1 Introduction

While there have been a number of papers surveying the field of Information Technology (IT) Outsourcing (cf. Dibbern et al., 2004; Hatonen & Eriksson, 2009; Lacity et al., 2009; Liang et al., 2016), the actual history of the field has been given scant attention. This seems odd and inconsistent with the Information Systems field’s interest in—and recognition of the importance of—history (Hirschheim et al., 2012; Bryant et al., 2013) and the historical method (Mason et al., 1997; Porra et al., 2014). Without a documented history, there is no sense of shared understanding of how IT outsourcing got to where it is, and what challenges it faces now and possibly in the future. However, with a shared understanding of IT outsourcing, each of us who is engaged in the field can achieve a sense of the larger meaning of our individual contributions and the contribution of others. It leads to shared concepts and the ability to communicate with others across boundaries, especially across the academic/practitioner divide. It allows us to appreciate the work that came before and helps establish a cumulative tradition. With this in mind, I will offer my thoughts on the historical antecedents which lie behind the evolution of IT outsourcing.

2 Three Waves of IT Outsourcing

The three waves of IT outsourcing are based on a chapter that Jens Dibbern and I collaborated on Dibbern and Hirschheim (2020).

The history of IT outsourcing is a rich one. We can see that outsourcing has evolved considerably since the late 1980s when large IT outsourcing vendors such as EDS and IBM, signed multibillion-dollar deals with clients involving the transfer of corporate IT to these vendors. While the types of outsourcing arrangements have evolved to include business processes, offshoring, crowdsourcing and the like, the current trend is now firmly associated with organizations’ desire for digital transformation (cf. Willcocks & Lacity, 2012).

Digital transformation has been defined as “the use of new digital technologies, such as mobile, artificial intelligence, cloud, blockchain, and Internet of things (IoT) technologies, to enable major business improvements to augment customer experience, streamline operations, or create new business models” (Warner & Wäger, 2019). Essentially, digital transformation changes the way organizations use technology, people and processes to fundamentally change business performance (Westerman et al., 2014). While the notion is not particularly new (cf. Scott Morton, 1991; Markus & Benjamin, 1997; Andal-Ancion et al., 2003), the role of outsourcing within this transformation has only somewhat recently been considered. The emphasis has shifted from outsourcing legacy and/or traditional services to outsourcing for digital transformation. Organizations are looking for vendors, consultants, and researchers who can assist them in this transformation. This is evident in the academic research which is now exploring sourcing topics such as crowdsourcing (Blohm et al., 2013; Geiger & Schader, 2014), platform ecosystems (Constantinides et al., 2018; Foerderer et al., 2018; Ghazawneh & Henfridsson, 2013; Huber et al., 2017; Schmeiss et al., 2019; Tiwana, 2002), cloud computing (Venters & Whitley 2012; Schneider & Sunyaev, 2016; Yinghui et al., 2018), service innovation (Barrett et al., 2015; Lusch & Nambisan, 2015), service automation (robotic process automation—RPA) (Lacity & Willcocks, 2016; Rutschi & Dibbern, 2020; Willcocks & Lacity, 2016), impact sourcing (Heeks, 2013; Sandeep & Ravishankar, 2018); artificial intelligence/machine learning (Davenport & Ronanki, 2018), process mining/analytics (Fogarty & Bell, 2014), internet of things (Dijkman et al., 2015), and blockchain (cf. Lacity & Willcocks, 2018).

The current growth of digital transformation has led to a changing IT outsourcing landscape which could be thought of as three commingling “waves of change.” They are:

2.1 Wave 1: The Evolving Traditional Outsourcing of IT Services

This wave refers to the outsourcing of IT functions and IT tasks, such as software development or data center operations, that are performed by external IT work forces. In such labor-intensive traditional outsourcing of IT services, enduring trends include offshoring and multi-sourcing, which have been around for some time. But also new sourcing arrangements that are characterized by novel value propositions, such as striving for innovation through outsourcing rather than simply cost savings or getting access to scarce resources. The development of “impact sourcing” emerged as a new way of looking at the notion of value. Here, clients and vendors consider how their outsourcing arrangements contribute to creating social and society-wide (rather than purely firm) economic value (Lacity et al., 2014; Babin & Nicholson, 2020; Carmel et al., 2016; Lacity et al., 2016; Kahn et al., 2018).

