Outsourced Information Systems Failures in SMEs: a Multiple Case Study
Keywords:
IS outsourcing, SMEs, IS failures, Principal Agent theory, Organisational and Personal TrustAbstract
Since the 1980s, a number of frameworks have been proposed for understanding the concept of information system (IS) failure. Two approaches to IS failures seem particularly important: the concept of Expectation Failure and the concept of Termination Failure. We argue that there is an extra dimension to the problem that is not covered by those descriptive models, which we call the Outsourced IS Failure (OISF). To explain the OISF we draw on agency theory, which views the problems that occur in outsourced environments as the results of three factors: goal differences, risk behaviour differences and information asymmetry. Although the (positivistic) agency theory has already been used to describe phenomena of failure in IT relations there is still a lack of empirical evidence. This paper brings the results of the attempts of falsification of the agency theory in situations of OISF. A positivistic case study research was conducted based on multiple cases in SMEs. The choice for qualitative research is based on the accessibility of well documented secondary data in litigation files of failed IS projects. Eight cases of IS project failures subject to litigation were selected. We conclude that the agency theory has strong prediction and explanation power for OISF. However some adjustments are needed to the agency theory. The theory seems to work in two ways, opportunistic behaviour is also observed on the side of the principal. The findings indicate that lack of trust is a prominent determinant for failure.Downloads
Published
Issue
Section
License
Open Access Publishing
The Electronic Journal of Information Systems Evaluation operates an Open Access Policy. This means that users can read, download, copy, distribute, print, search, or link to the full texts of articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. The only constraint on reproduction and distribution, and the only role for copyright in this domain, is that authors control the integrity of their work, which should be properly acknowledged and cited.
This Journal is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
