Review of the Empirical Business Services Sourcing Literature: An Update and Future Directions

  • First Online: 03 June 2017

Cite this chapter

literature review outsourcing services

  • Mary C. Lacity 4 ,
  • Shaji A. Khan 5 &
  • Aihua Yan 5  

3090 Accesses

14 Citations

The 2010 Journal of Information Technology ( JIT ) article, ‘A Review of the IT Outsourcing Empirical Literature and Future Research Directions’, analyzed 741 findings on the determinants of information technology outsourcing (ITO) decisions and outcomes from 164 empirical articles published between 1992 and 2010. Using the same coding method, the 2011 JIT article, ‘Business Process Outsourcing Studies: A Critical Review and Research Directions’, analyzed 615 findings on the determinants of business process outsourcing (BPO) decisions and outcomes from 67 empirical articles published between 1996 and 2011. Taken together, these two reviews found that the preponderance of evidence from both ITO and BPO research streams produced largely consistent results pertaining to the categories of independent variables that affected outsourcing decisions and outcomes. To investigate the most current research findings on business services, which comprise ITO and BPO, and to compare the results with the prior JIT reviews, we replicated the method used in the prior JIT reviews. In this update, we examined 174 newly published articles across 78 academic journals published between 2010 and 2014. We found that researchers have significantly expanded the variables of interest in the last 4 years. In all, researchers investigated 69 new variables. Compared with earlier research, this review of recent articles found a deeper exploration of the direct effects of transaction attributes, sourcing motivations, client and provider capabilities, and governance on sourcing decisions and outcomes. Researchers have also studied a broader variety of sourcing decisions, including shared services, captive centers, rural sourcing, and backsourcing. This update also found a more nuanced understanding of relational governance and its interaction with contractual governance. We assessed the research progress that has been made on 10 previously identified gaps in knowledge. We proposed a future research agenda that includes continued, incremental progress on ‘normal science’ research questions, as well as more ambitious research goals. We challenged researchers to investigate how sourcing clients, providers, and advisors can protect jobs, protect the environment, and ensure security in an increasingly automated world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

From ‘Roundup of Cloud Computing’ on http://www.forbes.com/sites/louiscolumbus/2015/01/24/roundup-of-cloud-computingforecasts-and-market-estimates-2015/ .

2015 Verizon Data Breach Investigations Report, http://www.verizonenterprise.com/DBIR/2015/ .

Accenture (2012). Exploring the Value Proposition from Impact Sourcing: The Buyer’s Perspective [www document] http://www.accenture.com/us-en/Pages/insight-exploring-value-proposition-impactsourcing.aspx , accessed 20 July 2015.

Agarwal, M., Kishore, R. and Rao, H.R (2006). Market Reactions to E-business Outsourcing Announcements, An event study, Information & Management 43 (7): 861–873.

Article   Google Scholar  

Agrawal, P. and Haleem, A (2013). The Impact of the Outsourcing of IT on Firm Performance: An empirical study, International Journal of Management 30 (3): 121–139.

Google Scholar  

Agrawal, P. and Hall, S.C (2014). Using Accounting Metrics as Performance Measures to Assess the Impact of Information Technology Outsourcing on Manufacturing and Service Firms, Journal of Applied Business Research 30 (5): 1559–1568.

Agrawal, S., Goswami, K. and Chatterjee, B (2012). Factors Influencing Performance of ITES Firms in India, Information Resources Management Journal 25 (4): 46–64.

Ajzen, I. and Fishbein, M (1980). Understanding Attitudes and Predicting Social Behavior , Englewood Cliffs, NJ: Prentice-Hall.

Ali, S. and Green, P (2012). Effective Information Technology (IT) Governance Mechanisms: An IT outsourcing perspective, Information Systems Frontiers 14 (2): 179–193.

Alvarez-Suescun, E (2010). Combining Transaction Cost and Resource-Based Insights to Explain IT Implementation Outsourcing, Information Systems Frontiers 12 (5): 631–645.

Amiruddin, R., Aman, A., Auzair, S.M., Hamzah, N. and Maelah, R. (2013). Mitigating Risks in a Shared Service Relationship: The case of a Malaysian bank, Qualitative Research in Accounting and Management 10 (1): 78–93.

Andries, P. and Thorwarth, S (2014). Should Firms Outsource their Basic Research? The Impact of Firm Size on In-House versus Outsourced R&D Productivity, Creativity and Innovation Management 23 (3): 303–317.

Ang, S. and Cummings, L (1997). Strategic Response to Institutional Influences on Information Systems Outsourcing, Organization Science 8 (3): 235–256.

Angeli, F. and Grimaldi, R (2010). Leveraging Offshoring: The identification of new business opportunities in international settings, Industry and Innovation 17 (4): 393–413.

Argyres, N. and Zenger, T (2012). Capabilities, Transaction Costs, and Firm Boundaries, Organization Science 23 (6): 1643–1657.

Arnold, V., Benford, T., Hampton, C. and Sutton, S (2010). Competing Pressures of Risk and Absorptive Capacity Potential on Commitment and Information Sharing in Global Supply Chains, European Journal of Information Systems 19 (2): 134–152.

Aubert, B., Rivard, S. and Templier, M (2011). Information Technology and Distance-Induced Effort to Manage Offshore Activities, IEEE Transactions on Engineering Management 58 (4): 758–771.

Aubert,B.A., Houde, J.F., Patry, M. and Rivard, S (2012). A Multi-Level Investigation of Information Technology Outsourcing, The Journal of Strategic Information Systems 21 (3): 233–244.

Avasant/Rockefeller Foundation (2012). Incentives & Opportunities for Scaling the ‘Impact Sourcing’ Sector,2012. Corporate report by Avasant consultancy [WWW document] https://www.rockefellerfoundation.org/app/uploads/Incentives-Opportunities-for-Scaling-the-Impact-Sourcing-Sector.pdf , accessed 3 February 2016.

Babin, R (2008). Assessing the Role of CSR in Outsourcing Decisions, Journal of Information Systems Applied Research 1 (2): 1–14.

Babin, R., Briggs, S. and Nicholson, B (2011). Emerging Markets Corporate Social Responsibility and Global IT Outsourcing, Communications of the ACM 54 (9): 28–30.

Babin, R. and Nicholson, B (2009). Corporate Social and Environmental Responsibility in Global IT Outsourcing, MIS Quarterly Executive 8 (4): 123–132.

Babin, R. and Nicholson, B. (2011). How Green is My Outsourcer? Measuring Sustainability in Global IT Outsourcing, Strategic Outsourcing: An International Journal 4 (1): 47–66.

Babin, R. and Nicholson, B. (2012). Sustainable Global Outsourcing: Achieving social and environmental responsibility in global IT and business process outsourcing , London: Palgrave Macmillan.

Book   Google Scholar  

Bachlechner, D., Thalmann, S. and Maier, R. (2014). Security and Compliance Challenges in Complex IT Outsourcing Arrangements: A multi-stakeholder perspective, Computers & Security 40 (2): 38–59.

Baldwin, L.P., Irani, Z. and Love, P.E.D (2001). Outsourcing Information Systems: Drawing lessons from a banking case study, European Journal of Information Systems 10 (1): 15–24.

Bandyopadhyay, J. and Hall, L (2009). Off-Shoring of Tax Preparation Services by US Accounting Firms: An empirical study, Advances in Competitiveness Research 17 (1&2): 72–90.

Baraldi, E., Proença, J.F., Proença, T. and De Castro, L.M. (2014). The Supplier’s Side of Outsourcing: Taking over activities and blurring organizational boundaries, Industrial Marketing Management 43 (4): 553–563.

Bardhan, I., Mithas, S. and Lin, S (2007). Performance Impacts of Strategy, Information Technology Applications, and Business Process Outsourcing in US Manufacturing Plants, Production and Operations Management 16 (6): 747–762.

Barthélemy, J (2011). The Disney – Pixar Relationship Dynamics: Lessons for outsourcing vs. vertical integration, Organizational Dynamics 40 (1): 43–48.

Benamati, J. and Rajkumar, T.M (2002). The Application Development Outsourcing Decision: An application of the technology acceptance model, The Journal of Computer , Information Systems 42 (4): 35–43.

Betz, S., Oberweis, A. and Stephan, R (2014). Knowledge Transfer in Offshore Outsourcing Software Development Projects: An analysis of the challenges and solutions from German clients, Expert Systems 31 (3): 282–297.

Beulen, E., Tiwari, V. and Van Heck, E (2011). Understanding Transition Performance During Offshore IT Outsourcing, Strategic Outsourcing: An International Journal 4 (3): 204–227.

Bhagwatwar, A., Hackney, R. and Desouza, K.C. (2011). Considerations for Information Systems ‘Backsourcing’: A framework for knowledge re-integration, Information Systems Management 28 (2): 165–173.

Bharadwaj, S., Saxena, K. and Halemane, M (2010). Building a Successful Relationship in Business Process Outsourcing: An exploratory study, European Journal of Information Systems 19 (2): 168–180.

Bidwell, M (2010). Problems Deciding: How the structure of make-or-buy decisions leads to transaction misalignment, Organization Science 21 (2): 362–379.

Bidwell, M.J (2012). Politics and Firm Boundaries: How organizational structure, group interests, and resources affect outsourcing, Organization Science 23 (6): 1622–1642.

Bignoux, S (2011). Partnerships, Suppliers, and Coercive Influence, Journal of Applied Business Research 27 (3): 117–135.

Blaskovich, J. and Mintchik, N (2011). Accounting Executives and IT Outsourcing Recommendations: An experimental study of the effect of CIO skills and institutional isomorphism, Journal of Information Technology 26 (2): 139–152.

Boell, S. and Cecez-Kecmanovic, D. (2015). On Being ‘Systematic’ in Literature Reviews in IS, Journal of Information Technology 30 (2): 161–173.

Borman, M (2006). Applying Multiple Perspectives to the BPO Decision: A case study of call centers in Australia, Journal of Information Technology 21 (2): 99–115.

Brcar, F. and Bukovec, B (2013). Analysis of Increased Information Technology Outsourcing Factors, Organizacija 46 (1): 13–19.

Brewer, B., Wallin, C. and Ashenbaum, B (2014). Outsourcing the Procurement Function: Do actions and results align with theory?, Journal of Purchasing and Supply Management 20 (3): 186–194.

Brown, D (2008). It is Good to Be Green: Environmentally friendly credentials are influencing business outsourcing decisions, Strategic Outsourcing: An International Journal 1 (1): 87–95.

Budhwar, P., Luthar, H. and Bhatnagar, J (2006). The Dynamics of HRM Systems in Indian BPO Firms, Journal of Labor Research 27 (3): 339–360.

Bustinza, O.F., Molina, L.M. and Gutierrez-Gutierrez, L.J (2010). Outsourcing as Seen From the Perspective of Knowledge Management, Journal of Supply Chain Management 46 (3): 23–39.

Cable, D.M., Gino, F. and Staats, B.R (2013). Breaking Them in or Eliciting Their Best? Reframing Socialization around Newcomers’ Authentic Self-Expression, Administrative Science Quarterly 58 (1): 1–36.

Calantone, R. and Stanko, M (2007). Drivers of Outsourced Innovation: An exploratory study, Journal of Product Innovation Management 24 (3): 230–241.

Cao, L., Mohan, K., Ramesh, B. and Sarkar, S. (2013). Evolution of Governance: Achieving ambidexterity in IT outsourcing, Journal of Management Information Systems 30 (3): 115–140.

Carey, P., Subramanian, N. and Ching, K (2006). Internal Audit Outsourcing in Australia, Accounting and Finance 46 (1): 11–30.

Carmel, E., Lacity, M. and Doty, A (2014). The Impact of Impact Sourcing: Framing a research agenda, R. Hirschheim, A. Heinzl and J. Dibbern (eds.) Information Systems Outsourcing: Towards sustainable business value , Heidelberg: Springer, pp. 397–430.

Ceci, F. and Masciarelli, F (2010). A Matter of Coherence: The effects of offshoring of intangibles on firm performance, Industry & Innovation 17 (4): 373–392.

Cezar, A., Cavusoglu, H. and Raghunathan, S (2014). Outsourcing Information Security: Contracting issues and security implications, Management Science 60 (3): 638–657.

Cha, H.S. and Quan, J. (2011). A Global Perspective on Information Systems Personnel Turnover, Journal of Global Information Technology Management 14 (4): 4–27.

Chakrabarty, S. and Whitten, D (2011). The Sidelining of Top IT Executives in the Governance of Outsourcing: Antecedents, power struggles, and consequences, IEEE Transactions on Engineering Management 58 (4): 799–814.

Chaudhuri, S. and Bartlett, K.R. (2014). The Relationship between Training Outsourcing and Employee Commitment to Organization, Human Resource Development International 17 (2): 145–163.

Ciravegna, L. and Maielli, G (2011). Outsourcing of New Product Development and the Opening of Innovation in Mature Industries: A longitudinal study of fiat during crisis and recovery, International Journal of Innovation Management 15 (1): 69–93.

Cordella, A. and Willcocks, L (2012). Government Policy, Public Value and IT Outsourcing: The strategic case of ASPIRE, The Journal of Strategic Information Systems 21 (4): 295–307.

Cullen, S., Seddon, P. and Willcocks, L (2005). Managing Outsourcing: The life cycle imperative, MIS Quarterly Executive 4 (1): 229–246.

Currie, W., Michell, V. and Abanishe, A (2008). Knowledge Process Outsourcing in Financial Services: The vendor perspective, European Management Journal 26 (2): 94–104.

Daityari, A., Saini, A. and Gupta, R (2008). Control of Business Process Outsourcing Relationships, Journal of Management Research 8 (1): 29–44.

Datta, P. and Bhattacharya, K. (2012). Innovation Returns and the Economics of Offshored IT R&D, Strategic Outsourcing: An International Journal 5 (1): 15–35.

Davenport, T. and Iyer, B. (2015). Bringing outsourcing back to machines The Wall Street Journal 1 July [WWW document] http://blogs.wsj.com/cio/2015/07/01/bringing-outsourcing-back-to-machines/ , accessed 20 July 2015.

Davenport, T. and Kirby, J. (2015). Beyond Automation: Augmentation, Harvard Business Review 93 (6): 58–65.

De Toni, A., Fornasier, A., Montagner, M. and Nonino, F (2007). A Performance Measurement System for Facility Management, International Journal of Productivity and Performance Management 56 (5/6): 417–435.

Dedrick, J., Carmel, E. and Kraemer, K.L. (2011). A Dynamic Model of Offshore Software Development, Journal of Information Technology 26 (1): 1–15.

Dekker, H.C. and Van Den Abbeele, A. (2010). Organizational Learning and Interfirm Control: The effects of partner search and prior exchange experiences, Organization Science 21 (6): 1233–1250.

Delmotte, J. and Sels, L. (2008). HR Outsourcing: Threat or opportunity, Personnel Review 37 (5): 543–563.

Deng, C., Mao, J. and Wang, G (2013). An Empirical Study on the Source of Vendors’ Relational Performance in Offshore Information Systems Outsourcing, International Journal of Information Management 33 (1): 10–19.

Devos, J., Van Landeghem, H. and Deschoolmeester, D (2012). Rethinking IT Governance for SMEs, Industrial Management & Data Systems 112 (2): 206–223.

Dey, D., Fan, M. and Zhang, C (2010). Design and Analysis of Contracts for Software Outsourcing, Information Systems Research 21 (1): 93–114.

Dibbern, J., Chin, W. and Heinzl, A (2012). Systemic Determinants of the Information Systems Outsourcing Decision: A comparative study of German and United States firms, Journal of the Association for Information Systems 13 (6): 466–497.

Dibbern, J., Goles, T., Hirschheim, R. and Jayatilaka, B. (2004). Information Systems Outsourcing: A survey and analysis of the literature, ACM SIGMIS Database 35 (4): 6–102.

DiMaggio, P. and Powell, W. (eds.) (1991). The Iron Cage Revisited: Institutional isomorphism and collective rationality in organizational fields, in The New Institutionalism in Organizational Analysis , Chicago, IL: The University of Chicago Press, pp. 63–82.

DiRomualdo, A. and Gurbaxani, V (1998). Strategic Intent for IT Outsourcing, Sloan Management Review 39 (4): 67–80.

Doh, J., Bunyaratavej, K. and Hahn, E. (2009). Separable but Not Equal: The location determinants of discrete services offshoring activities, Journal of International Business Studies 40 (6): 926–943.

Doloreux, D. and Shearmur, R (2013). Innovation strategies: Are knowledge-intensive business services just another source of information?, Industry & Innovation 20 (8): 719–738.

Du, W. and Pan, S.L (2013). Boundary Spanning by Design: Toward aligning boundary-spanning capacity and strategy in it outsourcing, IEEE Transactions On Engineering Management 60 (1): 59–76.

Dunbar, A. and Phillips, J. (2001). The Outsourcing of Corporate Tax Function Activities, The Journal of the American Taxation Association 23 (2): 35–49.

Dutta, A. and Roy, R (2005). Offshore Outsourcing: A dynamic causal model of counteracting forces, Journal of Management Information Systems 22 (2): 15–36.

Dutta, D., Gwebu, K. and Wang, J (2011). Strategy and Vendor Selection in IT Outsourcing: Is there a method in the madness?, Journal of Global Information Technology Management 14 (2): 6–26.

Ee, O., Halim, H.A. and Ramayah, T (2013). The Effects of Partnership Quality on Business Process Outsourcing Success in Malaysia: Key users perspective, Service Business 7 (2): 227–253.

Eisenhardt, K. (1989). Agency Theory: An assessment and review, The Academy of Management Review 14 (1): 57–76.

Everest Group (2014). The Business Case for Impact Sourcing [WWW document] http://www.everestgrp.com/2014-09-the-business-case-for-impact-sourcingsherpas-in-blue-shirts-15662.html , accessed 20 July 2015.

Fersht, P., Herrera, E., Robinson, B., Filippone, T. and Willcocks, L. (2011). The State of Outsourcing in 2011, Horses for Sources and LSE Outsourcing Unit, London, May–July [WWW document] www.hfsresearch.com , accessed 20 July 2015.

Fielt, E., Bandara, W., Miskon, S. and Gable, G.G (2014). Exploring Shared Services from an IS Perspective: A literature review and research agenda, Communications of the Association for Information Systems 34 (1): 1001–1040.

Fifarek, B., Veloso, F. and Davidson, C. (2008). Offshoring Technology Innovation: A case study of rare-earth technology, Journal of Operations Management 26 (2): 222–238.

Fink, L (2010). Information Technology Outsourcing Through a Configurational Lens, Journal of Strategic Information Systems 19 (2): 124–141.

Fjermestad, J. and Saitta, J. (2005). A Strategic Management Framework for IT Outsourcing: A review of the literature and the development of a success factors model, Journal of Information Technology Case and Application Research 7 (3): 42–60.

Freytag, P., Clarke, A. and Evald, M (2012). Reconsidering Outsourcing Solutions, European Management Journal 30 (2): 99–110.

Frick, W (2015). When Your Boss Wears Metal Pants, Harvard Business Review 93 (6): 84–89.

Gainey, T. and Klaas, B (2003). The Outsourcing of Training and Development: Factors impacting client satisfaction, Journal of Management 29 (2): 207–229.

Gao, G., Gopal, A. and Agarwal, R (2010). Contingent Effects of Quality Signaling: Evidence from the Indian offshore IT services industry, Management Science 56 (6): 1012–1029.

García-Vega, M. and Huergo, E (2011). Determinants of International R&D Outsourcing: The role of trade, Review of Development Economics 15 (1): 93–107.

Gefen, D., Ragowsky, A., Licker, P. and Stern, M (2011). The Changing Role of the CIO in the World of Outsourcing: Lessons learned from a CIO roundtable, Communications of the AIS 28 (15): 233–242.

Gewald, H. and Dibbern, J. (2009). Risks and Benefits of Business Process Outsourcing: A study of transaction services in the German banking industry, Information & Management 46 (4): 249–257.

Gewald, H. and Gellrich, T (2007). The Impact of Perceived Risk on the Capital Market’s Reaction to Outsourcing Announcements, Information Technology and Management 8 (4): 279–296.

Gholami, S (2012). Critical Risk Factors in Outsourced Support Projects of IT, Journal of Management Research 4 (1): 1–13.

Gilley, K., Greer, C. and Rasheed, A (2004). Human Resource Outsourcing and Organizational Performance in Manufacturing Firms, Journal of Business Research 57 (3): 232–240.

Gino, F. and Staats, B. (2012). The Microwork Solution, Harvard Business Review 90 (12): 92–96.

Glaister, A.J (2014). HR Outsourcing: The impact on HR role, competency development and relationships, Human Resource Management Journal 24 (2): 211–226.

Gonzalez, R., Gasco, J. and Llopis, J (2010a). Information Systems Outsourcing: An empirical study of success factors, Human System Management 29 (3): 139–151.

Gonzalez, R., Gasco, J. and Llopis, J (2010b). Information Systems Offshore Outsourcing: An exploratory study of motivations and risks in large Spanish firms, Information Systems Management 27 (4): 340–355.

Goo, J., Kishore, R., Rao, H.R. and Nam, K. (2009). The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An empirical study, MIS Quarterly 33 (1): 1–28.

Gopal, A., Mukhopadhyay, T. and Krishnan, M (2002). The Role of Software Processes and Communication in Offshore Software Development, Communications of the ACM 45 (4): 193–200.

Gopal, A., Espinosa, A., Gosain, S. and Darcy, D (2011). Coordination and Performance in Global Software Service Delivery: The vendor’s perspective, IEEE Transactions on Engineering Management 58 (4): 772–785.

Gopal, A. and Gosain, S (2010). The Role of Organizational Controls and Boundary Spanning in Software Development Outsourcing: Implications for project performance, Information Systems Research 21 (4): 960–982.

Gopal, A. and Koka, B (2010). The Role of Contracts on Quality and Returns to Quality, Decision Sciences 41 (3): 491–516.

Gopal, A. and Koka, B.R (2012). The Asymmetric Benefits of Relational Flexibility: Evidence from software development outsourcing, MIS Quarterly 36 (2): 553–576.

Gorla, N. and Lau, M (2010). Will Negative Experiences Impact Future IT Outsourcing?, Journal of Computer Information Systems 50 (3): 91–101.

Gorla, N. and Somers, T.M (2014). The Impact of IT Outsourcing on Information Systems Success, Information & Management 51 (3): 320–335.

Gorp, D.V., Jagersma, P.K. and Livshits, A (2007). Offshore Behavior of Service Firms: Policy implications for firms and nations, Journal of Information Technology Case and Application Research 9 (1): 7–19.

Gospel, H. and Sako, M. (2010). The Unbundling of Corporate Functions,’ The Evolution of Shared Services and Outsourcing in Human Resource Management, Industrial and Corporate Change 19 (5): 1–30.

Grimpe, C. and Kaiser, U (2010). Balancing Internal and External Knowledge Acquisition: The gains and pains from R&D outsourcing, Journal of Management Studies 47 (8): 1483–1509.

Gwebu, K.L., Wang, J. and Wang, L (2010). Does IT Outsourcing Deliver Economic Value to Firms?, The Journal of Strategic Information Systems 19 (2): 109–123.

Hahn, E.D., Bunyaratavej, K. and Doh, J.P (2011). Impacts of Risk and Service Type on Nearshore and Offshore Investment Location Decisions, Management International Review 51 (3): 357–380.

Hahn, E.D. and Bunyaratavej, K (2010). Services Cultural Alignment in Offshoring: The impact of cultural dimensions on offshoring location choices, Journal of Operations Management 28 (3): 186–193.

Hall, J. and Liedtka, S (2005). Financial Performance, CEO Compensation, and Large-Scale Information Technology Outsourcing Decisions, Journal of Management Information Systems 22 (1): 193–222.

Han, K. and Mithas, S (2013). Information Technology Outsourcing and Non-IT Operating Costs: An empirical investigation, MIS Quarterly 37 (1): 315–331.

Han, K., Kauffman, R. and Nault, B (2011). Returns to Information Technology Outsourcing, Information Systems Research 22 (4): 824–840.

Handley, S. and Benton, W.C (2009). Unlocking the Business Outsourcing Process Model, Journal of Operations Management 27 (5): 344–361.

Handley, S.M. (2012). The Perilous Effects of Capability Loss on Outsourcing Management and Performance, Journal of Operations Management 30 (1): 152–165.

Handley, S.M. and Benton, W.C (2012). Mediated Power and Outsourcing Relationships, Journal of Operations Management 30 (3): 253–267.

Hätönen, J (2010). Outsourcing and Licensing Strategies in Small Software Firms: Evolution of strategies and implications for firm growth, internationalisation and innovation, Technology Analysis & Strategic Management 22 (5): 609–630.

Heeks, R. (2012). The Research Agenda for IT Impact Sourcing, blog. ICTs for Development [WWW document] http://ict4dblog.wordpress.com/2012/05/06/the-research-agenda-for-it-impact-sourcing/ , accessed 20 July 2015.

Heeks, R. and Arun, S. (2010). Social Outsourcing as a Development Tool: The impact of outsourcing IT services to women’s social enterprises in Kerala, Journal of International Development 22 (4): 441–454.

Hodosi, G. and Rusu, L. (2013). How Do Critical Success Factors Contribute to a Successful IT Outsourcing: A study of large multinational companies, Journal of Information Technology Theory and Application 14 (1): 17–42.

Hoffman, C., Khan, S.A. and Mirchandani, D (2015). Developing an Interdisciplinary Cybersecurity Program in the Business School: Reflections and a view to the future, Regional Business Review 34 : 51–55.

Howells, J., Gagliardi, D. and Malik, K. (2008). The Growth and Management of R&D Outsourcing: Evidence from UK pharmaceuticals, R&D Management 38 (2): 205–219.

