J. Serv. Sci. & Management. 2008, 1: 1-9
Published Online June 2008 in SciRes (www.SRPublishing.org/journal/jssm)
Copyright © 2008 SciRes JSSM
BBA Decision Model for Information Systems Outsourcing:
Using a Multicriteria Method
Jian-Jun WangP
1
P, Zheng-Kui LinP
2
P and Hao HuangP
3
P
1
PSchool of Ma n agement, Dalian Univ ersity of Te chnology, Dalian 116024, P.R .China
P
2
PSchool of Computer Science & Technology, Dalian Maritime University, Dalian 116026, P.R.China
P
3
PSchool of Economic a n d Management, Beihang University, Beijing 100083, P.R.China
ABSTRACT
An ever-increasing trend in today’s firms is to exploit outsourcing for those information systems (IS) functions deemed
to be outside the company’s core competence. Given the multi-attribute nature of IS outsourcing decision, this paper
argues that five facto rs, including, strategy, economics, risk, environment an d quality, should be con sidered for IS out-
sourcing decisions, and proposes the use of analytic hierarchy process (AHP) and improved ELECTREIII as aids in
making IS outsourcing decisions. The AHP is used to analyze the structure of the outsourcing problem and determine
weights of the criteria, and the improved ELECTREIII method is used for final ranking. It shows by means of an appli-
cation that the hybrid method is very well suited as a decision-making tool fo r the IS outsourcing decision. Finally, po-
tential issues for future research are presented.
Keywords: Information systems outsourcing, Multiple criteria analysis, AHP, ELECTREIII
1. Introduction
Information systems (IS) outsourcing can be defined as “a
significant contribution by external vendors in the physi-
cal and/or human resources associated with the entire or
specific components of the IS infrastructure in the user
organization”[1]. IS outsourcing is a growing phenome-
non in a wide variety of industries. According to the
Gartner Group, overall spending in information technol-
ogy (IT) outsourcing reached177 billion in 2003, and it
is predicted to rise to236 billion in 2007(Oh, 2005).
Yet in many cases, outsourced IS projects have failed. For
example, in one study, IS managers reported only a 33%
satisfaction with outsourced IS services, as compared
with a satisfaction rate of 70%-80% for outsourced
non-IS services [2 ]. Wrong IS outsourcing decision is one
of critical reasons which cause the high IS outsourcing
failure [3]. Therefore, the scientific IS outsourcing deci-
sion process is very important to increase the success rate
of outsourcing. The problem of how to scientifically
make the IS outsourcing decisions tends to be an impor-
tant issue facing organizations in today’s rapidly chang-
ing business environment [4].
Business practitioners recognize that IS outsourcing is
one of the m any t ools in thei r toolki t to desi gn and m anage
their business and potentially has a place in most strategic
plans. Although there is a wealth of academic literature
examining outsourcing, it generally addresses the decision
whether or not to outsource: the go/no go choice. There is
little academic literature that address the IS outsourcing
decision in a quantitative way. This paper will apply a
hybrid of analytic hierarchy process (AHP) and improved
ELECTRE III methods to the “IS outs o urcing decision” in
an effort to demonstrate one quantitative approach to this
complex decision.
The remainder of this paper is organized into five sec-
tions. Section 2 presents a brief literature review of the
existing decision models related to the IS outsourcing
decision. Section 3 will briefly describe the two proposed
methodologies. In section 4 we argue five factors pro-
posed as the p rincipal criteria for outsourcing decision . In
Section 5 a description of proposed methodology is fol-
lowed by an application. In Section 6, we present our
conclusions a nd future rese arch.
2. Literature Review
A number of decision frameworks appear in academic
literature to support the outsourcing decision-making
process. Lacity, Willcocks and Feeny (1996) argued that
deciding the outsourcing of IT activities just by strategic or
commodities was fallacious and senior executives might
mistakenly classify all IS activities as commodities.
Therefore, they presented a 2x2 decision matrix guiding
the selection of outsourcing candidates based on the
business, economic, and technical factors[5].
Venkatraman (1997) viewed information technology as
a portfolio of IS elements that were cost centers, service
centers, investment centers and profit centers (which are
collectively referred to as an IS “value centers”). His focus
on “four i ndep endent source s of val ue from IS resource ” is
useful for i dentifyi ng IS elem ents that might be conside red
for outsourci n g [6] .
2 Jian-Jun Wang, Zheng-Kui Lin and Hao Huang
Copyright © 2008 SciRes JSSM
Yang and Huang (2000) argued that five factors, in-
cluding m anagem en t, strat egy, econom ics, technolo gy a nd
quality, should be considered for outsourcing decision,
then they used the analytic hierarchy process (AHP)
method to help users in structuring the outsourcing prob-
lems[7].
Roy and Aubert (2002) presented an IT outsourcing
decision model based on the resource theory[8]. Hsu et al
(2004) analyzed the IS outsourcing decision problems by
case-based reasoning (CBR) method[9]. Aubert et al
[2004] proposed an IT outsourcing decision model relied
on transaction costs and incomplete contracts theo-
ries[10].
According to the above-mentioned literature, research-
ers put so many outsourcing decision strategies and de-
terminants to practitioners, but current practice remains in
the stage of conceptual discussion as to how to outsource
the IS activities. Furthermore, only the AHP method offers
a quantitative magnitude for judgment among these
strategies and determinants. But AHP approach has the
disadvantage that the number of pairwise comparisons to
be made, may become very large (more specifically:
n(n-1)/2). Another critical disadvantage of the AHP
method is that compensation betwee n good scores on som e
criteria and bad scores on other criteria can occur. Other
strategies or determinants, for instance, decision matrix,
transaction cost or CBR method, are too narrow to help the
practitioners determine if their systems could be out-
sourced or to examine the priorities among ma ny pote ntial
IS outsourcing projects. Ineffectiv e outsourcing activities,
derived from improper strategy or method, would lead to
loss core competencies and capabilities, exposure to un-
expected risk and business failures.
Facing the problem of how to decide the priority of
those IS which have been decided to outsource, we pro-
pose a hybrid multi-criteria decision method for the IS
outsourcing decision making. We shall use the AHP
method to anal yze the structure of the outso urcing problem
and determine the weights of criteria, and use the improved
ELECTRE III method for final ranking. The purpose of
this work is to offer a quantitative d ecision mod el that can
help practitioners set priority and reap the most benefits
from outsourcing.
3. The AHP and Electre III Method
3.1. The AHP Method
The AHP, developed by Saaty (1980)[11], is a technique
for considering data or information about a decision in a
systematic manner [12]. The AHP mainly addresses how
to solve decision problems with uncertainty and with
multiple criteria characteristics. It is based on three prin-
ciples: first, constructing the hierarchy; second, priority
setting, and third, logical con sistency.
3.1.1. Construction the hierarchy
A complex decision problem, centered round measuring
contributions to an over objective or focus, is structured
and decomposed in to sub-problems (sub-objectives, crite-
ria, alternatives, etc), within hierarchy.
3.1.2. Priori ty setting
The relative “priority” given to each element in the hier-
archy is determined by comparing pairwise the contribu-
tion of each element at a lower level in terms of the crite-
ria (or elements) with a causal relationship exists. In AHP
multiple paired comparisons are based on a standardized
comparison scale of nine levels (see Table 1, Saaty 1980).
Table 1. Scale of Relative Importance
Intensity of impor-
tance Definition
1 Equal importance
2 Weak
3 Moderate importance
4 Moderate plus
5 Strong importance
6 Strong plus
7 Very strong or demon-
strated importance
8 Very, very strong
9 Extreme importance
Let 1, 2,,{}
j
j
nCC==Lbe the set of criteria. The re-
sult of the pairwise comparison on n criteria can be sum-
marized in a ()nn
×
evaluation matrix
A
in which every
element ij
ais the quotient of weights of the criteria, as
shown in (1).
(),(, 1,,)
ij
A
aijn
=
=L (1)
The relative priorities are given by the right eigenvec-
tor (w) corresponding to the largest eigenvector (max
λ
),
as shown in (2).
max
Aw w
λ
=
(2)
In case the pairwise comparisons are completely con-
sistent, the matrix
A
has rank 1 andmax n
λ
=. In that
case, weights can be obtained by normalizing any of the
rows or columns of matrix
A
.
The procedure described above is repeated for all sub-
systems in the hierarchy. In order to synthesize the vari-
ous priority vectors, these vectors are weighted with the
global priority of the parent criteria and synthesized. This
process starts at the top of the hierarchy. As a result, the
overall relative priority to be given to the lowest level
elements is obtained. These overall, relative priorities
indicate the degree to which the alternatives contribute to
the focus. These priorities represent a synthesis of the
local priorities, and reflect an evaluation process that
permits to integrate the perspectives of the various stake-
holders involved [13].
A Decision Model for Information Systems Outsourcing: Using a Multicriteria Method 3
Copyright © 2008 SciRes JSSM
3.1.3. Consi s tency check
A measure of consistency of the given pairwise compari-
son is needed. The consistency is defined by the relation
between the entries of A:ij jkik
aa a
=. The “consis-
tency index” (CI) is given by (3).
max
CI() / (1)nn
λ
=− −
(3)
The final consistency ratio (CR), on the basis of which
one can conclude whether the evaluations are sufficiently
consistent, is calculated as the ratio of the consistency
index (CI) and the random consistency index (RI), as in-
dicated in (4). The number 0.1 is the accepted upper limit
for CR. If the final consistency ratio exceeds the number,
the evaluation procedure has to be repeated to improve
consistency. The measurement of consistency can be used
to evaluate the consistency of decision makers as well as
the consistency of all the hierarchy.
CR=CI/RI (4)
3.2. The ELECTRE III Method
3.2.1. The normal ELECTRE III method
ELECTREIII method is a non-compensatory, MCDM
technique. It uses various mathematical functions to indi-
cate the degree of dominance of one alternative or group
of alternatives over the remaining ones. It also facilitates
comparisons between alternative schemes by assigning
weights to decision criteria. The outranking relationships
between alternatives are constructed and exploited even-
tually.
A discrete multiple criteria decision making problem is
usually formulated by a set of alternatives
{
}
12
,,,
n
X
xx x=L, a
set of criteria
{
}
12
,,,
m
Ccc c=Land a set of func-
tions
{
}
12
,,,
m
Ggg g=L. The real-valued functions de-
fined on the setXso that()
lj
g
xrepresents the perform-
ance of the alternativej
x
on the criterionl
c. Without loss
of generality we assume that all the objective functions
are to be maximized.
A pseudo-criterion is a preference model including
three different thresholds: a preference threshold
(())
llj
pgx , an indifference threshold (())
llj
qgx and a
veto threshold(( ))
llj
vgx for each criterion
{
}
12
,,,
m
Ccc c=L. These thresholds may be constants, lin-
ear or affine functions of()
lj
g
x in the form [14].
,,
(()) ()
lljpl pllj
pgx gx
α
β
=+
and ,,
(()) ()
lljql qllj
qgx gx
α
β
=+
For every criterionl
c, the preference and indifference
threshold model is as follows. i
x
is preferred toj
x
if
()()(())
lil jl l j
g
xgxpgx
+
f
i
x
is weakly preferred toj
x
if
() (())()()(())
lj lljliljllj
g
x qgxgx gxpgx
+
≤+p, and i
x
is
indifferent toj
x
if
() (())()
lj lljli
g
xqgx gx
+
and
() (())()
lil lil j
g
x qgxgx
+
Where (( ))
llj
pgx and (())
llj
qgx are preference
and indifference thresholds, respectively and
(()) (())0
llj llj
pgx qgxff
. Weak preference is sup posed to
describe the decision maker’s hesitation between indif-
ference and preference.
In ELECTRE III method, one considers an outranking
degree (,)
ij
Sx xdescribing the outranking credibility
of i
x
over j
x
taking its values between 0 and 1. The value
of (,)
ij
Sx xis defined based on so-called concordance
and discordance indices. A concordance index
(, )
ij
Cx xis computed for each pair of alterna-
tives(, )
ij
x
xby
1
1
(, )(, )
m
ij llij
l
Cx xwc x x
w=
= (5)
Where (1,,)
l
wl m
=
Lis the weight of each criterion,
and
1
m
l
l
ww
=
=
(6)
()
(
)()()
(
)
() ()()
()
()()()
()
()() ()()
−+
≤+
≥+
=
otherwis
e
0
1
,
illill
jlilill
jlillil
jlillil
jil
xgqxgp
xgxgxgp xgxgpxg
xgxgqxg
xxc (7)
A discordance index(, )
lij
dxxis defined for each crite-
rion l
cby
()
(
)()()
()
() ()()
()
()
() ()()
()() ()()
−−
≥+
≤+
=
otherwise
0
1
,
illill
illiljl
jlillil
jlillil
jil
xgpxgv
xgpxgxg
xgxgpxg
xgxgvxg
xxd (8)
where(())
lli
pgx is the preference threshold value and
(())
lli
vgx is the veto threshold value of each l
c
and (()) (())
llilli
vgx pgxf.
4 Jian-Jun Wang, Zheng-Kui Lin and Hao Huang
Copyright © 2008 SciRes JSSM
Finally, the degree of outranking is defined by
()
(
)
(
)
(
)
() ()
()()
()
∀≤
=
jixxJl ji
ji
jil
ji
jijilji
ji xxJ
xxC
xxd
xxC
lxxCxxdxxC
xxS
,
,
,1
,1
,
,,,
,
(9)
where (, )
ij
J
xx is the set of criteria for which
(, )(, )
li ji j
dxx Cxxf. The complete set of outranking
degree is assembled as shown in the following credibility
matrix
S
.
11 121
21 222
12
(,)(, )(, )
(,) (,)(,)
(,) (,)(,)
n
n
nn nn
Sx xSx xSx x
Sx xSx xSx x
Sx xSx xSx x
⎡⎤
⎢⎥
⎢⎥
=⎢⎥
⎢⎥
⎣⎦
L
L
MMMM
L
S (10)
The ranking of the decision alternatives in ELECTRE
III is carried out by a distillation procedure, where the
alternatives are ranked based on their qualification from
the best to the worst (descending distillation process) and
from the worst to the best (ascending distillation proc-
ess).The final partial order of the alternatives is built
based on these two complete orders. The descending dis-
tillation process is as follows.
Let ,
max( ,)
ij ij
xx X
Sx x
λ
=. Determine a “credibility
value” such that only values of (, )
ij
Sx xthat are suffi-
ciently close to
λ
are considered; that is, ()
s
λ
λ
. Thus
if 1
λ
=, let()0.15s
λ
=. Define the matrixTas:
1if (,)()
(, )0otherwise
ij
ij
Sx xs
xx
λ
λ
=
f
T (11)
Further, define the qualification of each alternative
−− )(i
xQ as the number of alternatives that are out-
ranked byi
x
minus the number of alternatives which out-
rank i
x
.()
i
Qx is simply the row minus the column sum of
the matrixT. The set of alternatives having the largest
qualification is the first distillate of1
D
. If 1
D
contains
only one alternative, repeat the previous procedure
with 1
\XD
.Otherwise, apply the same procedure in-
side 1
D
. If distillate2
D
contains only one alternative, the
procedure is started in12
\
D
D(unless the set is empty);
otherwise it is applied within2
D
, and so on until 1
D
is
used up. The procedure is then repeated starting
with 1
\XD
. The outcome is the first preorder.
The ascending distillation is carried out in a similar
fashion except that alternatives with the smallest (rather
than the largest) qualification are retained first.
3.2.2. An improved ranking method for ELECTRE III
The normal ranking of ELECTRE III requires an addi-
tional threshold to be introduced. The weakness of this
handing is that the ranking of the alternatives depends on
the size of this threshold for which there exists no “cor-
rect” value. Additionally, the final ranking is not com-
plete.
Aiming at the ranking problems in ELECTRE III, we
present a new ranking method by introducing three defi-
nitions concordance credibility degree, discordance
credibility degree and net credibility degree, into ELEC-
TRE III method.
Definitions
The concordance credibility degree is defined by
()(, ),
j
iiji
xX
x
Sx xxX
Φ
+
=
∀∈
(12)
The concordance credibility degree is the measure of
the outranking character ofi
x
(how i
x
dominates all the
other alternatives of
X
)
The discordance credibility degree is defined by
() (,),
j
ijii
xX
x
Sx xxX
Φ
=
∀∈
(13)
The discordance credibility degree gives the outranked
character of i
x
(how i
x
is dominated by all the other al-
ternatives ofX)
The net credibility degree is defined by
()() (),
iiii
x
xxxX
ΦΦ Φ
+−
=
−∀∈
(14)
The net credibility degree represents a value function,
where a higher value reflects a higher attractiveness of
alternative i
x
.
Final ranking
All the alternatives can be completely ranked by the net
credibility degree.
An application
This application is based on a real-life case study where
the ELECTRE III method was use to help choose route
for Dublin port motorway [15].
The first credibility matrix in [15] is as follows:
A Decision Model for Information Systems Outsourcing: Using a Multicriteria Method 5
Copyright © 2008 SciRes JSSM
B2/B3B4B6B5/7itB5/7btB5/7htB8
B2/B30.625 0.750.8750.8750.875 0.875
B40.8751110.875 0.875
B60.8751110.875 0.875
B5/7it0.8750.875 0.8750.8750.8750.875
B5/7bt 0.8751110.875 0.875
B5/7ht0.750.875 0.8750.8750.87
=
1
S
51
B80.688 00000
⎡⎤
⎢⎥
⎢⎥
⎢⎥
⎢⎥
⎢⎥
⎢⎥
⎢⎥
⎢⎥
⎢⎥
⎢⎥
⎢⎥
⎣⎦
The final ranking based on the normal method is as
follows [15]:
{B4,B6,B5/7bt} {B2/B3,B5/7hb} {B5/7it,B8}→→
With 1
S
and (12)-(14) leads to the final values of con-
cordance credibility degree, discordance credibility de-
gree and net credibility degree of alternatives in Table 2.
Table 2. Degrees of alternatives (1
S)
Φ
+
Φ
Φ
B2/B3 4.875 4.938 063.0
B4 5.625 4.375 1.25
B6 5.625 4.5 1.125
B5/7it 5.25 4.75 0.5
B5/7bt 5.625 4.625 1
B5/7ht 5.25 4.375 0.875
B8 0.688 5.375 687.4
The final ranking based on the new method is as fol-
lows:
B4 B6B5/7bt B5/7htB5/7it
B5/7itB2/B3 B8
→→ → →
→→
The second credibility matrix in [15] is as follows:
2
B2/B3B4B6B5/7it B5/7bt B5/7htB8
B2/B30.45 0.610.810.81
B40.931110.93 0.93
B60.931110.93 0.93
B5/7it0.930.970.970.970.930.93
B5/7bt 0.931110.93 0.93
B5/7ht0.750.82 0.820.820.821
B80.69 00000
⎡⎤
⎢⎥
⎢⎥
=
⎣⎦
S
The final ranking based on the normal method is as
follows [15]:
{B4,B6,B5/7it,B5/7bt} B5/7htB2/B3 B8→→→
With2
S
and (12)-(14) leads to the final values of con-
cordance credibility degree, discordance credibility de-
gree and net credibility degree of alternatives in Table 3.
The final ranking based on the new method is as fol-
lows:
B4B6B5/7bt B5/7it B5/7ht
B5/7htB2/B3 B8
→→→ →
→→
From above comparison, the final r anking based on the
new method is complete ranking, while the normal is par-
tial ranking.
Table 3. Degrees of alternatives (2
S)
Φ
+
Φ
Φ
B2/B3 4.29 5.16 87.0
B4 5.79 4.24 1.55
B6 5.79 4.4 1.39
B5/7it 5.7 4.63 1.07
B5/7bt 5.79 4.6 1.19
B5/7ht 5.03 4.53 0.5
B8 0.69 5.52 83.4
The normal ranking method of ELECTRE III suffers
from the complicated ranking process, which requires an
additional threshold to be introduced. The weakness of
this handing is that the ranking of the alternatives depends
on the size of this threshold for which there exists no
“correct” value. Additionally, the normal ranking method
also suffers from incomplete ranking result. Aiming at the
ranking problems in ELECTRE III, the present research
develops a new ranking method. Compare to the normal
ranking method, the new ranking method is simple and
ranking result is complete.
4. Performance Criteria
There have been a lot of attempts to find out all factors of
outsourcing decision, but the problem has not been theo-
retically solved. The choice of factors has be en selected in
agreement with a group of experts and managers. Another
group might have selected a somewhat different set of
factors. Firms should select all factors which can affect
organizations benefit as possible as they can. A careful
examination of factors used before concludes that five
dimensions, strategy, economics, risk, environment and
quality, should be included.
4.1. Strategy
TFor strategy, firms need to focus on their core activities
and outsource noncore activities. IS outsourcing allows
management to focus available IS talent on important and
strategic IT applications rather than the mundane and rou-
tine activities. The internal operations and outsourced
operations should then work in unions striving to opti-
mize flexibility and responsiveness to customer and in-
ternal needs, and minimize unnecessary paperwork and
bureaucracy. In addition, the firms can make strategic
alliance with vendors to make up the shortage of re-
sources; resources include new technologies and profes-
sional workers. From strategic alliances, the firm even
can develop and market new products. Other strategic
consideration includes sharing risks and accelerating the
time of product to market [5][7][16][17][18][ 19]T.
6 Jian-Jun Wang, Zheng-Kui Lin and Hao Huang
Copyright © 2008 SciRes JSSM
4.2. Economics
For economics, the major consideration of a firm is to
reduce costs of information systems. Because the vendors
have a better management skill as well as higher produc-
tivity per employee, the costs can be reduced. Meanwhile,
Because of the scale of economics vendors have invested
in the hardware, software and human resources, the cost
can be reduced. Another consideration of economics is
financial flexibility. Because of outsourcing, the facilities
and employee would be transferred to the vendor side,
which transform fixed costs into variable costs, resulting
in increasing financial flexibility [7][9][20][21].
4.3. Risk
For risk, it is rare to experience opportunities in organiza-
tional life where the managerial actions taken to produce
benefits are not associated with potential risks either. This
is most certainly the case with IS outsourcing. The most
prominent risks in outsourcing are information security
concerns an d loss of management co ntrol. Khalfan [2004]
noted theses two factors were coupled with hidden costs
in outsourcing [22].
If a labor union exists, a firm should first explore its
negative effect before deciding to outsource, since out-
sourcing is accompanied with some possibility of layoffs.
Companies often have to deal with low employee morale
as a result of outsourcing, and low employee morale in
turn affects productivity. It has been noted that often a
large proportion of IT staff are laid off as a consequence
of an outsourcing contract. This can cause a lot of distur-
bance in the client company.
Other risks that have to be dealt with include: loss of
core competence, loss of internal technical knowledge,
loss of flexibility, damaging the firm’s innovative capa-
bility, increasing information services management com-
plexity, etc [23][24]. As being the factors with benefits,
these risks factors should not be ignored in outsourcing
activities [25] [26].
4.4. Environment
Quinn and Hilmer [1994] indicated that environment fac-
tors such as market maturity, market depth, and the num-
ber of suppliers influences the level of outsourcing [16].
There are times when contestability explains market ma-
turity; a contestable market means that while only a few
firms can immediately provide the service now, many
other firms are intending to provide the service if the
price paid by the firm exceeds the average cost of vendors.
In addition, the decision to outsource may be induced by
imitative behavior among firms [27]. For example, Ko-
dak’s outsourcing decision made many other firms begin
to consider IS outs o urci n g as a viable alternative [28].
4.5. Quality
TFor quality, because vendors may have access to more
technological environments, have more qualified or more
motivated personnel, provide a greater breadth of services,
and simply be more committed than internal staff to mak-
ing the alliance with the customer work well, outsourcing
can improve the quality and services of the internal IS
department. Therefore, good quality of service and good
relationship are the significant success factors of out-
sourcing [7] [25[29].
5. An Application
Based on IS outsourcing decision problem presented in
Section 1, an example is used to illustrate how the com-
bined AHP and improved ELECTREIII model support
decision maker on the IS outsourcing decision making.
5.1. The Problem Faced
A bookstore wants to outsource parts of IT functions, they
think about the management and cost issues and want to
know how to decide which systems should be outsourced
first.
The candidate systems for outsourcing are facilities
management (P1), development of internet homepage
(P2), maintenance of the customer relationship manage-
ment information system (P3), development of the sup-
plier relationship management information system (P4),
development and maintenance of the online transaction
processing system (P5).
The leader of the task force is the vice president, while
members include IS department manager, a senior engi-
neer, business department manager, finance department
manager, planning department manager and five profes-
sional consultants. The vice president convened a meeting
to discuss this problem. After some discussion, they em-
ploy the hybrid of AHP and ELECTRE III methods in the
decision process.
5.2. Structure of the Problem
After some debate, according to the AHP method, the
Figure 1. The Hierarchy Structure of the
Problem
Outsourcing
candidate 1Outsourcing
candidate 2 Outsourcing
candidate 5
Select the
outsourcing system
Qual-
it
y
Strategy Environment Economics Risk
A Decision Model for Information Systems Outsourcing: Using a Multicriteria Method 7
Copyright © 2008 SciRes JSSM
task force depicts a hierarchy structure as shown in Figure
1.
5.3. Determination of the Weights
Following the computing method described in the AHP,
experts began to compare the factors of the structure. Af-
ter that, they got the square matrix as shown in Table 4.
Table 4. The Square Matrix.
(C1- Strategy; C2- Economics; C3- Environment;C4-
Risk;C5- Qu a lity)
C1 C2 C3 C4 C5
C1 1 3 4 2 4
C2 1/3 1 1 1/3 1
C3 1/4 1 1 1/3 1
C4 1/2 3 3 1 3
C5 1/4 1 1 1/3 1
According to (1)-(4), we got
max 5.0394
λ
=
RI=1.12
CR=0.0088<0.1
(0.41,0.11,0.10,0.28,0.10)w=
5.4. Evaluation of Alternatives
All outsourcing candidates were evaluated by experts.
According to the criteria of strategy, environment, risk
and quality, a qualitative impact value is used, expressed
on a qualitative scale (judgment on a series of ordered
semantic values; each semantic value included in the set
{very weak, weak, common, good, very good} is associ-
ated with a numerical value {1, 3, 5, 7, 9}, that is used for
the calculations.). The economics indicator is evaluated
by the following formula:
Saving costs / Costs of in house development and
maintenance (%).A55×matrix was produced, as shown in
table 5.
Table 5. Evaluation Matrix (C1- Strategy; C2-
Economics; C 3- Environment;C 4- Ri sk ;C 5- Quality)
Criteria C1 C2 C3 C4 C5
Max/Min Max Max Max Min Max
Weight 0.41 0.11 0.10 0.28 0.10
P1 9 15 9 1 9
P2 7 12 7 3 7
P3 3 8 3 7 3
P4 7 15 5 5 7
P5 7 10 7 7 5
5.5. Final Ranking
Before using the ELECTRE III method to calculate the
indices, for each criterion’s thresholds is defined (see
table 6).
Table 6. The Thresholds of Each Criterion
q p v
Strategy 2 3 8
Economics 2 4 8
Environment 2 3 4
Risk 2 3 7
Quality 2 3 6
According to (5)-(9), we get the outranking degree
matrix
S
:
11111
0.9411 0.941
0010.150
01111
0.260.7210.891
=
S
According to (12)-(14), we got the values of leaving,
entering and net flows and the complete ranking of alter-
natives in table 7 and in figure 2.
The priorities for outsourcing the five IS are in the fol-
lowing order: facilities management (P1), development of
internet homepage (P2), development of the supplier rela-
tionship management information system (P4), develop-
ment and maintenance of the online transaction process-
ing system (P5), maintenance of the customer relationship
management information system (P3). If the bookstore
want to outsource two IS activities first, we know that the
facilities management and development of internet
homepage would be outsourced.
Table 7. Values of Leaving, Entering and Net Flows
Φ
+
Φ
Φ
P1 4 1.20 2.80
P2 3.88 2.72 1.16
P3 0.15 4 -3.85
P4 3 2.98 -0.02
P5 2.87 3 -0.13
6. Conclusions and Future Researches
IS outsourcing is emerging as a flexible and powerful
P1 P2 P4 P5 P3
Figure 2. Final Ranking
8 Jian-Jun Wang, Zheng-Kui Lin and Hao Huang
Copyright © 2008 SciRes JSSM
management approach chosen by managers to achieve a
wide range of tactical and strategic goals. Outsourcing
firms benefit from cost savings, strategic fitness, im-
proved management effectiveness, technology upgrade,
and the service quality of IS. Moreover, one needs an
operational decision model that can offer systematic steps
and quantitative results to increase the precision of deci-
sion-making.
This study suggests a decision model for IS outsourc-
ing adoption for management, and shows how it may be
applied in a real decision process for IS outsourcing. This
research also argues that firms need to consider more di-
mensions, including economics, strategy, risk, environ-
ment and quality factors. Meanwhile, we offer a decision
model, which developed by AHP and improved ELEC-
TRE III methods, to help the practitioners make better
decisions. Our approach allows to deal with IS outsourc-
ing project selection involving several conflicting per-
formance criteria (qualitative as well quantitative). The
proposed decision model can help practitioners analyze
factors and attributes easily. Because it is a quantitative
process, the practitioners can make better decisions and
obtain better results from outsourcing.
While it has successfully developed the decision model
for IS outsourcing, and with most research efforts, this
study is not without limitations. First, the case study just
based on a small firm. Second, the AHP and ELECTRE
III methods also have their own limitations; such as, in
order to get more professional results, the use of more
advance form of AHP method would be desirable. In ad-
dition, the determinants in the decision model are not
complete. Further studies need to include additional pos-
sible factors through a more extensive literature review
and empirically investigation.
7. Acknowledgements
This work is partially supported by a grant from National
Science Fund for Distinguishe d Young Scholars of Ch ina
(No. 70725004).
The authors also thank the anonymous referees for im-
proving the quality of the paper with their precious and
careful remarks.
REFERENCES
[1] Loh, L., & Venkatraman, N, “Determinants of in-
formation technology outsourcing: a cross-sectional
analysis”, Journal of Management Information Sys-
tems, 1992, 9(1), 7-24.
[2] King, W.R, “Developing a sourcing strategy for IS:
A behavioral decision process and framework”,
IEEE Transaction Engineering Management, 2001,
48(1), 15-24
[3] Wu, F., & Li, H.Z, “The effect of knowledge man-
agement on the successful outsourcing of IT/IS”,
Science Research M a na gement, 2004, 25(2), 82-87.
[4] Lee, Jae-N, “The impact of knowledge sharing, or-
ganizational capability and partnership quality on IS
outsourcing success”, Information & Management,
2001, 38, 323-335.
[5] Lacity, M.C., Willcocks, L.P., & Feeny, D.F, “The
value of IT sourcing”, Sloan Management Review,
1996, 37(3), 13-25.
[6] Venkatraman, N, “Beyond outsourcing: Manage-
ment IT resources as a value center”, Sloan Man-
agement Review, 1997, 38(3), 51-64.
[7] Yang, C., & Huang, J, “A decision model for IS
outsourcing”, International Journal of Information
Management, 2000, 20(3), 225-239.
[8] Roy, V., & Aubert, B, “A resources-based analysis
of IT sourcing”, ACM SIGMIS Database, 2002,
33(2), 29-40.
[9] Hsu, C.I., Chiu. C., & Hsu, P.L, “Predicting infor-
mation systems outsourcing success using a hierar-
chical design of case-based reasoning”, Expert Sys-
tems with Application, 2004, 26(3), 435-441.
[10] Aubert, B.A., River d, S., & Patry, M, “A transaction
cost model of IT outsourcing”, Information & Man-
agement, 2004, 41, 921-932.
[11] Saaty, T. L, The analytic hierarchy process. New
York: McGraw Hill, 1980.
[12] Schniederjans M J, Garvin T. “Using the analytic
hierarchy process and multi-objective programming
for the selection of cost drivers in activity-based
costing,” European Journal of Operational Re-
search, 1997, 100: 72 - 80 .
