用户名: 密码: 验证码:
电子政务IT外包风险分析与控制策略研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
伴随信息技术的飞速发展和社会分工的进一步细化,外包这一模式越来越多的被各行业所熟悉和应用。而引入外包机制发展电子政务是当前国内外电子政务建设的总体趋势。随着我国信息化发展水平的不断提高,电子政务IT外包市场正逐步形成并完善,IT外包模式对于提升我国电子政务的建设和服务水平,有效降低建设成本起到了越发重要的作用。
     但是,在充分体会和享受外包模式给我们带来的惊喜的同时,也应该清醒的认识到由于电子政务IT外包模式引入了外部利益主体,加之电子政务建设自身的复杂性,极大增加了电子政务外包项目建设的衍生性风险和不确定性风险,由此也使得电子政务IT外包具有高风险性的特点。
     本文基于政府视角对电子政务IT外包过程中的可控风险进行分析,结合当今风险管理理论和外包手段在政府管理中的运用,通过分析电子政务IT外包的风险来源、主要风险因素和风险事件,并分阶段对电子政务IT外包风险影响和控制的重要程度进行调查分析,最终得出电子政务IT外包项目的风险控制的重点,为建立一套适合中国电子政务的完整、切实可行的风险管理理论体系做出-个探索性研究。在该体系的指导下,为中国电子政务IT外包的风险管理提出对策建议,从而达到全面提高政府绩效和提升电子政务外包水平的目的。
     本文首先通过查阅资料、访谈等方法,结合电子政务IT外包项目的特点,利用IT项目生命周期理论将外包建设过程划分为三个阶段(外包准备阶段、实施阶段和完成、运维阶段),再依据风险来源不同对电子政务IT外包中的政府内部的风险和政府外部的风险进行划分,根据政府内外部风险对电子政务IT外包不同建设阶段的风险因素、风险表现和风险事件进行分析。根据外包建设不同阶段的主要风险因素和事件编制成《电子政务IT外包风险调查问卷》。在对调查数据进行统计分析后,发现各阶段风险因素对于电子政务IT外包建设影响的重要程度以及风险控制的重点,并有针对性地提出不同阶段风险控制的对策建议。
     通过研究发现,电子政务引入外包模式虽节约了成本,提高了效率,但也加大了风险因素,而电子政务建设具有与企业IT外包不同的特质,政府在外包建设过程中应始终处于主导地位,并结合电子政务自身特点制定不同建设阶段的风险控制策略,尤其应重视外包准备阶段的风险分析和控制。
With the fast development of IT (information technology) and the further refinement of social division, the Outsourcing model is becoming more and more popular among all industries and is put into use widely. The adaptation of Outsourcing is the general domestic and international trends in the construction of E-Government. Along with the development of IT in our country, the E-Government IT Outsourcing market is gradually formed and perfected, and the IT Outsourcing model is playing an increasingly important role for a better construction and higher service level of China's E-Government.
     However, while we are full-understanding and deep-enjoying the pleasantly surprise that the Outsourcing brings us, we should be aware of the complexities of E-Government construction. Since the E-Government IT Outsourcing model brings in external stakeholders, the derivative risk and uncertainty risk are greatly increased, thus intensify the complexity and high risk on the construction of E-Government Outsourcing project.
     Based on the perspective of E-Government, this paper studies the risk identification and control problems in the process of IT Outsourcing. Combined with the development of risk control theories of today and the utilization of Outsourcing in the government management, the study analyzes the sources of risk, the main factors, importance of control and influence in different periods of the IT Outsourcing and concludes the focal points of risk-control for E-Government IT Outsourcing, which serves as a exploratory study for the establishment of a integrated and feasible system of theories on the risk management of China's E-Government. Beneath the guidance of this system, this paper proposes some suggestions on the risk management of China's E-Government IT Outsourcing and achieve the aim of promote performance of the government all-around and the elevate level of E-Government Outsourcing.
     Firstly, through consolation of resources, interviews and other methods, and combined with the characters E-Government, based on the lifecycle theory of the project's construction, this paper divides the construction of the E-Government IT Outsourcing into three stages (which includes Outsourcing Preparation Stage, Implementation Stage and Accomplishment and Operation Stage). The paper identifies as well as analyzes the main factors of risk of E-Government IT Outsourcing. It classifies the internal and external risk of government according to the different resources of risk in the E-Government IT Outsourcing. Based on the main risk factors in different stages, this study makes up the Questionnaires on the Risk of E-Government IT Outsourcing. After the investigation and analysis of the collected data, this study reveals the importance of the main risk factors'influence and the focal points of risk control, and provides pointed suggestions of the countermeasures.
