##plugins.themes.bootstrap3.article.main##

This paper aims to identify the critical success factors in Hong Kong Financial Service Industry IT outsourcing satisfaction and propose possible satisfaction rate boosts. A hybrid methodology (qualitative and quantitative) was adopted to analyze the variables and their relationship thoroughly. The six members focus group was formed to discuss IT outsourcing, and the survey was conducted to collect 447 valid responses for data analysis. The six critical success factors were Perceived Information Security Risk, Quality of Service Provider, Contract Management, Internal Contract Experience, Communication and Regulatory Policy, identified to support satisfaction of Hong Kong FSI IT outsourcing after conducting the analysis. Three recommendations are proposed to improve IT outsourcing satisfaction based on the findings of critical success factors: (1) A Build-up of Vendor Evaluation Framework, (2) Enhancement for Knowledge Management, and (3) Enhance Performance Monitoring. The snowball sampling method might have introduced biased information. In future research, a more extensive research scale would be required to understand the whole population, which would be more appropriate for the industry to understand the need and construct any policy. This paper is a holistic approach to identifying factors that affect Hong Kong FSI IT outsourcing satisfaction. In addition, practical recommendations were proposed to improve those factors, thereby increasing the satisfaction rate of IT outsourcing.

Downloads

Download data is not yet available.

Introduction

Outsourcing was one of the crucial strategic ways in the intricate, competitive, and dynamic global supply chains. Companies consider it an important strategy to reduce costs and increase competitiveness, productivity, and profitability (Taponen & Kauppi, 2020). It was seen as a typical competitive strategy in local and foreign markets (Adamset al., 2018; Pereiraet al., 2019). Outsourcing is a widespread decision and one of the most strategic for companies, which helps meet financial objectives without high expertise maintenance costs (Taponen & Kauppi, 2020).

Information Technology (IT) is widely used, not just to help management but also to stand out from the competition. However, the strategic and operational importance of IT has raised a firm’s expenses, now accounting for a significant share of indirect costs for businesses (Altin, 2021). IT Outsourcing (ITO) has been the alternative for the company and focused their resources on core business. Companies benefit from ITO in several ways, including increased flexibility and adaptability, lowered operational expenses, and secured the freedom to concentrate on core skills. According to the International Monetary Fund (IMF) survey in 2021, 95% of the responding banks in Hong Kong were developing to outsource technology-related processes to service providers; over 100 Authorized Institutions—institutions that provide banking, asset and wealth management, private equity business, and securities services (HKMA, 2021)—have outsourced their business processes to service providers (IMF, 2021). Statista (2022) also projected the Hong Kong ITO market which an annual growth rate (CAGR 2023-2028) of 12.62%, resulting in a market volume of US$4.58 billion by 2028. IT outsourcing is becoming essential in Hong Kong organizations.

Unfortunately, despite ITO becoming a common arrangement in the companies and demand growing in the future, IT outsourcing satisfaction (ITOS) is not good enough in the market. Delenet al. (2019) found that around 40% of ITO projects failed at the end, and Luu (2022) also indicated that 25%–50% of ITO failed. It is a high failure rate from a project perspective. This challenge to satisfaction and success has been a significant problem in ITO, and there is a need to determine the factors that can raise the satisfaction rate.

This study aims to determine the critical success factors in Hong Kong FSI ITO satisfaction and to find the deficit in critical success factors that impacted ITO satisfaction. After the critical success factors are determined, recommendations are proposed to improve these factors for increasing ITO satisfaction. Organizations can gain insight from this study to make their ITO success easier and benefit from ITO.

Literature Review

ITO involved different disciplines in the whole outsourcing process. Therefore, multiple theories covered different ITO processes, such as ITO strategy, resource, contract, relationship, and monitoring. Systematic review and empirical study summarized the major theories of ITO in 2020 (Hanafizadeh & Zareravasan, 2020). The common frameworks used for ITO research included Technology, Organization, and Environment (TOE), Transaction Cost Economics (TCE), Core Competency Theory (CCT), Partnership and Alliance Theory, Contractual Theory, and Expectation-Confirmation Theory (ECT).

Technology, Organization, and Environment (TOE) Framework

The TOE paradigm, developed by Tornatzky and Fleischer, has been used to define the creative process within a company (Tornatzky & Fleischer, 1990). It considered three dimensions (technology, organization, and environment) that affected the adoption of innovation. Technologies here refer to all business-related technology. The organization was related to the firm’s descriptors, including its management structure, organizational structure, size, resources, and method of employee communication. Finally, the environment comprised the market components, the competitors, and the regulatory framework (Hanafizadeh & Zare Ravasan, 2018). The TOE Framework is a general theory that cites these three dimensions determining adoption compared to several theories and models in information systems research. Since researchers may choose the components of each dimension base on the features of innovation and the organization itself, the TOE framework is broadly relevant to many disciplines and circumstances (Dewiet al., 2018). It was extensively applicable to a variety of situations, including decision-making, success criteria, and information security risk (Hanafizadeh & Zare Ravasan, 2018; Hanafizadeh & Zareravasan, 2020; Bhattiet al., 2021). Even though the TOE framework is usually used to prove the relationship between ITO adoption, continuous ITO adoptions indicate ITO satisfaction. Therefore, Technology, Organization, and Environment (TOE) theory is suitable for analyzing internal and external factors in ITO satisfaction and was adopted in this study as the base theoretical framework. Fig. 1 shows a model illustrating attributes of the TOE theoretical framework.

Fig. 1. Research theoretical framework (Hanafizadeh & Zare Ravasan, 2018).

