Females Computing Industry

An Investigation into the Decline of Female Participation within the Computing Industry (2015)

View This Dissertation Here

In today’s modern world, gender equality is battled for and we strive to ensure the sex of a person in no way obstructs their aims and goals in life. Wages for men and women are on their way to being equal, sexist behaviour is frowned upon and no longer do we live by the stereotypical nature that a man earns the living and the woman makes a home. So why, in this apparently modernized world, do women still remain the minority in STEM based subjects such as, mathematics, science and computing. In a world where more females attend university than males, women still continue to only make up a disproportionately small segment of Computer Science majors. Many factors have been attributed towards the shocking decrease in both women achieving degrees in Computer Science subjects and then continuing to work in those Computer Science subject areas; lack of female role models, gender stereotypes, peer pressure and general lack of interest in the STEM subjects.

Females Computing Industry
Females Computing Industry

The aim of this project is to gain a deeper understanding into why women still steer away from working in Computing. How the idea that a women is incapable of achieving in a Computer Science subject is seen as normal and socially acceptable in the 21st century. To actually listen to women and their experiences of how they were influenced into choosing their career path/degree specialism. To gain a better understanding to why a social stigma still revolves around Computing and why this continues to disenchant females.

The report consists of a background into the research area, primarily focusing on literature review of other similar studies, including specific studies into girls and computing. The different forms of methodology intended to be used to gain more knowledge about girls who study STEM subjects such as interviews, surveys etc. and then how this data will be analysed and then linked with previous studies and research, to show common themes and areas of importance.

The aim of this dissertation project is to build a greater understanding into why this fear of going into the industry still remains strong. Why it still remains normal to go into an A Level ICT class and expect to see a large amount of boys with a scattering of girls to balance it out. To not only understand from females why they either chose to pursue a STEM subject or decided another path in their lives, but to also see the other side, why males feel their female counterparts feel disillusioned towards the degree subject.

View This Dissertation Here

IT Outsourcing Commercial Banks China

IT Outsourcing For Commercial Banks in China

The issue of outsourcing has gained significant attention in recent years, in different industries. The different industries have varied factors that influence the scope and nature of outsourcing. China has been one of the most active destinations for outsourced processes and activities. This study focuses on the decision-making models and processes considered by bank managers in developing IT outsourcing strategies, in China. This is based on the increasing use of IT outsourcing in the banking and financial services industry in order to meet customer demands. China was selected because of the challenges it may present for decision makers. Its research objectives are to determine and assess the potential risks for Chinese commercial banks that want to engage in IT outsourcing activities.

The study seeks to assess the key decision factors that Chinese commercial banks consider in their IT outsourcing strategies. The methodology employed focuses on the strategic model, as well as the criticality of outsourcing to financial institutions and management attitudes. Analysis of the findings utilizes two constructs to assess the decisions made by commercial banks regarding outsourcing in China. The study proposes to accomplish its objectives using a qualitative study design that utilizes face-to-face interviews to collect data. The data will be coded and assessed using the two constructs of perceived risk and benefit in order to develop a new model. The findings of the study will be highly relevant and significant to medium-sized commercial banks and outsourcing services vendors.

The Global Outsourcing Landscape

The issue of outsourcing has grown significantly in the global economy. Firms are subcontracting an ever-increasing number of activities ranging from marketing, customer care, research and development, as well as manufacturing. As a result, some organizations have developed into virtual manufacturers that own the designs, but do not make any of the products. Vertical disintegration has become a significant aspect in international trade. The production of particular cars in the US includeonly 37% of their value generated within the country while the rest is from different places. When most people refer to the issue of globalization, they think of a manufacturing process that takes place across different geographical locations.

The purchase of raw materials and development of standardized products was the initial view of outsourcing, but it has changed significantly with time. Today, it refers to the selection of strategic partners to establish bilateral relationships in order to undertake investments that enable it to fit into the firm’s particular needs. As a result, outsourcing involves more than just purchasing goods and partners have to act with care. These complexities have made outsourcing difficult to measure at an international level (World Trade Organization, 1998). Some scholars on the topic have used trade in intermediate inputs or components as a proxy for what they have termed as global production sharing or intra-product specialization (Rapoport & Yi, 2001).

Although the measures used in assessing the growth of international outsourcing are imperfect, they show rapid expansion. The rapid expansion in outsourcing has been in key sectors and industries such As textiles, machinery, electrical equipment, and footwear. Outsourcing in intermediate products and business services are some of the principal areas that have received the most attention in relation to outsourcing (Baldwin, Irani, & Love, 2001).

IT outsourcing is one of the key growth areas in today’s business environment. This is because of the increasing significance of ICT to the operation and success of businesses. The size of the global outsourcing industry was estimated by Dataquest to be more than $100 billion in 2001 and growing at the rate of 20% per Annum. A survey of the FTSE index in the London Stock Exchange found a significant correlation between high levels of outsourcing and stock market performance. This highlights the significance of outsourcing and suggests that companies that manage it best are likely to reap the benefits. According to the research company Gartner, the worldwide IT outsourcing market is expected to reach $288 billion by the end of 2013, a 2.8% increase from 2012.

Definition of Outsourcing

Outsourcing simply refers to the contracting of work to outside firms. These firms can be domestic or foreign, and they enable the outsourcer to concentrate on key competencies. It involves business processes that the outsourcing firm feels can be accomplished more effectively by the outside firm as opposed to in-house. It involves different processes that may include manufacturing or the provision of services such as customer care, or marketing. Most companies engage in outsourcing in order to address challenges regarding the availability of skills and resources. They seek efficient and highly qualified outsourcing companies to provide services for their customers or internal operations.

Today outsourcing is used as a means of reducing costs and achieving strategic goals. Different models are applied depending on the focus of the organization. The changing waves of outsourcing are developed in response to changes in the business environment. The three main segments of outsourcing applied in today’s world are business process outsourcing, information technology outsourcing, and knowledge process outsourcing. The potential impact of outsourcing can be seen across various business activities and processes. Information Technology outsourcing involves issues such as programming, applications development, and coding. This is mainly geared towards enhancing the ability of organizations to access IT resources that may be difficult to exploit in-house. Outsourcing also involves the performance of a particular business processes and functions such as finance and accounting, back-office operations, processing, and administration, as well as contract functions. This is known as business process outsourcing with organizations seeking service providers to undertake their non-core processes to enhance efficiency.

Knowledge process outsourcing (KPO) involves offshoring of domestic business functions to lower cost foreign providers. It helps companies to gain competitive advantages by virtue of the type of activities and processes outsourced. Unlike BPO and ITO, KPO involves high end or knowledge-driven processes. These processes require specialized domain expertise such as financial management, risk assessment, insurance underwriting, clinical trials, legal services, or R&D. KPO is unlike BPO and ITO because it does not involve simple rule-based process expertise and leveraging economies of scale. It focuses on accessing the global talent pool in order to carry out processes that require specialized analytical and technical skills, as well as decision-making and judgment. KPO adds value by providing high quality expertise and superior productivity (Baldia, 2012).

IT outsourcing in different industries and organizations is undertaken because of the strategic advantages it offers to them. The central driver of IT outsourcing is cost reduction. It allows companies to access high quality services and processes without spending money in installing computing resources. The outsourcing companies provide services at relatively lower costs compared to what the company may access in-house. It also provides an opportunity to select the lowest cost provider to enhance profitability. IT outsourcing is also used because it allows access to superior skills and expertise. The outsourcing company has access to high quality work force to perform the different tasks effectively. The presence of superior skills from the service provider allows high service quality thus enabling the outsourcing company to deliver the same to its customers.

IT Outsourcing
IT Outsourcing

IT outsourcing is a significant aspect in relation to strategy and focus. It allows an organization to select the best-suited service provider to ensure that its services are in line with the needs. Outsourcing allows changes in capacity in line with organizational needs without incurring heavy costs. As a result, it enhances flexibility for the outsourcing company. It plays a strategic role in enhancing the capacity of the outsourcing company to meet its expanding needs for computing (Aalders, 2012).

Importance of IT Outsourcing In the Financial Sector

The financial services sector is one of the largest investors in Information Technology. The financial services sector requires significant computing resources in order to perform their activities efficiently and cooperation across geographical locations. The industry has increased utilization of IT resources in response to the financial crisis that affected the global economy (Bartels & Pass, 2000). Increasing market volatility has also made is essential for financial institutions to have effective IT systems for enhanced efficiency. Increasing competition, shrinking demand, globalization, and regulation require banks and other financial institutions to engage in system upgrades and integration. This activity is especially significant for banks involved in mergers and acquisitions because of the need to integrate the operations of the merging institutions. This has highlighted the need for financial institutions to evaluate their operating models, and make significant changes in processes as well as IT. This has prompted many banks to incorporate IT outsourcing as a way of enhancing their operational efficiency (Hirschhein & Lacity, 2000).

Financial and banking institutions dominate the global ITO industry. The banking and financial services institutions ITO market is worth US$ 100 billion and is dominant in the industry. Improving profitability and customer experience are the most critical objectives influencing IT investment for the banking industry currently. Some of the key themes in relation to IT outsourcing in the industry involve cloud computing, analytics, and social media. These technologies have a significant role to play in enhancing the operation of financial institutions.

The development of informationalization of Chinese commercial banks

The Chinese banking industry has grown significantly with the increasing demand for financial services. This has also increased demand for IT services in the sector enhancing growth of the banking industry IT solution market. The market is expected to grow at an annual compounded rate of 21.7% from 2013 to 2017 (Kearney, 2004). The market will be 9.6% higher than China’s banking industry IT market. The year 2012 was a milestone for the development of the banking sector with the launch of the five-year plan for development and reform of the financial industry. Measures for managing commercial bank capital resulted in the introduction of new capital regulations for the industry (IDC, 2013).

The interest rate market also developed significantly in 2012 because of the bidirectional expansion of floating ranges for loan and deposit interest rates. Financial reforms were a significant aspect in political debate, in 2012 laying the foundation for the development of the banking industry. It experienced significant development in 2012 with business and IT functions being highly integrated. The significance of technology in the industry became more apparent and stepped into a new phase of internationalization.

Indigenous innovation policy and widespread government investment have helped in enhancing technological advancement, in China. In spite of these advancements, China’s computer network and technology still lags behind compared to the advanced economies. Chinese financial institutions have been falling short of international competitors because of low financial innovativeness. This has reduced the ability of such banks to develop into world standard players.

The current situation in the banking industry in China is that the different institutions have realized the significance of technology. They have embarked on strategies for enhancing the utilization of technology in order to increase competitive advantage. The government has also started encouraging collaboration with international players to enhance their global footprint. Initially, financial institutions in China, especially the most sensitive banks, were used to doing everything internally (Daianu, 2005). The “opening up” policy of 1978 enabled Chinese companies to learn from foreign nations and interact in the global market (Hawkins & Mihaljek, 2006). They did not open up to working with foreigners because of their conservative mindset. This mindset is changing, and they are making efforts to enhance performance through the establishment of strong alliances. One such alliance is the collaboration between the Bank of America and China Construction Bank. The two banks sought to get in to collaboration to provide innovative credit card services in China. This collaboration was meant to leverage the financial strength of CCB with BoA’s leading credit card expertise (Bank of America, 2007). This collaboration provided the bank with the capacity to develop solutions that will enable it retain market share while meeting the growing market demand.

