Vous êtes sur la page 1sur 9

RUDY HIRSCHHEIM AND MARY LACITY

THE MYTHS AND


R EALITIES
OF INFORMATION
TECHNOLOGY
INSOURCING IT managers commiserate over the challenges of
convincing senior executives that, contrary to popular belief,
outsourcing isnt always a money-saving option.

I
nformation technology outsourcingthe prac- General Dynamics, Inland Revenue, JP Morgan,
tice of transferring IT assets, leases, staff, and Kodak, Lufthansa, McDonnell Douglas, South Aus-
management responsibility for delivery of ser- tralian Government, Swiss Bank, Xerox, and Com-
vices from internal IT functions to third-party monwealth Bank of Australia. The IT outsourcing
vendorshas become an undeniable trend ever since market, which was worth $76 billion in 1995, grew to
Kodaks 1989 landmark decision. In recent years, pri- over $120 billion in 1997 [5].
vate and public sector organizations worldwide have As the market evolves, a number of important
outsourced significant portions of their IT functions, aspects of these IT outsourcing decisions have been
among them British Aerospace, British Petroleum, explored. These studies can be categorized as descrip-
Canadian Post Office, Chase Manhattan Bank, Con- tive case studies and surveys of the current outsourcing
tinental Airlines, Continental Bank, Enron, First City, practices, surveys of practitioners perceptions of risks

COMMUNICATIONS OF THE ACM February 2000/Vol. 43, No. 2 99


and benefits of outsourcing, studies of determinants of aligning the perceptions of and agendas for IT, senior
outsourcing, and identification of best practices that level sponsorship of the decision, and a fair and rigor-
distinguish success from failure [14, 6, 9, 11]. In gen- ous evaluation process.
eral, the current research indicates selective sourcing is In order to develop an in-depth understanding of
still the norm but that outsourcing options are becom- IT insourcing decisions and outcomes, we adopted a
ing more complex. There are many perceived benefits multiple case study approach. Our aim was to inter-
and risks of outsourcing, but these studies are based on view various stakeholders within organizations who
respondents perceptions rather than actual outcomes. were likely to have different views of the insourcing
The determinants of outsourcing research generally decision, who could provide longitudinal accounts of
show that companies most likely to outsource on a the decision-making process, who could explain how
large scale are in poor financial situations, have poor decisions were embedded, as well as the outcomes of
IT functions, or have IT functions with little status the decision (see sidebar for methodology).
within their organizations [7, 8]. There is still consid-
erable debate on best practices that distinguish suc- Four Archetypes of Insourcing
cesses from failures. The issues associated with the choice of an IT sourc-
The current IT sourcing research covers the moti- ing strategy are often murky, hidden behind
vations and consequences of outsourcing and has euphemisms, perceived differently by different stake-
neglected another important optioninsourcing. holder groups, and generally not easily analyzed. Nev-
Insourcing is the practice of evaluating the outsourc- ertheless, in trying to explain what we found in our
ing option, but confirming the continued use of research about these issues we noted certain similarities
internal IT resources to achieve the same objectives and differences in patterns and these coalesced around
of outsourcing. We believe that insourcing must be four loosely connected alternatives in the way organi-
fully explored to complement the growing body of zations approach IT insourcing. We describe these
outsourcing research. Only by understanding the four alternative approaches in terms of archetypes, dis-
processes and outcomes of both outsourcing and cussing each one through an individual case study. It
insourcing can a comprehensive understanding of IT should be noted that these approaches are neither as
sourcing result. This unexplored insourcing option clear cut nor as animated as they seem. There is over-
provided the motivation behind our research. Can lap and their differences are overstated for the purpose
internal IT departments achieve the same results as of effect. They are highly simplified but powerful con-
outsourcing vendors? If so, why have they not done ceptions of an ideal or character type. The archetypes
so in the past? Do IT departments actually reduce play an important role in conveying the essential dif-
costs or improve service after winning an insourcing ferences that exist in alternative ways organizations
bid? If so, how did IT departments achieve the approach IT insourcing.
results? We conducted 14 insourcing case studies to
research these issues. The experiences of case study Archetype 1. Senior executives enable internal IT man-
participants are examined and analyzed. The result- agers to cut costs.
ing picture is a rich and varied one involving a num- Six of our casesPETRO2, UNIVERSITY, FOOD,
ber of key decision makers, alternative reasons for TCOM, ENERGY, and RETAIL1reflect this
choosing insourcing, contrasting outcomes, and archetype. It begins when external pressures threaten
varying perceptions of its success or failure. But we the organization causing senior management to search
also identified a number of common experiences. for ways to reduce costs, including IT costs. Under
These similarities and differences across the cases are this scrutiny, senior executives question the value of
the focus of this article. rising IT expenditures and mandate that IT managers
This research contributes to the IT sourcing cut costs. IT managers counter that costs are high
research base by providing evidence that companies because users resist their cost reduction tactics. Senior
need not necessarily turn to outsourcing to improve management despairs at the gridlock and formally
IT performance. While outsourcing may be a pre- invites outsourcing vendors to submit bids. IT man-
ferred option for some organizations for various rea- agers rally, requesting they be allowed to compete with
sons, such as returning to core competencies or vendor bids. They argue that senior managements
focusing IT staff on more business-oriented IT activi- outsourcing threat serves to empower IT managers
ties, our cases show that if cost reduction is the major because they can convince users that costs will be
objective, IT managers can oftentimes replicate a ven- cuteither by them or by an external vendor. By
dors cost reduction tactics. Insourcing success, how- replicating a vendors cost reduction tactics, internal
ever, is predicated on a number of key issues, including IT managers prepared internal bids that beat vendor

