Insourcing a government information system an analysis using institutions and the capability approach.
Omar, Azmi; Bass, Julian M.; Lowit, Peter
Julian M. Bass
This study explores the effectiveness of insourcing in the Malaysian Government. The research discusses the factors and issues of insourcing in a Malaysian government agency in the context of post contract termination of an outsourcing agreement. A qualitative research method was conducted by using semi-structured interviews based on the OPTIMISM approach in designing the interview questions. The number of respondents was 21 government servants, from top management to programmers. We used a combination of institutional theory and the capability approach to analyse the data. We found that insourcing could enhance the skill and knowledge of the government's IT officer by using potential opportunities and systematic training approach that are presented despite challenges such as lack of ICT infrastructure, the high-level system complexity, lack of recognition from the government and complicated business process. We envisage that as insourcing evolves over time, participation and responses from large organisations that provide direct services to the citizen would represent the practice of insourcing as a whole. These findings will be of interest to the research community interested in insourcing information system support.
|Start Date||Nov 9, 2015|
|Publication Date||Nov 11, 2015|
|Publisher||Institute of Electrical and Electronics Engineers|
|Institution Citation||OMAR, A., BASS, J.M. and LOWIT, P. 2015. Insourcing a government information system an analysis using institutions and the capability approach. In Proceedings of the 2015 International conference on information society (i-Society 2015), 9-11 November 2015, London, UK. PiscatawayJ: IEEE [online], pages 91-96. Available from: https://doi.org/10.1109/i-Society.2015.7366866|
|Keywords||OPTIMISM; Capability approach; Insourcing; Institutional theory; Semistructured interviews|
OMAR 2015 Insourcing a government information
You might also like
Degrees of tenant isolation for cloud-hosted software services: a cross-case analysis.
Evolutionary computation for optimal component deployment with multitenancy isolation in cloud-hosted applications.
Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system.