{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:02:04Z","timestamp":1727064124587},"reference-count":110,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10,1]]},"abstract":"<p>Both information systems (IS) outsourcing and knowledge management are well-established business phenomena. The integration of shared knowledge in an IS outsourcing arrangement, represents the blending of organisational knowledge with external knowledge sources. In an attempt to provide tactical mechanisms for creating and managing shared knowledge in organisations embarking on IS outsourcing arrangements, this article focuses on the design and application of a knowledge framework for IS outsourcing, with the purpose of guiding organisations in their knowledge exchange planning through concrete mechanisms, practical steps and validation. Key considerations for IS outsourcing is mapped to critical success factors, each associated with a set of knowledge requirements and knowledge flows to support the successful achievement of a specific critical success factor. An associated assessment tool was designed to identify knowledge exchange mechanisms and potential issues and gaps in current or future IS outsource arrangements.<\/p>","DOI":"10.4018\/ijkm.2017100101","type":"journal-article","created":{"date-parts":[[2018,1,2]],"date-time":"2018-01-02T12:27:23Z","timestamp":1514896043000},"page":"1-30","source":"Crossref","is-referenced-by-count":6,"title":["Framework for Managing Shared Knowledge in an Information Systems Outsourcing Context"],"prefix":"10.4018","volume":"13","author":[{"given":"Hanlie","family":"Smuts","sequence":"first","affiliation":[{"name":"University of Pretoria, Pretoria, South Africa"}]},{"given":"Paula","family":"Kotz\u00e9","sequence":"additional","affiliation":[{"name":"CSIR Meraka Institute and University of Pretoria, Pretoria, South Africa"}]},{"given":"Alta","family":"Van der Merwe","sequence":"additional","affiliation":[{"name":"University of Pretoria, Informatics, Pretoria, South Africa"}]},{"given":"Marianne","family":"Loock","sequence":"additional","affiliation":[{"name":"University of South Africa, Pretoria, South Africa"}]}],"member":"2432","reference":[{"key":"IJKM.2017100101-0","author":"R.Aalders","year":"2001","journal-title":"The IT outsourcing guide"},{"key":"IJKM.2017100101-1","doi-asserted-by":"publisher","DOI":"10.1108\/09576059810209973"},{"key":"IJKM.2017100101-2","first-page":"229","article-title":"Towards a unified model for successful implementation of outsourcing and reversibility of information systems.","volume":"25","author":"W.Al-Ahmad","year":"2013","journal-title":"Computer and Information Sciences"},{"key":"IJKM.2017100101-3","doi-asserted-by":"publisher","DOI":"10.2307\/3250961"},{"key":"IJKM.2017100101-4","article-title":"A Model for Studying IT Outsourcing Relationships","author":"S.Alborz","year":"2003","journal-title":"7th Pacific Asia Conference on Information Systems"},{"issue":"2","key":"IJKM.2017100101-5","first-page":"31","article-title":"IT Outsourcing Partnerships","volume":"17","author":"M.Alexandrova","year":"2012","journal-title":"Empirical Research on Key Success Factors in Bulgarian Organisations Management"},{"key":"IJKM.2017100101-6","unstructured":"Ali, S., & Khan, S. U. (2014). Software Outsourcing Partnership Model In Proceedings of theInternational Symposium on Research in Innovation and Sustainability 2014 (ISoRIS \u201914), Malacca, Malaysia: Sci. Int.."