IDEAS home Printed from https://ideas.repec.org/a/wsi/ijitdm/v13y2014i06ns021962201450076x.html
   My bibliography  Save this article

Identifying and Analyzing Risks and Responses for Risk Management in Information Technology Outsourcing Projects Under Fuzzy Environment

Author

Listed:
  • Homa Samadi

    (School of Industrial Engineering, Islamic Azad University of South Tehran Branch, Tehran, Iran)

  • Salman Nazari-Shirkouhi

    (School of Industrial Engineering, College of Engineering, University of Tehran, Iran)

  • Abbas Keramati

    (School of Industrial Engineering, College of Engineering, University of Tehran, Iran)

Abstract

Due to ever-increasing trend in outsourcing information technology projects in today's competitive world, the risk management in information technology outsourcing (ITO) projects is a challenging issue. Hence, this paper reviews and extracts present corresponding risks by literature review to implement risk management in ITO. After reviewing a number of frameworks in the literatures related to prioritizing of extracted risk factors, a new framework is presented to determine the priority of them. Because of network structure of the proposed framework and multi-dimensional nature of the project risk, the fuzzy analytic network process (fuzzy ANP) is applied to prioritize risk factors. Also, since identifying and prioritizing of risk factors cannot necessarily meet the organization's needs related to the project risk, the ways to respond to these factors are evaluated. For this purpose, responses to the five highest ranked risk factors are considered. Prioritization of responses to these risk factors is done by applying fuzzy technique for order preference by similarity to ideal solution (fuzzy TOPSIS) based on four criteria: quality, cost, time, and scope. Results, achieved from experts' judgment, show that the risk factor "Supplier's lack of expertise with an IT operation" is the most significant. Also, the best response for this factor, is "Review of monetary value and volume of suppliers' contracts prior to their selection" according to experts' point of view. In addition, a sensitivity analysis is carried out for validating the results.

Suggested Citation

  • Homa Samadi & Salman Nazari-Shirkouhi & Abbas Keramati, 2014. "Identifying and Analyzing Risks and Responses for Risk Management in Information Technology Outsourcing Projects Under Fuzzy Environment," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 13(06), pages 1283-1323.
  • Handle: RePEc:wsi:ijitdm:v:13:y:2014:i:06:n:s021962201450076x
    DOI: 10.1142/S021962201450076X
    as

    Download full text from publisher

    File URL: http://www.worldscientific.com/doi/abs/10.1142/S021962201450076X
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://libkey.io/10.1142/S021962201450076X?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jianping Li & Minglu Li & Dengsheng Wu & Qianzhi Dai & Hao Song, 2016. "A Bayesian Networks-Based Risk Identification Approach for Software Process Risk: The Context of Chinese Trustworthy Software," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(06), pages 1391-1412, November.
    2. Edmundas Kazimieras Zavadskas & Abbas Mardani & Zenonas Turskis & Ahmad Jusoh & Khalil MD Nor, 2016. "Development of TOPSIS Method to Solve Complicated Decision-Making Problems — An Overview on Developments from 2000 to 2015," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(03), pages 645-682, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wsi:ijitdm:v:13:y:2014:i:06:n:s021962201450076x. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Tai Tone Lim (email available below). General contact details of provider: http://www.worldscinet.com/ijitdm/ijitdm.shtml .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.