{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:08:57Z","timestamp":1773796137492,"version":"3.50.1"},"reference-count":52,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2010,3,16]],"date-time":"2010-03-16T00:00:00Z","timestamp":1268697600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3,16]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Outsourcing is currently going through a stage of unstoppable growth. The purpose of this paper is to make a proposal about the main reasons, which may lead firms to adopt outsourcing in information systems (IS) services. It will equally analyse the potential risks that IS clients are likely to face. An additional objective is to assess these reasons and risks in the case of large Spanish firms, while simultaneously examining their evolution over time. This study of outsourcing reasons and risks has been carried out from the client's perspective.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>In order to achieve these aims, a questionnaire was administered to the IS managers of the largest Spanish firms.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Outsourcing gives the organisations the opportunity to have better IS services and the possibility to achieve technological improvements and, although cost savings in staff and technology are generally seen as very important, they do not emerge as priority reasons for outsourcing in the present study. Regarding risks, they are mainly associated with providers, with great concern being expressed about the lack of qualification among their providers' staff, the potential lack of compliance with contracts, and the inability to adapt to the new technologies.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>An important contribution made by this paper is not only the specification of those reasons and risks but also the fact that they are considered important by the firms interviewed.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571011020359","type":"journal-article","created":{"date-parts":[[2010,2,27]],"date-time":"2010-02-27T07:01:08Z","timestamp":1267254068000},"page":"284-303","source":"Crossref","is-referenced-by-count":51,"title":["Information systems outsourcing reasons and risks: a new assessment"],"prefix":"10.1108","volume":"110","author":[{"given":"Reyes","family":"Gonzalez","sequence":"first","affiliation":[]},{"given":"Jose","family":"Gasco","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Llopis","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031420071239400_b1","doi-asserted-by":"crossref","unstructured":"Alner, M. (2001), \u201cThe effects of outsourcing on information security\u201d, Information Systems Security, Vol. 10 No. 2, pp. 35\u201043.","DOI":"10.1201\/1086\/43314.10.2.20010506\/31401.6"},{"key":"key2022031420071239400_b2","doi-asserted-by":"crossref","unstructured":"Ang, S. and Straub, D. (1998), \u201cProduction and transaction economies and IS outsourcing: a study of the US, Bank Industry\u201d, MIS Quarterly, Vol. 22 No. 4, pp. 535\u201052.","DOI":"10.2307\/249554"},{"key":"key2022031420071239400_b3","doi-asserted-by":"crossref","unstructured":"Bahli, B. and Rivard, S. (2005), \u201cValidating measures of information technology outsourcing risks factors\u201d, Omega, Vol. 33 No. 2, pp. 175\u201087.","DOI":"10.1016\/j.omega.2004.04.003"},{"key":"key2022031420071239400_b4","doi-asserted-by":"crossref","unstructured":"Baldwing, L.P., Irani, Z. and Love, P. (2001), \u201cOutsourcing information systems: drawing lessons from a banking case study\u201d, European Journal of Information Systems, Vol. 10 No. 1, pp. 15\u201024.","DOI":"10.1057\/palgrave.ejis.3000372"},{"key":"key2022031420071239400_b5","unstructured":"Barth\u00e9lemy, J. (2001), \u201cThe hidden cost of IT outsourcing\u201d, MIT Sloan Management Review, Vol. 42 No. 3, pp. 60\u20109."},{"key":"key2022031420071239400_b6","doi-asserted-by":"crossref","unstructured":"Clark, T.D., Zmud, R.W. and McCray, G.E. (1995), \u201cThe outsourcing of information services: transforming the nature of business in the information industry\u201d, Journal of Information Technology, Vol. 10, pp. 221\u201037.","DOI":"10.1177\/026839629501000403"},{"key":"key2022031420071239400_b7","doi-asserted-by":"crossref","unstructured":"Claver, E., Gonzalez, R., Gasco, J. and Llopis, J. (2002), \u201cInformation systems outsourcing: reasons, reservations and success factors\u201d, Logistics Information Management, Vol. 15 No. 4, pp. 294\u2010308.","DOI":"10.1108\/09576050210436138"},{"key":"key2022031420071239400_b8","unstructured":"Computerworld (2009), \u201cEl RACC conf\u00eda a IBM la gesti\u00f3n de su infraestructura tecnol\u00f3gica\u201d, available at: www.idg.es\/computerworld (accessed 1 September 2009)."},{"key":"key2022031420071239400_b9","unstructured":"Earl, M.J. (1996), \u201cThe risk of outsourcing IT\u201d, Sloan Management Review, Vol. 37 No. 3, pp. 26\u201032."},{"key":"key2022031420071239400_b10","doi-asserted-by":"crossref","unstructured":"Fink, D. (1994), \u201cA security framework for information systems outsourcing\u201d, Information Management & Computer Security, Vol. 2 No. 4, pp. 3\u20108.","DOI":"10.1108\/09685229410068235"},{"key":"key2022031420071239400_b11","doi-asserted-by":"crossref","unstructured":"Fowler, A. and Jeffs, B. (1998), \u201cExamining information systems outsourcing: a case study from the United Kingdom\u201d, Journal of Information Technology, Vol. 13 No. 2, pp. 111\u201026.","DOI":"10.1080\/026839698344891"},{"key":"key2022031420071239400_b12","doi-asserted-by":"crossref","unstructured":"Glass, R.L. (1996), \u201cThe end of the outsourcing era\u201d, Information Systems Management, Vol. 13 No. 2, pp. 89\u201091.","DOI":"10.1080\/10580539608906995"},{"key":"key2022031420071239400_b13","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Gasco, J. and Llopis, J. (2005a), \u201cInformation systems outsourcing reasons in the largest Spanish firms\u201d, International Journal of Information Management, Vol. 25 No. 2, pp. 117\u201036.","DOI":"10.1016\/j.ijinfomgt.2004.10.002"},{"key":"key2022031420071239400_b14","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Gasco, J. and Llopis, J. (2005b), \u201cInformation systems outsourcing risks: a study of large firms\u201d, Industrial Management & Data Systems, Vol. 105 No. 1, pp. 45\u201062.","DOI":"10.1108\/02635570510575180"},{"key":"key2022031420071239400_b15","doi-asserted-by":"crossref","unstructured":"Grover, V., Cheon, M.J. and Teng, T.C. (1994), \u201cA descriptive study on the outsourcing of information systems functions\u201d, Information & Management, Vol. 27 No. 1, pp. 33\u201044.","DOI":"10.1016\/0378-7206(94)90100-7"},{"key":"key2022031420071239400_b16","doi-asserted-by":"crossref","unstructured":"Grover, V., Cheon, M.J. and Teng, T.C. (1996), \u201cThe effect of service quality and partnership on the outsourcing of information systems functions\u201d, Journal of Management Information Systems, Vol. 12 No. 4, pp. 89\u2010116.","DOI":"10.1080\/07421222.1996.11518102"},{"key":"key2022031420071239400_b17","doi-asserted-by":"crossref","unstructured":"Gupta, G. and Gupta, H. (1992), \u201cOutsourcing the IS function. Is it necessary for your organization?\u201d, Information Systems Management, Vol. 9 No. 3, pp. 44\u201050.","DOI":"10.1080\/10580539208906881"},{"key":"key2022031420071239400_b18","unstructured":"Guterl, F. (1996), \u201cHow to manage your outsourcer?\u201d, Datamation, Vol. 42 No. 5, pp. 79\u201083."},{"key":"key2022031420071239400_b19","doi-asserted-by":"crossref","unstructured":"Hayes, D.C., Hunton, J.E. and Reck, J.J. (2000), \u201cInformation systems outsourcing announcements: investigating the impact on the market value of contract\u2010granting firms\u201d, Journal of Information Systems, Vol. 14 No. 2, pp. 109\u201025.","DOI":"10.2308\/jis.2000.14.2.109"},{"key":"key2022031420071239400_b20","unstructured":"Hurst, I. and Hanessian, B.G. (1995), \u201cNavigating IT channels: integrate or outsource?\u201d, The McKinsey Quarterly, No. 3, pp. 103\u201010."},{"key":"key2022031420071239400_b21","unstructured":"IBM (2008), \u201cEl RACC elige a IBM para gestionar su infraestructura tecnol\u00f3gica\u201d, available at: www\u201003.ibm.com\/press\/es\/es\/pressrelease\/26280.wss (accessed 3 September 2009)."},{"key":"key2022031420071239400_b22","unstructured":"IBM (2009), \u201cENDESA unifica la gesti\u00f3n de sus sistemas de informaci\u00f3n en Espa\u00f1a y Latinoam\u00e9rica\u201d, available at: www\u201003.ibm.com\/press\/es\/es\/pressrelease\/26562.wss (accessed 8 September 2009)."},{"key":"key2022031420071239400_b23","unstructured":"IDATE Foundation (2005), \u201cDigiworld 2005. Los retos del mundo digital\u201d, IDATE\u2010ENTER, Montpellier, available at: http:\/\/enter.es\/enter\/file\/espanol\/texto\/digiworld.2005.pdf."},{"key":"key2022031420071239400_b24","doi-asserted-by":"crossref","unstructured":"Jurison, J. (1995), \u201cThe role of risk and return in information technology outsourcing decisions\u201d, Journal of Information Technology, Vol. 10 No. 4, pp. 239\u201047.","DOI":"10.1177\/026839629501000404"},{"key":"key2022031420071239400_b25","unstructured":"Khan, I. (2007), \u201cOutsourcing not slowing down: study\u201d, available at: http:\/\/www.ddj.com\/architect\/197005853?cid=RSSfeed_DDJ_All (accessed 13 December 2007)."},{"key":"key2022031420071239400_b26","unstructured":"KPMG (2007), \u201cStrategic evolution. A global survey on sourcing today\u201d, available at: http:\/\/www.kpmg.com.au\/Portals\/0\/rasita_strategic\u2010evolution200701.pdf."},{"key":"key2022031420071239400_b27","doi-asserted-by":"crossref","unstructured":"Lacity, M. and Hirschheim, R. (1993a), \u201cImplementing information systems outsourcing: key issues and experiences of an early adopter\u201d, Journal of General Management, Vol. 19 No. 1, pp. 17\u201031.","DOI":"10.1177\/030630709301900102"},{"key":"key2022031420071239400_b28","unstructured":"Lacity, M. and Hirschheim, R. (1993b), \u201cThe information systems outsourcing bandwagon\u201d, Sloan Management Review, Vol. 35 No. 1, pp. 73\u201086."},{"key":"key2022031420071239400_b29","doi-asserted-by":"crossref","unstructured":"Lacity, M., Hirschheim, R. and Willcocks, L. (1994), \u201cRealizing outsourcing expectations\u201d, Incredible Expectations, Credible Outcomes, Information Systems Management, Vol. 11 No. 4, pp. 7\u201018.","DOI":"10.1080\/07399019408964664"},{"key":"key2022031420071239400_b30","doi-asserted-by":"crossref","unstructured":"Lee, J.