Technological Context

The technological context relates to all the company’s technologies, including those presently in use there and others that are marketed but not yet used. In addition, the company’s existing technologies influence the adaptation process because they limit the quantity and rate of technological change they can implement (Bhattiet al., 2021). Additionally, the technological context included Perceived Information Security Risk and Quality of Service Provider factors.

  1. Perceived Information Security Risk (ISR): Technology, such as smartphones, mobile applications, and cloud computing, has rapidly developed in recent years. These did facilitate business operations efficiency, but they introduced IT security risks at the same time. Businesses that chose ITO for its significant benefits must also understand the risks involved (Delenet al., 2019; Al Hadweret al., 2021). A risk is a potential for an event that might negatively affect the company. For example, each ITO service provider has their area of expertise, such as helpdesk service, systems, infrastructure, software development, and cybersecurity. If the service provider lacks the exact expertise required, performance issues or extra cost may arise, causing ITO project failure. The other most serious hazard to ITO is information security issue. Since perceived IT security risk is considered highly important for ITO in FSI, there is a need to identify whether it affects the success of ITO (Hanafizadeh & Zare Ravasan, 2018; Ahmed, 2020). Therefore, it is necessary to determine the relationship between the risk and ITO satisfaction. Thus, the below hypothesis is made: H1(a): Perceived information security risk significantly affects ITO satisfaction in FSI.
  2. Quality of Service Provider (QSP): The service provider’s quality was defined as the level to which the results met the service buyers’ expectations (Wibisonoet al., 2019). Goles and Chin (2002) have defined service providers’ quality as innate qualities that support the efficiency of relational interaction. Wibisonoet al. (2019) has determined the service provider’s quality significantly impact in ITO and found the similar research result of Lee (2001). However, other researchers failed to prove the service provider’s quality impact ITO success (Rhodeset al., 2016; Cha & Kim, 2018; Blijlevenet al., 2019; Hodosi & Rusu, 2019). Therefore, this inconsistent result should be identified in the Hong Kong environment. The service provider’s capabilities affected their credibility from the service buyer’s point of view. Credibility came from work history, ability, benevolence, and integrity (Alwahdani, 2019). A service buyer’s confidence in a service provider was reflected in that service’s ITO satisfaction. Thus, another hypothesis is made: H1(b): The quality of service provider significantly affects ITO satisfaction in FSI.

Organizational Context

The organizational context describes the structure, culture, goals, size, resource quality, communication, decision-making processes, features, and company assets. This setting affects ITO satisfaction and implementation choices (Bhattiet al., 2021). The organizational context relates to internal processes or capabilities, including Contract Management, Internal Contract Experience, and Communication factors.

  1. Contract Management (CM): Written contracts serve several purposes in managing an ITO relationship since they are the most crucial component (Erdoğan, 2020). In the setting of ITO, a contract specifies the provision of services and costs that must be finished within a contractual period between the two signing partners. After a contract has been signed and is in force, contract management takes place (Erdoğan, 2020). The quality of contract management is to ensure that the contract’s terms and conditions are followed and that each party satisfactorily fulfills its contractual duties. Qi and Chau (2015) identified that the quality of contract management was essential at the contract and post-contract stages and significantly affected ITO. Since the contract is a binding agreement between two organizations, if the organization manages the activities and content of the contract poorly, opportunism may arise and generate extra cost during the service duration, potentially affect the result of IT. Thus, the following hypothesis is made: H2(a): The quality of contract management significantly affects ITO satisfaction in FSI.
  2. Internal Contract Experience (ICE): Apart from post-signing contract management, pre-signing contract administration is also important. Creating a comprehensive contract might reduce the uncertainty, risk of opportunistic conduct, and misunderstanding between two contractual parties (Jain Palvia & Palvia, 2017). Pre-signing contract administration is content preparation that includes price, the scope of work (SOW), service level, information exchange and security, handover, clauses, terms & conditions, liabilities, penalty, payment arrangements, and exit policy (Gunduz & Elsherbeny, 2020). If participants with no outsourcing experience prepare the contract, the quality and coverage of the contract may not protect the service buyer enough (Godino & Molina, 2019). Thus, an employee’s contract experience is also essential in an ITO contract. For example, if an employee lacks contracting expertise, drafted SOW might miss tasks. Such incomplete SOW might allow for opportunistic behavior and ambiguity, requiring extra resources to fill the gap, potentially result in extra service costs. Thus, the following hypothesis is made: H2(b): The contract administration experience significantly affects ITO satisfaction in FSI.
  3. Communication (COM): Communication includes understanding, sharing, and meaning (University of Minnesota, 2015). It includes open talks about expectations, future directions, skills, strengths, shortcomings, and daily interchange of project-related information (Schmidt & Menth, 2016; Zhong & Myers, 2016; Hodosiet al., 2020). Communication is an effective way to share information and a key for a healthy partnership. Communication quality, information sharing between service providers and service buyers, and participation were three dimensions of communication behavior (Aliet al., 2022; Jatobáet al., 2022; Sutthiparinyanon & Villegas Puyod, 2022). The correctness, timeliness, sufficiency, and reliability of the information conveyed were all examples of quality (Mardatillahet al., 2019; Riedet al., 2022). Any potential cooperation success depends on how well it was communicated. Higher-performing partners communicate information more often and with more relevance due to deeper relationships (Pai & Yeh, 2015). More effective partnerships were anticipated to have a better quality of communication, more information exchange between both parties and greater partner involvement in planning and goal formulation. Thus, the hypothesis is made: H2(c): The quality of communication significantly affects ITO satisfaction in FSI.

Environmental Context—Regulatory Policy (RP)

The environmental context involves external pressure, the structure of the industry, the regulatory landscape, and the availability of technical service providers (Hanafizadeh & Zareravasan, 2020). There are three ways to approach the topic of external pressure: pressure from trading partners, pressure from competitors, and pressure from rules and government directives. The Regulatory Policy factor is one of the environmental contexts as explained below.