Huber, T.L., Fischer, T.A., Dibbern, J. and Hirschheim, R. (2013). A Process Model of Complementarity and Substitution of Contractual and Relational Governance in IS Outsourcing, Journal of Management Information Systems 30 (3): 81–114.

IAOP (2009) Summary of Findings from the IAOP 2009 CSR Survey, an IAOP Research White Paper [WWW document] http://www.iaop.org/Content/23/126/1698/ .

Ippolito, A. and Zoccoli, P (2010). How Knowledge and Technology Relate in Creating Value: An Italian case of technology outsourcing, Strategic Outsourcing: An International Journal 3 (2): 72–88.

Iveroth, E (2010). Inside Ericsson: A framework for the practice of leading global IT-enabled change, California Management Review 53 (1): 136–153.

Jain, A. and Thietart, R.A (2014). Capabilities as Shift Parameters for the Outsourcing Decision, Strategic Management Journal 35 (2): 1881–1890.

Jain, R., Poston, R. and Simon, J. (2011a). An Empirical Investigation of Client Managers’ Responsibilities in Managing Offshore Outsourcing of Software-Testing Projects, IEEE Transactions on Engineering Management 58 (4): 743–757.

Jain, R., Simon, J. and Poston, R. (2011b). Mitigating Vendor Silence in Offshore Outsourcing: An empirical investigation, Journal of Management Information Systems 27 (4): 261–297.

Jarvenpaa, S. and Mao, J (2008). Operational Capabilities Development in Mediated Offshore Software Service Models, Journal of Information Technology 23 (1): 3–17.

Jayaraman, V., Narayanan, S., Luo, Y. and Swaminathan, J.M. (2013). Offshoring Business Process Services and Governance Control Mechanisms: An examination of service providers from India, Production and Operations Management 22 (2): 314–334.

Jean, R., Sinkovics, R. and Cavusgil, S. (2010). Enhancing International Customer – Supplier Relationships through IT Resources: A study of Taiwanese electronics suppliers, Journal of International Business Studies 41 (7): 1218–1239.

Jeyaraj, A., Rottman, J.W. and Lacity , M.C . (2006). A Review of the Predictors, Linkages, and Biases in IT Innovation Adoption Research, Journal of Information Technology 21 (1): 1–23.

Ji-FanRen, S., Ngai, E.W.T. and Cho, V. (2011). Managing Software Outsourcing Relationships in Emerging Economies: An empirical study of the Chinese small and medium-sized enterprises, IEEE Transactions on Engineering Management 58 (4): 730–742.

Jorgensen, C (2010). Offshore Supplier Relations: Knowledge integration among small businesses, Strategic Outsourcing: An International Journal 3 (3): 192–210.

Kang, M., Wu, X., Hong, P., Park, K. and Park, Y. (2014). The Role of Organizational Control in Outsourcing Practices: An empirical study, Journal of Purchasing and Supply Management 20 (3): 177–185.

Kannabiran, G. and Sankaran, K (2011). Determinants of Software Quality in Offshore Development – An Empirical Study of an Indian Vendor, Information and Software Technology 53 (11): 1199–1208.

Kenyon, G. and Meixell, M. (2011). Success Factors and Cost Management Strategies for Logistics Outsourcing, Journal of Management and Marketing Research 7 (1): 1–17.

Kern, T., Willcocks, L.P. and Van Heck, E (2002). The Winner’s Curse in IT Outsourcing: Strategies for Avoiding Relational Trauma, California Management Review 44 (2): 47–69.

Khan, S.A. and Lacity, M (2012). Survey Results: Are client organizations responding to anti-offshoring pressures?, Strategic Outsourcing: An International Journal 5 (2): 166–179.

Khan, S.A. and Lacity , M.C . (2014). Organizational Responsiveness to Anti-Offshoring Institutional Pressures, The Journal of Strategic Information Systems 23 (3): 190–209.

Kien, S., Kiat, L. and Periasamy, K (2010). Switching IT Outsourcing Suppliers: Enhancing transition readiness, MIS Quarterly Executive 9 (1): 23–33.

Kim, G (2008). E-Business Strategy in Western Europe: Offshore BPO model perspective, Business Process Management 14 (6): 813–828.

Klaas, B., McClendon, J. and Gainey, T (2001). Outsourcing HR: The impact of organizational characteristics, Human Resource Management 40 (2): 125–138.

Kobelsky, K.W. and Robinson, M.A. (2010). The Impact of Outsourcing on Information Technology Spending, International Journal of Accounting Information Systems 11 (2): 105–119.

Koh, C., Ang, S. and Straub, D (2004). IT Outsourcing Success: A psychological contract perspective, Information Systems Research 15 (4): 356–373.

Kotlarsky, J. Scarbrough, H. and Oshri, I (2014). Coordinating Expertise Across Knowledge Boundaries in Offshore-Outsourcing Projects: The role of codification, MIS Quarterly 38 (2): 607–627.

Kroes, J.R. and Ghosh, S (2010). Outsourcing Congruence with Competitive Priorities: Impact on supply chain and firm performance, Journal of Operations Management 28 (2): 124–143.

Kuhn, T (1970). The Structure of Scientific Revolutions , Chicago: University of Chicago Press.

Kuruvilla, S. and Ranganathan, A. (2010). Globalisation and Outsourcing: Confronting new human resource challenges in India’s business process outsourcing industry, Industrial Relations Journal 41 (2): 136–153.

Kuula, M., Putkiranta, A. and Tulokas, P (2013). Parameters in a Successful Process Outsourcing Project: A case from the ministry of foreign affairs, Finland, International Journal of Public Administration 36 (12): 857–864.

Lacity, M., Feeny, D. and Willcocks, L (2004). Commercializing the Back Office at Lloyds of London: Outsourcing and strategic partnerships revisited, European Management Journal 22 (2): 127–140.

Lacity, M., Rottman, J. and Khan, S. (2010). Field of Dreams: Building IT capabilities in rural America, Strategic Outsourcing: An International Journal 3 (3): 169–191.

Lacity, M., Rottman, J. and Carmel, E (2012). Emerging ITO and BPO Markets: Rural sourcing and impact sourcing , IEEE Readynotes, IEEE Computer Society: Los Alamitos, CA.

Lacity, M. and Willcocks, L. (2014). Business Process Outsourcing and Dynamic Innovation, Strategic Outsourcing: An International Journal 7 (1): 66–92.

Lacity, M.C., Khan, S., Yan, A. and Willcocks, L.P. (2010). A Review of the IT Outsourcing Empirical Literature and Future Research Directions, Journal of Information Technology 25 (4): 395–433.

Lacity, M.C., Solomon, S., Yan, A. and Willcocks, L.P. (2011). Business Process Outsourcing Studies: A critical review and research directions, Journal of Information Technology 26 (4): 221–258.

Lacity, M.C., Rottman, J.W. and Carmel, E. (2014). Impact Sourcing: Employing prison inmates to perform digitally-enabled business services, Communications of the AIS 34 (1): 913–932.

Lahiri, S. and Kedia, B (2009). The Effects of Internal Resources and Partnership Quality on Firm Performance: An examination of Indian BPO suppliers, Journal of International Management 15 (2): 209–224.

Lam, W. and Chua, A (2009). An Analysis of Knowledge Outsourcing at Eduware, Aslib Proceedings New Information Perspectives 61 (5): 424–435.

Langer, N., Slaughter, S.A. and Mukhopadhyay, T. (2014). Project Managers’ Practical Intelligence and Project Performance in Software Offshore Outsourcing: A field study, Information Systems Research 25 (2): 364–384.

Lee, J., Miranda, S. and Kim, Y (2004). IT Outsourcing Strategies: Universalistic, contingency, and configurational explanations of success, Information Systems Research 15 (2): 110–131.

Lee, R. and Kim, D (2010). Implications of Service Processes Outsourcing on Firm Value, Industrial Marketing Management 39 (5): 853–861.

Levina, N. and Ross, J. (2003). From the Vendor’s Perspective: Exploring the value proposition in IT outsourcing, MIS Quarterly 27 (3): 331–364.

Levina, N. and Su, N. (2008). Global Multisourcing Strategy: The emergence of a supplier portfolio in services offshoring, Decision Sciences 39 (3): 541–570.

Lewin, A. and Peeters, C. (2006). Offshoring Work: Business hype or the onset of fundamental transformation?, Long Range Planning 39 (3): 221–239.

Li, Y., Zhao, X., Shi, D. and Li, X (2014). Governance of Sustainable Supply Chains in the Fast Fashion Industry, European Management Journal 32 (5): 823–836.

Lioliou, E., Zimmermann, A., Willcocks, L. and Gao, L (2014). Formal and Relational Governance in IT Outsourcing: Substitution, complementarity and the role of the psychological contract, Information Systems Journal 24 (6): 503–535.

Liu, C (2012). Knowledge Mobility in Cross-Border Buyer-Supplier Relationships, Management International Review 52 (2): 275–291.

Loh, L. and Venkatraman, N. (1992). Diffusion of Information Technology Outsourcing: Influence sources and the Kodak effect, Information Systems Research 3 (4): 334–358.

Lucena, A. (2011). ‘The Organizational Designs of R&D Activities and Their Performance Implications,’ Empirical Evidence for Spain, Industry and Innovation 18 (2): 151–176.

Luo, Y., Zheng, Q. and Jayaraman, V (2010). Managing Business Process Outsourcing, Organizational Dynamics 39 (3): 205–217.

Luo, Y., Wang, S., Zheng, Q. and Jayaraman, V. (2012). Task Attributes and Process Integration in Business Process Offshoring: A perspective of service providers from India and China, Journal of International Business Studies 43 (5): 498–524.

Macneil, I.R (1980). The New Social Contract: An inquiry into modern contractual relations , New Haven, CT: Yale University Press.

Madon, S. and Sharanappa, S (2013). Social IT Outsourcing and Development: Theorising the linkage, Information Systems Journal 23 (5): 381–399.

Maelah, R., Aman, A., Hamzah, N., Amiruddin, R., Sofiah and Auzair, M. (2010). Accounting Outsourcing Turnback: Process and issues, Strategic Outsourcing: An International Journal 3 (3): 226–245.

Mahmoodzadeh, E., Jalalinia, S. and Yazdi, F. (2009). A Business Process Outsourcing Framework Based on Business Process Management and Knowledge Management, Business Process Management Journal 15 (6): 845–864.

Mahnke, V., Overby, M.L. and Vang, J (2005). Strategic Outsourcing of IT Services: Theoretical stocktaking and empirical challenges, Industry and Innovation 12 (2): 205–253.

Malik, A (2009). Training Drivers, Competitive Strategy and Client Needs: Case studies of three business process outsourcing organizations, Journal of European Industrial Training 33 (2): 160–177.

Malik, A., Sinha, A. and Blumenfeld, S. (2012). Role of Quality Management Capabilities in Developing Market-Based Organisational Learning Capabilities: Case study evidence from four Indian business process outsourcing firms, Industrial Marketing Management 41 (4): 639–648.

Malos, S. (2010). Regulatory Effects and Strategic Global Staffing Profiles: Beyond cost concerns in evaluating offshore location attractiveness, Employee Responsibilities and Rights Journal 22 (2): 113–131.

Mani, D., Barua, A. and Whinston, A. (2010). An Empirical Analysis of the Impact of Information Capabilities Design on Business Process Outsourcing Performance, MIS Quarterly 34 (1): 39–62.

Mann, A., Kauffman, R., Han, K. and Nault, B. (2011). Are There Contagion Effects in Information Technology and Business Process Outsourcing?, Decision Support Systems 51 (4): 864–874.

Manning, S., Ricart, J.E., Rique, M.S.R. and Lewin, A.Y. (2010). From Blind Spots to Hotspots: How knowledge services clusters develop and attract foreign investment, Journal of International Management 16 (4): 369–382.

Manning, S (2014). Mitigate, Tolerate or Relocate? Offshoring Challenges, Strategic Imperatives and Resource Constraints, Journal of World Business 49 (4): 522–535.

Manning, S., Lewin, A.Y. and Schuerch, M. (2011). The Stability of Offshore Outsourcing Relationships, Management International Review 51 (3): 381–406.

Martinez-Noya, A., Garcia-Canal, E. and Guillen, M.F. (2012). International R&D Service Outsourcing by Technology-Intensive Firms: Whether and where?, Journal of International Management 18 (1): 18–37.

Martins, V. and Martins, R (2012). Outsourcing Operations in Project Management Offices: The reality of Brazilian companies, Project Management Journal 43 (2): 68–83.

Massini, S., Perm-Ajchariyawong, N. and Lewin, A. (2010). Role of Corporate-Wide Offshoring Strategy on Offshoring Drivers, Risks and Performance, Industry & Innovation 17 (4): 337–371.

Mathew, S (2011). Mitigation of Risks Due to Service Provider Behavior in Offshore Software Development a Relationship Approach, Strategic Outsourcing: An International Journal 4 (2): 179–200.

Mathew, S. and Das Aundhe, M. (2011). Identifying Vendor Risks in Remote Infrastructure Management Services, Journal of Information Technology Case and Application Research 13 (4): 32–50.

Mauri, A.J. and De Figueiredo, J.N (2012). Strategic Patterns of Internationalization and Performance Variability: Effects of US-based MNC cross-border dispersion, integration, and outsourcing, Journal of International Management 18 (1): 38–51.

Mayer, K.J., Somaya, D. and Williamson, I.O (2012). Firm-Specific, Industry-Specific, and Occupational Human Capital and the Sourcing of Knowledge Work, Organization Science 23 (5): 1311–1329.

Mayer, K.J. and Salomon, R.M (2006). Capabilities, Contractual Hazards, and Governance: Integrating resource-based and transaction cost perspectives, Academy of Management Journal 49 (5): 942–959.

McFarlan, F.W. and Nolan, R. (1995). How to Manage an IT Outsourcing Alliance, Sloan Management Review 36 (2): 9–24.

McIvor, R., Humphreys, P., McKittrick, A. and Wall, T (2009). Performance Management and the Outsourcing Process: Lessons from a financial services organisation, International Journal of Operations and Production Management 29 (10): 1025–1047.

McIvor, R., McCracken, M. and McHugh, M (2011). Creating Outsourced Shared Services Arrangements: Lessons from the public sector, European Management Journal 29 (6): 448–461.

McKeen, J. and Smith, H. (2011). Creating IT Shared Services, Communications of the AIS 29 (34): 645–656.

McKenna, D. and Walker, D (2008). A Study of Out-Sourcing Versus In-Sourcing Tasks within a Project Value Chain, International Journal of Managing Projects in Business 1 (2): 216–232.

Mehta, A., Armenakis, A., Mehta, N. and Irani, F (2006). Challenges and Opportunities of Business Process Outsourcing, Journal of Labor Research 27 (3): 323–337.

Mihalache, O.R., Jansen, J.J., Van Den Bosch, F.A. and Volberda, H.W. (2012). Offshoring and Firm Innovation: The moderating role of top management team attributes, Strategic Management Journal 33 (13): 1480–1498.

Miles, R.E. and Snow, C.C. (1978). Organizational Strategy, Structure, and Process , New York: McGraw-Hill Book Company.

Miozzo, M. and Grimshaw, D. (2011). Capabilities of Large Services Outsourcing Firms: The ‘outsourcing plus staff transfer model’ in EDS and IBM, Industrial & Corporate Change 20 (3): 909–940.

Mithas, S., Tafti, A. and Mitchell, W. (2013). How A Firm’s Competitive Environment and Digital Strategic Posture Influence Digital Business Strategy, MIS Quarterly 37 (2): 511–536.

Monitor Group/Rockefeller Foundation (2011). Job creation through building the field of impact sourcing. Corporate Report by Monitor Consultancy, retrieved from Monitor Group/Rockefeller Foundation [WWW document] http://www.deloitte.com/view/en_US/us/Services/consulting/Strategy-Operations/strategyconsulting/index.htmRootchange.org .

Mudambi, R. and Venzin, M (2010). The Strategic Nexus of Offshoring and Outsourcing Decisions, Journal of Management Studies 47 (8): 1510–1533.

Nadkarni, S. and Herrmann, P. (2010). CEO Personality, Strategic Flexibility, and Firm Performance: The case of Indian business process outsourcing industry, Academy of Management Journal 53 (5): 1050–1073.

Nagpal, P., Nicolaou, A.I. and Lyytinen, K. (2014). Outsourcing and Market Value of the Firm: Toward a comprehensive model, Intelligent Systems in Accounting, Finance and Management 21 (1): 19–38.

Nahapiet, J. and Ghoshal, S. (1998). Social Capital, Intellectual Capital, and the Organizational Advantage, Academy of Management Review 23 (2): 242–265.

Narayanan, S , Balasubramanian, S. and Jayashankar, M. (2011). Managing Outsourced Software Projects: An analysis of project performance and customer satisfaction, Production and Operations Management 20 (4): 508–521.

Narayanan, S. and Narasimhan, R. (2014). Governance Choice, Sourcing Relationship Characteristics, and Relationship Performance, Decision Sciences 45 (4): 717–751.

Ndubisi, N.O (2011). Conflict Handling, Trust and Commitment in Outsourcing Relationship: A Chinese and Indian study, Industrial Marketing Management 40 (1): 109–117.

Netemeyer, R.G., Brashear-Alejandro, T. and Boles, J.S. (2004). A Cross-National Model of Job-related Outcomes of Work Role and Family Role Variables: A retail sales context, Journal of the Academy of marketing Science 32 (1): 49–60.

Nieto, M. and Rodriguez, A (2011). Offshoring of R&D: Looking abroad to improve innovation performance, Journal of International Business Studies 42 (3): 345–361.

O’Regan, N. and Kling, G. (2011). Technology Outsourcing in Manufacturing Small-and Medium-Sized Firms: Another competitive resource?, R&D Management 41 (1): 92–105.

Oshri, I. and Van Uhm, B. (2012). A Historical Review of the Information Technology and Business Process Captive Centre Sector, Journal of Information Technology 27 (4): 270–284.

Palvia, P., King, R., Xia, W. and Jain Palvia, S (2010). Capability, Quality, and Performance of Offshore IS Vendors: A theoretical framework and empirical investigation, Decision Sciences 41 (2): 231–270.

Palvia, S.C., Palvia, P., Xia, W. and King, R. (2011). Critical Issues of IT Outsourcing Vendors in India, Communications of the AIS 29 (11): 203–220.

Park, J. and Kim, J.S (2005). The Impact of IS Outsourcing Type on Service Quality and Maintenance Efforts, Information & Management 42 (2): 261–274.

Patane, J.R. and Jurison, J. (1994). Is Global Outsourcing Diminishing the Prospects for American Programmers?, Journal of Systems Management 45 (6): 6–10.

Pearce, J.A (2014). Why Domestic Outsourcing is Leading America’s Reemergence in Global Manufacturing, Business Horizons 57 (1): 27–36.

Penfold, C. (2009). Off-shored Services Workers: Labour law and practice in India, The Economic and Labour Relations Review 19 (2): 91–106.

Pinnington, A. and Woolcock, P (1995). How Far is IS/IT Outsourcing Enabling New Organizational Structure and Competences?, International Journal of Information Management 15 (5): 353–365.

Plugge, A., Bouwman, H. and Molina-Castillo, F.J (2013). Outsourcing Capabilities, Organizational Structure and Performance Quality Monitoring: Toward a fit model, Information & Management 50 (6): 275–284.

Poppo, L. and Lacity, M (2006). The Normative Value of Transaction Cost Economics: What managers have learned about TCE principles in the IT context, R. Hirschheim, A. Heinzl and J. Dibbern (eds.) Information Systems Outsourcing: Enduring themes, new perspectives, and global challenges , Berlin, Heidelberg, New York: Springer-Verlag, pp. 259–282.

Chapter   Google Scholar  

Poppo, L. and Zenger, T (2002). Do Formal Contracts and Relational Governance Function as Substitutes or Complements?, Strategic Management Journal 23 (8): 707–725.

Porter, M. and Kramer, M (2006). Strategy and Society: The link between competitive advantage and corporate social responsibility, Harvard Business Review 84 (12): 78–92.

Porter, M. and Kramer, M. (2011). Creating Shared Value, Harvard Business Review 89 (1/2): 62–77.

Poston, R., Simon, J. and Jain, Radhika. (2010). Client Communication Practices in Managing Relationships with Offshore Vendors of Software Testing Services, Communications of the AIS 27 (9): 129–148.

Premuroso, R., Skantz, T. and Bhattacharya, S. (2012). Disclosure of Outsourcing in the Annual Report: Causes & market returns effects, International Journal of Accounting Information Systems 13 (4): 382–402.

Prikladnicki, R. and Audy, J.L.N (2012). Managing Global Software Engineering: A comparative analysis of offshore outsourcing and the internal offshoring of software development, Information Systems Management 29 (3): 216–232.

Qi, C. and Chau, P (2012). Relationship, Contract and IT Outsourcing Success: Evidence from two descriptive case studies, Decision Support Systems 53 (4): 859–869.

Qi, C. and Chau, P.Y. (2013). Investigating the Roles of Interpersonal and Interorganizational Trust in IT Outsourcing Success, Information Technology & People 26 (2): 120–145.

Qin, L., Wu, H., Zhang, N. and Li, X (2012). Risk Identification and Conduction Model for Financial Institution IT Outsourcing in China, Information Technology and Management 13 (4): 429–443.

Qu, W.G., Oh, W. and Pinsonneault, A. (2010). The Strategic Value of IT Insourcing: An IT-enabled business process perspective, The Journal of Strategic Information Systems 19 (2): 96–108.

Qu, W.G., Pinsoneault, A. and Oh, W. (2011). Influence of Industry Characteristics on Information Technology Outsourcing, Journal of Management Information Systems 27 (4): 99–128.

Quayle, A., Ashworth, D. and Gillies, A (2013). BS 11000 for Health Commissioning, Clinical Governance 18 (1): 18–29.

Rai, A., Keil, M., Hornyak, R. and Wüllenweber, K (2012). Hybrid Relational-Contractual Governance for Business Process Outsourcing, Journal of Management Information Systems 29 (2): 213–256.

Rajeev, M. and Vani, B (2009). India’s Exports of BPO Services: Understanding strengths, weaknesses, and competitors, Journal of Services Research 9 (1): 51–67.

Raman, S., Budhwar, P. and Balasubramanian, G. (2007). People Management Issues in Indian KPOs, Employee Relations 29 (6): 696–710.

Ramchandran, V. and Gopal, A (2010). Managers’ Judgments of Performance in IT Services Outsourcing, Journal of Management Information Systems 26 (4): 181–218.

Redondo-Cano, A. and Canet-Giner, M.T. (2010). Outsourcing Agrochemical Services: Economic or strategic logic?, Service Business 4 (3): 237–252.

Reeves, M., Zeng, M. and Venjara, V (2015). The Self-Tuning Enterprise: How Alibaba uses algorithmic thinking, Harvard Business Review 93 (6): 66–75.

Reitzig, M. and Wagner, S. (2010). The Hidden Costs of Outsourcing: Evidence from patent data, Strategic Management Journal 31 (11): 1183–1201.

Rosa, E., Diekmann, A., Dietz, T. and Jaeger, C. (2010). Human Footprints on the Global Environment , MIT Press, Cambridge [WWW document] https://mitpress.mit.edu/sites/default/files/titles/content/9780262512992_sch_0001.pdf , accessed 20 July 2015.

Roses, L.K (2013). Strategic Partnership Building in It Offshore Outsourcing: Institutional elements for a banking ERP system licensing, Journal of Information Systems and Technology Management 10 (1): 61–80.

Ross, J. and Beath, C. (2006). Sustainable IT Outsourcing: Let enterprise architecture be your guide, MIS Quarterly Executive 5 (4): 181–192.

Rottman, J. and Lacity, M (2006). Proven Practices for Effectively Offshoring IT Work, Sloan Management Review 47 (3): 56–63.

Sabherwal, R. (1999). The Role of Trust in Outsourced IS Development Projects, Communications of the ACM 42 (2): 80–86.

Sako, M (2010). Technology Strategy and Management Outsourcing versus Shared Services, Communications of the ACM 53 (7): 126–129.

Sakolnakorn, T.P.N (2011). The Good Aspects of Managing an Organization with an Outsourcing and Subcontracting Strategy, International Journal of Management & Information Systems 15 (3): 11–18.

Salimath, M., Cullen, J. and Umesh, U. (2008). Outsourcing and Performance in Entrepreneurial Firms: Contingent relationships with entrepreneurial configurations, Decision Sciences 39 (3): 359–381.

Sanders, N., Locke, A., Moore, C. and Autry, C. (2007). A Multidimensional Framework for Understanding Outsourcing Arrangements, Journal of Supply Chain Management 43 (4): 3–15.

Sarker, S., Sarker, S. and Jana, D. (2010). The Impact of the Nature of Globally Distributed Work Arrangement on Work-Life Conflict and Valence: The Indian GSD professionals’ perspective, European Journal of Information Systems 19 (2): 209–222.

Saunders, C., Gebelt, M. and Hu, Q (1997). Achieving Success in Information Systems Outsourcing, California Management Review 39 (2): 63–80.

Saxena, K. and Bharadwaj, S (2009). Managing Business Processes Through Outsourcing: A strategic partnership perspective, Business Process Management Journal 15 (5): 687–715.

Sen, F. and Shiel, M (2006). From Business Process Outsourcing to Knowledge Process Outsourcing: Some issues, Human Systems Management 25 (2): 145–155.

Sengupta, S (2011). An Exploratory Study on Job and Demographic Attributes Affecting Employee Satisfaction in the Indian BPO Industry, Strategic Outsourcing: An International Journal 4 (3): 248–273.

Sengupta, S. and Dev, S (2013). What Makes Employees Stay?, Strategic Outsourcing: An International Journal 6 (3): 258–276.