2.2 Wave 2: The Emergence of Cloud Computing and Platform Ecosystems

This wave involves a new approach to service development and delivery by the IT industry where IT services are developed in large platform ecosystems and provided via platforms. These comprise new pricing models (i.e., renting readily available services) and the provision of services via the internet (i.e., cloud) as Software as a service (SaaS), Infrastructure as a service (IaaS), or Platform as a service (PaaS) (Weinhardt et al., 2009; Ceccagnoli et al., 2012). The move toward platforms also includes the provision of labor as a service and has led to entirely new business models that disrupt traditional industries (Willcocks et al., 2018). This includes crowdsourcing, i.e. engaging the crowd in a new service delivery model, and embracing the use of digital platforms to expose untapped supply and demand of services that are based on the sharing of individually owned resources and assets as exemplified by Airbnb and Uber.

2.3 Wave 3: The Development of Robotic Process Automation and “Outsourcing” to Software Bots

This wave embodies an arrangement where entire tasks or business functions are taken over by some type of automation such as a chatbot. Thus, the goal is not to support humans with cheaper or better IT services that may stem from external providers, but rather to replace humans by IT (Przegalinska et al., 2019; Adam et al., 2021; Rutschi & Dibbern, 2020). AI/machine learning, data analytics, and blockchain are all integral elements of this wave.

It is important to note that although this description is of three distinct waves of change, they are in fact commingled and entangled. They overlap both within and between the waves. For example, a software bot may be developed by an external service provider using a traditional outsourcing arrangement with an external vendor and the bot may take over work from the former in-house personnel of the client and hence the work is outsourced to the bot. The bot may then also be provided as a SaaS via cloud computing. So the waves are really a simplifying vehicle to make sense of the broad evolution of IT outsourcing from the late 1980s through today. However, IT outsourcing has a richer tradition that extends back into the 1960s when Ross Perot, and his company EDS, first started managing IT facilities for a number of companies, which eventually evolved into the first IT outsourcing arrangements (cf. Mack & Quick, 2002). It is to this early history of IT outsourcing that I turn next.

3 The Early, Early Days of Outsourcing

Given this chapter is about IT outsourcing and its early history, it is important to define what is meant by “outsourcing.” I define outsourcing as the practice of engaging with a third-party entity for the provision of goods or services to either replace, supplement, or provide specific activities or tasks; and it has been around for centuries. According to Jones (2018), one of the earliest occurrences of outsourcing can be traced back to the ancient Roman Empire where publicans (‘men engaged in public business’) were hired to collect taxes and harbor dues, provide military and civilian supplies, build and repair roads, bridges and aqueducts, handle waste disposal, and so on. In the late seventeenth century in America, the production of wagon covers and clipper ships’ sails was outsourced to laborers in Scotland, where they used raw material imported from India. As Ghimire (2005) writes: “England’s textile industry became so efficient in the 1830s that eventually Indian manufacturers couldn’t compete, and that work was outsourced to England.” Outsourcing remained popular in the manufacturing sector, with part of the assembling in many industries being subcontracted to other organizations and locations where the work could be done more efficiently and cheaply (Momme, 2002; Akbari, 2018). Commenting on this trend, Pastin and Harrison (1987) note that such outsourcing of manufacturing functions was creating a new form of organization which they termed the “hollow corporation” (i.e., an organization that designs and distributes, but does not produce anything). They note that such an organizational form would require considerable changes in the way organizations were managed. But this has not stopped the inexorable growth of outsourcing in virtually every industry. As Hatonen and Eriksson (2009) write: “What we have been witnessing is an outsourcing revolution, which has changed the way firms compete in as diverse industries as automobiles, aerospace, telecommunications, computers, pharmaceuticals, chemicals, healthcare, financial services, energy systems and software just to name a few.” (p. 142).

