research was the work of Beverakis et al. (2009) who developed a grounded theory of how an outsourcing strategy diffused throughout one multinational organization. Among the authors’ suggestions for future research was exploring the “impact of personal opinions and bias [that] could prove to be an impediment to the success of such of an offshore sourcing project. A study of this impact could prove extremely valuable and make a significant contribution” (p. 45). The qualitative data in this study clearly show the relevance and impact Icarus’s habitus had on SSP. Most importantly, the “fuzzy” elements of the habitus “iceberg” that existed beneath the “waterline” proved to be the most influential means via which executives’ and employees’ personal opinions, motivations, and biases affected SSP. Download 1.05 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling