用户名: 密码: 验证码:
业务流程模块化度影响下的业务流程外包激励契约设计
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
业务流程外包(BPO)是继信息系统外包之后信息技术服务发展的第二个高潮。作为国际服务外包的主要承接地之一,中国被越来越多的发包国家所重视。中国的服务外包产业得到了中国政府的高度重视。企业在实施BPO的过程中将会遇到很多风险。本文的研究问题是如何设计外包契约才能有效地解决BPO的道德风险和多任务代理问题,实现发包商和服务商的长期稳定合作。为了使契约更符合实际,本文提出应该考虑外包业务流程模块化度的影响。
     本文包括七章内容,第一章介绍了研究背景、研究问题和研究意义,技术研究路线和论文结构。第二章是文献综述和理论基础部分。第三章提出了外包业务流程模块化度(DBPM)勺概念,分析了DBPM的影响因素和测量方法,以及DBPM对BPO激励契约设计的影响。第四章分别设计了存在单边和双边道德风险的考虑DBPM影响的单流程外包激励契约。第五章分别设计了收益函数为线性形式和柯布道格拉斯生产函数形式的两流程外包激励契约。第六章设计了存在双边道德风险的考虑DBPM影响的单流程外包关系契约和考虑DBPM影响的两流程外包关系契约。第七章总结了本文的研究工作和结论,指出了有待进一步完善和探讨的地方。
     文章指出市场因素以及业务流程因素都会影响DBPM。DBPM对BPO中的成本和风险都存在影响,是BPO契约设计时应考虑的一个重要因素。在契约模型构建方面,主要包括六个结论。
     (1)在存在单边道德风险的单流程外包中,使用了激励机制和奖惩机制。研究发现,当DBPM高时,应使用高激励强度和奖惩强度,发包商将获得高利润。当业务流程的不确定性高时,应使用低激励强度和高奖惩强度,发包商将获得低利润。当业务流程的不可观测性高时,应使用高激励强度和低奖惩强度,发包商将获得低利润。当服务商具有低风险规避度时,应使用高激励强度和奖惩强度,当服务商具有高技术水平时,应使用高激励强度,发包商将获得高利润。当DBPM低时,发包商不购买信息系统监督服务商。
     (2)在存在双边道德风险的单流程外包中,使用了激励机制。结果表明,只使用激励机制不会完全解决双边道德风险。当服务商具有高水平技术、低成本时,发包商将获得高外包利润。当服务商同时具有技术优势和成本优势,或只具有足够高的技术优势或成本优势,且DBPM较高时,发包商将获得高外包利润。当DBPM较高,或服务商具有高水平技术和低成本系数时,发包商应制定高的收益共享系数。
     (3)在BPO交易价值为线性函数的两流程外包中,使用了奖惩机制。结果表明,当业务流程具有高模块化度、低不可观测性,以及发包商具有高技术水平时,应在相应的业务流程上制定高奖惩强度。每一项业务流程模块化度对另一项奖惩强度系数的影响依赖于流程间的相关关系和服务商的风险规避度。流程间的互补性增大了对易观测流程的奖惩强度,流程间的替代性促使在易观测流程上使用低的奖惩强度。流程的不易测量性降低了奖惩强度。
     (4)在BPO交易价值函数为柯布道格拉斯生产函数的两项业务流程外包中,使用了激励机制。当服务商具有高技术水平和管理水平、低成本系数和不确定性,且DBPM高时,发包商将获得高利润。当业务流程的重要性越高、不确定性越低,以及服务商的该项流程技术水平越高时,该项流程上的激励强度越高。当一项业务流程的模块化度越高、服务商的该项流程技术水平越高时,在另一项业务流程上的激励强度越高。
     (5)在存在双边道德风险的单项流程外包中,发包商与服务商可能建立彼此都以整体利益为重的关系契约。研究发现,如果在设计关系契约时不考虑DBPM的影响,那么DBPM的变动将会影响关系契约的建立。当DBPM较高、服务商具有高技术水平和低服务成本时,服务商的收益分享率会较高。
     (6)在两项业务流程产出都不能被第三方验证的两项流程外包中,发包商和服务商只能建立关系契约,此时服务商没有违背关系契约的动机。当DBPM较高时,发包商和服务商很容易建立关系契约,发包商将获得高利润。当发包商非常重视与服务商的合作时,发包商将会与服务商建立最优关系契约,并提供最高奖金额。当发包商不很重视与服务商的合作时,发包商将会与服务商建立次优关系契约,此时DBPM越高,奖金额也越高。
     本文创新之处在于将DBPM的影响引入到激励契约模型的构建中。主要创新点包括以下三点。
     第一,本文首次分析了BPO中DBPM的影响因素,提出了一种测量DBPM的方法,拓展了有关模块化度测量的研究。第二,本文在设计BPO正式激励契约时创造性地引入了DBPM的影响,分别建立了单流程外包下考虑DBPM影响的BPO激励契约和多流程外包下考虑DBPM影响的激励契约,推进了有关业务流程模块化度对契约设计的影响的研究。第三,本文利用重复博弈模型分别构建了考虑业务流程模块化度的影响的两项业务流程外包关系契约模型,以及在双边道德风险下考虑DBPM影响的单流程外包关系契约模型,丰富了有关服务外包关系契约的研究。
Finns increasingly disaggregate business processes and source them on a global basis. Business process outsourcing (BPO) is expected to be "the next big wave" in the development of information technology services. As a major base undertaking international outsourcing service, China has been valued increasingly by contracting countries. China's service outsourcing industry has been highly valued by the Chinese government.