},{"key":"IJKM.2017100101-7","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.8.3.235"},{"key":"IJKM.2017100101-8","doi-asserted-by":"publisher","DOI":"10.1145\/1104004.1104007"},{"key":"IJKM.2017100101-9","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9084-5"},{"key":"IJKM.2017100101-10","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.178"},{"key":"IJKM.2017100101-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.10.006"},{"key":"IJKM.2017100101-12","doi-asserted-by":"publisher","DOI":"10.5465\/AME.2003.10025203"},{"key":"IJKM.2017100101-13","doi-asserted-by":"publisher","DOI":"10.1108\/01443570410541993"},{"key":"IJKM.2017100101-14","author":"J.Benamati","year":"2002","journal-title":"A design of an empirical study of the applicability of the Technology Acceptance Model to outsourcing decisions Special Interest Group on Computer Personnel Research"},{"key":"IJKM.2017100101-15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2001.927193"},{"key":"IJKM.2017100101-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2008.11.004"},{"key":"IJKM.2017100101-17","author":"H.Boeije","year":"2010","journal-title":"Analysis in Qualitative Research"},{"key":"IJKM.2017100101-18","article-title":"A review and assessment of organisational learning in economic theories","author":"C.Boerner","year":"2003","journal-title":"Handbook of Organisational Learning and Knowledge"},{"key":"IJKM.2017100101-19","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.757"},{"key":"IJKM.2017100101-20","unstructured":"Brown, D., & Fersht, P. (2014). Executive report: The State of Services & Outsourcing in 2014. HFS Research. Retrieved from http:\/\/www.kpmg-institutes.com\/content\/dam\/kpmg\/sharedservicesoutsourcinginstitute\/pdf\/2014\/state-of-outsourcing-2014-exec-findings-hfs.pdf"},{"key":"IJKM.2017100101-21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45324-3_14"},{"key":"IJKM.2017100101-22","doi-asserted-by":"publisher","DOI":"10.1108\/00400910110399201"},{"key":"IJKM.2017100101-23","doi-asserted-by":"publisher","DOI":"10.1108\/09576050210436138"},{"key":"IJKM.2017100101-24","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000006068"},{"key":"IJKM.2017100101-25","author":"S.Cullen","year":"2003","journal-title":"Intelligent IT outsourcing: eight building blocks to success"},{"key":"IJKM.2017100101-26","doi-asserted-by":"publisher","DOI":"10.1108\/09600030010325993"},{"key":"IJKM.2017100101-27","doi-asserted-by":"publisher","DOI":"10.1080\/714042463"},{"key":"IJKM.2017100101-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2014.10.011"},{"key":"IJKM.2017100101-29","doi-asserted-by":"publisher","DOI":"10.1145\/1035233.1035236"},{"key":"IJKM.2017100101-30","author":"M. J.Earl","year":"1996","journal-title":"The risk of outsourcing IT. Sloan Management Review"},{"key":"IJKM.2017100101-31","author":"E. H.Edersheim","year":"2007","journal-title":"The Definitive Drucker"},{"key":"IJKM.2017100101-32","doi-asserted-by":"publisher","DOI":"10.1108\/13673270210440848"},{"key":"IJKM.2017100101-33","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000005315"},{"key":"IJKM.2017100101-34","doi-asserted-by":"publisher","DOI":"10.1108\/09576050310499309"},{"key":"IJKM.2017100101-35","doi-asserted-by":"publisher","DOI":"10.1108\/14637150810916035"},{"key":"IJKM.2017100101-36","first-page":"1","article-title":"Knowledge Management Models within Information Technology Projects.","volume":"0","author":"A.Foote","year":"2016","journal-title":"Journal of Computer Information Systems"},{"key":"IJKM.2017100101-37","doi-asserted-by":"publisher","DOI":"10.1108\/14635770310477771"},{"key":"IJKM.2017100101-38","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.421"},{"key":"IJKM.2017100101-39","doi-asserted-by":"publisher","DOI":"10.1145\/1104004.1104009"},{"key":"IJKM.2017100101-40","doi-asserted-by":"publisher","DOI":"10.1108\/09685220510627287"},{"key":"IJKM.2017100101-41","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2008.00200.x"},{"key":"IJKM.2017100101-42","first-page":"22","article-title":"Emergence of the Knowledge Age.","volume":"1","author":"G.Gordon","year":"1999","journal-title":"Competing Effectively in the Information Age: Knowledge Management"},{"key":"IJKM.2017100101-43","doi-asserted-by":"publisher","DOI":"10.1108\/02635570510633220"},{"key":"IJKM.2017100101-44","doi-asserted-by":"publisher","DOI":"10.1108\/02635570510606941"},{"key":"IJKM.2017100101-45","doi-asserted-by":"publisher","DOI":"10.1108\/02635570610649853"},{"key":"IJKM.2017100101-46","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518102"},{"key":"IJKM.2017100101-47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2010.05.003"},{"key":"IJKM.2017100101-48","doi-asserted-by":"crossref","unstructured":"Hoffmann, M., Loser, K.-U., Walter, T., & Herrman, T. (1999). A design process for embedding knowledge management in everyday work. ACM, 99(11), 296-305. doi:1-58113-065-1","DOI":"10.1145\/320297.320332"},{"key":"IJKM.2017100101-49","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-916-8.ch002"},{"key":"IJKM.2017100101-50","doi-asserted-by":"publisher","DOI":"10.1080\/15228053.2003.10856024"},{"key":"IJKM.2017100101-51","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2007.28"},{"key":"IJKM.2017100101-52","doi-asserted-by":"publisher","DOI":"10.1108\/08858620310480241"},{"key":"IJKM.2017100101-53","doi-asserted-by":"publisher","DOI":"10.1108\/09576050310483817"},{"key":"IJKM.2017100101-54","doi-asserted-by":"publisher","DOI":"10.1002\/smj.333"},{"key":"IJKM.2017100101-55","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jibs.8490248"},{"key":"IJKM.2017100101-56","doi-asserted-by":"publisher","DOI":"10.1057\/9780230594838"},{"key":"IJKM.2017100101-57","doi-asserted-by":"publisher","DOI":"10.1108\/13673270910962851"},{"key":"IJKM.2017100101-58","doi-asserted-by":"crossref","unstructured":"Laplante, P. A., Costello, T., Singh, P., Bindiganavile, S., & Landon, M. (2004). The Who, What, Why, Where and When of IT Outsourcing. IT Pro, 6(1), 19-23.","DOI":"10.1109\/MITP.2004.1265538"},{"key":"IJKM.2017100101-59","doi-asserted-by":"publisher","DOI":"10.4135\/9781473913936"},{"key":"IJKM.2017100101-60","doi-asserted-by":"publisher","DOI":"10.1108\/02635579610107684"},{"key":"IJKM.2017100101-61","author":"P.Leedy","year":"2014","journal-title":"Practical Research: Planning and Design"},{"key":"IJKM.2017100101-62","doi-asserted-by":"publisher","DOI":"10.1057\/kmrp.2008.37"},{"issue":"2","key":"IJKM.2017100101-63","first-page":"69","article-title":"A Combined Model of IT Outsourcing Partnerships and Success.","volume":"13","author":"J. T.Marchewka","year":"2013","journal-title":"Communications of the IIMA"},{"key":"IJKM.2017100101-64","doi-asserted-by":"publisher","DOI":"10.1147\/sj.404.0814"},{"issue":"1","key":"IJKM.2017100101-65","first-page":"1","article-title":"Determinants of Information Technology Outsourcing.","volume":"61","author":"T.Mazza","year":"2014","journal-title":"Scientific Annals of the University of Ia\u015fi Economic Sciences"},{"key":"IJKM.2017100101-66","doi-asserted-by":"publisher","DOI":"10.1108\/13598540010312945"},{"issue":"1","key":"IJKM.2017100101-67","first-page":"31","article-title":"Aims and Critical Success Factors of Knowledge Management System Projects.","volume":"8","author":"S.Milovanovi\u0107","year":"2011","journal-title":"Economics and Organization"},{"key":"IJKM.2017100101-68","doi-asserted-by":"crossref","unstructured":"Miozza, M., & Grimshaw, D. (2005). Modularity and innovation in knowledge-intensive business services: IT outsourcing in Germany and the