\u2010N., Huynh, M.Q. and Hirschheim, R. (2008), \u201cAn integrative model of trust on IT outsourcing: examining a bilateral perspective\u201d, Information Systems Frontiers, Vol. 10 No. 2, pp. 145\u201063.","DOI":"10.1007\/s10796-008-9066-7"},{"key":"key2022031420071239400_b31","unstructured":"Linder, J.C. (2004), \u201cTransformational outsourcing\u201d, MIT Sloan Management Review, Vol. 45 No. 2, pp. 52\u20108."},{"key":"key2022031420071239400_b32","doi-asserted-by":"crossref","unstructured":"Loh, L. and Venkatraman, N. (1992), \u201cDiffusion of information technology outsourcing: influence sources and the Kodak effect\u201d, Information Systems Research, Vol. 3 No. 4, pp. 334\u201058.","DOI":"10.1287\/isre.3.4.334"},{"key":"key2022031420071239400_b34","unstructured":"McFarlan, F.W. and Nolan, R.L. (1995), \u201cHow to manage an IT outsourcing alliance\u201d, Sloan Management Review, Vol. 36 No. 2, pp. 8\u201023."},{"key":"key2022031420071239400_b35","doi-asserted-by":"crossref","unstructured":"McLellan, K., Marcolin, B. and Beamish, P. (1995), \u201cFinancial and strategic motivations behind IS outsourcing\u201d, Journal of Information Technology, Vol. 10 No. 4, pp. 299\u2010321.","DOI":"10.1177\/026839629501000409"},{"key":"key2022031420071239400_b33","doi-asserted-by":"crossref","unstructured":"Martinsons, M.G. (1993), \u201cOutsourcing information systems: a strategic partnership with risk\u201d, Long Range Planning, Vol. 26 No. 3, pp. 18\u201025.","DOI":"10.1016\/0024-6301(93)90003-X"},{"key":"key2022031420071239400_b36","doi-asserted-by":"crossref","unstructured":"Olson, D.L. (2007), \u201cEvaluation of ERP outsourcing\u201d, Computers & Operation Research, Vol. 34 No. 12, pp. 3715\u201024.","DOI":"10.1016\/j.cor.2006.01.010"},{"key":"key2022031420071239400_b37","doi-asserted-by":"crossref","unstructured":"Palvia, P.C. (1995), \u201cA dialectic view of information systems outsourcing: pros and cons\u201d, Information & Management, Vol. 29 No. 5, pp. 265\u201075.","DOI":"10.1016\/0378-7206(95)00030-9"},{"key":"key2022031420071239400_b39","doi-asserted-by":"crossref","unstructured":"Slaughter, S. and Ang, S. (1996), \u201cEmployment outsourcing in information systems\u201d, Communications of the ACM, Vol. 39 No. 7, pp. 47\u201054.","DOI":"10.1145\/233977.233994"},{"key":"key2022031420071239400_b40","doi-asserted-by":"crossref","unstructured":"Smith, M.A., Mitra, S. and Narasimhan, S. (1998), \u201cInformation systems outsourcing: a study of pre\u2010event firm characteristics\u201d, Journal of Management Information Systems, Vol. 15 No. 2, pp. 61\u201093.","DOI":"10.1080\/07421222.1998.11518209"},{"key":"key2022031420071239400_b41","doi-asserted-by":"crossref","unstructured":"Tafti, M.H.A. (2005), \u201cRisk factors associated with offshore IT outsourcing\u201d, Industrial Management & Data Systems, Vol. 105 No. 5, pp. 549\u201060.","DOI":"10.1108\/02635570510599940"},{"key":"key2022031420071239400_b42","unstructured":"Takahashi, S. and Sayer, P. (2007), \u201cEuropean IT\/telecom converged service delivery outsourcing deals: H1 2006. The battle rages between IT and telecom service providers\u201d, available at: www.forrester.com\/rb\/search\/results.jsp?No=25&N=50174 (accessed 3 February 2008)."},{"key":"key2022031420071239400_b44","unstructured":"Techweek (2009a), \u201cCaixa Galicia firma un contrato con BT por 26 millones de euros\u201d, available at: www.techweek.es\/outsourcing\/noticias\/1005679004401 (accessed 1 September 2009)."},{"key":"key2022031420071239400_b43","unstructured":"Techweek (2009b), \u201cEndesa conf\u00eda la gesti\u00f3n de sus TI a IBM\u201d, available at: www.techweek.es\/outsourcing\/soluciones\u2010negocio\/1005426004401 (accessed 1 September 2009)."