DOI QR코드

DOI QR Code

IT아웃소싱 위험에 대한 고객과 공급업체와의 인식 차이

Differences Between Client's and Supplier's receptions of IT Outsourcing Risks

  • 김경일 (한국교통대학교 인문사회대학 융합경영전공)
  • Kim, Kyung-Ihl (Division of Convergence Management, Korea National University of Transportation)
  • 투고 : 2018.09.12
  • 심사 : 2018.10.20
  • 발행 : 2018.10.31

초록

국내 중소기업에 있어서 21세기 이후 정보 기술(IT) 아웃소싱은 주요 비즈니스 사항으로 자리잡아왔다. 선행연구들은 성공적인 IT아웃소싱의 주요 요인으로서 주로 고객과 공급자 중 한쪽에 치우친 단일 관점에서 논의하여 왔다. 단일 관점은 대리이론에서 제기되는 바처럼 다른 한 쪽이 중요하게 다루는 위험가능성을 배제하는 논리가 된다. 본 연구는 quasi-Delphi방법론으로 고객과 공급자간의 위험에 대하여 잠재적으로 불일치될 수 있는 사항들을 파악하여 아웃소싱 효율성을 높일 수 있는 방안을 찾고자 하였다. 분석 결과, 불일치되는 위험사항은 첫째, 고객은 공급자의 프로젝트 몰입 부족을 그리고 잘못된 공급자선정기준과 프로세스로 나타났다. 두 번째 고객의 입장과는 달리 불분명한 요구사항 및 프로젝트활동에 대한 전문성 부족을 공급업자에게서 나타났다. 고객과 공급자가 프로젝트 위험관리를 협업적으로 인식하고 관리하는 방안에 대하여 결론을 제시한다.

Researchers have suggested successful risk management as a key factor in successful IT outsourcing projects implementation. The documented investigations, however, have mainly addressed risk management only from a single perspective of either clients or IT vendors. This study explored the potential perception inconsistency regarding the risks between the client and the vendor for IT outsourcing projects by using a quasi-Delphi approach. The analysis results indicated some inconsistencies in the risks perceived by the two parties: (1) the clients regarded (a) lack of vendor commitment to the project and (b) poor vendor selection criteria and process as top critical risks but the vendors didn't; and (2) on the other hand, the vendors perceived (a) unclear requirements and (b) lack of experience and expertise with project activities as significant risks but the clients didn't. Insights into how the client and the vendor perceive risks may help both parties determine how to partner and manage project risks collaboratively to succeed in outsourcing.

키워드

참고문헌

  1. B. Bahli & S. Rivard. (2013). Cost escalation in information technology outsourcing: A moderated mediation study. Decision Support Systems, 56, 37-47. https://doi.org/10.1016/j.dss.2013.04.007
  2. H. Taylor. (2007). Outsourced IT projects from th vendor perspective: Different goal, different risks. Journal of Global Information Management(JGIM), 15(2), 1-27. https://doi.org/10.4018/jgim.2007040101
  3. V.Babenko, O. Nakisko & I. Mykolnko. (2018). Research of the aspects of modeling of the project management of risk of implementation systems. information support. Technology Audit & Production Reserves, 29(4), 64-69. DOI: 10.15587/2312-8372.2018.124538..
  4. G. Cong & T. Chen. (2015). A novel dynamic algorithm for IT outsourcing risk assessment based on transaction cost theory. Discrete Dynamics in Nature & Society, (2015), 1-10. DOI: 10. 1155/2015/325890.
  5. M. Sass & M. Fifekova. (2011) Offshoring and outsourcing business services to central and eastern Europe. European Studies, 19(9), 1593-1609. DOI: 10.1080/09654313.2011.586196.
  6. R. Babin. (2011). Emerging markets corporate social responsibilities and global IT outsourcin. Communications of AC, 54(9), 28-30. DOI: 10.1145/1995376.199L5387
  7. V. A. Tusshavin. (2014). Deciding on IT outsourcing based on the number of users in a company. In the world of scientific discoveries, 57(9), 477-484. DOI: 10.12731/wsd-2014-9.1-9.
  8. R. T. Nakatsu & Iacovou. (2009). Integration by communication : knowledge exchange in global outsourcing of product software development. Expert Systems, 31(3), 267-281. DOI: 10.1111/exsy.640.
  9. J. C. Shin & K. I. Kim. (2016). A Study on success factors in the enterprise information systems introduced. Journal of Convergence for information technology, 6(4), 1-8. DOI: 10.22156/cs4smb.2016.64.001.
  10. J. B. Jeong & H. S. Yang. (2012). A Study on the effect on IT adoption results by adoption factors of IT outsourcing in the services industries. Journal of Digital Convergency, 10(11), 115-125.
  11. J. C. Shin & K. I. Kim. (2018). The necessity of smart factory's standard and certification system based on grounded theory. Journal of convergence for information technology, 8(2), 203-208. DOI : 10.22156/CS4SMB.2018.8.2.203
  12. G. Klein & J. J. Jiang. (2001). Seeking consonance in information systems. Journal of Systems and Software, 56(2), 195-202. https://doi.org/10.1016/S0164-1212(00)00097-2
  13. K. I. Kim. (2017). Impact on AIS process and firm permance of accounting information system based on Dynamic Capacibility Framework. Journal of convergence for information technology, 7(5), 2017. DOI : 10.22156/CS4SMB.2017.7.5.169