{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:53:15Z","timestamp":1761947595572,"version":"3.41.2"},"reference-count":51,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2010,3,23]],"date-time":"2010-03-23T00:00:00Z","timestamp":1269302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Information systems (IS) outsourcing has grown dramatically in recent years, however few studies have dealt with the influence of outsourcing on the role of IS managers. In attempting to fill the gap, this study presents and analyzes the results of a survey among large Spanish firms. Also the paper analyzes these results along time. So, the main aim of the paper is to focus on the implications of outsourcing over IS managers and the evolution of these implications in recent years. Moreover, the paper presents a typology of firms according to how outsourcing has influence IS managers.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A questionnaire was administered to the IS managers of the largest Spanish firms, so outsourcing influence is analysed from the point of view of the own managers affected by outsourcing.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The paper concludes that outsourcing has benefited IS managers in the largest Spanish firms, enhancing their jobs and working as a valuable alternative to internal IS activity.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>An important contribution made by this paper is the presentation of a typology of enterprises according to how outsourcing has influenced the professional activities of IS managers.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571011030015","type":"journal-article","created":{"date-parts":[[2010,3,20]],"date-time":"2010-03-20T08:01:50Z","timestamp":1269072110000},"page":"325-350","source":"Crossref","is-referenced-by-count":7,"title":["Outsourcing and information systems managers: an empirical study"],"prefix":"10.1108","volume":"110","author":[{"given":"Reyes","family":"Gonzalez","sequence":"first","affiliation":[]},{"given":"Jose","family":"Gasco","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Llopis","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022013120412680100_b1","doi-asserted-by":"crossref","unstructured":"Apte, U.M., Sobol, M.G., Hanaoka, S., Shimada, T., Saarinen, T., Salmela, T. and Vepsalainen, A.P.J. (1997), \u201cIS outsourcing practices in the USA, Japan and Finland: a comparative study\u201d, Journal of Information Technology, Vol. 12 No. 4, pp. 289\u2010304.","DOI":"10.1177\/026839629701200405"},{"key":"key2022013120412680100_b2","doi-asserted-by":"crossref","unstructured":"Bahli, B. and Rivard, S. (2005), \u201cValidating measures if information technology outsourcing risks factors\u201d, OMEGA, Vol. 33 No. 2, pp. 175\u201087.","DOI":"10.1016\/j.omega.2004.04.003"},{"key":"key2022013120412680100_b3","doi-asserted-by":"crossref","unstructured":"Barcus, A. and Montibeller, G. (2008), \u201cSupporting the allocation of software development work in distributed teams with multi\u2010criteria decision analysis\u201d, OMEGA, Vol. 36 No. 3, pp. 464\u201075.","DOI":"10.1016\/j.omega.2006.04.013"},{"key":"key2022013120412680100_b4","doi-asserted-by":"crossref","unstructured":"Benamati, J.S. and Rajkumar, T.M. (2008), \u201cAn outsourcing acceptance model: an application of TAM to application development outsourcing decisions\u201d, Information Resources Management Journal, Vol. 21 No. 2, pp. 80\u2010102.","DOI":"10.4018\/irmj.2008040105"},{"key":"key2022013120412680100_b5","unstructured":"Brooks, N. (2006), \u201cUnderstanding IT outsourcing and its potential effects on IT workers and their environment\u201d, The Journal of Computer Information Systems, Vol. 46 No. 4, pp. 46\u201053."