The external pressure and regulatory environment are highly relevant to ITO. Trading partners, market, rules, and government policies all exert pressure on FSI and could impose restrictions or support ITO (Hanafizadeh & Zare Ravasan, 2018). FSI must abide by the bulk of these regulations set by regulatory organizations. The impact of government regulation on ITO could be positive or negative. A supplementary treatment plan is required when governments place new restrictions on FSI, such as mandating third-party risk management. Thus, the below hypothesis is made:

H3: Strengthening regulatory outsourcing policy significantly affects ITO satisfaction in FSI.

Summary of Independent Variables

The six independent variables were identified to build a base for this research, and the participant demographics also be considered when analyzing the driving forces behind independent variables. The summary of research’s hypotheses is listed in Table I.

Hypotheses
H1(a) Perceived information security risk significantly affects ITO satisfaction in FSI.
H1(b) The quality of service provider significantly affects ITO satisfaction in FSI.
H2(a) The quality of contract management significantly affects ITO satisfaction in FSI.
H2(b) The contract administration experience significantly affects ITO satisfaction in FSI.
H2(c) The quality of communication significantly affects ITO satisfaction in FSI.
H3 Strengthening regulatory outsourcing policy significantly affects ITO satisfaction in FSI.
Table I. Summary of Research’s Hypotheses

Four independent variables from the TOE model were inconsistent, and consistent findings in the environmental context in the literature review were not found. Two independent variables: Perceived Information Security Risk and Regulatory policy, were proposed to add to the technological and environmental context of the model for this research. It is because information security and regulatory policy are essential areas in the financial service industry (IMF, 2021). Especially, regulatory policy is mandatory for FSI. Therefore, six independent variables: Perceived Information Security Risk, Quality of Server Provider, Contract Management, Internal Contract Experience, Communication, and Regulatory Policy, were adopted to investigate further. Besides the above independent variables, the participant demographics also be considered when analyzing the driving forces behind independent variables.

Research Methodology

Six independent variables were formulated in the research model in Fig. 2. It was based on the theoretical framework of the TOE and modified to match the actual FSI situation for this research purpose. For research method, this study adopted the hybrid method utilizing both qualitative and quantitative approaches. The hybrid method aids in validating research results utilizing quantitative and qualitative sources, investigating quantitative results with qualitative data, and creating survey questions (Santoset al., 2017).

Fig. 2. Research model.

Qualitative Research Method

The qualitative research method seeks participants’ opinions, views, and preferences about the research topic (Hammarberget al., 2016). For better data collection interactions between participants and the author, a focus group discussion was conducted for an in-depth discussion. The data were collected from the focus group formed by six participants working for IT in FSI or providing IT service for FSI. The group members had 5 to 25 years of IT experience, including experiences as management, IT professionals, and service providers.

Quantitative Research Method

The quantitative research method objectively gathers and evaluates numerical data to characterize, forecast, or regulate factors of interest (Rutberg & Bouikidis, 2018). Therefore, the survey was conducted to collect data, which targeted employees in the IT field as participants, especially those working or working for Hong Kong FSI.

Questionnaire Design

The questionnaire was further organized into two sections: the first section aimed to understand the respondents’ background with questions about their demographics; in the second section, the statements were formulated based on six independent variables and had statements for each independent variable. Respondents rated their level of agreement or disagreement on each statement listed using 6-Point Likert Scales. The statements of each independent variable were trimmed down based on the reliability test result of the pilot test in Table II.

Pilot test Final test
Variable Label Keywords Cronbach’s alpha No. of statement Cronbach’s alpha
Perceived information security risk ISR1 Specialized functions and services 0.819 4 (ISR 1–4, delete ISR 5) 0.825
ISR2 Reduce IT operations’ impact due to staff turnover
ISR3 Expertise and tools to response incidents
ISR4 Protect the company’s data
ISR5 Transfer the operational risks
Quality of service provider QSP1 Professional certificates 0.846 4 (QSP 1–4, delete QSP 5) 0.823
QSP2 Selection criteria and relevant experience in the industry
QSP3 Capabilities of implementation a new computer system
QSP4 Share the knowledge of systems and the potential risks
QSP5 Transfer the financial liabilities
Contract management CM1 Define the number of subject matter experts 0.917 4 (CM 1–4, delete CM 5) 0.804
CM2 The arrangement of out-of-scope work
CM3 Bear the responsibility and liabilities
CM4 The service level agreement aligns with the SLA of company
CM5 Comply company’s security policies
Internal contract experience ICE1 Determine the scope of work in detail 0.921 5 (ICE 1–4, delete ICE 5) 0.824
ICE2 Write service level agreements (SLAs)
ICE3 Consider the nursing period in IT outsourcing
ICE4 Capability of negotiation
ICE5 Write a statement of work
Communication COM1 Service provider’s time zone 0.734 4 (COM 1–4, delete COM 5) 0.801
COM2 Service provider’s first language
COM3 The communication is timely
COM4 The communication is accurate
COM5 Language barrier
Regulation policy RP1 Regulatory compliance requirements 0.900 4 (RP 1–4) 0.809
RP2 Knowledge of regulation
RP3 Fulfillment of the regulatory requirements
RP4 Third-party risk in regulation policy
IT outsourcing satisfaction ITOS1 Completes tasks that exceed our expectations 0.831 4 (ITOS 1–4, delete ITOS 5–6) 0.839
ITOS2 Acquired expert services from service providers
ITOS3 Benefit in IT outsourcing
ITOS4 Overall satisfaction of IT outsourcing service
ITOS5 Likelihood to recommend others for IT outsourcing
ITOS6 Refocus on core businesses or processes
Table II. Reliability Test Result of Polit Test

Sample Population

The target populations in this study were IT workers in Hong Kong. According to the information from the Census and Statistics Department of Hong Kong Special Administrative Region, approximately 108,500 IT workers in 2021 (Census & Statistics Department, 2022).

Sampling Size

  • Margin of error: A 5% margin of error is adopted (Taherdoost, 2017; Kosaret al., 2018).
  • Confidence level: A confidence level set at 95% and considered it created fair representative data. The z value for a 95% confidence level is 1.96 (Hazra, 2017).
  • Population proportion: 50% is adopted, which is used to determine a more cautious sample size (Frey & Zhang, 2021).

Using the above criteria, the appropriate values had been selected to calculate the sample size using the formula below:

(1)N=z2×p(1−p)e21+(z2×p(1−p)e2N)where N = population size; z = z value; e = margin of error; p = population proportion (Kallio, 2022).

The value adopted for calculating the sample size in this research were N = 108,500; z = 1.96; e = 0.05; p = 0.5. Using the formula (1), the sample size was 382.8046. Thus, 383 questionnaires were required to be completed for this study.

Sampling Method

This research is specific to Hong Kong ITO, so snowball sampling is adopted to collect data from respondents who are working in IT.

Results

In total, 447 surveys were completed and returned during the planned data collection period. The response rate was 97%. The relationships had been determined in the different analyses, which included reliability, correlation, and regression analysis. The outcome demonstrated that six independent variables in this study were important factors to ITO satisfaction in FSI.

Descriptive Statistics and Reliability Analysis

The most used dependability metric is Cronbach’s Alpha. It serves as a gauge for the accuracy of the measurement tools and ranges from 0 to 1. Cronbach’s Alpha, a measure of acceptable internal consistency, should be higher than 0.7. (Olaniyi, 2019). The data of survey were gathered to conduct a reliability test for validation. Six independent variables passed the reliability test with over 0.8. Table III shows the descriptive statistics and reliability results. The highest and lowest attribute’s mean with standard deviation (SD) of each factor was shown in the table and the Cronbach’s Alpha value in this research and previous research.

Attribute Mean (SD) Cronbach’s alpha in this research Cronbach’s alpha in previous research Reference
ISR1 4.48 (1.05) 0.825 0.870 Hanafizadeh and Zare Ravasan (2018a)
ISR2 4.22 (1.11)
QSP1 4.33 (1.08) 0.823 0.925 Han et al . (2013)
QSP2 4.55 (0.99)
CM1 4.47 (1.05) 0.804 0.832 Karimi-Alaghehband and Rivard (2020)
CM2 4.55 (1.06)
ICE1 4.41 (1.05) 0.809 0.829 Karimi-Alaghehband and Rivard (2020)
ICE4 4.49 (1.08)
COM1 4.53 (1.07) 0.801 0.899 Han et al . (2008)
COM4 4.46 (1.06)
RP1 4.36 (1.12) 0.824 0.780 Hanafizadeh and Zare Ravasan (2018a)
RP4 4.48 (1.04)
ITOS2 4.37 (1.10) 0.839 0.928 Han et al . (2008)
ITOS4 4.56 (1.00)
Table III. Result of Descriptives Statistics and Reliability Analysis

Factor Analysis

Factor analysis is a statistical technique to extract common variance from all variables and group them into logical groups. There are several methods to conduct it, but principal component analysis (PCA) is used most commonly. Principal component analysis with varimax rotation was adopted in this research. The factor is extracted based on eigenvalues greater than 1 (Beaverset al., 2013), and the items retained in the factor if the loaded above 0.5 (Shrestha, 2021). Two components have been determined in the analysis; component one is CM, ICE, COM, RP and ITOS, and component two is ISR and QSP. Component one explains 50.76% of the amount of the variance, and component two explains 4.21%. Those components explain 54.97% of the variance and show in Table IV.

Label Attribute Factor loading Communality Component Eigen-value % of variance Cumulative variance %
ISR1 Specialized functions and services 0.716 0.609 2 1.177 50.763% 50.763%
ISR2 Reduce IT operations’ impact due to staff turnover 0.710 0.588 2
ISR3 Expertise and tools to response incidents 0.754 0.647 2
ISR4 Protect the company’s data 0.656 0.538 2
QSP1 Professional certificates 0.717 0.607 2
QSP2 Selection criteria and relevant experience in the industry 0.550 0.546 2
QSP3 Capabilities of implementation a new computer system 0.659 0.581 2
QSP4 Share the knowledge of systems and the potential risks 0.698 0.610 2
CM2 Define the number of subject matter experts 0.526 0.512 1 14.214 4.205% 54.968%
CM3 The arrangement of out-of-scope work 0.553 0.517 1
CM4 Bear the responsibility and liabilities 0.577 0.542 1
ICE1 Determine the scope of work in detail 0.719 0.498 1
ICE2 Write service level agreements (SLAs) 0.592 0.487 1
ICE3 Consider the nursing period in IT outsourcing 0.682 0.531 1
ICE4 Capability of negotiation 0.700 0.526 1
COM1 Service provider’s time zone 0.650 0.511 1
COM2 Service provider’s first language 0.647 0.439 1
COM3 The communication is timely 0.646 0.547 1
COM4 The communication is accurate 0.687 0.619 1
RP1 Regulatory compliance requirements 0.568 0.495 1
RP2 Knowledge of regulation 0.563 0.598 1
RP3 Fulfillment of the regulatory requirements 0.622 0.567
RP4 Third-party risk in regulation policy 0.652 0.588 1
ITOS1 Completes tasks that exceed our expectations 0.599 0.555 1
ITOS2 Acquired expert services from service providers 0.562 0.474 1
ITOS3 Benefit in IT outsourcing 0.564 0.551 1
ITOS4 Overall satisfaction of IT outsourcing service 0.572 0.589 1
Table IV. Result of Factor Analysis

