-
1
-
-
0034147463
-
Outsourcing services: The contract is just the beginning
-
Allen, S. & Chandrashekar, A. (2000), "Outsourcing services: the contract is just the beginning", Business Horizons, Vol. 43 No. 2, pp. 25-34.
-
(2000)
Business Horizons
, vol.43
, Issue.2
, pp. 25-34
-
-
Allen, S.1
Chandrashekar, A.2
-
2
-
-
50649092007
-
Managing the protection of innovations in knowledge-intensive business services
-
Amara, N., Landry, R. & Traorè, N. (2008), "Managing the protection of innovations in knowledge-intensive business services", Research Policy, Vol. 37 No. 9, pp. 1530-47.
-
(2008)
Research Policy
, vol.37
, Issue.9
, pp. 1530-47
-
-
Amara, N.1
Landry, R.2
Traorè, N.3
-
3
-
-
84986146859
-
Modes of foreign entry: A transaction cost analysis and propositions
-
Anderson, E. & Gatignon, H. (1986), "Modes of foreign entry: a transaction cost analysis and propositions", Journal of International Business Studies, Vol. 17 No. 3, pp. 1-26.
-
(1986)
Journal of International Business Studies
, vol.17
, Issue.3
, pp. 1-26
-
-
Anderson, E.1
Gatignon, H.2
-
4
-
-
84858205191
-
International protection of trade secrets when using the Internet
-
Apke, T.M. (2003), "International protection of trade secrets when using internet", Management Decision, Vol. 41 No. 1, pp. 43-7. (Pubitemid 36332732)
-
(2003)
Management Decision -London then Bradford
, vol.41
, Issue.1-2
, pp. 43-47
-
-
Apke, T.M.1
-
5
-
-
29044432277
-
Getting offshoring right
-
Aron, R. & Singh, J.V. (2005), "Getting offshoring right", Harvard Business Review, Vol. 83 No. 12, pp. 135-43. (Pubitemid 41788065)
-
(2005)
Harvard Business Review
, vol.83
, Issue.12
, pp. 135-143
-
-
Aron, R.1
Singh, J.V.2
-
6
-
-
0042875722
-
The relative effectiveness of patents and secrecy for appropriation
-
DOI 10.1016/S0048-7333(00)00100-1, PII S0048733300001001
-
Arundel, A. (2001), "The relative effectiveness of patents and secrecy for appropriation", Research Policy, Vol. 30 No. 4, pp. 611-24. (Pubitemid 33675447)
-
(2001)
Research Policy
, vol.30
, Issue.4
, pp. 611-624
-
-
Arundel, A.1
-
7
-
-
0142166973
-
Outsourcing to outmanoeuvre: Outsourcing re-defines competitive strategy and structure
-
Baden-Fuller, C., Targett, D. & Hunt, B. (2000), "Outsourcing to outmanoeuvre: outsourcing re-defines competitive strategy and structure", European Management Journal, Vol. 18 No. 3, pp. 285-95.
-
(2000)
European Management Journal
, vol.18
, Issue.3
, pp. 285-95
-
-
Baden-Fuller, C.1
Targett, D.2
Hunt, B.3
-
8
-
-
33744514578
-
Outsourcing - The benefits and the risks
-
DOI 10.1016/j.hrmr.2006.03.011, PII S1053482206000234
-
Belcourt, M. (2006), "Outsourcing - the benefits and the risks", Human Resource Management Review, Vol. 16 No. 2, pp. 269-79. (Pubitemid 43811916)
-
(2006)
Human Resource Management Review
, vol.16
, Issue.2
, pp. 269-279
-
-
Belcourt, M.1
-
9
-
-
24144458931
-
Information systems security from a knowledge management perspective
-
DOI 10.1108/09685220510602013
-
Belsis, P., Kokolakis, S. & Kiountouzis, E. (2005), "Information systems security from a knowledge management perspective", Information Management & Computer Security, Vol. 13 No. 3, pp. 189-202. (Pubitemid 41227074)
-
(2005)
Information Management and Computer Security
, vol.13
, Issue.3
, pp. 189-202
-
-
Belsis, P.1
Kokolakis, S.2
Kiountouzis, E.3
-
10
-
-
38949170950
-
Is more IT offshoring better?. An exploratory study of western companies offshoring to South East Asia
-
DOI 10.1016/j.jom.2007.02.005, PII S0272696307000459
-
Bhalla, A., Sodhi, M.S. & Son, B. (2008), "Is more IT offshoring better? An exploratory study of western companies offshoring to South East Asia", Journal of Operations Management, Vol. 26 No. 2, pp. 322-35. (Pubitemid 351215678)
-
(2008)
Journal of Operations Management
, vol.26
, Issue.2
, pp. 322-335
-
-
Bhalla, A.1
Sodhi, M.S.2
Son, B.-G.3
-
11
-
-
0031843728
-
Intellectual property issues in RεtD contracts
-
DOI 10.1016/S1461-5347(98)00033-9, PII S1461534798000339
-
Binns, R. & Driscoll, B. (1998), "Intellectual property issues in R&D contracts", Pharmaceutical Science & Technology Today, Vol. 1 No. 3, pp. 95-9. (Pubitemid 28326330)
-
(1998)
Pharmaceutical Science and Technology Today
, vol.1
, Issue.3
, pp. 95-99
-
-
Binns, R.1
Driscoll, B.2
-
12
-
-
77955444113
-
Security considerations in outsourcing IT services
-
Blackley, J.A. & Leach, J. (1996), "Security considerations in outsourcing IT services", Information Security Technical Report, Vol. 1 No. 3, pp. 11-17.
-
(1996)
Information Security Technical Report
, vol.1
, Issue.3
, pp. 11-17
-
-
Blackley, J.A.1
Leach, J.2
-
13
-
-
11844260645
-
Interrelation between patenting and standardisation strategies: Empirical evidence and policy implications
-
DOI 10.1016/j.respol.2004.08.007, PII S0048733304001118
-
Blind, K. & Thumm, N. (2004), "Interrelation between patenting and standardisation strategies: empirical evidence and policy implications", Research Policy, Vol. 33 No. 10, pp. 1583-98. (Pubitemid 40085923)
-
(2004)
Research Policy
, vol.33
, Issue.10
, pp. 1583-1598
-
-
Blind, K.1
Thumm, N.2
-
14
-
-
84992969843
-
Strategic assessment of outsourcing and downsizing in the service market
-
Blumberg, D.F. (1998), "Strategic assessment of outsourcing and downsizing in the service market", Managing Service Quality, Vol. 8 No. 1, pp. 5-18. (Pubitemid 128023674)
-
(1998)
Managing service quality
, vol.8
, Issue.1
, pp. 5-18
-
-
Blumberg, D.F.1
-
15
-
-
49649121953
-
An economic modelling approach to information security risk management
-
Bojanc, R. & Jerman-Blazic, B. (2008), "An economic modelling approach to information security risk management", International Journal of Information Management, Vol. 28 No. 5, pp. 413-22.
-
(2008)
International Journal of Information Management
, vol.28
, Issue.5
, pp. 413-22
-
-
Bojanc, R.1
Jerman-Blazic, B.2
-
16
-
-
84979835554
-
Data protection - Third country transfers. Data transfer to third countries: Standard contractual clauses of the European Commission
-
DOI 10.1016/S0267-3649(02)00510-1, PII S0267364902005101
-
Bond, R.T., Audley, H. & Knyrim, R.S. (2002), "Data protection - third country transfer: data transfer to third countries: standard contractual clauses of the European Commission", Computer Law & Security Report, Vol. 18 No. 3, pp. 187-90. (Pubitemid 34623729)
-
(2002)
Computer Law and Security Report
, vol.18
, Issue.3
, pp. 187-190
-
-
Bond, R.T.J.1
Audley, H.2
Knyrim, R.S.3
-
17
-
-
33750024369
-
Is outsourcing of intangibles a real source of competitive advantage?
