Skip to main content
Log in

Machine learning approaches to understand IT outsourcing portfolios

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

The outsourcing of IT services poses a conundrum to the traditional theories of the firm. While there are many prescriptive sourcing metrics that are geared towards the evaluation of tangible and measurable aspects of vendors and clients, much of the information that is traditionally important in making such decisions is unstructured. To address this challenge, we train and apply our own NLP model based on deep learning methods using doc2vec, which allows users to create semi-supervised methods for representation of words. We find two novel constructs, vendor–client alignment and vendor–task alignment, that shape partner selection and the alternatives faced by clients in IT outsourcing, as opposed to agency or transaction cost considerations alone. Our method suggests that NLP and machine learning approaches provide additional insight, over and above traditionally understood variables in academic literature and trade and industry press, about the difficult-to-elicit aspects of vendor–client interaction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability

The dataset used during the current study is not publicly available as it contains proprietary information that the authors acquired through a license. Information on how to obtain it and reproduce the analysis is available from the corresponding author on request.

Notes

  1. A Changing Perspective, Harvey Nash / KPMG CIO survey 2019, accessible at https://assets.kpmg/content/dam/kpmg/nl/pdf/2019/advisory/cio-survey-2019-harvey-nash-kpmg.pdf

  2. Please refer to our Appendix for an example of text of such outsourcing contract announcements.

  3. These are all hyper-parameters that are often used in NLP research. Our results remain qualitatively the same when changing the value of these hyper-parameters.

  4. We also used 3 years, 5 years and 7 years as the size of moving window. The estimation results and model performance are generally the same.

  5. For example, client A has a contract with vendor B, vendor B has a contract with client C, and client C has contract with vendor D. In this case, A- > B- > C- > D is an indirect tie.

  6. The prior interaction here is calculated as the number of prior contracts between client and vendor, irrespective of the contract type.

  7. Use a Vendor Evaluation Model to Select ERP Vendors and Software, Denise Ganly, Michael Dunne, Mike Blechar, 13 Sept. 2010, accessible at https://www.gartner.com/en/documents/1435426

  8. https://fasttext.cc/docs/en/pretrained-vectors.html.

References

  1. Linder, J. C., Jarvenpaa, S., & Davenport, T. H. (2003). Toward an innovation sourcing strategy. MIT Sloan Management Review, Summer, 44, 43–49.

    Google Scholar 

  2. Miozzo, M., & Grimshaw, D. (2005). Modularity and innovation in knowledge-intensive business services: IT outsourcing in Germany and the UK. Research Policy, 34(9), 1419–1439.

    Google Scholar 

  3. Gilson, R., Sabel, C., & Scott, R. (2009). Contracting for innovation: Vertical disintegration and interfirm collaboration. Columbia Law Review, 109, 431–502.

    Google Scholar 

  4. Banerjee, A. V., & Duflo, E. (2000). Reputation effects and the limits of contracting: A study of the indian software industry. Quarterly Journal of Economics, 115(3), 989–1017.

    Google Scholar 

  5. Susarla, A., Subramanyam, R., & Karhade, P. (2010). Contractual provisions to mitigate holdup: Evidence from information technology outsourcing. Information Systems Research, 21(1), 37–55.

    Google Scholar 

  6. Susarla, A., Holzhacker, M., & Krishnan, R. (2020). Calculative trust and interfirm contracts. Management Science, 66(11), 4921–5484.

    Google Scholar 

  7. Bakos, J. Y., & Brynjolfsson, E. (1993). Information technology, incentives, and the optimal number of suppliers. Journal of Management Information Systems, 10(2), 37–53.

    Google Scholar 

  8. Ravindran, K., Susarla, A., Mani, D., & Gurbaxani, V. (2015). Social capital and contract duration in buyer–supplier networks for information technology outsourcing. Information Systems Research, 26(2), 379–397.

    Google Scholar 

  9. Su, N., & Levina, N. (2011). Global multisourcing strategy: Integrating learning from manufacturing into IT service outsourcing. IEEE Transactions on Engineering Management, 58(4), 717–729.

    Google Scholar 

  10. Cullen, S., & Willcocks, L. P. (2005). IT outsourcing configuration: Research into defining and designing outsourcing arrangements. Journal of Strategic Information Systems, 14(4), 357–387.