Correlation and Regression Analysis

The Pearson Correlation Coefficient determines the strength and direction of the relationship between two variables that are at least assessed on an interval scale (Komaroff, 2020). The Pearson Correlation value (r) indicates the connection between the two variables; a value between −1 and +1 is used to quantify it (Akoglu, 2018). There is a strong positive association if the value is close to 1. The correlation and linear regression between the independent and dependent variables in this study were contrasted separately to determine whether there was a significant relationship between them. The result in Table V demonstrated that the six factors are significant relationship between each independent variable and ITOS.

Correlation analysis
r Reference
This research Other research
ISR -> ITOS 0.533** 0.686 Hsu et al . (2014)
QSP -> ITOS 0.566** 0.602 Lee (2001)
CM -> ITOS 0.539** 0.773 Karimi-Alaghehband and Rivard (2020)
ICE -> ITOS 0.549** 0.798 Karimi-Alaghehband and Rivard (2020)
COM -> ITOS 0.623** 0.630 Han et al . (2008)
RP -> ITOS 0.562** 0.692 Hsu et al . (2014)
Table V. Result of Correlation Analysis

Summary of Findings

Several relationships have been determined in this research. The outcome demonstrated that H1–H3 are supported and is shown in Fig. 3.

Fig. 3. Result of hypotheses.

Conclusion and Recommendations

Conclusion

The result showed that part of the independent variables significantly affected ITO satisfaction in this research model. The FSI ITO satisfaction was affected by the Perceived Information Security Risk (ISR), Quality of Service Provider (QSP), Contract Management (CM), Internal Contract Experience (ICE), Communication (COM), and Regulatory Policy (RP).

Recommendations

The recommendations are proposed below based on the findings in this research.

A Build-Up of Vendor Evaluation Framework

The service buyers may assess certain criteria to identify which service providers can most effectively assist in achieving the business objectives, since the service providers will manage the outsourced IT activities for the service buyers. The evaluation criteria should include competency, reputation and position in the industry, performance history, professionalism, attitude, risk factors, price, and geographical location. Each criterion has a ratio and mark based on criticality to ITO. This is a framework to assist service buyers in objectively selecting their service providers. The vendor evaluation mitigates the uncertainty and risk associated with service provider performance. The service providers’ capabilities can be determined directly or indirectly in the evaluation. For example, as part of the evaluation service buyers can directly determine the service providers’ competency and attitude through face-to-face interviews, as well as indirectly assess their reputation and position in the industry.

Moreover, the information in the evaluation and the final evaluation result can be used as references to formulate the corresponding clauses, terms, and conditions of the IT outsourcing contracts. This ensures that the evaluated aspects will be realized as part of the contract, safeguarding the expected service provider’s performance during the contract period. The evaluation also addresses the due diligence regulatory requirements on third-party risk management from the Hong Kong FSI regulators.

Enhancement for Knowledge Management

IT outsourcing experience can be accumulated from different outsourcing projects, regardless of if they were successful. Issues or aspects that were not catered to in previous outsourcing projects can be experienced for the next. These valuable experiences can help service buyers to improve their next project and can be transformed into knowledge that should be formally recorded and filed for successor training or as used as reference by other staff, to enhance knowledge management and facilitate knowledge sharing and exchange among the staff. These assets will be kept in the company even after the staff leave the company. For example, the non-FSI respondents needed higher awareness of regulatory policy, as determined in the previous statistical test. In this case when new staff without FSI experience get involved in FSI ITO project, the knowledge pool can be referred to. This new staff can take note of the knowledge on what needs attention relating to IT outsourcing regulations, as well as using this knowledge pool as reference for proper contract preparation.

Enhance Performance Monitoring

If vendor evaluation is used as a preventive action against IT outsourcing failure, performance monitoring is a detective action to reduce the failure rate. While service providers may have passed the vendor evaluation and was awarded the outsourcing contract, the outsourced project may still fail due to lack of sustainability in service performance–a continuous delivery of high-quality services over time (Pluggeet al., 2013). Therefore, performance monitoring is necessary for measuring the performance of service providers regularly. It will also positively affect the service quality in outsourcing (Matet al., 2011). If the performance over time trended to breach a pre-defined SLA alert threshold, the service buyers can be made aware of the performance issue. Service buyers can then discuss with the service providers for remediation actions. Key areas should be monitored during the service period, such as response and reporting time, problem-solving lead-time, staff turnover, and on-time delivery rate on-time. Performance review sessions can also offer opportunities for both parties to share information and solve the issues in daily operations.

Limitation and Future Research

This research methodology had some limitations that might have affected the results.

Limitations

  1. 1.The snowball sampling method might have introduced biased information due to the characteristics of this sampling method. For instance, respondents in the snowball structure might be current or former coworkers. The respondents most likely had similar ITO experiences or results. Thus, the representation of these samples might be biased toward a particular population group and could not reflect the whole demographic population of the industry. The stratified sampling would be a more representable method, dividing FSI companies into subgroups, and selecting a sample from each subgroup.

In future research, a more extensive research scale would be required to understand the whole population, which would be more appropriate for the industry to understand the need and construct any policy.

  1. 2.The critical success factors had been identified for future research, but the reasons for ITO failure were not identified in this study. It would be exciting to research the relationship between critical success factors and the reasons for failure in ITO.