Sengupta, S. and Gupta, A (2011). Exploring the Dimensions of Attrition in Indian BPOs, International Journal of Human Resource Management 23 (6): 1259–1288.

Shah Bharadwaj S,. and Saxena, K.B.C (2009). Building Winning Relationships in Business Process Outsourcing Services, Industrial Management & Data Systems 109 (7): 993–1011.

Sharma, A., Sengupta, S. and Gupta, A (2011). Exploring Risk Dimensions in the Indian Software Industry, Project Management Journal 42 (5): 78–91.

Sharma, A. and Iyer, G. (2011). Are Pricing Policies an Impediment to the Success of Customer Solutions, Industrial Marketing Management 40 (5): 723–729.

Shearmur, R. and Doloreux, D (2013). Innovation and Knowledge-Intensive Business Service: The contribution of knowledge-intensive business service to innovation in manufacturing establishments, Economics of Innovation & New Technology 22 (8): 751–774.

Sheehan, C. and Cooper, B.K (2011). HRM Outsourcing: The impact of organisational size and HRM strategic involvement, Personnel Review 40 (6): 742–760.

Shih, H., Chiang, Y. and Hsu, C. (2005). Exploring HR Outsourcing and Its Perceived Effectiveness, International Journal of Business Performance Management 7 (4): 464–482.

Shih, Y. and Lin, W (2011). Effects of the Outsourcing of Information Systems on User Satisfaction: An empirical study among Taiwanese hospitals, International Journal of Management 28 (3): 704–715.

Sia, S., Koh, C. and Tan, C (2008). Strategic Maneuvers for Outsourcing Flexibility: An empirical assessment, Decision Sciences 39 (3): 407–443.

Sivalogathasan, V.V. and Hashim, A (2013). Changes in Employer-Employee Relationship: Impact of Perceived Organizational Support on Social Exchange of the Outsourcing Industry in Sri Lanka, Skyline Business Journal 9 (1): 43–49.

Spithoven, A. and Teirlinck, P. (2015). Internal Capabilities, Network Resources and Appropriation Mechanisms as Determinants of R&D Outsourcing, Research Policy 44 (3): 711–725.

Srikanth, K. and Puranam, P. (2011). Integrating Distributed Work: Comparing task design, communication, and tacit coordination mechanisms, Strategic Management Journal 32 (8): 849–875.

Srivastava, S.C. and Teo, T.S (2012). Contract Performance in Offshore Systems Development: Role of control mechanisms, Journal of Management Information Systems 29 (1): 115–158.

Strassmann, P. (1995). Outsourcing: A game for losers. Computerworld 21 August.

Su, N (2013). Internationalization Strategies of Chinese IT Service Suppliers, MIS Quarterly 37 (1): 175–200.

Su, N. and Levina, N (2011). Global Multisourcing Strategy: Integrating learning from manufacturing into IT service outsourcing, IEEE Transactions on Engineering Management 58 (4): 717–729.

Susarla, A., Barua, A. and Whinston, A (2010a). Multitask Agency, Modular Architecture, and Task Disaggregation in SaaS, Journal of Management Information Systems 26 (4): 87–117.

Susarla, A., Subramanyam, R. and Karhade, P (2010b). Contractual Provisions to Mitigate Holdup: Evidence from information technology outsourcing, Information Systems Research 21 (1): 37–55.

Svejvig, P (2011). A Successful Enterprise System Re-Implementation against All Odds – A Multisourcing Case Study, Journal of Information Technology Case and Application Research 13 (4): 3–31.

Swar, B., Moon, J., Oh, J. and Rhee, C (2012). Determinants of Relationship Quality for IS/IT Outsourcing Success in Public Sector, Information Systems Frontiers 14 (2): 457–475.

Tajdini, S. and Nazari, M. (2012). IS Outsourcing Decision: A quantitative approach, International Journal of Business and Management 7 (2): 113–129.

Tambe, P. and Hitt, L. (2010). How Offshoring Affects IT Workers, Communications of the ACM 53 (10): 62–70.

Tate, W., Ellram, L. and Brown, S (2009). Offshore Outsourcing of Services: A stakeholder perspective, Journal of Service Research 12 (1): 56–72.

Tate, W. and Ellram, L (2009). Offshore Outsourcing: A managerial framework, Journal of Business and Industrial Management 24 (3/4): 256–268.

Tate, W.L. and Ellram, L.M (2012). Service Supply Management Structure in Offshore Outsourcing, Journal of Supply Chain Management 48 (4): 8–29.

Teo, T.S. and Bhattacherjee, A (2014). Knowledge Transfer and Utilization in IT Outsourcing Partnerships: A preliminary model of antecedents and outcomes, Information & Management 51 (2): 177–186.

Thompson, D. (2015). A World Without Work, The Atlantic Monthly 316 (1): 51–61.

Tiwana, A (2010). Systems Development Ambidexterity: Explaining the complementary and substitutive roles of formal and informal controls, Journal of Management Information Systems 27 (2): 87–126.

Uriona-Maldonado, M., De Souza, L.L.C. and Varvakis, G. (2010). Focus on Practice Service Process Innovation in The Brazilian Electric Energy Sector, Service Business 4 (1): 77–88.

Veltri, N.F., Saunders, C.S. and Kavan, C.B (2008). Information Systems Backsourcing: Correcting problems and responding to opportunities, California Management Review 51 (1): 50–76.

Ventovuori, T. and Lehtonen, T (2006). Alternative Models for the Management of FM Services, Journal of Corporate Real Estate 8 (2): 73–90.

Verner, J.M. and Abdullah, L.M (2012). Exploratory Case Study Research: Outsourced project failure, Information and Software Technology 54 (8): 866–886.

Vitasek, K. and Manrodt, K (2012). Vested Outsourcing: A flexible framework for collaborative Outsourcing, Strategic Outsourcing: An International Journal 5 (1): 4–14.

Vivek, S., Banwet, D. and Shankar, R (2008). Analysis of Interactions Among Core, Transaction, and Relationship-Specific Investments: The case of offshoring, Journal of Operations Management 26 (2): 180–197.

Wahrenburg, M., Hackethal, A., Friedrich, L. and Gellrich, T (2006). Strategic Decisions Regarding the Vertical Integration of Human Resource Organizations: Evidence for an integrated HR model for the financial services and non-financial services industry in Germany, Austria and Switzerland, International Journal of Human Resource Management 17 (10): 1726–1771.

Weeks, M.R. and Thomason, S (2011). An Exploratory Assessment of the Linkages Between HRM Practices, Absorptive Capacity, and Innovation in Outsourcing Relationships, International Journal of Innovation Management 15 (2): 303–334.

Weigelt, C. and Sarkar, M (2012). Performance Implications of Outsourcing for Technological Innovations: Managing the efficiency and adaptability trade-off, Strategic Management Journal 33 (2): 189–216.

Whitaker, J., Mithas, S. and Krishnan, M.S (2010). Organizational Learning and Capabilities for Onshore and Offshore Business Process Outsourcing, Journal of Management Information Systems 27 (3): 11–42.

Whitley, E. and Willcocks, L. (2011). Achieving Step-Change in Outsourcing Maturity: Toward collaborative innovation, MIS Quarterly Executive 10 (3): 95–107.

Whitten, D. and Leidner, D (2006). Bringing IT Back: An analysis of the decision to backsource or switch vendors, Decision Sciences 37 (4): 605–621.

Wickramasinghe, V (2010). Impact of Time Demands of Work on Job Satisfaction and Turnover Intention, Strategic Outsourcing: An International Journal 3 (3): 246–255.

Wiener, M. and Saunders, C. (2014a). Forced Coopetition in IT Multi-Sourcing, The Journal of Strategic Information Systems 23 (3): 210–225.

Wiener, M. and Saunders, C.S (2014b). Who is the Favored Bride? Challenges in Switching to a Multi-vendor Offshoring Strategy, R. Hirschheim, A. Heinzl and J. Dibbern (eds.) Information Systems Outsourcing , Berlin, Heidelberg: Springer, pp. 289–312.

Willcocks, L., Hindle, J., Feeny, D. and Lacity, M (2004). Information Technology and Business Process Outsourcing: The knowledge potential, Journal of Information Systems Management 21 (3): 7–15.

Willcocks, L.P. and Griffiths, C (2010). The Crucial Role of Middle Management in Outsourcing, MIS Quarterly Executive 9 (3): 177–193.

Williamson, O (1975). Markets and Hierarchies: Analysis and antitrust implications , New York: Free Press.

Williamson, O (1976). Franchise Bidding for Natural Monopolies in General and with Resoect to CAVT, Bell Journal of Economics . XXVI (3): 497–540.

Williamson, O (1991). Comparative Economic Organization: The analysis of discrete structural alternatives, Administrative Science Quarterly 36 (2): 269–296.

Wullenweber, K., Beimborn, D., Weitzel, T. and Konig, W (2008). The Impact of Process Standardization on Business Process Outsourcing Success, Information Systems Frontiers 10 (2): 211–224.

Zimmermann, A. and Ravishankar, M.N (2014). Knowledge Transfer in IT Offshoring Relationships: The roles of social capital, efficacy and outcome expectations, Information Systems Journal 24 (2): 167–202.

Download references

Author information

Authors and affiliations.

College of Business Administration, University of Missouri, St. Louis, Missouri, USA

Mary C. Lacity

College of Business, City University of Hong Kong, Tat Chee Ave, Hong Kong

Shaji A. Khan & Aihua Yan

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Mary C. Lacity .

Editor information

Editors and affiliations.

Department of Management, London School of Economics, London, United Kingdom

Leslie P. Willcocks

College of Business Administration, University of Missouri, SAINT LOUIS, Missouri, USA

University of Oxford , Oxford, United Kingdom

Chris Sauer

Master codes

* Indicates a new variable that was not coded before in Lacity, Rottman, and Khan, ( 2010 ) or Lacity et al. ( 2011 ).

1. Absorptive capacity – client: A client organization’s ability to scan, acquire, assimilate, and exploit valuable knowledge (e.g., Grimpe and Kaiser, 2010 ; Reitzig and Wagner, 2010 ).

2. Absorptive capacity – provider: A provider organization’s ability to scan, acquire, assimilate, and exploit valuable knowledge (e.g., Luo et al. , 2010 ). (Previously called ‘Absorptive Capacity – Supplier’ in Lacity et al. , 2011 .)

3. Access to expertise/skills: A client organization’s desire or need to access provider skills/expertise (e.g., Currie et al. , 2008 ; Lam and Chua, 2009 ).

4. Access to global markets: A client organization’s desire or need to gain access to global markets by outsourcing to providers in those markets (e.g., Gorp et al. , 2007 ).

5. Adaptability: The extent to which a party is able to adapt a business service to meet changes in the environment (e.g., Sia et al. , 2008 ).

6. * Adherence to environmental standards: The degree to which an organization has embraced or been certified as following ecological standards such as ISO 26000, Carbon Disclosure Project, UN Global Compact (e.g., Babin and Nicholoson, 2011 ).

7. * Asset complementarity: The degree to which a set of assets is uniquely complementary (e.g., Argyres and Zenger, 2012 ).

8. Asset Specificity: The degree to which an asset can be redeployed to alternative uses and by alternative users without sacrifice of productive value (Williamson, 1976 ; Sia et al. , 2008 ).

9. Asset specificity – human: The degree to which a human asset can be redeployed to alternative uses and by alternative users without sacrifice of productive value (e.g., Alvarez-Suescun, 2010 ).

10. Asset specificity – physical: The degree to which a physical asset can be redeployed to alternative uses and by alternative users without sacrifice of productive value (e.g., Alvarez-Suescun, 2010 ).

11. * Boundary spanning capability – client: A client firm’s external BPs that bridge the internal and external boundaries. That is client firm processes that ease the organizational and national boundaries between clients and service providers (e.g., Du and Pan, 2013 ).

12. * Boundary spanning capability – provider: A service provider firm’s external BPs that bridge the internal and external boundaries. That is provider firm processes that ease the organizational and national boundaries between clients and service providers (e.g., Du and Pan, 2013 ).

13. Business service management capability – client: The ability of a client organization to efficiently and effectively manage a BP/service using in-house resources (e.g., McIvor et al. , 2009 ). (Previously called ‘Business Process Management Capability – Client’ in Lacity et al. , 2011 .)

14. Business service management capability – provider: The ability of a provider organization to efficiently and effectively manage a BP/service (e.g., Saxena and Bharadwaj, 2009 ). (Previously called ‘Business Process Management Capability – Supplier’ in Lacity et al. , 2011 .)

15. Business strategic type: An organization’s strategy to address three fundamental business problems – entrepreneurial, engineering, and administrative. Categorized under the Miles and Snow typology as defenders, prospectors, analyzers, and reactors (Miles and Snow, 1978 ; Shih et al. , 2005 ; Kenyon and Meixell, 2011 ).

16. Career development of employees: A client organization’s desire or need to provide better career opportunities for employees (e.g., Lacity et al. , 2004 ).

17. Centralization: The degree to which an organization’s resources, services, or decision-making are concentrated within a particular group or location (e.g., Delmotte and Sels, 2008 ). (Previously called ‘Centralization of Department’ in Lacity et al. , 2011 .)

18. Change catalyst: A client organization’s desire or need to bring about large scale changes in the organization (e.g., Gospel and Sako, 2010 ).

19. Change management capability – client: The extent to which a client organization effectively manages change (e.g., Lacity et al. , 2004 ). (Previously called ‘Change Management Capability’ in Lacity et al. , 2011 .)

20. * Change management capability – provider: The extent to which a provider organization effectively manages change (e.g., Lacity et al. , 2011 ).

21. * CIO power: The level of influence of the head of the IT function (e.g., Chakrabarty and Whitten, 2011 ; Gefen et al. , 2011 ).

22. Client – Provider alignment: The degree to which client and provider incentives, motives, interests, and/or goals are aligned (e.g., Sen and Shiel, 2006 ). (Previously called ‘Client–Supplier Alignment’ in Lacity et al. , 2011 .)

23. Client – Provider interface design: The planned structure on where, when, and how client and provider employees work, interact, and communicate (e.g., Sen and Shiel, 2006 ). (Previously called ‘Client–Supplier Interface Design’ in Lacity, Rottman, & Khan, 2010 ).

24. Client age: The age of a client organization in years (e.g., Delmotte and Sels, 2008 ).

25. * Client business change: The degree to which the client’s business structure or leadership change through mergers, acquisitions, divestitures, and/or C-suite turnover (e.g., Mathew and Das Aundhe, 2011 ).

26. Client experience with outsourcing: The situation in which the client has prior outsourcing experience (e.g., Alvarez-Suescun, 2010 ).

27. Client management capability: The extent to which a provider organization is able to effectively manage client relationships (e.g., Howells et al. , 2008 ).

28. Client outsourcing readiness: The extent to which a client organization is prepared to engage an outsourcing provider by having realistic expectations and a clear understanding of internal costs and services compared with outsourced costs and services (e.g., McIvor et al. , 2009 ).

29. * Client power: The degree of power the client has over the provider, measured as a percentage of the provider’s revenues (e.g., Susarla et al. , 2010b ).

30. * Client prestige: The degree to which a client is widely regarded and respected (e.g., Handley and Benton, 2012 ).

31. Client size: The size of a client organization usually measured as total assets, sales, and/or number of employees (e.g., Handley and Benton, 2012 ).

32. * Client size – Department: The size of a client’s department or function considering outsourcing, usually measured as total assets, sales, and/or number of employees in that department (e.g., Chakrabarty and Whitten, 2011 ).

33. Client-specific knowledge required: The degree to which a unit of work requires a significant amount of understanding/knowledge about unique client systems, processes, or procedures (e.g., McKenna and Walker, 2008 ).

34. * Client–Provider coordination processes: The extent to which coordination and communication processes are present between a provider and its client during project execution. These include aspects such as presence of provider liaisons, accurate and complete project documentation, project status reports, and issue remediation processes (e.g., Gopal et al. , 2011 ).

35. Commitment: The degree to which partners pledge to continue the relationship (e.g., Levina and Su, 2008 ).

36. Communication: The degree to which parties are willing to openly discuss their expectations, directions for the future, their capabilities, and/or their strengths and weaknesses (e.g., Gainey and Klaas, 2003 ).

37. * Competition in client firm environment: The presence of multiple, reputable, and trustworthy firms within a client’s industry (e.g., Mithas et al. , 2013 ).

38. * Compliance: A client organization’s need to desire to improve compliance (e.g., Iveroth, 2010 ).

39. Concern for security/intellectual property: A client organization’s concerns about security of information, transborder data flow issues, and protection of IP (e.g., Wullenweber et al. , 2008 ).

40. Configurational approach: The client firm matches multiple factors in configurations that maximize their chances of outsourcing success. For example, matching strategic intent with contractual governance, matching transaction attributes with contractual governance (e.g., Sen and Shiel, 2006 ; Saxena and Bharadwaj, 2009 ).

41. Conflict resolution: The degree to which clients and providers quickly, fairly, and meaningfully resolve disputes (e.g., Wullenweber et al. , 2008 ).

42. Conflict resolution approach: The type of approach used to handle a conflict between clients and providers. Types of approaches include integrating, accommodating, compromising, collaborative, and avoiding (e.g., Lacity and Willcocks, 2014 ).

43. Contract detail: The number or degree of detailed clauses in the outsourcing contract, such as clauses that specify prices, service levels, key process indicators, benchmarking, warranties, and penalties for nonperformance (e.g., Handley and Benton, 2009 ; Luo et al. , 2010 ).

44. Contract duration: The duration of the contract in terms of time (e.g., Willcocks et al. , 2004 ).

45. Contract flexibility: The degree to which a contract specifies contingencies and enables parties to change contractual terms (e.g., Sia et al. , 2008 ).

46. Contract management capability – client: The extent to which a client organization is able to effectively prepare, negotiate, and manage contracts with providers, including the ability to track service levels and verify invoices (e.g., Sanders et al. , 2007 ). (Previously called ‘Contract Management Capability’ in Lacity et al. , 2011 .)

47. * Contract management capability – provider: The extent to which a provider organization is able to effectively prepare, negotiate, and manage contracts with clients (e.g., Agrawal et al. , 2012 ).

48. Contract size: The size of the outsourcing contract usually measured as the total value of the contract in monetary terms (e.g., Gewald and Gellrich, 2007 ).

49. Contract type: A term denoting different forms of contracts used in outsourcing. Examples include customized, fixed-priced, time and materials, fee-for-service, gainsharing, and partnership-based contracts (e.g., McFarlan and Nolan, 1995 ; Poppo and Zenger, 2002 ; Ross and Beath, 2006 ; Gopal and Koka, 2010 ).

50. * Contractual governance: A general term that captures the overall formal and legally binding written rules designed to influence interorganizational behavior (e.g., Bachlechner et al. , 2014 ).

51. Control mechanisms: Certain means or devices a controller uses to promote desired behavior by the controlee (e.g., Daityari et al. , 2008 ).

52. Convenience: A client organization’s desire to select a sourcing option based on ease of use, convenience, and less frustration (e.g., McKenna and Walker, 2008 ).

53. Cooperation: The degree to which client and provider employees are willing to work together in common pursuit (e.g., Wullenweber et al. , 2008 ).

54. * Coopetition: The degree to which competitors cooperate (e.g., Wiener and Saunders, 2014a ).

55. * Corporate social responsibility capability – client: A client organization’s ability to behave in a socially responsible way, such as promoting environmental responsibility, promoting fair labor practices, and engaging in philanthropy (e.g., Babin and Nicholson, 2011 ).

56. Corporate social responsibility capability – provider: A provider organization’s ability to behave in a socially responsible way, such as promoting environmental responsibility, promoting fair labor practices, and engaging in philanthropy (e.g., Brown, 2008 ). (Previously called ‘Corporate Social Responsibility-Supplier’ in Lacity et al. , 2011 .)

57. Cost reduction: A client organization’s need or desire to reduce costs of providing a service (e.g., Borman, 2006 ).

58. Country: The nationality of the client or provider organization (e.g., Reitzig and Wagner, 2010 ).

59. Country – business attractiveness: The degree to which a country is attractive to outsourcing clients or providers because of favorable business environmental factors such as economic stability, political stability, cultural compatibility, infrastructure quality, security of IP (e.g., Doh et al. , 2009 ; Malos, 2010 ).

60. Country – financial attractiveness: The degree to which a country is attractive to outsourcing clients or providers because of favorable financial factors such as labor costs, taxes, regulatory, and other costs (e.g., Doh et al. , 2009 ; Malos, 2010 ).

61. Country – human resource attractiveness: The degree to which a country is attractive to outsourcing clients or providers because of favorable people skills and availability factors such as size of labor pool, education, language skills, experience, and attrition rates (e.g., Mehta et al. , 2006 ; Malos, 2010 ).

62. * Country selection: A client or provider’s decision to locate in a particular country (e.g., Massini et al. , 2010 ).

63. * Country size: The size of the country, typically measured by GDP, population, or services exports, and so on (e.g., Hahn et al. , 2011 ).

64. Criticality of service: The degree to which a client organization views the business service as a critical enabler of business success (e.g., Klaas et al. , 2001 ; Wahrenburg et al. , 2006 ). (Previously called ‘Critical Role of Business Process – Organization’ in Lacity et al. , 2011 ).

65. Cultural distance: The extent to which the members of two distinct groups (such as client and provider organizations) differ on one or more cultural dimensions (e.g., Mehta et al. , 2006 ).

66. Cultural distance management: The extent to which client and provider organizations understand, accept, and adapt to cultural differences (e.g., Tate et al. , 2009 ).

67. Culture: Shared values, beliefs, practices, and assumptions that characterize a group (e.g., Rajeev and Vani, 2009 ).

68. * Degree of internationalization – client: The geographic reach of a client – local, regional, country, international, or global (e.g., Whitaker et al. , 2010 ).

69. * Degree of internationalization – provider: The geographic reach of a provider – local, regional, country, international, or global (e.g., Cha and Quan, 2011 ).

70. Delivery capability: A provider’s ability to deliver a contracted service on time, on budget, and with agreed upon service quality (e.g., Howells et al. , 2008 ).

71. Department performance: CXO’s, CEO’s, or organizational members’ perceptions of the function’s performance or competence (e.g., Klaas et al. , 2001 ).

72. Department power: The level of influence of the department on the organization (e.g., Dunbar and Phillips, 2001 ).

73. Department size: The size of a department or business function usually measured as number of employees (e.g., Calantone and Stanko, 2007 ).

74. Domain understanding: The extent to which a provider has prior experience and/or understanding of the client organization’s business and technical contexts, processes, practices, and requirements (e.g., Luo et al. , 2010 ).

75. Evaluation process – client assessment: The client organization’s process for evaluating its own services to determine which are critical or outsourcing ready (e.g., Handley, 2012 ). (Previously called ‘Evaluation Process’ in Lacity et al. , 2011 .)

76. Evaluation process – provider selection: The client organization’s process for evaluating and selecting providers (e.g., Handley and Benton, 2009 ). (Previously called ‘Evaluation Process’ in Lacity et al. , 2011 .)

77. External production cost advantage: The degree to which a provider is perceived to have an advantage over a client organization in production cost economies (e.g., Williamson, 1991 ; Rajeev and Vani, 2009 ).

78. Fear of losing control: A client organization’s concerns that outsourcing may result in loss of control over the service (e.g., Lewin and Peeters, 2006 ; Sanders et al. , 2007 ).

79. * Firm ownership structure – client: The client’s ownership structure: private, public, jointly owned with primary provider (e.g., Rai et al. , 2012 ).

80. Firm ownership structure – provider: The provider’s ownership structure: private, public, jointly owned with primary client (e.g., Jayaraman et al. , 2013 ). (Previously called ‘Supplier Ownership’ in Lacity et al. , 2011 ).

81. Flexibility enablement: A client organization’s desire or need to increase the flexibility of the use and allocation of resources (e.g., Tate and Ellram, 2009 ).

82. Focus on core capabilities: A client organization’s desire or need to outsource in order to focus on its core capabilities (e.g., Carey et al. , 2006 ; Gewald and Dibbern, 2009 ).

83. * Functional spend: The annual operating budget for a function or department (e.g., Kobelsky and Robinson, 2010 ).

84. Geographic distance: The physical distance between two locations (e.g., Doh et al. , 2009 ).

85. Human resource management capability – client: A client organization’s ability to identify, acquire, develop, retain, and deploy human resources to achieve its organizational objectives (e.g., Klaas et al. , 2001 ).

86. Human resource management capability – provider: A provider organization’s ability to identify, acquire, develop, retain, and deploy human resources to achieve both provider’s and client’s organizational objectives (e.g., Kuruvilla and Ranganathan, 2010 ).

87. Industry: The primary industry classification of a client organization. Common classifications include service vs manufacturing, SIC codes, and so on (e.g., Bardhan et al. , 2007 ; Mani et al. , 2010 ).

88. Industry growth: The increase or decrease in the size of a market (e.g., Budhwar et al. , 2006 ).

89. Influences – coercive: Influences that result from both formal and informal pressures exerted on an organization by other organizations upon which they are dependent (e.g., DiMaggio and Powell, 1991 ; Bignoux, 2011 ).

90. Influences – external and internal: The combination of external media, provider pressure, and internal communications at the personal level among managers of companies (e.g., Borman, 2006 ).

91. Influences – mimetic: Influences that arise from the perception that peer organizations are more successful, by modeling themselves based on peer organizations, the mimicking organization aims to achieve similar results (e.g., Klaas et al. , 2001 ).

92. * Information asymmetry: The degree to which one party has information that is unknown to another party in a transaction (e.g., Devos et al. , 2012 ).

93. * Information quality: The degree to which information fits its intended use and is accurate, relevant, timely, and complete (e.g., Bustinza et al. , 2010 ).