It was not long before the idea of outsourcing was applied to the procurement of information technology (IT) services also. Initially, when organizations looked to external sources for the provision of IT services, the vendor provided a single basic function to the customer, exemplified by facilities management arrangements where the vendor assumed operational control over the customer’s technology assets, typically a data center. Electronic Data Systems (EDS) contract with Frito-Lay in 1963 was the first major example of such an arrangement. However, EDS’s agreement with Blue Cross/Blue Shield of Texas in 1966 was different from previous ‘facilities management’ contracts in that EDS was responsible for handling Blue Cross/Blue Shield’s data processing services. EDS took over the responsibility for Blue Cross’s IT people extending the scope of the agreement beyond the use of third parties to supplement a company’s IT services. EDS and Blue Shield of California inked a similar deal in 1969. EDS’s client base grew to include customers such as HCA Inc., the U.S. Department of Defense, and the U.S. Government’s National Flood Insurance Program in the seventies. In 1982, the U.S. Army awarded EDS a 10-year $650 million contract, which at the time was the largest in the history of the information services industry. EDS signed a $350 million contract with the U.S. Navy the following year. In 1984 General Motors bought EDS for $2.5 billion. These deals portended a new type of IT services provision—large-scale IT outsourcing.Footnote 1 Such IT outsourcing agreements were entered into with three large companies headquartered in Houston—Continental Airlines, First City Bank and Enron in the late eighties. These EDS arrangements were not simply IT service contracts but typically involved EDS either purchasing stock in the companies they were providing IT services to and/or providing an upfront cash payment for the client company’s IT assets. So these were financial arrangements that allowed all three companies to receive a cash infusion to help stave off potential chapter “Airline Market Concentration in Europe” filings. In 1989, other players besides EDS entered the outsourcing arena, the most noteworthy of these being the ISSC division of IBM. In fact, ISSC’s deal with Kodak in 1989 heralded the arrival of the IT outsourcing mega-deal and legitimized the role of outsourcing for IT. Following the success of the Kodak deal, well-known companies around the world quickly followed suit. In 1991, General Dynamics signed a $3 billion deal with CSC. Equifax signed a $650 million outsourcing contract with ISSC in 1993. EDS signed a $3.2 billion deal with Xerox in 1994. In 1997, IBM, Telstra and Lend Lease of Australia entered into a major IT deal valued at $2 billion. In the same year, EDS inked an IT outsourcing deal with the Commonwealth Bank of Australia for $3.8 billion. In 1997, Swiss Bank signed a $3 billion outsourcing deal with Perot Systems. The same year, saw Dupont/Conoco ink a deal with CSC and Anderson worth $4.2 billion. And in 1996, General Motors sold off EDS and then signed a 10-year IT outsourcing deal with them valued at $38 billion. Other major multi-billion-dollar deals were implemented by McDonnell Douglas, AT&T, JP Morgan/Chase, Bell South, Delta Airlines, and the U.S. Military in the U.S.; Lufthansa in Germany; Rolls Royce, Inland Revenue, Bank of Scotland, and British Aerospace in Britain; KF Group in Sweden; Canada Post in Canada; Government of South Australia in Australia; Bank di’ Roma in Italy; and ABN Amro in the Netherlands (Dibbern et al., 2004).

It is interesting to note that a number of the outsourcing deals in the 1990s were very creative and became models for future arrangements. Here are two which are worth considering, both from outside the US. The first example is a 1996 deal, that was struck with EDS and the Government of South Australia in Adelaide. This is an arrangement that allows the South Australian Government to outsource its IT to a third-party provider, in this case EDS. What was interesting about that deal, was that EDS was required to spend approximately 10% of the revenue of the outsourcing deal to spur economic development in the state of South Australia. Thus, the interesting aspect about this deal was, that it was not simply an outsourcing arrangement, where a vendor provided IT services for a set dollar amount. It was the IT vendor providing services but also spurring the economy of this state by creating new jobs, spending money in the state of South Australia to bolster its economy. This was clearly a very creative venture even though it had its difficulties in terms of determining what was the value of EDS’ contribution to the State of South Australia’s economy. A second example is the co-sourcing arrangement that EDS structured with Rolls Royce in the UK. It was a £2 billion arrangement. EDS’ co-sourcing arrangement was that Rolls Royce would provide EDS £500 million to manage and deal with the higher-level IT arrangements for Rolls Royce. The other £1.5 billion would be spent on either EDS providing initial services or EDS subcontracting to third-party providers for the provision of system development, system maintenance and the like. That deal shows the breadth of the kind of arrangement a client can strike with an outsourcing vendor. There are also a number of other arrangements which have led to so-called win-win operations. One is Telstra (Australia) signing a deal with IBM Global Services. In this deal, Telstra outsourced its IT to IBM. Telstra and IBM then formed a company called Advantra whose purpose was to provide telecommunication services to Pacific Rim countries. This is an example of a joint venture between the outsourcing vendor and client with the intention of offering the prospect of a new source of revenue for them. Such new joint ventures would allow the industry skills provided by the client with the technology skills of the vendor coming together to provide a new venture which would offer both expertises in a particular industry segment to sell these skills to others in that same industry. (Although how successful such joint ventures are, or could be, is far from clear.)