100 February 2000/Vol. 43, No. 2 COMMUNICATIONS OF THE ACM


bids. Once these bids were awarded to the internal IT This bid beat two external bids. The internal IT
managers, they succeeded in meetingor in some case department was awarded the bid and subsequently
exceedingtheir bid proposals, resulting in a success- consolidated the data centers, installed automation in
ful financial outcome. A description of one of the the tape libraries, reorganized the work flows, stan-
casesPETRO2serves to demonstrate this theoret- dardized software, and instituted a new chargeback
ical archetype. system that curtailed excessive user demands. These
PETRO2 is a Fortune 100 conglomerate of petro- tactics reduced headcount by 51% resulting in a 43%
leum, natural gas, and chemical companies that ran cost reduction, thus deeming the insourcing project a
into severe financial difficulties in the late 1980s. financial success. The corporate manager of technol-
Senior management responded by cutting costs ogy attributes the success to senior managements
through the sale of assets, reduced headcount, and empowerment of the IT staff.
budget cuts. In this climate, senior management began
to scrutinize the rising costs of ITwhere was the Archetype 2. IT managers terminate failing outsourc-
value from these IT expenditures? The corporate man- ing contracts.
ager of IT planning explains: All they (senior man- Our second archetypeexemplified by CHEM2 and
agement) see is this amount of money that they have RUBBERalso results in a financial insourcing suc-
to write a check for every yearyear after year after cess, but the route to success is very different. In these
year. Where is the benefit? MIS says, Well, we process two companies, senior managers had previously out-
data faster than we did last year. They say, So what? sourced over 80% of the IT budget and engaged in
MIS says, Well, we can close the ledger faster. And long-term contracts.
they say, So what? Where have you increased revenue? Due to poorly negotiated contracts, however, IT
All you do is increase costs, year after year after year costs rose and service levels dropped. The senior IT
and I am sick of it. All I get are these esoteric benefits managers assembled a case to terminate the outsourc-
and a bunch of baloney on how much technology has ing contract and rebuilt the internal IT organization.
advanced. Show me where you put one more dollar on Senior executives and users supported the IT man-
the income statement. agers proposals. After an initial investment, IT costs
Internal IT managers tried repeatedly to reduce dropped and service levels improved as a result of
costs by consolidating their three data centers, but insourcing.
business unit managers refused, figuring the new con- At CHEM2, senior executives decided to outsource
solidated center would not effectively cater to their the entire IT department in 1984 after a leveraged
needs. For example, one of the business unit leaders buyout left the company debt-ridden. After analyzing
declared: If it cost $5 million more to have this in my three vendor bids, senior executives signed a seven-
business unit and be able to control it and make it year, fixed-price contract with the only vendor they
responsive to my needs, its worth $5 million to me. perceived as capable of handling their information
Only after senior management initiated an out- needs. The contract stipulated the vendor would pro-
sourcing evaluation did IT managers convince senior vide the same level of service that CHEM2 received
managers and users that they could match a vendors from the internal IT department in 1984. The first
offer: The IT management said there is no reason month into the contract, the vendor charged CHEM2
we should be excluded from the party. You cannot for many services senior executives assumed were cov-
assume, that well just do what weve been doing. We ered in the contract. Excess charges were not the only
ought to have the same freedom to make decisions problem. The IT manager noted the vendors goal was
that outsourcers are making. So IT management in to maximize profits, therefore, the vendor failed to
each of the divisions caucused. We put together a introduce new technology (without a stiff excess fee),
team.Corporate technology manager. the vendor reduced staff and over-worked remaining
The team prepared an internal bid based on severe employees, and the vendor siphoned the best talent to
cost reductions, including data center consolidation. woo other customers:

One of the questions I asked was, How do you view IT, Mr. President, particularly in
the operational center, as an asset to your corporation? Of potential value? For the most part,
business people dont see it that way. They see it as cost.The IT Manager at TCOM
describing the Presidents view of IT.