[13] Macharis C, Springael J, De Brucher K, Verbeke A.
“PROMETHEE and AHP: the design of operational
synergies in multicriteria analysis. Strengthening
PROMETHEE with ideas of AHP,” European
Journal of Operational Research, 2004, 153(2):
307-317.
[14] K. Miettinen, P. Salminen, “Decision-aid for dis-
crete multiple criteria decision making problems
with imprecise data”, European Journal of Opera-
tional Research, 1999, 119: 50-60.
[15] M. Rogers, M. Bruen, “Using ELECTRE III to
choose route for Dublin fort motorway”, Journal of
Transportation Engineering, 2000, 126(4):
313-326.
[16] Quinn, J.B., & Hilmer, F.B, „Strategic outsourcing”,
Sloan Management Review 1994, 35(4), 43-55.
[17] Quinn, J.B, “Strategic outsourcing”, Sloan Man-
agement Review, 1999, 40(4), 23-26.
[18] Gilley, K.M., & Rasheed, A, “Making more by do-
ing less: Analysis of outsourcing and its effects on
firm performance”, Journal of Management, 2000,
26, 763-790.
[19] Avgerou, C., & Cornford, T, Developing Informa-
tion Systems: Concepts, Issues and Practice (2nd
edn). Basingstoke: Macmillan; 1998.
A Decision Model for Information Systems Outsourcing: Using a Multicriteria Method 9
Copyright © 2008 SciRes JSSM
[20] McFarlan, F.W., & Nolan, R.L, “H ow to manage an
IT outsourcing alliance”, Sloan Management Review,
1995, 36(2), 9-23.
[21] Collins, J., Millen. R., & Beamish, P, “Information
systems outsourcing by large American industrial
firms: Choice and impact”, Information Resources
Management Journal, 199 5, 8( 1) , 5-13.
[22] Khalfan, A.M, “Information security considerations
in IS/IT outsourcing projects: a descriptive case
study of two sectors” International Journal of In-
formation Management, 2004, 24, 29-42.
[23] Bahli, B., Rivard, S, “Validating measures of infor-
mation technology outsourcing risk factors”, Omega,
2005, 33(2): 175-187.
[24] Osei-Bryson, K. Muata., Ngwenyama, O. K, “Man-
aging risks in information systems outsourcing: An
approach to analyzing outsourcing risks and struc-
turing incentive contracts”, European Journal of
Operational Research, 2006, 174(1): 245-264.
[25] Clark, T., Zmud, R., & McCray, G, “The outsourc-
ing of information services: transforming the nature
of business in the information industry”, Journal of
Information Technology, 1995, 10(4), 221-237.
[26] Earl, M.J, “The risks of outsourcing IT”, Sloan
Management Review, 1996, 37(3), 26-32.
[27] Lacity, M.C., Herschheim,R., & Willcocks, L, “Re-
alizing outsourcing expectations”, Information Sys-
tems Management, 1994, 4, 7-18.
[28] Smith, M., Mitra, S., & Narasimhan, S, “Information
systems outsourcing: a study of pre-event firm char-
acteristics”, Journal of Management Information
Systems, 1998, 15, 61-93.
[29] Grover, V., Joong, M., Cheon., & Teng, J.T, “The effect
of service qualify and partnership on the outsourcing of
information systems functions”, Journal of Management
Information Systems, 1996, 12(4), 89-116.
AUTHORS’ BIOGRAP HIES
Jian-Jun Wang completed his Ph.D. in Information Systems from Dalian University of Technology, P.R.China. He
has been Assistant Professor at Dalian University of Technology. His main research fields are IS/IT outsourcing, ser-
vice management and e-commerce. He is involved in many national research projects and he has published many re-
search papers in refereed academic journals such as Computers & Operations Research, Chaos, Solitons and Fractals,
International Journal of Pure and Applied Mathematics, International Journal of Knowledge and Systems Sciences, etc.
He served as a reviewer for a number of international refereed academic journals and refereed conferences. Email:
drwangjj@dlut.edu.cn
Zheng-Kui Lin completed his Ph.D. in Management Science and Engineering from Dalian University of Technol-
ogy, P.R.China. He has been Associate Professor at Dalian Maritime University. His main research fields are informa-
tion systems and e-commerce. He is author of more than 10 articles published on national and international refereed
journals. Email: dalianjx@163.com
Hao Huang is a Ph.D. candidate in School of Economic and Management at Beihang University, P.R.China. He
works in the field of information management. Email: huang_hao98@yahoo.com.cn
10 Jian-Jun Wang, Zheng-Kui Lin and Hao Huang
Copyright © 2008 SciRes JSSM