Similar joint venture and/or spinoff arrangements were not uncommon in the early days of outsourcing. Important examples of IT spinoffs that competed in the IT outsourcing space include Debis Systemhaus (a spinoff of Daimler-Benz’s IT department in 1990); T-Systems (a spinoff of Deutsche Telekom in 2000 which in 2002 acquired Debis Systemhaus); Shell Services Company (the spinoff of Royal Dutch Shell in 1994 to compete in the IT outsourcing market); and General Motors spinning off EDS in 1996 (having purchased it in 1984). Spinoffs and joint ventures have only increased in number, size, and scope since the early days of IT outsourcing (cf. Lacity et al., 2004; McIvor, 2010). A recent example can be found in IBM’s announced spinoff of its Managed Infrastructure Services division as a new company called Kyndryl (Enderle, 2021).

Figure 1 offers a timeline of the growth of IT Outsourcing focusing on the early period of this history.

Fig. 1
figure 1

IT outsourcing timeline

3.1 Why Do Companies Really Outsource?

A question that drove much of the early IT outsourcing research was “why do companies really outsource?” The conventional wisdom suggested that while organizations outsource IT for many reasons, the growth was largely attributed to two primary phenomena: (1) a focus on core competencies and (2) a lack of understanding of IT value (Lacity et al., 1994). First, motivated by the belief that sustainable competitive advantage can only be achieved through a focus on core competencies, the management of organizations chose to concentrate on what an organization does better than anyone else while outsourcing the rest. As a result of this focus strategy, IT came under scrutiny. Did it make sense for companies to devote so much time, money, and effort to keeping up with IT advances, particularly when IT was simply a “support” function? As such, the IT function was viewed as a non-core activity in organizations, so much so that Carr (2003) went so far as to argue that IT was simply a commodity. Further, senior executives believed that IT vendors possessed economies of scale and technical expertise to provide IT services more efficiently than internal IT departments. Second, and perhaps more telling, the growth in outsourcing was also due to a lack of clear understanding of the value delivered by IT (Porra et al., 2005; Lacity & Hirschheim, 1993a). Though senior executives viewed IT as essential to the functioning of the organization,Footnote 2 it was viewed as a cost that needed to be minimized. Believing that outsourcing would help meet the IT needs of the organization less expensively, it was hardly surprising that organizations jumped on the outsourcing bandwagon (Lacity and Hirschheim 1993b; Willcocks & Fitzgerald, 1994).

Although early research documented the orthodox thinking on why companies “supposedly” outsourced their IT, i.e., cost savings, focusing on core competencies, and the like, Lacity and Hirschheim (1993a) questioned the validity of this orthodoxy. Deciding that the best way to really understand what was happening with outsourcing was to undertake detailed case studies of organizations who had outsourced their IT. The cases involved large companies who had signed high dollar value outsourcing contracts with well-known outsourcing vendors such as EDS and IBM. Using an interpretive research approach, they found a much more nuanced approach to IT outsourcing that involved shifts in organizational power, as well as financial issues that were less to do with overall IT cost savings, and more to do with the desperate need for an immediate cash infusion. Indeed, the early outsourcing deals (for example, EDS’s arrangement with Enron, First City Bank, and Continental Airlines), were primarily short-term financial transactions where EDS would inject significant amounts of capital through cash and stock purchases in exchange for long-term IT outsourcing contracts. Companies either in, or very close to, chapter “Airline Market Concentration in Europe” filings, desperately needed such cash infusion to survive, so it is hardly surprising they entered into these long-term, mega-outsourcing contracts. Such announcements were promoted to the stock market as an indication that these companies had made a strategic decision to “reign in the runaway costs of IT and focus on their own specific core competencies.” The stock market was only too willing to reward these companies with increased stock prices believing that IT outsourcing meant that the company was “putting its house in order.” But did it? Were the promulgated benefits of outsourcing real?

