Providing a Strategic plicy model for IT outsourcing

Document Type : Research Article (with qualitative approaches)


1 PhD Student in Public Administration - Policy Making, Department of Public Administration, South Tehran Branch, Islamic Azad University, Tehran, Iran

2 Associate Professor, Member of the Academic Board of Islamic Azad University, Central Tehran Branch, Tehran, Iran

3 Assistant Professor, Member of the Academic Board of the Islamic Azad University, Central Tehran Branch, Tehran, Iran

4 Associate Professor, Member of the Academic Board of Islamic Azad University, South Tehran Branch, Tehran, Iran


Purpose: The aim of the present study was to provide a model for the strategic outline of IT outsourcing; The research method was mixed exploratory
Design / methodology / approach: The statistical population of the qualitative part of the research included IT experts as well as experts in the field of investment and development of Islamic Azad University. To determine the samples of this research and to determine this group of experts, 16 non-random sampling methods were used. The second group of the statistical population of this study, including all employees, managers and senior experts in the field of information technology and the Vice Chancellor for Development and Investment of Islamic Azad Universities in Tehran, was 156 people. He was selected as the subject. To collect the data, semi-structured interview tools and a researcher-made questionnaire were used. The data analysis method in the qualitative part of fuzzy Delphi technique was based on thematic analysis method.
Findings: The results of the research showed that strategic mapping has three components: analysis and compilation of mapping, implementation of strategic mapping and evaluation of strategic mapping, finally, the fit of the model showed that the final research model had a good fit.
Limitations and Consequences: Due to the multiplicity of research variables and the specific complexities of the research, other components of the variables should be carefully considered for future research so that the other relationships of the variables are more transparent and comprehensive.
Practical implications: Special attention will be paid to the evaluation of the developed policy in stopping, changing the direction and formulating complementary policies.
Originality or value of the article: The outsourcing organization will outsource its policy to outsourcing. This is one of the most important components in the field of information technology outreach due to the dispersion and different conditions prevailing in organizations. Especially the Islamic Azad University, which has a very high distribution.
Paper Type: Research Paper


  1. Abbasi, T, Gholipour, R, Hadi, M. (2018). Identifying Factors Facilitating Evidence-Based Linear Processing in Science, Research and Technology, Journal of Strategic Public Policy Studies, 8 (26), 84-65.
  2. Alwani, M; Ashrafzadeh, F. (2008). Outreach to development, Mobtakaran Publications.
  3. G. Dhillon, R. Syed, F. de Sá-Soares, Information security concerns in IT outsourcing: identifying (in) congruence between clients and vendors, Inf. Manag. 54
  4. Gorla N, Toni M. Somers, (2014), The impact of IT outsourcing on information systems success, Information & Management, Volume 51, Issue 3, April, Pages 320-335.
  5. Hamidi, H; Roghnian, E; Kamanchesh, A; (2016), Decision-Making Model for Information Technology Outreach to Improve the Information Technology Support of Organizations - Scientific-Promotional Journal (Ministry of Science), 51 (16), 86-71.
  6. Jamipoor, M; Sherkat, M. H; Yazdani, H. (2017), Presenting a Model of Change Management in Outgoing Information Technology Services: Scientific-Research Journal (Ministry of Science), 32 (5), 450-424.
  7. L.B. Nielsen, F. Mitchell, H. Nørreklit, Management accounting and decision making: two case studies of outsourcing, Account. Forum 39 (1) (2015) 64–82,Elsevier.
  8. Lacity,M.C.andWillcocks ,L.(2001).“Outsourcing”,[on-line] .Available: www construction/intranet/  Teaching/protect/mop/comman/lecture9.pdf.
  9. Lingmin, J (2014). ITO Risks Preliminary Analysis Model of IT Outsourcing Corporations in China. School of Informatics, Guangdong University.
  10. Mazaheri, M; Shirviehzad, H & Zolfaghari, M. (2018). Identifying the key factors of success in outsourcing in the field of information technology using the interpretive structural modeling approach, 15th International Conference on Industrial Engineering, Yazd, Yazd University.
  11. Moghaddam, Z; Shahraki Moghadam, A; Pudineh Moghadam, A & Sargolzaei, E. (2017). An overview of the reasons for outsourcing IT projects A review article, National Conference on the Application of New Technologies in Science and Engineering, Electrical and Computer and IT, Tehran, Ivanki University.
  12. Pankowska M, (2019), Information Technology Outsourcing Chain: Literature Review and Implications for Development of Distributed Coordination, Sustainability, 11(5), 1460.
  13. Qin Zh,(2019) Disruption and Strategic Outsourcing to the Competitor in the Common Market,International Journal of Operations Research and Information Systems Volume 10 , Issue 1 • January-March 2019.
  14. Ripberger, J. T. Gupta, K. Silva, C. L. & Jenkins Smith, H. C. (2014), “Cultural theory and the measurement of deep core beliefs within the advocacy coalition framework”, Policy Studies Journal, Vol.42, No.4: 509-527.
  15. Samson k, (2019), Outsourcing vs. In-House Production: A Strategic Decision to Increase a Firm’s Product Innovation and Internationalization, Samson, Kouame, Outsourcing vs. In-House Production: A Strategic Decision to Increase a Firm’s Product Innovation and Internationalization , pp 1-28.
  16. Yilmaz, A. and Beduk, A. (2014) ‘Evaluation of the effect of the outsourcing on resource dependency and transaction cost approach: a research in Konya Oiz, Turkey’, Procedia – Social and Behavioral Sciences, Vol. 109, pp.737–752.
  17. Zhao, X. and Wei, G. (2013) ‘Some intuitionistic fuzzy Einstein hybrid aggregation operators and their application to multiple attribute decision making’, Knowledge-Based Systems, Vol. 37, pp.472–479.