COMMUNICATIONS OF THE ACM February 2000/Vol. 43, No. 2 101


I think you find with outsourcing that any inno- plained consistently to senior management about the
vation in technology comes from your own people, lack of service in the applications area. The IS director
requirements from users on your staff. But basically explained that user demands far exceeded his current
the [outsourcing vendors] just crank it. And so we resources, leading to a large applications backlog.
were operating old software...You pay for them to His investigation consisted of inviting several ven-
learn your business, then they move those people to dor bidsnot for applications, but for the data center,
court other companies in your industry. They transfer a function he knew was performing well. After the
skills to get new business, now the learning curve is bids were analyzed, the IS director drafted a letter to
yours to pay for again, said one IT manager. the chairman of the board explaining that continued
The IT manager accumulated the evidence of rising insourcing cost less than outsourcing. The IS director
IT costs and decreased service levels to convince senior explains the outcome: I had their attention now. And
management and users to terminate the contract. so some of the people who were bashing us backed off.
Senior management bought into the proposal, even Their group executives now tell their users, Back off,
though the vendor tried to keep the contract. Recalls they are doing the best that they can....So did it help?
the IT manager: I opened up negotiations early, to Since then, Ive been to two officer meetings, so I guess
renegotiate the contract to get me out...Its like when it did.
you were a little kid. Two weeks before Christmas, you Although a political victory, there was no change in
suddenly cleaned up your act and behaved a whole lot IT costs: As a result of having done this study, there is
better...But I think they [senior management] had an no difference now than if we had not done the
awful lot of feedback from the users that they didnt study...It really came down to an exercise. We did not
like the systems. Also the issues of quality came up, try to make outsourcing work. What we were really
customer service, no new technology. trying to do was to come up with the justification for
The IT manager put together a plan to rebuild the why we shouldnt outsource.Technical support
internal IT department, which included purchasing a manager.
new machine, buying packaged software, and hiring
back 40 analyst programmers from the outsourcing Archetype 4. Senior executives confirm the value of IT.
vendor. After an initial investment, the IT manager This archetype indicates the case where the insourcing
conveyed that users are happier with the service and decisions did not result in significant reduction in IT
that his current IT budget is less than the fixed price costs, but the insourcing decisions were still consid-
contract, indicating a successful financial outcome. ered a success because companies revalidated and fur-
ther legitimated internal sourcing. Senior IT
Archetype 3. IT managers defend insourcing. executives at PETRO1 and INTL-BANKtwo com-
This archetype is the first time in which insourcing panies that exemplify this approachhad full support
results in a financial failure in that no cost savings (or from senior management. Each has implemented
service improvements) occur. In these cases, exempli- organizational structures and processes to demonstrate
fied by CHEM3, DIVERSE1, PETRO3, and the cost effectiveness of its IT departments.
DIVERSE2, IT managers took charge of the out- In the mid 1980s, PETRO1, one of the worlds
sourcing evaluation for a number of political reasons, largest petroleum companies, suffered severe financial
such as proving efficiency, justifying new resources, or difficulties that forced senior management to find
trying to enhance their reputation as a business per- ways to cut costs. An outsourcing vendor, cognizant of
son. They used the outsourcing evaluations to confirm the situation, called the CEO and offered to purchase
to senior management the legitimacy of continued his IT assets, hire his IT staff, and reduce his current
sourcing through the internal IT departments. In IT costs while still maintaining service levels. The
three cases, these cursory evaluations eventually back- CEO called his direct subordinate, the VP of IT, and
fired, senior managers firing IT managers or eventu- told him to draft a letter to the vendor, declining the
ally outsourcing. offer. The VP of IT conveys this conversation with the
The Director of Information Services at PETRO3 CEO: [The CEO] said, Im not interested in letting
initiated an outsourcing investigation after users com- other people have access to our data. I dont have to go

The Board could care less about IT. They treated it like they
treated the heat or electricity. CIO of UNIVERSITY.