The Lacity and Hirschheim research on Insourcing (Lacity & Hirschheim, 1995; Hirschheim & Lacity, 2000) paint a rather perplexing picture of the results of early IT outsourcing. They report that the impact of IT outsourcing was not as simple or as straightforward as the literature—both academic and practitioner—was contending. In fact, they found that IT outsourcing had not yielded the benefits that organizations had hoped for. Indeed, for a number of companies, IT outsourcing increased the overall cost of IT, although the way IT was accounted for and reported, made this calculation difficult to see and comprehend. Moreover, IT outsourcing created new problems that seemed to be overlooked in the zeal to outsource. In particular, two thorny issues were identified.

3.2 Unresolved Issues of Early Outsourcing Research: Loss of Internal Skills and Succession

While much of the literature focused on the short-term reasons and value of outsourcing, the question of what happens in the longer term, seemed to be rarely asked. The focus was squarely on the decision to outsource which was typically motivated by cost savings, irrespective of any collateral damage that might occur in the long term. In particular, what were the long-term consequence of turning over strategic parts of the business to third-party providers; would there be lost opportunities of not having these strategic parts internal to the organization? And who should be involved in making the decision of what to outsourcing and what not to outsource? Then there was the concern of what happens when the company no longer has the individual skills sets possessed by those individuals who have been outsourced. Often those skills were exactly what was needed in the making of important decisions. Lastly, there was the issue of succession. When a company turns over a significant number of functions to third-party providers and the people working in these functions then go to the outsourcing vendor, where does the next generation of senior executives come from? Essentially, those individuals who formerly worked for the company—and formed the base for the next generation of top management—have now gone over to the vendor. Thus, in the long-term outsourcing can lead to the difficult situation of how organizational succession occurs, because the executives or the executives in training have been outsourced to third-party providers. Issues such as loss of internal skills and succession were left for future research to explore.

4 Academic Initiatives on IT Outsourcing

4.1 Academic Conferences

Reports from well-known IT consulting companies such as Gartner, Forrester, McKinsey noted that outsourcing would continue to rapidly grow both domestically and globally and embrace emerging domains such as offshoring, business process outsourcing, crowdsourcing, and the like. Indeed, IT outsourcing was a “proof of concept” that even strategic functions such as IT, could be turned over to third-party providers. It was, as it were, a continuation of converting fixed assets and costs into variable ones. The trend was unmistakable. It, therefore, became apparent to many in the academic community that IT outsourcing was not a passing fad and needed to be studied by academics. Early academic IT outsourcing research was undertaken around the same time in various countries such as the USA, UK, the Netherlands, Germany, and Finland among others. In the early 90s, it became apparent that there was a need for individual researchers around the globe to come together to take stock on what research was being done and what was known about the phenomenon. To this end, Markku Saaksjarvi, Arje Wassenaur, and Rudy Hirschheim got together and decided it was time to have an academic conference on IT outsourcing. The outcome was the first academic conference to explore this global phenomenon was held on May 20–22, 1993 at the University of Twente, in Enschede, the Netherlands. It was called the “Conference on Outsourcing of Information Systems Services (OUT’93)” with the intention that it would be the first of more to come. Indeed, that has been the case. Noting that the growth of academic research had been dramatic (by 2001, over 100 academic papers, along with numerous doctoral dissertations had been published on IS outsourcing), motivated the team of Rudy Hirschheim, Armin Heinzl, and Jens Dibbern to conduct the “Second International Conference on Outsourcing of Information Services (ICOIS’2001)” which was carried out at Castle Thurnau, Bayreuth, Germany, June 22–23, 2001. This was followed by the “Third International Conference on Outsourcing of Information Services (ICOIS’2007)” held at Villa Bosch in Heidelberg, May 29–30, 2007. In 2013, ICOIS continued with the “Fourth International Conference on Outsourcing of Information Services (ICOIS’2007)” held at Mannheim Castle in Mannheim, June 9–11, 2013. And in 2019, the “Fifth International Conference on Outsourcing of Information Services (ICOIS’2019)” was held again at Mannheim Castle, in Mannheim, June 16–18, 2019.