Problem Definition

It is critical for administrators and other decisions makers to understand the benefits of IT outsourcing for their organizations. They also require comprehensive information on the risks and potential pitfalls that their businesses can encounter while implementing IT outsourcing. There are many areas that require consideration including the model to be implemented as well as the best way to ensure the security of critical information.

Significance of the study

Most of the available literature on IT outsourcing has focused on advanced economies. China and other emerging economies have been assessed as the destinations for outsourced work from the West. There is limited research on the outsourcing drivers and issues for domestic organizations in China. This study will provide critical information on how banks and the financial services sector can benefit from outsourcing IT (Deloitte Research, 2003). It will also shed light on the considerations made by the administrators and other decisions makers before outsourcing their IT functions. This will play a critical role in aiding companies that provide outsourced IT services to know how to attract commercial banks as clients. It will guide them on the aspects that they have to consider. This will enhance their competitiveness and attract high-value clients such as financial institutions or commercial banks.

The study is also essential in providing a clear understanding of the political economy and the business atmosphere surrounding the financial services sector. The industry is highly dependent on the government, and there are key political factors that require consideration in strategic decisions (King, 2005). The current study will highlight the political factors that have to be considered by decision makers in the financial services sector. This will aid in understanding the considerations that organizations have to remember in order to benefit from outsourcing in the financial services sector.

Purpose of Study

The background information on the banking industry and developments in relation to IT outsourcing show that significant thought is put into such decisions. The managers have to assess critical information regarding their operations as well as the market in order to benefit from outsourcing. It is clear that financial institutions will benefit from outsourcing y ensuring that they implement key strategies effectively. This highlights the purpose of the current study, which seeks to investigate the impact of different factors that influence decisions towards outsourcing strategies applied in commercial banks, in China.

Research Objectives

The research aims and objectives of the study focus on the decision-making aspects considered by managers in commercial banks when adopting IT outsourcing. The objectives of the study are:

  1. To determine the potential risks for Chinese commercial banks that want to engage in IT outsourcing activities
  2. To assess the key factors that Chinese commercial banks consider in their IT outsourcing strategies
  3. To investigate the strategic model that is most appropriate for outsourcing decision-making in commercial banks
  4. To assess the criticality of outsourcing to financial institutions
  5. Assess whether management attitude towards outsourcing influences their perception on the criticality of the strategy

Research Questions

The research objectives of this study will be accomplished by developing effective research questions to be tackled during the study. These questions will focus on the key areas that are significant to decision-makers in the financial services sector. The research questions to be addressed in the study are:

  1. What are the potential risks for Chinese commercial banks that want to engage in IT outsourcing activities?
  2. What are the key factors that Chinese commercial banks consider in their IT outsourcing strategies?
  3. Which strategic model is most appropriate for outsourcing decision-making in commercial banks?
  4. How critical do financial institutions consider outsourcing to be?
  5. Does management attitude towards outsourcing influence their perception on the criticality of the strategy?

Theoretical Framework

The hypothesis considered for this study is that commercial banks have to consider several key aspects before engaging in IT outsourcing. They have to take a core competency focus and ensure regulatory conformity in their operations. These are the two top factors considered by commercial banks when implementing outsourcing strategies. It is critical to consider that commercial banks also worry about the security of their critical information because of the privacy of customers. As a result, the decision makers in commercial banks have to consider the quality of work, as well as the security offered by the service providers. In outsourcing IT functions, in commercial banks, they focus on different factors that may influence the decision. Commercial banks have priorities such as security, quality of work, strategic aspects that they follow in selecting the model and the service provider. This study follows the model of perceived risks and benefits to assess whether they have a significant influence on the decision by managers. It utilizes a model adopted from (Gewald & Dibbern, 2009) to assess the influence of perceived roadblocks, risks, benefits and criticality in adoption of IT outsourcing for commercial banks. The study utilizes the model suggested from Gewald & Dibber (2009), but modifies it to ensure that the constructs of perceived risk and benefits suit the context of the Chinese financial services sector.

Literature Review

This chapter highlights the available literature on the use of IT outsourcing in different industries. Its focus is to show the areas that have been highlighted in previous studies. It will also emphasize strengths as well as weaknesses of the data or available information in order to show gaps.

Outsourcing in Emerging Economies

Outsourcing decisions on different organizations are based on different factors such as labor cost. The cost of labor and services provision is the main reason why many organizations outsource their non-core activities. This is because it provides them an opportunity to access high quality services at competitive prices. This occurs because most of the destinations for outsourcing services are low cost emerging economies that have an abundance of skills. They offer IT and other services at significantly low costs compared to other countries. This has played a critical role in making emerging economies significant destinations for outsourced work. The governments in these countries such as China and India have taken the initiative by encouraging their citizens to establish outsourcing companies (Yeats, 2001). Benefits such as tax breaks act as an incentive for the development of these institutions.

This has made emerging nations key beneficiaries of outsourcing because of their availability of cheap labor, high skill levels, and an appropriate environment for attracting FDI. Most of the clients for outsourced services are in advanced economies such as Germany, the UK, and US. Labor cost arbitrage due to the differential is the main aspect influencing outsourcing from these economies. The factors that influence the outsourcing of IT and other knowledge-based services also differ significantly from manufacturing. Different industries have varied factors and roadblocks that may influence their uptake of outsourcing activities. The factors influencing outsourcing among companies in the same country or region also vary considerably compared to offshoring across regions. This means organizations in emerging economies have to be effectively apprised with information on the quality of services provided as well as other factors that influence their decisions (Fowler & Jeffs, 1998; Ketler K. & Walstrom, 1993).

Benefits of IT Outsourcing

The main reason why organizations engage in IT outsourcing is that they can derive significant benefits that increase their competitiveness and productivity. Arguments on core competencies, comparative advantage, and transaction cost economics indicate that outsourcing has a cost aspect (Lacity et al, 2009). Managers who are motivated by expectations to generate benefits such as cost reduction, flexibility, and high productivity often see it as a rational decision. Outsourcing provides a significant opportunity to control costs by enhancing flexibility. This is because they can purchase IT capacity as required by their operations. Outsourcing companies have economies of scale and scope because they specialize on particular services or areas (Janko & Koch, 2005). This enables them to provide services at significantly lower costs compared to the cost incurred by their clients in doing the same in-house.

Outsourcing provides an opportunity for organizations to improve on their productivity by focusing on core competencies. They get access to a pool of highly qualified technical skills and knowledge for augmenting organizational gaps. The management of a company that outsources its non-core activities gets access to skills that enable the organization to enhance the productivity of its resources. This provides an opportunity for enhancing competitive advantage for the organization. This is because the organization combines in-house skills with those of the outsourcing vendor (Casale, 2001). Outsourcing provides significant benefits to the overall business performance through process improvisation and customer satisfaction.

The different studies on the benefits of outsourcing indicate that it is meant to provide tactical, strategic, and business benefits. One of the main benefits is flexibility because it enables the transformation of fixed to variable costs. This presents benefits that enable organizations to focus their activities to the benefit of customers and creation of value (Fisher et al, 2008; Yang & Huang, 2000). Some of the tactical and strategic benefits of outsourcing include efficient management of organizational knowledge. Improvisation of IT, business processes, and innovation provides benefits for organizations that enable them to meet customer demands effectively.

Risks of IT Outsourcing

Outsourcing is a highly lucrative business process because of the benefits it confers to them. It is critical to consider that the high payoff associated with outsourcing also involves risks that may hinder success. The growing trend of outsourcing involves a growing practice in terms of scope and nature. This situation presents a risk that client organizations face because of their reliance on the vendors for services. The client firm may become over reliant on the vendor of outsourcing for IT or other business needs. This over reliance is negative because it leads to the client organization failing to get the benefits of outsourcing (Duhamel, 2003;). This risk is exacerbated by the inability or unwillingness to provide the level of quality required. This leads to the client organization failing to get the benefits of outsourcing because of quality inconsistency (Marin & Verdie, 2003).

Another risk of increasing IT outsourcing is that the client firm may lose core competencies in the field. Organizations outsourcing processes or IT expose themselves to the risk of losing essential internal competencies, cross-functional skills, or innovation capacity. The client organization may also lose control over the processes or the vendor thus reducing its ability to meet customer needs. Engagement in an outsourcing contract also develops problems associated with adverse selection and agency theory. Adverse selection, failure by the vendor or low quality services can increase the complexity of business management. This may defeat the rationale of outsourcing because it makes business difficult for the client. A study by Rouse and Corbitt (2003) showed that management of vendor relationships is one of the main risks associated with outsourcing. Poor management of these relationships can result in reduced realization of the expected benefits and may damage the client organization.

Banking and financial services institutions have an additional set of challenges associated with the regulatory environment (Jinnan & Hualiang, 2010; Puga & Trefler, 2002; McLaren, 2002). They have to consider the legal obligation for services and information as well as reputational risks for issues such as lost data or poor service quality. Confidentiality and data integrity issues may arise with IT outsourcing in commercial banks (Gewald & Franke, 2005). These risks may result in many financial institutions shying away from outsourcing their IT because they represent very heavy potential losses. These risks span the wave of outsourcing from ITO to BPO and KPO, but the degree of impact from each factor differs based on the type of outsourcing and the organization.

Theoretical Models Applied In Prior Research

Prior research on the factors influencing outsourcing decisions in different organizations have focused on management attitude towards outsourcing. The perceived risk theory (Peter & Micheel, (1976) has played a critical role in determining such studies. Other decision theories that have been used in assessing decision making regarding IT outsourcing include resources theories and innovation diffusion theories. Cost-risk analysis and Delphi model expert opinion have been applied in prior studies on the decision-making process involving outsourcing activities. Four theoretical constructs based on perceptions have been applied to conceptualize different factors that influence outsourcing decisions. The Jain and Natarajan (2011) study used four theoretical constructs of perceived benefits, perceived roadblocks, perceived risk, and perceived criticality.

Research Methodology

This section of the paper highlights the strategy applied in addressing the research questions by collecting and analyzing data. The research methodology shows the participants of the study as well as the data collection and analysis plans. The study is designed qualitatively because it relies on the development of a new decision-making model addressing influential factors. The qualitative study relies on in-depth interviews that seek to understand the factors influencing management decisions in commercial banks regarding IT outsourcing.

Participants

The participants for the study are Chief Information Officers (CIO) from major banks in China. The focus on CIOs is because they are involved in decisions regarding IT, which makes them appropriate for this survey. The study focuses on major banks in China because they have considerable IT operations and they would benefit the most from outsourcing. This strategy aids in assessment of the political economy in China in order to develop decision models that fit into the environment.

Data Collection Plan

The data will be collected using open-ended interviews that will be conducted on CIOs in major Chinese banks. The interviews will be conducted face to face in order to provide opportunities for getting additional information. The respondents will be selected using convenience sampling and will rely on getting qualitative data from a small sample of CIOs. The respondents selected will be given an opportunity to expound on the questions asked in order to provide qualitative information on decision-making regarding IT outsourcing.

Data Analysis Plan

The data collected from the interviews will be coded in order to prepare it for analysis. This will make it possible to assess the responses and analyze them according to the model selected. The responses will be coded to show the categorizations of perceived risk and benefits from the respondents.

Anticipated Findings

Anticipated findings from the study will be beneficial to medium-sized commercial banks in China. They can use the results of the research to evaluate their situation before making outsourcing decisions. This will aid them in developing a strategy to avoid undesirable consequences and costs. Development of a decision model for assessing outsourcing strategies will help banks to gain a competitive advantage over their competitors.