94. Innovation: A client organization’s desire or need to use sourcing as an engine for innovation (e.g., Ciravegna and Maielli, 2011 ).

95. Innovation effects: The extent to which outsourcing positively effects a client’s innovation, such as the effects on the number of patents filed or granted (e.g., Grimpe and Kaiser, 2010 ).

96. * Innovativeness – client: The degree to which a client introduces new technologies, processes, services, and methods in their own organization (e.g., Weigelt and Sarkar, 2012 ).

97. * Innovativeness – provider: The degree to which a provider introduces new technologies, processes, services, and methods in their own organization and/or the client’s organization (e.g., Jean et al. , 2010 ).

98. Key performance indicators: A set of measures to assess performance (e.g., De Toni et al. , 2007 ; Mahmoodzadeh et al. , 2009 ).

99. * Knowledge formalization: The degree to which clients and providers can formalize/codify requirements (e.g., Aubert et al. , 2011 ).

100. Knowledge required: The degree to which a unit of work requires a significant amount of understanding/knowledge about unique, specialized, or advanced content (e.g., Lam and Chua, 2009 ).

101. Knowledge sharing: The degree to which clients and providers share and transfer knowledge (e.g., Mahmoodzadeh et al. , 2009 ) (Previously called ‘Effective Knowledge sharing in Lacity et al. , 2011 ).

102. Legal and political uncertainties: The extent to which a location’s legal and political environments are uncertain, unstable, or unfamiliar (e.g., Currie et al. , 2008 ; Penfold, 2009 ).

103. Length of relationship: The number of years a client and a provider organization has worked together (e.g., Gainey and Klaas, 2003 ).

104. Loss of control: The degree to which a client loses control over a business service after outsourcing (e.g., Sanders et al. , 2007 ).

105. * Loss of knowledge: The degree to which a client loses knowledge about a business service after outsourcing (e.g., Kien et al. , 2010 ).

106. Measurement difficulty: The degree of difficulty in measuring performance of exchange partners in circumstances of joint effort, soft outcomes, and/or ambiguous links between effort and performance (e.g., Tate and Ellram, 2009 ).

107. Middle-management commitment/support: The extent to which middle managers provide leadership, support, and commitment to outsourcing (e.g., Levina and Su, 2008 ).

108. * Mutual agreement: The degree of agreement about behaviors, goals, obligations, and policies among partners (e.g., Lioliou et al. , 2014 ).

109. Mutual dependency: The degree to which a client and a provider depend upon one another (e.g., Baraldi et al. , 2014 ).

110. Mutual understanding: The degree of understanding of behaviors, goals, and policies among partners (e.g., Sen and Shiel, 2006 ).

111. Opportunism: ‘Self-interest seeking with guile’ or ‘Making of false or empty, that is self-disbelieved, threats and promises’ (Williamson, 1976 , 1991 ; Tate and Ellram, 2009 ).

112. * Organizational boundaries: The demarcation between the organization and its environment; in outsourcing, the demarcation between the client and provider organizations (e.g., Baraldi et al. , 2014 ).

113. * Organizational learning: The degree to which organizations learn, often associated with the organization’s commitment to learn, open-mindedness and shared vision (e.g., Malik et al. , 2012 ).

114. * Outsourcing decision – backsourcing: A client organization’s decision to bring a previously outsourced service back in-house (e.g., Veltri et al. , 2008 ).

115. * Outsourcing decision – bundled services: A client organization’s decision to procure multiple services from the same provider, especially as it relates to the decision to deepen an existing provider relationship (e.g., Su and Levina, 2011 ).

116. * Outsourcing decision – captive: A client organization’s decision to operate a captive center in a nondomestic location (e.g., Massini et al , 2010 ).

117. * Outsourcing decision – commercial enterprise: A client organization’s decision to create a new commercial entity to provide outsourcing services to both internal and external customers (e.g., Freytag et al. , 2012 ).

118. Outsourcing decision – degree of outsourcing: The amount of outsourcing as indicated by percentage of budget outsourced and/or type and number of business services outsourced (e.g., Gilley et al. , 2004 ; Salimath et al. , 2008 ).

119. Outsourcing decision – degree of outsourcing – offshore: The amount of offshore outsourcing as indicated by percentage of budget outsourced and/or type and number of business services outsourced (e.g., Khan and Lacity, 2012 ).

120. * Outsourcing decision – domestic: A client organization’s decision to engage a domestic provider (e.g., Pearce, 2014 ).

121. * Outsourcing decision – impact sourcing: Hiring marginalized individuals (i.e., people who normally would have few opportunities for good employment) to provide IT, BP, or other digitally enabled services (e.g., Lacity et al. , 2014 ).

122. Outsourcing decision – make or buy: The fundamental make or buy decision (e.g., Williamson, 1991 ) in which a client organization decides to keep a business service in-house or decides to engage an outsourcing provider, measured as a binary variable (e.g., Lee and Kim, 2010 ).

123. Outsourcing decision – multisourcing: A client organization’s decision to engage multiple service providers (e.g., Sia et al. , 2008 ), primarily aiming for breath of providers (e.g., Su and Levina, 2011 ).

124. Outsourcing decision – offshore: A client organization’s decision to engage an offshore provider (e.g., Fifarek et al. , 2008 ; Lee and Kim, 2010 ).

125. * Outsourcing decision – offshore – county: A client’s decision to select this country as an offshore outsourcing destination; a country’s location attractiveness to outsourcing clients in other countries (e.g., Datta and Bhattacharya, 2012 ).

126. Outsourcing decision – provider selection: A client organization’s reason(s) for selecting a particular provider (e.g., Howells et al. , 2008 ). (Previously called ‘Outsourcing Decision – Supplier Selection’ in Lacity et al. , 2011 .)

127. Outsourcing decision – renewal: The client’s decision to extend or renew an existing outsourcing contract (e.g., Bharadwaj et al. , 2010 ).

128. * Outsourcing decision – rural: A client organization’s decision to engage a rural-based provider (e.g., Lacity, Rottman, & Khan, 2010 ).

129. * Outsourcing decision – shared services: The client’s decision to share services across business divisions (e.g., Sako, 2010 ).

130. * Outsourcing decision – switch providers: A client organization’s decision to switch outsourcing providers (e.g., Freytag et al. , 2012 ).

131. * Outsourcing outcomes – backsourcing: The degree to which a client organization reports successful backsourcing of a business or IT service (e.g., Bhagwatwar et al. , 2011 ).

132. * Outsourcing outcomes – captive: The degree to which a client organization reports that the captive center is successful (e.g., Prikladnicki and Audy, 2012 ).

133. Outsourcing outcomes – organizational business performance – client: The degree to which a client organization achieved organizational-level business performance improvements, as a result of an outsourcing decision, such as stock price performance, revenue growth, return on assets, expenses, or profits (e.g., Reitzig and Wagner, 2010 ).

134. Outsourcing outcomes – organizational business performance – provider: The degree to which a provider organization achieved organizational-level business performance improvements, as a result of an outsourcing decision, such as stock price performance, return on assets, expenses, or profits (e.g., Rajeev and Vani, 2009 ).

135. Outsourcing outcomes – performance improvements: The degree to which a client organization reports business service improvements, as a consequence of outsourcing, such as reports of costs savings realized, better quality of services, better compliance, or tighter security (e.g., Mani et al. , 2010 ). (Previously called ‘Outsourcing Outcomes – Process Performance Improvements’ in Lacity et al. , 2011 .)

136. Outsourcing outcomes – performance improvements – offshore: The degree to which a client organization reports business service improvements as a consequence of offshore outsourcing, such as reports of costs savings realized or better quality of services (e.g., Levina and Su, 2008 ). (Previously called ‘Outsourcing Outcomes – Process Performance Improvements – Offshore’ in Lacity et al. , 2011 .)

137. Outsourcing outcomes – project performance: The degree to which a project is delivered on time, within budget, and meets requirements (e.g., Palvia et al. , 2010 ).

138. Outsourcing outcomes – project performance – offshore: The degree to which an offshored project is delivered on time, within budget, and meets requirements (e.g., Tate and Ellram, 2012 ).

139. Outsourcing outcomes – success – client: A client organization’s general perceptions of success and satisfaction with outsourcing (e.g., Sia et al. , 2008 ). (Previously called ‘Outsourcing Outcomes – Success’ in Lacity et al. , 2011 .)

140. Outsourcing outcomes – success – offshore: A client organization’s general perceptions of success and satisfaction with offshore outsourcing (e.g., Vivek et al. , 2008 ).

141. * Outsourcing outcomes – success – provider: A provider organization’s general perceptions of success and satisfaction with outsourcing/offshoring (e.g., Palvia et al. , 2011 ).

142. * Outsourcing outcomes – success – shared services: A client organization’s general perceptions of success and satisfaction with shared services (e.g., Iveroth, 2010 ).

143. * Outsourcing outcomes – switch providers: A client organization’s report on the extent of success after switching service providers (e.g., Wiener and Saunders, 2014a ).

144. Partnership view: A client organization’s consideration of providers as trusted partners rather than as opportunistic vendors (e.g., Willcocks et al. , 2004 ; Sen and Shiel, 2006 ).

145. Political reasons/influences: A client stakeholder’s desire or need to use a sourcing decision to promote personal agendas (e.g., Maelah et al. , 2010 ).

146. * Practical intelligence: An individual’s ability to resolve project-related work problems that are unexpected, difficult, and cannot be resolved using established processes and frameworks (e.g., Langer et al. , 2014 ).

147. Prior client/provider working relationship: The situation in which the client and provider organizations have worked together in the past (e.g., Mani et al. , 2010 ). (Previously called ‘Prior Client/Supplier Working Relationship’ in Lacity et al. , 2011 .)

148. Prior firm performance – client: Client firm performance usually measured as net profits, return on assets, expenses, earnings per share, number of patents, and/or stock price prior to an outsourcing decision. (e.g., Dunbar and Phillips, 2001 ; Gilley et al. , 2004 ).

149. Prior firm performance – provider: Provider firm performance usually measured as net profits, return on assets, expenses, earnings per share, and/or stock price prior to an outsourcing contract. (e.g., Gewald and Gellrich, 2007 ; Nadkarni and Herrmann, 2010 ). (Previously called ‘Prior Firm Performance – Supplier’ in Lacity et al. , 2011 .)

150. Product quality: The quality of the end product delivered as part of an outsourcing/offshoring arrangement (e.g., Whitten and Leidner, 2006 ).

151. Project duration: The duration of the project in terms of time (e.g., Ramchandran and Gopal, 2010 ).

152. * Project management capability – client: The ability of retained teams within client organizations to internally manage and coordinate project activities related to planning, execution, and feedback for an outsourced project (e.g., Gopal et al. , 2011 ).

153. * Project management capability – provider: The ability of delivery teams within provider organizations to internally manage and coordinate project activities related to planning, execution, and feedback for an outsourced project (e.g., Gopal et al. , 2011 ).

154. Project scoping accuracy – provider: A provider firm capability to estimate the contract scope accurately (not underbid or overbid) (e.g., Koh et al. , 2004 ). (Previously called ‘Project Scoping Accuracy’ in Lacity, Rottman, & Khan, 2010 ).

155. * Project size: The size of a project, usually measured as number of people or effort (e.g., Langer et al. , 2014 ).

156. * Provider breadth of service: The degree to which providers offer a wide variety of services (e.g., Gao et al. , 2010 ).

157. Provider capabilities: A broad term that captures the overall level of a provider’s abilities (e.g., Su and Levina, 2011 ). (Previously called ‘Supplier’s Core Competences’ in Lacity, Rottman, & Khan, 2010 ).

158. Provider competition: The presence of multiple, reputable, and trustworthy service providers which can provide a range of choices for the clients (e.g., Levina and Su, 2008 ). (Previously called ‘Supplier Competition’ in Lacity et al. , 2011 .)

159. Provider dependency: The degree to which a client depends on a provider (e.g., Borman, 2006 ). (Previously called ‘Supplier Dependency’ in Lacity et al. , 2011 .)

160. * Provider employee – attitude: Attitude of employees toward their jobs or employers (e.g., Sarker et al. , 2010 ).

161. Provider employee performance: The client’s perception of the performance of individual provider employees (e.g., Daityari et al. , 2008 ; Lam and Chua, 2009 ). (Previously called ‘Supplier Employee Performance’ in Lacity et al. , 2011 .)

162. * Provider employee satisfaction: The degree to which provider employees are satisfied with their jobs and employers (e.g., Lacity et al. , 2014 ).

163. Provider employee turnover: The percentage of the workers that are replaced in a given time period, frequently measured as turnover intention (e.g., Budhwar et al. , 2006 ) (Previously called ‘Supplier Employee Turnover’ in Lacity et al. , 2011 .)

164. * Provider employee work life conflict: ‘The inter-(between) role conflict where the demands created by the job interfere with performing family-related responsibilities’(Netemeyer et al. , 2004 , p. 50, as cited in Sarker et al. , 2010 ).

165. Provider firm age: The age of a provider firm in years (e.g., Lahiri and Kedia, 2009 ). (Previously called ‘Supplier Age’ in Lacity et al. , 2011 .)

166. Provider management capability: The extent to which a client organization is able to effectively manage outsourcing providers (e.g., Sanders et al. , 2007 ). (Previously called ‘Supplier Management Capability’ in Lacity et al. , 2011 .)

167. * Provider power: The degree of power the provider has over the client (e.g., Barthélemy, 2011 ).

168. Provider reputation: The public’s perception of a provider’s capabilities based on past performance and financial status (e.g., Gewald and Gellrich, 2007 ). (Previously called ‘Supplier Reputation’ in Lacity et al. , 2011 .)

169. Provider size: The size of a provider organization usually measured as total assets, sales, and/or number of employees (e.g., Nadkarni and Herrmann, 2010 ). (Previously called ‘Supplier Size’ in Lacity et al. , 2011 .)

170. Public perceptions of outsourcing: The degree to which the public has a negative perception of outsourcing or offshoring (e.g., Sen and Shiel, 2006 ).

171. * Quality improvement: A client organization’s desire or need to improve the quality of the client’s business, processes, or capabilities (e.g., Gewald and Dibbern, 2009 ).

172. * Quality management capability – provider: The degree to which a provider has a total quality management philosophy and a focus on continuous improvement (e.g., Malik et al. , 2012 ).

173. R&D spend: The amount of money an organization spends on R&D (e.g., Calantone and Stanko, 2007 ; Grimpe and Kaiser, 2010 ).

174. Rapid delivery: A client organization’s desire or need to speed up service delivery (e.g., Bandyopadhyay and Hall, 2009 ; Lam and Chua, 2009 ).

175. Relational governance: The unwritten, worker-based mechanisms designed to influence interorganizational behavior (Macneil, 1980 ; Kim, 2008 ).

176. Relationship quality: The quality of the relationship between a client and provider (e.g., Sia et al , 2008 ; Saxena and Bharadwaj, 2009 ).

177. Relationship-specific investment: Specific investments made over time which discourage opportunism, reinforce signals of the client firms, and create extendedness of the relationships (e.g., Tate and Ellram, 2009 ).

178. Risk: The extent to which a transaction exposes a party (client or provider) to a chance of loss or damage (e.g., Wullenweber et al. , 2008 ; Mathew and Das Aundhe, 2011 ).

179. Risk management capability – client: A client organization’s practice of identifying, rating, and mitigating potential risks associated with outsourcing (e.g., Borman, 2006 ).

180. * Risk spread: The distribution of risk, typically by assigning work to multiple providers and/or locations (e.g., Su and Levina, 2011 ).

181. Scalability: The ability to scale volume of service up or down based on demand (e.g., Currie et al. , 2008 ; Redondo-Cano and Canet-Giner, 2010 ).

182. * Security breach: A significant incident that results in unauthorized access of data, applications, services, networks and/or devices, or loss or theft of IP (e.g., Gorla and Lau, 2010 ).

183. Security, privacy, and confidentiality capability – provider: The proven ability of a provider to protect client data through investments in technology, training, process controls, audits, and other management practices (e.g., Sen and Shiel, 2006 ). (Previously called ‘Security, Privacy, and Confidentiality Capability – Supplier’ in Lacity et al. , 2011 .)

184. Senior leadership: The extent to which the senior executives of an organization are effective leaders (e.g., Lacity et al. , 2004 ).

185. Service complexity: The degree to which a service or project requires compound steps, the control of many variables, and/or where cause and effect are subtle and dynamic (e.g., Ventovuori and Lehtonen, 2006 ; Penfold, 2009 ). (Previously called ‘Process Complexity’ in Lacity et al. , 2011 .)

186. Service integration: The degree to which clients and providers are able to integrate services (e.g., Sen and Shiel, 2006 ). (Previously called ‘Process Integration’ in Lacity et al. , 2011 .)

187. Service interdependence: The level of integration and coupling among tasks; services that are highly integrated are tightly coupled and difficult to detach (e.g., Sanders et al. , 2007 ). (Previously called ‘Process Interdependence’ in Lacity et al. , 2011 .)

188. Service quality: The quality of a service, frequently measured as a client’s perception of a satisfactory service performance by the provider (e.g., Lewin and Peeters, 2006 ).

189. Service standardization: The degree to which a service is standard (e.g., Tate and Ellram, 2009 ). (Previously called ‘Process Standardization’ in Lacity et al. , 2011 .)

190. Slack resources: Resources and organization possesses in excess of what is required to maintain the organization (e.g., Koh et al , 2004 ; Hall and Liedtka, 2005 ). (Previously called ‘Financial Slack’ in Lacity, Rottman, & Khan, 2010 ).

191. Social capital – cognitive dimension: Social capital arising from the sharing representations, interpretations, and systems of meaning among parties (Nahapiet and Ghoshal, 1998 ; Willcocks et al. , 2004 ).

192. Social capital – relational dimension: Social capital arising from personal relationships people have developed with each other through a history of interactions (Nahapiet and Ghoshal, 1998 ; Willcocks et al. , 2004 ).

193. Social capital – structural dimension: Social capital arising from the patterns of linkages between people or units including network ties, network configuration, and network appropriability (Nahapiet and Ghoshal, 1998 ; Willcocks et al. , 2004 ).

194. Social norms: An individual’s perceptions of the social pressures put on him or her to perform or not to perform the behavior in question. (Ajzen and Fishbein, 1980 ; Raman et al. , 2007 ).

195. * Staff transfer: The practice of transferring staff from the client to provider organization (e.g., Miozzo and Grimshaw, 2011 ).

196. Stakeholder buy-in: Gaining commitment and support from all parties involved in sourcing-related decisions (e.g., Tate and Ellram, 2009 ).

197. Strategic intent: A client organization’s desire or need to source for strategic reasons such as developing new capabilities that can be leveraged in the marketplace (e.g., Sanders et al. , 2007 ).

198. Switching costs: The costs incurred when a client organization changes from one provider or marketplace to another (e.g., Wahrenburg et al. , 2006 ).

199. * Task programmability: The degree to which appropriate behavior by the agent (provider) can be precisely defined in advance (Eisenhardt, 1989 ) (e.g., Susarla et al. , 2010a , b ).

200. * Task variety: The degree to which a task requires various activities, skills, and talents (e.g., Sengupta and Gupta, 2011 ).

201. * Team dispersion: The degree to which a team is geographically dispersed, often measured as a percentage of teammates onshore/offshore (e.g., Langer et al. , 2014 ).

202. * Team size: The number of individuals assigned to a team (e.g., Gopal and Koka, 2012 ).

203. * Team turnover: The extent to which team members leave a team (e.g., Narayanan et al. , 2011 ).

204. Technical and methodological capability – client: A client organization’s level of maturity in terms of technical or process-related standards, and best practices (e.g., Bardhan et al. , 2007 ).

205. Technical and methodological capability – provider: A provider organization’s level of maturity in terms of technical or process-related and best practices (e.g., Sia et al. , 2008 ; Shah Bharadwaj and Saxena, 2009 ). (Previously called ‘Technical and Methodological Capability – Supplier’ in Lacity et al. , 2011 .)

206. * Technology infrastructure quality – provider: The degree to which the technology infrastructure the provider uses to support service delivery is nimble, scalable, and state-of-the-art (e.g., Kannabiran and Sankaran, 2011 ).

207. * Technology integration imperative: A client organization’s need or desire to integrate technologies (e.g., Gefen et al. , 2011 ).

208. Technology upgrade: A client organization’s need or desire to improve or upgrade technology (e.g., Bhagwatwar et al. , 2011 ). (Previously called ‘Technical Reasons’ in Lacity, Rottman, & Khan, 2010 ).

209. Time zone differences: The difference in local times between two locations as measured in hours (e.g., Mehta et al. , 2006 ).

210. Top management commitment/support: The extent to which senior executives provide leadership, support, and commitment to outsourcing (e.g., Tate and Ellram, 2009 ).

211. Training: The nature or extent of provider employee training by either the client or provider organization (e.g., Raman et al. , 2007 ; Malik, 2009 ).

212. Transaction costs: The effort, time, and costs incurred in searching, creating, negotiating, monitoring, and administrating a service contract between buyers and providers (Williamson, 1991 ; Levina and Su, 2008 ).

213. Transaction frequency: The number of times a client organization initiates a transaction typically categorized as either occasional or frequent (e.g., Wahrenburg et al. , 2006 ).

214. Transaction size: The size of a transaction often measured in terms of dollar value or effort (e.g., Luo et al. , 2010 ).

215. Transaction type: The type of work, usually operationalized as a categorical variable, such as delineating among transactions involving development, maintenance, and reengineering work (e.g., Gopal and Koka, 2010 ) or between ITO and BPO (e.g., Lee and Kim, 2010 ).

216. Transition management capability – client: The extent to which a client organization effectively transitions services to or from outsourcing providers or integrates client services with provider services (e.g., Luo et al. , 2010 ).

217. Transition management capability – provider: The extent to which a provider organization effectively transitions services from a client organization to the provider or integrates client services with provider services (e.g., Saxena and Bharadwaj, 2009 ). (Previously called ‘Transition Management Capability – Supplier’ in Lacity et al. , 2011 .)

218. Trust: The confidence in the other party’s benevolence (e.g., Gainey and Klaas, 2003 ).

219. Uncertainty: The degree of unpredictability or volatility of future states as it relates to the definition of requirements, emerging technologies, and/or environmental factors (Williamson, 1991 ; Mani et al. , 2010 ).

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Lacity, M.C., Khan, S.A., Yan, A. (2017). Review of the Empirical Business Services Sourcing Literature: An Update and Future Directions. In: Willcocks, L., Lacity, M., Sauer, C. (eds) Outsourcing and Offshoring Business Services. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-52651-5_14

Download citation

DOI : https://doi.org/10.1007/978-3-319-52651-5_14

Published : 03 June 2017

Publisher Name : Palgrave Macmillan, Cham

Print ISBN : 978-3-319-52650-8

Online ISBN : 978-3-319-52651-5

eBook Packages : Business and Management Business and Management (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here .

Loading metrics

Open Access

Peer-reviewed

Research Article

Challenges and practices identification in complex outsourcing relationships: A systematic literature review

Roles Formal analysis, Methodology

Affiliations Department of Computer Science and IT, Software-Engineering-Research-Group (SERG-UOM), University of Malakand, Chakdara, Pakistan, Department of Computer Science, Shaheed Benazir Bhutto University, Sheringal, Dir(U), Pakistan

ORCID logo

Roles Methodology, Project administration

Affiliation Department of Computer Science and IT, Software-Engineering-Research-Group (SERG-UOM), University of Malakand, Chakdara, Pakistan

Roles Conceptualization, Data curation, Formal analysis

* E-mail: [email protected]

Affiliation Department of Accounting and Information Systems, College of Business and Economics, Qatar University, Doha, Qatar

Roles Conceptualization, Project administration, Resources

  • Ghulam Murtaza Khan, 
  • Siffat Ullah Khan, 
  • Habib Ullah Khan, 
  • Muhammad Ilyas

PLOS

  • Published: January 31, 2022
  • https://doi.org/10.1371/journal.pone.0262710
  • Peer Review
  • Reader Comments

Fig 1

Complex IT outsourcing relationships aptitude several benefits such as increased cost likelihood and lowered costs, higher scalability and flexibility upon demand. However, by virtue of its complexity, the complex outsourcing typically necessitates the interactions among various stakeholders from diverse regions and cultures, making it significantly more challenging to manage than traditional outsourcing. Furthermore, when compared to other types of outsourcing, complex outsourcing is extremely difficult because it necessitates a variety of control and coordination mechanisms for project management, which proportionally increases the risk of project failure. In order to overcome the failure of projects in complex outsourcing relationships, there is a need of robust systematic research to identify the key challenges and practices in this area. Therefore, this research implements systematic literature review as a research method and works as a pioneer attempt to accomplish the aforementioned objectives. Upon furnishing the SLR results, the authors identified 11 major challenges with 67 practices in hand from a total of 85 papers. Based on these findings, the authors intend to construct a comprehensive framework in the future by incorporating robust methodologies such as AHP and fuzzy logic, among others.

Citation: Khan GM, Khan SU, Khan HU, Ilyas M (2022) Challenges and practices identification in complex outsourcing relationships: A systematic literature review. PLoS ONE 17(1): e0262710. https://doi.org/10.1371/journal.pone.0262710

Editor: Anandakumar Haldorai, Sri Eshwar College of Engineering, INDIA

Received: September 4, 2021; Accepted: January 1, 2022; Published: January 31, 2022

Copyright: © 2022 Khan et al. This is an open access article distributed under the terms of the Creative Commons Attribution License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Data Availability: All relevant data are within the paper.

Funding: This publication was supported by Qatar National Library, Doha, Qatar and Qatar University Internal Grant No. IRCC- 2021-010. The findings achieved herein are solely the responsibility of the authors.

Competing interests: The authors have declared that no competing interests exist.