102 February 2000/Vol. 43, No. 2 COMMUNICATIONS OF THE ACM


outside for use of our data, so prepare a letter Table 1. Insourcing archetypes and case classification.
back to the chairman of [the outsourcing ven-
Sponsor
dor] and say we appreciate your offer but at this Senior Managers IT Managers
Sponsor Sponsor
time we consider our information technology Financial Insourcing Decision Insourcing Decision
Outcomes
as part of the strategic work that we have.
Archetype 1 Archetype 2
When the VP of IT was asked how the CEO
could readily dismiss the vendors offer without Significant Senior managers enable IT IT managers terminate failing
Reduction managers to reduce costs, outsourcing contracts. These
further analysis, he explained how he had spent in IT Costs typically by creating an RFP outsourcing experiences were
30 years educating and demonstrating to senior and inviting both internal so disastrous that no formal
and external bids. evaluation process was
managers the value of IT. For example, he con- needed to confirm the
vinced the CEO to invite all new general man- PETRO2 termination decision.
UNIVERSITY
agers to attend a week-long executive computer FOOD
class which focused on IT-enabled business TCOM CHEM2
achievement. He abandoned the general alloca- ENERGY RUBBER
RETAIL1
tion chargeback system in favor of unit pricing
and compared these prices with vendor offer- Archetype 4 Archetype 3
ings to demonstrate his cost-efficiency. No Change Senior managers confirm IT managers defend
His IT department even became an out- in IT Costs the value of IT without a insourcing. Even apparently
formal bid process because rigorous evaluations were
sourcing vendor by providing IT services to their support and faith perceived as biased against
external customers. Although external cus- in IT is traditionally outsourcing.
strong.
tomers represent only 10% of the IT budget, CHEM1
the VP explains that this creates a marketing INTL-BANK DIVERSE1
PETRO1 PETRO3
mentality among his staff to be both cost-effi- DIVERSE2
cient and service-oriented. The VP also partici-
pated on two top executive committees that set
corporate strategy and allocate large amounts of tingup to 54% in one companysenior executives
resources. His high profile contributed to the quick deemed the insourcing decision as a success, but users
dismissal of the vendors outsourcing proposal: So I perceive it as a failure. Unlike senior executives who
think the concept of your IT person being part of the focus on cost, users primary criterion for success is ser-
management of the companynot just a technician vice excellence. Because service degradation accompa-
sitting on the sidelinesis something that keeps you nies severe costs due to the cost/service trade-off, users
from outsourcing. were most displeased with the insourcing outcomes in
Table 1 offers a summary of the 4 archetypes and the majority of cases. And IT managers perceptions of
classifies the 14 cases. insourcing success and failure are even more com-
plexmany IT managers hoped the insourcing pro-
Discussion jects would raise the status of IT in the eyes of senior
Prior to our data collection, our conception of insourc- management, but remain disappointed on this front.
ing success and failure was equivalent to financial out- Thus, we assume a stakeholder interpretation of
comes of the process, that is, insourcing successes were success and failure. We have categorized these stake-
companies that achieved dramatic cost savings of at holders into three main groups: senior management,
least 20%, while insourcing failures were companies business unit managers and users, and IT managers.
that achieved little or no cost savings. In our research Each stakeholder group sets a different expectation for
design, we selected successes and failures to ascertain: IT performance, and as such, holds different percep-
After outsourcing evaluations reconfirmed insourcing tions of IT performance and the effects of insourcing.
as the preferred sourcing strategywhy did some
companies achieve dramatic savings (and thus success) Senior managements expectations of IT performance:
while others merely continued as-is? Minimize costs. In all but two of the participating com-
Based on our analysiswhich led to the four arche- paniesPETRO1 and INTL-BANKsenior execu-
typeswe reconceptualized our notions of success and tives focused on one dimension of IT performance:
failure along stakeholder lines. In the majority of cases, cost efficiency. These senior executives were frustrated
our original conception of cost-savings as the primary with the rising costs of IT and questioned the value of
criterion for success only captured the perceptions of IT expenditures. Because of the questionable value of
senior executives, whom we concluded perceived IT as IT, many senior executives viewed IT as a commod-
a cost to be minimized. In cases of extreme cost-cut- itya necessary cost of doing business. As such, the