IT outsourcing vendors can also benefit from the findings of the study. Knowing what the customers need is a fundamental requirement for any business. IT outsourcing vendors will gain information how to attract the proper market segment and develop efficient products. This is especially beneficial for foreign vendors because they will gain an understanding of local preferences and risk endurance. The government and regulators can also benefit from the findings of this research by gaining insight on the deficiency of regulations implemented.

Limitations of the study include the use of a considerably small sample. This may reduce the reliability of the data and its generalizability in the population. Another limitation is that institutional information is unreliable. For instance, data from the banking industry indicates that Chinese Banks are performing brilliantly, but the market doubts the accuracy of these figures because of the institutional ineffectiveness of poor information and regulation (The economist, 2011).

Summary

This study will focus on the decision-making processes and models considered by bank managers in developing IT outsourcing strategies. This is based on the increasing use of IT outsourcing in the banking and financial services industry in order to meet customer demands. The research objectives of this study are to determine and assess the potential risks for Chinese commercial banks that want to engage in IT outsourcing activities. It also seeks to assess the key factors that Chinese commercial banks consider in their IT outsourcing strategies. It also focuses on the strategic model, as well as the criticality of outsourcing to financial institutions and management attitudes. The study utilizes two constructs to assess decision-making models on IT outsourcing in commercial banks, in China. The constructs proposed for the study are perceived benefits and perceived risks of IT outsourcing. The study is accomplished using a qualitative study design that utilizes face-to-face interviews to collect data. The data will be coded and assessed using the two constructs of perceived risk and benefit in order to develop a new model.

References

Aalders, R. (2012). IT Outsourcing: Making it work. White Paper. Fujjitsu.

Baldia, S. (2012). Thinking Outside the BPO: Knowledge Process Outsourcing to India.

Baldwin, L. P., Irani, Z., & Love, P. E. (2001). Outsourcing information systems: drawing lessons from a banking case study. European Journal of Information Systems, 10 (2), 15–24.

Bank of America. (2007). Bank of America and China Construction Bank to Collaborate on Credit Card Business.

Bartels,  F. L., & Pass, C.L. (2000). International Business:  A  competitiveness  Approach, Singapore: Prentice Hall.

Casale, F. (2001), “IT Index 2001”,The Outsourcing Institute/Sunguard Sourcing Report, 15 April. Conference on Information Systems: Omaha, NE

Daianu, D. (2005). Who  Fears  Outsourcing  and  Offshoring?  Southeast  European  Times,  31 January.

Deloitte Research. (2003). The Cusp of  A  Revolution:  How  Offshoring  Will  Transform  The Financial Services Industry. London: Deloitte Touche Tohmatsu.

Fisher, J., Hirschheim, R. & Jacobs, R. (2008). Understanding the outsourcing learning curve:a longitudinal analysis of a large Australian company. Information Systems Frontiers, 10, 165-78.

Fowler A. & Jeffs B. (1998). Examining information systems out-sourcing: A case study from the United Kingdom. Journal of Information Technology. 13(2), 111–126.

Gewald, H., & Dibbern, J. (2009). Risk and benefits of business process outsourcing: A study of transaction services in the German banking industry. Information & Management. 46 (4), 249-57.

Gewald, H., & Franke, J. (2005). A comparison of the risks in information technology. Journal of Information Technology. 22(3), 121–137.

Grossman, G. M. & Helpman, E. (2005). Outsourcing in a global economy. Review of Economic Studies, 72, 135-159.

Hawkins, J., & Mihaljek, D. (2006). The banking industry in the emerging market economies: Competition, consolidation and systemic stability- an overview.

Hirschhein, R. & Lacity, M. (2000). The myths and realities of information technology insourcing. Communications of the ACM. 43(2), 99–107

IDC. (2013). IDC: China Banking Industry IT Solution Market Size to Reach RMB 32 Billion in 2017 at a CAGR of 21.7%.

Jain, R. K., & Natarajan, R. (2011). Factors influencing the outsourcing decisions: a study of the banking sector in India. Strategic Outsourcing: An International Journal, 4 (3), 294-322.

Janko, W.H., & Koch, S. (2005). Sourcing decisions in the finance sector: Economies of scale and knowledge management. International Finance Symposium, Istanbul, 1-14.

Jinnan, L., & Hualiang, J. (2010). Legal Issues on IT Outsourcing of Financial Institutions. China Bulletin, 1-5.

Kearney, A. T. (2004). The Changing face of China: China as an Offshore Destination for IT and Business Process Outsourcing, Chicago: A. T. Kearney.

Ketler K. & Walstrom J. (1993). Outsourcing decisions. Inter-national Journal of Information Management. 13(6), 449– 459

King, W.R. (2005). Outsourcing becomes more complex. Information Systems Management, 22 (2), 89-90.

Lacity, M.C., et al. (2009). A review of the IT outsourcing literature:insights for practice. Journal of Strategic Information System, 18, 130-46.

Marin, D., & Verdie, T. (2003). Globalization and the Empowerment of Talent. Discussion Paper Number 4129. Centre for Economic Policy Research .

McLaren, J. (2000). Globalization and vertical structure. American Economic Review, 90, 1239-1254.

McLaren, J. (2002). Globalization and Vertical Structure. American Economic Review, 40 (2), 12-22.

Peter, J. P., & Michael, J.R. (1976). An investigation of perceived risk at the brand level. Journal of Marketing Research, 13 (2), 184-8.

Puga, D., & Trefler, D. (2002). Knowledge Creation and Control in Organizations. Working Paper Number 9121. National Bureau of Economic Research.

Rouse, A.C., & Corbitt, B. (2004). IT-supported business process outsourcing (BPO): The good,the bad and the ugly. Proceedings of the Eighth Pacific Asia Conference on Information Systems: Shanghai, China.

World Trade Organization. (1998). Annual Reports: 1998. Geneva. World trade Organization.

Yang C. & Huang J. B. (2000). A decision model for IS outsourcing. International Journal of Information Management, 20(1), 225–239.

Yeats, A. J. (2001). Just  How  Big  is  Global  Production  Sharing?,  in  Sven  W.  Arndt  and Henryk  Kierzkowski,  Eds., Fragmentation:  New  Production  patterns  in  The  World Economy. Oxford: Oxford University Press

Click Here To View IT Dissertation Topics

IT Outsourcing Dissertation

Is It Worth Not Outsourcing Information Technology and Keeping Operations Domestic?

The report on the importance of IT outsourcing asks the question is it worth not outsourcing information technology and keeping operations domestic and then answers best possible solution of it. The outsourcing of information technology is associated with various issues in the implementation of IT outsourcing but it has achieved highest level to increase the competitiveness of the user or client organizations to reduce costs, increase their learning and knowledge and improve their business efficiency due to best quality services from the outsourced vendors. In the global commerce and competition, IT outsourcing has been highly effective and useful due to cost efficiency, productivity, learning and experience and the development of IT knowledge. The report also described Singapore growth in IT diffusion initiative by the central government which has contributed greatly in meeting their global IT business needs and increasing the future competitiveness and economic development of the country. The outsourcing of information technology in the emerging global market and throughout the world has contributed greatly in achieving short-term and long-term business objectives of the user organization in their relation with service providers.

Introduction

The outsourcing of information technology has become a global phenomenon and various user organizations prefer to outsource their IT functions despite keeping operations domestic. It is worth to outsource information technology despite some contractual and operational level deficiencies. The report identifies the global commerce and competition and how IT outsourcing has contributed greatly in meeting business objectives of user or client organizations to achieve competitiveness in their business operations and administrative functions at lower costs and highest level of efficiency. The report describes various aspects that contributed greatly in the expansion of IT outsourcing and giving it worldwide popularity among top business organizations. IT diffusion model in the Singapore context, development of IT outsourcing in the emerging markets, management of IT outsourcing in the global firm, and outsourcing of information technology worldwide has become so popular that large numbers of business organizations now depend in outsourcing the operations of their business projects. The report identifies that how business organizations have achieved efficiency, competitiveness and excellence in their business operations by adopting IT outsourcing and preferring to get the development of their business projects from outside their regional territories from experts anywhere any time in the world. Trends in IT outsourcing has increased in the recent years with increased level of communication and transfer of information across various organizations in no time and at no costs. Since 1950s, business organizations have adopted IT outsourcing due to their associated benefits like save in their operational costs, improvements in strategic performance of businesses like applications development, programming, development of desktop applications, telecom management and management of operational systems of the organizations.

Global Commerce and Competition

In the global commerce and competition, the outsourcing of information technology has achieved considerable growth among various business organizations around the globe. The report identifies is it worth not outsourcing the information technology and keeping operations domestic and suggests possible solution of it. The outsourcing of information technology is associated with some client related problems that are most common in the process of outsourcing information technology but overall outsourcing of IT proved to be highly effective and useful for various clients worldwide. Some problems in IT outsourcing include not understanding the post-contractual processes and decisions, receiving no support from client leaders, poor mutual understanding in different IT outsourcing contracts at their implementation level, lack of retained or governance team or one that is too small, the retained may not have the right skills required for the new roles, lack of losing key talent or poor knowledge transfer, inability to meet pent up demand of their services, end-user resistance to sometimes adopting new methods, issues of cultural clash between the client and the service provider and such a change does not last long. But despite all these managerial and implementation issues in the process of IT outsourcing, it is worthy to outsource information technology and not to keep operations domestic and client or user organizations should get the benefits of outsourcing with the development of their IT functions with best quality at reduced costs (McCray, 2008).

In the global commerce and competition, outsourcing of information technology is highly effective and useful for user organization and organizations are enjoying cost efficiency, productivity, learning and expertise in the latest software and IT development knowledge. There is no need to keep the operations domestic when there is such a huge opportunity available due to globalization and increased success of IT outsourcing globally. Outsourcing is based on the idea of hiring someone for the development of a specific job that is impossible to do within the regional or domestic boundaries. In business, outsourcing can be found in different industries, whether they are bigger or smaller, simple or complex. During the 1900s, the main objective of the outsourcing was to get the jobs done on labor intensive tasks and doing the business activities outside the core competencies of the user organization, such as outsourcing payroll development system of the organization, printing press outsourcing, inventory system outsourcing, ERP system outsourcing. Outsourcing in the information technology is increasing over the period of time and user organizations are outsourcing certain technical functions to reduce costs and to enjoy quality services out of their territorial boundaries. As the technology is continuously increasing, more sophisticated functions of the information technology firms are being outsourced. Like other utility providers, the new forms of outsourcing also assume to take the responsibility of some highly technical jobs, on behalf of their customers, to make sure the delivery of new services to ensure excellent performance, availability and scalability of the outsourced jobs (Kathawala, Zhang and Shao, 2005).

In global commerce and competition, outsourcing of information technology has become very famous among potential business organizations. Many large organizations have also outsourced some of its information technology functions to the service providing companies worldwide. Due to the popularity and the benefits they enjoy from IT outsourcing, they have now started to outsource all of their information technology functions and business operational activities. Different factors have contributed greatly in the evolution of IT outsourcing including reduced costs, enhancements in their functional productivity, higher quality of delivered IT work on various business functions, high level of customer satisfaction, time to marketing, and management ability to focus on other areas of the some of the major benefits of outsourcing. However, IT outsourcing is also associated with some challenges and risks that’s why it is examined whether or not user firms should outsource their functions and keep their business operations domestic. The outsourcing of information technology is based on the delegation of IT related activities that are associated with decision making, business processes, internal and external activities of the services, effective management and administration of activities according to agree upon deliverables, performance standards and outputs by setting up contractual agreements in between vendors and user organizations. But outsourcing is associated with some hidden costs, diminished service levels, unexpected service levels and outcomes. Despite these hidden costs and diminished service levels, various business organizations prefer to outsource some or all of their information technology functions to get excellence in their business operations and reduce their costs (Dhar and Balakrishnan, 2006).