    Google Scholar 

  11. Choudhury, P., Wang, D., Carlson, N. A., & Khanna, T. (2019). Machine learning approaches to facial and text analysis: Discovering CEO oral communication styles. Strategic Management Journal, 40(11), 1705–1732.

    Google Scholar 

  12. Tidhar, R., & Eisenhardt, K. M. (2020). Get rich or die trying. Finding revenue model fit using machine learning and multiple cases. Strategic Management Journal, 41(7), 1245–1273.

    Google Scholar 

  13. Ethiraj, S. K., Kale, P., Krishnan, M. S., & Singh, J. V. (2005). Where do capabilities come from and how do they matter? A study in the software services industry. Strategic Management Journal, 26(1), 25–45.

    Google Scholar 

  14. Li, S. X., & Rowley, T. J. (2002). Inertia and evaluation mechanisms in interorganizational partner selection: Syndicate formation among US investment banks. Academy of Management Journal, 45(6), 1104–1119.

    Google Scholar 

  15. Lavie, D., & Rosenkopf, L. (2006). Balancing exploration and exploitation in alliance formation. Academy of Management Journal, 49(4), 797–818.

    Google Scholar 

  16. Mikolov, T., Sutskever, I., Chen, K., Corrado, G. S., & Dean, J. (2013). Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems (pp. 3111–3119).

  17. Dewan, S., Shi, C., & Gurbaxani, V. (2007). Investigating the risk–return relationship of information technology investment: Firm-level empirical analysis. Management Science, 53(12), 1829–1842.

    Google Scholar 

  18. Whang, S. (1992). Contracting for software development. Management Science, 38(3), 307–324.

    Google Scholar 

  19. Bresnahan, T. F., Brynjolfsson, E., & Hitt, L. M. (2002). Information technology, workplace organization, and the demand for skilled labor: Firm-level evidence. The Quarterly Journal of Economics, 117(1), 339–376.

    Google Scholar 

  20. Mayer, K. J., & Nickerson, J. A. (2005). Antecedents and performance implications of contracting for knowledge workers: Evidence from information technology services. Organization Science, 16(3), 225–242.

    Google Scholar 

  21. Poppo, L., & Zenger, T. (2002). Do formal contracts and relational governance function as substitutes or complements? Strategic Management Journal, 23(8), 707–725.

    Google Scholar 

  22. Barthélemy, J., & Quélin, B. V. (2006). Complexity of outsourcing contracts and ex post transaction costs: An empirical investigation. Journal of Management Studies, 43(8), 1775–1797.

    Google Scholar 

  23. Susarla, A. (2012). Contractual flexibility, rent seeking, and renegotiation design: An empirical analysis of information technology outsourcing contracts. Management Science, 58(7), 1388–1407.

    Google Scholar 

  24. Susarla, A., Barua, A., & Whinston, A. B. (2009). A transaction cost perspective of the “software as a service” business model. Journal of Management Information Systems, 26(2), 205–240.

    Google Scholar 

  25. Susarla, A., & Mukhopadhyay, T. (2018). Can outsourcing of information technology foster innovations in client organizations? An empirical analysis. MIS Quarterly, 43(3), 929–949.

    Google Scholar 

  26. Dibbern, J., Goles, T., Hirschheim, R., & Jayatilaka, B. (2004). Information systems outsourcing: A survey and analysis of the literature. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 35(4), 6–102.

    Google Scholar 

  27. Hanafizadeh, P., & Zareravasan, A. (2020). A systematic literature review on IT outsourcing decision and future research directions. Journal of Global Information Management, 28(2), 160–201.

    Google Scholar 

  28. Aubert, B. A., Rivard, S., & Patry, M. (2004). A transaction cost model of IT outsourcing. Information & Management, 41(7), 921–932.

    Google Scholar 

  29. Espino-Rodríguez, T. F., & Padrón-Robaina, V. (2006). A review of outsourcing from the resource-based view of the firm. International Journal of Management Reviews, 8(1), 49–70.

    Google Scholar 

  30. Chen, Y., Bharadwaj, A., & Goh, K. Y. (2017). An empirical analysis of intellectual property rights sharing in software development outsourcing. MIS Quarterly, 41(1), 131–161.

    Google Scholar 

  31. Williamson, O. E. (1996). The mechanisms of governance. Oxford University Press.

    Google Scholar 

  32. Beckman, C. M., Haunschild, P. R., & Phillips, D. J. (2004). Friends or strangers? Firm-specific uncertainty, market uncertainty, and network partner selection. Organization Science, 15(3), 259–275.