},{"key":"key2022013120412680100_b6","doi-asserted-by":"crossref","unstructured":"Byrd, T.A., Thrasher, E.H., Lang, T. and Davidson, N.W. (2006), \u201cA process\u2010oriented perspective of IS success: examining the impact of IS on operational cost\u201d, OMEGA, Vol. 34 No. 5, pp. 448\u201060.","DOI":"10.1016\/j.omega.2005.01.012"},{"key":"key2022013120412680100_b7","doi-asserted-by":"crossref","unstructured":"Capaldo, G., Raffa, M. and Zollo, G. (1995), \u201cFactors influencing successful implementation in computer based technologies in knowledge\u2010intensive activities\u201d, Information Resources Management Journal, Vol. 8 No. 4, pp. 29\u201037.","DOI":"10.4018\/irmj.1995100103"},{"key":"key2022013120412680100_b8","doi-asserted-by":"crossref","unstructured":"Casades\u00fas, M. and Karapetrovic, S. (2005), \u201cHas ISO 9000 lost some of its lustre? A longitudinal impact study\u201d, International Journal of Operations & Production Management, Vol. 25 No. 6, pp. 580\u201096.","DOI":"10.1108\/01443570510599737"},{"key":"key2022013120412680100_b9","doi-asserted-by":"crossref","unstructured":"Chua, A.L. and Pan, S.L. (2008), \u201cKnowledge transfer and organizational learning in IS offshore sourcing\u201d, OMEGA, Vol. 36 No. 2, pp. 267\u201081.","DOI":"10.1016\/j.omega.2006.06.008"},{"key":"key2022013120412680100_b10","doi-asserted-by":"crossref","unstructured":"Clark, T.D., Zmud, R.W. and McCray, G.E. (1995), \u201cThe outsourcing of information services: transforming the nature of business in the information industry\u201d, Journal of Information Technology, Vol. 10, pp. 221\u201037.","DOI":"10.1177\/026839629501000403"},{"key":"key2022013120412680100_b11","doi-asserted-by":"crossref","unstructured":"Corbett, M.F. (1994), \u201cOutsourcing and the new IT executive: a trends report\u201d, Information Systems Management, Vol. 11 No. 4, pp. 19\u201022.","DOI":"10.1080\/07399019408964665"},{"key":"key2022013120412680100_b12","doi-asserted-by":"crossref","unstructured":"Currie, W.L. (1998), \u201cUsing multiple suppliers to mitigate the risk of IT outsourcing at ICI and Wessex water\u201d, Journal of Information Technology, Vol. 13 No. 3, pp. 169\u201080.","DOI":"10.1177\/026839629801300303"},{"key":"key2022013120412680100_b13","doi-asserted-by":"crossref","unstructured":"Dawes, J. (2008), \u201cDo data characteristics change according to the number of scale points used? An experiment using 5\u2010point, 7\u2010point and 10\u2010point scales\u201d, International Journal of Market Research, Vol. 50 No. 1, pp. 61\u2010104.","DOI":"10.1177\/147078530805000106"},{"key":"key2022013120412680100_b14","doi-asserted-by":"crossref","unstructured":"Dibbern, J., Goles, T., Hirschheim, R. and Jayatilaka, B. (2004), \u201cInformation systems outsourcing: a survey and analysis of the literature\u201d, Database for Advances in Information Systems, Vol. 35 No. 4, pp. 6\u2010102.","DOI":"10.1145\/1035233.1035236"},{"key":"key2022013120412680100_b15","unstructured":"Feeny, D. and Willcocks, L. (1998), \u201cCore IS capabilities for exploiting information technology\u201d, Sloan Management Review, Vol. 39 No. 3, pp. 9\u201021."