A Study on Contributing Factors of IT Outsourcing Satisfaction Financial Service Industry in Hong Kong
##plugins.themes.bootstrap3.article.main##
This paper aims to identify the critical success factors in Hong Kong Financial Service Industry IT outsourcing satisfaction and propose possible satisfaction rate boosts. A hybrid methodology (qualitative and quantitative) was adopted to analyze the variables and their relationship thoroughly. The six members focus group was formed to discuss IT outsourcing, and the survey was conducted to collect 447 valid responses for data analysis. The six critical success factors were Perceived Information Security Risk, Quality of Service Provider, Contract Management, Internal Contract Experience, Communication and Regulatory Policy, identified to support satisfaction of Hong Kong FSI IT outsourcing after conducting the analysis. Three recommendations are proposed to improve IT outsourcing satisfaction based on the findings of critical success factors: (1) A Build-up of Vendor Evaluation Framework, (2) Enhancement for Knowledge Management, and (3) Enhance Performance Monitoring. The snowball sampling method might have introduced biased information. In future research, a more extensive research scale would be required to understand the whole population, which would be more appropriate for the industry to understand the need and construct any policy. This paper is a holistic approach to identifying factors that affect Hong Kong FSI IT outsourcing satisfaction. In addition, practical recommendations were proposed to improve those factors, thereby increasing the satisfaction rate of IT outsourcing.
Downloads
Introduction
Outsourcing was one of the crucial strategic ways in the intricate, competitive, and dynamic global supply chains. Companies consider it an important strategy to reduce costs and increase competitiveness, productivity, and profitability (Taponen & Kauppi, 2020). It was seen as a typical competitive strategy in local and foreign markets (Adamset al., 2018; Pereiraet al., 2019). Outsourcing is a widespread decision and one of the most strategic for companies, which helps meet financial objectives without high expertise maintenance costs (Taponen & Kauppi, 2020).
Information Technology (IT) is widely used, not just to help management but also to stand out from the competition. However, the strategic and operational importance of IT has raised a firm’s expenses, now accounting for a significant share of indirect costs for businesses (Altin, 2021). IT Outsourcing (ITO) has been the alternative for the company and focused their resources on core business. Companies benefit from ITO in several ways, including increased flexibility and adaptability, lowered operational expenses, and secured the freedom to concentrate on core skills. According to the International Monetary Fund (IMF) survey in 2021, 95% of the responding banks in Hong Kong were developing to outsource technology-related processes to service providers; over 100 Authorized Institutions—institutions that provide banking, asset and wealth management, private equity business, and securities services (HKMA, 2021)—have outsourced their business processes to service providers (IMF, 2021). Statista (2022) also projected the Hong Kong ITO market which an annual growth rate (CAGR 2023-2028) of 12.62%, resulting in a market volume of US$4.58 billion by 2028. IT outsourcing is becoming essential in Hong Kong organizations.
Unfortunately, despite ITO becoming a common arrangement in the companies and demand growing in the future, IT outsourcing satisfaction (ITOS) is not good enough in the market. Delenet al. (2019) found that around 40% of ITO projects failed at the end, and Luu (2022) also indicated that 25%–50% of ITO failed. It is a high failure rate from a project perspective. This challenge to satisfaction and success has been a significant problem in ITO, and there is a need to determine the factors that can raise the satisfaction rate.
This study aims to determine the critical success factors in Hong Kong FSI ITO satisfaction and to find the deficit in critical success factors that impacted ITO satisfaction. After the critical success factors are determined, recommendations are proposed to improve these factors for increasing ITO satisfaction. Organizations can gain insight from this study to make their ITO success easier and benefit from ITO.
Literature Review
ITO involved different disciplines in the whole outsourcing process. Therefore, multiple theories covered different ITO processes, such as ITO strategy, resource, contract, relationship, and monitoring. Systematic review and empirical study summarized the major theories of ITO in 2020 (Hanafizadeh & Zareravasan, 2020). The common frameworks used for ITO research included Technology, Organization, and Environment (TOE), Transaction Cost Economics (TCE), Core Competency Theory (CCT), Partnership and Alliance Theory, Contractual Theory, and Expectation-Confirmation Theory (ECT).
Technology, Organization, and Environment (TOE) Framework
The TOE paradigm, developed by Tornatzky and Fleischer, has been used to define the creative process within a company (Tornatzky & Fleischer, 1990). It considered three dimensions (technology, organization, and environment) that affected the adoption of innovation. Technologies here refer to all business-related technology. The organization was related to the firm’s descriptors, including its management structure, organizational structure, size, resources, and method of employee communication. Finally, the environment comprised the market components, the competitors, and the regulatory framework (Hanafizadeh & Zare Ravasan, 2018). The TOE Framework is a general theory that cites these three dimensions determining adoption compared to several theories and models in information systems research. Since researchers may choose the components of each dimension base on the features of innovation and the organization itself, the TOE framework is broadly relevant to many disciplines and circumstances (Dewiet al., 2018). It was extensively applicable to a variety of situations, including decision-making, success criteria, and information security risk (Hanafizadeh & Zare Ravasan, 2018; Hanafizadeh & Zareravasan, 2020; Bhattiet al., 2021). Even though the TOE framework is usually used to prove the relationship between ITO adoption, continuous ITO adoptions indicate ITO satisfaction. Therefore, Technology, Organization, and Environment (TOE) theory is suitable for analyzing internal and external factors in ITO satisfaction and was adopted in this study as the base theoretical framework. Fig. 1 shows a model illustrating attributes of the TOE theoretical framework.
Fig. 1. Research theoretical framework (Hanafizadeh & Zare Ravasan, 2018).
Technological Context
The technological context relates to all the company’s technologies, including those presently in use there and others that are marketed but not yet used. In addition, the company’s existing technologies influence the adaptation process because they limit the quantity and rate of technological change they can implement (Bhattiet al., 2021). Additionally, the technological context included Perceived Information Security Risk and Quality of Service Provider factors.