    Google Scholar 

  33. Rosenkopf, L., & Nerkar, A. (2001). Beyond local search: Boundary-spanning, exploration, and impact in the optical disk industry. Strategic Management Journal, 22(4), 287–306.

    Google Scholar 

  34. McGrath, R. G. (2001). Exploratory learning, innovative capacity, and managerial oversight. Academy of Management Journal, 44(1), 118–131.

    Google Scholar 

  35. DiMaggio, P., & Louch, H. (1998). Socially embedded consumer transactions: For what kinds of purchases do people most often use networks? American Sociological Review, 619–637.

  36. Raub, W., & Weesie, J. (1990). Reputation and efficiency in social interactions: An example of network effects. American Journal of Sociology, 96(3), 626–654.

    Google Scholar 

  37. Poppo, L., & Zenger, T. (1998). Testing alternative theories of the firm: Transaction cost, knowledge-based, and measurement explanations for make-or-buy decisions in information services. Strategic Management Journal, 19(9), 853–877.

    Google Scholar 

  38. Chen, Y., & Bharadwaj, A. (2009). An empirical analysis of contract structures in IT outsourcing. Information Systems Research, 20(4), 484–506.

    Google Scholar 

  39. Kalnins, A., & Mayer, K. J. (2004). Franchising, ownership, and experience: A study of pizza restaurant survival. Management Science, 50(12), 1716–1728.

    Google Scholar 

  40. Argyres, N. S., Bercovitz, J., & Mayer, K. J. (2007). Complementarity and evolution of contractual provisions: An empirical study of IT services contracts. Organization Science, 18(1), 3–19.

    Google Scholar 

  41. Weber, L., Mayer, K. J., & Macher, J. T. (2011). An analysis of extendibility and early termination provisions: The importance of framing duration safeguards. Academy of Management Journal, 54(1), 182–202.

    Google Scholar 

  42. Athey, S. (2018). The impact of machine learning on economics. In A. K. Agrawal, J. Gans, & A. Goldfarb (Eds.), The Economics of artificial intelligence: An agenda (in press). University of Chicago Press.

    Google Scholar 

  43. Kleinberg, J., Lakkaraju, H., Leskovec, J., Ludwig, J., & Mullainathan, S. (2017). Human decisions and machine predictions. Quarterly Journal of Economics, 133(1), 237–293.

    Google Scholar 

  44. Choudhury, P., Allen, R. T., & Endres, M. G. (2021). Machine learning for pattern discovery in management research. Strategic Management Journal, 42(1), 32–57.

    Google Scholar 

  45. Arts, S., Cassiman, B., & Gomez, J. C. (2018). Text matching to measure patent similarity. Strategic Management Journal, 39(1), 62–84.

    Google Scholar 

  46. Hannigan, T. R., Haans, R. F., Vakili, K., Tchalian, H., Glaser, V. L., Wang, M. S., & Jennings, P. D. (2019). Topic modeling in management research: Rendering new theory from textual data. Academy of Management Annals, 13(2), 586–632.

    Google Scholar 

  47. Loughran, T., & McDonald, B. (2011). When is a liability not a liability? Textual analysis, dictionaries, and 10-Ks. The Journal of Finance, 66(1), 35–65.

    Google Scholar 

  48. Le, Q., & Mikolov, T. (2014). Distributed representations of sentences and documents. In International conference on machine learning (pp. 1188–1196).

  49. Blau, P. M. (1977). Inequality and heterogeneity: A primitive theory of social structure (Vol. 7). Free Press.

    Google Scholar 

  50. Soda, G., Usai, A., & Zaheer, A. (2004). Network memory: The influence of past and current networks on performance. Academy of Management Journal, 47(6), 893–906.

    Google Scholar 

  51. Burt, R. S. (2004). Structural holes and good ideas. American Journal of Sociology, 110(2), 349–399.

    Google Scholar 

  52. Podolny, J. M., Stuart, T. E., & Hannan, M. T. (1996). Networks, knowledge, and niches: Competition in the worldwide semiconductor industry, 1984–1991. American Journal of Sociology, 102(3), 659–689.