     Enterprises will encounter many risks in the implementation of BPO. The research problems in this paper are how to design contracts under the situations of one business process and two business processes outsourced, in order to effectively address moral hazards and multi-task agency problem in BPO, and promote long-term stable cooperation between service providers and contracting firms. In order to make the contracts more efficient, the impact of business process modularity should be considered in the contractual design.
     This dissertation includes seven chapters. The first chapter introduces the research background, research questions and research significance, research route and the structure of dissertation. Chapter Ⅱis the part of theoretical basis and literature review. In chapter Ⅲ, the concept of the degree of outsourced business process modularity (DBPM), the influencing factors and measurement method of DBPM, the impacts of DBPM on BPO contract design are proposed and analyzed, In chapter Ⅳ, the contracts with the impact of DBPM are designed in the presence of unilateral and bilateral moral hazard when single business process is outsourced. In chapter V, the contracts with the linear form of revenue function, and with the form of Cobb-Douglas production function are designed respectively under the situation of two business processes outsourced. In chapter Ⅵ, two long relational contracts are designed under the situation of two business processes outsourced, and under the situation of single business process outsourced with the existence of bilateral moral hazard respectively. The last chapter summarizes the work and conclusions of this dissertation, and also points out the defects in the research and the research directions.
     The dissertation points out that market factors and business process factors affect DBPM. DBPM affects costs and risks in BPO and is an important factor affecting the BPO contract design. In the respect of contractual design, there are six conclusions.
     (1) In single business process outsourcing with the presence of unilateral moral risk, incentive mechanism and R&P (rewards and punishments) mechanism are used to solve moral hazards. The results show that, when DBPM is high, a high incentive Intensity factor and a high R&P Intensity factor should be used, and the contract provider (the client firm) will be highly profitable. When the outsourced business process is with high uncertainty, a low incentive Intensity factor and a high R&P Intensity factor should be used and the client firm will receive low profit. When the outsourced business processes is unobserved to a large extent, a high incentive Intensity factor and a low R&P Intensity factor should be used and the client firm will receive low profit. When the service provider is with a low degree of risk aversion, a high incentive Intensity factor and a high R&P Intensity factor should be used. When the service provider's technical level is high, a high incentive Intensity factor should be used and the client firm will receive high profit. When DBPM is low, the client firm would not buy the information system to monitor the service provider.
     (2) In single business process outsourcing with the presence of bilateral moral hazards, incentive mechanism is used. The results suggest that the only use of incentive mechanism will not completely solve the bilateral moral hazards. When the service provider has a high level of technology and low cost, the client firm will gain high profit. When the service provider has technical and cost advantages, or only has a sufficiently high technical advantage or cost advantage, and DBPM is high, the client firm will gain high profit. When DBPM is higher, or the service provider is with a higher level of technical and lower cost factor, a higher revenue sharing coefficient should be provided for the service provider.
     (3) In two business processes outsourcing with the linear function of BPO business value, R&P mechanism is used. The results show that when an outsourced business process is with high degree of modularity, low non-observation, as well as the service provider is with high-tech level on the business process, a high R&P Intensity factor should be used on the corresponding business process. The impact of each DBPM on the R&P Intensity factor that is used on the other business process depends on the relationship between two cost functions of the business processes and service provider's degree of risk aversion. The complementarity between the two processes increases the R&P Intensity factor used on the easily observed business process. The substitution promotes the use of a low R&P Intensity factor on the easily observed business process. The measurement difficulty of business process lowers the R&P Intensity factor.
     (4) In two business processes outsourcing with Cobb-Douglas production function, incentive mechanism is used. The results show that when the service provider has a high level of technique and management, low cost coefficient and low uncertainties, and DBPM is high, the client firm will gain high profit. When a outsourced business process is with higher importance, lower uncertainty, and the service provider has a higher level of process technology, a higher incentive Intensity factor should be used on the business process. When the modularity degree of an outsourced business process is higher, the service provider has a higher level of technology on the process, the incentive Intensity factor on the other busies process should be higher.
     (5) In single business process outsourcing with the presence of bilateral moral hazard, the client firm and the service provider may build a relational contract, which requires both of the client firm and the service provider put the union benefit on the first place. The study found that if the impact of DBPM is not considered in the design of relational contracts, then the change of DBPM will affect the establishment of relational contract between the client firm and the service provider. When DBPM is high and the service provider has a high level of technique and low service costs, the service provider's revenue sharing rate would be high.
     (6) In two business processes outsourcing with the outputs of two business processes unverifiable to a third party, the client firm and the service provider can build relational contract. The service provider will not violate the contract. When DBPM is high, the client firm and the service provider can build relational contract easily and the client firm will gain high profit. When the client firm attaches much enough importance to the cooperation with the service provider, the client firm and the service provider will establish the optimal relational contract and provide the highest prize. When the client firm does not attach much enough importance to the cooperation, the client firm and the service provider will establish the second-best relational contract. At this time, when DBPM is higher, the prize will be higher.