- Perceived Information Security Risk (ISR): Technology, such as smartphones, mobile applications, and cloud computing, has rapidly developed in recent years. These did facilitate business operations efficiency, but they introduced IT security risks at the same time. Businesses that chose ITO for its significant benefits must also understand the risks involved (Delenet al., 2019; Al Hadweret al., 2021). A risk is a potential for an event that might negatively affect the company. For example, each ITO service provider has their area of expertise, such as helpdesk service, systems, infrastructure, software development, and cybersecurity. If the service provider lacks the exact expertise required, performance issues or extra cost may arise, causing ITO project failure. The other most serious hazard to ITO is information security issue. Since perceived IT security risk is considered highly important for ITO in FSI, there is a need to identify whether it affects the success of ITO (Hanafizadeh & Zare Ravasan, 2018; Ahmed, 2020). Therefore, it is necessary to determine the relationship between the risk and ITO satisfaction. Thus, the below hypothesis is made: H1(a): Perceived information security risk significantly affects ITO satisfaction in FSI.
- Quality of Service Provider (QSP): The service provider’s quality was defined as the level to which the results met the service buyers’ expectations (Wibisonoet al., 2019). Goles and Chin (2002) have defined service providers’ quality as innate qualities that support the efficiency of relational interaction. Wibisonoet al. (2019) has determined the service provider’s quality significantly impact in ITO and found the similar research result of Lee (2001). However, other researchers failed to prove the service provider’s quality impact ITO success (Rhodeset al., 2016; Cha & Kim, 2018; Blijlevenet al., 2019; Hodosi & Rusu, 2019). Therefore, this inconsistent result should be identified in the Hong Kong environment. The service provider’s capabilities affected their credibility from the service buyer’s point of view. Credibility came from work history, ability, benevolence, and integrity (Alwahdani, 2019). A service buyer’s confidence in a service provider was reflected in that service’s ITO satisfaction. Thus, another hypothesis is made: H1(b): The quality of service provider significantly affects ITO satisfaction in FSI.
Organizational Context
The organizational context describes the structure, culture, goals, size, resource quality, communication, decision-making processes, features, and company assets. This setting affects ITO satisfaction and implementation choices (Bhattiet al., 2021). The organizational context relates to internal processes or capabilities, including Contract Management, Internal Contract Experience, and Communication factors.
- Contract Management (CM): Written contracts serve several purposes in managing an ITO relationship since they are the most crucial component (Erdoğan, 2020). In the setting of ITO, a contract specifies the provision of services and costs that must be finished within a contractual period between the two signing partners. After a contract has been signed and is in force, contract management takes place (Erdoğan, 2020). The quality of contract management is to ensure that the contract’s terms and conditions are followed and that each party satisfactorily fulfills its contractual duties. Qi and Chau (2015) identified that the quality of contract management was essential at the contract and post-contract stages and significantly affected ITO. Since the contract is a binding agreement between two organizations, if the organization manages the activities and content of the contract poorly, opportunism may arise and generate extra cost during the service duration, potentially affect the result of IT. Thus, the following hypothesis is made: H2(a): The quality of contract management significantly affects ITO satisfaction in FSI.
- Internal Contract Experience (ICE): Apart from post-signing contract management, pre-signing contract administration is also important. Creating a comprehensive contract might reduce the uncertainty, risk of opportunistic conduct, and misunderstanding between two contractual parties (Jain Palvia & Palvia, 2017). Pre-signing contract administration is content preparation that includes price, the scope of work (SOW), service level, information exchange and security, handover, clauses, terms & conditions, liabilities, penalty, payment arrangements, and exit policy (Gunduz & Elsherbeny, 2020). If participants with no outsourcing experience prepare the contract, the quality and coverage of the contract may not protect the service buyer enough (Godino & Molina, 2019). Thus, an employee’s contract experience is also essential in an ITO contract. For example, if an employee lacks contracting expertise, drafted SOW might miss tasks. Such incomplete SOW might allow for opportunistic behavior and ambiguity, requiring extra resources to fill the gap, potentially result in extra service costs. Thus, the following hypothesis is made: H2(b): The contract administration experience significantly affects ITO satisfaction in FSI.
- Communication (COM): Communication includes understanding, sharing, and meaning (University of Minnesota, 2015). It includes open talks about expectations, future directions, skills, strengths, shortcomings, and daily interchange of project-related information (Schmidt & Menth, 2016; Zhong & Myers, 2016; Hodosiet al., 2020). Communication is an effective way to share information and a key for a healthy partnership. Communication quality, information sharing between service providers and service buyers, and participation were three dimensions of communication behavior (Aliet al., 2022; Jatobáet al., 2022; Sutthiparinyanon & Villegas Puyod, 2022). The correctness, timeliness, sufficiency, and reliability of the information conveyed were all examples of quality (Mardatillahet al., 2019; Riedet al., 2022). Any potential cooperation success depends on how well it was communicated. Higher-performing partners communicate information more often and with more relevance due to deeper relationships (Pai & Yeh, 2015). More effective partnerships were anticipated to have a better quality of communication, more information exchange between both parties and greater partner involvement in planning and goal formulation. Thus, the hypothesis is made: H2(c): The quality of communication significantly affects ITO satisfaction in FSI.
Environmental Context—Regulatory Policy (RP)
The environmental context involves external pressure, the structure of the industry, the regulatory landscape, and the availability of technical service providers (Hanafizadeh & Zareravasan, 2020). There are three ways to approach the topic of external pressure: pressure from trading partners, pressure from competitors, and pressure from rules and government directives. The Regulatory Policy factor is one of the environmental contexts as explained below.