Singapore and its Model for IT Diffusion Initiatives

Singapore and its model in information technology diffusion give best example of how outsourcing and globalization of IT functions became popular and essential among various business organizations in the world. Singapore is the major hub in Asia in the areas of manufacturing and services sector, it has improved the future competitiveness and economic development which is significantly affected due to the emergence of IT outsourcing and development of e-commerce globally. E-commerce development in Singapore is considered to be highly important from international comparative perspective due to several reasons. Firstly, Singapore is the first country in Asia that was targeted information technology as the strategic sector to promote economic development of the country during the period of 1980s. Singapore has also developed highly advanced ICT infrastructure in the country to meet the global demands before the arrival of e-commerce and internet in the country. E-commerce has represented a disruptive radical technological change and it has given new dimension to the outsourcing of information technology and other growth in the IT functions. Secondly, Singapore has achieved considerable economic growth in the country and become a hub of business activities in the Southeast Asia due to their strategy to attract foreign direct investment and to leverage their technology transfer and to considerably develop their local industries at the competitive level by supplying components and services to meet their customer needs (Wong, 2001).

IT diffusion model in Singapore was adopted in the early 1990s to prepare the country for the next phase of its future development. IT diffusion was known as IT2000 in which information technology resource were used throughout the country to give considerable development the e-commerce and IT outsourcing in the country. The Ministry of Education developed IT Master plan in the early 1997 to revolutionize the learning process in the country. The master plan was not only targeted to increase the learning of individuals to teach computer literacy and information technology but to increase the linkage between learning institutions in IT and the world around it to encourage creative thinking and to generate innovative process to promote education and administrative excellence in the country (Tang and Ang, 2002). The diffusion of information technology was broadly divided into two main levels including macro and micro levels. The macro level model was focused to aggregate various numbers of adoptions considering the user population in the entire diffusion process based on adoption, the numbers of adopters at a time and peak level in adoptions. Users are connected by some social or communication network in this model which allows items to be diffused using the neighboring adopters. The micro-level diffusion was based on modeling each user in their local adoption decisions and in the development of this model, complete knowledge of user to user relationship is essential and the knowledge of influential probability between the two neighboring users. In the development and promotions of IT outsourcing and e-commerce, the diffusion of IT model in Singapore has played a very important role in the Southeast Asia which influenced the other countries to increase their attention on the development and excellence of information technology and to grow their businesses significantly (Luu et al., 2012).

Emerging Markets and their Aspects in IT Outsourcing

Emerging markets are those markets where most of IT outsourcing profits is made and investing consultants help emerging nations to privatize their telecom sector. Such an investment arrangement in the telecom sector can provide world’s best connectivity to the businesses that locate within the nation’s boundaries. Outsourcing is associated with assurance of technology connectivity in the areas where it provides low-cost labor worldwide. Outsourcing structure in the emerging markets worldwide involves entry modalities and government structure that range from full ownership to control without equity, and arm’s length relationship. Outsourcing is also determined as intermediating user organizational functions or transacting through a business contract or deal in terms of market based activities. The information technology market has grown rapidly in the recent years in the emerging markets of the world including the United States. The buying of IT outsourcing services increased from 54% in 2000 to 59% in 2005 and same trends are also reported in other emerging countries. There were some short-term and long-term factors behind the purchase of information technology services based on discrete or project based purchase. In the short-term nature of outsourcing, there was a need reduce costs of the projects due to the current economic conditions while in the long-term outsourcing, the capabilities of the organizations were increased to get an access to new technology solutions through IT utility services like website hosting. In order to know whether or not information technology should be outsourced and to keep the operations domestic, it is necessary to know what potential benefits are associated with information technology outsourcing. The IT outsourcing market is growing steadily in emerging market like China, India, and Brazil. The outsourcing of information technology reduces the operational costs of the business, increases knowledge and awareness of latest technologies and enhances customer satisfaction through best quality IT outsourcing services at lower costs. Both the short-term and long-term factors are responsible for the continuous increase in information technology outsourcing. Short-term factors of IT outsourcing are associated with the need to reduce costs due to economic declining conditions of the world and long-term outsourcing increases the capability of delivering continuous access to latest technology solutions through IT utility (Liao and Reategui, 2002).

IT Outsourcing
IT Outsourcing

In order to examine the research question to know is it worth not to outsource information technology and keep operations domestic, outsourcing of information technology in emerging marketing like Asia, the Middle East, South Africa and Africa shows great appeal for many organizations to outsource their IT projects and to get quality work in limited resources. The outsourcing of information technology in emerging markets means companies develop partnership with service providing companies that establish legal and physical presence in the entered countries, setup necessary systems and processes and develop strong net of local relationship. The outsourcing of IT projects in the emerging markets indicates that multinational and domestic businesses are facing almost similar conditions in these markets, while their outlook and geographical condition differs. Outsourcing gives speed and scalability to the information technology projects as different companies in the developed world can outsource their business requirements to those who are well established service providers than building up own infrastructure (Data, 2013). When user organization outsource their information technology projects to service Provider Company in another country, it gets cost advantage both in labor and raw materials, and achieve highest level of productivity due to low wages benefits. In outsourcing IT projects in different areas, the user organization enjoys highest value of chain integration as it gets extensive integration with suppliers and customers. The more integrated the company is with its suppliers, the more benefits it can develop from such a relationship and strengthen their supply chain management against their competitors and achieves excellent position at their local markets. IT outsourcing also offers opportunities for retail market operations where user firms can accelerate their operations due to modernization, foreign investment, consolidation and privatization. Outsourcing of information technology becomes worthwhile for user organization depending on many factors that influence decision of IT outsourcing based on financial, resource, strategic, managerial and cultural concerns. All these broad categories suggest that outsourcing of IT projects is based on series of forces that work either in favor of outsourcing or against outsourcing. The interaction of these forces finally mold management decision making to outsource or not in the emerging markets. All these factors suggest that outsourcing of information technology is beneficial to the user organization that reduces its financial costs, improves financial index performance, improve cash flows, leverage financial strengths, get an access to external expertise and technologies that are not possible without outsourcing of information technology, build mergers and acquisitions and business transitions, reduce project delivery lead time, enhance business focus, ease globalization, build strategic partnership with experts, ease performance measurements and gives overall solution to the user organization to get best services at lower costs (Liao and Reategui, 2002).

Management of IT outsourcing in Global Firm

Management of IT outsourcing is based on the management of workers who work for the development of desired technology abroad. It is not an easy task to do because it is associated with cultural differences to manage in outsourcing the IT projects. The outsourcing activities of a firm have become a very important issue in the modern day world with politics, welfare economics, international business and business management. The management of IT outsourcing is not a new phenomenon and getting development of information technology projects in locations other than the country in which they are used by the user organization. The world has seen dramatic increase in the outsourcing of information technology in which domestic firm sends some part of value added activities, whether the development of payroll systems in IT, the development of inventory or ERP systems, or software writing developed for another country continuing to sell its output into the domestic market. It helps domestic customer to transfer money to foreign producers other than local by draining liquidity out of the domestic economy. The phenomenon has developed the management of global firm in IT outsourcing to generate value for product design, manufacturing, support of services sector, services support, distribution services, customer services and the development of different software development projects. All these activities are performed in multiple differentiated locations all over the world by using intra-firm trading activities to tie up operations into an efficient whole, and then selling unique mix of goods and services at differentiated market places around the world and enhancing the position of these goods and services to original home market (Tallman, 2011).

The management of IT outsourcing in the global firm has led to significant increase in the exploration of new knowledge and expertise, cost savings and improvements in the bottom line. Some companies have even achieved greater returns by outsourcing their projects worldwide and using their global partners to drive innovative strategies to develop new software, innovative products and services in the information technology, faster service time-to-market and their successful entrance into new markets. It has made considerable shift of traditional outsourcing to the collaboration globally and getting competitive advantage over time without any need to be restricted their operations within the domestic markets. The outsourcing of information technology is worthwhile to the business organizations as it has increased their efficiency, increased global technology standards with open architectures, and developed a powerful collaboration tools and infrastructure by outsourcing their IT projects. Furthermore, the global collaboration of the information technology has aligned strategic development, organizational design, product development, program and project management, platform specification and intellectual property management of the organization involved in the outsourcing of their information technology projects at the global level (MacCormack et al., 2007).

It is Worth Outsourcing Information Technology?

In today’s global economy, the outsourcing in information technology has become very common among businesses operating in this line. Some large business organizations are successfully outsourcing their information technology operations to reduce costs. The report identifies is it worth not to outsource information technology and keep operations domestic. But the outsourcing of information technology projects have increased in the recent years and business organizations prefer to outsource their projects meeting their business needs. Different factors have contributed greatly in the outsourcing of IT projects with reduced costs, enhanced productivity, higher quality of IT development, higher level of customer satisfaction, time to market and focusing on the main areas of the benefits of outsourcing. At the same time, outsourcing of IT projects pose some risks and challenges to business owners that’s why report indicates that operations of information technology should be done domestically. The outsourcing of information technology is based on delegation of some or all IT tasks to professionals in other countries. These tasks are offered to them to enhance the quality of work and considering the IT related activities in business processes, internal activities, and services to external providers who manage and administer these activities according to already decided deliverables and performance standards. But considering some risk factors in IT outsourcing it is essential that organizations should be careful in planning of what knowledge to be kept in-house and what to be outsourced. Companies can also face some other risks to outsource information technology in the formulation of scope and decision making on budget and schedule estimates (Dhar and Balakrishnan 2006).

Business world has shrunk in the recent years and same trends of outsourcing information technology have also been adopted by the IT industry unlike traditional models of economy. The level of communication has increased in the modern world and it is now possible to transfer the information across the globe in no time and at lower costs. It is not essential to produce goods at the site of consumption as the consumer of information not cares where the information is generated and how much time it will take to be on time. The non-tangible nature of the information technology has made this business highly attractive to be outsourced to highly qualified professionals. Is it worth not outsourcing information technology and keeping operations domestic is not good in the modern world because IT outsourcing is associated with knowledge and learning produced through outsourced activities and business processes. In outsourcing, the property or decision rights of a user organization over information technology are transferred to an external organization. The IT outsourcing is based on high expectations of the user organization but it is also associated with some bitter disappointments. The outsourcing industry has shown considerable increase in the recent years and worldwide spending on the services of IT outsourcing have reached to a milestone of $64 billion in 2001 and increasing with a constant rate. But despite these growth patterns, both the user organization and the vendors are struggling to realize about the value proposition of outsourcing as vendors deliver economic and management benefits to their customers outweighing contractual costs (Levina and Ross 2003).