COMMUNICATIONS OF THE ACM February 2000/Vol. 43, No. 2 103


Putting it all Together

W e interviewed 41 partici-
pants at 14 companies (See
accompanying table). The choice
included coverage of the scope of
the sourcing decision, sponsors of
the decision, the sourcing evalua-
details in which insourcing was
considered; the key participants
in the decision process; their pre-
of the case studies was based on tion process, and implementation understanding of the sourcing
the desire to have a variety of process. All participants were also options and apparent values and
sourcing experiences in terms of asked to assess the decision out- assumptions; how these values
degree of financial success come in terms of their perceptions and beliefs were manifest in the
claimed, primarily assessed a pri- of success or failure and why actual decision to insource; the
ori through the trade press and they felt the way they did about implementation of the decision;
personal contacts. We sought to the outcome. When participants and the consequences (results) of
generate insights into best sourc- expressed a viewpoint, they were insourcing.
ing practices by comparing suc- prompted to provide specific sup-
cesses and failures. The porting evidence. The evidence 2. Analyze six decision factors
organizations also represented a consisted of anecdotes as well as across the cases. Once we had a
wide spectrum of industries. In documentation such as bench- feel for each individual case, we
order to facilitate the discussion, marking reports, IT budgets, then scanned across the 14 cases
the 14 companies are referred to internal bids, outsourcing bids, to see what similarities and dif-
by pseudonyms based on their and bid analysis criteria. In cases ferences existed. We analyzed six
industry typeCHEM1, CHEM2, where opinions of participants at factors across the casesdecision
FOOD1, and so on. the same organization differed, scope, decision sponsor, evalua-
At each case site, we con- we conducted follow-up tele- tion process, year of the decision,
ducted face-to-face interviews phone calls to clarify their posi- size of the organization, and deci-
with individuals directly involved tions. sion outcome. These factors were
in sourcing decisions. Intervie- Participants were also asked derived from our previous
wees included senior business specific questions about their research on outsourcing [7].
executives and IT managers who company and IT department. Per-
sponsored the sourcing evalua- taining to their company, partici- 3. Employ a rhetorical device to
tions, consultants hired to assist pants described the generalize common themes
contract negotiations, and IT per- organizational structure, the among the cases. The use of
sonnel responsible for gathering major products and services pro- archetypes is employed to con-
technical and financial informa- duced, competition in the indus- dense and simplify a complex
tion pertaining to the sourcing try, financial situation, corporate subject matter. We are not using
decision. All interviews were con- goals, business successes and archetypes necessarily as an ana-
ducted in person at the company failures. Pertaining to IT, partici- lytical tool, rather as a rhetorical
site. All participants were assured pants described IT activity in device to convey the themes
anonymity so as to promote open terms of headcount, budget, extracted from our analysis of the
discussions. chargeback system, size of data textual data collected in the case
Interviews followed the same centers, user satisfaction, chal- studies.
protocol, proceeding from an lenges, goals, and reputation.
unstructured to a structured for- 4. Identify common lessons across
mat. During the unstructured por- Data Analysis the cases. While these archetypes
tion, participants were asked to The transcribed interviews were capture the differences among
tell their sourcing story, which analyzed using a data analysis insourcing approaches, we also
allowed them to convey their process involving the following sought to characterize common
interpretations freely. We then steps: elements, or lessons to be learned
asked semistructured questions from the body of research. These
designed to solicit information on 1. Create individual case descrip- common lessons describe stake-
specific sourcing issues that may tions. Detailed cases were written holder attitudes, perceptions, and
have been absent from their pre- up based on each interview. Each behaviors based on implicit
vious recollections. These issues case included the historical assumptions about IT sourcing. c