Introduction

Outsourcing is the transfer of the continuous management responsibility of a client party or service user to a third party, referred to as a vendor or provider, to perform an IT service under a contract of service level agreement [ 1 ]. Outsourcing has since become a well-established academic subject because of its rapidly developing practice. Outsourcing determinations, outsourcing methods, challenges identified in outsourcing etc. are some of the hot topics in the literature [ 2 ].

Some of the advantages of outsourcing include ensuring maximum profit, lower costs, increased productivity, flexibility in meeting service needs, higher quality, redirecting company resources to core activities, more customer satisfaction, continuity and risk management, faster time to market, access to skilled resources, flexibility to focus on key areas, and faster and better services [ 3 , 4 ].

Proponents of IT outsourcing have underlined the importance of managing outsourced relationships. "A long-term commitment, shared risk and benefits, a sense of reciprocal cooperation, and other features congruent with concepts and theories of participatory decision making" is what a relationship is characterised as. While IT outsourcing interactions have gotten some attention in the literature, just a few academics have looked at the client-supplier IT outsourcing relationship [ 5 ].

Collaboration across corporate boundaries is a necessary component of today’s company. This type of client-vendor relationship frequently goes beyond the typical contractual restrictions agreed upon at the start of collaboration. The risks and advantages of joint labours, as well as investments and work load, are evenly distributed among the collaborative partners. Inter- and intra-organizational collaboration helps businesses gain a competitive advantage. Bidirectional trust, reciprocal dependency, and a win-win mindset between partners are the foundations of long-term working relationships. Collaboration is typically developed by businesses to reduce the costs of collecting the necessary information/understanding, capabilities, and competencies for well-organized professional operations [ 6 ].

All IT outsourcing contracts include components of collaboration, virtual cooperation, and the demands of increasingly sophisticated systems. But one of the most essential variables in deciding the success or failure of virtual collaboration is trust. Good relationships are tactical assets that necessitate the ongoing management effort and focus [ 7 ].

An outsourcing project’s success or failure is determined by a number of elements, including project size, duration, and, most importantly, contract design and management among different stakeholders. Therefore, additional research is required to understand how various parts of outsourcing interact and what the further consequences of the dynamics of these factors are on various organizational outcomes [ 8 ].

Outsourcing has progressed through several stages of client-vendor relationships. Such phases of the relationship are briefly illustrated via the framework in [ 9 ] as

1. Dyadic outsourcing relationship

A client in a dyadic relationship relies on only one vendor to meet all of their demands, which might range from simple to complex. The majority of research in the literature considers such relationship as one-to-one, implying that one client seeks services independently of others, and suppliers do the same.

2. Multi-vendor relationship

In a one-to-many relationship, a client seeks out more than one vendor to supply their services in order to meet the client’s needs or achieve its goals, and information regarding the division of labor is shared and discussed with all parties to the agreement.

3. Co-sourcing relationship

A many-to-one or co-sourcing relationship is described as a collaboration between multiple clients for the delivery of a service through a single vendor contract.

4. Complex outsourcing relationship

The phrase complex relationship or complex outsourcing relationship (COR), which is the subject of this study, refers to a relationship between several clients and multiple vendors (i.e., many-to-many), in which multiple clients rely on multiple vendors to meet their needs under the same contract.

Multiple vendor organizations may work for multiple client organizations through the same contractual agreement or connection in a "complex outsourcing relationship (COR). It is worth noting that this study’s focus is on such a phase or relationship, which is exceptionally difficult to manage owing to the complexity of the situation and the various types of stakeholders involved. The aforementioned phases and types of outsourcing relationships are shown in ( Fig 1 ).

thumbnail

  • PPT PowerPoint slide
  • PNG larger image
  • TIFF original image

https://doi.org/10.1371/journal.pone.0262710.g001

Good relationships and carefully drafted contracts have a significant impact on outsourcing. However, there is a lack of comprehensive guidance in this area, specifically in the context of complex outsourcing relationships, due to the dearth of studies described in the literature [ 10 ]. Outsourcing has become more complex and diversified as a result of the expansion of numerous actors connected via a contract, such as a client and one or more vendors, each with their own unique qualities [ 11 ]. Furthermore, because of its complexity, complex outsourcing typically necessitates interactions among various stakeholders from diverse regions and cultures, making it significantly more challenging to manage than traditional outsourcing. Moreover, complex outsourcing when compared to other types of outsourcing is extremely difficult because it necessitates a variety of control and coordination mechanisms for project management, which proportionally increases the risk of project failure [ 12 ].

Therefore, in light of these points, this study aims to identify the challenges and practices in the context of complex outsourcing relationships.

Based on this hypothesis, the authors of this study formulated the following research question:

  • RQ. 1: What are the key challenges, as identified in the literature, faced by multiple stakeholders (clients and vendors) in the context of complex outsourcing relationships?
  • RQ. 2: What are the practices/solutions, as identified in the literature, faced by multiple stakeholders (clients and vendors) in the context of complex outsourcing relationships?

The remainder of this paper is structured as follows. Background information is provided in Section II. Section III provides a detailed description of the research methodology. The conclusions of this investigation are presented in section IV. The study’s shortcomings are discussed in Section V, and conclusions and future work are discussed in Section VI. The remaining sections provide further information.

In support of a thorough software, the author proposed [ 13 ] a robust architecture for security and compliance challenges. Furthermore, by establishing software requirements based on a study of work patterns of service providers acting in complex IT outsourcing agreements and proposing a software architecture that meets these requirements, this study contributes to filling the gap in software support.

In COR setups, there are a number of solutions [ 12 ] that focus on IT infrastructure compliance, but they are typically ineffective and inefficient and do not work well in general. I am not aware of any solutions that support all of the services we use, necessitating the use of multiple solutions.

Complex IS outsourcing initiatives have distinct tasks and stakeholder connections compared to standard IS outsourcing projects [ 14 ].

Because of the growing worldwide distribution of IT services, which involves complex interorganizational connections and the dispersion of decision rights and responsibilities across numerous organizations, a thorough understanding of governance procedures is required [ 15 ].

The authors build and offer a theoretical framework for explaining various types of outsourcing partnerships, as well as an analysis of why client organizations seeking IT services might choose more collaborative or complicated outsourcing arrangements than dyadic interactions. Moreover, the authors believe that the COR relationships in the future will be more in use [ 9 ].

The authors suggested a methodology and decision-making approach [ 16 ] for examining incentive schemes and creating outsourcing contracts that benefit both the outsourcer and vendor in COR.

Complex outsourcing contracts [ 17 ] are difficult to manage and of themselves, but when time zone differences, language barriers, significant distance, rare face-to-face meetings, and diversity–all of which are common offshore deal companions–the task becomes exponentially more difficult.

Organizations that deal with complex outsourcing arrangements on a regular basis have intelligently implemented the lifecycle model explained in this article [ 18 ].

Many companies struggle to properly manage one or more complex outsourcing agreements, generate value, and mitigate risk [ 19 ].

This research [ 20 ] examines the significance of trust in complex contracts and relationships frameworks that underpin global outsourcing, as well as the difficult conflict-resolution procedures that can be employed to restore trust.

In [ 21 ], the authors want to see what an Indian supplier considers to be significant in order to manage some big and complex outsourcing partnerships, and specifically, how reciprocally profitable and long-term partnerships are developed and maintained with European customers.

By offering a descriptive framework incorporating essential governance variables, this article [ 22 ] seeks to deliver a good understanding for managing complex-type IT-outsourcing agreements. The findings of the analysis, as well as the framework itself, demonstrate the numerous complex difficulties that arise when managing sophisticated IT outsourcing partnerships.

Research methodology

We conducted a systematic literature review to collect relevant data from the literature, which is a more complete and rigorous method than the traditional literature review (OLR). The SLR was carried out in three stages: planning, execution, and reporting.

Search strategy

To conduct an SLR, we tracked Kitchenham’s guidelines [ 23 ] and Mendes et al. [ 24 ]. In addition, depending on the study objectives, we used the population, intervention, comparison, and outcomes (PICO) criteria to select keywords and build search strings.

Population: Clients and Vendors in Complex Outsourcing Relationships

Intervention: Challenges, Practices

Comparison: For the sake of this investigation, no comparisons are made.

Relevance Outcomes: To Assist Clients and Vendors in Complex Outsourcing Relationships

Furthermore, to build the search strings, we employed Boolean connectors AND and OR to connect the features of PICO.

Search strings

To avoid a search break by different database constraints, we developed three different strings.

String 1: ((“Complex outsourcing” OR “Complex software outsourcing” OR “Complex Information Systems outsourcing” OR “complex IT outsourcing” OR “complex outsourcing relationship”) AND (Challenges OR issues OR barriers OR risks OR Practices OR solutions).

String 2: ((“Complex outsourcing relationship” OR “Complex software outsourcing relationship” OR “Complex Information Systems outsourcing relationship” OR “complex IT outsourcing relationship” OR “Complex outsourcing”) AND

(Challenges OR barriers OR issues OR risks OR Practices OR solutions) AND

(“Relationship management in complex outsourcing” OR “Co-ordination in complex outsourcing” OR “Communication in complex outsourcing” OR “Contract management in complex outsourcing” OR “Task allocation in complex outsourcing” OR “Trust building in Complex outsourcing”))

String 3: (("Complex software outsourcing" OR "Complex IS/IT outsourcing" OR "complex outsourcing") AND ("Challenges" OR "issues" OR "barriers" OR "risks" OR "Practices" OR "solutions" solutions))

Literature resources

Using our search strings, we applied our search for famous libraries, such as IEEE Xplore, Google Scholar, ACM, Wiley Online Library, SpringerLink, and ScienceDirect. We also used the snowballing method to further support our research questions and not to miss any important data. It is worth noting that we started the search on 21 th February, 2021, and systematically completed it on 8 th April, 2021.

Criteria for study selection

The strings and authors’ recommendations were backed up by the researchers. Initially, we added a string to the library for metadata. The same procedure was followed to avoid interference with the title, abstract, or keyword restrictions. Each paper was properly documented by the first author, who kept a complete record. Based on this phase, other authors assessed the papers and assigned pertinent information for each paper, as well as its title and abstract.

We established the following inclusion and exclusion criteria based on the aforementioned principles for SLR.

Inclusion criteria.

Such criteria specify which portions of the literature will be considered for inclusion in the selection. Based on such criteria, we have only analyzed items that are relevant to complex outsourcing. The inclusion criteria were as follows:

  • Articles in full text of the English language.
  • Sources only relevant to COR.
  • Studies that describe the COR challenges.
  • Studies that describe the COR practices.
  • Studies published in journals and conferences.
  • White papers and standardized reports from trustworthy organizations.

Exclusion criteria.

Such criteria specify which pieces of literature are not included for consideration. The exclusion criteria were as follows:

  • Studies, not relevant to our research questions.
  • Studies of other than English language.
  • Incomplete Studies.
  • Duplicate studies
  • Thesis or magazine and/or web articles.

The search outcomes are presented in Table 1 . We retrieved 281 publications from a total of 1372 using the inclusion criteria. Using the exclusion criteria, we narrowed it to 85 papers. During data extraction, the principal author finished each step, which was then examined by other authors.

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t001

The primary goal of quality assessment was to identify and eliminate lower-quality studies and to determine the validity of a study’s conclusions.

Criteria for quality assessment

We created the assessment criteria using the guidelines and updates for the SLR from previous studies. In this way, we formulated the questions given in Table 2 prior to the implementation of such criteria. Furthermore, we employed a three-tiered scale to rate each question in the reviewed papers. Yes, no, or partial. We assigned values of 1 to Yes, 0.5, partly, and 0 to No in order to produce quantitative results.

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t002

Furthermore, the work had to be graded on an average of 0.5. The principal author was in charge of applying the assessment parameter for quality to the studies, whereas the remaining authors were responsible for confirming the same assessments on a minority group of previously nominated studies. A few papers were omitted from the study using the same mechanism. However, as seen in Table 1 , after going through the entire process, the final number of studies was 85. Any discrepancies were resolved through additional discussion. Any discrepancies were resolved through additional discussion.

Data extraction

Counting the challenges and their practices is a difficult task because the majority of the challenges and practices from such areas are cascading in nature. Nonetheless, we discovered 11 primary challenges with 67 practices from a total of 85 papers. The identified challenges and their practices are presented in the next section via Tables 3 – 13 , respectively. Furthermore, the papers extracted via the SLR are presented in ( S1 Appendix ) with the respective IDs and Title.

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t003

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t004

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t005

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t006

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t007

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t008

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t009

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t010

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t011

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t012

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t013

Results and discussion

The goal of this research is to uncover the key issues and practices experienced by multiple stakeholders (such as clients and vendors) when dealing with COR.

The following are the challenges that we have identified and analyzed after thorough conduction of the SLR in such areas.

Challenges in COR

Table 3 presents the 11 key challenges with the given frequencies as follows:

  • 1. Control and Coordination Challenges :

‘Control and Coordination’ are one amongst the major challenge in COR. Control refers to a company’s capability to command or manage scattered events so that they meet the company’s goals. The ability of a company to coordinate these disparate activities is referred to as coordination [ 25 ].

  • 2. Decision Problems :

Information system outsourcing decisions [ 26 ] are difficult to make because they entail a number of elements, including (a) establishing and managing a long-term partnership with an independent agent, and (b) revealing the critical organizational assets for controlling outside agents. When the same matter is evaluated from the perspective of COR, it becomes more challenging.

  • 3. High Cost :

The overall cost [ 27 ], for example, the hidden cost, estimated cost, control cost, coordination cost, etc., for outsourcing is high in the case of COR.

  • 4. Security and Compliance Challenges :

Security and Compliance is a composite challenge, including six sub-challenges (see Table 3 above) in the context of COR. It is worth noting that this particular challenge focused on the cloud version of COR.

  • 5. Risky Contracts :

Managing risk is also a major issue, specifically in the context of COR, where multiple stakeholders from different cultures and zones are involved. Furthermore, large or complex IT contracts, which are nearly always incomplete, enhance the chance of risk in a variety of ways.

  • 6. Poor Human Resource Management (HRM) :

People and staff management becomes extremely difficult in the situation of COR, where multiple personnel from various cultural and zone variances are coordinated, particularly in a security-related system.

  • 7. IT Transitions Difficulties :

One reason for this failure is the complication of information system outsourcing transitions. In the case of COR, where several clients and vendors are involved, the transaction will undoubtedly grow more complicated.

  • 8. Poor Contract Management :

Contract management, also known as the hard side, is one of the biggest issues and is discussed in more detail in the literature. For pre-contract, the supplier’s standard type contracts should not be utilized, even as a starting point, for complex outsourcing arrangements involving large sums of money, because they are always structured in favor of the outsourced vendor [ 28 ].

  • 9. Different Cultural Issues :

Because of the increased level of uncertainty associated with the crossing of organisational, geographical and cultural boundaries, complex IS outsourcing strategies even become more complex [ 29 ].

  • 10. General Management Complexities :

With several development centres in different time zones, geographies, and cultures, managing the complex outsourcing relationships is intrinsically tough. Furthermore, management becomes much more difficult when IT is mostly outsourced to one or more IT services providers i.e. COR.

  • 11. Modern Technological Challenges :

Technology Challenges, Strategic Decision Challenges, Vendor Management Challenges, and Vendor Selection Challenges are the four key kinds of challenges often faced where more than one stackholders are involved [ 30 ].

Analysis of these challenges based on research methodology used

To analyze and well furnish the outcomes of the SLR, we further categorized the results of the identified challenges on 8 different commonly used research methodologies. The methodologies are Experimentation/Testing, Case Study/Case Studies, Empirical Survey, Interviews, Ordinary Literature Review (OLR), Systematic Literature Review (SLR), Others (i.e. Main Path Analysis and Content Analysis, Mixed Method (.i.e more than one method), as shown in ( Fig 2 ). During the analysis, we concluded that Experimentation/Testing methodology has been used more in the literature in this domain. Because in these studies, models or methods were used to check or test the challenges quantitavely, for example, measuring the cost or taking decisions. Similarly, the second mostly used methodologies are Case Study/Case Studies or Empirical Survey. Once again the reason behind this analysis was to collect empirically sound data in the real context of a case. The Mixed Methodology shows progressive results in this particular area and that’s why it is reported at number three position in the list etc.

thumbnail

https://doi.org/10.1371/journal.pone.0262710.g002

Analysis of these challenges based on publication period

Although, we did not put any date boundaries of data during the accomplishment of an SLR, but during the analysis, we pointed out a major contribution shift from a theoretical to practical implementation by the organizations in COR context. Therefore, based on this knowledge, we divided the publication era into two periods such as papers published before 2014 and papers published in 2014 and onwards, as shown in ( Fig 3 ). We can further conclude from the analysis of ( Fig 3 ) that COR is one of the most prominent research areas to date. Because sufficient number of studies are published in the second period (i.e., in 2014 and onwards).

thumbnail

https://doi.org/10.1371/journal.pone.0262710.g003

Analysis of these challenges based on publication venue

( Fig 4 ) gives an analysis based on publication channel. We divided the publication channels into three categories, such as papers published in Conference/Proceeding, Journal Papers, Technical Reports/Research Working Papers. From the analysis of ( Fig 4 ), it is clearly visible that the majority of papers were published in Journals. This analysis once again is an evidence that COR is always a strong research area in the literature.

thumbnail

https://doi.org/10.1371/journal.pone.0262710.g004

Practices for identified challenges

However, it was quite difficult to accurately account for the concerned practices for the stated challenges due to the cascading nature of data. Nonetheless, we organized them to the best of our efforts and identified 67 practices for the the aforementioned challenges. Moreover, due to the time and space constraints, we present these practices for the concerned challenges in tabular form, as depicted in Tables 4 to 14 below.

thumbnail

https://doi.org/10.1371/journal.pone.0262710.t014

Limitations and threats to validity

We did our best to conduct a systematic literature review as a study approach, including ensuring the pertinency of appropriate string selection and a sufficient sample size, but it is still conceivable that we have overlooked some crucial information. In order to reduce the danger of construct validity in terms of the usage of digital libraries, we narrowed our focus to pertinent and famous computing libraries, but again it was confined to the very few libraries. We have listed the publications in ( S1 Appendix ) for interested visitors to minimize the danger of the study’s internal validity. To prevent such dangers, each component of our SLR was confirmed via a rigorous approach and intermittent review processes by the participating researchers. The identification method has been used in the literature for similar investigations multiple times. It should be noted that the majority of the studies we gathered were from the COR database. However, only a few of them, or portions of them, do not properly identify the COR data, giving the context a hazy picture. Furthermore, only papers written in English were chosen.

The benefits of a complex IT outsourcing arrangement include enhanced cost certainty and lower expenses, increased scalability, and flexibility on demand. Complex outsourcing, on the other hand, demands interactions between many stakeholders from various areas and cultures, making it substantially more difficult to manage than regular outsourcing. Complex outsourcing is also more challenging than other forms of outsourcing since it needs a variety of control and coordination mechanisms for project management, which increases the chance of project failure accordingly. In this regard, a more systematic research is needed to uncover the important difficulties and techniques in this area in order to overcome project failure in complex outsourcing relationships. As a result, this study uses systematic literature review as a research method and serves as a pioneering effort to achieve the aforementioned goals. The authors highlighted 11 key issues after receiving the SLR data, with 67 practises in hand from a total of 85 publications. The authors want to build a comprehensive framework based on their findings in the future by using some strong approaches like as AHP and fuzzy logic, etc.

Supporting information

S1 appendix..

https://doi.org/10.1371/journal.pone.0262710.s001

S1 File. Authors’ biography.

https://doi.org/10.1371/journal.pone.0262710.s002

Acknowledgments

We are grateful to other members of the Software Engineering Research Group (SERG) for their valuable feedback and support during the research process.

  • View Article
  • Google Scholar
  • 23. EBSE Technical Report. Guidelines for performing Systematic Literature Reviews in Software Engineering. Software Engineering Group School of Computer Science and Mathematics Keele University Keele, Staffs ST5 5BG, UK and Department of Computer Science University of Durham Durham.2007. https://www.elsevier.com/__data/promis_misc/525444systematicreviewsguide.pdf .
  • 30. Sounderpandian J, Balakrishnan J, Cheng CH, Wong WC . 3(4): 428–450. https://doi.org/10.1504/IJPM.2010.035471

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List

Logo of plosone

Challenges and practices identification in complex outsourcing relationships: A systematic literature review

Ghulam Murtaza Khan

1 Department of Computer Science and IT, Software-Engineering-Research-Group (SERG-UOM), University of Malakand, Chakdara, Pakistan

2 Department of Computer Science, Shaheed Benazir Bhutto University, Sheringal, Dir(U), Pakistan

Siffat Ullah Khan

Habib ullah khan.

3 Department of Accounting and Information Systems, College of Business and Economics, Qatar University, Doha, Qatar

Muhammad Ilyas

Associated data.

All relevant data are within the paper.

Complex IT outsourcing relationships aptitude several benefits such as increased cost likelihood and lowered costs, higher scalability and flexibility upon demand. However, by virtue of its complexity, the complex outsourcing typically necessitates the interactions among various stakeholders from diverse regions and cultures, making it significantly more challenging to manage than traditional outsourcing. Furthermore, when compared to other types of outsourcing, complex outsourcing is extremely difficult because it necessitates a variety of control and coordination mechanisms for project management, which proportionally increases the risk of project failure. In order to overcome the failure of projects in complex outsourcing relationships, there is a need of robust systematic research to identify the key challenges and practices in this area. Therefore, this research implements systematic literature review as a research method and works as a pioneer attempt to accomplish the aforementioned objectives. Upon furnishing the SLR results, the authors identified 11 major challenges with 67 practices in hand from a total of 85 papers. Based on these findings, the authors intend to construct a comprehensive framework in the future by incorporating robust methodologies such as AHP and fuzzy logic, among others.

Introduction

Outsourcing is the transfer of the continuous management responsibility of a client party or service user to a third party, referred to as a vendor or provider, to perform an IT service under a contract of service level agreement [ 1 ]. Outsourcing has since become a well-established academic subject because of its rapidly developing practice. Outsourcing determinations, outsourcing methods, challenges identified in outsourcing etc. are some of the hot topics in the literature [ 2 ].

Some of the advantages of outsourcing include ensuring maximum profit, lower costs, increased productivity, flexibility in meeting service needs, higher quality, redirecting company resources to core activities, more customer satisfaction, continuity and risk management, faster time to market, access to skilled resources, flexibility to focus on key areas, and faster and better services [ 3 , 4 ].

Proponents of IT outsourcing have underlined the importance of managing outsourced relationships. "A long-term commitment, shared risk and benefits, a sense of reciprocal cooperation, and other features congruent with concepts and theories of participatory decision making" is what a relationship is characterised as. While IT outsourcing interactions have gotten some attention in the literature, just a few academics have looked at the client-supplier IT outsourcing relationship [ 5 ].

Collaboration across corporate boundaries is a necessary component of today’s company. This type of client-vendor relationship frequently goes beyond the typical contractual restrictions agreed upon at the start of collaboration. The risks and advantages of joint labours, as well as investments and work load, are evenly distributed among the collaborative partners. Inter- and intra-organizational collaboration helps businesses gain a competitive advantage. Bidirectional trust, reciprocal dependency, and a win-win mindset between partners are the foundations of long-term working relationships. Collaboration is typically developed by businesses to reduce the costs of collecting the necessary information/understanding, capabilities, and competencies for well-organized professional operations [ 6 ].

All IT outsourcing contracts include components of collaboration, virtual cooperation, and the demands of increasingly sophisticated systems. But one of the most essential variables in deciding the success or failure of virtual collaboration is trust. Good relationships are tactical assets that necessitate the ongoing management effort and focus [ 7 ].

An outsourcing project’s success or failure is determined by a number of elements, including project size, duration, and, most importantly, contract design and management among different stakeholders. Therefore, additional research is required to understand how various parts of outsourcing interact and what the further consequences of the dynamics of these factors are on various organizational outcomes [ 8 ].

Outsourcing has progressed through several stages of client-vendor relationships. Such phases of the relationship are briefly illustrated via the framework in [ 9 ] as

1. Dyadic outsourcing relationship

A client in a dyadic relationship relies on only one vendor to meet all of their demands, which might range from simple to complex. The majority of research in the literature considers such relationship as one-to-one, implying that one client seeks services independently of others, and suppliers do the same.

2. Multi-vendor relationship

In a one-to-many relationship, a client seeks out more than one vendor to supply their services in order to meet the client’s needs or achieve its goals, and information regarding the division of labor is shared and discussed with all parties to the agreement.

3. Co-sourcing relationship

A many-to-one or co-sourcing relationship is described as a collaboration between multiple clients for the delivery of a service through a single vendor contract.

4. Complex outsourcing relationship

The phrase complex relationship or complex outsourcing relationship (COR), which is the subject of this study, refers to a relationship between several clients and multiple vendors (i.e., many-to-many), in which multiple clients rely on multiple vendors to meet their needs under the same contract.

Multiple vendor organizations may work for multiple client organizations through the same contractual agreement or connection in a "complex outsourcing relationship (COR). It is worth noting that this study’s focus is on such a phase or relationship, which is exceptionally difficult to manage owing to the complexity of the situation and the various types of stakeholders involved. The aforementioned phases and types of outsourcing relationships are shown in ( Fig 1 ).

An external file that holds a picture, illustration, etc.
Object name is pone.0262710.g001.jpg

Good relationships and carefully drafted contracts have a significant impact on outsourcing. However, there is a lack of comprehensive guidance in this area, specifically in the context of complex outsourcing relationships, due to the dearth of studies described in the literature [ 10 ]. Outsourcing has become more complex and diversified as a result of the expansion of numerous actors connected via a contract, such as a client and one or more vendors, each with their own unique qualities [ 11 ]. Furthermore, because of its complexity, complex outsourcing typically necessitates interactions among various stakeholders from diverse regions and cultures, making it significantly more challenging to manage than traditional outsourcing. Moreover, complex outsourcing when compared to other types of outsourcing is extremely difficult because it necessitates a variety of control and coordination mechanisms for project management, which proportionally increases the risk of project failure [ 12 ].

Therefore, in light of these points, this study aims to identify the challenges and practices in the context of complex outsourcing relationships.

Based on this hypothesis, the authors of this study formulated the following research question:

  • RQ. 1: What are the key challenges, as identified in the literature, faced by multiple stakeholders (clients and vendors) in the context of complex outsourcing relationships?
  • RQ. 2: What are the practices/solutions, as identified in the literature, faced by multiple stakeholders (clients and vendors) in the context of complex outsourcing relationships?

The remainder of this paper is structured as follows. Background information is provided in Section II. Section III provides a detailed description of the research methodology. The conclusions of this investigation are presented in section IV. The study’s shortcomings are discussed in Section V, and conclusions and future work are discussed in Section VI. The remaining sections provide further information.

In support of a thorough software, the author proposed [ 13 ] a robust architecture for security and compliance challenges. Furthermore, by establishing software requirements based on a study of work patterns of service providers acting in complex IT outsourcing agreements and proposing a software architecture that meets these requirements, this study contributes to filling the gap in software support.

In COR setups, there are a number of solutions [ 12 ] that focus on IT infrastructure compliance, but they are typically ineffective and inefficient and do not work well in general. I am not aware of any solutions that support all of the services we use, necessitating the use of multiple solutions.

Complex IS outsourcing initiatives have distinct tasks and stakeholder connections compared to standard IS outsourcing projects [ 14 ].

Because of the growing worldwide distribution of IT services, which involves complex interorganizational connections and the dispersion of decision rights and responsibilities across numerous organizations, a thorough understanding of governance procedures is required [ 15 ].

The authors build and offer a theoretical framework for explaining various types of outsourcing partnerships, as well as an analysis of why client organizations seeking IT services might choose more collaborative or complicated outsourcing arrangements than dyadic interactions. Moreover, the authors believe that the COR relationships in the future will be more in use [ 9 ].

The authors suggested a methodology and decision-making approach [ 16 ] for examining incentive schemes and creating outsourcing contracts that benefit both the outsourcer and vendor in COR.

Complex outsourcing contracts [ 17 ] are difficult to manage and of themselves, but when time zone differences, language barriers, significant distance, rare face-to-face meetings, and diversity–all of which are common offshore deal companions–the task becomes exponentially more difficult.

Organizations that deal with complex outsourcing arrangements on a regular basis have intelligently implemented the lifecycle model explained in this article [ 18 ].

Many companies struggle to properly manage one or more complex outsourcing agreements, generate value, and mitigate risk [ 19 ].

This research [ 20 ] examines the significance of trust in complex contracts and relationships frameworks that underpin global outsourcing, as well as the difficult conflict-resolution procedures that can be employed to restore trust.

In [ 21 ], the authors want to see what an Indian supplier considers to be significant in order to manage some big and complex outsourcing partnerships, and specifically, how reciprocally profitable and long-term partnerships are developed and maintained with European customers.

By offering a descriptive framework incorporating essential governance variables, this article [ 22 ] seeks to deliver a good understanding for managing complex-type IT-outsourcing agreements. The findings of the analysis, as well as the framework itself, demonstrate the numerous complex difficulties that arise when managing sophisticated IT outsourcing partnerships.

Research methodology

We conducted a systematic literature review to collect relevant data from the literature, which is a more complete and rigorous method than the traditional literature review (OLR). The SLR was carried out in three stages: planning, execution, and reporting.

Search strategy

To conduct an SLR, we tracked Kitchenham’s guidelines [ 23 ] and Mendes et al. [ 24 ]. In addition, depending on the study objectives, we used the population, intervention, comparison, and outcomes (PICO) criteria to select keywords and build search strings.

Population: Clients and Vendors in Complex Outsourcing Relationships

Intervention: Challenges, Practices

Comparison: For the sake of this investigation, no comparisons are made.

Relevance Outcomes: To Assist Clients and Vendors in Complex Outsourcing Relationships

Furthermore, to build the search strings, we employed Boolean connectors AND and OR to connect the features of PICO.

Search strings

To avoid a search break by different database constraints, we developed three different strings.

String 1: ((“Complex outsourcing” OR “Complex software outsourcing” OR “Complex Information Systems outsourcing” OR “complex IT outsourcing” OR “complex outsourcing relationship”) AND (Challenges OR issues OR barriers OR risks OR Practices OR solutions).

String 2: ((“Complex outsourcing relationship” OR “Complex software outsourcing relationship” OR “Complex Information Systems outsourcing relationship” OR “complex IT outsourcing relationship” OR “Complex outsourcing”) AND

(Challenges OR barriers OR issues OR risks OR Practices OR solutions) AND

(“Relationship management in complex outsourcing” OR “Co-ordination in complex outsourcing” OR “Communication in complex outsourcing” OR “Contract management in complex outsourcing” OR “Task allocation in complex outsourcing” OR “Trust building in Complex outsourcing”))

String 3: (("Complex software outsourcing" OR "Complex IS/IT outsourcing" OR "complex outsourcing") AND ("Challenges" OR "issues" OR "barriers" OR "risks" OR "Practices" OR "solutions" solutions))

Literature resources

Using our search strings, we applied our search for famous libraries, such as IEEE Xplore, Google Scholar, ACM, Wiley Online Library, SpringerLink, and ScienceDirect. We also used the snowballing method to further support our research questions and not to miss any important data. It is worth noting that we started the search on 21 th February, 2021, and systematically completed it on 8 th April, 2021.

Criteria for study selection

The strings and authors’ recommendations were backed up by the researchers. Initially, we added a string to the library for metadata. The same procedure was followed to avoid interference with the title, abstract, or keyword restrictions. Each paper was properly documented by the first author, who kept a complete record. Based on this phase, other authors assessed the papers and assigned pertinent information for each paper, as well as its title and abstract.

We established the following inclusion and exclusion criteria based on the aforementioned principles for SLR.

Inclusion criteria

Such criteria specify which portions of the literature will be considered for inclusion in the selection. Based on such criteria, we have only analyzed items that are relevant to complex outsourcing. The inclusion criteria were as follows:

  • Articles in full text of the English language.
  • Sources only relevant to COR.
  • Studies that describe the COR challenges.
  • Studies that describe the COR practices.
  • Studies published in journals and conferences.
  • White papers and standardized reports from trustworthy organizations.

Exclusion criteria

Such criteria specify which pieces of literature are not included for consideration. The exclusion criteria were as follows:

  • Studies, not relevant to our research questions.
  • Studies of other than English language.
  • Incomplete Studies.
  • Duplicate studies
  • Thesis or magazine and/or web articles.

The search outcomes are presented in Table 1 . We retrieved 281 publications from a total of 1372 using the inclusion criteria. Using the exclusion criteria, we narrowed it to 85 papers. During data extraction, the principal author finished each step, which was then examined by other authors.

The primary goal of quality assessment was to identify and eliminate lower-quality studies and to determine the validity of a study’s conclusions.

Criteria for quality assessment

We created the assessment criteria using the guidelines and updates for the SLR from previous studies. In this way, we formulated the questions given in Table 2 prior to the implementation of such criteria. Furthermore, we employed a three-tiered scale to rate each question in the reviewed papers. Yes, no, or partial. We assigned values of 1 to Yes, 0.5, partly, and 0 to No in order to produce quantitative results.

Furthermore, the work had to be graded on an average of 0.5. The principal author was in charge of applying the assessment parameter for quality to the studies, whereas the remaining authors were responsible for confirming the same assessments on a minority group of previously nominated studies. A few papers were omitted from the study using the same mechanism. However, as seen in Table 1 , after going through the entire process, the final number of studies was 85. Any discrepancies were resolved through additional discussion. Any discrepancies were resolved through additional discussion.

Data extraction

Counting the challenges and their practices is a difficult task because the majority of the challenges and practices from such areas are cascading in nature. Nonetheless, we discovered 11 primary challenges with 67 practices from a total of 85 papers. The identified challenges and their practices are presented in the next section via Tables ​ Tables3 3 – 13 , respectively. Furthermore, the papers extracted via the SLR are presented in ( S1 Appendix ) with the respective IDs and Title.

Results and discussion

The goal of this research is to uncover the key issues and practices experienced by multiple stakeholders (such as clients and vendors) when dealing with COR.

The following are the challenges that we have identified and analyzed after thorough conduction of the SLR in such areas.

Challenges in COR

Table 3 presents the 11 key challenges with the given frequencies as follows:

  • 1. Control and Coordination Challenges :

‘Control and Coordination’ are one amongst the major challenge in COR. Control refers to a company’s capability to command or manage scattered events so that they meet the company’s goals. The ability of a company to coordinate these disparate activities is referred to as coordination [ 25 ].

  • 2. Decision Problems :

Information system outsourcing decisions [ 26 ] are difficult to make because they entail a number of elements, including (a) establishing and managing a long-term partnership with an independent agent, and (b) revealing the critical organizational assets for controlling outside agents. When the same matter is evaluated from the perspective of COR, it becomes more challenging.

  • 3. High Cost :

The overall cost [ 27 ], for example, the hidden cost, estimated cost, control cost, coordination cost, etc., for outsourcing is high in the case of COR.

  • 4. Security and Compliance Challenges :

Security and Compliance is a composite challenge, including six sub-challenges (see Table 3 above) in the context of COR. It is worth noting that this particular challenge focused on the cloud version of COR.

  • 5. Risky Contracts :

Managing risk is also a major issue, specifically in the context of COR, where multiple stakeholders from different cultures and zones are involved. Furthermore, large or complex IT contracts, which are nearly always incomplete, enhance the chance of risk in a variety of ways.

  • 6. Poor Human Resource Management (HRM) :

People and staff management becomes extremely difficult in the situation of COR, where multiple personnel from various cultural and zone variances are coordinated, particularly in a security-related system.

  • 7. IT Transitions Difficulties :

One reason for this failure is the complication of information system outsourcing transitions. In the case of COR, where several clients and vendors are involved, the transaction will undoubtedly grow more complicated.

  • 8. Poor Contract Management :

Contract management, also known as the hard side, is one of the biggest issues and is discussed in more detail in the literature. For pre-contract, the supplier’s standard type contracts should not be utilized, even as a starting point, for complex outsourcing arrangements involving large sums of money, because they are always structured in favor of the outsourced vendor [ 28 ].

  • 9. Different Cultural Issues :

Because of the increased level of uncertainty associated with the crossing of organisational, geographical and cultural boundaries, complex IS outsourcing strategies even become more complex [ 29 ].

  • 10. General Management Complexities :

With several development centres in different time zones, geographies, and cultures, managing the complex outsourcing relationships is intrinsically tough. Furthermore, management becomes much more difficult when IT is mostly outsourced to one or more IT services providers i.e. COR.

  • 11. Modern Technological Challenges :

Technology Challenges, Strategic Decision Challenges, Vendor Management Challenges, and Vendor Selection Challenges are the four key kinds of challenges often faced where more than one stackholders are involved [ 30 ].

Analysis of these challenges based on research methodology used

To analyze and well furnish the outcomes of the SLR, we further categorized the results of the identified challenges on 8 different commonly used research methodologies. The methodologies are Experimentation/Testing, Case Study/Case Studies, Empirical Survey, Interviews, Ordinary Literature Review (OLR), Systematic Literature Review (SLR), Others (i.e. Main Path Analysis and Content Analysis, Mixed Method (.i.e more than one method), as shown in ( Fig 2 ). During the analysis, we concluded that Experimentation/Testing methodology has been used more in the literature in this domain. Because in these studies, models or methods were used to check or test the challenges quantitavely, for example, measuring the cost or taking decisions. Similarly, the second mostly used methodologies are Case Study/Case Studies or Empirical Survey. Once again the reason behind this analysis was to collect empirically sound data in the real context of a case. The Mixed Methodology shows progressive results in this particular area and that’s why it is reported at number three position in the list etc.

An external file that holds a picture, illustration, etc.
Object name is pone.0262710.g002.jpg

Analysis of these challenges based on publication period

Although, we did not put any date boundaries of data during the accomplishment of an SLR, but during the analysis, we pointed out a major contribution shift from a theoretical to practical implementation by the organizations in COR context. Therefore, based on this knowledge, we divided the publication era into two periods such as papers published before 2014 and papers published in 2014 and onwards, as shown in ( Fig 3 ). We can further conclude from the analysis of ( Fig 3 ) that COR is one of the most prominent research areas to date. Because sufficient number of studies are published in the second period (i.e., in 2014 and onwards).

An external file that holds a picture, illustration, etc.
Object name is pone.0262710.g003.jpg

Analysis of these challenges based on publication venue

( Fig 4 ) gives an analysis based on publication channel. We divided the publication channels into three categories, such as papers published in Conference/Proceeding, Journal Papers, Technical Reports/Research Working Papers. From the analysis of ( Fig 4 ), it is clearly visible that the majority of papers were published in Journals. This analysis once again is an evidence that COR is always a strong research area in the literature.

An external file that holds a picture, illustration, etc.
Object name is pone.0262710.g004.jpg

Practices for identified challenges

However, it was quite difficult to accurately account for the concerned practices for the stated challenges due to the cascading nature of data. Nonetheless, we organized them to the best of our efforts and identified 67 practices for the the aforementioned challenges. Moreover, due to the time and space constraints, we present these practices for the concerned challenges in tabular form, as depicted in Tables ​ Tables4 4 to ​ to14 14 below.

Limitations and threats to validity

We did our best to conduct a systematic literature review as a study approach, including ensuring the pertinency of appropriate string selection and a sufficient sample size, but it is still conceivable that we have overlooked some crucial information. In order to reduce the danger of construct validity in terms of the usage of digital libraries, we narrowed our focus to pertinent and famous computing libraries, but again it was confined to the very few libraries. We have listed the publications in ( S1 Appendix ) for interested visitors to minimize the danger of the study’s internal validity. To prevent such dangers, each component of our SLR was confirmed via a rigorous approach and intermittent review processes by the participating researchers. The identification method has been used in the literature for similar investigations multiple times. It should be noted that the majority of the studies we gathered were from the COR database. However, only a few of them, or portions of them, do not properly identify the COR data, giving the context a hazy picture. Furthermore, only papers written in English were chosen.

The benefits of a complex IT outsourcing arrangement include enhanced cost certainty and lower expenses, increased scalability, and flexibility on demand. Complex outsourcing, on the other hand, demands interactions between many stakeholders from various areas and cultures, making it substantially more difficult to manage than regular outsourcing. Complex outsourcing is also more challenging than other forms of outsourcing since it needs a variety of control and coordination mechanisms for project management, which increases the chance of project failure accordingly. In this regard, a more systematic research is needed to uncover the important difficulties and techniques in this area in order to overcome project failure in complex outsourcing relationships. As a result, this study uses systematic literature review as a research method and serves as a pioneering effort to achieve the aforementioned goals. The authors highlighted 11 key issues after receiving the SLR data, with 67 practises in hand from a total of 85 publications. The authors want to build a comprehensive framework based on their findings in the future by using some strong approaches like as AHP and fuzzy logic, etc.

Supporting information

S1 appendix, acknowledgments.

We are grateful to other members of the Software Engineering Research Group (SERG) for their valuable feedback and support during the research process.

Funding Statement

This publication was supported by Qatar National Library, Doha, Qatar and Qatar University Internal Grant No. IRCC- 2021-010. The findings achieved herein are solely the responsibility of the authors.

Data Availability

  • PLoS One. 2022; 17(1): e0262710.

Decision Letter 0

15 Nov 2021

PONE-D-21-28732Challenges And Practices Identification In Complex Outsourcing Relationship: A Systematic Literature ReviewPLOS ONE

Dear Dr. Khan,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Dec 30 2021 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at  gro.solp@enosolp . When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.
  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.
  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols . Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols .

We look forward to receiving your revised manuscript.

Kind regards,

Anandakumar Haldorai, PhD

Academic Editor

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Please amend your Methods section to include the date range for the search. Please also state the latest date on which the search was performed.

3. We note that the grant information you provided in the ‘Funding Information’ and ‘Financial Disclosure’ sections do not match. 

When you resubmit, please ensure that you provide the correct grant numbers for the awards you received for your study in the ‘Funding Information’ section.

4. Please note that in order to use the direct billing option the corresponding author must be affiliated with the chosen institute. Please either amend your manuscript to change the affiliation or corresponding author, or email us at gro.solp@enosolp with a request to remove this option.

5. Please update your submission to use the PLOS LaTeX template. The template and more information on our requirements for LaTeX submissions can be found at http://journals.plos.org/plosone/s/latex .

6. Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice.

Additional Editor Comments:

Please carefully address the issues raised in the comments and, up front in your revised paper. Your revised paper will be sent to the same reviewers, as well as possibly new reviewers, for evaluation.

Make sure the Abstract briefly describes the paper as it is used in abstracting and citation services. Keep the Abstract between 200 words. Do not use any references in the Abstract.

Spell out each acronym the first time used in the body of the paper. Spell out acronyms in the Abstract only if used there.

Include a list of six to ten key words after the Abstract.

You may ignore any suggestion of including self-references by reviewers if not applicable.

Include a paragraph at the end of the Introduction describing the organization of the paper.

Make sure that the Conclusion briefly summarizes the results of the paper it should not repeat phrases from the Introduction. Keep the Conclusion to about 300 words. Do not use any references or acronyms in the Conclusion.

Make sure all figures and tables are referred to in the body of the paper.

It is recommended to use a professional native English-speaking editor. Papers with less than excellent English will not be published even if technically perfect.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #2: Yes

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: No

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: The structure of the paper is good, however, it needs the following modifications to be published in the journal.

1. Abstract need to be revised to specify the demand for the review.

2. In introduction part, authors should provide more priority about outsourcing relationship.

3. The methodology of the proposed review is complex and readers find problems in understanding the procedure.

4. There is a need for more research papers that present more detailed information about outsourcing relationships and its advantages.

5. Finally, the conclusion part need a rigorous revision.

Reviewer #2: It’s a great work and great sense of methodology and great analyzing and I wish to see more relate study and more upgrades with the same concept of research in the future and keep it up and good work

6. PLOS authors have the option to publish the peer review history of their article ( what does this mean? ). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy .

Reviewer #2:  Yes:  Haitham Medhat Abdelaziz Elsayed Aboulilah

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool,  https://pacev2.apexcovantage.com/ . PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at  gro.solp@serugif . Please note that Supporting Information files do not need this step.

Author response to Decision Letter 0

21 Dec 2021

Rebuttal Letter

Original Manuscript ID: PONE-D-21-28732

Original Article Title: “Challenges And Practices Identification In Complex Outsourcing Relationship: A Systematic Literature Review”

To: PLOS ONE

Re: Response to reviewers

Dear Editor,

Thank you for allowing a resubmission of our manuscript, with an opportunity to address the reviewers’ comments.

We are uploading

(1) Our point-to-point response to the comments below (response to reviewer(s) and academic editor, respectively)

(2) A marked-up coy with track changes (Revised Manuscript with Track Changes)

(3) An unmarked version without track changes (Manuscript)

Best regards,

<author name> et al.

Reviewer#1, Concern # 1:

Reviewer’s comment: Abstract need to be revised to specify the demand for the review

Authors’ response: Many thanks for your kind suggestion. We have revised the abstract by adding such specific demand.________________________________________

Reviewer#1, Concern # 2:

Reviewer’s comment: In introduction part, authors should provide more priority about outsourcing relationship.

Authors’ response: We have added few more papers having specific focus on outsourcing relationships in the introduction section of the manuscript.________________________________________

Reviewer#1, Concern # 3:

Reviewer’s comment: The methodology of the proposed review is complex and readers find problems in understanding the procedure.

Authors’ response: We have performed systematic literature review (SLR) as a research methodology. We have followed the SLR guidelines from [25, 26], respectively. SLR is widely used research methodology in software engineering and we have used this method in our previous work having Doi as follows: 10.1109/ACCESS.2021.3085707, 10.1016/ j.infsof.2010.08.003 , and 10.1109/ICGSE.2009.28 etc. ________________________________________

Reviewer#1, Concern # 4:

Reviewer’s comment: There is a need for more research papers that present more detailed information about outsourcing relationships and its advantages.

Authors’ response: Our search is based on our pre-defined search string that was constructed during the planning phase of the SLR, i.e., SLR protocol. During the implementation phase of the SLR protocol, the search phase was completed in April, 2021. Now, according to this concern, we have added some more latest papers, through snowballing technique, relevant to outsourcing relationships.

________________________________________

Reviewer#1, Concern # 5:

Reviewer’s comment: Finally, the conclusion part need a rigorous revision.

Authors’ response: We have revised the whole manuscript specifically the conclusion section. ________________________________________

NOTE: We have further addressed the Journal Requirements as follows:

Concern # 1:

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and

Authors’ response: We have followed the PLOS ONE’S style and format in the revised manuscript.

Concern # 2:

Authors’ response: We have amended the Methods section, accordingly. Please see the change tracked at page 8 under the Literature Resources section of Research Methodology. During the implementation phase of the SLR protocol, the search phase was completed in April, 2021.

Concern # 3:

3. We note that the grant information you provided in the ‘Funding Information’ and ‘Financial Disclosure’ sections do not match.

Authors’ response: No fund has been issued to us by any organization/agency. It is solely accomplished by the authors. However, the publication charges are sponsored by the Qatar university.

Concern # 4:

Authors’ response: ?

Concern # 5:

Authors’ response: We have updated the manuscript according to the PLOS LaTeX template, by following the given link.

Concern # 6:

Authors’ response: We have reviewed the references list and revised it properly, and ensured its correctness and completeness. We have added the references of additional papers which we have included now, as according to reviewers’ suggestions. Furthermore, we have removed/retracted the references of excluded papers, because these references have been removed during merging and updating the table data for further improvements.

Concerns #:

- Please carefully address the issues raised in the comments and, up front in your revised paper. Your revised paper will be sent to the same reviewers, as well as possibly new reviewers, for evaluation.

- Make sure the Abstract briefly describes the paper as it is used in abstracting and citation services. Keep the Abstract between 200 words. Do not use any references in the Abstract.

- Spell out each acronym the first time used in the body of the paper. Spell out acronyms in the Abstract only if used there.

- Include a list of six to ten key words after the Abstract.

- You may ignore any suggestion of including self-references by reviewers if not applicable.

- Include a paragraph at the end of the Introduction describing the organization of the paper.

- Make sure that the Conclusion briefly summarizes the results of the paper it should not repeat phrases from the Introduction. Keep the Conclusion to about 300 words.

- Do not use any references or acronyms in the Conclusion.

- Make sure all figures and tables are referred to in the body of the paper.

- It is recommended to use a professional native English-speaking editor. Papers with less than excellent English will not be published even if technically perfect.

Authors’ response: We have addressed all the mentioned comments/concerns, accordingly.

NOTE: It is worth noting that we have revised or renamed few challenges, and similarly, merged together some of the previously identified practices for improvements. In this way, we finally collected 67 practices for 11 identified challenges.

Submitted filename: Response to Reviewers.docx

Decision Letter 1

Challenges And Practices Identification In Complex Outsourcing Relationship: A Systematic Literature Review

PONE-D-21-28732R1

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/ , click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at gro.solp@gnillibrohtua .

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact gro.solp@sserpeno .

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #2: All comments have been addressed

2. Is the manuscript technically sound, and do the data support the conclusions?

3. Has the statistical analysis been performed appropriately and rigorously?

4. Have the authors made all data underlying the findings in their manuscript fully available?

5. Is the manuscript presented in an intelligible fashion and written in standard English?

6. Review Comments to the Author

Reviewer #1: The paper is acceptable in its current form. No need to modify. The author had addressed the comments

Reviewer #2: It’s nice research paper and really good analysis with a perfect methodology and based on good theoretical and looking forward to see more papers can doing with same content and research base as same as the current one cause really it’s open for opportunity to creat a new one , wish you all the best

7. PLOS authors have the option to publish the peer review history of their article ( what does this mean? ). If published, this will include your full peer review and any attached files.

Acceptance letter

17 Jan 2022

Dear Dr. Khan:

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department.

If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact gro.solp@sserpeno .

If we can help with anything else, please email us at gro.solp@enosolp .

Thank you for submitting your work to PLOS ONE and supporting open access.

PLOS ONE Editorial Office Staff

on behalf of

Dr. Anandakumar Haldorai

Acteon

We are Acteon

We create opportunities for businesses & people.

“ACTEON – Human Energy” is a Moscow based Boutique Recruitment Operation focused on Russia and the CIS. Acteon excels in providing complete  recruitment, staffing, EOR, payroll and outsourcing solutions  to global and local blue chip companies seeking to drive growth across these strategic regions.

Retail and Luxury

Agatha Paris, Dior, Gucci, Pianegonda, Longchamp, Bulgari, LPI, Etam, Tag Heuer

Auchan, Decathlon, Maped, Loreal

Health-Care

Doctor Reddy’s, Sanofi Aventis, Agfa Health Care

Oil & Gas, Mining

Exterran, Ferrexpo, MOL, Serimax

Amdocs, Aveva, Celltick, Defi, Hearst, Mail.ru, Vistagy, Riot Games, Roblox, Bigswitch, Twitch, Rucqus, Comverse

Construction

Algeco, Bouygues Construction, DTP Terrassement, Freyssinet, Vinci, Wirquin, Valode et Pistre, Entrepose

 Faurecia, Federal Mogul, Norauto, MAN, Pirelli, Sogefi, PPG

Engineering

3S Photovoltaic, Alstom, Avery Dennison, Diosna, EDF, Legrand, Rademaker, Safran, VMI

 Accor, Les Houches, Swissôtel, Papa john’s, Booking.com

Agro-industry

Gaming & it.

 Vistagy, Riot Games, Roblox, Bigswitch, Twitch, Rucqus, Comverse

Connecting People for over 23 Years

Matches made, where we come from.

Recruitment international standards are brought to CIS countries emmerging markets

Contractors

Launch Contractors operations in the Energy sector in Russia

Cross-border

Development of cross-border outsourcing, payrolling and HR services

Merging and rebranding recruitment, outsourcing and other HR operations to Acteon

Flying Team

Launching new concept of «Flying Team» pool of Travel Retail Sales Consultants

Ongoing…

Pioneering recruitment operations start in Russia, Ukraine & CIS

Richard has been working in Russia and CIS since 1996. He pioneered Recruiting Industry in the region, using the best Western Business Standards. In 2008, he founded Acteon, a Boutique Recruitment Operation.

Richard Gaulier

Richard Gaulier

Founder - Senior Consultant

Anna Kozharskaya

Anna Kozharskaya

literature review outsourcing services

Irina Kutsenko

Coordinator

Viktoria Leonova

Viktoria Leonova

Vadim Pakhotinskikh

Vadim Pakhotinskikh

Operations Manager

literature review outsourcing services

Export Manager – Electronics Manufacturing / Indian market

Engineering , Position currently active

Chief Accountant in a Fashion Retail Company

Audit, Accounting, Taxes , Position currently active , Retail

Contract Manager

Legal , Position currently active , Retail

Finance Manager in a Premium Fashion Retail Company

Finance Manager in a Premium Fashion Retail Company

Position currently active , Retail

Retail Sales Consultants in Dubai

Retail Sales Consultants in Dubai

Luxury , Position currently active , Retail

literature review outsourcing services

site logo

Top Outsourcing companies In Moscow City

Outsourcing companies in Moscow City are businesses that specialize in providing various services to other companies, organizations, and individuals. These services can range from administrative duties such as payroll, accounting, and human resources, to more technical services such as IT support, software development, and digital marketing. Outsourcing companies in Moscow City are known for their expertise, professionalism, and cost-effectiveness, which make them a popular option for businesses looking to delegate certain tasks and responsibilities. These companies employ a team of experts who are highly skilled and trained to deliver quality services within the specified time frame. Outsourcing companies in Moscow City provide a wide range of services that enable businesses to focus on their core competencies while outsourcing non-core activities to professionals.

Below are the 48 Top Outsourcing companies In Moscow City and their top employee and management contact details:

Rubrain.Com

Osg records management, asap consulting, edison software development centre, innovative people, digital architecture & engineering, shindler computers, relcom group, ucms group emea ltd, bellerage alinga, corpus group, global consulting group, unistaff payroll company.

Similar Lists for Moscow, Moscow City, Rus

Top Call Center Companies In Moscow City

Top Art Companies In Moscow City

Top Food And Beverage Companies In Moscow City

Top Location Based Services Companies In Moscow City

Top Mobile Companies In Moscow City

Top Robotics Companies In Moscow City

Top Consumer Services Companies In Moscow City

Top Legal Services Companies In Moscow City

Top Cyber Security Companies In Moscow City

Top Social Media Companies In Moscow City

Top Capital Markets Companies In Moscow City

Top Web Development Companies In Moscow City

Top Web Hosting Companies In Moscow City

Top Industrial Manufacturing Companies In Moscow City

Top Education Companies In Moscow City

Top Augmented Reality Companies In Moscow City

Top Content Companies In Moscow City

Top Venture Capital Companies In Moscow City

Top Law Practice Companies In Moscow City

Top Restaurants Companies In Moscow City

Similar Lists for Outsourcing

Top Outsourcing Companies In Ontario

Top Outsourcing Offshoring Companies In Georgia

Top Outsourcing Offshoring Companies In Uruguay

Top Outsourcing Companies In Jakarta Raya

Top Outsourcing Companies In Plano

Top Outsourcing Companies In Pune

Top Outsourcing Offshoring Companies In Bosnia And Herzegovina

Top Outsourcing Companies In Niedersachsen

Top Outsourcing Companies In Indore

Top Outsourcing Companies In Porto Alegre

Top Outsourcing Offshoring Companies In Andalusia

Top Outsourcing Companies In Argentina

Top Outsourcing Companies In Tel Aviv

Top Outsourcing Companies In Moscow City

Top Outsourcing Companies In Beijing

Top Outsourcing Offshoring Companies In Utrecht

Top Outsourcing Offshoring Companies In Saudi Arabia

Top Outsourcing Offshoring Companies In Connecticut

Top Outsourcing Companies In Gujarat

Top Outsourcing Companies In Hamburg

Have a look at Aeroleads data

AeroLeads logo

Extensions & Add Ons

  • Open access
  • Published: 24 April 2024

Breast cancer screening motivation and behaviours of women aged over 75 years: a scoping review

  • Virginia Dickson-Swift 1 ,
  • Joanne Adams 1 ,
  • Evelien Spelten 1 ,
  • Irene Blackberry 2 ,
  • Carlene Wilson 3 , 4 , 5 &
  • Eva Yuen 3 , 6 , 7 , 8  

BMC Women's Health volume  24 , Article number:  256 ( 2024 ) Cite this article

100 Accesses

Metrics details

This scoping review aimed to identify and present the evidence describing key motivations for breast cancer screening among women aged ≥ 75 years. Few of the internationally available guidelines recommend continued biennial screening for this age group. Some suggest ongoing screening is unnecessary or should be determined on individual health status and life expectancy. Recent research has shown that despite recommendations regarding screening, older women continue to hold positive attitudes to breast screening and participate when the opportunity is available.

All original research articles that address motivation, intention and/or participation in screening for breast cancer among women aged ≥ 75 years were considered for inclusion. These included articles reporting on women who use public and private breast cancer screening services and those who do not use screening services (i.e., non-screeners).

The Joanna Briggs Institute (JBI) methodology for scoping reviews was used to guide this review. A comprehensive search strategy was developed with the assistance of a specialist librarian to access selected databases including: the Cumulative Index to Nursing and Allied Health Literature (CINAHL), Medline, Web of Science and PsychInfo. The review was restricted to original research studies published since 2009, available in English and focusing on high-income countries (as defined by the World Bank). Title and abstract screening, followed by an assessment of full-text studies against the inclusion criteria was completed by at least two reviewers. Data relating to key motivations, screening intention and behaviour were extracted, and a thematic analysis of study findings undertaken.

A total of fourteen (14) studies were included in the review. Thematic analysis resulted in identification of three themes from included studies highlighting that decisions about screening were influenced by: knowledge of the benefits and harms of screening and their relationship to age; underlying attitudes to the importance of cancer screening in women's lives; and use of decision aids to improve knowledge and guide decision-making.

The results of this review provide a comprehensive overview of current knowledge regarding the motivations and screening behaviour of older women about breast cancer screening which may inform policy development.

Peer Review reports

Introduction

Breast cancer is now the most commonly diagnosed cancer in the world overtaking lung cancer in 2021 [ 1 ]. Across the globe, breast cancer contributed to 25.8% of the total number of new cases of cancer diagnosed in 2020 [ 2 ] and accounts for a high disease burden for women [ 3 ]. Screening for breast cancer is an effective means of detecting early-stage cancer and has been shown to significantly improve survival rates [ 4 ]. A recent systematic review of international screening guidelines found that most countries recommend that women have biennial mammograms between the ages of 40–70 years [ 5 ] with some recommending that there should be no upper age limit [ 6 , 7 , 8 , 9 , 10 , 11 , 12 ] and others suggesting that benefits of continued screening for women over 75 are not clear [ 13 , 14 , 15 ].

Some guidelines suggest that the decision to end screening should be determined based on the individual health status of the woman, their life expectancy and current health issues [ 5 , 16 , 17 ]. This is because the benefits of mammography screening may be limited after 7 years due to existing comorbidities and limited life expectancy [ 18 , 19 , 20 , 21 ], with some jurisdictions recommending breast cancer screening for women ≥ 75 years only when life expectancy is estimated as at least 7–10 years [ 22 ]. Others have argued that decisions about continuing with screening mammography should depend on individual patient risk and health management preferences [ 23 ]. This decision is likely facilitated by a discussion between a health care provider and patient about the harms and benefits of screening outside the recommended ages [ 24 , 25 ]. While mammography may enable early detection of breast cancer, it is clear that false-positive results and overdiagnosis Footnote 1 may occur. Studies have estimated that up to 25% of breast cancer cases in the general population may be over diagnosed [ 26 , 27 , 28 ].

The risk of being diagnosed with breast cancer increases with age and approximately 80% of new cases of breast cancer in high-income countries are in women over the age of 50 [ 29 ]. The average age of first diagnosis of breast cancer in high income countries is comparable to that of Australian women which is now 61 years [ 2 , 4 , 29 ]. Studies show that women aged ≥ 75 years generally have positive attitudes to mammography screening and report high levels of perceived benefits including early detection of breast cancer and a desire to stay healthy as they age [ 21 , 30 , 31 , 32 ]. Some women aged over 74 participate, or plan to participate, in screening despite recommendations from health professionals and government guidelines advising against it [ 33 ]. Results of a recent review found that knowledge of the recommended guidelines and the potential harms of screening are limited and many older women believed that the benefits of continued screening outweighed the risks [ 30 ].

Very few studies have been undertaken to understand the motivations of women to screen or to establish screening participation rates among women aged ≥ 75 and older. This is surprising given that increasing age is recognised as a key risk factor for the development of breast cancer, and that screening is offered in many locations around the world every two years up until 74 years. The importance of this topic is high given the ambiguity around best practice for participation beyond 74 years. A preliminary search of Open Science Framework, PROSPERO, Cochrane Database of Systematic Reviews and JBI Evidence Synthesis in May 2022 did not locate any reviews on this topic.

This scoping review has allowed for the mapping of a broad range of research to explore the breadth and depth of the literature, summarize the evidence and identify knowledge gaps [ 34 , 35 ]. This information has supported the development of a comprehensive overview of current knowledge of motivations of women to screen and screening participation rates among women outside the targeted age of many international screening programs.

Materials and methods

Research question.

The research question for this scoping review was developed by applying the Population—Concept—Context (PCC) framework [ 36 ]. The current review addresses the research question “What research has been undertaken in high-income countries (context) exploring the key motivations to screen for breast cancer and screening participation (concepts) among women ≥ 75 years of age (population)?

Eligibility criteria

Participants.

Women aged ≥ 75 years were the key population. Specifically, motivations to screen and screening intention and behaviour and the variables that discriminate those who screen from those who do not (non-screeners) were utilised as the key predictors and outcomes respectively.

From a conceptual perspective it was considered that motivation led to behaviour, therefore articles that described motivation and corresponding behaviour were considered. These included articles reporting on women who use public (government funded) and private (fee for service) breast cancer screening services and those who do not use screening services (i.e., non-screeners).

The scope included high-income countries using the World Bank definition [ 37 ]. These countries have broadly similar health systems and opportunities for breast cancer screening in both public and private settings.

Types of sources

All studies reporting original research in peer-reviewed journals from January 2009 were eligible for inclusion, regardless of design. This date was selected due to an evaluation undertaken for BreastScreen Australia recommending expansion of the age group to include 70–74-year-old women [ 38 ]. This date was also indicative of international debate regarding breast cancer screening effectiveness at this time [ 39 , 40 ]. Reviews were also included, regardless of type—scoping, systematic, or narrative. Only sources published in English and available through the University’s extensive research holdings were eligible for inclusion. Ineligible materials were conference abstracts, letters to the editor, editorials, opinion pieces, commentaries, newspaper articles, dissertations and theses.

This scoping review was registered with the Open Science Framework database ( https://osf.io/fd3eh ) and followed Joanna Briggs Institute (JBI) methodology for scoping reviews [ 35 , 36 ]. Although ethics approval is not required for scoping reviews the broader study was approved by the University Ethics Committee (approval number HEC 21249).

Search strategy

A pilot search strategy was developed in consultation with an expert health librarian and tested in MEDLINE (OVID) and conducted on 3 June 2022. Articles from this pilot search were compared with seminal articles previously identified by the members of the team and used to refine the search terms. The search terms were then searched as both keywords and subject headings (e.g., MeSH) in the titles and abstracts and Boolean operators employed. A full MEDLINE search was then carried out by the librarian (see Table  1 ). This search strategy was adapted for use in each of the following databases: Cumulative Index to Nursing and Allied Health Literature (CINAHL), Medical Literature Analysis and Retrieval System Online (MEDLINE), Web of Science and PsychInfo databases. The references of included studies have been hand-searched to identify any additional evidence sources.

Study/source of evidence selection

Following the search, all identified citations were collated and uploaded into EndNote v.X20 (Clarivate Analytics, PA, USA) and duplicates removed. The resulting articles were then imported into Covidence – Cochrane’s systematic review management software [ 41 ]. Duplicates were removed once importation was complete, and title and abstract screening was undertaken against the eligibility criteria. A sample of 25 articles were assessed by all reviewers to ensure reliability in the application of the inclusion and exclusion criteria. Team discussion was used to ensure consistent application. The Covidence software supports blind reviewing with two reviewers required at each screening phase. Potentially relevant sources were retrieved in full text and were assessed against the inclusion criteria by two independent reviewers. Conflicts were flagged within the software which allows the team to discuss those that have disagreements until a consensus was reached. Reasons for exclusion of studies at full text were recorded and reported in the scoping review. The Preferred Reporting Items of Systematic Reviews extension for scoping reviews (PRISMA-ScR) checklist was used to guide the reporting of the review [ 42 ] and all stages were documented using the PRISMA-ScR flow chart [ 42 ].

Data extraction

A data extraction form was created in Covidence and used to extract study characteristics and to confirm the study’s relevance. This included specific details such as article author/s, title, year of publication, country, aim, population, setting, data collection methods and key findings relevant to the review question. The draft extraction form was modified as needed during the data extraction process.

Data analysis and presentation

Extracted data were summarised in tabular format (see Table  2 ). Consistent with the guidelines for the effective reporting of scoping reviews [ 43 ] and the JBI framework [ 35 ] the final stage of the review included thematic analysis of the key findings of the included studies. Study findings were imported into QSR NVivo with coding of each line of text. Descriptive codes reflected key aspects of the included studies related to the motivations and behaviours of women > 75 years about breast cancer screening.

In line with the reporting requirements for scoping reviews the search results for this review are presented in Fig.  1 [ 44 ].

figure 1

PRISMA Flowchart. From: Page MJ, McKenzie JE, Bossuyt PM, Boutron I, Hoffmann TC, Mulrow CD, et al. The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ 2021;372:n71. https://doi.org/10.1136/bmj.n71

A total of fourteen [ 14 ] studies were included in the review with studies from the following countries, US n  = 12 [ 33 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 ], UK n  = 1 [ 23 ] and France n  = 1 [ 56 ]. Sample sizes varied, with most containing fewer than 50 women ( n  = 8) [ 33 , 45 , 46 , 48 , 51 , 52 , 55 ]. Two had larger samples including a French study with 136 women (a sub-set of a larger sample) [ 56 ], and one mixed method study in the UK with a sample of 26 women undertaking interviews and 479 women completing surveys [ 23 ]. One study did not report exact numbers [ 50 ]. Three studies [ 47 , 53 , 54 ] were undertaken by a group of researchers based in the US utilising the same sample of women, however each of the papers focused on different primary outcomes. The samples in the included studies were recruited from a range of locations including primary medical care clinics, specialist medical clinics, University affiliated medical clinics, community-based health centres and community outreach clinics [ 47 , 53 , 54 ].

Data collection methods varied and included: quantitative ( n  = 8), qualitative ( n  = 5) and mixed methods ( n  = 1). A range of data collection tools and research designs were utilised; pre/post, pilot and cross-sectional surveys, interviews, and secondary analysis of existing data sets. Seven studies focused on the use of a Decision Aids (DAs), either in original or modified form, developed by Schonberg et al. [ 55 ] as a tool to increase knowledge about the harms and benefits of screening for older women [ 45 , 47 , 48 , 49 , 52 , 54 , 55 ]. Three studies focused on intention to screen [ 33 , 53 , 56 ], two on knowledge of, and attitudes to, screening [ 23 , 46 ], one on information needs relating to risks and benefits of screening discontinuation [ 51 ], and one on perceptions about discontinuation of screening and impact of social interactions on screening [ 50 ].

The three themes developed from the analysis of the included studies highlighted that decisions about screening were primarily influenced by: (1) knowledge of the benefits and harms of screening and their relationship to age; (2) underlying attitudes to the importance of cancer screening in women's lives; and (3) exposure to decision aids designed to facilitate informed decision-making. Each of these themes will be presented below drawing on the key findings of the appropriate studies. The full dataset of extracted data can be found in Table  2 .

Knowledge of the benefits and harms of screening ≥ 75 years

The decision to participate in routine mammography is influenced by individual differences in cognition and affect, interpersonal relationships, provider characteristics, and healthcare system variables. Women typically perceive mammograms as a positive, beneficial and routine component of care [ 46 ] and an important aspect of taking care of themselves [ 23 , 46 , 49 ]. One qualitative study undertaken in the US showed that few women had discussed mammography cessation or the potential harms of screening with their health care providers and some women reported they would insist on receiving mammography even without a provider recommendation to continue screening [ 46 ].

Studies suggested that ageing itself, and even poor health, were not seen as reasonable reasons for screening cessation. For many women, guidance from a health care provider was deemed the most important influence on decision-making [ 46 ]. Preferences for communication about risk and benefits were varied with one study reporting women would like to learn more about harms and risks and recommended that this information be communicated via physicians or other healthcare providers, included in brochures/pamphlets, and presented outside of clinical settings (e.g., in community-based seniors groups) [ 51 ]. Others reported that women were sometimes sceptical of expert and government recommendations [ 33 ] although some were happy to participate in discussions with health educators or care providers about breast cancer screening harms and benefits and potential cessation [ 52 ].

Underlying attitudes to the importance of cancer screening at and beyond 75 years

Included studies varied in describing the importance of screening, with some attitudes based on past attendance and some based on future intentions to screen. Three studies reported findings indicating that some women intended to continue screening after 75 years of age [ 23 , 45 , 46 ], with one study in the UK reporting that women supported an extension of the automatic recall indefinitely, regardless of age or health status. In this study, failure to invite older women to screen was interpreted as age discrimination [ 23 ]. The desire to continue screening beyond 75 was also highlighted in a study from France that found that 60% of the women ( n  = 136 aged ≥ 75) intended to pursue screening in the future, and 27 women aged ≥ 75, who had never undergone mammography previously (36%), intended to do so in the future [ 56 ]. In this same study, intentions to screen varied significantly [ 56 ]. There were no sociodemographic differences observed between screened and unscreened women with regard to level of education, income, health risk behaviour (smoking, alcohol consumption), knowledge about the importance and the process of screening, or psychological features (fear of the test, fear of the results, fear of the disease, trust in screening impact) [ 56 ]. Further analysis showed that three items were statistically correlated with a higher rate of attendance at screening: (1) screening was initiated by a physician; (2) the women had a consultation with a gynaecologist during the past 12 months; and (3) the women had already undergone at least five screening mammograms. Analysis highlighted that although average income, level of education, psychological features or other types of health risk behaviours did not impact screening intention, having a mammogram previously impacted likelihood of ongoing screening. There was no information provided that explained why women who had not previously undergone screening might do so in the future.

A mixed methods study in the UK reported similar findings [ 23 ]. Utilising interviews ( n  = 26) and questionnaires ( n  = 479) with women ≥ 70 years (median age 75 years) the overwhelming result (90.1%) was that breast screening should be offered to all women indefinitely regardless of age, health status or fitness [ 23 ], and that many older women were keen to continue screening. Both the interview and survey data confirmed women were uncertain about eligibility for breast screening. The survey data showed that just over half the women (52.9%) were unaware that they could request mammography or knew how to access it. Key reasons for screening discontinuation were not being invited for screening (52.1%) and not knowing about self-referral (35.1%).

Women reported that not being invited to continue screening sent messages that screening was no longer important or required for this age group [ 23 ]. Almost two thirds of the women completing the survey (61.6%) said they would forget to attend screening without an invitation. Other reasons for screening discontinuation included transport difficulties (25%) and not wishing to burden family members (24.7%). By contrast, other studies have reported that women do not endorse discontinuation of screening mammography due to advancing age or poor health, but some may be receptive to reducing screening frequency on recommendation from their health care provider [ 46 , 51 ].

Use of Decision Aids (DAs) to improve knowledge and guide screening decision-making

Many women reported poor knowledge about the harms and benefits of screening with studies identifying an important role for DAs. These aids have been shown to be effective in improving knowledge of the harms and benefits of screening [ 45 , 54 , 55 ] including for women with low educational attainment; as compared to women with high educational attainment [ 47 ]. DAs can increase knowledge about screening [ 47 , 49 ] and may decrease the intention to continue screening after the recommended age [ 45 , 52 , 54 ]. They can be used by primary care providers to support a conversation about breast screening intention and reasons for discontinuing screening. In one pilot study undertaken in the US using a DA, 5 of the 8 women (62.5%) indicated they intended to continue to receive mammography; however, 3 participants planned to get them less often [ 45 ]. When asked whether they thought their physician would want them to get a mammogram, 80% said “yes” on pre-test; this figure decreased to 62.5% after exposure to the DA. This pilot study suggests that the use of a decision-aid may result in fewer women ≥ 75 years old continuing to screen for breast cancer [ 45 ].

Similar findings were evident in two studies drawing on the same data undertaken in the US [ 48 , 53 ]. Using a larger sample ( n  = 283), women’s intentions to screen prior to a visit with their primary care provider and then again after exposure to the DA were compared. Results showed that 21.7% of women reduced their intention to be screened, 7.9% increased their intentions to be screened, and 70.4% did not change. Compared to those who had no change or increased their screening intentions, women who had a decrease in screening intention were significantly less likely to receive screening after 18 months. Generally, studies have shown that women aged 75 and older find DAs acceptable and helpful [ 47 , 48 , 49 , 55 ] and using them had the potential to impact on a women’s intention to screen [ 55 ].

Cadet and colleagues [ 49 ] explored the impact of educational attainment on the use of DAs. Results highlight that education moderates the utility of these aids; women with lower educational attainment were less likely to understand all the DA’s content (46.3% vs 67.5%; P < 0.001); had less knowledge of the benefits and harms of mammography (adjusted mean ± standard error knowledge score, 7.1 ± 0.3 vs 8.1 ± 0.3; p < 0.001); and were less likely to have their screening intentions impacted (adjusted percentage, 11.4% vs 19.4%; p  = 0.01).

This scoping review summarises current knowledge regarding motivations and screening behaviours of women over 75 years. The findings suggest that awareness of the importance of breast cancer screening among women aged ≥ 75 years is high [ 23 , 46 , 49 ] and that many women wish to continue screening regardless of perceived health status or age. This highlights the importance of focusing on motivation and screening behaviours and the multiple factors that influence ongoing participation in breast screening programs.

The generally high regard attributed to screening among women aged ≥ 75 years presents a complex challenge for health professionals who are focused on potential harm (from available national and international guidelines) in ongoing screening for women beyond age 75 [ 18 , 20 , 57 ]. Included studies highlight that many women relied on the advice of health care providers regarding the benefits and harms when making the decision to continue breast screening [ 46 , 51 , 52 ], however there were some that did not [ 33 ]. Having a previous pattern of screening was noted as being more significant to ongoing intention than any other identified socio-demographic feature [ 56 ]. This is perhaps because women will not readily forgo health care practices that they have always considered important and that retain ongoing importance for the broader population.

For those women who had discontinued screening after the age of 74 it was apparent that the rationale for doing so was not often based on choice or receipt of information, but rather on factors that impact decision-making in relation to screening. These included no longer receiving an invitation to attend, transport difficulties and not wanting to be a burden on relatives or friends [ 23 , 46 , 51 ]. Ongoing receipt of invitations to screen was an important aspect of maintaining a capacity to choose [ 23 ]. This was particularly important for those women who had been regular screeners.

Women over 75 require more information to make decisions regarding screening [ 23 , 52 , 54 , 55 ], however health care providers must also be aware that the element of choice is important for older women. Having a capacity to choose avoids any notion of discrimination based on age, health status, gender or sociodemographic difference and acknowledges the importance of women retaining control over their health [ 23 ]. It was apparent that some women would choose to continue screening at a reduced frequency if this option was available and that women should have access to information facilitating self-referral [ 23 , 45 , 46 , 51 , 56 ].

Decision-making regarding ongoing breast cancer screening has been facilitated via the use of Decision Aids (DAs) within clinical settings [ 54 , 55 ]. While some studies suggest that women will make a decision regardless of health status, the use of DAs has impacted women’s decision to screen. While this may have limited benefit for those of lower educational attainment [ 48 ] they have been effective in improving knowledge relating to harms and benefits of screening particularly where they have been used to support a conversation with women about the value of screening [ 54 , 55 , 56 ].

Women have identified challenges in engaging in conversations with health care providers regarding ongoing screening, because providers frequently draw on projections of life expectancy and over-diagnosis [ 17 , 51 ]. As a result, these conversations about screening after age 75 years often do not occur [ 46 ]. It is likely that health providers may need more support and guidance in leading these conversations. This may be through the use of DAs or standardised checklists. It may be possible to incorporate these within existing health preventive measures for this age group. The potential for advice regarding ongoing breast cancer screening to be available outside of clinical settings may provide important pathways for conversations with women regarding health choices. Provision of information and advice in settings such as community based seniors groups [ 51 ] offers a potential platform to broaden conversations and align sources of information, not only with health professionals but amongst women themselves. This may help to address any misconception regarding eligibility and access to services [ 23 ]. It may also be aligned with other health promotion and lifestyle messages provided to this age group.

Limitations of the review

The searches that formed the basis of this review were carried in June 2022. Although the search was comprehensive, we have only captured those studies that were published in the included databases from 2009. There may have been other studies published outside of these periods. We also limited the search to studies published in English with full-text availability.

The emphasis of a scoping review is on comprehensive coverage and synthesis of the key findings, rather than on a particular standard of evidence and, consequently a quality assessment of the included studies was not undertaken. This has resulted in the inclusion of a wide range of study designs and data collection methods. It is important to note that three studies included in the review drew on the same sample of women (283 over > 75)[ 49 , 53 , 54 ]. The results of this review provide valuable insights into motivations and behaviours for breast cancer screening for older women, however they should be interpreted with caution given the specific methodological and geographical limitations.

Conclusion and recommendations

This scoping review highlighted a range of key motivations and behaviours in relation to breast cancer screening for women ≥ 75 years of age. The results provide some insight into how decisions about screening continuation after 74 are made and how informed decision-making can be supported. Specifically, this review supports the following suggestions for further research and policy direction:

Further research regarding breast cancer screening motivations and behaviours for women over 75 would provide valuable insight for health providers delivering services to women in this age group.

Health providers may benefit from the broader use of decision aids or structured checklists to guide conversations with women over 75 regarding ongoing health promotion/preventive measures.

Providing health-based information in non-clinical settings frequented by women in this age group may provide a broader reach of information and facilitate choices. This may help to reduce any perception of discrimination based on age, health status or socio-demographic factors.

Availability of data and materials

All data generated or analysed during this study is included in this published article (see Table  2 above).

Cancer Australia, in their 2014 position statement, define “overdiagnosis” in the following way. ‘’Overdiagnosis’ from breast screening does not refer to error or misdiagnosis, but rather refers to breast cancer diagnosed by screening that would not otherwise have been diagnosed during a woman’s lifetime. “Overdiagnosis” includes all instances where cancers detected through screening (ductal carcinoma in situ or invasive breast cancer) might never have progressed to become symptomatic during a woman’s life, i.e., cancer that would not have been detected in the absence of screening. It is not possible to precisely predict at diagnosis, to which cancers overdiagnosis would apply.” (accessed 22. nd August 2022; https://www.canceraustralia.gov.au/resources/position-statements/overdiagnosis-mammographic-screening ).

World Health Organization. Breast Cancer Geneva: WHO; 2021 [Available from: https://www.who.int/news-room/fact-sheets/detail/breast-cancer#:~:text=Reducing%20global%20breast%20cancer%20mortality,and%20comprehensive%20breast%20cancer%20management .

International Agency for Research on Cancer (IARC). IARC Handbooks on Cancer Screening: Volume 15 Breast Cancer Geneva: IARC; 2016 [Available from: https://publications.iarc.fr/Book-And-Report-Series/Iarc-Handbooks-Of-Cancer-Prevention/Breast-Cancer-Screening-2016 .

Australian Institute of Health and Welfare. Cancer in Australia 2021 [Available from: https://www.canceraustralia.gov.au/cancer-types/breast-cancer/statistics .

Breast Cancer Network Australia. Current breast cancer statistics in Australia 2020 [Available from: https://www.bcna.org.au/media/7111/bcna-2019-current-breast-cancer-statistics-in-australia-11jan2019.pdf .

Ren W, Chen M, Qiao Y, Zhao F. Global guidelines for breast cancer screening: A systematic review. The Breast. 2022;64:85–99.

Article   PubMed   PubMed Central   Google Scholar  

Cardoso F, Kyriakides S, Ohno S, Penault-Llorca F, Poortmans P, Rubio IT, et al. Early breast cancer: ESMO Clinical Practice Guidelines for diagnosis, treatment and follow-up. Ann Oncol. 2019;30(8):1194–220.

Article   CAS   PubMed   Google Scholar  

Hamashima C, Hattori M, Honjo S, Kasahara Y, Katayama T, Nakai M, et al. The Japanese guidelines for breast cancer screening. Jpn J Clin Oncol. 2016;46(5):482–92.

Article   PubMed   Google Scholar  

Bevers TB, Helvie M, Bonaccio E, Calhoun KE, Daly MB, Farrar WB, et al. Breast cancer screening and diagnosis, version 3.2018, NCCN clinical practice guidelines in oncology. J Natl Compr Canc Net. 2018;16(11):1362–89.

Article   Google Scholar  

He J, Chen W, Li N, Shen H, Li J, Wang Y, et al. China guideline for the screening and early detection of female breast cancer (2021, Beijing). Zhonghua Zhong liu za zhi [Chinese Journal of Oncology]. 2021;43(4):357–82.

CAS   PubMed   Google Scholar  

Cancer Australia. Early detection of breast cancer 2021 [cited 2022 25 July]. Available from: https://www.canceraustralia.gov.au/resources/position-statements/early-detection-breast-cancer .

Schünemann HJ, Lerda D, Quinn C, Follmann M, Alonso-Coello P, Rossi PG, et al. Breast Cancer Screening and Diagnosis: A Synopsis of the European Breast Guidelines. Ann Intern Med. 2019;172(1):46–56.

World Health Organization. WHO Position Paper on Mammography Screening Geneva WHO. 2016.

Google Scholar  

Lansdorp-Vogelaar I, Gulati R, Mariotto AB. Personalizing age of cancer screening cessation based on comorbid conditions: model estimates of harms and benefits. Ann Intern Med. 2014;161:104.

Lee CS, Moy L, Joe BN, Sickles EA, Niell BL. Screening for Breast Cancer in Women Age 75 Years and Older. Am J Roentgenol. 2017;210(2):256–63.

Broeders M, Moss S, Nystrom L. The impact of mammographic screening on breast cancer mortality in Europe: a review of observational studies. J Med Screen. 2012;19(suppl 1):14.

Oeffinger KC, Fontham ETH, Etzioni R, Herzig A, Michaelson JS, Shih YCT, et al. Breast cancer screening for women at average risk: 2015 Guideline update from the American cancer society. JAMA - Journal of the American Medical Association. 2015;314(15):1599–614.

Walter LC, Schonberg MA. Screening mammography in older women: a review. JAMA. 2014;311:1336.

Article   CAS   PubMed   PubMed Central   Google Scholar  

Braithwaite D, Walter LC, Izano M, Kerlikowske K. Benefits and harms of screening mammography by comorbidity and age: a qualitative synthesis of observational studies and decision analyses. J Gen Intern Med. 2016;31:561.

Braithwaite D, Mandelblatt JS, Kerlikowske K. To screen or not to screen older women for breast cancer: a conundrum. Future Oncol. 2013;9(6):763–6.

Demb J, Abraham L, Miglioretti DL, Sprague BL, O’Meara ES, Advani S, et al. Screening Mammography Outcomes: Risk of Breast Cancer and Mortality by Comorbidity Score and Age. Jnci-Journal of the National Cancer Institute. 2020;112(6):599–606.

Demb J, Akinyemiju T, Allen I, Onega T, Hiatt RA, Braithwaite D. Screening mammography use in older women according to health status: a systematic review and meta-analysis. Clin Interv Aging. 2018;13:1987–97.

Qaseem A, Lin JS, Mustafa RA, Horwitch CA, Wilt TJ. Screening for Breast Cancer in Average-Risk Women: A Guidance Statement From the American College of Physicians. Ann Intern Med. 2019;170(8):547–60.

Collins K, Winslow M, Reed MW, Walters SJ, Robinson T, Madan J, et al. The views of older women towards mammographic screening: a qualitative and quantitative study. Br J Cancer. 2010;102(10):1461–7.

Welch HG, Black WC. Overdiagnosis in cancer. J Natl Cancer Inst. 2010;102(9):605–13.

Hersch J, Jansen J, Barratt A, Irwig L, Houssami N, Howard K, et al. Women’s views on overdiagnosis in breast cancer screening: a qualitative study. BMJ : British Medical Journal. 2013;346:f158.

De Gelder R, Heijnsdijk EAM, Van Ravesteyn NT, Fracheboud J, Draisma G, De Koning HJ. Interpreting overdiagnosis estimates in population-based mammography screening. Epidemiol Rev. 2011;33(1):111–21.

Monticciolo DL, Helvie MA, Edward HR. Current issues in the overdiagnosis and overtreatment of breast cancer. Am J Roentgenol. 2018;210(2):285–91.

Shepardson LB, Dean L. Current controversies in breast cancer screening. Semin Oncol. 2020;47(4):177–81.

National Cancer Control Centre. Cancer incidence in Australia 2022 [Available from: https://ncci.canceraustralia.gov.au/diagnosis/cancer-incidence/cancer-incidence .

Austin JD, Shelton RC, Lee Argov EJ, Tehranifar P. Older Women’s Perspectives Driving Mammography Screening Use and Overuse: a Narrative Review of Mixed-Methods Studies. Current Epidemiology Reports. 2020;7(4):274–89.

Austin JD, Tehranifar P, Rodriguez CB, Brotzman L, Agovino M, Ziazadeh D, et al. A mixed-methods study of multi-level factors influencing mammography overuse among an older ethnically diverse screening population: implications for de-implementation. Implementation Science Communications. 2021;2(1):110.

Demb J, Allen I, Braithwaite D. Utilization of screening mammography in older women according to comorbidity and age: protocol for a systematic review. Syst Rev. 2016;5(1):168.

Housten AJ, Pappadis MR, Krishnan S, Weller SC, Giordano SH, Bevers TB, et al. Resistance to discontinuing breast cancer screening in older women: A qualitative study. Psychooncology. 2018;27(6):1635–41.

Arksey H, O’Malley L. Scoping studies: towards a methodological framework. Int J Soc Res Methodol. 2005;8(1):19–32.

Peters M, Godfrey C, McInerney P, Munn Z, Tricco A, Khalil HAE, et al. Chapter 11: Scoping reviews. JBI Manual for Evidence Synthesis 2020 [Available from: https://jbi-global-wiki.refined.site/space/MANUAL .

Peters MD, Godfrey C, McInerney P, Khalil H, Larsen P, Marnie C, et al. Best practice guidance and reporting items for the development of scoping review protocols. JBI evidence synthesis. 2022;20(4):953–68.

Fantom NJ, Serajuddin U. The World Bank’s classification of countries by income. World Bank Policy Research Working Paper; 2016.

Book   Google Scholar  

BreastScreen Australia Evaluation Taskforce. BreastScreen Australia Evaluation. Evaluation final report: Screening Monograph No 1/2009. Canberra; Australia Australian Government Department of Health and Ageing; 2009.

Nelson HD, Cantor A, Humphrey L. Screening for breast cancer: a systematic review to update the 2009 U.S. Preventive Services Task Force recommendation2016.

Woolf SH. The 2009 breast cancer screening recommendations of the US Preventive Services Task Force. JAMA. 2010;303(2):162–3.

Covidence systematic review software. [Internet]. Veritas-Health-Innovation 2020. Available from: https://www.covidence.org/ .

Tricco AC, Lillie E, Zarin W, O’Brien KK, Colquhoun H, Levac D, et al. PRISMA Extension for Scoping Reviews (PRISMA-ScR): Checklist and Explanation. Ann Intern Med. 2018;169(7):467–73.

Tricco AC, Lillie E, Zarin W, O’Brien K, Colquhoun H, Kastner M, et al. A scoping review on the conduct and reporting of scoping reviews. BMC Med Res Methodol. 2016;16(1):15.

Page MJ, McKenzie JE, Bossuyt PM, Boutron I, Hoffmann TC, Mulrow CD, et al. The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ. 2021;372:n71.

Beckmeyer A, Smith RM, Miles L, Schonberg MA, Toland AE, Hirsch H. Pilot Evaluation of Patient-centered Survey Tools for Breast Cancer Screening Decision-making in Women 75 and Older. Health Behavior and Policy Review. 2020;7(1):13–8.

Brotzman LE, Shelton RC, Austin JD, Rodriguez CB, Agovino M, Moise N, et al. “It’s something I’ll do until I die”: A qualitative examination into why older women in the U.S. continue screening mammography. Canc Med. 2022;11(20):3854–62.

Article   CAS   Google Scholar  

Cadet T, Pinheiro A, Karamourtopoulos M, Jacobson AR, Aliberti GM, Kistler CE, et al. Effects by educational attainment of a mammography screening patient decision aid for women aged 75 years and older. Cancer. 2021;127(23):4455–63.

Cadet T, Aliberti G, Karamourtopoulos M, Jacobson A, Gilliam EA, Primeau S, et al. Evaluation of a mammography decision aid for women 75 and older at risk for lower health literacy in a pretest-posttest trial. Patient Educ Couns. 2021;104(9):2344–50.

Cadet T, Aliberti G, Karamourtopoulos M, Jacobson A, Siska M, Schonberg MA. Modifying a mammography decision aid for older adult women with risk factors for low health literacy.  Health Lit Res Prac. 2021;5(2):e78–90.

Gray N, Picone G. Evidence of Large-Scale Social Interactions in Mammography in the United States. Atl Econ J. 2018;46(4):441–57.

Hoover DS, Pappadis MR, Housten AJ, Krishnan S, Weller SC, Giordano SH, et al. Preferences for Communicating about Breast Cancer Screening Among Racially/Ethnically Diverse Older Women. Health Commun. 2019;34(7):702–6.

Salzman B, Bistline A, Cunningham A, Silverio A, Sifri R. Breast Cancer Screening Shared Decision-Making in Older African-American Women. J Natl Med Assoc. 2020;112(5):556–60.

PubMed   Google Scholar  

Schoenborn NL, Pinheiro A, Kistler CE, Schonberg MA. Association between Breast Cancer Screening Intention and Behavior in the Context of Screening Cessation in Older Women. Med Decis Making. 2021;41(2):240–4.

Schonberg MA, Kistler CE, Pinheiro A, Jacobson AR, Aliberti GM, Karamourtopoulos M, et al. Effect of a Mammography Screening Decision Aid for Women 75 Years and Older: A Cluster Randomized Clinical Trial. JAMA Intern Med. 2020;180(6):831–42.

Schonberg MA, Hamel MB, Davis RB. Development and evaluation of a decision aid on mammography screening for women 75 years and older. JAMA Intern Med. 2014;174:417.

Eisinger F, Viguier J, Blay J-Y, Morère J-F, Coscas Y, Roussel C, et al. Uptake of breast cancer screening in women aged over 75years: a controversy to come? Eur J Cancer Prev. 2011;20(Suppl 1):S13-5.

Schonberg MA, Breslau ES, McCarthy EP. Targeting of Mammography Screening According to Life Expectancy in Women Aged 75 and Older. J Am Geriatr Soc. 2013;61(3):388–95.

Download references

Acknowledgements

We would like to acknowledge Ange Hayden-Johns (expert librarian) who assisted with the development of the search criteria and undertook the relevant searches and Tejashree Kangutkar who assisted with some of the Covidence work.

This work was supported by funding from the Australian Government Department of Health and Aged Care (ID: Health/20–21/E21-10463).

Author information

Authors and affiliations.

Violet Vines Centre for Rural Health Research, La Trobe Rural Health School, La Trobe University, P.O. Box 199, Bendigo, VIC, 3552, Australia

Virginia Dickson-Swift, Joanne Adams & Evelien Spelten

Care Economy Research Institute, La Trobe University, Wodonga, Australia

Irene Blackberry

Olivia Newton-John Cancer Wellness and Research Centre, Austin Health, Melbourne, Australia

Carlene Wilson & Eva Yuen

Melbourne School of Population and Global Health, Melbourne University, Melbourne, Australia

Carlene Wilson

School of Psychology and Public Health, La Trobe University, Bundoora, Australia

Institute for Health Transformation, Deakin University, Burwood, Australia

Centre for Quality and Patient Safety, Monash Health Partnership, Monash Health, Clayton, Australia

You can also search for this author in PubMed   Google Scholar

Contributions

VDS conceived and designed the scoping review. VDS & JA developed the search strategy with librarian support, and all authors (VDS, JA, ES, IB, CW, EY) participated in the screening and data extraction stages and assisted with writing the review. All authors provided editorial support and read and approved the final manuscript prior to submission.

Corresponding author

Correspondence to Joanne Adams .

Ethics declarations

Competing interests.

The authors declare no competing interests.

Ethics approval and consent to participate

Ethics approval and consent to participate was not required for this study.

Consent for publication

Consent for publication was not required for this study.

Competing interest

The authors declare they have no competing interests.

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ . The Creative Commons Public Domain Dedication waiver ( http://creativecommons.org/publicdomain/zero/1.0/ ) applies to the data made available in this article, unless otherwise stated in a credit line to the data.

Reprints and permissions

About this article

Cite this article.

Dickson-Swift, V., Adams, J., Spelten, E. et al. Breast cancer screening motivation and behaviours of women aged over 75 years: a scoping review. BMC Women's Health 24 , 256 (2024). https://doi.org/10.1186/s12905-024-03094-z

Download citation

Received : 06 September 2023

Accepted : 15 April 2024

Published : 24 April 2024

DOI : https://doi.org/10.1186/s12905-024-03094-z

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Breast cancer
  • Mammography
  • Older women
  • Scoping review

BMC Women's Health

ISSN: 1472-6874

literature review outsourcing services

Ask the experts to write an essay for me!

Our writers will be by your side throughout the entire process of essay writing. After you have made the payment, the essay writer for me will take over ‘my assignment’ and start working on it, with commitment. We assure you to deliver the order before the deadline, without compromising on any facet of your draft. You can easily ask us for free revisions, in case you want to add up some information. The assurance that we provide you is genuine and thus get your original draft done competently.

literature review outsourcing services

Finished Papers

Customer Reviews

IMAGES

  1. 11 Literature Review

    literature review outsourcing services

  2. Literature review

    literature review outsourcing services

  3. Literature Review about Training Outsourcing

    literature review outsourcing services

  4. Helping You in Writing a Literature Review Immaculately

    literature review outsourcing services

  5. Figure 1 from Systematic Literature Review Protocol for Software

    literature review outsourcing services

  6. (PDF) Systematic Literature Review Protocol for a Software Outsourcing

    literature review outsourcing services

VIDEO

  1. Literature Review for Research #hazarauniversity #trendingvideo #pakistan

  2. Literature Review in Research ( Hands on Session) PART 1

  3. A literature review on online learning

  4. For Literature Review and Reading| ጊዜዎን የሚቀጥብ ጠቃሚ AI Tool

  5. Outsourced Full Movie Facts & Review / Josh Hamilton / Ayesha Dharker

  6. How to Use Reverse Outlining for Literature Reviews: An AI-Based Tool

COMMENTS

  1. HR Outsourcing Literature Review: Decisions, Outcome and Its Future Research Directions

    1. HR Outsourcing Literature Review: Decis ions, Outcome and Its Future Research. Directions. Abstract. This study aims to systematically synthesize more than 20 years of human resource ...

  2. PDF A Literature Review on Outsourcing of Services in Universities

    A Literature Review On Outsourcing Services In Universities DOI: 10.9790/487X-1912044756 www.iosrjournals.org 48 | Page sense that it involves top management of an organization and is a long-term decision, which affects the whole organization over a considerable period of time. ...

  3. Review article What we know about the trends, prospects, and challenges

    For the systematic literature review, 69 articles from the Scopus and Web of Science databases were objectively analysed in this study. ... selective outsourcing, or shared services. This research could explore the advantages, disadvantages, and performance outcomes of each model, considering factors such as cost-effectiveness, flexibility ...

  4. Strategic innovation through outsourcing

    Highlights. •. This paper offers a theoretical literature review on strategic innovation through outsourcing, with a focus on the ITO and BPO context. •. This review covers 95 journal articles published in highly ranked academic journals in information systems and other management fields. •.

  5. Uncovering the nature of the relationship between outsourcing

    Prior literature has identified several outsourcing motivations, such as cost reduction and access to expertise, and deciphered the influence of these variables on outsourcing decisions. ... Review of the empirical business services sourcing literature: An update and future directions. Journal of Information Technology, 31, 269-328. Crossref ...

  6. Review of the Empirical Business Services Sourcing Literature: An

    The 2010 Journal of Information Technology (JIT) article, 'A Review of the IT Outsourcing Empirical Literature and Future Research Directions', analyzed 741 findings on the determinants of information technology outsourcing (ITO) decisions and outcomes from 164 empirical articles published between 1992 and 2010.Using the same coding method, the 2011 JIT article, 'Business Process ...

  7. Challenges and practices identification in complex outsourcing ...

    In order to overcome the failure of projects in complex outsourcing relationships, there is a need of robust systematic research to identify the key challenges and practices in this area. Therefore, this research implements systematic literature review as a research method and works as a pioneer attempt to accomplish the aforementioned objectives.

  8. A Review of the it Outsourcing Empirical Literature and Future Research

    Lacity M., Khan S.A., and Willcocks L. (2009). A Review of the IT Outsourcing Literature: Insights for practice, The Journal of Strategic Information Systems 18(3): 130-146. ... The Next Step for the CEO; Moving IT-enabled Services Outsourcing to the Strategic Agenda, Strategic Outsourcing: An International Journal 3(1): 62-66. Crossref ...

  9. Services procurement: A systematic literature review of practices and

    A descriptive and thematic analysis concluded that services procurement can be classified into seven research domains: 'service production', 'governance', 'pur-chasing approach', 'supplier selection', 'performance management', 'the service triad' and 'specification of requirements'. We offer a comparative framework ...

  10. Services procurement: A systematic literature review of practices and

    Despite services being very different from physical items in many respects, and despite their outsourcing having achieved limited gains, the procurement of services remains under-researched. To address this challenge and develop a strategic platform for new directions in future research in the area, this paper undertakes a systematic literature ...

  11. Challenges and practices identification in complex outsourcing

    Good relationships and carefully drafted contracts have a significant impact on outsourcing. However, there is a lack of comprehensive guidance in this area, specifically in the context of complex outsourcing relationships, due to the dearth of studies described in the literature [].Outsourcing has become more complex and diversified as a result of the expansion of numerous actors connected ...

  12. A Literature Review on Outsourcing of Services in Universities

    A Literature Review on Outsourcing of Services in Universities. Mr. A.Pahirathan. Published 2017. Education, Business. I. In-Housing In-house refers to conducting an activity or operation within a company, instead of relying on outsourcing. A firm uses its own employees and time to keep a division or business activity, such as financing or ...

  13. Logistics services outsourcing decision making: a literature review and

    The purpose of this paper is to provide a review of logistics outsourcing literature to provide an insight to the trend, opportunities, criteria and techniques adopted in logistics outsourcing decision-making. This paper is based on literature review of 62 research articles published related to LSP evaluation and selection during 2010-2020.

  14. [PDF] A Systematic Literature Review on IT Outsourcing Decision and

    The determinants of ITO decisions are classified into technological, organizational, environmental and user adoption factors, and the trend of studied ITO strategies in the reviewed literature is analyzed, and future sourcing varietals are proposed. During the recent decades, some academic research on the subject of information technology outsourcing (ITO) decision has appeared in different ...

  15. HR Services and Recruitment in Russia & CIS

    Outsourcing services. We have extensive experience in Employment of Record (EOR) services, Payroll and HR mandates. Acteon offers a panel of out-sourced HR solutions and our clients can comply with local HR and payroll handling by transferring obligations of payroll, tax, social and HR legislation. solution for staffing.

  16. Top Outsourcing Offshoring companies In Moscow City

    Outsourcing and offshoring companies in Moscow City are firms that provide services to businesses from other countries. These services could include IT solutions, call center operations, accounting, and more. Moscow City is a popular location for outsourcing and offshoring due to its highly skilled workforce and low labor costs.

  17. Top Outsourcing companies In Moscow City

    Outsourcing companies in Moscow City are businesses that specialize in providing various services to other companies, organizations, and individuals. These services can range from administrative duties such as payroll, accounting, and human resources, to more technical services such as IT support, software development, and digital marketing.

  18. The Efficiency of Public Sector Outsourcing Contracts: A Literature Review

    Outsourcing the provision of traditionally publicly-provided services has become commonplace in most industrialized nations. Despite its prevalence, there still is no consensus in the academic literature on the magnitude (and determinants) of expected cost savings to the government, nor the sources of those savings. After articulating the differences between outsourcing and privatization, this ...

  19. JCM

    Different suction-assisted nephrostomic sheaths have been developed for percutaneous nephrolithotomy (PCNL). Objectives: (1) To examine PCNL techniques performed with different aspiration-assisted sheaths (Clear Petra® sheath, Superperc, SuperminiPCNL, and a miniPCNL patented sheath), with specific regard to effectiveness and safety outcomes in adult and paediatric patients; (2) to ...

  20. Breast cancer screening motivation and behaviours of women aged over 75

    This scoping review aimed to identify and present the evidence describing key motivations for breast cancer screening among women aged ≥ 75 years. Few of the internationally available guidelines recommend continued biennial screening for this age group. Some suggest ongoing screening is unnecessary or should be determined on individual health status and life expectancy.

  21. Moscow City Essay

    Level: College, High School, University, Master's, Undergraduate. 1 (888)814-4206 1 (888)499-5521. Nursing Business and Economics Management Healthcare +84. Your Price: .35 per page. Your credit card will be billed as Writingserv 938-777-7752 / Devellux Inc, 1012 E Osceola PKWY SUITE 23, KISSIMMEE, FL, 34744.

  22. Rehabilitation in People Living with Glioblastoma: A Narrative Review

    Glioblastoma is the most common primary malignant brain tumor. While preliminary data point to the positive effects of rehabilitation for patients with glioblastoma, there are unique challenges for clinicians working with this population, including limited life expectancy and/or rapid neurological deterioration. The aim of this article is to review the literature on rehabilitation of adults ...