    Google Scholar 

  53. Park, D. Y., & Podolny, J. M. (2000). The competitive dynamics of status and niche width: US investment banking, 1920–1949. Industrial and Corporate Change, 9(3), 377–414.

    Google Scholar 

  54. Gulati, R. (1995). Does familiarity breed trust? The implications of repeated ties on contractual choice in alliances. Academy of Management Journal, 38, 85–112.

    Google Scholar 

  55. Ahuja, G. (2000). Collaboration networks, structural holes, and innovation: A longitudinal study. Administrative Science Quarterly, 45(3), 425–455.

    Google Scholar 

  56. Gulati, R., & Gargiulo, M. (1999). Where do interorganizational networks come from? American Journal of Sociology, 104(5), 1439–1493.

    Google Scholar 

  57. Han, K., & Mithas, S. (2013). Information technology outsourcing and non-IT operating costs: An empirical investigation. MIS Quarterly, 37(1), 315–331.

    Google Scholar 

  58. Dekker, H. C., & Abbeele, A. (2010). Organizational learning and interfirm control: The effects of partner search and prior exchange experiences. Organization Science, 21(6), 1233–1250.

    Google Scholar 

  59. Deloitte Insights. (2012). Why IT outsourcing may be riskier than ever. Wall Street Journal. Retrieved online from http://deloitte.wsj.com/cio/2012/07/09/why-it-outsourcing-may-be-riskier-than-ever/

  60. Broschak, J. P., & Block, E. S. (2014). With or without you: When does managerial exit matter for the dissolution of dyadic market ties? Academy of Management Journal, 57(3), 743–765.

    Google Scholar 

  61. Brynjolfsson, E., Hui, X., & Liu, M. (2019). Does machine translation affect international trade? Evidence from a large digital platform. Management Science, 65(12), 5449–5460.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yingda Lu.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1: MCMC inference for hierarchical bayesian model

In this Appendix, we describe estimation details of the multinomial logistic regression with unobserved heterogeneity using the MCMC approach. As the MCMC approach involves iteratively updating values of parameters, we use superscript \(n\) to represent the parameter values in the next iteration.

Step 1: Generating \({{\varvec{\beta}}}^{n}\), the coefficients in the multinomial logistic model that are homogenous across firms.

$$ {\varvec{\beta}}^{n} |{\varvec{\beta}}, c_{i}^{{}} ,v_{j}^{{}} , d_{ij}^{{}} , data $$
$$ f\left( {{\varvec{\beta}}^{n} {|}{\varvec{\beta}}, c_{i}^{{}} ,v_{j}^{{}} , d_{ij}^{{}} , data} \right) $$
$$ \propto \left| {{\Sigma }_{{{\varvec{\beta}}0}} } \right|^{{ - \frac{1}{2}}} exp\left[ { - \frac{1}{2}\left( {{\varvec{\beta}}^{n} - \overline{{{\varvec{\beta}}_{0} }} } \right)^{^{\prime}} {\Sigma }_{{{\varvec{\beta}}0}}^{ - 1} \left( {{\varvec{\beta}}^{n} - \overline{{{\varvec{\beta}}_{0} }} } \right)} \right]L\left( Y \right) $$

Here \({\varvec{\beta}}=[{{\varvec{\beta}}}^{{\varvec{c}}},{{\varvec{\beta}}}^{{\varvec{v}}},{{\varvec{\beta}}}^{{\varvec{d}}}]\), \(\overline{{{\varvec{\beta}} }_{0}}\) and \({\Sigma }_{{\varvec{\beta}}0}\) are diffused priors, where we set \(\overline{{{\varvec{\beta}} }_{0}}\) to be a vector of zeros and \({\Sigma }_{{\varvec{\beta}}0}=30I\). The Metropolis–Hasting algorithm is employed to randomly draw \({{\varvec{\beta}}}^{d}\) for the new iteration from the conditional distribution described in the equation above. The probability of accepting the newly drawn vector \({{\varvec{\beta}}}^{d}\) is calculated as:

$$ \Pr \left( {\text{accept new value}} \right) = {\text{min}}\left\{ {\frac{{{\text{exp}}\left[ { - \frac{1}{2}\left( {{\varvec{\beta}}^{d} - \overline{{{\varvec{\beta}}_{0} }} } \right)^{^{\prime}} {\Sigma }_{{{\varvec{\beta}}0}}^{ - 1} \left( {{\varvec{\beta}}^{d} - \overline{{{\varvec{\beta}}_{0} }} } \right)} \right]L(Y|{\varvec{\beta}}^{d} )}}{{{\text{xp}}\left[ { - \frac{1}{2}\left( {{\varvec{\beta}} - \overline{{{\varvec{\beta}}_{0} }} } \right)^{^{\prime}} {\Sigma }_{{{\varvec{\beta}}0}}^{ - 1} \left( {{\varvec{\beta}} - \overline{{{\varvec{\beta}}_{0} }} } \right)} \right]L(Y|{\varvec{\beta}})}},1} \right\} $$