104 February 2000/Vol. 43, No. 2 COMMUNICATIONS OF THE ACM


Table 1. Case study profiles.
COMPANY PARTICIPANTS SOURCING DECISION DE- EVALUATION SIZE of SIZE: EXPECTED COST
PSEUDONYM DECISION(S) SPONSOR CISION PROCESS COMPANY: IT COST SAVINGS
AND SCOPE YEAR ANNUAL HEAD SAVINGS ACHIEVED
INDUSTRY REVENUES/ COUNT
ANNUAL IT
BUDGET
at TIME of
DECISION
1. CHEM1 1. Manager of IS Entire IT IT 1991 3 external bids $5 billion/ 60 No cost No cost
Chemicals 2. Manager of DP function Manager savings savings
3. Network Services Supervisor insourced $17 million estimated achieved
2. DIVERSE1 4. Director of Advanced (a) Entire IT (a) IT (a) 1991 (a) no formal $3 billion/ 184 (a) No cost (a) No cost
Diversified Technology function Manager bid process savings savings
Product insourced $30 million estimated achieved
Management (b) Apps (b) Senior (b)1992 (b) two
development Manager external bids (b) 20% (b) No, costs
outsourced rose
3. PETRO1 5.VP of IS Entire IT Senior 1988 no formal bid $35 billion/ 1800 No cost No cost
Petroleum 6. Director, Sys Coordination function Manager process, savings savings
Refining 7. Director, Tech Support insourced approached by $240 million estimated achieved
8. Director, World Wide vendor
Telecommunications
4. PETRO2 9. Corporate Mgr. Planning Entire IT Senior 1991 internal bid and $10 billion/ 134 43% Yes, achieved
Petroleum 10. Division Manager function Manager 2 external bids within
Refining 11. Corporate Mgr. Technology insourced $32 million 5 years
Development
12. Mgr. Software Strategies
13. Mgr. of Corporate Computing
5. PETRO3 14. Assistant Treasurer Entire IT IT Manager 1990 2 external bids $3 billion/ 25 No cost No cost
Petroleum 15. Director of IS function savings savings
Refining 16. Manager of Technical Support insourced $6 million estimated achieved
6. DIVERSE2 17. Manager of IS (a) Entire IT (a) IT (a)1988 (a) no formal $6 billion/ 530 (a) 0% (a) none
Natural gas, 18.VP, Operations function Manager bid process (b) No,
and other 19.Vendor Account Manager insourced $100 million (b) 20% customer
services 20.VP of Computer Utility (b) Entire IT (b) Senior (b)1988 (b) 1 informal threatened
21. Outsourcing Consultant function Manager external bid to sue
outsourced vendor
7. CHEM2 22. Manager of DP (a) Entire IT (a) Senior (a)1984 (a) 1 external $.7 billion/ 40 (a & b) (a) No, termi-
Chemicals function Manager bid Savings nated con-
outsourced $4 million anticipated tract due to
(b) Entire IT (b) IT (b)1988 (b) no formal but not excess fees &
function Manager bid process quantified poor service
insourced (b) savings
achieved
8. RUBBER 23.VP of IS (a) Entire IT (a) Senior (a)1987 (a) No formal $6 billion/ 1,000 (a & b) (a) No, costs
Rubber and function Manager bid process, 1 Savings rose to 4% of
Plastics outsourced informal $240 million anticipated sales
(b) Entire IT (b) IT (b)1991 external bid but not (b) Yes, costs
function Manager (b) no formal quantified fell to 1% of
insourced bid process sales
9.RETAIL1 24.VP of IS Entire IT IT Manager 1988 No formal bid $2 billion/ 125 54% Yes, achieved
Apparel 25. Director of IS Administration function process within 4 years
Manufacturer insourced $27 million
& Retailer
10. 26. CIO Entire IT Senior 1992 Compare 1 $250 million/ 110 20% Yes, achieved
UNIVERSITY 27. Interfaculty Council Member function Manager, external bid with within 1 year
insourced then CIO 1 internal bid $7 million IT
11. FOOD 28. Data Center Director Entire IT Senior 1988 Compare 1 ex- $7 billion/ 80 45% Yes, achieved
Food function Manager ternal bid with within 3 years
Manufacturer insourced internal bid $18 million
12. TCOM 29. Manager of IS Entire IT Senior 1991 Compare 2 $.5 billion/ 39 46% Yes, achieved
Telecommu- 30. Internal Lawyer function Manager external bids within 2 years
nications 31. Previous Manager of IS insourced with internal bid $7 million
32. Data Center Manager
33. Facilities Management
Director
34. Chair, RFP Team
35. Chair, Internal Bid Team
13. ENERGY 36. Director of IS Planning Entire IT Senior 1989 Compare 3 $6 billion/ 180 25% Yes, achieved
Energy 37. CIO function Manager external bids within 2 years
Company insourced with internal bid $60 million
14. INTL- 38. Executive VP Entire IT Senior 1989 Never really DM557 1800 20% cost Yes
BANK 39.VP, EDP Control function Manager considered billion in savings
International 40. Director, Applications insourced outsourcing assets through
Bank Development adoption of
41. Director, Technology best
Development practices