Future Research

The future research will focus on the service buyers and whether they are aware of the critical success factors. The research can investigate if the service buyers are unaware of the failure causes, or if they were aware but failed to take remediation action in the ITO. It can be explored to improve the satisfaction rate in ITO.

References

  1. Adams, K., Nyuur, R., Chima, M., & Debrah, Y. (2018). Offshore/n- earshore outsourcing as a strategic competitive posturing: Insights from Ghana. 2018 British Academy of Management Conference. https://ray.yorksj.ac.uk/id/eprint/3065/.
     Google Scholar
  2. Ahmed, I. (2020). Technology organization environment framework in cloud computing. TELKOMNIKA (Telecommunication Computing Electronics and Control), 18(2), 716. https://doi.org/10.12928/telkomnika.v18i2.13871.
    DOI  |   Google Scholar
  3. Akoglu, H. (2018). User’s guide to correlation coefficients. Turkish Journal of Emergency Medicine, 18(3), 91–93. https://doi.org/10.1016/j. tjem.2018.08.001.
    DOI  |   Google Scholar
  4. Al Hadwer, A., Tavana, M., Gillis, D., & Rezania, D. (2021). A systematic review of organizational factors impacting cloud-based technology adoption using technology-organization-environment framework. Internet of Things, 15(100407), 100407. https://doi.org/10.1016/j. iot.2021.100407.
    DOI  |   Google Scholar
  5. Ali, S., Abbasi, I. A., Mustafa, E. E., Wahid, F., & Huang, J. (2022). Practitioner’s view of the success factors for software outsourcing partnership formation: An empirical exploration. Empirical Software Engineer, 27(2), 6–7. https://doi.org/10.1007/ s10664- 021- 10044-y.
    DOI  |   Google Scholar
  6. Altin, M. (2021). Does resource-based view explain outsourcing intention: Revenue management perspective. Tourism Economics, 27(2), 292–306. https://doi.org/10.1177/1354816619891318.
    DOI  |   Google Scholar
  7. Alwahdani, A. (2019). The impact of trust and reciprocity on knowledge exchange: A case study in IT outsourcing. Journal of Information Systems Engineering & Management, 4(1), 2–5. https://doi. org/10.29333/jisem/5738.
    DOI  |   Google Scholar
  8. Beavers, A. S., Lounsbury, J. W., Richards, J. K., Huck, S. W., Skolits, G. J., & Esquivel, S. L. (2013). Practical Considerations for Using Exploratory Factor Analysis in Educational Research. University of Massachusetts Amherst. https://doi.org/10.7275/QV2Q-RK76.
     Google Scholar
  9. Bhatti, B. M., Mubarak, S., & Nagalingam, S. (2021). Factors impacting information security risk management in IT outsourcing: An agency theory perspective. https://aisel.aisnet.org/pacis2021/16.
     Google Scholar
  10. Blijleven, V., Gong, Y., Mehrsai, A., & Koelemeijer, K. (2019). Critical success factors for lean implementation in IT outsourcing relationships: A multiple case study. Information Technology & People, 32(3), 715–730. https://doi.org/10.1108/itp-01-2016-0002.
    DOI  |   Google Scholar
  11. Census and Statistics Department (2022). Table 91: Selected Statistics for All Establishments in the Information and Communications, Financing and Insurance, Professional and Business Services Sectors. Census and Statistics Department. https://www.censtatd.gov.hk/en/ web_table.html?id=91.
     Google Scholar
  12. Cha, K. -J., & Kim, Y. S. (2018). Critical success factors for mutual collaboration with suppliers in IT outsourcing industry: A case study of a top IT outsourcing company in Korea. Enterprise Information Systems, 12(1), 76–95. https://doi.org/10.1080/17517575.2016.1196734.
    DOI  |   Google Scholar
  13. Delen, G. P. A. J., Peters, R. J., Verhoef, C., & van Vlijmen, S. F. M., (2019). Foundations for measuring IT-outsourcing success and failure. The Journal of Systems and Software, 156, 113–125. https:// doi.org/10.1016/j.jss.2019.06.074.
    DOI  |   Google Scholar
  14. Dewi, M. A. A., Hidayanto, A. N., Purwandari, B., Kosandi, M., & Budi, N. F. A. (2018). Smart city readiness model using technology- organization-environment (TOE) framework and its effect on adoption decision. PACIS 2018 Proceedings. https://aisel.aisnet. org/pacis2018/268.
     Google Scholar
  15. Erdogan, D. (2020). The role of contract and relationship norms in the success of information technology outsourcing. Eastern Jounal of European Studies, 11(2), 230–233. https://www.academia.edu/44817175/The_role_of_contract_and_relationship_norms_in_the_success_of_Information_Technology_Outsourcing.
     Google Scholar
  16. Frey, J., & Zhang, Y. (2021). Robust confidence intervals for a proportion using ranked-set sampling. Journal of the Korean Statistical Society, 50(4), 1009–1028.
    DOI  |   Google Scholar
  17. Godino, A., & Molina, O. (2019). The impact of outsourcing on collective bargaining coverage: A comparative analysis in six countries. Uab.Cat. https://ddd.uab.cat/pub/infpro/2019/202675/ Comparative_report_RECOVER.pdf .
     Google Scholar
  18. Goles, T., & Chin, W. W. (2002). Relational exchange theory and IS outsourcing: Developing a scale to measure relationship factors. In Information systems outsourcing. pp. 221–250, Berlin Heidelberg: Springer.
    DOI  |   Google Scholar