     The innovation of this dissertation is the introduction of the impact of DBPM into the design of incentive contracts. This dissertation has three innovation points.
     Firstly, this is the first analysis of the affecting factors of DBPM in BPO, and proposes a method to measure the degree of DBPM, expanding the research on modularity measurement.
     Secondly, this dissertation introduces creatively the impact of DBPM in the design of formal incentive contract. The formal contract with the impact of DBPM under the situation of single business process outsourcing and the formal contract with the impact of DBPM under the situation of two processes outsourcing are established respectively, by using principal-agency model. This boosts the research on the impacts of business process modularity on contract design.
     Thirdly, the relational contract with the impact of DBPM under the situation of two business process outsourcing and the relational contract with the impact of DBPM under the situation of single-process outsourcing with the existence of bilateral moral hazards are constructed respectively by using repeated game model, enriching the research on relational contract under the situation of service outsourcing.
引文
[1]陈灿.当前国外关系契约研究浅析[J].外国经济与管理,2004,Vol.26(12):10-14
    [2]但斌,宋寒,张旭梅.合作创新下考虑双边道德风险的研发外包合同[J].研究与发展管理,2010,Vol.22(2):89-95
    [3]邓春平,毛基业.关系契约治理与外包合作绩效[J].南开管理评论,2008,Vol.11(4):25-33
    [4]樊治平,王岩.信息技术外包决策的对策分析方法[J].管理工程学报,2002,Vol.116(13):5-8
    [5]范体军,李宏余,常香云,等.基于业务流程和合同时间的业务外包策略模型研究[J].管理评论,2007,Vol.19(11):55-62
    [6]江兵,夏晖,刘洪.企业信息技术外包的策略分析[J].管理工程学报,2002,Vol.16(2):38-41
    [7]康枫.业务流程外包的动态道德风险防范机制及其仿真分析[J].系统管理学报,2010,Vol.19(3):298-304.
    [8]康毅,崔南方,林淑贤.信息不对称下外包激励机制研究[J].管理评论,2007,Vol.19(2):52-56
    [9]李华,常静,董明.服务外包系统管理[M].北京:科学出版社,2009
    [10]李雷,忻展红.多任务委托—代理关系中电信服务提供商的激励机制研究[J].运筹与管理,2007,Vol.16(6):152-156
    [11]李丽君,黄小原,庄新田.双边道德风险条件下供应链的质量控制策略[J].管理科学学报,2005,Vol.8(1):42-47
    [12]李廉水,岳贤平,崔维军.双边道德风险条件下科技人员的激励薪酬契约[J].财经研究,2008,Vol.34(9):17-27
    [13]李平.浅析业务流程外包的标准化[J].标准科学,2009(9):29-32
    [14]李双燕,万迪防,史亚蓉.基于正式契约和关系契约的BPO治理机制研究[J].经济管理,2008,Vol.30(18):4-8
    [15]李小卯,寇纪淞,李敏强.战略性信息技术外包.中国软科学,1998(10):113-118
    [16]李小卯,李敏强,寇纪淞.关于信息技术外包资源管理模式的研究.系统工程理论与实践,1999(9):10-15
    [17]李小卯,张建军.基于Internet的资源外包与企业创新[J].中国软科学,2003(1):93-99
    [18]李小卯.信息技术外包套牢问题的研究[J].系统工程理论与实践,2002(3):26-31
    [19]梁静,蔡淑琴,吴颖敏.信息共享程度对物流外包激励契约的影响[J].中国管理科学,2006,Vol.14(1):100-105
    [20]刘国红.企业后勤服务外包的理论与实践[M].镇江:江苏大学出版社,2010
    [21]刘新民,温新刚,丁黎黎.风险投资中的双边道德风险规避研究[J].科技管理研究,2010(5):212-215
    [22]刘新民,温新刚,吴士健.基于过度自信的双边道德风险规避问题[J].上海交通大学学报,2010,Vol.44(3):373-377
    [23][美]瑞克·L·克里克,[美]托马斯·N·杜宁著.业务流程外包(BPO):获取竞争优势的商业模式[M].李华,廖貅武译.西安:西安交通大学出版社,2007
    [24]孟国保,苏秦.软件企业业务外包管理过程研究[J].软科学,2004(3):90-93.
    [25]倪明,徐福缘.基于软件公司评价的企业信息化合作伙伴模型[J].计算机工程,2005,(11):92-99.