     The study shows that although the introduction of E-Government Outsourcing model saves cost and increases efficiency, it also adds risk factors. The construction of E-Government IT Outsourcing has characters that different from the enterprise IT Outsourcing, and the government should play a guide role in the construction of Outsourcing. It also has to establish control measures for different stages according to its own characters, with special attention to the identification of risks and control on the Outsourcing preparation.
引文
[1]Aubert, B. A., Rivard, S., Patry, M. Transaction cost approach to outso urcing behavior:Some empirical evidence[J]. Information and Manage ment,1996,30(2):51-64.
    [2]Cheon MJ, Grover V,Tames TC. Theoretical Perspectives on the Outsou rcing of Information Systems[J].Journal of Information Technology, 1995, Vol.10, Pages 77-82.
    [3]Clark TD, Zmud RW, MeGray GE, The outsourcing of information service s transforming the nature of business in the information industry. Journal of Information Technology,1995.
    [4]Earl MJ. The risks of outsourcing IT Sloan Management Review.37,3, Springl996, Pages 26-32.
    [5]Lacity M, Hirsehheim R. Implementing information systems outsourcin g:key issues and experiences of an early adopter[J].Journal of Ge neral. Management,1993,19(1), Pages 17-31.
    [6]Laelty M, Hirsehheim R. Realizing outsourcing expectations. (Cover s tory)[J]. Information Systems Management,1994,11:7-18.
    [7]Laelty M, Willeoeks P, Feeny F. IT outsourcing maximize flexibility and control. Management Review,73.3May-June1995.
    [8]Martin. Haneo, Ray. Haekne. Information technology outsourcing Conce ptualizing Practice in the Public and Private Sectors-(R). Procee ding of the 32nd Hawaii International Conference on System Scienc e,1999.
    [9]Sullivan W., Ngwenyama 0. K. How are public sector organizations ma naging IS Outsourcing Risks?An analysis of outsourcing guidelines from three jurisdictions[J].Journal of computer information syst ems,2005 45(3):73-87.
    [10]Williamson O.The Economic institutions of capitalism[M].Free Pre ss,1985:105-148.
    [11][美]巴舍,[美]耶特著,孟秀转译.IT领导力[M].电子工业出版社,2005:319-330.
    [12][美]克莱拍,琼斯著,杨波等译.信息技术、系统与服务的外包[M],电子工业出版社,2003:125-134.
    [13][美]沃伦.麦克法兰,理查德.诺兰,[中]陈国青.IT战略与竞争优势[M].高等教育出版社,2003:306-325.
    [14]陈明亮.中国电子政务建设模式和政府流程再造探讨[J].浙江大学学报(人文社会科学版),2003,33(4):139-143.
    [15]陈涛.电子政务环境下信息技术外包的采纳影响因素及风险识别研究[EB/OL].http://egs.hust.edu.cn/xuekan/200917/C47D6EB5H2.html,200 9-2-23.
    [16]程明光,金一,徐立.美国电子政务管理运营模式分析[EB/OL].http://www.ccw.com.cn/applic/forum/htm2003/20030728_10M0 9.asp,2003-07-23.
    [17]丁云祥.市政建设外包中委托代理关系的博弈分析[J].西安建筑科技大学学报,2008,40(2):271-274.
    [18]董坚峰,肖丽艳.IT外包商选择和管理中的风险及其管理策略[J],重庆科技学院学报(社会科学版),2008(12):84-85.
    [19]郭捷.项目风险管理[M].国防工业出版社,2007:36-44.
    [20]洪棋新.电子政务的业务外包该怎么做?[J].上海信息,2005(75):74-75.
    [21]胡浩.信息技术资源外包的动因与风险分析[J],南京工业大学学报(社会科学版),2004(03):56-59.
    [22]胡巧思,杜蓓蕾.电子政务外包化中的政府角色探讨[J].经济师,2008(02):189-190.
    [23]江源富,乔丽娜,赵经纬.我国电子政务建设的外包模式探析[J].电子政务,2006(08):91-101.
    [24]简兆权,王建业,方兴,田宇.外包风险控制与双赢策略探讨[J].生产力研究,2007(31):132-134.
    [25]李成智,周华.电子政务外包的经济学分析[J].安阳工学院学报,2006(06):62-65.