  19. Gunduz, M., & Elsherbeny, H. A. (2020). Operational framework for managing construction-contract administration practitioners’ perspective through modified Delphi method. Journal of Construction Engineering and Management, 146(3), 04019110. https://doi. org/10.1061/(asce)co.1943- 7862.0001768.
    DOI  |   Google Scholar
  20. Hammarberg, K., Kirkman, M., & de Lacey, S. (2016). Qualitative research methods: When to use them and how to judge them. Human Reproduction (Oxford, England), 31(3), 498–501. https:// doi.org/10.1093/humrep/dev334.
    DOI  |   Google Scholar
  21. Han, H.-S., Lee, J.-N., Chun, J. U., & Seo, Y.-W. (2013). Complementarity between client and vendor IT capabilities: An empirical investigation in IT outsourcing projects. Decision Support Systems, 55(3), 777–791. https://doi.org/10.1016/j.dss.2013.03.003.
    DOI  |   Google Scholar
  22. Han, H.S., Lee, J.-N., & Seo, Y.-W. (2008). Analyzing the impact of a firm’s capability on outsourcing success: A process perspective. Information & Management, 45(1), 31–42. https://doi.org/10.1016/j. im.2007.09.004.
    DOI  |   Google Scholar
  23. Hanafizadeh, P., & Zare Ravasan, A. (2018). A model for selecting IT outsourcing strategy: The case of e-banking channels. Journal of Global Information Technology Management, 21(2), 111–138. https://doi.org/10.1080/1097198x.2018.1462070.
    DOI  |   Google Scholar
  24. Hanafizadeh, P., & Zareravasan, A. (2020). A systematic literature review on IT outsourcing decision and future research directions. Journal of Global Information Management, 28(2), 160–201. https://doi.org/10.4018/jgim.2020040108.
    DOI  |   Google Scholar
  25. Hazra, A. (2017). Using the confidence interval confidently. Journal of Thoracic Disease, 9(10), 4125–4130. https://doi.org/10.21037/ jtd.2017.09.14.
    DOI  |   Google Scholar
  26. HKMA (2021). Regtech Adoption Practice Guide. Hkma.gov.Hk. https:// www.hkma.gov.hk/media/eng/doc/key-information/press-release/20 21/20210617e5a1.pdf.
     Google Scholar
  27. Hodosi, G., & Rusu, L. (2019). IT outsourcing: Definition, importance, trends and research. In Risks, relationships and success factors in IT outsourcing. (pp. 1–9). Springer International Publishing.
    DOI  |   Google Scholar
  28. Hodosi, G., Stark, A., van Beers, E., & Rusu, L. (2020). Factors for successful IT outsourcing relationships in large companies in Sweden: A service buyer’s perspective. In Information systems. (pp. 486–497). Springer International Publishing.
    DOI  |   Google Scholar
  29. Hsu, P.-F., Ray, S., & Li-Hsieh, Y.-Y. (2014). Examining cloud computing adoption intention, pricing mechanism, and deployment model. International Journal of Information Management, 34(4), 474–488. https://doi.org/10.1016/j.ijinfomgt.2014.04.006.
    DOI  |   Google Scholar
  30. IMF (2021). PEOPLE’S REPUBLIC OF CHINA–HONG KONG SPECIAL ADMINISTRATIVE REGION FINANCIAL SECTOR ASSESSMENT PROGRAM. Imf.org. https://www. imf.org/-/media/Files/Publications/CR/2021/English/1HKGEA202 1004.ashx.
    DOI  |   Google Scholar
  31. Jain Palvia, S. C., & Palvia, P. (2017). Critical issues facing IT outsourcing vendors in India. In Global sourcing of services. (pp. 261–300). World Scientific/NOW Publishers.
    DOI  |   Google Scholar
  32. Jatobá, M. N., Franco, M., & Rodrigues, M. (2022). The role of communication between partners in the process of strategic alliances: A systematic literature review. Journal of Business & Industrial Marketing, 38(7), 1511–1531. https://doi.org/10.1108/ jbim- 09- 2021- 0440.
    DOI  |   Google Scholar
  33. Kallio, S. (2022, February 15). Finding the Right Sample Size (The Hard Way). Eval Academy. https://www.evalacademy.com/articles/ finding-the-right-sample-size-the-hard-way.
     Google Scholar
  34. Karimi-Alaghehband, F., & Rivard, S. (2020). IT outsourcing success: A dynamic capability-based model. Journal of Strategic Information Systems, 29(1), 101599. https://doi.org/10.1016/j.jsis.2020.101599.
    DOI  |   Google Scholar
  35. Komaroff, E. (2020). Relationships between p-values and Pearson correlation coefficients, type 1 errors and effect size errors, under a true null hypothesis. Journal of Statistical Theory and Practice, 14(3), 5– 10. https://doi.org/10.1007/s42519-020-00115-6
    DOI  |   Google Scholar
  36. Kosar, T., Bohra, S., & Mernik, M. (2018). A systematic mapping study driven by the margin of error. The Journal of Systems and Software, 144, 439–449. https://doi.org/10.1016/j.jss.2018.06.078.
    DOI  |   Google Scholar
  37. Lee, J. -N. (2001). The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success. Information & Management, 38(5), 323–335. https://doi.org/10.1016/ s0378-7206(00)00074-4.
    DOI  |   Google Scholar
  38. Luu, V. (2022, July 14). How to Avoid IT Outsourcing Failures. Bestarion. https://bestarion.com/how- to- avoid- it- outsourcing- failures/. Mardatillah, A., Raharja, S., Hermanto, B., Herawaty, T., & Miftahuddin, A. (2019). The importance of characteristic partnership as a sustainable competitive advantage: A perspective review. Proceedings of the Proceedings of 1st Workshop on Environmental Science, Society, and Technology, WESTECH 2018, December 8th, 2018, Medan, Indonesia.