The external pressure and regulatory environment are highly relevant to ITO. Trading partners, market, rules, and government policies all exert pressure on FSI and could impose restrictions or support ITO (Hanafizadeh & Zare Ravasan, 2018). FSI must abide by the bulk of these regulations set by regulatory organizations. The impact of government regulation on ITO could be positive or negative. A supplementary treatment plan is required when governments place new restrictions on FSI, such as mandating third-party risk management. Thus, the below hypothesis is made:
H3: Strengthening regulatory outsourcing policy significantly affects ITO satisfaction in FSI.
Summary of Independent Variables
The six independent variables were identified to build a base for this research, and the participant demographics also be considered when analyzing the driving forces behind independent variables. The summary of research’s hypotheses is listed in Table I.
Hypotheses | |
---|---|
H1(a) | Perceived information security risk significantly affects ITO satisfaction in FSI. |
H1(b) | The quality of service provider significantly affects ITO satisfaction in FSI. |
H2(a) | The quality of contract management significantly affects ITO satisfaction in FSI. |
H2(b) | The contract administration experience significantly affects ITO satisfaction in FSI. |
H2(c) | The quality of communication significantly affects ITO satisfaction in FSI. |
H3 | Strengthening regulatory outsourcing policy significantly affects ITO satisfaction in FSI. |
Four independent variables from the TOE model were inconsistent, and consistent findings in the environmental context in the literature review were not found. Two independent variables: Perceived Information Security Risk and Regulatory policy, were proposed to add to the technological and environmental context of the model for this research. It is because information security and regulatory policy are essential areas in the financial service industry (IMF, 2021). Especially, regulatory policy is mandatory for FSI. Therefore, six independent variables: Perceived Information Security Risk, Quality of Server Provider, Contract Management, Internal Contract Experience, Communication, and Regulatory Policy, were adopted to investigate further. Besides the above independent variables, the participant demographics also be considered when analyzing the driving forces behind independent variables.
Research Methodology
Six independent variables were formulated in the research model in Fig. 2. It was based on the theoretical framework of the TOE and modified to match the actual FSI situation for this research purpose. For research method, this study adopted the hybrid method utilizing both qualitative and quantitative approaches. The hybrid method aids in validating research results utilizing quantitative and qualitative sources, investigating quantitative results with qualitative data, and creating survey questions (Santoset al., 2017).
Fig. 2. Research model.
Qualitative Research Method
The qualitative research method seeks participants’ opinions, views, and preferences about the research topic (Hammarberget al., 2016). For better data collection interactions between participants and the author, a focus group discussion was conducted for an in-depth discussion. The data were collected from the focus group formed by six participants working for IT in FSI or providing IT service for FSI. The group members had 5 to 25 years of IT experience, including experiences as management, IT professionals, and service providers.
Quantitative Research Method
The quantitative research method objectively gathers and evaluates numerical data to characterize, forecast, or regulate factors of interest (Rutberg & Bouikidis, 2018). Therefore, the survey was conducted to collect data, which targeted employees in the IT field as participants, especially those working or working for Hong Kong FSI.
Questionnaire Design
The questionnaire was further organized into two sections: the first section aimed to understand the respondents’ background with questions about their demographics; in the second section, the statements were formulated based on six independent variables and had statements for each independent variable. Respondents rated their level of agreement or disagreement on each statement listed using 6-Point Likert Scales. The statements of each independent variable were trimmed down based on the reliability test result of the pilot test in Table II.
Pilot test | Final test | ||||
---|---|---|---|---|---|
Variable | Label | Keywords | Cronbach’s alpha | No. of statement | Cronbach’s alpha |
Perceived information security risk | ISR1 | Specialized functions and services | 0.819 | 4 (ISR 1–4, delete ISR 5) | 0.825 |
ISR2 | Reduce IT operations’ impact due to staff turnover | ||||
ISR3 | Expertise and tools to response incidents | ||||
ISR4 | Protect the company’s data | ||||
ISR5 | Transfer the operational risks | ||||
Quality of service provider | QSP1 | Professional certificates | 0.846 | 4 (QSP 1–4, delete QSP 5) | 0.823 |
QSP2 | Selection criteria and relevant experience in the industry | ||||
QSP3 | Capabilities of implementation a new computer system | ||||
QSP4 | Share the knowledge of systems and the potential risks | ||||
QSP5 | Transfer the financial liabilities | ||||
Contract management | CM1 | Define the number of subject matter experts | 0.917 | 4 (CM 1–4, delete CM 5) | 0.804 |
CM2 | The arrangement of out-of-scope work | ||||
CM3 | Bear the responsibility and liabilities | ||||
CM4 | The service level agreement aligns with the SLA of company | ||||
CM5 | Comply company’s security policies | ||||
Internal contract experience | ICE1 | Determine the scope of work in detail | 0.921 | 5 (ICE 1–4, delete ICE 5) | 0.824 |
ICE2 | Write service level agreements (SLAs) | ||||
ICE3 | Consider the nursing period in IT outsourcing | ||||
ICE4 | Capability of negotiation | ||||
ICE5 | Write a statement of work | ||||
Communication | COM1 | Service provider’s time zone | 0.734 | 4 (COM 1–4, delete COM 5) | 0.801 |
COM2 | Service provider’s first language | ||||
COM3 | The communication is timely | ||||
COM4 | The communication is accurate | ||||
COM5 | Language barrier | ||||
Regulation policy | RP1 | Regulatory compliance requirements | 0.900 | 4 (RP 1–4) | 0.809 |
RP2 | Knowledge of regulation | ||||
RP3 | Fulfillment of the regulatory requirements | ||||
RP4 | Third-party risk in regulation policy | ||||
IT outsourcing satisfaction | ITOS1 | Completes tasks that exceed our expectations | 0.831 | 4 (ITOS 1–4, delete ITOS 5–6) | 0.839 |
ITOS2 | Acquired expert services from service providers | ||||
ITOS3 | Benefit in IT outsourcing | ||||
ITOS4 | Overall satisfaction of IT outsourcing service | ||||
ITOS5 | Likelihood to recommend others for IT outsourcing | ||||
ITOS6 | Refocus on core businesses or processes |
Sample Population
The target populations in this study were IT workers in Hong Kong. According to the information from the Census and Statistics Department of Hong Kong Special Administrative Region, approximately 108,500 IT workers in 2021 (Census & Statistics Department, 2022).
