{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:22:36Z","timestamp":1777854156504,"version":"3.51.4"},"reference-count":62,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Technology"],"published-print":{"date-parts":[[2004,3]]},"abstract":"<jats:p>How value is created for the customer from e-business is a topic of much concern in academic and practitioner circles. In the light of the dot.com downturn, numerous e-business firms ceased to exist. This paper reports the findings from an ongoing research study on the development and decline of the application service provider (ASP) industry. Having witnessed the decline of the first wave of ASPs, with many failing to convince small and medium businesses (SMBs) of the value of adopting an ASP solution, the second wave calls for a more rigorous approach that clearly identifies the key performance areas and indicators of the ASP business model. Applying the constructs of strategic positioning, product\/service portfolio, and value proposition, this paper represents the findings from 215 responses to a questionnaire survey on how potential and existing ASP customers evaluate the benefits and risks of ASP. The findings suggest that, if the ASP model is to succeed, vendors will need to carefully identify customer requirements and avoid the pitfalls that beset the first wave of the ASP model, which was largely based upon a technology push strategy.<\/jats:p>","DOI":"10.1057\/palgrave.jit.2000006","type":"journal-article","created":{"date-parts":[[2004,3,29]],"date-time":"2004-03-29T03:09:10Z","timestamp":1080529750000},"page":"39-58","source":"Crossref","is-referenced-by-count":27,"title":["Customer Evaluation of Application Services Provisioning in Five Vertical Sectors"],"prefix":"10.1177","volume":"19","author":[{"given":"Wendy L","family":"Currie","sequence":"first","affiliation":[{"name":"Department of Information Systems and Computing, Centre for Strategic Information Systems, Brunel University, Uxbridge, Middlesex, UK"}]},{"given":"Bhavini","family":"Desai","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Computing, Centre for Strategic Information Systems, Brunel University, Uxbridge, Middlesex, UK"}]},{"given":"Naureen","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Computing, Centre for Strategic Information Systems, Brunel University, Uxbridge, Middlesex, UK"}]}],"member":"179","published-online":{"date-parts":[[2004,3,1]]},"reference":[{"key":"bibr1-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011253911464"},{"key":"bibr2-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1002\/smj.187"},{"key":"bibr3-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1145\/280324.280330"},{"key":"bibr4-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"key":"bibr5-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026552208171"},{"issue":"1","key":"bibr6-palgrave.jit.2000006","first-page":"138","volume":"2","author":"Caufield B.","year":"2000","journal-title":"eCompany Now"},{"key":"bibr7-palgrave.jit.2000006","volume-title":"Dot.con.","author":"Cassidy J.","year":"2002"},{"key":"bibr8-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.2307\/4132321"},{"key":"bibr9-palgrave.jit.2000006","unstructured":"ClancyM. (2001). The Insidious Resistance to ASPs, http:\/\/www.aspnews.com."},{"key":"bibr10-palgrave.jit.2000006","volume-title":"Realizing e-Business with Application Service Provision","author":"Columbus L.","year":"2000"},{"key":"bibr11-palgrave.jit.2000006","volume-title":"Keynote Address: \u2018Delivering Business Critical Information Systems as a Service: A taxonomy of application service providers.","author":"Currie W.","year":"2000"},{"key":"bibr12-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1504\/IJSTM.2002.001622"},{"key":"bibr13-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(02)00095-9"},{"key":"bibr14-palgrave.jit.2000006","unstructured":"CurrieW., DesaiB., KhanN., WangX., and WeerakkodyV. (2003). Vendor strategies for business process and applications outsourcing: recent findings from field research. Hawaii International Conference on Systems Sciences, January. pp. 207\u2013217"},{"key":"bibr15-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000393"},{"key":"bibr16-palgrave.jit.2000006","volume-title":"New Strategies in IT Outsourcing: Major trends and global best practice","author":"Currie W.","year":"1998"},{"key":"bibr17-palgrave.jit.2000006","volume-title":"Application Service Providers - Exploring the Theory of Evolution","author":"Dean G.H.","year":"2000"},{"key":"bibr18-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1108\/09576050210426742"},{"key":"bibr19-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.2307\/258557"},{"key":"bibr20-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1002\/1097-0266(200010\/11)21:10\/11<1105::AID-SMJ133>3.0.CO;2-E"},{"key":"bibr21-palgrave.jit.2000006","unstructured":"FerengulC. (2002). Best Practices in Web Hosting Service Level Agreements. Meta Group, Stamford, CT, 31 January 2002 (available on-line: http\/\/techupdate.zdnet.com\/techupdate\/stories\/main\/"},{"key":"bibr22-palgrave.jit.2000006","unstructured":"GordijnJ., AkkermansH., and van VlietH. (2000). What's in an Electronic Business Model? The 12th International Conference on Knowledge Engineering and Knowledge Management. (EKAW-2000, 2\u20136 October, Juan-les-Pins, France)."},{"key":"bibr23-palgrave.jit.2000006","unstructured":"GuahM.W., and CurrieW. (2002). \u2018Can ASP Model Rescue NHS Information System Strategy?\u2019. The Fifth International Conference on Electronic Commerce Research (ICECR-5) (Montreal, Canada, October)."