論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available
論文名稱 Title |
軟體專案外包延宕之探討 A Study of Escalation in Software Outsourcing |
||
系所名稱 Department |
|||
畢業學年期 Year, semester |
語文別 Language |
||
學位類別 Degree |
頁數 Number of pages |
85 |
|
研究生 Author |
|||
指導教授 Advisor |
|||
召集委員 Convenor |
|||
口試委員 Advisory Committee |
|||
口試日期 Date of Exam |
2012-10-19 |
繳交日期 Date of Submission |
2013-02-05 |
關鍵字 Keywords |
軟體專案管理、外包延宕、外包管理、企業類型、延宕架構 Outsourcing Escalation, Software Project Management, Escalation Framework, Outsourcing Management, Business Type |
||
統計 Statistics |
本論文已被瀏覽 5791 次,被下載 1308 次 The thesis/dissertation has been browsed 5791 times, has been downloaded 1308 times. |
中文摘要 |
所謂專案延宕,就是繼續投入資源以挽救一個時程嚴重延誤且瀕臨失敗的專案,研究顯示約有30%至40%的軟體專案呈現延宕現象。過去,內部專案延宕之研究著重於專案代理人之過度承諾的決策錯誤,然而在外包專案普及的今日,顧客與外包商均對外包專案有絶對的影響力,但相關研究卻付之闕如,無法提供外包延宕的解決方案。本研究以軟體專案管理文獻為基礎,訪談六個軟體外包個案,透過內容分析以瞭解軟體專案外包延宕的影響因素。接著,本研究提出軟體專案外包延宕架構,用以解釋專案資訊管理、顧客滿意、外包關係、專案開發風險、專案監督控制對專案延宕的影響關係。本研究發現不同類型的企業會影響專案外包的外包管理、監督控制、風險態度,而有不同的外包參與、外包互動、延宕協商、合約賠償等過程。 |
Abstract |
Project escalation means that a failing project is permitted to continue and good money is thrown after bad. According to survey reports, about 30% to 40% of software projects emerge escalation phenomena. Traditional escalation studies focused on agent’s over-committed behaviors of in-house projects. Being very popular now, outsourcing projects can be mainly influenced by its powerful stakeholders, including customer and vendor, but few studies are presented. First of all, six escalation cases were in progresses and factors of outsourcing escalation were abstracted, including project information management, customer satisfaction, outsourcing relationship, development risks, monitor, and project escalation. The causal relation of outsourcing escalation of software project is used to create a escalation framework. This study classified four business types that have different processes of outsourcing participation, monitor, risk attitutes during project escalation. |
目次 Table of Contents |
第一章 緒 論 1 第一節 研究背景與動機 1 第二節 研究目的 2 第二章 文獻探討 3 第一節 內部專案延宕 3 第二節 軟體外包 5 第三節 軟體專案管理 7 第三章 研究方法 14 第一節 名詞定義 14 第二節 分類基準 16 第三節 個案訪談與文本建立 17 第四節 語幹資料庫與編碼原則 19 第五節 個案選擇 19 第四章 內容分析 21 第一節 先導個案分析 21 第二節 個案 2 分析 27 第三節 個案 3 分析 29 第四節 個案 4 分析 32 第五節 個案 5 分析 34 第六節 個案 6 分析 37 第五章 綜合討論 40 第一節 六個個案的專案延宕架構之討論 40 第二節 專案延宕文獻之討論 41 第三節 六個個案綜合比較之討論 42 第六章 結論 47 第七章 參考文獻 48 第一節 中文部份 48 第二節 英文部份 48 附錄 55 附錄1 先導個案公司背景與訪談內容 55 附錄2 個案 2 公司背景與訪談內容 59 附錄3 個案 3 公司背景與訪談內容 63 附錄4 個案 4 公司背景與訪談內容 67 附錄5 個案 5 公司背景與訪談內容 70 附錄6 個案 6 公司背景與訪談內容 74 |
參考文獻 References |
第一節 中文部份 王文良、林信惠,2006,『以賽局觀點探討軟體外包延宕類型』,資訊管理學報,13 卷.S 期。 林信惠、黃明祥,2002,『軟體專案管理研究架構及趨勢』,資訊管理研究,4 卷,1 期,頁次31‐63。 林信惠、黃明祥、王文良,2002,『軟體專案管理研究主題分析』,資訊管理學報,9 卷.1 期,頁次153‐193。 范錚強,1988,『國內首度實務調查資訊部門關心那些課題』,資訊與電腦. 張維迎,1999,賽局理論與信息經濟學,台北:茂晶。 第二節英文部份 Abdel-Hamid, T., and Madnick, S.E. Software Project Dynamics: An Integrated Approach, Prentice Hall, Englewood Cliffs, NJ, 1991. Ang, S., and Cummings, L.L. "Strategic Response to Institutional Influences on Information Systems Outsourcing," Organization Science (8:3), May-June 1997, pp.235-256. Ang, S., and Straub, D. "Production and Transaction Economies and IS Outsourcing: A Study of the U.S. Banking Industry," MIS Quarterly (22:4), 1998, pp.535-552. Applegate, L.M., and Montealegre, R. “Eastman Kodak Co.: Managing Information Systems Through Strategic Alliances,” Harvard Business School Case 192-030, Boston, MA, 1991. Aubert, B.A. Dussault, S., Patry, M. and Rivard, S. "Managing the Risk of IT Outsourcing," Proceedings of the 32nd Annual Hawaii International Conference on System Sciences, 1999. Aubert, B.A., Patry, M., and Rivard, M. "Assessing the Risk of IT