Sampling Size
- Margin of error: A 5% margin of error is adopted (Taherdoost, 2017; Kosaret al., 2018).
- Confidence level: A confidence level set at 95% and considered it created fair representative data. The z value for a 95% confidence level is 1.96 (Hazra, 2017).
- Population proportion: 50% is adopted, which is used to determine a more cautious sample size (Frey & Zhang, 2021).
Using the above criteria, the appropriate values had been selected to calculate the sample size using the formula below:
(1)N=z2×p(1−p)e21+(z2×p(1−p)e2N)where N = population size; z = z value; e = margin of error; p = population proportion (Kallio, 2022).
The value adopted for calculating the sample size in this research were N = 108,500; z = 1.96; e = 0.05; p = 0.5. Using the formula (1), the sample size was 382.8046. Thus, 383 questionnaires were required to be completed for this study.
Sampling Method
This research is specific to Hong Kong ITO, so snowball sampling is adopted to collect data from respondents who are working in IT.
Results
In total, 447 surveys were completed and returned during the planned data collection period. The response rate was 97%. The relationships had been determined in the different analyses, which included reliability, correlation, and regression analysis. The outcome demonstrated that six independent variables in this study were important factors to ITO satisfaction in FSI.
Descriptive Statistics and Reliability Analysis
The most used dependability metric is Cronbach’s Alpha. It serves as a gauge for the accuracy of the measurement tools and ranges from 0 to 1. Cronbach’s Alpha, a measure of acceptable internal consistency, should be higher than 0.7. (Olaniyi, 2019). The data of survey were gathered to conduct a reliability test for validation. Six independent variables passed the reliability test with over 0.8. Table III shows the descriptive statistics and reliability results. The highest and lowest attribute’s mean with standard deviation (SD) of each factor was shown in the table and the Cronbach’s Alpha value in this research and previous research.
Attribute | Mean (SD) | Cronbach’s alpha in this research | Cronbach’s alpha in previous research | Reference |
---|---|---|---|---|
ISR1 | 4.48 (1.05) | 0.825 | 0.870 | Hanafizadeh and Zare Ravasan (2018a) |
ISR2 | 4.22 (1.11) | |||
QSP1 | 4.33 (1.08) | 0.823 | 0.925 | Han et al . (2013) |
QSP2 | 4.55 (0.99) | |||
CM1 | 4.47 (1.05) | 0.804 | 0.832 | Karimi-Alaghehband and Rivard (2020) |
CM2 | 4.55 (1.06) | |||
ICE1 | 4.41 (1.05) | 0.809 | 0.829 | Karimi-Alaghehband and Rivard (2020) |
ICE4 | 4.49 (1.08) | |||
COM1 | 4.53 (1.07) | 0.801 | 0.899 | Han et al . (2008) |
COM4 | 4.46 (1.06) | |||
RP1 | 4.36 (1.12) | 0.824 | 0.780 | Hanafizadeh and Zare Ravasan (2018a) |
RP4 | 4.48 (1.04) | |||
ITOS2 | 4.37 (1.10) | 0.839 | 0.928 | Han et al . (2008) |
ITOS4 | 4.56 (1.00) |
Factor Analysis
Factor analysis is a statistical technique to extract common variance from all variables and group them into logical groups. There are several methods to conduct it, but principal component analysis (PCA) is used most commonly. Principal component analysis with varimax rotation was adopted in this research. The factor is extracted based on eigenvalues greater than 1 (Beaverset al., 2013), and the items retained in the factor if the loaded above 0.5 (Shrestha, 2021). Two components have been determined in the analysis; component one is CM, ICE, COM, RP and ITOS, and component two is ISR and QSP. Component one explains 50.76% of the amount of the variance, and component two explains 4.21%. Those components explain 54.97% of the variance and show in Table IV.
Label | Attribute | Factor loading | Communality | Component | Eigen-value | % of variance | Cumulative variance % |
---|---|---|---|---|---|---|---|
ISR1 | Specialized functions and services | 0.716 | 0.609 | 2 | 1.177 | 50.763% | 50.763% |
ISR2 | Reduce IT operations’ impact due to staff turnover | 0.710 | 0.588 | 2 | |||
ISR3 | Expertise and tools to response incidents | 0.754 | 0.647 | 2 | |||
ISR4 | Protect the company’s data | 0.656 | 0.538 | 2 | |||
QSP1 | Professional certificates | 0.717 | 0.607 | 2 | |||
QSP2 | Selection criteria and relevant experience in the industry | 0.550 | 0.546 | 2 | |||
QSP3 | Capabilities of implementation a new computer system | 0.659 | 0.581 | 2 | |||
QSP4 | Share the knowledge of systems and the potential risks | 0.698 | 0.610 | 2 | |||
CM2 | Define the number of subject matter experts | 0.526 | 0.512 | 1 | 14.214 | 4.205% | 54.968% |
CM3 | The arrangement of out-of-scope work | 0.553 | 0.517 | 1 | |||
CM4 | Bear the responsibility and liabilities | 0.577 | 0.542 | 1 | |||
ICE1 | Determine the scope of work in detail | 0.719 | 0.498 | 1 | |||
ICE2 | Write service level agreements (SLAs) | 0.592 | 0.487 | 1 | |||
ICE3 | Consider the nursing period in IT outsourcing | 0.682 | 0.531 | 1 | |||
ICE4 | Capability of negotiation | 0.700 | 0.526 | 1 | |||
COM1 | Service provider’s time zone | 0.650 | 0.511 | 1 | |||
COM2 | Service provider’s first language | 0.647 | 0.439 | 1 | |||
COM3 | The communication is timely | 0.646 | 0.547 | 1 | |||
COM4 | The communication is accurate | 0.687 | 0.619 | 1 | |||
RP1 | Regulatory compliance requirements | 0.568 | 0.495 | 1 | |||
RP2 | Knowledge of regulation | 0.563 | 0.598 | 1 | |||
RP3 | Fulfillment of the regulatory requirements | 0.622 | 0.567 | ||||
RP4 | Third-party risk in regulation policy | 0.652 | 0.588 | 1 | |||
ITOS1 | Completes tasks that exceed our expectations | 0.599 | 0.555 | 1 | |||
ITOS2 | Acquired expert services from service providers | 0.562 | 0.474 | 1 | |||
ITOS3 | Benefit in IT outsourcing | 0.564 | 0.551 | 1 | |||
ITOS4 | Overall satisfaction of IT outsourcing service | 0.572 | 0.589 | 1 |
Correlation and Regression Analysis
The Pearson Correlation Coefficient determines the strength and direction of the relationship between two variables that are at least assessed on an interval scale (Komaroff, 2020). The Pearson Correlation value (r) indicates the connection between the two variables; a value between −1 and +1 is used to quantify it (Akoglu, 2018). There is a strong positive association if the value is close to 1. The correlation and linear regression between the independent and dependent variables in this study were contrasted separately to determine whether there was a significant relationship between them. The result in Table V demonstrated that the six factors are significant relationship between each independent variable and ITOS.
