Friday, May 15, 2020

University Assignment: Business Model and Business Model Innovation” – A Literature Review

Grade Received: First Class Honours

1.0 Introduction

Since the rise of digital technology, literature has tried to grasp just how technology will innovate business models and their applications. The purpose of this report is to outline, define, and critique the literature surrounding business models and business model innovation. Drawing on contemporary examples, this report will compare definitions with current day practices in order to provide a constructive and real-world context to the theories provided. Specifically, we will look at two contemporary trends in business model literature; being the rise of the 'freemium' business model, and the reconceptualization of digital business strategies within overall business models. This report will then provide recommendations for Beta_Digital's business model in the future, based on an analysis of their business model. This is done with the hope that Beta_Digital can utilise our report to innovate and adapt their current business model, to be a leader within their target market.

1.1.        Definition: Business Model 


        "A business model is a conceptual tool containing a set of objects, concepts and their relationships to express the business logic of a specific firm." (Pateli and Giaglis 2003, p5) This quote, originating from Pateli and Giaglis in 2003, and highlighted by Osterwalder, is a thorough conception of what a business model's goals should be. It can also be used as a jumping-off point for exploring academic work surrounding the concept of the business model. This definition raises that a model should focus on the value that the end-user receives, and the financial cost of providing this value; which presents the business model as a balancing act between value and cost, something that we can see in other academics definitions of the business model as well. An example of this would be in work completed by Petrovic, Kittl, and Teksten in 2001, where they state that "a business model is not a description of a complex social system itself with all its actors, relations and processes. Instead, it describes the logic of a 'business system for creating value, that lies behind the actual processes. Therefore we understand a business model as the conceptual and architectural implementation of a business strategy and as the foundation for the implementation of business processes." (Petrovic et al., 2001). 

In viewing these two reasonably different views on a business model, one focusing on value financially and to the end-user, the other focusing on the logic standing behind the system that creates the value, one can see how diverging opinions on the valuation of success can birth different viewpoints towards what is vital to a business model. This divergence brings up an important point, in that context is vitally important to how business models are interpreted and evaluated. Furthermore, with a rapidly changing technology landscape, an investigation into what innovations these changes bring about can be beneficial.

1.2. Innovations: Business Models

Over the last few decades, literature surrounding innovations to business models have significantly developed. One of the more recent voices of this industry describes it as "a framework or recipe for making money—for creating and capturing value. Innovation is about doing things differently from the norm. Therefore, a business model innovation is a framework or recipe for creating and capturing value by doing things differently." (Afauf 2014, pg 4) Yves Pigneur and Alex Osterwalder were asked, after producing a book together, to write an open letter to CEOs who were having to deal with new and transformative growth inside their organizations; in which they identified that business models that once thrived are now trailing behind companies with adaptable business models. They use the metaphor of focusing too much on the present being like taking oxygen away from inventing the future (Osterwalder and Pigneur 2017). This is an apt metaphor that eschews short term solutions for digital foresight. This thought process is further expanded by Lindgardt et al. (2009, pg. 2-7), who discuss how because of the ever-growing frequency of disruption in many industries, business model life cycles are getting shorter and shorter. They talk of how business model innovators outperform traditional players over time. This is in agreement with Pigneur and Osterwalder on the importance of innovation and foresight. However, it diverges more towards integration with the company due to the benefits of joint assets, customers and capabilities. They utilise an example of Apple, who continuously update and adapt their business model. As Lindgardt et al. note, Apple has not had a negative quarter of the year to year growth since March 2003. This stayed true up to 2013 when their estimated earnings per stock fell from $12.30 in Q2 2012 to $10.18 in Q1 2013, Brownlee, J. (2013). However, as is noted, this is mostly down to the fact that "Apple is innovating so quickly and releasing such advanced products across the board at such an aggressive rate that it is maximizing profit on them less quickly than a year ago."

While the value of an adaptable and agile business model is seen, the issue of identifying the correct way to implement changes is challenging. For this, we can look at a study by Gordijn et al. (2005), who find that in order to get an accurate idea of the value of the correct business model to employ, it is always a good idea to contrast and compare different viewpoints. Gordijn et al. compared two ontologies - the Business Model Ontology (BMO) (Osterwalder 2004) and the e3 value ontology (Akkermans, Baida, et al. 2004). By comparing the two, Gordijn et al. hope to achieve a more comprehensive ontology for the design and analysis of business models for networked value constellations. They found that even though the two models contain different points in the design of their business models (the firm centered of BMO vs the value constellation centered of e3 value ontology) their different strengths open up interesting opportunities for integration (Gordijn et al. 2005, pg. 17). One can then conclude that through utilizing context and existing frameworks, one can synthesize a personalised and relevant model for a specific business. 