Since the early 1950, business organizations are using outsourcing of information technology (IT) to get the benefits of best services from worldwide at reduced costs. Early period of outsourcing was associated with the extraordinary benefits of saving operational costs, but in the recent times, the motivation to outsource IT projects has been shifted to strategic business performance improvements. Large numbers of IT functions has been outsourced like programming of business projects, applications development, desktop applications development, telecommunication management and operational systems. The associated value of knowledge and learning in outsourced activities has given new prospects to the outsourcing industry that has grown with a rapid pace in the recent years. In performing some activity, business organizations learn more about the development of some specific product or service. It gives greater knowledge to the business organizations to be competitive with their competitors after getting the development of their outsourced projects at reduced costs with extraordinary benefits. But at the same time, outsourcing of IT projects cause some severe problems to the pervasiveness in IT functions of most of the business organizations. The lack of appropriate IT resources that the user organization outsources may reduce the capability of the organization to compete well. When some particular function, knowledge or activity or non-core IT activities are outsourced, they may lead to the firm’s capability of outsourcing wide array of other related competencies, or deteriorate some of retained competencies and activities of the organization, particularly if the information technology projects are outsourced among large numbers of subunits considering the business needs of a user organization (Singh and Zack 2006).

The business outsourcing can be done anywhere at any time; whether business projects are small or large, simple or based on huge complexity. During the period of pre-1900, outsourcing was only focused on the production of labor intensive activities and business activities that were performed outside the core competency of the organizations, like the outsourcing of the printing press, janitorial work and food preparation, and recruitment of seasonal migrants’ farm workers. In the industrial society, outsourcing was expanded to the manufacturing industry to get the reduction in costs after great depression period in Western economies. Most of the large business organizations outsourced their manufacturing operations like outsourcing of automobile to different producers and metal, glass and rubber products. Latest developments in the considerable growth of information technology (IT) have given companies new opportunities to outsource some of their technical functions that are beyond their technical competencies. For example, in the earlier outsourcing of information technology, payroll processing was outsourced by user companies to vendors worldwide. When technology increased considerably worldwide, other information technology operations and functions were also outsourced like data management, document storage functions and technology and maintenance of their platforms. Like other established utility providers like energy providers, the new outsourcers would be responsible to offer best services at reduced costs on behalf of their customers, and to manage the delivery of new services while ensuring their availability, scalability and performance. Therefore, companies have adopted global outsourcing strategies in the information technology because they want to build sustainable competitive advantage and competitive flexibility in their worldwide operations (Kathawala, Zhang and Shao 2005).

The strategic value of IT outsourcing is highly focused on the knowledge and learning of information technology and reduction in costs to get competitive advantage over others. It is worth outsourcing information technology due to highest level of productivity and information sharing organizations have achieved over the years with no need to keep their operations domestic. The business activities that contributed greatly in the business growth of user organizations and service providers include the production of specific outcomes due to IT outsourcing, knowledge sharing that can be viewed as a platform from which many activities and outcomes can be derived and increased level of learning is enjoyed. Outsourcing maintains and increases the level of knowledge and learning associated with the activity which makes a profound impact on the long-term ability of the organization to compete than merely outsourcing its activity itself. But some organizations do not take knowledge and learning into considerations with outsourced activities as they find it highly difficult to find out the economic or strategic value of such intangible assets. Outsourcing of information technology is associated with some unique issue like the pervasiveness of IT functions in most user organizations. When executives consider it non-strategic in nature, they find that information technology is a source of strategic innovation and business strategies can be greatly influenced by emerging technologies that are only possible through the outsourcing of information technology. But the lack of appropriate IT resources that are outsourced by user organization can limit their ability of competition. The organizations face the deterioration of their retained competencies and activities, particularly in the areas of information technology resources that are shared among large numbers of subunits and affect the shape of most organizational processes (Khidzir, Mohamed and Arshad, 2013).

Conclusion

The report has identified that despite various issues in IT outsourcing, the outsourcing of information technology has become very popular throughout the world. The report has identified various points like the global commerce and competition, IT outsourcing in emerging markets, Singapore IT diffusion model, and the overall development of IT outsourcing in the world. The report has answered the question on IT outsourcing ‘is it worth not outsourcing information technology and keeping operations domestic’ in a way by highlighting all important points that determined the importance of outsourcing some or all functions of information technology to get business competitiveness and efficiency through reduced costs, best quality of products and services developed due to IT outsourcing and getting competitive edge over their competitors in this world of competition in information technology.

References

Data, Dimension, (2013), “The Ins and Outs of IT Outsourcing in Emerging Markets.” CS/DDMS, Dimension Data.

Dhar, Subhankar., and Balakrishnan, Bindu (2006), “Risks, Benefits, and Challenges in Global IT Outsourcing: Perspectives and Practices.” Idea Group Publishing, Journal of Global Information Management, 14(3), 36-69.

Kathawala, Yunus, Zhang, Ren, and Shao, Jing, (2005), “Global Outsourcing and its Impacts on Organizations: Problems and Issues.” Int. J. Services Operations Management, Vol. 1, No. 2, pp. 185-202.

Khidzir, Nik, Zulkarnaen, Mohamed, Azlinah and Arshad, Noor, Habibah, (2013), “ICT Outsourcing Information Security Risk Factors: An Exploratory Analysis of Threat Risks Factor for Critical Project Characteristics.” Journal of Industrial and Intelligent Information Vol. 1, No. 4, pp. 218-222.

Levina, Natalia, and Ross, Jeanne, W., (2003), “From the Vendor’s Perspective: Exploring the Value Proposition in Information Technology Outsourcing.” MIS Quarterly Vol. 27 No.3, pp. 331-364/ September 2003.

Liao, Kenny, G., AND Reategui, Luis, A., (2002), “Information Technology Outsourcing in Emerging Markets.” Alfred P. Sloan School of Management.

Lu et al., (2012), “Modeling Diffusion in Social Networks Using Network Properties.” Association for the Advancement of Artificial Intelligence, pp. 218-225.

MacCormack et al., (2007). “From IT Outsourcing to Global Collaboration: New Ways to Build Competitiveness.” Harvard Business School, Boston, MA, Wipro Technologies, Boston.

McCray, Shawn, (2008), “The Top 10 Problems with Outsourcing Implementations (And How to Overcome Them) Using Industry-Leading Change Management and Governance Practices to Achieve IT Outsourcing Success.” Tpi, knowledge powering results.

Singh, Satyendra, and Zack, Michael, H., (2006), “IT Outsourcing: Reducing Costs or Knowledge? OLKC Conference at the University of Warwick, Coventry.

Tang, Pui, See, and Ang, Peng, HWA, (2002), “The diffusion of information technology in Singapore Schools: a process framework.” New media & society, SAGE Publications, Vol. 4, No. 4, pp. 457-478.

Tallman, Stephen, (2011). “Offshoring, IT Outsourcing, and Strategy in the Global Firm.”, Management Faculty Publication, University of Richmond.

Wong, Poh-Kam, (2001), “Globalization and E-Commerce: Growth and Impacts in Singapore.” Center for Research on Information Technology and Organization (CRITO) University of California, Irvine, pp. 1-29.

View Information Technology Dissertation Topics Here

Cyber-Terrorism Cyber-War

Should Government Monitor Network Usage to Support National Defense?

Advancing technology has posed great difficulties in assessing threats to national security. The most serious acts of violence via the internet are cyber-war and cyber-terrorism, which have raised concern with security agencies in the governments of most countries. This essay will focus on the essence of the governments to monitor network usage in order to reduce civil crime and acts of terrorism via the internet in support of national defense. In addition, the essay will discuss the actions that national security agencies have taken in their efforts to curb the threats, as well as which specific networks they monitor.

In today’s modern society, internet networks are becoming an important way for both individuals and businesses to enhance communication. The productivity and social interaction of our society depend a great deal on this tool to foster relations and national development. However, as internet usage is rapidly growing, it is becoming more and more difficult to evaluate its effects. This poses a danger to both individual privacy and to national security.

Surveillance programs such as the Communications Assistance for Law Enforcement Act (CALEA) have become important strategies to combat and prevent criminal activity through computer-based networks. With the rapid change and revolutions of technology, governments are finding it very easy to put any personal information of the public under close watch with programs such as CBS (computers and biometric software) and Total Information Awareness Programs (TIAP). Even as the government is struggling to put safeguards in place, the American and most other world governments are still at risk from possible threats imposed by computer networks, and most Americans are losing their privacy due to the government’s efforts to minimize these threats (Stanley and Steinhardt, 2003).

The efforts of the government to control threats to national security through the use of surveillance still receive much criticism from individual citizens. Individuals see these efforts as an invasion of their privacy and into the privacy of companies. Although the government has the ability to monitor the usage of networks in an attempt to reduce risks before a security breach occurs, efforts to achieve this goal may still be fruitless (Whitehead, 2009). Nevertheless, major steps are being taken by the government’s intelligence agency to monitor networks in the interest of the public. These efforts are intended to prevent hacking and subsequent leaks of sensitive data in order to protect the privacy of individuals. This effort to increase safety and at the same time protect individual privacy is a necessary step towards achieving the government’s goal to support national defense.

Vulnerability to threats such as cyber-terrorism and cyber war pose a great danger to national security

While such cyber attacks are increasing, the government is making many efforts to monitor systems in the interest of national defense. Statistics reveal that by March 2013 over 38.8% of the world’s population will access the internet with over 65% online in developed countries (IWS, 2013). This diversity of networks has posed many problems that are made worse by weak government policies. Because of this, there is a need for the government to come up with strong policies to aid in keeping national defense intact.

One form of cyber attacks that has threatened American society and its companies is cyber-terrorism. Cyber-terrorism has multiple definitions. The most narrow definitions describes it as the intentional use of computers and computer networks that causes damage to people, information, property, or even an intimidation by another government with an attempt to cause destruction or economic loss (Matusitz,2005). Cyber-terrorism has the potential to damage industrial leaders who wish to protect their products. This is why most government and security agencies are motivated to combat the problems through the monitoring of all public networks.

As opposed to cyber-terrorism, cyber-warfare is more political in nature and involves a specific threat aimed at attacking a financial institution or company, leading to financial loss. Some of the latest reported victims of this type of cyber-attack were The Wall Street Journal and The New York Times, and these types of threats are extending into the roots of the U.S. government. These two prominent U.S publications received a major loss due to a compromise by a Chinese news syndicate hacking their operations (Szakmary, 2013). The kind of systems that control computer networks is becoming a major platform for cyber-terrorism, and indeed pose a threat to national security. Consequently, the threat is increasing and leading to political instability, economic loss and even loss of life. Because of this, the government has put policies in place in an that allow it to monitor public networks in order to reveal the nature and source of similar attacks in support of national defense.

The stuxnet worm is an example of cyber-terrorism on computer systems and the networking on which many organizations rely. This is a major culprit in Estonia and in Saudi Arabia affecting the infrastructure of the oil industry and was created by the U.S and Israel governments with the aim of applying it in uranium enrichment facilities. This is one of the dangerous malware created by the U.S government, and there are speculations that the government was targeting the power structure of Iran.

Cyber-Terrorism
Cyber-Terrorism

This worm attacked the Supervisory Control and Data Acquisition (SCADA) systems that control industrial communications, including power plants and gas pipelines (Zetter, 2011). This planned attack caused 100,000 computers to be attacked by malware, posing dangers to the industrial infrastructure of Iran. Many believe that it was the intention of the U.S government to destroy the industrial control systems of Iran. If the right monitoring techniques had been employed, such a spread of malware could have detected at early stage and controlled. This shows how the monitoring of networks is essential to detect the source of such threats and to avoid similar attacks in order to protect the interests of the nation.