    [26]彭本红,李守伟.复杂产品模块化外包的最优合同设计[J].经济管理,2009,Vol.31(2):139-143
    [27]让-雅克·拉丰,大卫·马赫蒂摩.激励理论(第1卷):委托代理模型[M].北京:中国人民大学出版社,2002,110-233
    [28]斯图尔特·克莱门茨,迈克尔·唐纳兰.CFO的观点——通过财务业务流程外包取得良好业绩[M].钱逢胜,武超,陈静静,李凯译.上海财经大学出版社,2009,83-92
    [29]宋寒,但斌,张旭梅.不对称信息下服务外包中的客户企业参与机制[J].系统管理学报,2011,Vol.20(1):56-62
    [30]宋寒,但斌,张旭梅.服务外包中双边道德风险的关系契约激励机制[J].系统工程理论与实践,2010,Vol.30(11):1944-1953
    [31]孙林岩,高杰,李刚.业务流程外包的概念化分析[J].管理学报,2004,Vol.1(2):217-221
    [32]谈毅,慕继丰.论合同治理和关系治理的互补性与有效性[J].公共管理学报,2008,Vol.5(3):56-62
    [33]田厚平,刘长贤.非对称信息下分销渠道中的激励契约设计[J].管理科学学报,2009,Vol.12(3):77-82
    [34]田盈,蒲勇健.多任务委托—代理关系中激励机制优化设计[J].管理工程学报,2006,Vol.20(1):24-26
    [35]完世伟,杨忠直.基于多任务委托的工程监理委托—代理分析[J].工业工程,2006,Vol.9(3):37-39
    [36]汪森军,张维迎.多任务下的协调和授权[J].经济学(季刊),2006,Vol.5(2):427-448.
    [37]王安宇,司春林,骆品亮.研发外包中的关系契约[J].科研管理,2006,Vol.27(6):103-108.
    [38]王安宇,司春林.基于关系契约的研发联盟收益分配问题[J].东南大学学报,2007,Vol.37(4):700-705.
    [39]王安宇.研发外包契约类型选择:固定支付契约还是成本附加契约[J].科学管理研究,2008,Vol.26(4):34-37
    [40]王海峰,罗发友.多任务委托代理下营销渠道中间商的激励机制研究[J].统计与决策,2009(20):174-175
    [41]王建军,杨德礼.企业信息系统外包机理研究[J].大连理工大学学报(社会科学版),2006,Vol.27(3):49-55
    [42]王梅源,鲁耀斌.软件项目外包风险管理中的承包方评价与选择[J].统计与决策,2005(4):59-62
    [43]王欣荣,樊治平.信息系统外包决策的一种模糊决策方法[J].东北大学学报(自然科学版),2002,Vo1.23(8):750-753
    [44]王颖,王方华.关系治理中关系规范的形成及治理机理研究[J].软科学,2007,21(2):67-70
    [45]吴崇,谢中东.多任务委托代理模型下经营者管理协同激励机制研究[J].技术经济,2007,Vol.26(10):41-45
    [46]吴锋,李怀祖.知识管理对信息技术和信息系统外包成功性的影响.科研管理,2004,Vol.25(2):82-87
    [47]吴华清,梁樑,古继宝.基于关系契约的长期研发合作机制研究[J].科学学研究,2007,Vol.25(1):141-146
    [48]吴亦汉,周永务.考虑双边败德的供应链最优契约研究[J].合肥工业大学学报(自然科学版),2008,Vol.31(8):1245-1249
    [49]武芳,严丽芳.通过战略合作管理企业信息技术资源-----企业信息系统外包及其ASP模式分析[J].管理工程学报,2002(2):72-74
    [50]谢旭.全程信用管理实务与案例:销售与回款业务流程整体解决方案[M].北京:中国发展出版社,2007,5~63
    [51]徐姝.西方业务外包研究成果评价[J].外国经济与管理,2003(12):13-17
    [52]徐细雄,淦未宇.基于多任务代理模型的管理者动态报酬契约设计[J].中国管理科学,2008(16):17-22
    [53]杨宝军,侯立文.基于Nested Logit模型的IT外包供应商选择[J].工业工程与管理,2009(1):71-74
    [54]杨波.IT外包的控制机制研究.管理学报,2005,Vol.2(5):572-575.
    [55]杨海蔚,董安邦.企业信息技术外包浅析[J].情报科学,2002,Vol.20(7):772-774.
    [56]杨英,霍国庆.企业信息技术资源外包及其风险分析[J].中国软科学,2001(3):98-102
    [57]殷红春,黄宜平.多任务委托工程监理激励机制设计[J].现代财经,2006(9):43-46
    [58]袁江天,张维.多任务委托代理模型下国企经理激励问题研究[J].管理科学学报,2006,Vol.9(3):45-53.
    [59]张翠华,黄小原.非对称信息条件下业务外包的质量评价和转移支付决策[J].管理工程学报,2004,Vol.18(3):82-86
    [60]张海峰,李华.委托代理关系下IT外包的激励机制研究[J].科技管理研究,2008,Vol.28(4):93-95
    [61]张维迎.博弈论与信息经济学[M].上海:上海人民出版社,2004
    [62]张子健,刘伟.供应链合作产品开发中的双边道德风险与报酬契约设计[J].科研管理, 2008,Vol.29(5):102-110
    [63]郑克俊.供应链管理环境下的企业业务外包及优劣研究[J].软科学,2002(2),90-92,96.
    [64]左美云,杨波,陈禹.企业信息技术外包的过程研究[J].中国软科学,2003(7):84-87
    [65]Agrawal P. Double moral hazard, monitoring, and the nature of contracts[J]. Journal of Economics,2002, Vol.75 (1):33-61
    [66]Al-Najjiar N I. Incentive contracts in two-sided moral hazards with multiple agents[J]. Journal of Economic Theory,1997,74:174-195
    [67]Anderson S W, Dekker H C. Management control for market transactions:The relation between transaction characteristics, incomplete contract design, and subsequent performance[J]. Management Science, December 2005, Vol.51 (12):1734-1752
    [68]Apte U, Sobol M, Hanaoka S, et al. IS outsourcing practices in the USA, Japan, and Finland: A comparative study[J]. Journal of Information Technology,1997, Vol.12 (4):289-304
    [69]Aron R, Singh J V. Getting offshoring right[J]. Harvard Business Review,2005,83 (12): 135-143
    [70]Bahli B, Rivard S.Validating measures of information technology outsourcing risk factors[J]. Omega, April 2005, Vol.33 (2):175-187
    [71]Baiman S, Fischer PE, Ajan MV. Information, contracting and quality costs[J]. Management Science,2000, Vol.46 (6):776-789
    [72]Baker G, Gibbons R, Murphy KJ. Relational contracts and the theory of the firm[J]. Quarterly Journal of Economics,2002, Vol.117 (1):39-84
    [73]Baker G, Gibbons R, Murphy KJ.Subjective performance measures in optional incentive contracts[J].Quarterly Journal of Economics,1994,109:1125-1156
    [74]Balachandran KR, Radhakishnan S. Quality implications of warranties in a supply chain[J]. Management Science, August 2005,51 (8):1266-1277
    [75]Barthelemy J, Geyer D. An empirical investigation of IT outsourcing versus quasi-outsourcing in France and Germany[J]. Information& Management,2005(42):533-542
    [76]Barthelemy J. The hard and soft side of IT outsourcing management[J]. European Management Journal,2003, Vol.21 (5):539-548
    [77]Besanko D. Regibeau P, Rockett K E. A multi-task principal-agent approach to organizational form[J]. The Journal of Industrial Economics, December 2005, Vol.53(4): 437-467
    [78]Bhattacharyya S, Lafontaine F. Double-sided moral hazard and the nature of share contracts[J]. RAND Journal of Economics,1995, Vol.26(4):761-781
    [79]Chang J J, Lai C C, Lin C C. Profit sharing, worker effort, and double-sided moral hazard in an efficiency wage model[J]. Journal of Comparative Economics,2003,31:75-93
    [80]Chanvarasuth P. The impact of business process outsourcing on firm valuation:An empirical study [D]. Rensselaer Polytechnic Institute,2005
    [81]Chau D K Y, Firth M, Srinidhi B. Leases with purchase options and double moral hazard[J]. Journal of Business Finance & Accounting,2006, Vol.33 (9-10):1390-1401
    [82]Cooper R T, Ross W. Product warranties and double moral hazard[J]. Rand Journal of Economics, Spring 1985, Vol.16 (1):103-113
    [83]Corbett C J, Decroix G A, Ha AY. Optimal shared-savings contracts in supply chains:linear contracts and double moral hazard[J]. European Journal of Operational Research,2005, Vol.163 (3):653-667
    [84]Cutcheon D M, Stuart F. Issue in the choice of supplier alliance partners[J]. Journal of Operation Management,2000 (18):297-301
    [85]Daido K. Formal and relational incentives in a multitask model[J]. International Review of Law and Economics,2006,26:380-394
    [86]Davenport T, Thomas H. Process innovation reengineering work through information technology[M]. Harvard Business School Press,1993
    [87]Demougin D, Fluet C. Monitoring versus Incentives [J]. European Economic Review,2001, Vol.45 (9):1741-1764
    [88]Demski J S, Sappington D E M. Resolving double moral hazard problems with buyout agreements [J]. RAND Journal of Economics, Summer 1991, Vol.22 (2):232-240
    [89]Desgagne SB. How to restore higher - powered incentives in multitask agencies[J]. The Journal of Low, Economy and Organization,1999, Vol.15 (2):418-433
    [90]Dey D, Fan M, Zhang C. Design and analysis of contracts for software outsourcing [J].Information Systems Research, March 2010, Vol.21 (1):93-114
    [91]Dibbern J, Winkler J, Heinzl A. Explaining variations in client extra costs between software projects offshored to India[J]. Management Information Systems Quarterly,2008, Vol.32 (2):333-366
    [92]Doornik K. Relational contracting in partnerships [J]. Journal of Economics & Management Strategy,2006, Vol.15 (2):517-548
    [93]Downing C E, Field J M, Ritzman L P. The value of outsourcing:a field study[J]. Information System Management.2003(Winter):86-91.
    [94]Earl M J. The risks of outsourcing IT[J]. Sloan Management Review,1996, Vol.37 (3): 26-32
    [95]Ellram, Billington C. Purchasing leverage considerations in the outsourcing decision[J].European Journal of Purchasing&Supply Management,2001 (7):15-27
    [96]Fama E. Agency Problems and the theory of the firm[J]. Journal of Political Economy,1980, 88:288-307
    [97]Fehr E, Schmidt KM. Fairness and incentive in a multi-task principal-agent model [J]. The Scamdomavoam Journal of Economics,2004, Vol.106 (3):453-474
    [98]Feltham G A, Xie J. Performance measure congruity and diversity in multi-task principal/agent relations [J]. Accounting Review,1994, Vol.69 (3):429-453
    [99]Gartner Group. Vendor seek clear role in SMB market[R].Gartner Dataquest report ITSM-NA-MT-0108, Janauary2004.
    [100]Gavious A, Rabinowitz G. Optimal knowledge outsourcing model[J]. Omega,2003(31): 451-457
    [101]Ge L. Strategic choices for business process sourcing [D]. Austin:The University of Texas at Austin,2008
    [102]Gewald H, Dibbern J. Risks and benefits of business process outsourcing:A study of transaction services in the German banking industry[J]. Information & Management,2009, 46:249-257
    [103]Goo J, Kishore R, Rao H R, et al. The role of service level agreements in relational management of information technology outsourcing:An empirical study[J]. MIS Quarterly, 2009, Vol.33 (1):119-145
    [104]Graf M, Mudambi S M. The outsourcing of IT-enabled business processes:A conceptual model of the location decision[J]. Journal of International Management,2005 (11):253-268
    [105]Greenberg P S, Greenberg R H, Antonucci Y L. The role of trust in the governance of business process outsourcing relationships:A transaction cost economics approach[J]. Business Process Management Journal,2008, Vol.14 (5):593-608
    [106]Grover V, Cheon M J, Teng J T C. The effect of service quality and partnership on the outsourcing of information systems functions [J]. Journal of Management Information Systems,1996, Vol.12(4):89-116
    [107]Grover V, Joong M, Cheon, et al. A descriptive study on the outsourcing of information systems functions[J]. Information & Management,1994(27):33-44
    [108]Gurtler O. On delegation under relational contracts[J]. International Journal of the Economics of Business,2008, Vol.15(1):85-98
    [109]Hammer M, Champy J. Reengineering the corporation-a manifesto for business revolution[M]. Nicholsa Brealey,1993
    [110]Holmstrom B, Milgrom P. Multi-task principal-agent analyses:Incentive contracts, asset ownership and job design[J]. Journal of Law,Economics and Organization,1991,7:24-52
    [111]Holmstrom B. Moral Hazard In teams [J]. Bell Journal of Economics,1982,13:324-340
    [112]Hu Q, Saunders C, Gebelt M. Diffusion of information systems outsourcing:A reevaluation of influence sources[J]. Information Systems Research,1997, Vol.8(3):288-301
    [113]Infosys, Global delivery model[R]. Retrieved January 6,2007, from
    [114]http://www.infosys.com/gdm/default.asp.
    [115]Insinga R C, Werle M J. Ling Outsourcing to business strategy[J]. Academy of Management Executive,2000, Vol.14 (4):58-70
    [116]Jenson M C, Meckling W H. Theory of the Firm:Managerial Behavior, Agency Costs and Ownership Structure[J]. Journal of Financial Economics,1976, Vol.3 (4):305-360
    [117]Barthelemy J. The hard and soft sides of IT outsourcing management [J]. European Management Journal, October 2003, Vol.21 (5):539-548
    [118]Johnson L K. Successful business process outsourcing[J]. MIT Sloan Management Review, 2006, Vol.47(2):5-6
    [119]Jurison J. The role of risk and return in information technology outsourcing decisions[J]. Journal of Information Technology,1995, Vol.10 (4):239-247
    [120]Kern T, Willcocks L, van Heck E. The winner's curse in IT outsourcing:strategies for avoiding relational trauma[J]. California Management Review 2002, Vol.44 (2):47-69
    [121]Ketler K, Walstrom J. The outsourcing decision[J]. International Journal of Information Management,1993 (13):449-459
    [122]Khalfan A M. Information security considerations in IS/IT outsourcing projects:a descriptive case study of two sectors [J]. International Journal of Information Management,2004 (24): 29-42
    [123]Kim S K, Wang S. Linear Contracts and the Double Moral-hazard[J]. Journal of Economic Theory,1998, Vol.82 (3):342-378
    [124]Klepper R, Jones W O. Outsourcing information technology systems and services[M]. Englewood cliff, NJ:Prentice-Hall,1998
    [125]Kreps D, Wilson R. Reputation and imperfect information[J]. Journal of Economic Theory, 1982,27:253-279
    [126]Lacity M C, Willcocks L P. An Empirical Investigation of Information Technology Sourcing Practices:Lesson From Experience[J]. MIS Quarterly, September 1998:363-408.
    [127]Lacity M C, Willcocks L P, Feeny D F. The value of selective IT sourcing[J]. Sloan Management Review,1996, Vol.37 (3):13-25
    [128]Lacity M C, Hirschheim R. Information systems outsourcing:myths, metaphors and realities[M].1993, Wiley, Chichester, UK
    [129]Laffont J J, Martimort D. The theory of incentives[M]. Princeton University Press,2002
    [130]Lafontaine F. Agency theory and franchising:Some empirical results [J]. Rand Journal of Economics,1992, Vol.23 (3):263-283
    [131]Lai E L C, Riezman R, Wang P. Outsourcing of innovation [J]. Economic Theory,2009, Vol.38 (3):485-515
    [132]Lee J N, Kim Y G. Effect of partnership quality on IS outsourcing success:conceptual framework and empirical validation [J]. Journal of Management Information Systems,1999, Vol.15 (4):29-61
    [133]Lee J N, Kim Y G. Exploring a causal model for the understanding of outsourcing partnership [C]. Proceedings of the 36th Hawaii International Conference on System Sciences,2002 IEEE Computer Society
    [134]Lee J N. The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success [J]. Information & Management, April 2001, Vol.38 (5):323-335
    [135]Leonardi P, Bailey D. Transformational technologies and the creation of new work practices:Making implicit knowledge explicit in task-based offshoring[J]. Management Information Systems Quarterly,2008, Vol.32 (2):411-436
    [136]Levin J. Relational incentive contracts[J]. American Economic Review,2003, Vol.93 (3): 835-857
    [137]Levina N, Vaast E. Innovating or doing as told? Status differences and overlapping boundaries in offshore collaboration[J]. Management Information Systems Quarterly,2008, Vol.32 (2):307-332
    [138]Lewis T, Sappington D. Technological change and the boundaries of the firm[J]. American Economic Review,1991 (9):887-900
    [139]Loh L, Venkatraman N. Determinants of information technology outsourcing:A cross-sectional analysis. Journal of Management Information Systems,1992a, Vol.9 (1): 7-24.
    [140]Loh L, Venkatraman N. Diffusion of information technology outsourcing:Influence sources and the Kodak effect[J]. Information Systems Research,1992b, Vol.3 (4):334-358
    [141]Long N V. Outsourcing and technology spillovers[J]. International Review of Economics and Finance,2005 (14):297-304
    [142]Mann D P, Wissink J P. Money-back contracts with double moral hazard[J]. Rand Journal of Economics,1988, Vol.19 (2):285-292
    [143]McFarlan F W, Nolan R L. How to manage an IT outsourcing alliance[J]. Sloan Management Review,1995, Vol.36 (2):9-23
    [144]Michell V, Fitzgerald G. The IT outsourcing market-place:Vendors and their selection[J]. Journal of Information Technology,1997, Vol.12 (3):223-237
    [145]Mikkola, J H. Capturing the Degree of Modularity Embedded in Product Architectures [J]. Journal of Product Innovation Management,2006,23:128-146
    [146]Miozzo M, Grimshaw D. Modularity and Innovation in Knowledge-Intensive Business Services:IT outsourcing in Germany and the UK[J]. Research Policy,2005, Vol.34(9): 1419-1439
    [147]Miranda S, Kim Y. Professionalism versus political contexts:Institutional mitigation and the transaction cost heuristic in information systems outsourcing[J]. Management Information Systems Quarterly,2006, Vol.30 (3):725-753
    [148]Mirrlees JA. The theory of moral hazard and unobservable behavior:Part I[J]. Review of Economic Studies,1999, Vol.66(1):3-21
    [149]Mohr J, Spekman R. Characteristics of partnership success:partnership attributes, communication behavior, and conflict resolution techniques[J]. Strategic Management Journal,1994, Vol.15 (2):135-152
    [150]Ngwenyama OK, Bryson N.Making the information systems outsourcing decision:A transaction cost approach to analyzing outsourcing decision problems [J]. European Journal of Operational Research,1999, Vol.115 (2):351-367
    [151]Niranjan T T,Saxena KBC, Bharadwaj S S. Process-oriented taxonomy of BPOs:an exploratory study[J]. Business Process Management Journal,2007, Vol.13 (4):588-606
    [152]Oh W. Why do some firms outsource IT more aggressively than others? the effects of organizational characteristics on IT outsourcing decisions[C]. Proceedings of the 38th Hawaii International Conference on System Science,2005
    [153]Osei-Bryson KM, Ngwenyma OK. Managing risks in information systems outsourcing:an approach to analyzing outsourcing risks and structuring incentive contracts[J]. European Journal of Operational Research,2006,174 (1):245-264
    [154]Pennington E d. Approaching the location of international call centers from a secure perspective[J]. Call Center CRM Solutions,2000, Vol.19 (4),86-90
    [155]Plambck E L, Taylor T A. Partnership in a dynamic production system with unobservable actions and noncontractible output [J]. Management Science,2006, Vol.52(10).1509-1527
    [156]Poppo L, Zenger T. Formal contracts and relational governance function as substitutes or complements [J]. Strategic Management Journal,2002, Vol.23 (8):707-725
    [157]Puelz R. Optimal incentive contracting with exante and expost moral hazard:Theory and evidence[J]. Journal of Risk and Uncertainty,1997, Vol.14 (2):169-188
    [158]Quelin B, Duhanmel F. Bringing together strategic outsourcing and corporate strategy: outsourcing motives and risks [J]. European Management Journal,2003 (5),647-661
    [159]Quinn J B, Hilmer F G. Strategic Outsourcing [J]. Sloan Management Review,1994, Vol.35 (4):43-55
