Boundary Spanning by Design: Toward Aligning Boundary-Spanning Capacity and Strategy in IT Outsourcing

被引:28
作者
Du, Wenyu [1 ]
Pan, Shan Ling [1 ]
机构
[1] Natl Univ Singapore, Dept Informat Syst, Singapore 117417, Singapore
关键词
Boundary spanning; case study; IT outsourcing (ITO); project management; UNDERSTANDING CONFLICT; CAPABILITY DEVELOPMENT; PRACTICE PERSPECTIVE; INFORMATION; KNOWLEDGE; AMBIDEXTERITY; IMPACT; DIFFERENTIATION; IMPLEMENTATION; TRANSFORMATION;
D O I
10.1109/TEM.2012.2206114
中图分类号
F [经济];
学科分类号
02 ;
摘要
IT outsourcing (ITO) has created new issues for engineering management. Of these, a persistent problem concerns the boundaries between clients and vendors, which have the potential to damage even the most trusting and secure relationship. The rising trend of offshore sourcing has further exacerbated the issue, because of the national boundaries that ITO traverses in the offshore context. However, research on this issue has been limited; existing studies have mainly focused on the client perspective, whereas systematic analyses from the vendor perspective have been limited. In this study, we bridge this gap by studying boundary spanning of two ITO vendors. The data collection and analysis are guided by a novel and sound theoretical lens-alignment between boundary-spanning capacity and strategy. Two alignment models are derived. The alignment-form model depicts the outlook of the alignment and the alignment-path model depicts the process of achieving it. Based on these two models, we further conceptualize that vendor boundary spanning happens by design, with rational deliberation and planning. The study complements the ITO literature by providing a more complete picture of boundary spanning and the boundary-spanning literature by integrating the two diverse yet relevant research streams of boundary spanners and boundary-spanning strategies.
引用
收藏
页码:59 / 76
页数:18
相关论文
共 91 条
[51]  
Levi-Strauss Claude., 1966, SAVAGE MIND
[52]   Turning a community into a market: A practice perspective on information technology use in boundary spanning [J].
Levina, N ;
Vaast, E .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2006, 22 (04) :13-37
[53]  
Levina N, 2005, MIS QUART, V29, P335
[54]  
Levina N, 2003, MIS QUART, V27, P331
[55]  
Levina N, 2008, MIS QUART, V32, P307
[56]   Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect [J].
Loh, Lawrence ;
Venkatraman, N. .
INFORMATION SYSTEMS RESEARCH, 1992, 3 (04) :334-358
[57]  
Mani D, 2010, MIS QUART, V34, P39
[58]  
Markides C, 2007, ACAD MANAGE J, V50, P762
[59]  
Marrone JA, 2007, ACAD MANAGE J, V50, P1423
[60]  
Mayasandra R., 2010, INFORM SYST RES, V21, P1