Correlation analysis | |||
---|---|---|---|
r | Reference | ||
This research | Other research | ||
ISR -> ITOS | 0.533** | 0.686 | Hsu et al . (2014) |
QSP -> ITOS | 0.566** | 0.602 | Lee (2001) |
CM -> ITOS | 0.539** | 0.773 | Karimi-Alaghehband and Rivard (2020) |
ICE -> ITOS | 0.549** | 0.798 | Karimi-Alaghehband and Rivard (2020) |
COM -> ITOS | 0.623** | 0.630 | Han et al . (2008) |
RP -> ITOS | 0.562** | 0.692 | Hsu et al . (2014) |
Summary of Findings
Several relationships have been determined in this research. The outcome demonstrated that H1–H3 are supported and is shown in Fig. 3.
Fig. 3. Result of hypotheses.
Conclusion and Recommendations
Conclusion
The result showed that part of the independent variables significantly affected ITO satisfaction in this research model. The FSI ITO satisfaction was affected by the Perceived Information Security Risk (ISR), Quality of Service Provider (QSP), Contract Management (CM), Internal Contract Experience (ICE), Communication (COM), and Regulatory Policy (RP).
Recommendations
The recommendations are proposed below based on the findings in this research.
A Build-Up of Vendor Evaluation Framework
The service buyers may assess certain criteria to identify which service providers can most effectively assist in achieving the business objectives, since the service providers will manage the outsourced IT activities for the service buyers. The evaluation criteria should include competency, reputation and position in the industry, performance history, professionalism, attitude, risk factors, price, and geographical location. Each criterion has a ratio and mark based on criticality to ITO. This is a framework to assist service buyers in objectively selecting their service providers. The vendor evaluation mitigates the uncertainty and risk associated with service provider performance. The service providers’ capabilities can be determined directly or indirectly in the evaluation. For example, as part of the evaluation service buyers can directly determine the service providers’ competency and attitude through face-to-face interviews, as well as indirectly assess their reputation and position in the industry.
Moreover, the information in the evaluation and the final evaluation result can be used as references to formulate the corresponding clauses, terms, and conditions of the IT outsourcing contracts. This ensures that the evaluated aspects will be realized as part of the contract, safeguarding the expected service provider’s performance during the contract period. The evaluation also addresses the due diligence regulatory requirements on third-party risk management from the Hong Kong FSI regulators.
Enhancement for Knowledge Management
IT outsourcing experience can be accumulated from different outsourcing projects, regardless of if they were successful. Issues or aspects that were not catered to in previous outsourcing projects can be experienced for the next. These valuable experiences can help service buyers to improve their next project and can be transformed into knowledge that should be formally recorded and filed for successor training or as used as reference by other staff, to enhance knowledge management and facilitate knowledge sharing and exchange among the staff. These assets will be kept in the company even after the staff leave the company. For example, the non-FSI respondents needed higher awareness of regulatory policy, as determined in the previous statistical test. In this case when new staff without FSI experience get involved in FSI ITO project, the knowledge pool can be referred to. This new staff can take note of the knowledge on what needs attention relating to IT outsourcing regulations, as well as using this knowledge pool as reference for proper contract preparation.
Enhance Performance Monitoring
If vendor evaluation is used as a preventive action against IT outsourcing failure, performance monitoring is a detective action to reduce the failure rate. While service providers may have passed the vendor evaluation and was awarded the outsourcing contract, the outsourced project may still fail due to lack of sustainability in service performance–a continuous delivery of high-quality services over time (Pluggeet al., 2013). Therefore, performance monitoring is necessary for measuring the performance of service providers regularly. It will also positively affect the service quality in outsourcing (Matet al., 2011). If the performance over time trended to breach a pre-defined SLA alert threshold, the service buyers can be made aware of the performance issue. Service buyers can then discuss with the service providers for remediation actions. Key areas should be monitored during the service period, such as response and reporting time, problem-solving lead-time, staff turnover, and on-time delivery rate on-time. Performance review sessions can also offer opportunities for both parties to share information and solve the issues in daily operations.
Limitation and Future Research
This research methodology had some limitations that might have affected the results.
Limitations
- 1.The snowball sampling method might have introduced biased information due to the characteristics of this sampling method. For instance, respondents in the snowball structure might be current or former coworkers. The respondents most likely had similar ITO experiences or results. Thus, the representation of these samples might be biased toward a particular population group and could not reflect the whole demographic population of the industry. The stratified sampling would be a more representable method, dividing FSI companies into subgroups, and selecting a sample from each subgroup.
