Feeds

Bleak outlook for IT outsourcing

Poor communication means gov.IT projects 'doomed'

Beginner's guide to SSL certificates

Most government organisation's IT outsourcing (ITO) projects are "doomed before they begin", according to new research.

Government organisations and suppliers are not aligned when it comes to interpreting and agreeing IT outsourcing objectives, says PA Consulting Group's 2005/06 Understanding Misunderstanding survey, released today.

It says lack of planning and poor business cases leads to future problems, and that insufficient attention is given to planning and due diligence.

ITO does not get the "respect it deserves. It is genuine misunderstanding which puts parties at loggerheads from the outset", the survey says.

Richard Harrison, a member of PA Consulting management board, told Government Computing News: "Although government bodies are getting better they are not able to express their requirements leading to suppliers misunderstanding, despite 30 years practice."

All government respondents surveyed said their ultimate goal in using ITO to deliver business transformation was service improvement rather than cost reduction. But when suppliers were asked what their clients wanted most, 100 per cent said government bodies were after cost reduction.

"This suggests a breakdown in the negotiation process and ongoing management," the report says. "This is backed by the fact that 71 per cent said with hindsight they would increase the importance of service innovation when selecting their supplier."

Seventy nine per cent of clients, private and public, put greater importance on access to skills compared to 14 per cent of suppliers. Only 21 per cent of suppliers and 38 per cent of lawyers thought their clients articulated their objectives clearly to the supplier marketplace.

PA head of IT sourcing Fons Kuijpers said: "There is no excuse for IT outsouring deals to go wrong in a mature market. Yet even now, many IT outsourcing deals are doomed before they start because of poor business cases where key items such as costs for the retained organisation have been omitted.

"Equally worrying, suppliers and clients have different expectations of the desired outcome. This is largely due to the client's inability to articulate clearly what they seek to achieve from the deal, and partly due to suppliers pursuing their own agenda."

PA surveyed over 300 international IT chiefs in Europe, Asia-Pacific and North America, along with major global IT outsourcing suppliers and legal advisors. The majority of government bodies surveyed were in the UK.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Security for virtualized datacentres

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.