},{"key":"key2022013120412680100_b16","doi-asserted-by":"crossref","unstructured":"Gilley, K.M., Greer, C.R. and Rasheed, A.A. (2004), \u201cHuman resource outsourcing and organizational performance in manufacturing firms\u201d, Journal of Business Research, Vol. 57 No. 3, pp. 232\u201040.","DOI":"10.1016\/S0148-2963(02)00304-1"},{"key":"key2022013120412680100_b17","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Gasco, J. and Llopis, J. (2005a), \u201cInformation systems outsourcing reasons in the largest Spanish firms\u201d, International Journal of Information Management, Vol. 25 No. 2, pp. 117\u201036.","DOI":"10.1016\/j.ijinfomgt.2004.10.002"},{"key":"key2022013120412680100_b18","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Gasco, J. and Llopis, J. (2005b), \u201cInformation systems outsourcing risks: a study of large firms\u201d, Industrial Management & Data Systems, Vol. 105 No. 1, pp. 45\u201062.","DOI":"10.1108\/02635570510575180"},{"key":"key2022013120412680100_b19","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Gasco, J. and Llopis, J. (2005c), \u201cInformation systems outsourcing success factors: a review and some results\u201d, Information Management & Computer Security, Vol. 13 No. 5, pp. 399\u2010418.","DOI":"10.1108\/09685220510627287"},{"key":"key2022013120412680100_b20","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Gasco, J. and Llopis, J. (2006a), \u201cInformation systems managers' view about outsourcing in Spain\u201d, Information Management & Computer Security, Vol. 14 No. 2, pp. 312\u201026.","DOI":"10.1108\/09685220610690790"},{"key":"key2022013120412680100_b21","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Gasco, J. and Llopis, J. (2006b), \u201cInformation systems offshore outsourcing: a descriptive analysis\u201d, Industrial Management & Data Systems, Vol. 106 No. 9, pp. 1233\u201048.","DOI":"10.1108\/02635570610712555"},{"key":"key2022013120412680100_b22","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Gasco, J. and Llopis, J. (2006c), \u201cInformation systems outsourcing: a literature analysis\u201d, Information & Management, Vol. 43 No. 7, pp. 821\u201034.","DOI":"10.1016\/j.im.2006.07.002"},{"key":"key2022013120412680100_b23","doi-asserted-by":"crossref","unstructured":"Gottschalk, P. and Karlsen, J.T. (2005), \u201cA comparison of leadership roles in internal IT projects versus outsourcing projects\u201d, Industrial Management & Data Systems, Vol. 105 No. 9, pp. 1137\u201049.","DOI":"10.1108\/02635570510633220"},{"key":"key2022013120412680100_b24","doi-asserted-by":"crossref","unstructured":"Grover, V., Cheon, M.J. and Teng, T.C. (1996), \u201cThe effect of service quality and partnership on the outsourcing of information systems functions\u201d, Journal of Management Information Systems, Vol. 12 No. 4, pp. 89\u2010116.","DOI":"10.1080\/07421222.1996.11518102"},{"key":"key2022013120412680100_b25","unstructured":"Guterl, F. (1996), \u201cHow to manage your outsourcer?\u201d, Datamation, Vol. 42 No. 5, pp. 79\u201083."},{"key":"key2022013120412680100_b26","doi-asserted-by":"crossref","unstructured":"Ho, V.T., Ang, S. and Straub, D. (2003), \u201cWhen subordinates become IT contractors: persistent managerial expectations in IT outsourcing\u201d, Information Systems Research, Vol. 14 No. 1, pp. 66\u201086.","DOI":"10.1287\/isre.14.1.66.14764"},{"key":"key2022013120412680100_b27","unstructured":"IDC (2005), \u201cEstudio sobre el atractivo de Espa\u00f1a como destino del Nearshore\u201d, available at: www.idc.com\/spain\/downloads\/research\/fs_nearshore.pdf (internet document, downloaded 16 September 2005)."