In future research, a more extensive research scale would be required to understand the whole population, which would be more appropriate for the industry to understand the need and construct any policy.
- 2.The critical success factors had been identified for future research, but the reasons for ITO failure were not identified in this study. It would be exciting to research the relationship between critical success factors and the reasons for failure in ITO.
Future Research
The future research will focus on the service buyers and whether they are aware of the critical success factors. The research can investigate if the service buyers are unaware of the failure causes, or if they were aware but failed to take remediation action in the ITO. It can be explored to improve the satisfaction rate in ITO.
References
-
Adams, K., Nyuur, R., Chima, M., & Debrah, Y. (2018). Offshore/n- earshore outsourcing as a strategic competitive posturing: Insights from Ghana. 2018 British Academy of Management Conference. https://ray.yorksj.ac.uk/id/eprint/3065/.
Google Scholar
1
-
Ahmed, I. (2020). Technology organization environment framework in cloud computing. TELKOMNIKA (Telecommunication Computing Electronics and Control), 18(2), 716. https://doi.org/10.12928/telkomnika.v18i2.13871.
DOI |
Google Scholar
2
-
Akoglu, H. (2018). User’s guide to correlation coefficients. Turkish Journal of Emergency Medicine, 18(3), 91–93. https://doi.org/10.1016/j. tjem.2018.08.001.
DOI |
Google Scholar
3
-
Al Hadwer, A., Tavana, M., Gillis, D., & Rezania, D. (2021). A systematic review of organizational factors impacting cloud-based technology adoption using technology-organization-environment framework. Internet of Things, 15(100407), 100407. https://doi.org/10.1016/j. iot.2021.100407.
DOI |
Google Scholar
4
-
Ali, S., Abbasi, I. A., Mustafa, E. E., Wahid, F., & Huang, J. (2022). Practitioner’s view of the success factors for software outsourcing partnership formation: An empirical exploration. Empirical Software Engineer, 27(2), 6–7. https://doi.org/10.1007/ s10664- 021- 10044-y.
DOI |
Google Scholar
5
-
Altin, M. (2021). Does resource-based view explain outsourcing intention: Revenue management perspective. Tourism Economics, 27(2), 292–306. https://doi.org/10.1177/1354816619891318.
DOI |
Google Scholar
6
-
Alwahdani, A. (2019). The impact of trust and reciprocity on knowledge exchange: A case study in IT outsourcing. Journal of Information Systems Engineering & Management, 4(1), 2–5. https://doi. org/10.29333/jisem/5738.
DOI |
Google Scholar
7
-
Beavers, A. S., Lounsbury, J. W., Richards, J. K., Huck, S. W., Skolits, G. J., & Esquivel, S. L. (2013). Practical Considerations for Using Exploratory Factor Analysis in Educational Research. University of Massachusetts Amherst. https://doi.org/10.7275/QV2Q-RK76.
Google Scholar
8
-
Bhatti, B. M., Mubarak, S., & Nagalingam, S. (2021). Factors impacting information security risk management in IT outsourcing: An agency theory perspective. https://aisel.aisnet.org/pacis2021/16.
Google Scholar
9
-
Blijleven, V., Gong, Y., Mehrsai, A., & Koelemeijer, K. (2019). Critical success factors for lean implementation in IT outsourcing relationships: A multiple case study. Information Technology & People, 32(3), 715–730. https://doi.org/10.1108/itp-01-2016-0002.
DOI |
Google Scholar
10
-
Census and Statistics Department (2022). Table 91: Selected Statistics for All Establishments in the Information and Communications, Financing and Insurance, Professional and Business Services Sectors. Census and Statistics Department. https://www.censtatd.gov.hk/en/ web_table.html?id=91.
Google Scholar
11
-
Cha, K. -J., & Kim, Y. S. (2018). Critical success factors for mutual collaboration with suppliers in IT outsourcing industry: A case study of a top IT outsourcing company in Korea. Enterprise Information Systems, 12(1), 76–95. https://doi.org/10.1080/17517575.2016.1196734.
DOI |
Google Scholar
12
-
Delen, G. P. A. J., Peters, R. J., Verhoef, C., & van Vlijmen, S. F. M., (2019). Foundations for measuring IT-outsourcing success and failure. The Journal of Systems and Software, 156, 113–125. https:// doi.org/10.1016/j.jss.2019.06.074.
DOI |
Google Scholar
13
-
Dewi, M. A. A., Hidayanto, A. N., Purwandari, B., Kosandi, M., & Budi, N. F. A. (2018). Smart city readiness model using technology- organization-environment (TOE) framework and its effect on adoption decision. PACIS 2018 Proceedings. https://aisel.aisnet. org/pacis2018/268.
Google Scholar
14
-
Erdogan, D. (2020). The role of contract and relationship norms in the success of information technology outsourcing. Eastern Jounal of European Studies, 11(2), 230–233. https://www.academia.edu/44817175/The_role_of_contract_and_relationship_norms_in_the_success_of_Information_Technology_Outsourcing.
Google Scholar
15
-
Frey, J., & Zhang, Y. (2021). Robust confidence intervals for a proportion using ranked-set sampling. Journal of the Korean Statistical Society, 50(4), 1009–1028.
DOI |
Google Scholar
16
-
Godino, A., & Molina, O. (2019). The impact of outsourcing on collective bargaining coverage: A comparative analysis in six countries. Uab.Cat. https://ddd.uab.cat/pub/infpro/2019/202675/ Comparative_report_RECOVER.pdf .
Google Scholar
17
-
Goles, T., & Chin, W. W. (2002). Relational exchange theory and IS outsourcing: Developing a scale to measure relationship factors. In Information systems outsourcing. pp. 221–250, Berlin Heidelberg: Springer.