Another academic conference initiative was the Global Sourcing Workshop initiated by Leslie Willcocks, Julia Kotlarsky, and Ilan Oshri as part of the AIS Special Interest Group on Outsourcing—SIGSourcing. The first conference was held in 2007 and has been an annual event ever since. 2019 marked the 15th Global Sourcing Workshop. More recently, Julia Kotlarsky, Ilan Oshri, and Ji-Ye Mao started the Asia-Pacific Global Sourcing Conference with the first event being held on September 23–25, 2016, and the second, September 14–16, 2018.

In addition to these specialized academic outsourcing conferences, mainstream IS academic conferences such as ICIS, AMCIS, ECIS, ACIS, and PACIS had specific tracks on outsourcing. These included not only conference papers but also panel sessions and keynote sessions. So it is clear, that IT outsourcing had a rich history in the IS academic conference scene.

4.2 Journals/Institutions

Following the success of outsourcing in academic conferences, 2008 saw the introduction of a new journal—Strategic Outsourcing: An International Journal—that focused exclusively on outsourcing. While mainstream journals such as: MIS Quarterly, Information Systems Research, Journal of MIS, Journal of the AIS, European Journal of Information Systems, Information Systems Journal, Journal of Information Technology, Journal of Strategic Information Systems, Information & Management, Communications of the ACM, Communications of the AIS, International Journal of Information Management, and Information & Organization as well as many other IS-oriented journals, published individual articles on outsourcing, Strategic Outsourcing: An International Journal was the first journal whose mission statement was to publish outsourcing papers. In that sense, it was unique and was an outlet that all outsourcing researchers could count on to provide a knowledgeable and fair treatment of their research.

Interestingly, the so-called “applied” journals, such as Harvard Business Review, California Management Review, Sloan Management Review, and Business Horizons published many papers on outsourcing. This suggested that practitioners, who made up the lion’s share of the audience of these journals, felt that outsourcing was an important topic. In the IS field, MISQ Executive also published a number of outsourcing papers which is suggestive of a topic that had wide appeal.

More specifically, the broad area of IT outsourcing can be seen as one of a rather small number of IS academic research domains that practitioners were interested in and led to significant interaction between academics and practitioners: for example, practitioners speaking at academic outsourcing conferences, academics speaking at practitioner outsourcing conferences, academics advising companies on outsourcing decisions, academics working with practitioners on outsourcing research projects, and the like. Another example of this interaction can be seen by The International Association of Outsourcing Professionals (IAOP) inducting both Mary Lacity and Leslie Willcocks into the IAOP Hall of Fame in 2013.

Another indication of the importance of outsourcing to the IS academic IS field can be seen by the commencement of several interest groups on outsourcing. For example, in the early 2000s, the Association for Information Systems (AIS) formed a special interest group—SIG IS Outsourcing (SIGISO) which later became SIGOUT, that offered an opportunity for outsourcing researchers to get together and share experiences and research at various IS conferences. SIGOUT has now been superseded by SIGSourcing which not only holds sessions at the AIS conferences (in particular ICIS) but also has its own annual conference—The Global Sourcing Workshop.

5 Conclusion

My personal reflection on the early days of IT outsourcing contains, of course, my own biases of what I chose to include in my interpretation of the history of outsourcing.Footnote 3 My recollection of the early outsourcing history is no doubt incomplete and there might be some mistakes in terms of dates of when certain outsourcing events occurred. It is also likely that additional academic outsourcing research was done by others around the globe that I am unfamiliar with.Footnote 4 Additionally, considerable work on outsourcing was undertaken by the many outsourcing consulting firms that formed in and around that time period. Those were heady days in the evolution of outsourcing! Case in point was the excellent work done in the early days of IT outsourcing by Technology Partners International (TPI) (which has now become ISG). Other advisory firms also helped the outsourcing industry to grow and prosper. Lastly, it is important to recognize how IT outsourcing has transformed from the arrangements in the late 1980s and 90s to include Business Process Outsourcing (BPO), Offshore Outsourcing, Crowdsourcing, Impact Sourcing, Cloud Computing/Platform Ecosystems Outsourcing, Robotic Process Automation (RPA), bots, and AI Outsourcing. But I shall leave that subject for another paper!