skip to main content
10.1145/1139113.1139125acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

Game theory perspectives on client: vendor relationships in offshore software outsourcing

Published:27 May 2006Publication History

ABSTRACT

The objective of this paper is to provide the initial literature based insights into the game theory specifically with the viewpoint of client - vendor relationships in offshore software outsourcing. Game theory has been used for long in understanding various contexts in economics and other disciplines. Offshore software outsourcing relates to the situation in which client and vendor are operating from different countries. Subsequently, in this paper, the initial understanding of game theory focusing on software engineering community is developed. Particularly risk, rationality, payoffs, and other elements of game theory are explored in terms of how they affect offshore software outsourcing. The paper is structured as follows. Section one provides introduction to game theory concept. Section two explores the history, representation and types of games. Section three compares offshore software outsourcing with types and elements of game theory. Section four discusses one of the most famous game theory examples - 'prisoners-dilemma' and relates it to software outsourcing context. Finally, section five concludes this paper with the intended future work.

References

  1. Blumen, J. (September 1995). The prisoner's dilemma in software development. The Ethical Spectacle. 1(9)Google ScholarGoogle Scholar
  2. Elitzur, R. and Wensley, A. (1997). Game theory as a tool for understanding information services outsourcing. Journal of Information Technology. 12. 45--60.Google ScholarGoogle Scholar
  3. Humphrey, W. (1989). Managing the software process. Addison-Weseley Publishing Company, Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Mobius, M.M. (February, 2006). Lecture I -II: Motivations and decision theory. Lecture notes on Introduction to Game theory course, Harvard University. {http://www.courses.fas.harvard.edu/ec1052/Lectures/lecture1.pdf}Google ScholarGoogle Scholar
  5. Nalebuff, B., and Brandenburger, A. (1996). Co-opetition. HarperCollins Business:London.Google ScholarGoogle Scholar
  6. Osborne, M., and Rubinstein, A. (1994). A course in game theory. The MIT press: Cambridge.Google ScholarGoogle Scholar
  7. Rasmusen, E. (May 2001). Games and Information - An introduction to Game theory. Blackwell:Cambridge 3rd (ed).Google ScholarGoogle Scholar
  8. Ross, D. (Spring 2002). Game Theory. The Stanford Encyclopedia of Philosophy. Edward N. Zalta (ed.) {http://plato.stanford.edu/archives/spr2002/entries/game-theory/}.Google ScholarGoogle Scholar
  9. Terborg, J. and Burton, R. (Sep/Oct, 2002)., Making Business a Game We play sports to win. Isn't it the same in business? Marketing Management. 11(5).Google ScholarGoogle Scholar
  10. Von Neumann, J., and Morgensten, O. (1964). Theory of games and economic behavior. New York: Science Editions J. Wiley.Google ScholarGoogle Scholar
  11. Waddington, C. H. (1973). World War II: Operational Research against the U-Boat. London: Elek Science.Google ScholarGoogle Scholar
  12. Walker, P. (October, 2005). A chronology of game theory. {http://www.econ.canterbury.ac.nz/personal_pages/paul_walker/gt/hist.htm}.Google ScholarGoogle Scholar

Index Terms

  1. Game theory perspectives on client: vendor relationships in offshore software outsourcing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      EDSER '06: Proceedings of the 2006 international workshop on Economics driven software engineering research
      May 2006
      56 pages
      ISBN:1595933964
      DOI:10.1145/1139113

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 May 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      ICSE 2025

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader