TCE_Social_Capital_revision_OCT___.pdf (246.3 kB)
Vendor opportunism in IT outsourcing: a TCE and social capital perspective
journal contribution
posted on 2015-04-16, 15:14 authored by Eleni Liouliu, Angelika ZimmermannAngelika ZimmermannAcademic researchers have attributed significant attention to the drivers of opportunistic behavior, yet our understanding of how opportunistic behavior can be mitigated remains relatively fragmented. Our investigation will focus on the social context and more specifically on the role of social capital in the deterrence of opportunistic behavior. Based on two qualitative case studies in the financial sector, we will illustrate how the structural, cognitive, and relational dimensions of social capital can reduce internal and behavioral uncertainty between the outsourcing partners, thereby facilitating the mitigation of opportunistic behavior. In our study we combine the theory of transaction costs with social capital theory and demonstrate how they can usefully complement each other to enhance our understanding of mechanisms that can deter opportunistic behavior.
History
School
- Business and Economics
Department
- Business
Published in
Journal of Information TechnologyCitation
LIOULIU, E. and ZIMMERMANN, A., 2015. Vendor opportunism in IT outsourcing: a TCE and social capital perspective. Journal of Information Technology, 30(4), pp.307-324.Publisher
© Palgrave MacmillanVersion
- AM (Accepted Manuscript)
Publisher statement
This work is made available according to the conditions of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) licence. Full details of this licence are available at: https://creativecommons.org/licenses/by-nc-nd/4.0/Publication date
2015Notes
This is a post-peer-review, pre-copyedit version of an article published in Journal of Information Technology. The definitive publisher-authenticated version LIOULIU, E. and ZIMMERMANN, A., 2015. Vendor opportunism in IT outsourcing: a TCE and social capital perspective. Journal of Information Technology, 30(4), pp.307-324. is available online at: http://dx.doi.org/10.1057/jit.2015.3ISSN
0268-3962Publisher version
Language
- en