     Google Scholar
  39. Mat, N., Langgat, J., Mansor, N. A., & Nenin, M. (2011). Performance monitoring effect of outsourcing: A case of Kuala Lumpur three stars hotel. ResearchGate. https://www.researchgate.net/publication/272356189_PERFORMANCE_MONITORING_EFFECT_OF_OUTSOURCING_A_CASE_OF_KUALA_LUMPUR_TH REE_STARS_HOTEL, https://doi.org/10.13140/2.1.4901.7123.
     Google Scholar
  40. Olaniyi, A. A. (2019). Scholar journal of applied sciences and research. Innovationinfo.org. http://innovationinfo.org/articles/SJASR/SJA SR-4-223.pdf.
     Google Scholar
  41. Pai, F. -Y., & Yeh, T. -M. (2015). The effects of interdependence and cooperative behaviors on buyer’s satisfaction in the semiconduc- tor component supply chain. Sustainability, 8(1), 2. https://doi. org/10.3390/su8010002.
    DOI  |   Google Scholar
  42. Pereira, V., Munjal, S., & Ishizaka, A. (2019). Outsourcing and offshoring decision making and its implications for businesses–A synthesis of research pursuing five pertinent questions. Journal of Business Research, 103, 348–355.
    DOI  |   Google Scholar
  43. Plugge, A., Bouwman, H., & Molina-Castillo, F.-J. (2013). Outsourcing capabilities, organizational structure and performance quality monitoring: Toward a fit model. Information & Management, 50(6), 275–284. https://doi.org/10.1016/j.im.2013.04.006.
    DOI  |   Google Scholar
  44. Qi, C., & Chau, P. Y. K. (2015). Relationship or contract? Exploring the key factor leading to IT outsourcing success in China. Information Technology & People, 28(3), 466–499. https://doi.org/10.1108/ itp- 10- 2014- 0236.
    DOI  |   Google Scholar
  45. Rhodes, J., Lok, P., Loh, W., & Cheng, V. (2016). Critical success factors in relationship management for services outsourcing. Service Busi- ness, 10(1), 59–86. https://doi.org/10.1007/s11628-014-0256-8.
    DOI  |   Google Scholar
  46. Ried, L., Eckerd, S., Kaufmann, L., & Carter, C. R. (2022). From target to actor: Contagion of honesty and deception across buyer-supplier negotiations. Journal of Operations Management, 69(2), 261–283. https://doi.org/10.1002/joom.1212.
    DOI  |   Google Scholar
  47. Rutberg, S., & Bouikidis, C. D. (2018). Focusing on the fundamentals: A simplistic differentiation between qualitative and quantitative research. Nephrology Nursing Journal: Journal of the American Nephrology Nurses’ Association, 45(2), 209–212. https://www. proquest.com/docview/2028125771?pq-origsite=gscholar&fromop enview=true.
     Google Scholar
  48. Santos, J. L. G. D., Erdmann, A. L., Meirelles, B. H. S., Lanzoni, G. M. D. M., Cunha, V. P. D., & Ross, R. (2017). Integração entre dados quantitativos e qualitativos em uma pesquisa de métodos mistos [Integration between quantitative and qualitative data in mixed methods research]. Texto & Contexto Enfermagem, 26(3), 1–9. https://doi.org/10.1590/0104-07072017001590016.
    DOI  |   Google Scholar
  49. Schmidt, N., & Menth, L. (2016). Establishing information technology outsourcing relationship quality: A comparative repertory grid study. https://aisel.aisnet.org/ecis2016_rp/170.
     Google Scholar
  50. Shrestha, N. (2021). Factor analysis as a tool for survey analysis. American Journal of Applied Mathematics and Statistics, 9(1), 4–11. https://doi.org/10.12691/ajams- 9- 1- 2.
    DOI  |   Google Scholar
  51. Statista (2022). IT Outsourcing—Hong Kong. Statista. https://www.statista.com/outlook/tmo/it- services/it-outsourcing/hong-kong.
     Google Scholar
  52. Sutthiparinyanon, P., & Villegas Puyod, J. (2022). The role of partnership quality, trust, perceived commitment and perceived risk on successful outsourcing relationship. Suranaree Journal of Social Science, 17(1), 1–11. https://doi.org/10.55766/hruk4070.
    DOI  |   Google Scholar
  53. Taherdoost, H. (2017). Determining sample size; How to calculate survey sample size. https://papers.ssrn.com/abstract=3224205.
     Google Scholar
  54. Taponen, S., & Kauppi, K. (2020). Service outsourcing decisions— a process framework. Journal of Global Operations and Strategic Sourcing, 13(2), 171–194. https://doi.org/10.1108/jgoss- 02- 2019- 0012.
    DOI  |   Google Scholar
  55. Tornatzky, L. G., & Fleischer, M. (1990). Processes of Technological Innovation. Free Press. University of Minnesota (2015). 1.2 what is communication?. In Business communication for success.
     Google Scholar
  56. University of Minnesota Libraries Publishing edition, 2015. This edition adapted from a work originally produced in 2010 by a publisher who has requested that it not receive attribution.
     Google Scholar
  57. Wibisono, Y. Y., Govindaraju, R., Irianto, D., & Sudirman, I. (2019). Managing differences, interaction, and partnership quality in global inter-firm relationships: An empirical analysis on offshore IT out-sourcing. International Journal of Managing Projects in Business, 12(3), 730–754. https://doi.org/10.1108/ijmpb-04-2018-0074.
    DOI  |   Google Scholar
  58. Zhong, F., & Myers, M. D. (2016). Client-vendor relationships in cloud computing: Lessons from it outsourcing. https://aisel.aisnet.org/ pacis2016/138/.
     Google Scholar