},{"key":"bibr24-palgrave.jit.2000006","volume-title":"Out of the Box: Strategies for achieving profits today and growth tomorrow through web services","author":"Hagel J.","year":"2002"},{"issue":"4","key":"bibr25-palgrave.jit.2000006","first-page":"33","volume":"3","author":"Heart T.","year":"2001","journal-title":"Journal of Information Technology Theory and Application"},{"key":"bibr26-palgrave.jit.2000006","doi-asserted-by":"crossref","unstructured":"HowcroftD. (2001). After the Goldrush: Deconstructing the myths of the dot.com market, Journal of Information Technology 16(4): 195\u2013204.","DOI":"10.1080\/02683960110100418"},{"key":"bibr27-palgrave.jit.2000006","author":"IDC.","year":"2000","journal-title":"Hosted by International Data Corporation."},{"key":"bibr28-palgrave.jit.2000006","first-page":"27","volume-title":"Handbook of Electronic Commerce in Business and Society","author":"Kauffman R.","year":"2001"},{"key":"bibr29-palgrave.jit.2000006","volume-title":"The ASP Market-space Report: Mastering the expectations of customers","author":"Kern T.","year":"2001"},{"key":"bibr30-palgrave.jit.2000006","volume-title":"Financial Times","author":"Kern T.","year":"2002"},{"key":"bibr31-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04754-5_23"},{"issue":"2","key":"bibr32-palgrave.jit.2000006","first-page":"113","volume":"1","author":"Kern T.","year":"2002","journal-title":"MIS Quarterly Executive"},{"key":"bibr33-palgrave.jit.2000006","first-page":"86","volume":"10","author":"Magretta J.","year":"2001","journal-title":"Harvard Business Review"},{"key":"bibr34-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011502306766"},{"key":"bibr35-palgrave.jit.2000006","first-page":"48","author":"Miley M.","year":"2000","journal-title":"Oracle Magazine"},{"key":"bibr36-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511753695"},{"key":"bibr37-palgrave.jit.2000006","unstructured":"OsterwalderA., and PigneurY. (2002). An e-Business Model Ontology for Modeling e-Business. 15th Bled Electronic Commerce Conference on E-reality: Constructing the e-Economy (Bled, Slovenia, 17\u201319 June."},{"key":"bibr38-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014453525541"},{"key":"bibr39-palgrave.jit.2000006","first-page":"1","author":"Ross J.","year":"2001","journal-title":"Sloan School of Management"},{"key":"bibr40-palgrave.jit.2000006","volume-title":"Interpreting Qualitative Data","author":"Silverman D.","year":"2001"},{"key":"bibr41-palgrave.jit.2000006","unstructured":"TebbouneD.E.S., WeerakkodyV.J.P., and CurrieW. (2003). Strategic Alliances in Application Service Provision: A theoretical perspective. Proceedings of the 2003 UK Academy for Information Systems (UKAIS) Conference, Warwick, UK, April."},{"key":"bibr42-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.2307\/30036520"},{"key":"bibr43-palgrave.jit.2000006","volume-title":"Place to Space - Migrating to eBusiness Models","author":"Weill P.","year":"2001"},{"key":"bibr44-palgrave.jit.2000006","volume-title":"Strategic Sourcing of Information Systems","author":"Willcocks L.","year":"1998"},{"key":"bibr45-palgrave.jit.2000006","volume-title":"Applications of Case Study Research","author":"Yin R.","year":"2002"},{"key":"bibr46-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1177\/002224299405800304"},{"key":"bibr47-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1177\/002224299005400103"},{"key":"bibr48-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.12.2.125"},{"key":"bibr49-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1177\/002224299005400206"},{"key":"bibr50-palgrave.jit.2000006","volume-title":"Business Research Methods.","author":"Cooper D.R.","year":"2003"},{"key":"bibr51-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00080-5"},{"key":"bibr52-palgrave.jit.2000006","doi-asserted-by":"crossref","unstructured":"DesaiB., WeerakkodyV., CurrieW., TebbouneS., and KhanN. (2003). Market Entry Strategies of Application Service Providers: Identifying strategic differentiation. Paper to presented at the 36th Hawaii International Conference on System Sciences (HICSS-36), Hawaii, January 2003.","DOI":"10.1109\/HICSS.2003.1174430"},{"key":"bibr53-palgrave.jit.2000006","unstructured":"Gartner (2001). Sanity Check on the ASP Opportunity, Gartner Group's Research Brief, http:\/\/www.gartner.com"},{"key":"bibr54-palgrave.jit.2000006","first-page":"105","author":"Hagel J.","year":"2001","journal-title":"Harvard Business Review"},{"key":"bibr55-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04754-5"},{"key":"bibr56-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1177\/002224299305700101"},{"key":"bibr57-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-2373(99)00086-9"},{"key":"bibr58-palgrave.jit.2000006","volume-title":"The New, New Thing.","author":"Lewis M.","year":"1999"},{"key":"bibr59-palgrave.jit.2000006","doi-asserted-by":"publisher","DOI":"10.2307\/41166053"},{"key":"bibr60-palgrave.jit.2000006","unstructured":"NesheimJ. (1997). High Tech Start-up. Saratoga, CA: www.Startupweb.com (isbn: 0-914 405-71-3)."},{"key":"bibr61-palgrave.jit.2000006","volume-title":"ASP - Application Service Providing: The ultimate guide to hiring rather than buying applications.","author":"SCN Education B.V.","year":"2000"},{"key":"bibr62-palgrave.jit.2000006","volume-title":"Business Models for Electronic Commerce.","author":"Timmers P.","year":"1999"}],"container-title":["Journal of Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1057\/palgrave.jit.2000006\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/palgrave.jit.2000006","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/palgrave.jit.2000006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/palgrave.jit.2000006.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:03:06Z","timestamp":1777503786000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1057\/palgrave.jit.2000006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["10.1057\/palgrave.jit.2000006"],"URL":"https:\/\/doi.org\/10.1057\/palgrave.jit.2000006","relation":{},"ISSN":["0268-3962","1466-4437"],"issn-type":[{"value":"0268-3962","type":"print"},{"value":"1466-4437","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}