COMMUNICATIONS OF THE ACM February 2000/Vol. 43, No. 2 105


performance expectations of these senior executives for example, users demanded their own local data cen-
focused on cost minimization, that is, provide the ters and did not want to consolidate to save money at
commodity function as inexpensively as possible. the corporate level.
We conclude that senior management in all but At FOOD, users in each business unit demanded
two of the participating companiesPETRO2 and custom-tailored softwareeven when standard
INTL-BANKviewed IT as a cost to be minimized. packages were more cost efficient. For example, dif-
Furthermore, these senior executives perceived their ferent business units chose different packages for
current sourcing strategies had failed to meet this word processing, email, fourth-generation languages,
major objective, as evidenced by the rising costs of IT. and spreadsheets. From the business unit perspective,
In the six companies illustrating Archetype 1, senior it made more business sense to use packages users
managers were pleased that the outsourcing
evaluation served to mobilize internal IT man-
agers to cut costs. In Archetype 2, senior man- Table 2. IT cost/service trade-off
agement cancelled outsourcing contracts and Cost
Low High
brought the function back inside when costs for SERVICE Cost Cost
IT increased through outsourcing. In Archetype Super Star Differentiator
3, IT costs did not decrease and led to senior Service Excellence Senior managements Users underlying wishes
management questioning the value of IT. and users expectations about IT
about IT
We believe that senior managements percep-
tions of IT as a cost to be minimized are tied, in Minimal Service Commodity Black Hole
Senior managements Senior managements
large part, by accounting for IT as an overhead, underlying beliefs and users perceptions
which only serves to highlight the costs, and not about IT about IT
the value of IT investments. For example, one
VP of IT noted his CEO kept asking him why IT
budgets were rising when budgets in all the other were familiar with rather than incur the inconve-
functional units were falling. The VP of IT responded nience and expense of learning a standard package.
that marketing costs dropped 10% partly because IT In summary, participants consistently reported users
implemented a new credit card system and that trans- set service excellence as the primary expectation for
portation costs dropped because IT automated 16 IT performance.
truck-refueling systems. Prior to the outsourcing eval-
uations, all but two participating companies IT managers view: Caught in the middle. Juxtaposed to
PETRO1 and INTL-BANKaccounted for IT in senior managements cost reduction mandates were
this way, thus contributing to our understanding of users pleas for service excellence. This leads to a
why these senior executives sent the mandate to IT cost/service dilemma, which can be depicted as a
managers to cut IT costs. matrix highlighting realistic verses unrealistic IT per-
formance expectations. Because of the cost/service
Users view of IT: Service excellence. Unlike senior man- trade-off, IT can be realistically expected to perform in
agement, users did not view IT as a commodity. one of two boxes at a given point in time: IT can pro-
Indeed, IT is not a sack of cement, but it must be cus- vide a premium service for a premium cost or IT can
tom-tailored to meet their idiosyncratic business provide a minimal service for a minimal price. If orga-
requirements. As such, users set service excellence as nizations perceive that a given IT function is a critical
their major expectation for IT performance. For contributor, then we can realistically expect its perfor-
example, users generally demanded customized soft- mance to be in the differentiator quadrant. As a dif-
ware, a local staff of dedicated analysts and program- ferentiator, service excellence supersedes cost
mers, excess IT resources in case they are needed, efficiency. If organizations perceive that a given IT
subsecond response time all the time, 24-hour help, function is merely a utility, IT can be realistically
information centers, training, and so on. At PETRO2, expected to perform in the commodity or low-cost

They are always telling us our processing for payroll is too damn expensive. Then when you
say, Well have you looked outside? Oh yes, we beat the heck out of them. So our costs are too
high but they cant get it any cheaper. Director of IT Administration at RETAIL1