-
Bounfour, A. (1999), "Is outsourcing of intangibles a real source of competitive advantage?", International Journal of Applied Quality Management, Vol. 2 No. 2, pp. 127-51.
-
(1999)
International Journal of Applied Quality Management
, vol.2
, Issue.2
, pp. 127-51
-
-
Bounfour, A.1
-
18
-
-
33645885572
-
Information security risk management - When should it be managed?
-
Broderick, J.S. (2001), "Information security risk management - when should it be managed?", Information Security Technical Report, Vol. 6 No. 3, pp. 12-18.
-
(2001)
Information Security Technical Report
, vol.6
, Issue.3
, pp. 12-18
-
-
Broderick, J.S.1
-
19
-
-
33747040232
-
The dynamics of HRM systems in Indian BPO firms
-
DOI 10.1007/s12122-006-1027-7
-
Budhwar, P.S., Luthar, H.K. & Bhatnagar, J. (2006), "The dynamics of HRM systems in Indian BPO firms", Journal of Labor Research, Vol. 27 No. 3, pp. 339-60. (Pubitemid 44213987)
-
(2006)
Journal of Labor Research
, vol.27
, Issue.3
, pp. 339-360
-
-
Budhwar, P.S.1
Luthar, H.K.2
Bhatnagar, J.3
-
20
-
-
1542378315
-
A FMEA clinical laboratory case study: How to make problems and improvements measurable
-
Capunzo, M., Cavallo, P., Boccia, G., Brunetti, L. & Pizzuti, S. (2004), "A FMEA clinical laboratory case study: how to make problems and improvements measurable", Clinical Leadcership and Management Review, Vol. 18 No. 1, pp. 37-41.
-
(2004)
Clinical Leadcership and Management Review
, vol.18
, Issue.1
, pp. 37-41
-
-
Capunzo, M.1
Cavallo, P.2
Boccia, G.3
Brunetti, L.4
Pizzuti, S.5
-
21
-
-
33746622997
-
On security preparations against possible is threats across industries
-
DOI 10.1108/09685220610690817
-
Chang, A.J.-T. & Yeh, Q.-J. (2006), "On security preparations against possible IS threats across industries", Information Management & Computer Security, Vol. 14 No. 4, pp. 343-60. (Pubitemid 44151552)
-
(2006)
Information Management and Computer Security
, vol.14
, Issue.4
, pp. 343-360
-
-
Chang, A.J.-T.1
Yeh, Q.-J.2
-
22
-
-
33947392571
-
Creating an effective security risk model for outsourcing decisions
-
DOI 10.1007/s10550-007-0011-y
-
Colwill, C. & Gray, A. (2007), "Creating an effective security risk model for outsourcing decisions", BT Technology Journal, Vol. 25 No. 1, pp. 79-87. (Pubitemid 46455703)
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 79-87
-
-
Colwill, C.1
Gray, A.2
-
23
-
-
27344451131
-
IT outsourcing configuration: Research into defining and designing outsourcing arrangements
-
DOI 10.1016/j.jsis.2005.07.001, PII S0963868705000375
-
Cullen, S., Seddon, P.B. & Willcocks, L.P. (2005), "IT outsourcing configuration: research into defining and designing outsourcing arrangements", Journal of Strategic Information Systems, Vol. 14 No. 4, pp. 357-87. (Pubitemid 41525798)
-
(2005)
Journal of Strategic Information Systems
, vol.14
, Issue.4
, pp. 357-387
-
-
Cullen, S.1
Seddon, P.B.2
Willcocks, L.P.3
-
24
-
-
40849126698
-
Knowledge process outsourcing in financial services: The vendor perspective
-
Currie, W.L., Michell, V. & Abanishe, O. (2008), "Knowledge process outsourcing in financial services: the vendor perspective", European Management Journal, Vol. 26 No. 2, pp. 94-104.
