Client Strategies in Vendor Transition:
ثبت نشده
چکیده
Many outsourcing contracts are expiring, and vendor transition is becoming an increasing concern in business. However, little research exists to help organizations manage vendor transition, a tripartite problem between the client, outgoing and incoming vendor. This paper applies balance of threat theory, a political science theory about interactions among nations, to explain and predict client strategies in vendor transition. The theory suggests that a client organization should pursue either a “soft” or “hard” balancing strategy, depending on the outgoing vendor’s capability and aggressive intent to disrupt client operations. A soft strategy is adopted when the perceived threat is low, while a hard strategy is adopted when the threat is high. A soft strategy requires the client to balance the incoming and outgoing vendors by reciprocating vendor overtures or remaining neutral in vendor disputes. With a hard strategy, the client allies with the incoming vendor and actively engages in the vendor transition process to directly counter the power and threat posed by the outgoing vendor. Balance of threat theory is explored across two case sites, one low threat, and one high threat. In addition to demonstrating the explanatory and predictive power of balance of threat theory, the empirical cases enable us to identify, in the context of vendor transition, specific tactics associated with the two broad strategies of hard and soft balancing, as well as key areas of dispute in vendor transition. The cases also demonstrate how hard and soft balancing tactics are used in these disputes.
منابع مشابه
A Learning Model of Information Technology Outsourcing: Normative Implications
We use an economic learning model to examine how knowledge parameters characterizing a sourcing relationship between a vendor and a client interact with production costs and coordination costs to affect the business value of alternative outsourcing strategies. This information is then used to determine a firm’s optimal rate of information technology (IT) outsourcing. We find that the optimal ou...
متن کاملHow do IT outsourcing vendors respond to shocks in client demand? A resource dependence perspective
IT outsourcing vendors depend on projects from their clients to reap gains and develop capabilities. Because of this dependence, vendors are vulnerable to shocks in client demand. However, the extant literature on how vendors mitigate the damage from demand shocks is very limited. This multiple case study examined five pairs of relationships between Chinese vendors and their Japanese clients, d...
متن کاملClient-Vendor Knowledge Transfer Mechanisms in the Context of Information Systems Outsourcing
High levels of shared knowledge can positively influence outsourcing performance and the combination of processes designed to transfer explicit and tacit knowledge, has the most influence on the level of shared knowledge. Some organisations are unaware of the volume and value of knowledge it receives from various interorganisational partnerships. Without appropriate strategies to facilitate the...
متن کاملIt Outsourcing Project Risks: from Client and Vendor Perspectives
This study examines the risk factors of IT outsourcing projects from client and vendor perspective, and compares their difference. The quasi-Delphi study which consisted of three ranking rounds was conducted. A number of 41 client project managers and 21 vendor project managers were participated. This study identifies one of the top three risks ranked by the client has been considered to be of ...
متن کاملFrom BPO to BPM: An Assessment of the BPO Vendor's Ability to Make a Successful Transition
While traditional BPO has been an ‘as-is’ business process execution by a vendor with minimal client intervention with cost benefit being the principal motive, BPM, on the other hand, is the management of processes for the client where the objective is to deliver both cost as well as value to the process stakeholders. Thus success metrics of a vendor’s ability to execute BPM projects are likely...
متن کامل