    [26]李冠军,才金正.电子政务外包的现状及相关问题研究[J].东北大学学报(社会科学版),2006,8(01):35-37.
    [27]李清,陈禹六.信息化项目管理[M].机械工业出版社,2004:65-76.
    [28]李小卯.信息技术外包套牢问题的研究[J],系统工程理论与实践,2002(03):26-31.
    [29]梁新弘.论信息技术(IT)外包的动因、风险及防范仁[J],科技管理研究,2004(01):64-66.
    [30]林则夫,陈德泉,温坷.试论信息技术外包中的风险管理策略[J],科学学与科学技术管理,2004(2):133-135.
    [31]刘继承.企业信息系统与服务外包风险管理研究[J],情报理论与实践,2005,28(02):180-183.
    [32]陆敬筠.电子政务外包研究[J].电子政务,2007(09):75-79.
    [33]陆敬筠,钟伟进,梅姝娥.电子政务外包的BOT模式[J].统计与决策,2007(20):57-58.
    [34]陆国红,叶枫.基于生命周期的B2B电子商务项目风险识别[J].商业经济,2009(05):78-79.
    [35]卢娜.国外电子政务外包的经验与启示[J].时代经贸,2008(03):49-53.
    [36]卢淑静.电子政务IT外包风险初探[J].长春教育学院学报,2008年(04):24-26.
    [37]祁亚辉.IT风险及其风险管理[J], 海南师范学院学报,2004,17(04):109-115.
    [38]钱福培等.国际卓越项目管理评估模型及应用[M].电子工业出版社,2008.
    [39]任志涛.电子政务服务外包理论及其项目激励机制分析[J].北京理工大学学报,2007,9(03):100-104.
    [40]任志涛,张赛.电子政务服务外包及其激励机制分析[J],中国软科学,2007(07):142-146.
    [41]沈建明等.项目风险管理[M].机械工业出版社,2006:22-57.
    [42]孙学玉.企业型政府论[M].社会科学文献出版社,2004.
    [43]王长峰.现代项目风险管理[M].机械工业出版社,2007.
    [44]汪博兴、蒋其发.IT外包的业务范围及风险控制[J].企业改革与管理,2008(06)38-39.
    [45]王磊.基于生命周期的信息技术外包风险因素分析[J].陕西师范大学学报(自然科学版),2006(34):101-104.
    [46]王谦.电子政务发展中的问题对策[M].西南交通大学出版社,2010:160-166.
    [47]王雅薇.IT外包实施过程中的风险分析及控制[D].吉林大学硕士学位论文,2006:28-29.
    [48]王卓甫.工程项目风险管理——理论、方法与应用[M].中国水利水电出版社,2002:5-12.
    [49]韦沛文,陈婉玲.企业信息化教程[M].清华大学出版社,2006:238-249.
    [50]温绍国,郑小平,桂志强.信息技术外包的风险及其控制[J].经济论坛,2005(01):57-58.
    [51]吴吉义,邵晨.电子政务建设中实施项目管理的必要性[J].电子政务,2005(11):52-57.
    [52]徐漪.电子政务外包的风险与控制[J].上海信息化,2007(11):27-29.
    [53]徐漪,张兴全.基于现行政府模式的电子政务外包风险研究[J].产业与科技 论坛,2007,6(12):167-169.
    [54]许通安.政府机关资讯科技委托外包关键因素之探讨[D].台湾:中原大学,2006:20-23.
    [55]严玲、尹贻林.公共项目治理[M].天津大学出版社,2006.
    [56]杨波,左美云,方美琪.信息技术外包理论和实务评述[J].外国经济与管理,2003,25(9):7-11.
    [57]叶茂林,孙志恒.企业信息化管理及应用[M].社会科学文献出版社,2006:342-351.
    [58]于施洋,杨道玲.电子政务外包决策模型研究[J].情报杂志,2008(8):19-22.
    [59]张孟君.避开IT外包风险[J],软件工程师,2005(4):45-46.
    [60]张勇进,汪玉凯.电子政务外包服务模式研究[J].电子政务,2008(07):51-56.
    [61]张志涛,张睿.电子政务服务外包理论分析[J].电子科技大学学报,2007,9(2):39-43.
    [62]郑淑蓉.从电子政务高风险性看如何提高我国电子政务建设效益[J],政府办公,2004(1):12-14.
    [63]赵英姝,吴占坤.企业信息技术外包的阻力与风险研究[J],中国管理信息化,2008(5):60-62.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700