UK.","DOI":"10.1016\/j.respol.2005.06.005"},{"key":"IJKM.2017100101-69","doi-asserted-by":"publisher","DOI":"10.1145\/233977.233989"},{"key":"IJKM.2017100101-70","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1145\/1134285.1134377","article-title":"Critical factors in establishing and maintain trust in software outsourcing relationships. In","author":"P. T.Nguyen","year":"2006","journal-title":"Proceedings of the 28th international conference on Software engineering"},{"key":"IJKM.2017100101-71","unstructured":"Nickols, F. (2001). The Knowledge in Knowledge Management (Paper commissioned for Knowledge Management Yearbook 2000 \u2013 2001). Retrieved from http:\/\/repository.binus.ac.id\/2009-1\/content\/F0542\/F054234253.pdf"},{"key":"IJKM.2017100101-72","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195092691.001.0001","author":"I.Nonaka","year":"1995","journal-title":"The Knowledge Creating Company"},{"key":"IJKM.2017100101-73","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1093\/oso\/9780198295839.003.0028","article-title":"A Theory of Organisational Knowledge Creation: Understanding the Dynamic Process of Creating Knowledge","author":"I.Nonaka","year":"2001","journal-title":"Handbook of Organizational Learning & Knowledge"},{"key":"IJKM.2017100101-74","doi-asserted-by":"publisher","DOI":"10.1016\/S0024-6301(99)00115-6"},{"issue":"1","key":"IJKM.2017100101-75","first-page":"209","article-title":"How to Switch IT Service Providers: Recommendations for a Successful Transition.","volume":"5","author":"M.Olzmann","year":"2012","journal-title":"International Journal on Advances in Intelligent Systems"},{"key":"IJKM.2017100101-76","doi-asserted-by":"publisher","DOI":"10.1145\/1029997.1030011"},{"key":"IJKM.2017100101-77","unstructured":"PA Consulting Group. (2009). Outsourcing - what lies beneath (international outsourcing survey 2009). Retrieved from http:\/\/www.criticaleye.com\/insights-servfile.cfm?id=1318&view=1"},{"key":"IJKM.2017100101-78","unstructured":"Pandey, V., & Bansal, V. (2003). A decision-making framework for IT outsourcing using the analytic hierarchy process."},{"key":"IJKM.2017100101-79","doi-asserted-by":"crossref","unstructured":"Pistole, L. L., & Bragg, A. W. (2005). Making IT Outsourcing work for Smaller Enterprises. IT Pro, 7(4), 12\u201317.","DOI":"10.1109\/MITP.2005.92"},{"key":"IJKM.2017100101-80","author":"M. J.Power","year":"2006","journal-title":"The Outsourcing Handbook: How to Implement a Successful Outsourcing Process"},{"key":"IJKM.2017100101-81","doi-asserted-by":"publisher","DOI":"10.1145\/233977.233984"},{"key":"IJKM.2017100101-82","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293485"},{"key":"IJKM.2017100101-83","unstructured":"Scardino, L., & Ridder, F. (2008). IT Outsourcing success: stop the most common mistakes in provider selection and contracting. Gartner Inc. Retrieved from https:\/\/www.gartner.com\/doc\/734622\/it-outsourcing-success-stop-common"},{"key":"IJKM.2017100101-84","unstructured":"Senge, P. M. (1990). The Fifth Discipline: the Art and Practice of The Learning Organisation. Doubleday."},{"key":"IJKM.2017100101-85","doi-asserted-by":"publisher","DOI":"10.1145\/233977.233994"},{"key":"IJKM.2017100101-86","first-page":"145","article-title":"Information Systems Outsourcing Issues in the Communication Technology Sector.","author":"H.Smuts","year":"2010","journal-title":"Proceedings of the IADIS International Conference Information Systems 2010,"},{"key":"IJKM.2017100101-87","doi-asserted-by":"publisher","DOI":"10.1145\/1899503.1899537"},{"key":"IJKM.2017100101-88","doi-asserted-by":"publisher","DOI":"10.1109\/ES.2015.18"},{"key":"IJKM.2017100101-89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16486-1_5"},{"key":"IJKM.2017100101-90","unstructured":"Softection. (2009). The 5 Golden Rules of Data Protection when Outsourcing. Retrieved from www.softection.com"},{"key":"IJKM.2017100101-91","doi-asserted-by":"publisher","DOI":"10.1108\/14637150310506666"},{"key":"IJKM.2017100101-92","doi-asserted-by":"publisher","DOI":"10.1108\/02635570810876769"},{"key":"IJKM.2017100101-93","unstructured":"Sood, R. (2005). IT, software and services: outsourcing & offshoring. Austin, Texas: AiAiYo Books."