Another possible threat to the government is the high degree of dependence on social networks. This includes Facebook, twitter, and blackberry. Social networks have been blamed for major riots that have occurred in major cities in the U.K. and have been particularly widespread in London (Potgieter, 2011). Freedom of expression and the rights of the media contribute to the increase in these threats. The efforts of the authorities to monitor the networks could reduce the violence and threats posed by social networking services.

Tracing crimes via the social networking media is also another challenge in implementing effective monitoring systems to prevent possible threats. If the government were to put monitoring systems in place, this would help detect criminal activity and reveal the location of planned attacks as well as assisting with the prosecution of the criminals in the judicial systems. This would help to reduce both cyber-terrorism and cyber-war. This demonstrates how the government’s role in monitoring computer networks would be effective in supporting national defense and the public interest of a nation.

Government authorities have put several security agencies in charge of monitoring networks to reduce possible threats. In order to prevent the use of captured data for unintended purpose, harsh regulations and laws publicized by these security agencies would restrict personal use of such information by employees and journalists. This demonstrates that governments understand how important it is to put such policies in place in order to monitor networks and support national defense.

In the United States, the National Security Agency (NSA) is the largest security agency that does mass surveillance. Current sources reveal that NSA secret programs survey millions of data from American’s and foreign national’s phone calls and internet communications (Greenwald, 2013). After 9/11, The Patriot Act was implemented, which mandated the NSA to spy on individuals without first obtaining a search warrant from the court. Although they are intruding in the private life of individuals, safety is paramount in the interest of the nation as a whole.

Another security agency that involves partnership between different states is UKUSA. Member states involved are the U.S, New Zealand, Canada and Australia (Schimid, 2001). ECHELON is a security intelligence collection and analysis network that UKUSA member states partner with in their operations. The system is able to identify communications between criminals and terrorists.

The security agency in charge of monitoring computer networks in the U.K is the Government Communications Headquarters (GCHQ). The operations of this agency are not limited to snooping of data (Leppard, 2008). GCHQ is the first line defense in the national security of Britain, as well as the top-most eavesdropping agency that monitors private communications through direct taps into fiber optic cables. Current developments show how the NSA and GCHQ are working together to perform mass surveillance. The case of Edward Snowden, a former U.S. security intelligence contractor, revealed that there is possibility of the government interfering with people’s private lives.

U.K. programs that were recently mandated allowing security authorities to track emails and website visits and to record communications in order to combat terrorism have remained a question of debate. Such plans are underway, although people still argue about how invasive it is to people’s privacy. The government has since put in place measures necessary to protect the public. Those who log visit certain web pages have to do so with an internet protocol (IP) addressees so that the government only records the activity on suspected pages.

Even though the debates about personal privacy are becoming intense, the agencies mentioned have seen the need to monitor various broad computer-based networks to counter terrorism in support of national defense.

The common and largest networks under surveillance by security agencies are Local Area Networks (LAN) and Wide Area Networks (WAN). These are large collections of internet networks, which have different purposes depending on the topology and user needs. The usage of the internet is high, and broad in terms of information which is why the government concentrates so much on monitoring the internet in order to support national defense.

Other areas of internet networks to which the government is extending its monitoring programs are electronic mail, the World Wide Web (WWW) and social networks. Social networks such as twitter, LinkedIn, and Facebook are linked with increasing crimes in both the U.K. and the U.S. It is very difficult for users of such networks to detect possible threats. Thus, the government sees it as necessary to monitor communications data with the fast- changing technology. According to Booth (April, 2012), 95% of serious organized crimes are detected by government counter-terrorism programs with the contribution of communication data.

This demonstrates how monitoring communication data, which includes the numbers dialed for a phone call, time, and email addresses, is compatible with the government’s goal of storing civil information and restricting the liberties of individuals in the interest of national defense.

Governments are also putting more effort into monitoring telecommunication networks, which involves mobile and landline phones. According to the Guardian newspaper, the government of the U.K. introduced a new law in 2012 mandating security services and allowing the police to put telecommunication networks under surveillance (Booth, 1 April 2012). The Strategic Defense and Security review of 2010 supported this law through the government’s program to allow security intelligence and law enforcement agencies to obtain communication data from phones and to terminate suspicious communications. This is an indication of the government’s commitment to counter-terrorism through monitoring all forms of communications media in order to support national defense.

Various technologies are used to monitor networks depending on the type of communications done

The government monitors network usage is by asking the communication providers for usage information. Since internet networks have a client-server model, the servers of Internet Service Providers process all requests from its multiple clients. Nevertheless, sometimes ISPs are reluctant to reveal such information, as they believe it is not their job to regulate the internet (Clayton, 2005). The best example of this is the technology used by Chinese Golden Shield, known as the Chinese Shield Firewall. The government designed it to hide information aimed at destroying the Chinese government from the Chinese public. The system only allows traffic to pass through several routers at the ISP level before being blocked. At present, Skype conversations provide evidence in support of this organization.

Individual companies also assist in the monitoring of employees and pass any suspicious information to the government. This is helpful in supporting national defense in the event that employees are planning any malicious or terrorist acts. Technical staff can also assist in viewing employees’ laptops and in case of any suspicious information they can pass it on to the management and thereafter to the police, who will pass it to the relevant national defense agencies.

In reported news in Toronto, seventeen people suspected of acts of terrorism were arrested following these kinds of monitoring exercises (Geist, 2006). The number of people under surveillance has increased, indicating that the systems governments use to monitor networks and support the government in national defense are productive.

It is better for government monitoring networks to be well informed by joint intelligence committees from U.K. and in the U.S. the senate select committee. They should be responsible for ensuring that the monitored information is handled correctly and securely, and the handling of such information procured from relevant bodies.

In conclusion, cyber-warfare and cyber-terrorism are becoming a major threat to national security. This is due to the increasing usage of the internet, therefore creating a stage for such acts executed as threats to state-run security. Cyber-based threats require no weapons, personnel or any form of explosives, but rather consist of unauthorized intrusion and an overload of worms and viruses to computer based networks systems through methods too difficult for governments and individual state members to comprehend today (Gable, 43).

The structural challenge for many governments is to come up with systems of security that fit the fast growing technology of the 21st century. Efforts to institute proper educative cyber norms and produce specialized managers have lagged behind due to improper planning and allocation of resources. In addition, with the fast technological developments, governments end up lagging behind the rapid changes in technology. As this trend continues, governments on the other side are increasing their efforts to combat the problem in support of national defense.

If terrorists are using the internet for their acts of violence and posing dangers to a nation, the government should invest more resources and invest in security technology systems for curbing terrorism. To achieve this, they will need sound educational institutions to produce specialized and skilled managers to counteract the acts of cyber attacks among the public. This will mean mobilizing IT expertise in the country and training them on how to prepare for the possibility of cyber attacks in the interest of national defense.

It should also be the responsibility of the law-abiding citizen to ensure that any information seen on the internet that is suspected to be related to a terror campaign attack be reported to the relevant authorities. This will ensure that the government gets enough information to fully combat the situation. It is a good idea for citizens to be comfortable enough for the government’s effort to protect the nation than to worry so much about his/her personal privacy. Attempts by the government to monitor networks and support national defense will only be fruitful if individuals of the state abide by and cooperate with the government’s policies.

In summary, for the public to agree that the government should monitor networks in the support of national defense is of prime importance. Knowing about and detecting threats from the internet is difficult, And it is only through the investment of vast technology relevant to the situation that we can foster the development communication that will help to curb threats to national security. Thus, irrespective of any concerns about the invasion of privacy, government monitoring of networks in the support of national defense should not be postponed.

References

Bonaventure O. (October 30, 2011), Computer Networking: Principles, Protocols and Practice

Booth Robert (2012), “Government plans increased email and social network surveillance”: Proposal echoes Labour scheme that was scrapped in 2009 over concerns it would breach civil liberties”. The Guardian, Sunday.

Clayton, R. (2005). Anonymity and traceability in cyberspace.

David Icke (2013) GCHQ and European spy agencies worked together on mass surveillance; David Icke books ltd. USA.

Geist, M. (2006). Internet Monitoring Leads to Terror Arrests

Greenwald, Glenn (2013). “NSA collecting phone records of millions of Verizon customers daily”. The Guardian. Retrieved 16 August 2013.

Gable, Kelly A. “Cyber-Apocalypse Now: Securing the Internet against Cyber-Terrorism and Using Universal Jurisdiction as a Deterrent” Vanderbilt Journal of Transnational Law, Vol. 43, No. 1.

Halliday, J. (2011). London riots: how BlackBerry Messenger played a key role.

IWS. (2011). World Internet Users and Population Stats.

Jamison, Jane. Israel, U.S. Behind Stuxnet Computer Virus Attack on Iran/Will Reactor “Melt-Down?” Right Wing News.

Leppard, D. (2008). Government will spy on every call and e-mail. The Sunday Times 5 October 2008.

Matusitz, Jonathan (2005). “Cyber-terrorism:”. American Foreign Policy Interests 2: 137–147.

Potgieter .A.(2011).Social Media and the 2011 London Riots.

Szakmary Chase (2011) Cyber-Terrorism Will Be the Greatest National Security Threat in the 21st Century Chase Szakmary.

Schmid, Gerhard (11 July 2001). “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system), (2001/2098(INI))” (pdf – 194 pages). European Parliament: Temporary Committee on the ECHELON Interception System.

Stanley J. and Steinhardt B. (2003) Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society”. American Civil Liberties Union.

Whitehead, T. (2009). Every phone call, email, or website visit ‘to be monitored’.

Zetter, K. (2010). Blockbuster Worm Aimed for Infrastructure, But No Proof Iran Nukes Were Target.

Zetter, Kim. (July 11, 2011). How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History. Wired.

View Computer Science Dissertations Here

Technology Acceptance Model

The Adoption Rate of E-Mobile Banking is an Impact of Customers’ Acceptance of Information Technology in the Banking Sector

The information and telecommunications industry had been a key enabler of productivity across the societies and economies. The IT innovation is not only a significant contributor to the economies of a state, but also towards the growth of the industries. In the present days, banking industries have felt the influence of the telecommunications by a margin among other industries. The emerging information technology trends in across states had been a concern of the researchers. Precisely, m-banking services have had an uptake as the banking industry have enhanced access of service with convenience and ease to use cell phones. This thesis study is aimed to an extensive provide research on the most influencing factors affecting adoption of the technology in banking industry. In this case therefore, the research will place focus on the m-banking services in Australian banking sector (Drennan et al., 2009). The study incorporates Technology Acceptance Model to derive a conceptual framework in order to address its objective and research questions. In this study, data will be gathered from literature reviews and analysts, questionnaires, and interviews. The collected information from interviewing 40 respondents through a survey questionnaire will be used to compare and provide discussion on the factors influencing m-banking adoption rate. Data analysis methods will include weighted mean calculation, for analyzing the questionnaire data, and regression method to test the correlations and significance of factors influencing adoption rate of m-banking.

Chapter One: Background Of The Study

Banking industry in the contemporary world has been intensive users of technologies. Since its emergence, technologies have rendered essential roles to industries to deliver quality products and services. Particularly, their essence had risen from financial technologies such as information and telecommunications across nations. In comparison of the recent IT and telecommunications services with those provided in early 1970s, it is clear that, there had been a complete transformation of technology acceptance and adoption rate in banking industries. This way, there had been numerous researches as an area of interest to scholars, managers, and scientist to explore as the apparent world has taken a new face of technology (Drennan et al., 2009).