},{"key":"key2022013120412680100_b28","doi-asserted-by":"crossref","unstructured":"Jiang, B., Reinhardt, G. and Young, S.T. (2008), \u201cBOCOG's outsourcing contracts: the vendor's perspective\u201d, OMEGA, Vol. 36 No. 6, pp. 941\u20109.","DOI":"10.1016\/j.omega.2007.05.004"},{"key":"key2022013120412680100_b29","doi-asserted-by":"crossref","unstructured":"Karlsen, J.T. and Gottschalk, P. (2006), \u201cProject manager roles in IT outsourcing\u201d, Engineering Management Journal, Vol. 18 No. 1, pp. 3\u20109.","DOI":"10.1080\/10429247.2006.11431678"},{"key":"key2022013120412680100_b30","doi-asserted-by":"crossref","unstructured":"Knapp, K., Sharma, S. and King, K. (2007), \u201cMacro\u2010economic and social impacts of offshore outsourcing of information technology: practitioner and academic perspectives\u201d, International Journal of E\u2010Business Research, Vol. 3 No. 4, pp. 112\u201032.","DOI":"10.4018\/jebr.2007100107"},{"key":"key2022013120412680100_b31","doi-asserted-by":"crossref","unstructured":"Koh, Ch., Ang, S. and Straub, D.W. (2004), \u201cIT outsourcing success: a psychological contract perspective\u201d, Information Systems Research, Vol. 15 No. 4, pp. 356\u201072.","DOI":"10.1287\/isre.1040.0035"},{"key":"key2022013120412680100_b32","unstructured":"KPMG (2007), \u201cStrategic evolution: a global survey on sourcing today\u201d, available at: www.kpmg.com.au\/Portals\/0\/rasita_strategic\u2010evolution200701.pdf (internet document, downloaded on 28 February 2007)."},{"key":"key2022013120412680100_b33","doi-asserted-by":"crossref","unstructured":"Kumar, S. (2006), \u201cA comparative analysis of key information technology players\u201d, Technovation, Vol. 26 No. 7, pp. 836\u201046.","DOI":"10.1016\/j.technovation.2005.05.003"},{"key":"key2022013120412680100_b34","doi-asserted-by":"crossref","unstructured":"Lee, J\u2010N. (2001), \u201cThe impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success\u201d, Information & Management, Vol. 38 No. 5, pp. 323\u201035.","DOI":"10.1016\/S0378-7206(00)00074-4"},{"key":"key2022013120412680100_b35","doi-asserted-by":"crossref","unstructured":"Lee, J.\u2010N., Miranda, S.\u2010M. and Kim, Y.\u2010M. (2004), \u201cIT outsourcing strategies: universalistic, contingency, and configurational explanations of success\u201d, Information Systems Research, Vol. 15 No. 2, pp. 110\u201031.","DOI":"10.1287\/isre.1040.0013"},{"key":"key2022013120412680100_b36","unstructured":"Leinfuss, E. (1991), \u201cHow outsourcing impacts IS managers\u201d, Computerworld, September, p. 113."},{"key":"key2022013120412680100_b39","unstructured":"McFarlan, F.W. and Nolan, R.L. (1995), \u201cHow to manage an IT outsourcing alliance\u201d, Sloan Management Review, Vol. 36 No. 2, pp. 8\u201023."},{"key":"key2022013120412680100_b37","doi-asserted-by":"crossref","unstructured":"Ma, Q., Pearson, J.M. and Tadisina, S. (2005), \u201cAn exploratory study into factors of service quality for application service providers\u201d, Information & Management, Vol. 42 No. 4, pp. 1067\u201080.","DOI":"10.1016\/j.im.2004.11.007"},{"key":"key2022013120412680100_b38","doi-asserted-by":"crossref","unstructured":"Martinsons, M.G. and Cheung, C. (2001), \u201cThe impact of emerging practices on IS specialists: perceptions, attitudes and role changes in Hong Kong\u201d, Information & Management, Vol. 38 No. 3, pp. 167\u201083.","DOI":"10.1016\/S0378-7206(00)00063-X"},{"key":"key2022013120412680100_b40","unstructured":"Mehler, M. (1997), \u201cIn the Spotlight \u2013 senior executives want their IS managers to be more than plumbers\u201d, InformationWeek, January, p. 72."