Save costs • Relies on external experts • Experiments with new IT
Valuable organisation data are in another organisation’s control • During system development, programmers in another company could put malicious computer code (back doors) in application