{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:23:50Z","timestamp":1763580230394,"version":"3.41.2"},"reference-count":35,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2007,2,13]],"date-time":"2007-02-13T00:00:00Z","timestamp":1171324800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,2,13]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Offshore outsourcing of non\u2010core business process has rapidly evolved as a ubiquitous organisational phenomenon. However, failure to follow a clear, systematic and effective outsourcing strategy to evaluate threats, uncertainties and numerous imponderables can cause global enterprise businesses major setbacks. The reasons for such setback could be largely due to lack of core competency, careful legal planning and due diligence to operating models associated with an outsourcing initiative. This paper attempts to collate and exemplify the distinct qualifying processes accommodating contractual and intellectual property rights and provide a worthwhile debate on intricate legal considerations when structuring multi\u2010jurisdictional outsourcing deals.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper presents a comparative analysis of strategic legal and management framework by weighing the risks and evaluating the threats which would assist the decision making process of firms when selecting an appropriate offshore partner to carry out their IT\u2010development work.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Importance of legal intervention and due diligence to service agreements is further elevated as, at every phase of an outsourcing arrangement, compliance issues and contractual obligations can affect the success of an enterprise customer and its relationship with their outsourcing service provider.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The authors suggest that an exhaustive qualitative and quantitative industry specific research analysis be conducted in order to better define the principles and standards governing sub\u2010contracting arrangements.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>A broader exposure to the strategic management and regulatory framework might provide firms with vantage points from which they could assess and identify new opportunities, evaluate threats and adopt effective risk mitigation strategies. Compliance to security standards and safeguard of information acquisition, analysis and usage should emerge as the mainstream strategy for outsourcing.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper offers insights and an overview of management and legal issues in the context of offshore technology outsourcing.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14637150710721113","type":"journal-article","created":{"date-parts":[[2007,2,28]],"date-time":"2007-02-28T12:12:51Z","timestamp":1172664771000},"page":"21-46","source":"Crossref","is-referenced-by-count":30,"title":["Offshore technology outsourcing: overview of management and legal issues"],"prefix":"10.1108","volume":"13","author":[{"given":"Arjun K.","family":"Pai","sequence":"first","affiliation":[]},{"given":"Subhajit","family":"Basu","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012419431080500_b1","unstructured":"Agrawal, V. and Farrell, D. (2003), \u201cWho wins in offshoring\u201d, The McKinsey Quarterly, special edition: global directions, pp. 36\u201041."},{"key":"key2022012419431080500_b2","unstructured":"Amoribieta, I., Bhaumik, K., Kanakamedala, K. and Parkhe, A. (2001), \u201cProgrammers abroad: a primer on offshore software development\u201d, The McKinsey Quarterly, March."},{"key":"key2022012419431080500_b4","unstructured":"Bierce, W.B. and Kenerson, P.C. (2005), \u201cInsights on effective outsourcing\u201d, available at: outsourcing law global LLC. www.outsourcing\u2010law.com\/economics.htm."},{"key":"key2022012419431080500_b5","unstructured":"Business Standard (2003), \u201cUS firms saved $8 bn via local outsourcing\u201d, Business Standard, April 16."},{"key":"key2022012419431080500_b6","unstructured":"Cravotta, N. (2004), \u201cOffshore outsourcing: now boarding \u2013 a trip to China may just be the ticket to take your design to reality\u201d, Electrical Design News (EDN), September 2."},{"key":"key2022012419431080500_b7","unstructured":"Evans, P.C. and Smith, R.B. (2002), \u201cIntellectual property rights in collaborations\u201d, Bio Partnering, March."},{"key":"key2022012419431080500_b8","unstructured":"Fernandez, D., Kemeny, D. and Bastani, B. (2003), Intellectual Property Strategies in Security and Privacy, Fernandez & Associates, LLP, Menlo Park, CA."},{"key":"key2022012419431080500_b9","unstructured":"Financial Times (2004), \u201cIndia fears impact of bid to curb jobs exports\u201d, Financial Times, June 4."},{"key":"key2022012419431080500_b10","unstructured":"Hindustan Times (2003), \u201cUK's outsourcing revenue to touch $27 bn in 3 years\u201d, Hindustan times, available at: www.hindustantimes.com\/news\/6771_504972,004300190004.htm (accessed December 29)."},{"key":"key2022012419431080500_b11","unstructured":"Huff, S.L. (1991), \u201cOutsourcing of information services\u201d, Business Quarterly, Spring, pp. 62\u20105."},{"key":"key2022012419431080500_b13","unstructured":"Klein, A. and Wolsk, J. (2004), \u201cOutsourcing service levels in POS maintenance transactions\u201d, available at: www.executivetechnology.com\/ViewSOFull.cfm?SOID\u2009=\u2009133."},{"key":"key2022012419431080500_b14","unstructured":"Kulkarni, J. (2004), \u201cBest practices in IP protection when off\u2010shoring\u201d, available at: www.noa.co.uk\/features; www.noa.co.uk\/features\/featuresKeyToneoppc.html."},{"key":"key2022012419431080500_b15","unstructured":"Lacity, M. and Hirschheim, R. (1993), \u201cThe information systems outsourcing bandwagon\u201d, Sloan Management Review, Vol. 35 No. 1, pp. 73\u201086."},{"key":"key2022012419431080500_b18","unstructured":"Ling, G., Prabhudev, K. and Huseyin, T. (2004), \u201cGlobal sourcing and the value chain unbundling\u201d, technical report, McCombs School of Business, The University of Texas, Austin, TX."},{"key":"key2022012419431080500_b19","unstructured":"Loh, L. and Venkatraman, N. (1991), \u201cOutsourcing as a mechanism of information technology governance: a test of alternative diffusion models\u201d, Working Paper No. BPS3271\u201091, Massachusetts Institute of Technology, Alfred P. Sloan School of Management, Cambridge, MA."},{"key":"key2022012419431080500_b20","unstructured":"Money (2004), \u201cOutsourcing creates jobs in US, an industrial study\u201d, available at: http:\/\/money.cnn.com\/2004\/03\/30\/news\/economy\/outsourcing\/ (accessed March 30)."},{"key":"key2022012419431080500_b21","unstructured":"Pai, A. and Basu, S. (2005), \u201cOffshore outsourcing \u2013 weighing the risks of data protection and security\u201d, paper presented at 20th Annual British and Irish, Legal Education and Technology Conference, BILETA 2005."},{"key":"key2022012419431080500_b22","unstructured":"Prahalad, C.K. and Ramaswamy, V. (2001), \u201cThe collaboration continuum\u201d, The Optimize Magazine, Vol. 2001, November 2001 available at: www.optimizemag.com."},{"key":"key2022012419431080500_b23","unstructured":"Ramer, R. (2004), The Security Challenges of Offshore Development, The SANS (SysAdmin, Audit, Network, Security) Institute, Bethesda, MD."},{"key":"key2022012419431080500_b24","unstructured":"Raysman, R. and Brown, P. (1998), \u201cKey issues in technology outsourcing agreements\u201d, available at: www.brownraysman.com."},{"key":"key2022012419431080500_b25","unstructured":"Richmond, W.B. and Seidman, A. (1991), \u201cOutsourcing and contractual issues in the systems development life\u201d, working paper, William E. Simon Graduate School of Business Administration, University of Rochester, New York, NY."},{"key":"key2022012419431080500_b26","unstructured":"Robinson, M. and Kalakota, R. (2004), \u201cOffshore outsourcing: next wave\u201d, E\u2010Business Strategies, Inc, 1, E\u2010Business Strategies, Inc., Alpharetta, GA, p. 5."},{"key":"key2022012419431080500_b35","unstructured":"RTTS (2006), \u201cStatistics related to offshore outsourcing\u201d, available at: www.rttsweb.com\/outsourcing\/statistics\/ (accessed October 13)."},{"key":"key2022012419431080500_b27","unstructured":"Tompkins, J. (2003), \u201cOutsourcing: solution or setback?\u201d, Tompkins Associates, available online."},{"key":"key2022012419431080500_b28","unstructured":"Tramacere, G. (2004), The Future of Infrastructure Outsourcing in Western Europe, Gartner Research Inc., Stamford, CT, June."},{"key":"key2022012419431080500_b29","unstructured":"Vnuet (2002), \u201cGlaxoSmithKline considers outsourcing deal\u201d, available at: www.vnuet.com, (accessed December 12)."},{"key":"key2022012419431080500_b30","doi-asserted-by":"crossref","unstructured":"Whang, S. (1992), \u201cContracting for software development\u201d, Management Science, Vol. 38 No. 2, pp. 307\u201024.","DOI":"10.1287\/mnsc.38.3.307"},{"key":"key2022012419431080500_b31","unstructured":"WIPO SME (2004), \u201cInternational exhaustion and parallel importation in \u2018Introduction to IP and Business\u2019\u201d, WIPO SME Division available at: www.wipo.int\/sme\/en\/documents\/outsourcing.htm#P172_39913."},{"key":"key2022012419431080500_b33","unstructured":"Xicom (2004), \u201cBusiness process outsourcing (BPO) market growth\u201d, available at: www.xicom.biz\/bpo_market_growth.html (accessed November 6)."},{"key":"key2022012419431080500_b34","unstructured":"Zaharoff, H.G. (2004), Rights and Ownership Options in Technology Development Agreements, Morse, Barnes\u2010Brown & Pendleton, P.C., Waltham, MA, available at: www.mbbp.com."},{"key":"key2022012419431080500_frd1","unstructured":"Aubert, B.A., Patry, M. and Rivard, S. (1998), \u201cAssessing the risk of IT outsourcing\u201d, Proceedings of the 31st Hawaii International Conference on System Sciences, Vol. 6, pp. 685\u201092."},{"key":"key2022012419431080500_frd2","doi-asserted-by":"crossref","unstructured":"Kishore, R., Rao, H.R., Nam, K., Rajagopalan, S. and Chaudhury, A. (2003), \u201cA relationship perspective on IT outsourcing\u201d, Communications of the ACM, Vol. 46 No. 12, pp. 86\u201092.","DOI":"10.1145\/953460.953464"},{"key":"key2022012419431080500_frd3","doi-asserted-by":"crossref","unstructured":"Laplante, P.A., Costello, T., Singh, p., Bindiganavile, s. and Landon, M. (2004), \u201cThe who, what, why, where, and when of IT outsourcing\u201d, IT Professional, Vol. 6 No. 1, pp. 19\u201023.","DOI":"10.1109\/MITP.2004.1265538"},{"key":"key2022012419431080500_frd4","doi-asserted-by":"crossref","unstructured":"Lee, J\u2010N., Huynh, M.Q., Kwok, R.C\u2010W. and Pi, S\u2010M. (2003), \u201cIT outsourcing evolution: past, present, and future\u201d, Communications of the ACM, Vol. 46 No. 5, pp. 84\u20109.","DOI":"10.1145\/769800.769807"},{"key":"key2022012419431080500_frd5","doi-asserted-by":"crossref","unstructured":"Wonseok Oh (2005), \u201cWhy do some firms outsource it more aggressively than others? The effects of organizational characteristics on IT outsourcing decisions\u201d, Proceedings of the 38th Hawaii International Conference on System Sciences, p. 259c.","DOI":"10.1109\/HICSS.2005.696"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14637150710721113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150710721113\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150710721113\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:35:56Z","timestamp":1753403756000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/13\/1\/21-46\/257364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2,13]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,2,13]]}},"alternative-id":["10.1108\/14637150710721113"],"URL":"https:\/\/doi.org\/10.1108\/14637150710721113","relation":{},"ISSN":["1463-7154"],"issn-type":[{"type":"print","value":"1463-7154"}],"subject":[],"published":{"date-parts":[[2007,2,13]]}}}