If the newly drawn vector is accepted, we then assign \({{\varvec{\beta}}}^{n}={{\varvec{\beta}}}^{d}\).

Step 2: Generating \({c}_{i}^{n},{v}_{j}^{n}\), unobserved terms for client and vendor firm respectively.

$$ f\left( {c_{i}^{n} {|}{\varvec{\beta}}^{n} , c_{i}^{{}} ,v_{j}^{{}} , d_{ij}^{{}} , data} \right) $$
$$ \propto \sigma_{c}^{ - 1} exp\left[ { - \frac{1}{2}\left( {c_{i}^{n} } \right)^{2} \sigma_{c}^{ - 1} } \right]L\left( Y \right) $$
$$ f\left( {v_{j}^{n} {|}{\varvec{\beta}}^{n} , c_{i}^{{}} ,v_{j}^{{}} , d_{ij}^{{}} , data} \right) $$
$$ \propto \sigma_{v}^{ - 1} exp\left[ { - \frac{1}{2}\left( {v_{j}^{n} } \right)^{2} \sigma_{v}^{ - 1} } \right]L\left( Y \right) $$

Here, the two \(f(\bullet |\bullet )\) functions are posterior distributions. Intuitively, posterior distribution can be considered as a way to summarize your existing belief about certain distribution (prior distribution) and additional empirical data you observed (data). As a closed-form solution does not exist for the two equations above, we again use the Metropolis–Hasting algorithm to randomly draw from the conditional distribution specified above. We employ the method in Atchade (2006) to adaptively change the length of the steps in each iteration to help reduce the autocorrelation across MCMC iterations. The probabilities of accepting the newly drawn value for \(c_{i}^{n} ,v_{j}^{n}\) are:

$$ \Pr \left( {\text{accept new value}} \right) = {\text{min}}\left\{ {\frac{{{\text{exp}}\left[ { - \frac{1}{2}\left( {c_{i}^{n} } \right)^{2} \sigma_{c}^{ - 1} } \right]L(Y|c_{i}^{n} )}}{{{\text{eexp}}\left[ { - \frac{1}{2}\left( {c_{i}^{{}} } \right)^{2} \sigma_{c}^{ - 1} } \right]L(Y|c_{i}^{{}} )}},1} \right\} $$
$$ \Pr \left( {\text{accept new value}} \right) = {\text{min}}\left\{ {\frac{{{\text{exp}}\left[ { - \frac{1}{2}\left( {v_{j}^{n} } \right)^{2} \sigma_{v}^{ - 1} } \right]L(Y|v_{j}^{n} )}}{{{\text{eexp}}\left[ { - \frac{1}{2}\left( {v_{j}^{{}} } \right)^{2} \sigma_{v}^{ - 1} } \right]L(Y|v_{j}^{{}} )}},1} \right\} $$

Step 3: Generating \({\sigma }_{c}^{n}\) and \({\sigma }_{v}^{n}\), the standard deviation of client and vendor unobserved terms.

The newly updated standard deviations for client- and vendor-specific unobserved terms are drawn from the distribution below:

$$ \sigma_{c}^{n} | c_{i}^{n} \sim IW\left( {7 + N,1 + \mathop \sum \limits_{i} \left( {c_{i}^{n} } \right)^{2} } \right) $$
$$ \sigma_{v}^{n} | v_{j}^{n} \sim IW\left( {7 + N,1 + \mathop \sum \limits_{i} \left( {v_{j}^{n} } \right)^{2} } \right) $$

Here we choose \(7+N\), \(1+{\sum }_{i}{({c}_{i}^{n})}^{2}\) and \(1+{\sum }_{i}{({v}_{j}^{n})}^{2}\) as hyperparameters of these two distributions, as they generate better predictive performance compared with other potential values. Note that hyperparameters of a MCMC are parameters of the underlying distribution from which our model parameters are generated (i.e., \({\sigma }_{c}\) and \({\sigma }_{v}\)). IW denotes an inverse-Wishart distribution. We chose inverse-Wishart distribution because it is the conjugate prior for the variance of a normal distribution (i.e., \({\sigma }_{c}\) and \({\sigma }_{v}\)). This method allows us to easily simulate values of variance (i.e., \({\sigma }_{c}\) and \({\sigma }_{v}\)) from a distribution with closed form, instead of using the Metropolis–Hasting algorithm in Step 2.