-
(2008)
European Management Journal
, vol.26
, Issue.2
, pp. 94-104
-
-
Currie, W.L.1
Michell, V.2
Abanishe, O.3
-
26
-
-
57149139126
-
Multi-level information system security in outsourcing domain
-
Doomun, M.R. (2008), "Multi-level information system security in outsourcing domain", Business Process Management Journal, Vol. 14 No. 6, pp. 849-57.
-
(2008)
Business Process Management Journal
, vol.14
, Issue.6
, pp. 849-57
-
-
Doomun, M.R.1
-
27
-
-
34247123147
-
The Next Wave of Globalization: Relocating Service Provision to India
-
DOI 10.1016/j.worlddev.2006.09.014, PII S0305750X07000113
-
Dossani, R. & Kenney, M. (2007), "The next wave of globalization: relocating service provision to India", World Development, Vol. 35 No. 5, pp. 772-91. (Pubitemid 46586048)
-
(2007)
World Development
, vol.35
, Issue.5
, pp. 772-791
-
-
Dossani, R.1
Kenney, M.2
-
29
-
-
38949103697
-
Offshore outsourcing of professional services: A transaction cost economics perspective
-
DOI 10.1016/j.jom.2007.02.008, PII S0272696307000502
-
Ellram, L.M., Tate, W.L. & Billington, C. (2008), "Offshore outsourcing of professional services: a transaction cost economics perspective", Journal of Operations Management, Vol. 26 No. 2, pp. 148-63. (Pubitemid 351215683)
-
(2008)
Journal of Operations Management
, vol.26
, Issue.2
, pp. 148-163
-
-
Ellram, L.M.1
Tate, W.L.2
Billington, C.3
-
30
-
-
0242328846
-
A practical guide to successful outsourcing
-
Embleton, P.R. & Wright, P.C. (1998), "A practical guide to successful outsourcing", Empowerment in Organizations, Vol. 6 No. 3, pp. 94-106.
-
(1998)
Empowerment in Organizations
, vol.6
, Issue.3
, pp. 94-106
-
-
Embleton, P.R.1
Wright, P.C.2
-
31
-
-
35548986219
-
Information risks management in supply chains: An assessment and mitigation framework
-
Faisal, M.N., Banwet, D.K. & Shankar, R. (2007), "Information risks management in supply chains: an assessment and mitigation framework", Journal of Enterprise Information Management, Vol. 20 No. 6, pp. 677-99.
-
(2007)
Journal of Enterprise Information Management
, vol.20
, Issue.6
, pp. 677-99
-
-
Faisal, M.N.1
Banwet, D.K.2
Shankar, R.3
-
32
-
-
84979792294
-
IT security outsourcing: How safe is your IT security?
-
DOI 10.1016/S0267-3649(02)03009-1, PII S0267364902030091
-
Fenn, C., Shooter, R. & Allan, K. (2002), "IT security outsourcing: how safe is your IT security?", Computer Law & Security Report, Vol. 18 No. 2, pp. 109-11. (Pubitemid 34249783)
-
(2002)
Computer Law and Security Report
, vol.18
, Issue.2
, pp. 109-111
-
-
Fenn, C.1
Shooter, R.2
Allan, K.3
-
33
-
-
0642264602
-
A security framework for information system outsourcing
-
Fink, D. (1994), "A security framework for information system outsourcing", Information Management & Computer Security, Vol. 2 No. 4, pp. 3-8.
-
(1994)
Information Management & Computer Security
, vol.2
, Issue.4
, pp. 3-8
-
-
Fink, D.1
-
34
-
-
28044459683
-
Real-time information integrity = system integrity + data integrity + continuous assurances
-
DOI 10.1016/j.cose.2005.08.004, PII S0167404805001458
-
Flowerday, S. & von Solms, R. (2005), "Real-time information integrity-system integritydata integritycontinuous assurances", Computers & Security, Vol. 24 No. 8, pp. 604-13. (Pubitemid 41690973)
-
(2005)
Computers and Security
, vol.24
, Issue.8
, pp. 604-613
-
-
Flowerday, S.1
Von Solms, R.2
-
35
-
-
0242364658
-
Outsourcing: Guidelines for a structured approach
-
Franceschini, F., Galetto, M., Pignatelli, A. & Varetto, M. (2003), "Outsourcing: guidelines for a structured approach", Benchmarking: An International Journal, Vol. 10 No. 3, pp. 246-60.