This research paper, therefore, places attempt to further past research basing on the past theoretical views of technology acceptance model.

Research topic

The adoption rate of e-mobile banking is an impact of customers’ acceptance of information technology and telecommunications innovation in the banking sector.

Statement of the problem

The adoption rate of any advancement of technology is not guaranteed that it will translate into consumer adoption. However, consumers’ acceptance and their willingness to adopt new technology have been evidence to be a crucial aspect to the banking industry. This is especially in implementation of new product development and marketing. In which technology diffusion is partially determined whether potential users accept and adopt the technology employed.

Significance of the study

Not only scarce research on the technology acceptance and adoption had been a hindrance to the banking sector, but also a limit to managers to understand the priorities of the formation of intentions to accept and adopt mobile e-services. Precisely, this research study focus on the factors affecting technology acceptance model as proposed by Fred Davis. It seeks to expand research on the significance of the factors affecting TAM. This knowledge helps stakeholders in realizing the prevailing environment and its trends in the subject sector.

Objectives of the study

Primary objective

  1. To determine the significance of the factors affecting adoption of m-banking industry.
  2. To determine the significance of the factors influencing technology acceptance model.
  3. To understand consumer behaviors influence on the product development and marketing.
  4. To understand better on how adoption of m-banking has impacted financial services in the banking industry.
  5. To offer recommendation towards designing of effective m-banking marketing strategies.
  6. Do the potential customers perceive the relevance of the e-mobile banking?
  7. Do the potential customers perceive mobile e-service easy to use?
  8. Does the cell phone banking influence users attitude towards adoption.
  9. Does the intention to adopt the e-mobile banking influence consumer behavior.

Chapter Two: Literature Review

Internet mobile banking

Internet banking and mobile banking are both essential subsets of e-banking services. According to Lassar (2005, p. 177), internet banking can be defined as an electronic system that allows potential customers to perform various banking services electronically through bank’s website. It is an internet features which in the present day; mobile phones have been provided web surfing capabilities. It is an apparent trend of adoption of new mobile phones technologies that can enable users to access internet through their hand-held devices. The mobiles phones capabilities are enhanced by the wireless application protocol (WAP) cell phone banking with a similar inter-face to internet banking. Only that, the hand-held device is supported by the GPRS, WAP, EDGE, or 3G.

Internet mobile banking had been a fundamental change in the banking sector in the recent years. It is evidenced by the consumer movement from the conventional branch banking into more stand-alone banking services via electronic delivery channels than office branch. However, following the acceptance and intention to adopt new technology Chan (2001, p.10); modified the initial definition of mobile banking. His argument posits that mobile internet banking is an electronic transaction service via bank’s website by using a computer a computer and a modem to access internet. It is a field of study that researchers have considered the influence and the adoption of e-mobile banking. according to Suoranta & Mattila (2004, p. 364).typical e-mobile banking users will continue to use the wired channel while the current users of the automated bill payment and the branch offices will be shifted to mobile phone banking.

This way, cell phone banking users, cannot be drawn from the heavy internet banking users probably, because, they will continue using internet banking. Besides, he posit rationality for banks not to invest convincing its regular internet users to adopt a new electronic, but they should or rather attempt to enable potential customers outside this segment to be interested with the advantages of mobile phone banking. Precisely, the relevant performance of the new technology should be inessential issue of concern to the banking industry influence a change in accordance to customers on taste and preference.

Technology acceptance model

The initials steps required for adoption of the emerging information technology had been a hindrance of banking performance. It involves establishing which purpose the intended new system will address and what functionality the bank requires. This way, for any e-portfolio system the bank need to establish which one size fits all; corresponding to a series of standard functionalities (Zhang, et al., 2007).

Technology acceptance and its usage had been a focal point in a wide range of research studies. In this case, TAM application enabled understanding of conceptual issues related to the e-portfolio use. In which several theoretical models have been applied to provide sufficient study on user acceptance and usage behavior of emerging information technology trends. Several studies, including Roger’s diffusion theory, Theory of Planned Behavior, and Theory of Reason Action (TRA) gave inception of the Technology Acceptance Model. TAM has emerged to be preferable model that represents the preceding theories of technology usage through the profound beliefs related to the perceived usefulness and its ease of a technology. The previous researches have shown the powerfulness of TAM over other theories of the as a basis to explain the variance in systems use (Davis, 1989).

Technology Acceptance Model
Technology Acceptance Model

(Pearlson& Saunders, 2006) argues that, the use of TAM is predicted on the decision on or rather attention of individuals having control whether or not they accept the use of the system. The factors in the model are perceived usefulness, perceived ease of use and the attitude towards the usage of the system and adoption. The behavioral intention to use by the potential customers is the essentials factor that draws whether the users will actually utilize the information technology introduced. This way, the firm may draw critical decisions-making to enhance its performance especially in the banking sector (Ajzen& Fishbein, 2000).This theoretical view, therefore, derives the of propositions below;

Technology Acceptance Model and study of e-mobile banking

The mobile services convenience and promptness to customers had been growing concerns to academic researchers. Accordingly, a past growing body of academic research has examined the determinants of the cell phone banking acceptance and its utilization (Arora et al., 2011),.

Dillon and Morris (1998, p.5) portrays the technology acceptance as the demonstrable willingness of individuals within a group to employ IT for the designed task as intended to support. Basically, the research investigated the instrumental influences involving beliefs on how to utilize technology. This way, it results in the objectives hence improvements in the performance. (Thompson, et al., 2006) argue that non-instrumental factors may be limiting factors on the acceptance of the technology. However, the TAM posits that, perceived usefulness and perceived ease of utility are the fundamental detriment that influences an individual behavioral intention (Hu et al. 1999).

According to Laurin and Lin (2005, p. 878) research; it extended the technology acceptance model. Their perspective towards understanding of the behavioral intention to the utility of the mobile banking survey was conducted in Taiwan included the perceived credibility, perceived self-efficacy and the perceived financial costs in m-banking context (see figure 1).In their research, they revealed that, all stated factors have effects on the behavioral, and the perceived credibility is evidenced to be the most contributing factor to intention. However, on later study to generalize their earlier m-banking acceptance model, Wang, Lin and Laurn (2006) adopted an extended constructs. That is perceived usefulness had a significant contribution followed by the perceived ease of usage contributed behavior attention.

Another study by Cheong and Park (2008) carried out research on reluctance factors of the Korean’s to adopt m-banking services. In addition to the conventional TAM factors included additional constructs; facilitating conditions and the switching barriers. The findings in the research show that facilitating conditions affluence the positively the intention to use m-payment, whilst switching barriers negatively affected the behavioral intentions. Besides, Gu et al., (2009) research in Korea examined the determinants of the mobile banking. The authors introduced another factor; it considered trust as an additional key construct of the behavioral intention to utilize an introduced technology. In addition to self-efficacy, social influence, facilitating conditions, system quality, structural assurance, familiarity with the bank, and calculated-based on trusts were indicated as the key constructs of behavioral intentions. However, perceived usefulness and ease to use were the most contributing factors on behavioral intentions.

Another stream of research in developing countries was carried out to understand the socio-economic and technological impacts of m-banking adoption. Research placed study that m-banking in developing countries is considered as a complimentary service offered by the banking industry. It is considered an alternative of ATMs and internet banking. However, important criteria such as convenience and ease to use seemed to be important when they consider adopting m-banking. The appeal for the cell phone banking in developing countries revealed that influence on the convenience may be less than accessibility and affordability due to the network quality connection, coverage, and costs (Donner and Tellez, 2008). However, Laforet and Li (2005) investigation in developed countries; examined consumer behavior, motivation, attitude, and cultural influence on the m-banking in China. In the findings, customers in China do not attach much importance on m-banking convenience but perceived risks and technological skills are the most influential factors.

Lastly, Sripalawat et al. (2011) carried out to examine positive and negative factors influencing m-banking acceptance in Thailand. The research considered subjective norms, self-efficacy, perceived usefulness, and perceived ease to use as the positive factors. Contrary, the study considered device barrier, lack of information, perceived risk, and financial costs as the negative factors. Their findings not only revealed that positive factors are the most influential than negative factors, but also subjective norms to be the most influential amongst positive factors.

Conceptual framework

The conceptual framework deduces its constructs from the past literature reviews as from chapter two. The study basis is from the extended Technology Acceptance Model by of Luarn and Lin (2005). Its shows the factors which influence the adoption of cell phone banking. The constructs suggests that the technology user adoption of a new information system fundamentally determined by two factors; perceived usefulness and the perceived ease of use of the system. In addition, perceived credibility, efficacy and financial cost also affects the behavioral intentions of users to adopt m-banking. The model in this case, therefore, states the gaps between the past literatures reviews and the current study.

Conclusion

The successful marketing of the new technology remains one of the crucial aspects of banking industry that employs technology to satisfy customers across border. However, it places challenges when addressing the factors that influence potential customer’s decision to adopt the newly introduced technology. It requires better understanding on behavioral intentions to accept new technology. Specifically, the influence of beliefs of the existing technology moderates its adoption necessary another technology. This way, the study will gain better understanding through the past tentative literature reviews and followed by empirical research amongst customers. Besides, the study will provide extensive information to the field of marketing with possible strategies to m-banking.

Chapter Three: Methodology

This chapter provides discussion on the methodologies and various data collection techniques. These techniques will be employed as demanded by objectives of the study. The research methods were designed owing to the objectives of the study. For this reason, therefore, the strategies which the paper will use are to determine the major significance of the factors affecting adoption rate of mobile banking (Bryman, 2012).

Research approach

Philosophical approaches enable planning of the research design and the choice of methodology. It provides guide in choosing appropriate research methods regarding to the research objectives and research questions. In accordance, they follow research design choice, performance, assessment of design and the research quality. Besides, they are approaches which provides guide of the choices available from epistemology and ethnology as well (Johnson, 2000). Regarding ethnology, the paper will use realism paradigm to address the hypothesis of the study. This way the paper will adopt realism of factors affecting significantly the behavioral intentions to adopt mobile banking in Australia. On the other hand, the paper will use objectivity as its epistemology approach to base on the assumptions to deduce results without biasness. The researcher, therefore, will carry out the study in a neutral state to address the objectives successfully (Bryman, 2012).

The overview of the research methodology which the study will employ involves three-layer approach (see figure 2). It provides aims of developing an experimental framework to study the empirical findings. It incorporates a combination of both the primary and secondary data necessary to validate the study accordingly. This way, the paper will be able to test null hypothesis about a specific factor influence on the m-banking adoption (Saunders et al., 2012). The hypotheses derive form from the TAM literature review and interview data collected are as below.

  • H 1: perceived usefulness has a significant influence on the m-banking adoption rate
  • H 2: Perceived ease of use has a significant influence on the m-banking adoption rate
  • H 3: Perceived credibility has a significant influence on the m-banking adoption rate
  • H 4: Perceived self-efficacy has a significant influence on the m-banking adoption rate
  • H 5: Perceived financial cost has a significant influence on the m-banking adoption rate

Justification of the research methods

Basing the research actual need, qualitative and quantitative analysis will be used. The study sought to choose both techniques because it will employ to determine the significance of the specific factor on m-banking. It will therefore include the weighted mean average and regression analysis of the primary data. Amongst the techniques which will be used, the study will prefer interviews to be most appropriate to facilitate survey questionnaires effectively.