DOI |
Google Scholar
18
-
Gunduz, M., & Elsherbeny, H. A. (2020). Operational framework for managing construction-contract administration practitioners’ perspective through modified Delphi method. Journal of Construction Engineering and Management, 146(3), 04019110. https://doi. org/10.1061/(asce)co.1943- 7862.0001768.
DOI |
Google Scholar
19
-
Hammarberg, K., Kirkman, M., & de Lacey, S. (2016). Qualitative research methods: When to use them and how to judge them. Human Reproduction (Oxford, England), 31(3), 498–501. https:// doi.org/10.1093/humrep/dev334.
DOI |
Google Scholar
20
-
Han, H.-S., Lee, J.-N., Chun, J. U., & Seo, Y.-W. (2013). Complementarity between client and vendor IT capabilities: An empirical investigation in IT outsourcing projects. Decision Support Systems, 55(3), 777–791. https://doi.org/10.1016/j.dss.2013.03.003.
DOI |
Google Scholar
21
-
Han, H.S., Lee, J.-N., & Seo, Y.-W. (2008). Analyzing the impact of a firm’s capability on outsourcing success: A process perspective. Information & Management, 45(1), 31–42. https://doi.org/10.1016/j. im.2007.09.004.
DOI |
Google Scholar
22
-
Hanafizadeh, P., & Zare Ravasan, A. (2018). A model for selecting IT outsourcing strategy: The case of e-banking channels. Journal of Global Information Technology Management, 21(2), 111–138. https://doi.org/10.1080/1097198x.2018.1462070.
DOI |
Google Scholar
23
-
Hanafizadeh, P., & Zareravasan, A. (2020). A systematic literature review on IT outsourcing decision and future research directions. Journal of Global Information Management, 28(2), 160–201. https://doi.org/10.4018/jgim.2020040108.
DOI |
Google Scholar
24
-
Hazra, A. (2017). Using the confidence interval confidently. Journal of Thoracic Disease, 9(10), 4125–4130. https://doi.org/10.21037/ jtd.2017.09.14.
DOI |
Google Scholar
25
-
HKMA (2021). Regtech Adoption Practice Guide. Hkma.gov.Hk. https:// www.hkma.gov.hk/media/eng/doc/key-information/press-release/20 21/20210617e5a1.pdf.
Google Scholar
26
-
Hodosi, G., & Rusu, L. (2019). IT outsourcing: Definition, importance, trends and research. In Risks, relationships and success factors in IT outsourcing. (pp. 1–9). Springer International Publishing.
DOI |
Google Scholar
27
-
Hodosi, G., Stark, A., van Beers, E., & Rusu, L. (2020). Factors for successful IT outsourcing relationships in large companies in Sweden: A service buyer’s perspective. In Information systems. (pp. 486–497). Springer International Publishing.
DOI |
Google Scholar
28
-
Hsu, P.-F., Ray, S., & Li-Hsieh, Y.-Y. (2014). Examining cloud computing adoption intention, pricing mechanism, and deployment model. International Journal of Information Management, 34(4), 474–488. https://doi.org/10.1016/j.ijinfomgt.2014.04.006.
DOI |
Google Scholar
29
-
IMF (2021). PEOPLE’S REPUBLIC OF CHINA–HONG KONG SPECIAL ADMINISTRATIVE REGION FINANCIAL SECTOR ASSESSMENT PROGRAM. Imf.org. https://www. imf.org/-/media/Files/Publications/CR/2021/English/1HKGEA202 1004.ashx.
DOI |
Google Scholar
30
-
Jain Palvia, S. C., & Palvia, P. (2017). Critical issues facing IT outsourcing vendors in India. In Global sourcing of services. (pp. 261–300). World Scientific/NOW Publishers.
DOI |
Google Scholar
31
-
Jatobá, M. N., Franco, M., & Rodrigues, M. (2022). The role of communication between partners in the process of strategic alliances: A systematic literature review. Journal of Business & Industrial Marketing, 38(7), 1511–1531. https://doi.org/10.1108/ jbim- 09- 2021- 0440.
DOI |
Google Scholar
32
-
Kallio, S. (2022, February 15). Finding the Right Sample Size (The Hard Way). Eval Academy. https://www.evalacademy.com/articles/ finding-the-right-sample-size-the-hard-way.
Google Scholar
33
-
Karimi-Alaghehband, F., & Rivard, S. (2020). IT outsourcing success: A dynamic capability-based model. Journal of Strategic Information Systems, 29(1), 101599. https://doi.org/10.1016/j.jsis.2020.101599.
DOI |
Google Scholar
34
-
Komaroff, E. (2020). Relationships between p-values and Pearson correlation coefficients, type 1 errors and effect size errors, under a true null hypothesis. Journal of Statistical Theory and Practice, 14(3), 5– 10. https://doi.org/10.1007/s42519-020-00115-6
DOI |
Google Scholar
35
-
Kosar, T., Bohra, S., & Mernik, M. (2018). A systematic mapping study driven by the margin of error. The Journal of Systems and Software, 144, 439–449. https://doi.org/10.1016/j.jss.2018.06.078.
DOI |
Google Scholar
36
-
Lee, J. -N. (2001). The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success. Information & Management, 38(5), 323–335. https://doi.org/10.1016/ s0378-7206(00)00074-4.
DOI |
Google Scholar
37
-
Luu, V. (2022, July 14). How to Avoid IT Outsourcing Failures. Bestarion. https://bestarion.com/how- to- avoid- it- outsourcing- failures/. Mardatillah, A., Raharja, S., Hermanto, B., Herawaty, T., & Miftahuddin, A. (2019). The importance of characteristic partnership as a sustainable competitive advantage: A perspective review. Proceedings of the Proceedings of 1st Workshop on Environmental Science, Society, and Technology, WESTECH 2018, December 8th, 2018, Medan, Indonesia.