-
(2003)
Benchmarking: An International Journal
, vol.10
, Issue.3
, pp. 246-60
-
-
Franceschini, F.1
Galetto, M.2
Pignatelli, A.3
Varetto, M.4
-
36
-
-
0242265591
-
Outsourcing or increasing risks?
-
Frost, C. (2000), "Outsourcing or increasing risks?", Balance Sheet, Vol. 8 No. 2, pp. 34-7.
-
(2000)
Balance Sheet
, vol.8
, Issue.2
, pp. 34-7
-
-
Frost, C.1
-
37
-
-
0042363355
-
The application of information security policies in large UK-based organizations: An exploratory investigation
-
Fulford, H. & Doherty, N.F. (2003), "The application of information security policies in large UK-based organizations: an exploratory investigation", Information Management & Computer Security, Vol. 11 No. 3, pp. 106-14.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.3
, pp. 106-14
-
-
Fulford, H.1
Doherty, N.F.2
-
38
-
-
53049103408
-
Information security requirements - Interpreting the legal aspects
-
Gerber, M. & von Solms, R. (2008), "Information security requirements - interpreting the legal aspects", Computers & Security, Vol. 27 Nos 5/6, pp. 124-35.
-
(2008)
Computers & Security
, vol.27
, Issue.5-6
, pp. 124-35
-
-
Gerber, M.1
Von Solms, R.2
-
39
-
-
38949184939
-
Business process outsourcing: An approach to gain access to world-class capabilities
-
Ghodeswar, B. & Vaidyanathan, J. (2008), "Business process outsourcing: an approach to gain access to world-class capabilities", Business Process Management Journal, Vol. 14 No. 1, pp. 23-38.
-
(2008)
Business Process Management Journal
, vol.14
, Issue.1
, pp. 23-38
-
-
Ghodeswar, B.1
Vaidyanathan, J.2
-
40
-
-
0032156562
-
A decision support system for supplier selection using an integrated analytic hierarchy process and linear programming
-
PII S0925527397000091
-
Ghodsypour, S.H. & O'Brien, C. (1998), "A decision support system for supplier selection using an integrated analytic hierarchy process and linear programming", International Journal of Production Economics, Vol. 56 No. 1, pp. 199-212. (Pubitemid 128400944)
-
(1998)
International Journal of Production Economics
, vol.56-57
, pp. 199-212
-
-
Ghodsypour, S.H.1
O'Brien, C.2
-
41
-
-
33750032354
-
Information systems offshore outsourcing: A descriptive analysis
-
DOI 10.1108/02635570610712555
-
Gonzalez, R., Gasco, J. & Llopis, J. (2006), "Information systems offshore outsourcing: a descriptive analysis", Industrial Management & Data Systems, Vol. 106 No. 9, pp. 1233-48. (Pubitemid 44570976)
-
(2006)
Industrial Management and Data Systems
, vol.106
, Issue.9
, pp. 1233-1248
-
-
Gonzalez, R.1
Gasco, J.2
Llopis, J.3
-
42
-
-
22144493283
-
The outsourcing of IT-enabled business processes: A conceptual model of the location decision
-
DOI 10.1016/j.intman.2005.03.010, PII S1075425305000190
-
Graf, M. & Mudambi, S.M. (2005), "The outsourcing of IT-enabled business processes: a conceptual model of the location decision", Journal of International Management, Vol. 11 No. 2, pp. 253-68. (Pubitemid 40984487)
-
(2005)
Journal of International Management
, vol.11
, Issue.SPEC. ISS.