2.    'Freemium' as a New Growth Strategy

The first theme that will be discussed is the development of a 'freemium' business model. Freemium, which is a combination of free and premium, is defined as "a term increasingly used in commerce to designate a business model using two products or services, or a combination of products and services. In such combination, one item is provided at no charge while a complimentary item is sold at a positive price." (Pujol, 2016, pg. 1) (Bekkelund, 2011, pg.2). To trace to origin of this idea, one can look to an article by the venture capitalist Fred Wilson (2006 , pg.2), who defined 'freemium' as "giving your service away for free, with the possibility of using ad support, to acquire a lot of customers very efficiently through word of mouth, referral networks, and organic search marketing, then offer premium priced value-added services or an enhanced version of your service to your customer base." (Schreiner, M. and Hess, T., 2013, pg.3). Moreover, while the Freemium model has become more frequent in today's app market, becoming increasingly adopted by developers, it remains essential to analyse the effects that it has had on innovating the space of business models as a whole.

The primary goal of a freemium model is to convert free users to premium users (Anderson, 2009). These digital business models are highly relevant to IS and BISE researchers as they differ fundamentally from conventional ones, and are particularly challenging concerning business operations and revenue generation (Amit and Zott 2001; Teece 2010, Veit et al. 2014, pg. 109). Here Amit and Zott highlight the risk in relying on the conversion of free users on the free service to convert to their premium or profit-making service. This emphasis on the conversion is highlighted by (Anderson, 2009 & Bekkelund, 2011, pg.2), where they see the freemium model in three essential stages. The first is the introduction which provides digitised services on the internet with costs close to zero. Next, offer the service for free, which establishes a broader user community, not least because of viral marketing effects. Then finally, some of the free users become willing to pay for value-added services. In a way, the free version of the service is an advertisement for the premium version. Similar to trial packages, the user can test the product, which means they can test all the service's essential functions and evaluate whether they want to gain access to premium features (Anderson, C, 2009, pg. 3). One recent example of a freemium model is Spotify, where "Premium offering removes the commercials, gives access to more music, and allows for use on mobile phones and other devices." (Erlende Reim, 2011, pg. 4) As well, "Spotify recently announced that they had reached one million premium users, but it is still not clear if they are making a profit." (Reim 2011, pg. 4) Again, it is apparent that flipping 'free' users to pay, usually via a subscription model, is the crux of a freemium business plan. However, a competing idea to the need to convert free users to paid users comes from a 2010 paper by Nicolas Pujol, where he sees that those analysing the freemium model must treat free users and paying users as separate entities. As Pujols sees, "the two sides of freemium show interdependence: risk-averse customers value the fact that early adopters have battle-tested the software while providing the vendor positive brand equity that will help it sustain its business over time. Conversely, free users benefit from the presence of commercial customers in the ecosystem: the latter provide vendors with the financial resources to produce more free software and share more code." (Pujols 2010, pg. 4). 

Here, Pujols identifies that free users to have value, in that they can "deliver value to the provider by testing the product, creating a brand, and sometimes contribute code or bug reports," an understanding is often seen in the open-source software development ideology (Pujols 2010, pg. 4). However, it is clear that Pujols still sees the paying customer as vital, when he states that paying users "provide vendors with the financial resources to produce more free software and share more code. This interdependence mirrors the indirect network effects seen on platforms." (Pujols 2010, pg. 4) Pujol's work shows that both free users and paid users provide a unique value to the 'vendor', or business in question. So, while investors and financiers may rush companies to convert free users to paid, it could also be argued, in a rather well-articulated way, that the existence of free users provides value in their own right. Then, it is possible to conclude that the freemium model may have unearthed a balanced approach to the development and sustainability of companies and products in an environment that is in a constant state of change and adaptation. 

3.    Digital Strategies Role into The Broader Business Strategy
The final theme that will be discussed is the role of digital strategy within the broader space of business strategy. This academic space is particularly relevant as it was Toney Maloney who stated in his lecture that "you do not need a digital strategy, you need to have a business strategy that has a digital perspective." What Toney touched on with this statement is that there is a fundamental difference between a holistic business strategy oriented towards the digital reality of today, and that of short term 'band-aid' solutions to catch-up digitally. When companies trend towards short term fixes, solutions run the risk of not being adopted as they may not fit into the wider internal business context. And while Tony's quote during his in class-presentation was very intriguing, a further investigation into the literature that supports, or engages with, this idea is valuable. 

The value of having a digitally inclined business model, rather than a stand-alone digital strategy, can be seen echoed in Jeffrey Rayport and John Sviokla's paper titled 'Exploiting the Virtual Value Chain', where they see a distinction between what they define as a marketplace and market space. The difference between these two concepts lies in the realms that they operate, where market place is traditional value chains, the market space is where digital value is created; this is exemplified by an example, where they show that "when consumers use answering machines to store their phone messages, they are using objects made and sold in the physical world, but when they purchase electronic answering services … they are utilizing the market space." (Rayport and Sviolka 2000, pg. 75). Rayport and Sviolka go on to state that the market space is distinct from the marketplace as it is "a virtual realm where products and services exist as digital information and can be delivered through information-based channels." (Rayport and Sviolka 2000, pg. 75) Moreover, while this provides value in that it identifies that special care should be made to digital value creation, it does not provide a manual into how one could integrate digital value creation into an existing business model. 
For this, we look to Mark Huberty where he sees that "from a value creation perspective, Google, Yahoo, and other ad-driven big data businesses are nothing more than newspapers at scale." (Huberty 2015, pg. 42). Here it is argued that companies such as Google are successful not because of a successful digital business strategy, but because they have integrated digital value creation into more traditional business models. In Huberty's assertion, one can see the logical progression from the definition of the marketspace value in Rayport and Sviolka's work, wherein the marketspace is integrated successfully into an organization's business strategy as a whole; and in some cases, such as with Google, becomes that main economic driver of the organisation as a whole. This sort of integration is further crystalized as Hubery sees the "value model does not emerge, fully-formed, from the data itself. The data alone are no more valuable than the unrefined iron ore or crude oil of past industrial revolutions. Rather, the data were mere inputs to a production process that depended on human insight— that what people looked for on the internet might be a good proxy for their consumer interests." (Huberty 2015, pg. 43) So, while the creation and identification of a digital strategy are essential, it becomes its integration into a broader business strategy that leads to value creation within a contemporary context. 

4.    Analysis of Business Model Canvas of Beta_Digital

In 2008, Alexander Osterwalder, in his book titled "Business Model Generation" (pg 16-44), discussed an incredibly useful 'business model canvas' that can be used to assess a business's strategy. We are referencing that business model to discuss the business model of Beta_Digital. As per the canvas, these are the 9 blocks that can be analysed in the figure below. 




5. Risk Analysis & Possible Solution Recommendation for Beta_Digital

Like any other business, one of the biggest challenges to Beta_Digital is finding its place in an increasingly competitive environment. Many of the world’s biggest consultancy firms such as Accenture, EY and Deloitte work in the UK and Irish market. It is in theory easier for a company that is used to targeting more, larger firms, to move into the Beta_Digital market than it is for Beta_Digital to try and compete with more prominent firms. This research group felt that Tony was overconfident in his conviction that companies like Accenture, EY and Deloitte would not try and target his customers. For example, Amazon is willing to make a loss on the selling of a Kindle device; the risk of predatory pricing is present. (Clay 2012) This is done to gain market share and drive out competition, the more prominent companies can make losses for longer.  

There are also a lot of other smaller consultancy firms in both regions that may target the SMEs that Beta_Digital hopes to do business with. Tony identified Beta_Digital's unique selling point is their in-depth knowledge of different industries. Beta_Digital are masters of their respective industries and not a jack of all trades. They need to produce a robust and consistent marketing campaign to distinguish themselves from the competition and find their place in the market. Otherwise, they risk blending in with their competitors. Until Beta_Digital builds up a trustworthy brand becomes evident and commonplace, the founding members' reputation will be critical to the value proposition of the firm. 
The second big challenge facing Beta_Digital is its supply chain. Their rooted relationship with DigJourney is understandable but is very dangerous. Beta_Digital is reliant on the methodology of its Swedish counterpart to get them in the door of companies. Beta_Digital could become a victim of their success. Should their consultancy see great success due to the starting point, the framework DigJourney has provided other companies may try to strike deals with DigJourney. While Beta will still have their knowledge, the loss of their 1-1 business relationship could put them at risk. While they hold this advantage, Beta_Digital should look into creating their framework or using different frameworks depending on the clients’ needs to reduce this risk.

The next risk facing Beta_Digital is the loss of key members of staff and with that a loss of knowledge. For example, according to the Beta Digital "Our Team" page, David Courtney is the only expert on the subject of retail banking. If Beta_Digital was to gain many customers in this sector and then lose David, they may not be able to offer the same expertise in a sector and therefore lose their unique selling point. This would be considered part of the value proposition expressed in the book Business Generation Model. (Osterwalder 2010, Pg. 22-25). It also means they would not be able to offer the same level of insight as before and could lose clients over this issue. There is also the risk that if a member leaves that they could take all of their knowledge of Beta_Ditigal's unique selling point and incorporate it into the strategy of a competitor. 
The first strategy to protect Beta_Digital from the loss of critical members would be a contractual agreement that founding members cannot leave the organization unless they provide a set amount of notice and do not leave until a replacement is found up to a limit of three to six months. A leaving member should be involved in the hiring of a replacement with similar expertise. This idea protects the firm from having gaps in their knowledge and not been able to obtain or keep clients in a specific industry. Secondly, Beta_Digital should also include non-disclosure agreements in all of their contracts to make sure that members who leave the firm cannot disclose information that may cause Beta_Digital to lose its competitive advantage. This idea protects the knowledge that they receive from DigJourney and also techniques and private information that the firm's consultants have access too. This knowledge can be seen as a critical resource within the Osterwalder "Business Model Canvas". 

The Business Model Generation handbook also talks about "Costs Structures" which are "all costs incurred to operate a business model. One potential unwanted cost structure identified by the consultancy group was that of legal costs. This consulting group points out that some of the methods like questions on a questionnaire would not be very difficult for a competitor to steal. This consulting group is not privy to the in-depth legal requirements and agreements that it has with its customers and partners, but it is recommended that Beta_Digital is vigilant in the protection of its methods and intellectual property. 

Conclusion
This consulting group investigated a wide range of literature on the topic of business models. There are many contrasting views, but there are themes that stand out. Consistently across the literature, the importance of traits such as adaptability depending on the situation. To progress, companies need to continue to innovate their business models in a vastly digitalizing world. There is no one business model for companies to follow. It depends on the company's situation in terms of resources, industry and the problem they look to solve. Companies do not need a digital model per se to flourish, instead of an innovative, adaptable business model that has a digital aspect at its roots. These lessons are something Beta_Digital and other companies alike should keep in mind.


 Bibliography
        Books:
·      (Afauf 2014) Business Model Innovation, concept analysis, and cases. Taylor & Francis Ltd (Pg. 4)
·      (Osterwalder 2010) Business Model Generation, John Wiley & Sons Inc (Pg. 22-25)
Academic Papers:
·      Osterwalder, A., Pigneur, Y. and Tucci, C.L., 2005. Clarifying business models: Origins, present, and future of the concept. Communications of the Association for Information Systems, 16(1) (Pg. 75-88)
·      Chesbrough, H., 2010. Business model innovation: opportunities and barriers. Long-range planning, 43(2-3) (Pp.354-363)
·      De Stefano, V., 2016. The rise of the just-in-time workforce: On-demand work, crowd work, and labor protections in the gig economy. Comparative Labor Law Policy Journal, 37(3), pp. 471-504. Journal, 37(3) (pp. 471-504)
·      Dergousoff, K. and Mandryk, R.L., 2015, April. Mobile gamification for crowdsourcing data collection: Leveraging the freemium model. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1065-1074). ACM.
·      Graham 2017. Digital Labour and Development, etui, vol 23, pg 135-161. https://journals.sagepub.com/doi/pdf/10.1177/1024258916687250
·      Gordijn, J., Osterwalder, A. and Pigneur, Y., (2005). “Comparing two Business Model Ontologies for Designing e-Business Models and Value Constellations”
·      Huberty 2015. Awaiting the second big data revolution: “From digital noise to Value Creation, Journal of Industry, Competition and Trade”  pg 35-47 https://link.springer.com/article/10.1007/s10842-014-0190-4
·      Pujol, N. 2010. Freemium: attributes of an emerging business model. Pujol Enterprises LLC (Pg. 1-4) 
·      Petrovic, O., Kittl, C., and Teksten, R., 2001. ‘Developing Business Models for eBusiness’
·      Rayport and Sviolka 2000. “Virtual Value Chain” (Pg. 75-85)
·      Schreiner, M. and Hess, T., 2013. On the willingness to pay for privacy as a freemium model: First empirical evidence. (Pg.1-7)
·      Voigt, S. and Hinz, O., 2016. Making digital freemium business models a success: Predicting customers’ lifetime value via initial purchase information. Business & Information Systems Engineering, 58(2), (Pp.107-118)
·      Wagner, T.M., Benlian, A. and Hess, T., 2013, January. The Advertising Effect of Free--Do Free Basic Versions Promote Premium Versions within the Freemium Business Model of Music Services? In 2013 46th Hawaii International Conference on System Sciences (pp. 2928-2937). IEEE
·      Reim, E. (2011), Exploring the Freemium Business Model. UiO Centre for Entrepreneurship. (Pg. 1-62)


 Articles and Websites:
·      Baston (2016) Facebook approached Snap-in 2016. Accessed Oct 16th, 2019. https://www.businessinsider.com/facebook-approached-snap-in-2016-to-discuss-acquisition-2018-12?r=US&IR=T
·      Brownlee, J. (2013), Wall Street: Apple Will Post First Quarter of Negative Income Compared to Year Ago in Ten Years. [Online] Available at:
Accessed on 4th October 2019.
·      Clay (2012) Amazon Confirms That It Makes No Profits on Kindles
·      Hill (2011) 10 Reasons Why Facebook Bought Instagram Accessed Oct 16th, 2019. https://www.forbes.com/sites/kashmirhill/2012/04/11/ten-reasons-why-facebook-bought-instagram/ 
·      Lindgardt, Z., Reeves, M., Stalk, G. & Deimler, M., (2009). Business Model Innovation:
When the Going Gets Tough. [Online] Available at:
Accessed on 10th October 2019
·      Osterwalder, A. and Pigneur, Y. (2017), An Open Letter to CEOs. [Online] Available at:
Accessed on 10th October 2019)
·      Reim, E. (2011), Exploring the Freemium Business Model. UiO Centre for Entrepreneurship. pp. 1-62. 
·      Beta_Digital Slides 2019, IS6150 September 25th, 2019.  [accessed on 17th October 2019]

Saturday, February 1, 2020

University Assignment: A literature review on the risks and rewards of IT insourcing and IT outsourcing to an organization.



Assignment completed as apart of my Master Studies in University College Cork.

Course: CKL18 Information Systems for Business Performance
Grade Received: 68%

Introduction:

This piece will focus on the risks and rewards of IT outsourcing and IT insourcing to an organisation. A said organisation could be a business, a charity or even a government. While specific industries outsource more than others, IT outsourcing can be seen in almost every industry. IT insourcing and IT outsourcing are not exclusive to either the public or private sector, and often an agreement can involve both sectors working together. Some companies are, in fact, the providers and the customers when it comes to IT outsourcing. This literature review will examine a wide range of academic pieces and give many real-world examples of both practices. This ambition is even though the vast majority of the existing literature is based on IT outsourcing. Find the matrix below which will be used as a fixed reference point to the references and citations made in this piece.

 The Risks and Rewards of IT Outsourcing: Literature Review

This first topic that the literature investigates is how to measure the success and failures of IT outsourcing. According to (Qu, Oh, Pinsonneault 2009) "studies typically evaluate IT outsourcing benefits by comparing manager satisfaction before and after the adoption of IT outsourcing." According to (Lacity 2000), the value of IT outsourcing is often valued in people's and especially managers points of view rather than any imperial data from past examples to support such views.

Secondly, how much of a risk is it for a company to hand over its IT department to an outsourcing company. (Rohde 2004) Explains how UK based supermarket Sainsbury "signed a seven-year deal with Accenture in 2000 to outsource all of its IT operations" However, according to the supermarket, Accenture "failed to deliver the anticipated increase in productivity." This decision led to renegotiation and extension to the contract. On the other hand, other companies have seen great success with outsourcing. (Sen 2016) explains how tech giants Google "now increasingly is starting to outsource non-core parts of its business, such as IT infrastructure management, software development and maintenance to IT services firm." (Hirschheim, Lacity 2000) Argue that venders may not have the best interest of the paying company at heart. Like all companies, outsourcers or venders want to maximise profit. Outsourcers may cut corners like the training of staff and investing in new technology.