Outsourcing," in Proceedings of the Thirty-First Hawaii International Conference on System Sciences , IEEE Computer Society Press, Los Alamitos, CA, 1998, pp.685-693. Becker, H.S. “Notes on the concept of commitment,” American Journal of Sociology, (66) 1960, pp.32-42. Boehm, B. W., Software Engineering Economics, Prentice-Hall, Inc., Englewood Cliffs, N.J., 1981. Boehm, B. W., Software Risk Management, IEEE Computer Society Press, Washington,1989, pp.1-4. Boehm, B.W., "Software Engineering Economics," IEEE Transactions on Software Engineering, Vol.1O, No.1, 1984, pp.4-21. Boehm, B.W., “Software Risk Management: Principles and Practices”, IEEE Software, January 1991, pp.32-41. Bowen, M.G.. “The Escalation Phenomenon Reconsidered: Decision Dilemmas or Decision Errors?,” Academy of Management Review (12:1) 1987, pp.52-66. Brockner, J. “The Escalation of Commitment to a Failing Course of Action: Toward Theoretical Progress,” Academy of Management Review (17) 1992, pp.39-61. Brockner, J. and Rubin, J. Z. Entrapment in Escalation Conflicts,” New York: Springer- Verlag, 1985. Brooks, F. T., The Mythical Man-month: Essays on Software Engineering, Addison-Wesley, Reading, Massachusetts,1995 Burns, L.R. and Wholey, B.R. “Adoption and Abandonment of Matrix Management Programs: Effects of Organizational Characteristics and Interorganizational Networks,” Academy of Management Journal (36:1), 1993, pp.106-138. Burns, R. N. and Dennis, A. R., “Selecting the Appropriate Application Development Methodology,” Database, Fall, 1985, pp.19-23. Buxbaum, P. “Bringing IT Back Home,” Computerworld (36:31), 2002, p.38. Caldwell, B. "2001 Trends in IT Outsourcing Delivery, Solution Development, Marketing, Sales and Alliances," Gartner Dataquest Report, Stamford, CT, January 22, 2002a. Caldwell, B. "Outsourcing Cost Reduction Creates Paradox: How to Still Make a Profit," Gartner Dataquest Report, Stamford, CT, April 12, 2002b. Caldwell, D.F. and O’Reilly, C.A. “Responses to Failure: The Effects of Choice and Responsibility on Impression Management,“ Academy of Management Journal (25:1) 1982, pp.121-136. Casale, F. "IT Index 2001," The Outsourcing Institute/Sunguard eSourcing Report, April 15, 2001 Constance Fabian-Isaacs and Ed Robinson, “The Project Management Puzzle”, Software Development magazine, March 1999 Couger, J.D. & Adelsberger, H., “Comparing Motivation of Programmers and Analysts in Different Social/Political Environments: Austria Compared to the United States”, Computer Personnel, Vol.11, No.4, 1988, pp.13-17. Couger, J.D. & Zawacki, R.A., Motivating and Managing Computer Personnel, New York, Wiley, 1980. Couger, J.D. and Adelsberger, H. “Comparing Motivation of Programmers and Analysts in Different Social/Political Environments: Austria Compared to the United States,” Computer Personnel (11:4), 1988, pp.13-17. Couger, J.D. and Zawacki, R. A. Motivating and Managing Computer Personnel, New York, Wiley, 1980. Couger, J.D., “Motivation Norms for Software Engineers Versus Those for Programmer Analysts,” in Maggi, L., Zmud, R. and Wetherbe, J. (eds.) Proceedings of the Seventh International Conference on Information Systems, San Diego, CA, 1986, pp.214-223. Couger, J.D., “Motivation Norms for Software Engineers Versus Those for Programmer Analysts”, in Maggi, L., Zmud, R. and Wetherbe, J. (eds.) Proceedings of the Seventh International Conference on Information Systems, San Diego, CA, 1986, pp.214-223. Currie, W. “Using Multiple Suppliers to Mitigate the Risks of IT Outsourcing in Two UK Companies: ICI and Wessex Water,” Journal of Information Technology (13:3) 1998, pp.169-180. Currie, W. L. and Willcocks, L. P. “Analyzing Four Types of IT Sourcing Decisions in the Context of Scale, Client/Supplier Interdependency and Risk Mitigation,” Information Systems Journal (8), 1998, pp.119-143. DiMaggio, P. and Powell, W.W. “The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality in Organizational Fields,” American Sociological Review (48:2), 1983, pp.147-160. Dixit, A. and Skeath, S. Games of Strategy, New York: Norton, 1999. Drummond, H. Escalation in Decision-Making: The Tragedy of Taurus. Oxford University Press, Oxford, 1996. Elitzur, R. and Wensley, A. "Game Theory as a Tool for Understanding Information Services Outsourcing," Journal of Information Technology (12:1), 1997, pp.45-60. Ewusi-Mensah, K.and Przasnyski, Z.H. “On Information Systems Project Abandonment: An Exploratory Study of Organizational Practices,” MIS Quarterly (15:1) 1991, pp.67-85. Fligstein, N. “The Spread of Multidivisional Form among Large Firms, 1919-1979,” American Sociological Review (50:3), 1985, pp.377-391. Fombrun, C. and Shanley, M “What’s in a Name? Reputation Building and Corporate Strategy,” Academy of Management Journal (33:2) 1990, pp.233-258. Freeman, E.R. Strategic Management: A Stakeholder Approach, Pitman, Boston, MA., 1984. Fudenberg, R. and Tirole, J., Game Theory (3rd ed.), The MIT Press, Cambridge, Massachusetts, 1993. Garland, H. “Throwing Good Money after Bad: The Effect of sunk Costs on the Decision to Escalate Commitment to an Ongoing Project,” Journal of Applied Psychology (75:6) 1990, pp.728-731. Gobeli, D.H. and Larson, E.W. “Relative Effectiveness of Different Project Structures,” Project Management Journal (18:2), June 1987, pp.81-85 Goles, T. The Impact of Client-Vendor Relationship on Outsourcing Success, Unpublished Ph.D. Dissertation, University of Houston, Houston, TX, 2001. Goodstein, J.D. “Institutional Pressures and Strategic Responsiveness: Employer Involvement in Work Family Issues,” Academy of Management Journal (37:2), 1994, pp.350-382. Grover, V. and Teng, J.T.C. “Theoretical Perspectives on the Outsourcing of Information Systems,” Journal of Information Technology (10) 1995, pp.209-219. Harsanyi, J. “Games with Incomplete Information Played by Bayesian Players Parts I, II and III,” Management Science (14) 1967-68, pp.159-182, 320-334, 486-502. Harsanyi, J. Oddness of the number of equilibrium points: A new proof, International Journal of Game Theory (2), 1973, pp.235-250. Hirschheim, R.A., and Lacity, M.C. "The Myths and Realities of Information Technology Insourcing," Communications of the ACM (43:2), 2000, pp.99-107. Hogarth, R. Judgment and Choice, second edition, John Wiley & sons, Ltd., 1994, pp.99-103. Hogarth, R.H. and Makridakis S. “Forecasting and planning: An evaluation,” Management Science (27) 1981, pp.115-138. IDC, "U.S. and Worldwide Outsourcing Markets and Trends, 1998-2003," by C. Murphy, S. Ker and S. Chen, #19322, International Data Corporation, 1999. Johnson, J. “Chaos: The Dollar Drain of IT Project Failures,” Application Development Trends (2:1) 1995, pp.41-47. Kahneman, D., Knetsch, J.L., and Thaler, R.H. “Anomalies: The Endowment Effect, Loss Aversion, and Status Quo Bias,“ Journal of Economic Perspectives (5:1) 1991, pp.193- 206. Keil, M. “Pulling the Plug: Software Project Management and the Problem of Project Escalation,” MIS Quarterly (19:4) 1995, pp.421-447. Keil, M. and Mixon, R. “Understanding Runaway IT Projects: Preliminary Results from a Program of Research Based on Escalation Theory,” The Twenty-Seventh Annual Hawaii International Conference on System Sciences, Kihei, H.I., 1994, pp.469-478. Keil, M., Mann, J. and Rai, A. “Why Software Projects Escalate: An Empirical Analysis and Test of Four Theoretical Models,” MIS Quarterly (24:4, 2000a, pp.631-665. Keil, M., Mixon, R., Saarinen, T. and Tuunainen, V. “Understanding Runaway Information Technology Projects: Results from an International Research Program Based on Escalation Theory,” MIS Quarterly (11:3) 1995a, pp.67-87. Keil, M., Rai, A, Mann, J.E.C., and Zhang, P “Why Software Projects Escalate: The Important of Project Management Constructs,” IEEE Transactions on Engineering Management(50:3) 2003, pp.251-261. Keil, M., Tan, B.C.Y., Wei, K.K., Saarinen, T., Tuunainen, V. and Wassenaar, A. “A Cross- Cultural Study on Escalation of Commitment Behavior in Software Projects,” MIS Quarterly (24:3) 2000b, pp.299-324. Keil, M., Truex, D.P. and Mixon, R. “The effects of Sunk Cost and Project Completion on Information Technology Project Escalation,” IEEE Transactions on Engineering Management (42:4) 1995b, pp.372-381. Kirby, S.L. and Davis, M.A. “A Study of Escalating Commitment in Principal-Agent Relationships: Effects of Monitoring and Personal Responsibility,” Journal of Applied Psychology (83:2) 1998, pp.206-217. Kirsch, L.J., “Portfolios of Control Modes and IS Project Management,” Information Systems Research (8:3) 1997, pp.215-239. Kirsch, L.J., Sambamurthy, V., Ko, D.G., and Purvis, R.L. “Controlling Information Systems Development Projects: The View from the Client,” Management Science (48:4) 2002, pp.484-493. Klepper, R. "The Management of Partnering Development in I/S Outsourcing," Journal of Information Technology (10) 1995, pp.249-258. Koh, C., Ang, S., and Straub, D.W. “IT Outsourcing Success: A Psychological Contract Perspective,” Information Systems Research (15:4) 2004, pp.356-373. Kreps, D. and Wilson, R. “Reputation and imperfect information,” Journal of Economic Theory (27:2), 1982, pp.253-279. Kreps, D., Milgrom, P., Roberts, J. and Wilson, R. “Rational Cooperation in the Finitely Repeated Prisoners’ Dilemma,” Journal of Economic Theory (27:2), 1982, pp.245-252. Lacity, M.C., and Willcocks, L.P. "An Empirical Investigation of Information Technology Sourcing Practices: Lessons From Experience," MIS Quarterly (22:3), September 1998, pp.363-408. Lee, J.-N. and Kim, Y.-G. "Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation," Journal of Management Information Systems (15:4) 1999, pp.29-61. Levina, L. and Ross, J. W. “From the Vendor’s Perspective: Exploring the Value Proposition Outsourcing,” MIS Quarterly (27:3) 2003, pp.331-364. Loh, L. and Venkatraman, N. "Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis," Journal of Management Information Systems (9:1), 1992a, pp.7-24. Loh, L. and Venkatraman, N. "Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect," Information Systems Research (3:4), 1992b, pp.334-378. Louaid, M. E., Pollalis, Y. A., Teng, J. T. C., “Selecting a System Development Methodology: A Contingency Framework,” Information Resources Management Journal, Vol.4 No.1, 1991, pp.11-19. McDonnell, A. and Lichtenstein, Y. "Pricing Software Development Services," Unpublished Paper, University College Dublin, 2002 McDougall, P. "New Deals May Be Start of Something Big," Information Week(November 18), 2002. McFarlan, F.W. and Nolan, R.L. ”How to Manage an IT Outsourcing Alliance, Sloan Management Review (36:2), 1995, pp.9-23. McLellan, K.L., Marcolin, B.L. and Beamish, P.W. “Financial and Strategic Motivations Behind IS Outsourcing,” Journal of Information Technology (10), 1995, pp.299-321. Merriam, S.B. Qualitative research in practice: Examples for discussion and practice, San Francisco : Jossey-Bass, 2002. Nash, J. “Equilibrium Points in n-Person Games,” Proceedings of the National Academy of Sciences (36) 1950, pp.386-389. Newman, M. and Sabherwal, R. “Determinants of Commitment to Information Systems Development: A Longitudinal Investigation,” MIS Quarterly (20:1) 1996, pp.23-54. Paulk, M. C., Curtis, B., Chrissis, M. B., Weber, C., V., "Capability Maturity Model, Version 1.1," IEEE Software, July 1993, pp. 18-27. Pearson J. N. and Ellram, L.M. “Supplier Selection and Evaluation in Small versus Large Electronics Firms,” Journal of Small Business Management (33), 1995. PMI, A Guide to the Project Management Body of Knowledge, third edition, Project Management Institute, 2004. Ross, J. and Staw, B.M. “Organizational Escalation and Exit: Lessons from the Shoreham Nuclear Plant,” Academy of Management Journal (36:4) 1993, pp.701-732. Scheier, R.L. "Businesses Outsourcing More, But Less Thrilled with Results," Computerworld , July 21, 1997. Schelling, T.C. The Strategy of Conflict, Cambridge, Masss, Harvard University, 1960 Selten, R. “Reexamination of Financial Structure: The Incentive Signaling Approach,” Bell Journal of Economics (8) 1975, pp.23-40. Selten, R. “Spieltheoretische Behandlung eines Oligopolmodells mit Nachfagetragheit,” Zeitschrift fur die gesamte Staatswissenschaft (12) 1965, pp.301-324. Simon, H.A. A Behavioral Model of Rational Choice. In Models of Man. Herbert A. Simon(Ed.), John Wiley, New York, 1957. Slaughter, S., and Ang, S. "Employment Outsourcing in Information Systems," Communications of the ACM (39:7), 1996, pp.47-54. Staw, B.M. “Knee-Deep in the Big Muddy: A Study of Escalation Commitment to a Course of Action,” Organization and Human Performance (16) 1976, pp.27-44. Staw, B.M. “The Escalation of Commitment to a Course of Action,” Academy of Management Review (6) 1981, pp.577-587. Staw, B.M. and Ross, J. “Knowing When to Pull the Plug,”. Harvard Business Review (65:2) 1987, pp.68-74. Staw, B.M. and Ross, J. “Understanding Behavior in Escalation Situations,” Science (246) 1986, pp.216-220. Stewart, J.M. Making Project Management Work, Business Horizons, Fall 1965. Swift C.O., “Preferences for single sourcing and supplier selection criteria,” Journal of Business Research (32), 1995, pp.105-111. Trochim, W. "Outcome pattern matching and program theory," Evaluation and Program Planning, 12, 355-366. Verville J. and Halingten, A. “A Six-Stage Model of the Buying Process for ERP Software,” Industrial Marketing Management (32), 2003, pp.585-594. Von Neumann, J. and Morgenstern, O. Theory of Games and Economic Behavior, Princeton University Press, 1944. Whang, S. "Contracting for Software Development," Management Science (38:3), 1992, pp.307-324. Willcocks, L.P. and Kern, T. "IT Outsourcing as Strategic Partnering: The Case of the UK Inland Revenue," European Journal of Information Systems (7:1), 1998, pp.29-45. Wynekoop, J.L. and Walz, D.B., “Revisiting the Perennial Question: Are IS People Different?,” The DATABASE for Advances in Information Systems (29:2), 1998, pp.62- 70. Yin, R.K. Case Study Research, Design and Methods(2nd ed.), Sage Publications, Beverly Hills, CA, 1994. Young, A. “The Future of Outsourcing: Thriving or Surviving?” Dataquest Service Trends 2000, Gartner Group Report, 2000. Zhang, G..P., Keil, M., Rai, A., and Mann, J. “Predicting Informatino Technology Project Escalation: A Neural network Approach,” European Journal of Operational Research (146), 2003, pp.115-129. Zmud, R.W. “Management of Large Software Efforts,” MIS Quarterly (4:2), 1980, pp.45-55. |
電子全文 Fulltext |
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。 論文使用權限 Thesis access permission:自定論文開放時間 user define 開放時間 Available: 校內 Campus: 已公開 available 校外 Off-campus: 已公開 available |
紙本論文 Printed copies |
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。 開放時間 available 已公開 available |
QR Code |