},{"key":"key2022013120412680100_b41","doi-asserted-by":"crossref","unstructured":"Mirchandani, D.A. and Lederer, A.L. (2006), \u201cThe impact of autonomy on information systems planning effectiveness\u201d, OMEGA, Vol. 36 No. 5, pp. 789\u2010807.","DOI":"10.1016\/j.omega.2006.04.001"},{"key":"key2022013120412680100_b42","doi-asserted-by":"crossref","unstructured":"Palvia, P.C. (1995), \u201cA dialectic view of information systems outsourcing: pros and cons\u201d, Information & Management, Vol. 29 No. 5, pp. 265\u201075.","DOI":"10.1016\/0378-7206(95)00030-9"},{"key":"key2022013120412680100_b43","doi-asserted-by":"crossref","unstructured":"Peppard, J. (2007), \u201cThe conundrum of IT management\u201d, European Journal of Information Systems, Vol. 16 No. 4, pp. 336\u201045.","DOI":"10.1057\/palgrave.ejis.3000697"},{"key":"key2022013120412680100_b44","doi-asserted-by":"crossref","unstructured":"Poppo, L. and Zenger, T. (1998), \u201cTesting alternative theories of the firm: transaction cost, knowledge\u2010based, and measurement explanations for make\u2010or\u2010buy decisions in information services\u201d, Strategic Management Journal, Vol. 19 No. 9, pp. 853\u201077.","DOI":"10.1002\/(SICI)1097-0266(199809)19:9<853::AID-SMJ977>3.0.CO;2-B"},{"key":"key2022013120412680100_b45","doi-asserted-by":"crossref","unstructured":"Scott, J.E. (2007), \u201cMobility, business process management, software sourcing, and maturity model trends: propositions for the IS organization of the future\u201d, Information Systems Management, Vol. 24 No. 2, pp. 139\u201045.","DOI":"10.1080\/10580530701221031"},{"key":"key2022013120412680100_b46","doi-asserted-by":"crossref","unstructured":"Sharma, M.K., Bhagwat, R. and Dangayach, G.S. (2008), \u201cPerformance measurement of information systems in small and medium sized enterprises: a strategic perspective\u201d, Production Planning & Control, Vol. 19 No. 1, pp. 12\u201024.","DOI":"10.1080\/09537280701737059"},{"key":"key2022013120412680100_b47","doi-asserted-by":"crossref","unstructured":"Shi, Z., Kunnathur, A.S. and Ragu\u2010Nathan, T.S. (2005), \u201cIS outsourcing management competence dimensions: instrument development and relationship exploration\u201d, Information & Management, Vol. 42 No. 6, pp. 901\u201019.","DOI":"10.1016\/j.im.2004.10.001"},{"key":"key2022013120412680100_b48","unstructured":"Useem, M. and Harder, J. (2000), \u201cLeading laterally in company outsourcing\u201d, Sloan Management Review, Vol. 41 No. 2, pp. 25\u201036."},{"key":"key2022013120412680100_b49","doi-asserted-by":"crossref","unstructured":"Wadhwa, V. and Ravindran, A.R. (2007), \u201cVendor selection in outsourcing\u201d, Computers & Operations Research, Vol. 34 No. 12, pp. 3725\u201037.","DOI":"10.1016\/j.cor.2006.01.009"},{"key":"key2022013120412680100_b50","doi-asserted-by":"crossref","unstructured":"Walden, E.A. and Hoffman, J.J. (2007), \u201cOrganizational form, incentives and the management of information technology: opening the black box of outsourcing\u201d, Computers & Operations Research, Vol. 34 No. 12, pp. 3575\u201091.","DOI":"10.1016\/j.cor.2006.01.002"},{"key":"key2022013120412680100_b51","doi-asserted-by":"crossref","unstructured":"Willcocks, L., Feeny, D. and Olson, N. (2006), \u201cImplementing core IS capabilities: Feeny\u2010Willcocks IT governance and management framework revisited\u201d, European Management Journal, Vol. 24 No. 1, pp. 28\u201037.","DOI":"10.1016\/j.emj.2005.12.005"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571011030015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011030015\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011030015\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:18Z","timestamp":1753400298000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/110\/3\/325-350\/179245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,23]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,3,23]]}},"alternative-id":["10.1108\/02635571011030015"],"URL":"https:\/\/doi.org\/10.1108\/02635571011030015","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2010,3,23]]}}}