Information systems development outsourcing: The role of control configurations

Subasinghage Maduka Nuwangi, Darshana Sedera, Shirish C. Srivastava

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

11 Citations (Scopus)


The Control theory provides a useful theoretical foundation for examining the coordination between the client and the vendor in information systems development outsourcing (ISD-outsourcing). Recent research has identified two control mechanisms: structural (structure of the control mode) and process (the process through which the control mode is enacted). Yet, control theory research to-date does not describe the ways in which the two control mechanisms can be combined to ensure project success. Grounded in case study data from eight ISD-outsourcing projects, we delineate three 'control configurations'; i) aligned, ii) negotiated, and iii) self-managed, which describe the combinative patterns of structural and process control mechanisms within and across different control modes.

Original languageEnglish
Title of host publicationProceedings of the 34th International Conference on Information Systems (ICIS 2013)
Subtitle of host publication15-18 December, 2013, Milan, Italy
EditorsRichard Baskerville, Michael Chau
Number of pages11
ISBN (Electronic)9780615933832
Publication statusPublished - 2013
Externally publishedYes
EventInternational Conference on Information Systems 2013 - Milan, Italy
Duration: 15 Dec 201318 Dec 2013
Conference number: 34th


ConferenceInternational Conference on Information Systems 2013
Abbreviated titleICIS 2013
OtherThe conference theme, "Reshaping Society through Information Systems Design," is intended to promote the development of new knowledge about how the design of information systems is affecting our societies on a scale that ranges from small social groups to the collectives of national and global society.
Internet address


  • Control configurations
  • Control theory
  • Information system development outsourcing
  • Software

Cite this