106 February 2000/Vol. 43, No. 2 COMMUNICATIONS OF THE ACM


producer quadrant. As a commodity, IT can be realize that such premium service comes at a priceit
expected to deliver a standard service at a minimal cost. is not a free good. Implementing outsourcing or
But in our case companies, senior executives were insourcing helps focus users attention on the cost/ser-
demanding cost cuts while users were demanding ser- vice trade-off. IT managers, for their part, need to
vice excellence. IT managers were expected to perform make visible the cost/service trade-off and work for a
the near impossible: provide a Rolls Royce service at a consensus on what level of service IT should provide
Chevrolet price in order to be superstars. IT managers for a given cost.
could not simultaneously satisfy both stakeholder In conclusion, we wish to offer this sobering
groups because the best practices associated with one thought: even if insourcing is chosen over outsourc-
objective are in direct conflict with the best practices ing, and the expected cost savings are realized, there is
prescribed for the other objective. In general, the dif- no guarantee it will be perceived as successful due to
ferentiator quadrant calls for decentralization, cus- the very different expectations held by the various
tomization, and encouraged user demand. The stakeholders. Success is related to who is doing the
commodity quadrant calls for centralization, standard- evaluating. c
ization, and curtailed user demand. The result: neither
stakeholder group was satisfied and began to perceive References
that IT provided poor service that cost too much. IT 1. Ang, S. The Etiology of Information Systems Outsourcing. Ph.D. Disser-
tation, Department of Information and Decision Sciences, University of
was a Black Hole (see Table 2). Minnesota, 1993.
2. Clark, T., Zmud, R., and McCray, G. The outsourcing of information
services: Transforming The nature of business in the information industry.
Implications for Practice J Info. Tech. 10, 4 (1995), 221237.
We contend that outsourcing evaluations often result 3. Grover, V., Cheon, M., and Teng, J. The effect of service quality and part-
from the frustrations caused by different stakeholder nership on the outsourcing of information systems functions. J. MIS 12, 4
(Spring 1996), 89116.
expectations and perceptions of IT performance. This 4. Gurbaxani, V. The new world of Information Technology outsourcing.
belief is based on an analysis of what IT managers can Commun. ACM 39, 7, (July 1996), 4547.
5. International Data Corporation. Report on Outsourcing. (Aug. 1, 1997);
realistically achieve versus what senior executives and www.outsourcing.com.
users expect them to achieve. Different stakeholder 6. Klepper, R. Outsourcing relationships. Managing Information Technology
perspectives set unrealistic performance expectations Investments in Outsourcing. M. Khosrowpour, ed. Idea Group Publishing,
Harrisburg, PA, 1995, 218243.
for IT managers, leading to frustration, loss of faith in 7. Lacity, M, and Hirschheim, R. Information Systems Outsourcing: Myths,
internal IT management, and hopes that outsourcing Metaphors and Realities. Wiley, Chichester 1993.
8. Lacity, M, and Hirschheim, R. Beyond the Information Systems Outsourc-
vendors will provide the solutions. While outsourcing ing Bandwagon: The Insourcing Response. Wiley, Chichester, 1995.
can lead to a reduction in IT costs, this reduction 9. Loh, L, and Venkatraman, N. Diffusion of information technology out-
often comes at a price: reduced service. Moreover, sourcing: Influence sources and the Kodak effect. Info. Syst. Res. (1992),
334-358.
since it is known that most of the cost savings come 10. Nam, K., Rajagopalan, S., Rao, H., Chaudhury, A. A two-level investiga-
from the implementation of key cost reduction strate- tion of information systems outsourcing. Commun. ACM 39, 7, (July
gies such as data center consolidation, unit-cost 1996), 3644.
11. Willcocks, L, and Fitzgerald, G. A Business Guide to Outsourcing Informa-
chargeback systems, and standardized software, rather tion Technology. Business Intelligence, London, 1994.
than economies of scale, internal IT departments
should be able to reduce costs on their own. And
indeed they did. Rudy Hirschheim (rudy@uh.edu) is the Tenneco/Chase
However, while IT managers can theoretically International Professor of information systems and past Director of the
implement cost-reduction strategies, internal politics Information Systems Research Center in the College of Business
Administration, University of Houston.
often prevent them from doing so. This is why senior Mary Lacity (smclaci@umslvma.umsl.edu) is an associate professor of
executives need to allow IT managers the ability to management information systems at the University of Missouri, St. Louis.
submit internal bids in competition with external ven- She is also a research associate at Templeton College, Oxford, U.K.
dors. The outsourcing threat may overcome political
Permission to make digital or hard copies of all or part of this work for personal or class-
obstacles and allow IT managers the freedom and room use is granted without fee provided that copies are not made or distributed for profit
power to propose and implement drastic cost cuts. If orpage.commercial advantage and that copies bear this notice and the full citation on the first
To copy otherwise, to republish, to post on servers or to redistribute to lists, requires
senior executives merely compare external bids with prior specific permission and/or a fee.
current costs, they may allow the vendors to pick the
low-lying fruit. That is, vendors may make drastic
cost cuts but absorb most of the savings themselves,
merely passing some benefit to customers in the form
of modest price cuts. Users, on the other hand, who
have been used to service excellence from IT must now 2000 ACM 0002-0782/00/0200 $5.00

COMMUNICATIONS OF THE ACM February 2000/Vol. 43, No. 2 107

Vous aimerez peut-être aussi