},{"key":"key2022031420071239400_b45","unstructured":"Techweek (2009c), \u201cHP gestionar\u00e1 la plataforma TI de Renfe\u201d, available at: http:\/\/techweek.es\/outsourcing\/noticias\/1005342004401 (accessed 4 August 2009)."},{"key":"key2022031420071239400_b46","doi-asserted-by":"crossref","unstructured":"Udo, G.G. (2000), \u201cUsing analytic hierarchy process to analyse the information technology outsourcing decision\u201d, Industrial Management & Data Systems, Vol. 100 No. 9, pp. 421\u20109.","DOI":"10.1108\/02635570010358348"},{"key":"key2022031420071239400_b47","doi-asserted-by":"crossref","unstructured":"Whitten, D. and Wakefield, R.L. (2006), \u201cMeasuring switching costs in IT outsourcing services\u201d, Journal of Strategic Information Systems, Vol. 15, pp. 219\u201048.","DOI":"10.1016\/j.jsis.2005.11.002"},{"key":"key2022031420071239400_b49","unstructured":"Willcocks, L.P. and Fitzgerald, G. (1996), \u201cIT outsourcing and the changing shape of the information systems function\u201d, in Earl, M.J. (Ed.), Information Management. The Organizational Dimension, Oxford University Press, Oxford, pp. 270\u201094."},{"key":"key2022031420071239400_b48","doi-asserted-by":"crossref","unstructured":"Willcocks, L.P., Feeny, D. and Olson, N. (2006), \u201cImplementing core IS capabilities: Feeny\u2010Willcocks IT governance and management framework revisited\u201d, European Management Journal, Vol. 24 No. 1, pp. 28\u201037.","DOI":"10.1016\/j.emj.2005.12.005"},{"key":"key2022031420071239400_b50","doi-asserted-by":"crossref","unstructured":"Willcocks, L.P., Lacity, M.C. and Fitzgerald, G. (1995), \u201cInformation technology outsourcing in Europe and the USA: assessment issues\u201d, International Journal of Information Management, Vol. 15 No. 5, pp. 333\u201051.","DOI":"10.1016\/0268-4012(95)00035-6"},{"key":"key2022031420071239400_b51","doi-asserted-by":"crossref","unstructured":"Willcocks, L.P., Lacity, M.C. and Kern, T. (1999), \u201cRisk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA\u201d, Journal of Strategic Information Systems, Vol. 8 No. 3, pp. 285\u2010314.","DOI":"10.1016\/S0963-8687(00)00022-6"},{"key":"key2022031420071239400_b52","unstructured":"ZDNet (2007), \u201c87% of outsourcing buyers to continue outsourcing\u201d, available at: http:\/\/blogs.zdnet.com\/ITFacts\/index.php?cat=29 (accessed 4 April 2008)."},{"key":"key2022031420071239400_frd1","doi-asserted-by":"crossref","unstructured":"Poppo, L. and Zenger, T. (1998), \u201cTesting alternative theories of the firm: transaction cost, knowledge\u2010based, and measurement explanations for make\u2010or\u2010buy decisions in information services\u201d, Strategic Management Journal, Vol. 19 No. 9, pp. 853\u201077.","DOI":"10.1002\/(SICI)1097-0266(199809)19:9<853::AID-SMJ977>3.0.CO;2-B"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571011020359","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011020359\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011020359\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:18Z","timestamp":1753400298000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/110\/2\/284-303\/180809"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,16]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,3,16]]}},"alternative-id":["10.1108\/02635571011020359"],"URL":"https:\/\/doi.org\/10.1108\/02635571011020359","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2010,3,16]]}}}