},{"key":"IJKM.2017100101-94","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0061-4"},{"key":"IJKM.2017100101-95","doi-asserted-by":"publisher","DOI":"10.5539\/ijbm.v7n2p113"},{"key":"IJKM.2017100101-96","unstructured":"Taylor, P., & Bain, P. (2009). Call Centres in Scotland and outsourced competition from India. Scottish Development International. Retrieved from http:\/\/www.scotecon.net\/publications\/Call%20Centres%20Scotland.pdf"},{"key":"IJKM.2017100101-97","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.02.004"},{"key":"IJKM.2017100101-98","doi-asserted-by":"publisher","DOI":"10.5897\/AJBM11.669"},{"key":"IJKM.2017100101-99","doi-asserted-by":"crossref","unstructured":"Vequist, D. G., & Teachout, M. S. (2006). A Conceptual System Approach for the Relationship between Collaborative Knowledge Management and Human Capital Management. In Proceedings of the International Symposium on Collaborative Technologies and Systems CTS \u201906 (pp. 150-156). IEEE.","DOI":"10.1109\/CTS.2006.3"},{"key":"IJKM.2017100101-100","first-page":"337","article-title":"Differences between Public and Private IT Outsourcing: Common Themes in the Literature.","author":"S.Vilvovsky","year":"2008","journal-title":"9th Annual International Digital Government Research Conference,"},{"key":"IJKM.2017100101-101","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2014.10.007"},{"key":"IJKM.2017100101-102","author":"I.Vural","year":"2010","journal-title":"Success Factors in information Systems Outsourcing"},{"key":"IJKM.2017100101-103","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/44432.21.3.20040601\/82471.2"},{"key":"IJKM.2017100101-104","unstructured":"Wilson, L. T., & Frappaolo, C. (1999). Implicit Knowledge Management: The New Frontier of Corporate Capability. Knowledge Harvesting Inc. Retrieved from http:\/\/www.knowledgeharvesting.org\/papers.htm"},{"key":"IJKM.2017100101-105","doi-asserted-by":"publisher","DOI":"10.1108\/17538290910935882"},{"key":"IJKM.2017100101-106","unstructured":"Yam, R., & Tang, E. (2013). Knowledge Assets, Supplier & Customer coordination and product performance. In Proceedings of the Management, Knowledge and Learning International Conference 2013, Zadar, Croatia."},{"key":"IJKM.2017100101-107","doi-asserted-by":"publisher","DOI":"10.1109\/ICCET.2009.141"},{"key":"IJKM.2017100101-108","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.06.007"},{"key":"IJKM.2017100101-109","first-page":"1","article-title":"The Varying Role of IS Capabilities for Different Approaches to Application Services Outsourcing.","author":"S.Zelt","year":"2013","journal-title":"Proceedings of the 19th Americas Conference on Information Systems,"}],"container-title":["International Journal of Knowledge Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=196542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T06:48:43Z","timestamp":1719730123000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJKM.2017100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,10,1]]},"references-count":110,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijkm.2017100101","relation":{},"ISSN":["1548-0666","1548-0658"],"issn-type":[{"value":"1548-0666","type":"print"},{"value":"1548-0658","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,1]]}}}