Google Scholar
38
-
Mat, N., Langgat, J., Mansor, N. A., & Nenin, M. (2011). Performance monitoring effect of outsourcing: A case of Kuala Lumpur three stars hotel. ResearchGate. https://www.researchgate.net/publication/272356189_PERFORMANCE_MONITORING_EFFECT_OF_OUTSOURCING_A_CASE_OF_KUALA_LUMPUR_TH REE_STARS_HOTEL, https://doi.org/10.13140/2.1.4901.7123.
Google Scholar
39
-
Olaniyi, A. A. (2019). Scholar journal of applied sciences and research. Innovationinfo.org. http://innovationinfo.org/articles/SJASR/SJA SR-4-223.pdf.
Google Scholar
40
-
Pai, F. -Y., & Yeh, T. -M. (2015). The effects of interdependence and cooperative behaviors on buyer’s satisfaction in the semiconduc- tor component supply chain. Sustainability, 8(1), 2. https://doi. org/10.3390/su8010002.
DOI |
Google Scholar
41
-
Pereira, V., Munjal, S., & Ishizaka, A. (2019). Outsourcing and offshoring decision making and its implications for businesses–A synthesis of research pursuing five pertinent questions. Journal of Business Research, 103, 348–355.
DOI |
Google Scholar
42
-
Plugge, A., Bouwman, H., & Molina-Castillo, F.-J. (2013). Outsourcing capabilities, organizational structure and performance quality monitoring: Toward a fit model. Information & Management, 50(6), 275–284. https://doi.org/10.1016/j.im.2013.04.006.
DOI |
Google Scholar
43
-
Qi, C., & Chau, P. Y. K. (2015). Relationship or contract? Exploring the key factor leading to IT outsourcing success in China. Information Technology & People, 28(3), 466–499. https://doi.org/10.1108/ itp- 10- 2014- 0236.
DOI |
Google Scholar
44
-
Rhodes, J., Lok, P., Loh, W., & Cheng, V. (2016). Critical success factors in relationship management for services outsourcing. Service Busi- ness, 10(1), 59–86. https://doi.org/10.1007/s11628-014-0256-8.
DOI |
Google Scholar
45
-
Ried, L., Eckerd, S., Kaufmann, L., & Carter, C. R. (2022). From target to actor: Contagion of honesty and deception across buyer-supplier negotiations. Journal of Operations Management, 69(2), 261–283. https://doi.org/10.1002/joom.1212.
DOI |
Google Scholar
46
-
Rutberg, S., & Bouikidis, C. D. (2018). Focusing on the fundamentals: A simplistic differentiation between qualitative and quantitative research. Nephrology Nursing Journal: Journal of the American Nephrology Nurses’ Association, 45(2), 209–212. https://www. proquest.com/docview/2028125771?pq-origsite=gscholar&fromop enview=true.
Google Scholar
47
-
Santos, J. L. G. D., Erdmann, A. L., Meirelles, B. H. S., Lanzoni, G. M. D. M., Cunha, V. P. D., & Ross, R. (2017). Integração entre dados quantitativos e qualitativos em uma pesquisa de métodos mistos [Integration between quantitative and qualitative data in mixed methods research]. Texto & Contexto Enfermagem, 26(3), 1–9. https://doi.org/10.1590/0104-07072017001590016.
DOI |
Google Scholar
48
-
Schmidt, N., & Menth, L. (2016). Establishing information technology outsourcing relationship quality: A comparative repertory grid study. https://aisel.aisnet.org/ecis2016_rp/170.
Google Scholar
49
-
Shrestha, N. (2021). Factor analysis as a tool for survey analysis. American Journal of Applied Mathematics and Statistics, 9(1), 4–11. https://doi.org/10.12691/ajams- 9- 1- 2.
DOI |
Google Scholar
50
-
Statista (2022). IT Outsourcing—Hong Kong. Statista. https://www.statista.com/outlook/tmo/it- services/it-outsourcing/hong-kong.
Google Scholar
51
-
Sutthiparinyanon, P., & Villegas Puyod, J. (2022). The role of partnership quality, trust, perceived commitment and perceived risk on successful outsourcing relationship. Suranaree Journal of Social Science, 17(1), 1–11. https://doi.org/10.55766/hruk4070.
DOI |
Google Scholar
52
-
Taherdoost, H. (2017). Determining sample size; How to calculate survey sample size. https://papers.ssrn.com/abstract=3224205.
Google Scholar
53
-
Taponen, S., & Kauppi, K. (2020). Service outsourcing decisions— a process framework. Journal of Global Operations and Strategic Sourcing, 13(2), 171–194. https://doi.org/10.1108/jgoss- 02- 2019- 0012.
DOI |
Google Scholar
54
-
Tornatzky, L. G., & Fleischer, M. (1990). Processes of Technological Innovation. Free Press. University of Minnesota (2015). 1.2 what is communication?. In Business communication for success.
Google Scholar
55
-
University of Minnesota Libraries Publishing edition, 2015. This edition adapted from a work originally produced in 2010 by a publisher who has requested that it not receive attribution.
Google Scholar
56
-
Wibisono, Y. Y., Govindaraju, R., Irianto, D., & Sudirman, I. (2019). Managing differences, interaction, and partnership quality in global inter-firm relationships: An empirical analysis on offshore IT out-sourcing. International Journal of Managing Projects in Business, 12(3), 730–754. https://doi.org/10.1108/ijmpb-04-2018-0074.
DOI |
Google Scholar
57
-
Zhong, F., & Myers, M. D. (2016). Client-vendor relationships in cloud computing: Lessons from it outsourcing. https://aisel.aisnet.org/ pacis2016/138/.
Google Scholar
58
Most read articles by the same author(s)
-
Wing Ying Mo,
Xiaofen Xu,
A Study on the Consumers’ Satisfaction Extension for Self-service Technology and the Role of Demographic Characteristics in Hong Kong Fast-food Restaurants During the COVID-19 Epidemic , European Journal of Business and Management Research: Vol. 8 No. 6 (2023)