Step 4: Generating \({d}_{ij}^{n}\), unobserved dyad term.

$$ f\left( {d_{ij}^{n} {|}{\varvec{\beta}}^{n} , c_{i}^{n} ,v_{j}^{n} , d_{ij}^{{}} , data} \right) $$
$$ \propto \sigma_{d}^{ - 1} exp\left[ { - \frac{1}{2}\left( {d_{ij}^{n} } \right)^{2} \sigma_{d}^{ - 1} } \right]L\left( Y \right) $$

Similar to client- and vendor-specific unobserved terms, we also use the Metropolis–Hasting algorithm to draw from the conditional distribution above. The method proposed by Atchade (2006) is used to adaptively change the length of step in each iteration. The probability of accepting a new value is:

$$ \Pr \left( {\text{accept new value}} \right) = {\text{min}}\left\{ {\frac{{{\text{exp}}\left[ { - \frac{1}{2}\left( {d_{ij}^{n} } \right)^{2} \sigma_{d}^{ - 1} } \right]L(Y|d_{ij}^{n} )}}{{{\text{eexp}}\left[ { - \frac{1}{2}\left( {d_{ij}^{{}} } \right)^{2} \sigma_{d}^{ - 1} } \right]L(Y|d_{ij}^{{}} )}},1} \right\} $$

Step 5: Generating \({\sigma }_{d}^{n}\), the standard deviation of dyad unobserved term.

Similar to Step 3, \({\sigma }_{d}^{n}\) can be drawn from the following distribution:

$$ \sigma_{d}^{n} | d_{ij}^{n} \sim IW\left( {1 + N\left( {N - 1} \right),1 + \mathop \sum \limits_{i} \mathop \sum \limits_{j} \left( {d_{ij}^{n} } \right)^{2} } \right) $$

Here we choose \(1+N\left(N-1\right)\) and \(1+{\sum }_{i}{\sum }_{j}{({d}_{ij}^{n})}^{2}\) as hyperparameters of this distribution, as they generate better predictive performance compared with other potential values. IW here also denotes an inverse-Wishart distribution.

Step 6: Go back to Step 1 if the estimation is not converged.

Appendix 2: Correlation matrix

See Table

Table 11 Correlation matrix

11.

Appendix 3: Robustness check with client firm characteristics

In our main model, we do not control for client and vendor firm characteristics, as many firms do not have historical firm-level data. In this robustness check, we include employee count and gross profits for clients who are publicly listed in North America. We present the estimation results in the tables below. As we can see, the results do not change significantly (Table

Table 12 Robustness check

12).

Appendix 4: An example of contract description in our dataset

Company A, a provider of Internet financial technologies and solutions, has awarded a 5-year technology support contract to Company B. Company A's technologies and solutions enable financial institutions to offer online financial services to their customers. Both companies expect this to be the start of an increasingly important business relationship in line with the growth of Internet banking in Europe. IDC estimates that this contract has a 5-year life and a value of $20–25 million. Contract Responsibilities: Through its relationship with Company A, Company B will provide desktop and server infrastructure support to Company C, to which Company A already provides Internet financial technologies, solutions, and Web hosting facilities. Company B will also work with Company A to assist Company C as it plans and implements its future technology strategy, including the management of other third-party information technology service providers. Company B will provide services and operate in Dublin. The services will include support operations onsite in Ireland, including servicing the UK, Germany and Singapore. This contract represents a key technology partnership for both Company B and Company A.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lu, Y., Susarla, A., Ravindran, K. et al. Machine learning approaches to understand IT outsourcing portfolios. Electron Commer Res (2023). https://doi.org/10.1007/s10660-022-09663-4

Download citation

  • Published:

  • DOI: https://doi.org/10.1007/s10660-022-09663-4

Keywords

Navigation