    [160]Radner R. Monitoring cooperature agreement in a repeated principal-agent relationship [J]. Econometrica,1981,49:1129-1148
    [161]Rayo L. Relational incentives and moral hazard in teams[J]. Review of Economic Studies, 2007,74:937-963
    [162]Ren S J F, Ngai E W T, Cho V. Examining the determinants of outsourcing partnership quality in Chinese small-and medium-sized enterprises [J]. International Journal of Production Research,2010, Vol.48 (2):453-475
    [163]Richardson R, Marshall J N. Teleservices, call centres and urban and regional development[J]. The Services Industry Journal,1999, Vol.19(1):96-116
    [164]Rubbinstein A. Perfect equilibrium in a bargaining model[J]. Econometrica,1982,50:97-109
    [165]Shi Y W. Today's solution and tomorrow's problem:the business process outsourcing risk management puzzle[J]. California Management Review,2007, Vol.49 (3):27-44
    [166]Sia S K, Koh C, Tan C X. Strategic maneuvers for outsourcing flexibility:An empirical assessment[J]. Decision Sciences, August 2008, Vol.39 (3):407-443
    [167]Slade M E. Multitask agency and contract choice:an empirical exploration[J]. International Economic Review,1996, Vol.37 (2):465-486
    [168]Sobol M, Apte U. Domestic and global outsourcing practices of America's most effective IS users[J]. Journal of Information Technology,1995, Vol.10 (4):269-280
    [169]Susarla A, Barua A, Whinston A B. Multitask agency, modular architecture, and task disaggregation in SaaS[J]. Journal of Management Information Systems,2010, Vol.26 (4): 87-117
    [170]Tan C X, Sia S K. Managing flexibility in outsourcing[J]. Journal of the Association for Information Systems, April 2006, Vol.7 (4):179-206
    [171]Tanriverdi H, Konana P, Ge L. The choice of sourcing mechanism for business processes[J].Information Systems Research,2007, Vol.18(3):280-299
    [172]Taylor T A, Plambeck E L. Simple relational contracts to motivate capacity investment: Price only vs price and quantity[J]. Manufacturing & Service Operations Management, Winter 2007, Vol.9 (1):94-113
    [173]Taylor T A. Plambeck E L. Supply chain relationships and contracts:The impact of repeated interaction on capacity investment and procurement[J]. Management Science, October 2007, Vol.53 (10):1577-1593
    [174]Thiele V. Performance measurement in multi-task agencies[J]. Research in Economies, 2007,61:148-163
    [175]Tiwana A, Bush A. A comparison of transaction cost, agency, and knowledge-based predictors of IT outsourcing decisions:A U.S.-Japan cross-cultural field study[J]. Journal of Management Information Systems,2007, Vol.24 (1):259-300
    [176]Tiwana A. Does interfirm modularity complement ignorance? a field study of software outsourcing alliances[J]. Strategic Management Journal,2008a, Vol.29 (11):1241-1252
    [177]Tiwana A. Does technological modularity substitute for control? a study of alliances performance in software outsourcing[J]. Strategic Management Journal,2008b, Vol.29(7):769-780
    [178]Ulset S. R&D outsourcing and contractual governance:an empirical study of commercial R&D projects [J]. Journal of Economic Behavior & Organization,1996, Vol.30 (1):63-82
    [179]Veknatesna R. Strategy sourcing:to make or not to make[J]. Harvard Business Review, 1992(11-12):98-108
    [180]Venkatesan R.Strategy sourcing:to make or not to make[J]. Harvard Business Review, 1992,11-12
    [181]Voss C A, Mikkola J H. Service architecture and modularity [J]. Decision Sciences,2009, Vol.40 (3):541-569
    [182]Walden E. Intellectual property rights and cannibalization in information technology outsourcing contracts[J]. Management Information Systems Quarterly,2005, Vol.29 (4): 699-721
    [183]Weidenbaum M. Outsourcing:pros and cons[J].Business Horizons.2005(48)311-315
    [184]Wei gelt C. The impact of outsourcing new technologies on integrative capabilities and performance[J].Strategic Management Journal, Jun2009, Vol.30 (6):595-616
    [185]Willcocks LP, Feeny D. IT Outsourcing and core IS apabilities:challenges and lessons at DUPONT[J]. Information Systems Management.ABI/INFORM Global,2006 (1) "49-56
    [186]Willcocks L P, Kern T. IT Outsourcing as strategic partnering:the case of the UK inland revenue [J], European Journal of Information Systems,1998, Vol.7 (1):29-45
    [187]Willcocks L.IT outsourcing:maximize flexibility and control[J]. Harvard Business Review,1995 (5):84-93
    [188]Wipro, "Enterprise management, " Retrieved January 6,2007, from http://www.wipro.com/webpages/itservices/industries/utilities/enterprise_mgmt.htm
    [189]Wullenweber K, Beimborn D, Weitzel T, et al. The impact of process standardization on business process outsourcing success[J]. Information System Front,2008, Vol.10(2):211-224
    [190]Yang C, Huang J B. A decision model for IS outsourcing[J]. International Journal of Information Management,2000 (20):225-239
    [191]Yang D H, Kim S, Nam C, et al. Developing a decision model for business process outsourcing [J]. Computers & Operations Research,2007 (34):3769-3778
    [192]Zeckhauser R. Medical insurance:A case study of the tradeoff between risk spreading and appropriate incentives[J]. Bell Journal of Economics,1970, Vol.6 (6):552-579
    [193]Zhou W, Bandyopadhyay S, Cheng H K, et al. A mechanism for on-line advertisement placement to deter click fraud[J]. International Journal of Electronic Commerce,2008, Vol.13 (2):9-27

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700