Questionnaire design

Technology Acceptance Model accommodated the banking industry analysis. Accordingly, it make it best-suited theoretical framework to study the factors affecting cell phone banking. The model will refer to the significance of the factors to determine behavioral intentions of the potential customer to adopt it. This way in provided a conceptual framework to address the hypothesis as it involves lots of internet participant of varied dimensions such as the customers, suppliers and other stakeholders. To improve on the validity and credibility, the study will paper will use both closed and open-ended questionnaires: in which questionnaire form will contain demographic questions, ratings for the constructs influencing m-banking adoptions, and throws open questions to try cover in summary any factor beyond the listed ones (Oppenheim, 2000).

Data collection

Primary data collection

In order to identify the significance of the key factors affecting the adoption of m-banking in Australia banking industry, respondents from top three bank’s respondents will be selected. This will be the primary source to form the null hypothesis to be tested in the study. The selection is based on the assumption that these respondents understand the nature of the industry banking services especially m-banking. This way, will ensure the result will fit into the context of the study. Besides, the data collection method will follow the questionnaire design mentioned above (see section 3.3).

Secondary data collection

Apart from the past literature reviews, the study will also use secondary method to source information from the bank managers. It will obtain answers regarding significances of factors affecting m-banking by processing questionnaires avenues such as the number subscribers, m-banking frequencies and customers’ satisfaction feedback messages. Similarly, it will access data from the bank’s customer care desks data concerning the subject matter of the study covering the limited range of two years; the past year of 2013 and to the current records of 2014 (Matthews et al., 2010).

Face-to-face interviews Justifications

Face-to-face interview technique had been most preferable over the past years to date. Researchers, analysts and journals had found it effective for empirical studies. Since it develops life participation in which the informant feels he or she is involved. Hence, attains a sense of ownership of the study too. Put simpler, it is an in-depth direct and a repeated face-to-face interaction between the researcher and the informant. This way, it enables the respondent to share freely and openly their opinion about the subject of the study regarding their experience, attitudes and lifestyles. Therefore the research will be in a position to uncover the respondent’s situations, attitudes and experience effectively (Oppenheim, 2000).

Besides, interviews will be used to draw opinions of the respondents. The interview methods will include Face-to-face interviews which is the preferable over email, and in-world interviews.

In-world interview justifications

In-word environment is a recent times innovations which enables internet users to engage in a virtual environment through avatars. It is more like face-to-face social interaction but it is computer mediated communications feature which participant may as well interact through live chats. This is a marketing platform which banking industry places their products advertisement in an immersive environment such as online gaming, videos and so forth. Perhaps it is adopted for some reasons to embraces the Second Life way of doing things in 21st century. In this case, therefore, the study will engage respondents online through in-world interviews at ease. It is a technique which is essential especially respondents are unavailable to participate in face-to-face interviews.

Email interviews justifications

These are research interviews essentially conducted in rare occasions. Mostly, it is applied in case where the respondent is unavailable at the time of or uncomfortable in having face-to-face interviews. It is a rare instance that considers time constrains in which respondents will participate via email. The researcher will forward mail with semi-structured questions expected to be replied within a period of one week. All the respondents will be assumed that they are computer literate and had access of internet. This is because they on the expectations of the study that if they are using m-baking therefore are computer literate. However, email-based might raise confidentiality, deception and consent, otherwise, resolved to provide confidentially and identity protection (Bryman, 2012).

Sample and sampling size

In order to achieve the desired objectives, sampling strategy is important to be used especially, where qualitative approach is intended to be used. According to this study, the target population will be Australian top three bank’s customers. It will consider thirty respondents between the age of eighteen and seventy five. The study target pre-assumes that the population is the actual customers of the bank with access to the internet, computer literate, bank account and the uses m-banking services (Davies, 2007).

Random sampling method will be employed for the sample selection from the identified banks. This will be a necessary method for the study in order to avoid selection bias. It will create an opportunity in conducting the survey at neutral state for the sample population. The pilot-testing of the model will be conducted prior the study in order to ascertain the strategy performance, reliability and validity.

Methods of data analysis

Data analysis is a logic way of understanding and interpretation of the collected data. It includes two processes; analytical process where the data will be collected, categorized, compared, and integrated. Whilst interpretation process of analyzed employed circularly while making out sense out of the analyzed data (Hassan, et al. 2013). Since the study seeks determine the significances of the factors affecting adoption of m-banking in Australia, it triggers the need to employ statistical method of analysis. Therefore, it will incorporate two methods of data collection;

Weighted mean for the questionnaires

The results of the closed-ended questions will be assessed using TAM constructs significance. They will be scale from 1 to 5; strongly disagreed scores 1, disagree scores 2, neutral scores 3, agree scores 4 and strongly agree will equate 5 scores. To analyze the results obtained from the informants, the weighted mean score will be calculated accordingly. Similarly, open-ended questions will be analyzed at a personal interpretation, but at a neutral state rating the significance of the defined factors of adoption in ranks.

Least square method regression analysis

A least square multiple linear regression will be used to assess the correlation between the predators among the five independent variables and the m-banking adoption intention. This way, their variance will be used to in behavioral intentions to adopt m-banking will be therefore used to analyze the factor’s significance will be ranked accordingly (Smith, 2011).

Validity, Reliability and Ethics

Qualitative research is considered to execute reliability and the credibility of the study. Ethnology choice of realism will enable the stability of the study in conjunction with epistemology positivism approach. Positivism will be essential to deliver a neutral interpretation or measures without bias of the open-ended questionnaires. Use of repeatedly random sampling method and in-depth interview reviews also contributes the reliability of the research study.

While the reliability concerns the consistency of the scores results validity concerns, how the results will be interpreted. Validity will concern how well the study results place support of the theory or the constructs of the research paper. Accordingly, the collection data and analysis techniques will be pilot-tested prior the actual research. Besides, the constructs validity will be assessed by means of convergent and discriminant validity as well. That is, comparison of the similarity of results from different instrument of data analysis methods used.

Considering ethics, the paper will ensure the study will not cause any harm to the respondents by ensuring; their consensus to be part of the study contributors via interviews prior commencement of the study. Secondly, explaining the benefits of the study and guaranteed confidentiality in the procedures. This way, the research will provide their protection rights to respondents accordingly (Walliman, 2010).

References

Ajzen, I. & Fishbein, M. (2000). Attitudes and the attitude-behavior relation: Reasoned and automatic processes. In W. Stroebe & M. Hewstone (Eds.), European review of social psychology(pp. 1-33). John Wiley & Sons.

Arora V. and Vamvakidis A., (2011), “China’s Economic Growth: International Spillovers.China & World Economy”, 19: 31–46.

Bhatti, T. (2007). Exploring Factors Influencing the Adoption of Mobile Commerce. Journal of Internet Banking and Commerce, 12(3), 1-13.

Bryman A., (2012) Social Research Methods, 4th Edition, Oxford University Press,

Cellular-News, (2011), Mobile Banking Surges as Emerging Markets Embrace Mobile Finance.

Davies, M.B. (2007) Dong a successful research project: Using Qualitative or Quantitative Methods, Palgrave MacMillan .

Davis, F. D. (1993). User acceptance of information technology: System characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3), 475-487.

Dillon, A. & Morris, M. (1998). From “can they” to “will they?”: Extending usability evaluation to address acceptance. In E. D. Hoadley & B. Izak (Eds.), Proceedings Association for InformationSystems Conference. Baltimore, MD.

Drennan, Judy, and Wessels, Lisa. 2009. An investigation of consumer acceptance of M-Banking in Australia.

Easterby-Smith, M., Thorpe, R. and Lowe, A. (2002), Management research: An introduction, 2nd ed., London: Sage.

Ellen, P.S., Bearden, W.O., & Sharma, S. (1991). Resistance to Technological Innovations

Ferro, Enrico. 2010. Handbook of research on overcoming digital divides constructing an equitable and competitive information society. Hershey: Information Science Reference.

Ghauri, P. & Gronhaug, K. (2010). Research methods in business studies. 4th ed., Pearson.

Great Britain. (1997). Electronic commerce. London, DTI.

Hassan, Z., Nareeman, A., & Pauline, N. (2013). Impact of CSR Practices on Customer Satisfaction and Retention: An Empirical Study on Foreign MNCs in Malaysia. Available at SSRN.

Infocomm Development Authority of Singapore, (2011), Statistics on Telecom Services for 2011.

Johnson, P. (2000) Understanding management research: An introduction to epistemology, London: Sage.

Kim, H.W., Chan, H.C., & Gupta, S. (2007). Value-based Adoption of Mobile Internet: An Empirical Investigation. Decision Support Systems, 43(1), 111-126.

Kuo, Y.F., & Yen, S.N. (2009). Towards an Understanding of the Behavioral Intention to Use 3G Mobile Value-added Services. Computers in Human Behavior, 25(1), 103-110.

Luarn, P., & Lin, H.H. (2005). Toward an Understanding of the Behavioral Intention to Use Mobile Banking.

Matthews, B., Ross, L. (2010) Research Methods: A proactical guide for the social sciences, 3rd ed., London: Longman.

Mattila, M. (2003). Factors Affecting The Adoption Of Mobile Banking Services. Journal of Internet Banking and Commerce, 8(1), 149-160.

Ópez, J. R., Walkenhorst, P., & Diop, N. (2009). Trade competitiveness of the Middle East and North Africa: policies for export diversification. Washington, D.C., World Bank.

Oppenheim, A. (2000) Questionnaire design, interviewing and attitude measurement, 3rd ed., London: Continuum.

Pearlson, K. E., & Saunders, C. S. (2006). Managing & using information systems: A strategic approach. John Wiley & Sons.

Rao, S., & Troshani, I. (2007). A Conceptual Framework and Propositions for the Acceptance of Mobile Services. Journal of Theoretical and Applied Electronic Commerce Research,       2(2), 61-73.

Ryan, B., Scarpens, R., and Theobald, M. (2002) Research Methods & Methodology in Accounting and Finance (2nd Ed). ISBN Oxford: Oxford University Press.

Saunders, M., Thornhill, A., Lewis, P. (2012) Research Methods for Business Students. London: FT Prentice Hall.

Smith, M. (2011) Research Methods in Accounting, 2nd Edition, SAGE Publication.

Sripalawat, J., Thongmak, A., & Ngramyarn A. (2011). M-banking in Metropolitan Bangkok and a Comparison with Other Countries. Journal of Computer Information Systems, 51(3), Tole of Self-efficacy and Performance Satisfaction. Journal of the Academy of Marketing Science, 19(4), 297-307.

Walliman, N (2010) Research Methods: The Basics, 4th ed., London: Routledge Publications.

Wang, Y.S., Lin, H.H., & Luarn, P. (2006). Predicting Consumer Intention to Use Mobile Service. Information Systems Journal, 16(2), 157-179.

Wang, Y.S., Wang, Y.M., Lin, H.H., & Tang, T.I. (2003). Determinants of User Acceptance of Internet Banking: An Empirical Study. International Journal of Service Industry Management, 14(5), 501-519.

Zhang, S. X., Olfman, L. & Reetham, P. (2007). Designing eportfolio 2.0: Integrating and coordinating web 2.0 services with eportfolio systems for enhancing users’ learning. Journal of Information Systems Education, 18(2), 203-214

Click Here To View Information Technology Dissertations