, pp. 253-268
-
-
Graf, M.1
Mudambi, S.M.2
-
43
-
-
24144453387
-
Information systems security issues and decisions for small businesses: An empirical examination
-
DOI 10.1108/09685220510614425
-
Gupta, A. & Hammond, R. (2005), "Information systems security issues and decisions for small businesses: an empirical examination", Information Management & Computer Security, Vol. 13 No. 4, pp. 297-310. (Pubitemid 41227070)
-
(2005)
Information Management and Computer Security
, vol.13
, Issue.4
, pp. 297-310
-
-
Gupta, A.1
Hammond, R.2
-
44
-
-
54949146918
-
Implementation and effectiveness of organizational information security measures
-
Hagen, J.M., Albrechsten, E. & Hovden, J. (2008), "Implementation and effectiveness of organizational information security measures", Information Management & Computer Security, Vol. 16 No. 4, pp. 377-97.
-
(2008)
Information Management & Computer Security
, vol.16
, Issue.4
, pp. 377-97
-
-
Hagen, J.M.1
Albrechsten, E.2
Hovden, J.3
-
45
-
-
0032620195
-
Identifying and controlling computer crime and employee fraud
-
Haugen, S. & Roger Selin, J. (1999), "Identifying and controlling computer crime and employee fraud", Industrial Management & Data Systems, Vol. 99 No. 8, pp. 340-4. (Pubitemid 129303896)
-
(1999)
Industrial Management and Data Systems
, vol.99
, Issue.8
, pp. 340-344
-
-
Haugen, S.1
Selin, J.R.2
-
46
-
-
0041482688
-
Corporate system security: Towards an integrated management approach
-
Higgins, H.N. (1999), "Corporate system security: towards an integrated management approach", Information Management & Computer Security, Vol. 7 No. 5, pp. 217-22. (Pubitemid 129654356)
-
(1999)
Information Management and Computer Security
, vol.7
, Issue.5
, pp. 217-222
-
-
Higgins, H.N.1
-
47
-
-
0037228072
-
The law, cybercrime, risk assessment and cyber protection
-
Hinde, S. (2003), "The law, cybercrime, risk assessment and cyber protection", Computers & Security, Vol. 22 No. 2, pp. 90-5.
-
(2003)
Computers & Security
, vol.22
, Issue.2
, pp. 90-5
-
-
Hinde, S.1
-
48
-
-
33747460356
-
Outsourcing, information leakage and the risk of losing technology-based competencies
-
DOI 10.1108/09555340610686967
-
Hoecht, A. & Trott, P. (2006), "Outsourcing, information leakage and the risk of losing technology-based competencies", European Business Review, Vol. 18 No. 5, pp. 395-412. (Pubitemid 44259719)
-
(2006)
European Business Review
, vol.18
, Issue.5
, pp. 395-412
-
-
Hoecht, A.1
Trott, P.2
-
49
-
-
70350717638
-
Redefining the paradigm of global competition: Offshoring of service firms
-
Jagersma, P.K. & Gorp, D.M.V. (2007), "Redefining the paradigm of global competition: offshoring of service firms", Business Strategy Series, Vol. 8 No. 1, pp. 35-42.
-
(2007)
Business Strategy Series
, vol.8
, Issue.1
, pp. 35-42
-
-
Jagersma, P.K.1
Gorp, D.M.V.2
-
50
-
-
85088338113
-
De facto property right protection and MNC location choices
-
Jandhyala, S. (2008), "De facto property right protection and MNC location choices", Academy of Management Proceedings, pp. 1-6.
-
(2008)
Academy of Management Proceedings
, pp. 1-6
-
-
Jandhyala, S.1
-
51
-
-
0942280366
-
The composition of foreign direct investment and protection of intellectual property rights: Evidence from transition economies
-
Javorcik, B.S. (2004), "The composition of foreign direct investment and protection of intellectual property rights: evidence from transition economies", European Economic Review, Vol. 48 No. 1, pp. 39-62.
-
(2004)
European Economic Review
, vol.48
, Issue.1
, pp. 39-62
-
-
Javorcik, B.S.1
-
52
-
-
84986019329
-
Critical review - Outsourcing: A paradigm shift
-
Kakabadse, N. & