<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Achieving trust in IT outsourcing relationships</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Eva</forename><surname>Söderström</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Humanities and Informatics</orgName>
								<orgName type="institution">University of Skövde</orgName>
								<address>
									<postBox>Box 408</postBox>
									<postCode>541 28</postCode>
									<settlement>Skövde</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Christian</forename><surname>Lennerholt</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Humanities and Informatics</orgName>
								<orgName type="institution">University of Skövde</orgName>
								<address>
									<postBox>Box 408</postBox>
									<postCode>541 28</postCode>
									<settlement>Skövde</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Achieving trust in IT outsourcing relationships</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">EC952BCA32EEE46F4EA599F61B79B73A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T06:56+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>IT Outsourcing</term>
					<term>Trust</term>
					<term>Framework</term>
					<term>Critical Success Factors</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sensitive information to another organisation, lack of knowledge about security experience of the other part, cultural differences, etc. Trust is therefore becoming a more and more important issue in IT outsourcing relationships. This paper aims to identify and describe the process of achieving trust in IT outsourcing relationships. A framework was created based on an extensive literature survey. Three concept areas are included: contract, culture, and security. Each area is described, and critical success factors (CSF) were developed to support practical use.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>In today's dynamic world, organizations must stay competitive, for which IT outsourcing is a viable option. IT outsourcing can be defined as the process of handing over IT services to an external provider. Benefits include cost reduction, improved quality of service, and risk reduction <ref type="bibr" target="#b0">[1]</ref>. Risk awareness does not guarantee success, however, and trust is thus important in outsourcing relationships. A first step is to understand critical success factors (CSF) that must be fulfilled in order to achieve success <ref type="bibr" target="#b1">[2]</ref>. Previous research has identified that trust aspects in IT outsourcing are more important than for example control and flexibility <ref type="bibr" target="#b2">[3]</ref>, and that trust us part of the soft side of outsourcing <ref type="bibr" target="#b3">[4]</ref>. Studies of risks also show that trust is important for risk avoidance <ref type="bibr">[1; 5; 6]</ref>. The aim of this paper is to identify and describe a framework for how to achieve trust in IT outsourcing relationships. A framework in this context is a suggested point of view for an attack on a scientific problem <ref type="bibr" target="#b6">[7]</ref>. The framework is theoretically grounded and based on an extensive literature survey. It takes a management perspective and describes important perspectives to be considered, and connects each perspective to a number of CSF.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Trust</head><p>In order to achieve the expectations and accomplishments of an outsourcing relationship, the organization must trust the outsourcing vendor <ref type="bibr" target="#b8">[9]</ref>. Trust in itself is difficult to define, since it varies from one context to another <ref type="bibr" target="#b9">[10]</ref>. It can be perceived as the result of cognitive processes, decision-making concerning economics, and social relationships. Expectation is an important part of trust definitions (see e.g. 8; 11), since trust can be seen in terms of e.g. reliable promises including both positive expectations and risk avoidance. In this paper, we define trust as being achieved when the agreement is reliable and expectations are fulfilled in a behavioural goodwill. An agreement is reliable when it is worthy of being dependent on and its expectations are viewed to be achievable in a predictable and fair way. Behavioural goodwill can be viewed as an attitude of kindness or friendliness between two parts <ref type="bibr" target="#b10">[11]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Framework for achieving trust in IT outsourcing relationships</head><p>The framework for achieving trust in IT outsourcing was developed through a literature review of relevant sources. Since critical success factors may raise the chances of success, the framework will be based on such CSF.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Framework foundation</head><p>As a basis for the framework, we have adapted Dahanayaka et al's <ref type="bibr" target="#b11">[12]</ref> framework for understanding information systems development. This framework was selected since it aims for a consistent, systematic and integrated support throughout a system's lifecycle, plus that it is based on necessary concepts for a successful process. We have adapted this framework to fit the process of achieving trust in IT outsourcing relationships. The main difference is that we remove way of supporting and way of modelling, because our paper does not concern the lifecycle. Our adaptation focuses on important aspects of the process of how to achieve trust in IT outsourcing relationships in the following manner:</p><p>Way of thinking: deals with the role of IT outsourcing and its purposes. Visualizes the philosophy of how to achieve trust in IT outsourcing relationships. Way of controlling: deals with how to manage the process of how to achieve trust in IT outsourcing relationships. Different situations require different solutions. Way of working: a means for structuring problems that arise in the process. Distinguishes between which types of tasks that should be dealt with in a certain order. Also what means that are suited to solve a certain situation. Our framework is a structure consisting of CSF for achieving trust in IT outsourcing relationships. The way of thinking influences how the organization is controlling and working in order to achieve trust in IT outsourcing relationships. Way of controlling and way of working determine one another. Changes in the way of controlling may require a different way of working and vice versa. The CSFs are created from the way of controlling, and the way of working. In order to achieve trust, organizations have to know how to control different projects, and how to actually work to achieve trust.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.2">Framework overview</head><p>The framework consists of three main areas: contract, culture and security. Figure <ref type="figure">1</ref> shows the areas (ovals), their relationships (arrows), guidelines (rectangles), and associated CSFs (bullets in the rectangles). Relationship examples include that culture influences how contracts are created and managed, and how security issues are chosen and used in order to increase the possibility to achieve success in IT outsourcing relationships. Contract requirements will affect the choice and usage of security issues and vice versa that together affect how the project is managed. For each area, a series of guidelines have been developed. The guidelines are divided according the critical subparts under each main area. Each guideline consists of several CSFs. It is clear that the contract is essential in IT outsourcing relationships as a basis for trust. Three guidelines can be associated to this category, of which CSFs concern the written or mutual contract, three concern to minimize uncertainty, and one concerns contract duration. Culture is another important category, which is displayed by the three guidelines in this category. Leadership is the most emphasized issue with five CSFs, communication is another with three CSFs, and context involves two CSFs. Finally, security is an issue with increasing importance shown by seven factors divided into administrative security (five CSFs), and technical security (two CSFs).