Outsourcing performance quality assessment using data envelopment analytics

Mehrdokht Pournader, Andrew Kach, Behnam Fahimnia*, Joseph Sarkis

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

4 Citations (Scopus)

Abstract

The growth of vendor procurement and supply chain management simultaneously emerged as organizational outsourcing practices increased. Outsourcing, as an important strategic organizational practice, needs to be carefully examined from an organizational performance perspective to ensure satisfactory quality of services and goods from supply chains. This article provides a model for performance assessment of an outsourcer's processes in a supply chain comprised of several internal and external entities. Internal entities are entities in a supply chain that the outsourcer can manage and control. External entities are entities whose processes are not within the management sphere and control of the outsourcer, yet affect an outsourcer's performance. A slacks-based measure is incorporated into a hybrid network data envelopment analysis model to evaluate the outsourcer performance incorporating both entity types. A case study of a service supply chain in the banking industry comprised of a commercial bank, its sub-processes, and an external investment bank is used as an illustrative application of the model. Insights are presented and future research directions are identified.

Original languageEnglish
Peer-reviewed scientific journalInternational Journal of Production Economics
Volume207
Issue numberJanuary
Pages (from-to)173-182
Number of pages10
ISSN0925-5273
DOIs
Publication statusPublished - 01.01.2019
MoE publication typeA1 Journal article - refereed

Keywords

  • 512 Business and Management
  • Outsourcing
  • Performance measurement
  • Quality
  • Data envelopment analysis
  • Slacks-based measure
  • Hybrid network
  • Supply Chain Management

Fingerprint Dive into the research topics of 'Outsourcing performance quality assessment using data envelopment analytics'. Together they form a unique fingerprint.

  • Cite this