Unfortunately, for Kodak, they are a company that perhaps took IT outsourcing too far. (Plant 2011) writes about how outsourced activities such as high-value functions such as infrastructure development and database administration, which led to a lack of IT knowledge and direction in the company. "(Dinu 2015) Points out that firms should specialise and focus on its main object of activity. Amazon is a company that benefits from being the outsourcer. According to the Amazon Web Services website, they offer storage solutions to the likes of Kellogg's, Vodafone, Comcast and Abode. (Amazon Web Services 2019). (According to Investopedia 2019) "Amazon Web Services (AWS), Amazon's cloud service, generated nearly $7.3 billion in operating income in 2018" This was more than half of Amazon's total.

Outsourcing can be beneficial to both the buyer and the seller of a service. For example, in 2001, Canadian bank Scotiabank signed a deal with IBM, which was renewed in 2007. IBM continued to "manage the big Canadian bank's information-technology operations, including its data centres, branches and automatic banking machines." Kitchener (2007) However, also, the bank kept software development in-house. IBM's work with non-core business activities allowed Scotiabank to focus on its core banking and financial services.

A prevalent form of outsourcing is offshore outsourcing. According to (Webb 2017) offshore outsourcing is primarily a geographical activity in which firms find areas of the world with cheaper labour and production costs than their own. |(Sparrow 2003) argues that India is 60-80% of the worlds insourcing market. According to the World Population Review 2019 cost of living index, India ranks below countries such as war-stricken Syria and Venezuela. This fact means that the wages US and European countries have to pay Indian workers are much lower than in their own countries.  For example, due to the cost of living, one might expect that someone in India will earn less than a quarter than someone in Norway for the same work. If we compare India with a cost of living index score of 25.14 and the United States having 70.95, someone in India could only expect to earn 28% of what someone in the US would get for the same work. Despite being a US company, IT outsourcer Cognizant Technologies has the majority of its employees in India and a growing number in Europe and the rest of the world. Note the numbers in the USA the wealthiest region declined in 2018. With employees in America, Europe, India amounts' other places in the world, Cognizant is one of the many companies who can follow the sun modal. (Carmel, Espinosa, Dubinsky 2014) Describe this as the appeal of the workday ending in one place but continuing elsewhere in the world. This option means companies can be potentially making money all day every day due to off offshoring which often comes in the form of outsourcing.

See graph one below:

Graph 1. Source; Statista

../../../../../../Desktop/Screenshot%202019-09-29%20at%2017.40.50.png

The Risks and Rewards of IT Insourcing: Literature Review
According to (Beers 2019) "Insourcing assigns a project to a person or department within the company instead of hiring an outside person or company." (Beers 2019) also mentions that "insourcing is relatively common and is seeing greater usage by companies seeking better control of important projects and tasks." While it is often believed that outsourcing saves money, this is not always the case.  (Hirschheim, Lacity 2000) In 2019 many firms do outsource IT work, yet (Qu, Oh, Pinsonneault 2009) argue that it is difficult to say if firms who outsource perform better than firms who do not. This view is due to a lack of research on the topic.

IT insourcing is one way for a firm to save money. Not so much for what it does itself but rather through the money it saves due to lower transaction costs compared to IT Outsourcing. Firms are starting to understand how much money they could save on transaction costs. These costs are "organizing information, coordinating behaviour, safeguarding the interests of the transacting parties, monitoring the transactions, inducing the appropriate behaviour adjustments." (Aubert, Rivard, Patry 1996) While firms will have to do a lot of this whether they have the store the data or not themselves, the information will be easier to access and use if it is in-house. If the IT staff and equipment is there, it may be cheaper for firms to insource.

One significant advantage of Insourcing is keeping hold of the same staff.  Forell (2004) writes JP Morgan Chase, who is an example of a company who cancelled a contract altogether. When they terminated their contract with IBM, it did not just cost both companies much money, but it resulted in about 4,000 IBM employees, transferred to J.P. Morgan.  Many of those same workers had made the transfer in the other direction when the contract started. If this contract or any other outsourcing contract ended, it might cause those same employees to have to change again. (Brookes 2000) Found that companies with the highest intention rate also earn the highest profits. Consistent outsourcing may risk that.
According to (Hirschheim and Lacity 2000) outsourcing leads to a reduction in IT costs, this reduction. Outsourcing can be a great money saver. "IT can also help to reduce other expenses such as sales and general administrative costs which are often four or five times IT Costs". (Han Mithas 2014) One example of a company who did this successfully was Axa. According to (Sparrow 2003 pg 15) Axa with the help of its own IT department reduced technology costs by 6% and in the meanwhile rejecting the introduction of outsourcing within the company.

Small to medium-size business (SMEs) may struggle to invest in every service due to financial constraints. (Qu, Oh, Pinsonneault 2009) Point out that IT insourcing can be advantages over IT outsourcing because it allows for the easier passage of information between business and IT staff. The alternative IT outsourcing, the "coordination is between outside IT vendors and business clients." IT insourcing is a form of shared knowledge which is the common knowledge that two or more parties share. Two different companies may use different systems or work in completely misaligned time zones. All of these factors make it harder for a buyer of service to potentially get in contact with the vender than it would be with someone from within their own company.


Discussion from Study of Literature
The first risk is that it is dangerous to use manager satisfaction an accurate measure of the success of IT outsourcing as some managers bring satisfaction from having less work to do rather than getting satisfaction from what is best for the company.  At the highest level when organisations agree to outsource IT, they understandably expect an increase in productivity or a decrease in costs for the same productivity. So, when managers satisfaction and especially managers that are not the buyers' employees are the judge of this, it can lead to problems. 

Companies need to be careful about what outsourcing companies they trust to do a good job. Objectives need to be measurable, attainable and specific, timely and relevant for both firms. Companies also need to follow the example of Google and be careful that they are only outsourcing non-core activities. They have to avoid the traps of Kodak who by outsourcing all of their IT operations and falling behind their competitors. This decision led to the company missing out on many-core IT developments due to a lack of IT knowledge within the company. (DiSalvo 2011) writes that "Kodak was making odd manoeuvres, like acquiring pharmaceutical giant Sterling Drugs for $5.1 billion and trying to establish a brand in the battery business." Had the company's IT staff is more significant and had more say it is improbable that Kodak would have been so resistant to the emergence of digital photography which led to them falling behind the like of Canon and Nikon. Kodak did not realise how vital its core IT Activities and knowledge were and paid the price. IT outsourcing can work for any company, but the importance keep core IT activities within the company cannot be mentioned enough. Kitchener's (2007) example of IBM and Scotiabank is an excellent example of this.

Buyers of services are also at risk that outsourcers will do the bare minimum in terms of investing in their staff and technology. This possibility is challenging for buyers of services to keep an eye on compared to if said IT activities were happening in-house. Buyers need to protect themselves in agreements to make sure that outsourcers do not cut corners which would reduce the buyer's competitiveness in the marketplace.


One advantage IT insourcing has over IT Outsourcing is that staff members are more consistent. Situations, when employees are switching between companies, can be very unsettling for them and their families. A firm with many outsourcing changes may struggle to attract the highest skilled workers because they may become wary of said upheavals in their lives. Taylor 1996 argues that companies who only see employees as costs and not assets will cut the "bone" of a company "rather than just trying to remove the fat." On the other hand, SMEs will find it challenging to find the money to invest in the capital and people. Companies who fail to outsource risk becoming overstretched trying to do everything. This fact could lead to IT staff becoming overwhelmed and leaving due to a heavy workload. To stay competitive company's need to have access to modern tools.

Offshoring, as a form of outsourcing, will likely increase in a globalised world. Companies based in more affluent countries will continue to seek employees within and outside of their own country to save money and to provide better services. The prevailing trend over the last few decades has seen European and American companies outsource many of their IT services to India. This is due to the high number of English speakers in the country. According to (Masani 2012), there are over 125 million English speakers in India. India is a lot poorer than its English-speaking counterparts from as the UK, USA, Canada, Australia and Ireland. Meaning this trend will likely continue unless a cheaper market emerges. While that seems impossible now, over the last few decades, European and American companies have outsourced many businesses to China. While this is still happening, there are hundreds of millions of Chinese people joining the middle class and leaving poverty behind. McKinsey Quarterly (2006). So much so that China is now the exporter to countries in Africa like Ethiopia. (Donahue 2018). A similar rise in the standard of living and wages in India would be a massive risk to companies in the western world looking for cheap, English speaking IT outsourcing labour.
Conclusion


