Thursday, April 5, 2012

Software Development Outsourcing


Outsourcing is becoming the trend in most information technology areas, in my own organization, when we established it 3 years back, our decision was to outsource all junior positions within IT department, and hire qualified and experienced staff to manage certain areas. The aim was to reduce cost and get the best out of experienced engineers in areas we don’t master. This model succeeded in some of these areas but others not. The risks that come with outsourcing is general should be well identified and avoided if possible.

Cost reduction is one of the main considerations behind IT outsourcing, software development is one of the areas where outsourcing to other countries like India and Russia becomes cost effective, increase productivity, increase quality and efficiency. But its not always the case, software development outsourcing specially to other country brings risks that need to be identified, and well studied before doing so. Industry reviews claim that half of the software development outsourcing projects fail, and 28 percent of those projects, fail due to contract management issues (Gefen, Wyss & Lichtenstein, 2008). The three phases of outsourcing life cycle that are pre-contract, contract and post contract, should be assessed to identify the risks properly, as each of these phases has its own risks that might lead to the failure of the software development outsourcing model. Companies tend to tradeoff something in return to lower cost of operation and high revenues, but the minimize this trade off, the risks for each business decision should be well assessed and all risks should be identified.

One of the major risks in software development outsourcing is “Protecting Intellectual property”; software development outsourcing requires transferring files, source code, business process or trade secrets to vendors, and sometimes licenses for software that belong to a third party, both vendor and customer should monitor and administer the IP. Recent reports of stolen or purchased sensitive data from Indian outsourcing vendors triggered the concerns of across boarder’s data security (Rottman, 2006).  An employee from the vendor side can send the source code to his private email in order to work on it from home, or to sell it to other companies who might be interested in it. Such actions can be controlled by its hard to eliminate it. However, some Indian vendors started to increase the security procedures by securing areas using access cards, and forming clean desk policies to control the documents that their employee have access to (Rottman, 2006). This only cannot guarantee data security, for that UIC which case was studies by Rottman applied a successful strategy to mitigate this risk, they tended to outtasking to help secure their Intellectual property, the idea is to break their code into smaller portions, and spread it among different vendors to work on it, assuring that to impossible to reconstruct. UIC usually gives the work to three vendors and monitors the job carefully (Rottman, 2006).  In addition to that, IP should be protected by the contract between the customer and the vendor, including legal and financial penalties to more secure and protect the information and IP, in the pre-contract phase of the outsourcing lifecycle, the vendor should be selected carefully to be trustworthy, and working with the vendor in previous projects help building the trust and insures that the vendor understands the customers policies and concerns.

Another major risk in software development outsourcing reside in cost and time over-runs for the project, this can happen because of the instability in outsourced countries, either political or other like environmental, as well cultural gap between the customer and the vendor, such as different language, different work mentality, and big difference in time zones. Usually the customer expects the vendor to pick up the call immediately, but this might not be the case with big difference in time zones. Gonzalez, Gasco and Llopis highlight this as a major risk, as asynchronous communication like email can help in reducing this risk, but it doesn’t work well for all projects. This can delay the project and can directly or indirectly increase its cost. As well bad selection for the vendor who lacks for expertise or have different work mentality, can extremely affect project timelines and cost money.

Even though time zone difference can be seen as an advantage and a driving force, not only a risk, because they can work in shifts, and utilize this time difference to their advantage. However, if not utilized properly, it can still be seen as a risk. To mitigate this risk, mixing of near and far shore vendors can help reduce this risk, by this work that requires minimal interaction from the customer can be outsourced to far shore vendor, while projects that require extensive amount of interaction can be outsourced to near shore vendor. Taking for example the US companies can mix between Eastern Europe and far Asia in outsourcing for such purposes. This diversity in customer vendor selection can help limiting the risk of time and cost overruns and its threads.

Software development outsourcing risks exist and approaches to mitigate or avoid the risks has to be identified to allow maximum benefit out of it.

References:

Ahmed, R., (2006), ‘Software maintenance outsourcing: Issues and strategies’, Computers and Electrical Engineering 32 (2006) pp.449–453, [Online], Available from:
http://www.sciencedirect.com.ezproxy.liv.ac.uk/science?_ob=ArticleURL&_udi=B6V25-4JX3SG8-1&_user=822084&_coverDate=11%2F30%2F2006&_rdoc=1&_fmt=high&_orig=gateway&_origin=gateway&_sort=d&_docanchor=&view=c&_acct=C000044499&_version=1&_urlVersion=0&_userid=822084&md5=431650312cb5d14d819f6e45bcf84342&searchtype=a
(Accessed 19 April 2011)

Chou, A. & Chou, D., (2010), ‘Innovation outsourcing: Risks and quality issues’, Computer Standards & Interfaces 33 (2011), pp.350–356,  doi:10.1016/j.csi.2010.10.001, [Online], Available from:
http://www.sciencedirect.com.ezproxy.liv.ac.uk/science?_ob=ArticleURL&_udi=B6TYV-51DD93D-1&_user=822084&_coverDate=03%2F31%2F2011&_rdoc=1&_fmt=high&_orig=gateway&_origin=gateway&_sort=d&_docanchor=&view=c&_acct=C000044499&_version=1&_urlVersion=0&_userid=822084&md5=4b2237216897dca3c31ff791487c116d&searchtype=a
(Accessed 19 April 2011)
Dhar, S. , Balakrishnan, B., (2006), ‘Risks, Benefits, and Challenges in Global IT Outsourcing: Perspectives and Practices’ Journal of Global Information Management, vol. 14, issue 3, [Online], Available from:
http://khazanchi.ist.unomaha.edu/Teaching/ISQA4590-8596/Readings/Supplemental%20Readings/week%2012/Risks-Benfits%20and%20Challenges%20in%20Global%20Outsourcing.pdf
(Accessed 19 April 2011)


Gefen, D, Wyss, S, & Lichtenstein, Y., (2008), 'BUSINESS FAMILIARITY AS RISK MITIGATION IN SOFTWARE DEVELOPMENT OUTSOURCING CONTRACTS', MIS Quarterly, 32, 3, pp. 531-542, Computers & Applied Sciences Complete, [Online], Available from: http://web.ebscohost.com.ezproxy.liv.ac.uk/ehost/detail?sid=595b2d81-e922-4d9e-8aa9-0be5d68ecc12%40sessionmgr12&vid=1&hid=11&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=iih&AN=33422914
(Accessed 20 April 2011)

Gonzalez, R., Gasco, J. & Llopis, J., (2006), ‘Information systems offshore outsourcing: A descriptive analysis’ Industrial Management & Data Systems
Vol. 106 No. 9, 2006, pp. 1233-1248 doi: 10.1108/02635570610712555, [Online], Available from:
http://www.emeraldinsight.com.ezproxy.liv.ac.uk/journals.htm?articleid=1576181&show=abstract
(Accessed 19 April 2011)

Kikuchi, T. (2006), ‘Time Zones, Outsourcing and Patterns of International Trade’, Economics Bulletin, Vol. 6,No. 15 pp. 1-10, [Online], Available from:
http://www.accessecon.com/pubs/EB/2006/Volume6/EB-06F10018A.pdf
(Accessed 19 April 2011)


Kikuchi, T. & Long, N. (2009), ‘A Simple Model of Service Offshoring with Time Zone Differences’, [Online], Available from:
http://proj3.sinica.edu.tw/~econ/2010GTD/11/11-3.pdf
(Accessed 19 April 2011)


Rottman, J., (2006), ‘Successfully outsourcing embedded software development’ Computer , vol.39, no.1, pp. 55- 61, Jan. 2006
doi: 10.1109/MC.2006.33, [Online]. Available from:  http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1580383&isnumber=33375
(Accessed 19 April 2011)


Roy, S. and Sivakumar, K. (2011), Managing Intellectual Property in Global Outsourcing for Innovation Generation. Journal of Product Innovation Management, 28: 48–62. doi: 10.1111/j.1540-5885.2010.00780.x, [Online], Available from:
http://onlinelibrary.wiley.com.ezproxy.liv.ac.uk/doi/10.1111/j.1540-5885.2010.00780.x/abstract;jsessionid=6EB0639FD12E9C0E5709F34B2D471961.d02t02
(Accessed 19 April 2011)

Waymack, P., (2000), 'Outsourcing Opportunities', Health Management Technology, 21, 7, p. 44, Computers & Applied Sciences Complete, [Online], Available from: http://web.ebscohost.com.ezproxy.liv.ac.uk/ehost/detail?sid=f8d30193-18f9-49ef-9413-c3503b4830b5%40sessionmgr15&vid=1&hid=11&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=iih&AN=3256997
(Accessed 20 April 2011)

1 comment:

  1. Great information. Thanks for providing us such a useful information. Keep up the good work and continue providing us more quality information from time to time. Software Development Outsourcing

    ReplyDelete