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. The framework, its areas and critical success factors</head><p>In order to use the framework in outsourcing projects, we propose two steps: understanding how the three areas relate to one another; and understanding the CSFs in each area. In the first step, the focus is on how culture affects contract creation and the necessary security adaptations, as well as how a contract affects the choice of security issues and vice versa. The second step involves a deeper understanding of each area and what to do in order to enhance the likelihood of actually achieving trust. Tailoring of the framework to specific situations is included here. One example may be that a global IT outsourcing project could pay more attention to the cultural CSFs before creating a contract, while another project has to have a tight security.</p><p>The purpose of the framework is to get a general understanding of how to achieve trust in IT outsourcing relationships from a theoretical perspective. The result is an awareness that can be used to tailor the knowledge into specific IT outsourcing projects. It is important to understand how the three areas -contract, culture and security -and their CSF may influence a specific project, and how important certain areas are within the project.</p><p>Future work will be focused on several aspects: extending the literature survey to cover a broader base of the outsourcing literature and possibly to detail the framework; coupling with research on human behaviour and its relationship to trust to create more direct usage guidelines for the framework; and to consider the systemic trust perspective into a more holistic coverage of the entire trust area.</p></div>		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Validating measures of information technology outsourcing risk factors</title>
		<author>
			<persName><forename type="first">B</forename><surname>Bahli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rivard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Omega</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="175" to="187" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Information systems outsourcing success factors: a review and some results</title>
		<author>
			<persName><forename type="first">J</forename><surname>Gasco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gonzalez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Llopis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Management &amp; Computer Security</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="399" to="418" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Information systems outsourcing: Replicating an existing framework in a different cultural context</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kadiyala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Samaddar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Operations Management</title>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The Hard and Soft Sides of IT Outsourcing Management</title>
		<author>
			<persName><forename type="first">J</forename><surname>Barthélemy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Management Journal</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="539" to="548" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Risk migration in IT outsourcing strategy revisited: longitudinal case research at LISA</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kern</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lacity</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Willcocks</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Strategic Information Systems</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="285" to="314" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Risks factors associated with offshore IT outsourcing</title>
		<author>
			<persName><forename type="first">M</forename><surname>Tafti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Industrial Management &amp; Data Systems</title>
		<imprint>
			<biblScope unit="volume">105</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="549" to="560" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Managing Critical Success Factors in a B2B Setting</title>
		<author>
			<persName><forename type="first">L</forename><surname>Aggestam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Söderström</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IADIS International Conference eCommerce 2005</title>
				<editor>
			<persName><forename type="first">Isaías</forename><surname>Karmakar</surname></persName>
		</editor>
		<meeting>the IADIS International Conference eCommerce 2005<address><addrLine>Porto, Portugal</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005. 15-17 December</date>
			<biblScope unit="page" from="101" to="108" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Exploring information technology outsourcing relationships: theory and practice</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kern</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Willcocks</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of Strategic Information Systems</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="321" to="350" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Client-project manager engagements, trust, and loyalty</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Klimoski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Webber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Organizational Behavior</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="997" to="1013" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Trust, planning and benefits in a global interorganizational system</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Ibbott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>O'keefe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems Journal</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="131" to="152" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">The role of trust in outsourced is development projects</title>
		<author>
			<persName><forename type="first">R</forename><surname>Sabherwal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="80" to="86" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A methodology for component-based system development support, EMMSAD&apos;</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dahanayaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Stojanovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Sol</surname></persName>
		</author>
		<ptr target="http://www.betade.tudelft.nl/publications/Stojanovic_EMMSAD2001.pdf" />
	</analytic>
	<monogr>
		<title level="m">Sixth CaiSE/IFI8</title>
				<imprint>
			<date type="published" when="2001-06">2001. 2001. 06.04.03</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="1" to="14" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