        IT Outsourcing







IT Insourcing
                                                                       Reward                                               Risk

This piece finds that both IT outsourcing and IT insourcing come with many risks and rewards. However, what is most vital for sellers is that they identify what their core and non-core activities are. They must be sure that they only outsource non-core activities. When they do this, they need to commutate with their own IT to make sure employees do not become demotivated and feel like they are being replaced. It makes sense for SMEs to look for agreements with outsourcing companies. This view is because they may not be big enough or to have the money to specialise in every aspect that is needed for their business to flourish. It sometimes just makes more sense for a business to export some of its business to experts.  One reason why capitalism is successful is that it allows people to specialise in producing expect products and provide high-quality services. It is hard for any company but especially small to medium-size ones to be good at everything, and they should not try to be as it would prove too costly.

With IT Outsourcing and IT insourcing been relatively new things compared to other focuses of academia, one might expect a lack of academic literature. However, this is not the case for IT outsourcing. So much, so that is was impossible to discuss every aspect of IT Outsourcing. However, in the case, in terms of IT insourcing, there is a real lack of literature. Due to this, at times, one must invert the rewards of IT outsourcing to talk about the risks of IT insourcing and invert the risks of IT outsourcing to find the potential rewards of insourcing.

In the future, there should be an increased focus on IT insourcing. This view includes the impact on businesses as a money saver and its overall effectiveness. The role of IT is increasing with every passing year, and significant question companies need to ask is “should we outsource or insource said activity?” This decision is made difficult by a lack of research into IT outsourcing. The challenge will be getting organisations to release information to researchers. This is from both a competition point of view but also new EU GDPR.  It is still unsure how this will affect research a whole and not just this particular topic.



















References:


Beers (2019) Outsourcing vs. Insourcing: What's the Difference?
Beulen & Ribbers (2010) Managing IT Outsourcing
Brooks, R., 2000. Why loyal employees and customers improve the bottom line. The Journal for Quality and Participation, 23(2), pp. 40-44






Feeny, Leslie, Wilcocks (1998), Core IS Capabilities for Exploiting Information Technology



Lacity & Willcocks (2003) IT Sourcing Objectives, Wirtschaftsinformatik
Investopedia (2019), How Amazon Makes Money
Nelson, K., & Cooprider, J. (1996). The Contribution of Shared Knowledge to IS Group
McKinsey Quarterly (2006) The value of China’s emerging middle class https://www.mckinsey.com/featured-insights/china/the-value-of-emerging-middle-class-in-china
Performance. MIS Quarterly, 20(4), 409-432. doi:10.2307/249562
New York Times (2008), The Benefits of Outsourcing for Small Businesses https://archive.nytimes.com/www.nytimes.com/allbusiness/AB5221523_primary.html?mcubz=0
Plant (2011), A Kodak Moment to Reconsider the Value of IT
Sparrow 2003, Successful IT Outsourcing: From Choosing a Provider to Managing the Project https://tech.economictimes.indiatimes.com/news/corporate/google-starts-outsourcing-more-business-to-it-firms-such-as-cognizant/51625250?redirect=1
Qu, Oh, Pinsonneault (2009), The strategic value of IT insourcing: An IT-enabled business process perspective
Webb 2017, What Is Offshoring? What Is Outsourcing? Are They Different? https://www.forbes.com/sites/jwebb/2017/07/28/what-is-offshoring-what-is-outsourcing-are-they-different/
World Population Review (2019) Cost Of Living By Country http://worldpopulationreview.com/countries/cost-of-living-by-country/
































Bibliography:
Luftmann (2003), Competiting in the Information Age, Align in the Sand, Oxford Press
Miller, T. I., Kobayashi, M. M., & Noble, P. M. (2006). Insourcing, Not Capacity Building, a Better Model for Sustained Program Evaluation. American Journal of Evaluation, 27(1), 83–94. https://doi.org/10.1177/10982140052831855
Nelson, K., & Cooprider, J. (1996). The Contribution of Shared Knowledge to IS Group
Performance. MIS Quarterly, 20(4), 409-432. doi:10.2307/249562
Valorinta (2011) IT Alignment And The Boundaries of The IT Function, Journal of Information Technology

Featured Post

Exchange Students: Get the Most Out Of Your Year Abroad

1.    Sort out the essentials before arriving. This may not sound like the most exciting advice in the world, but that makes our first pi...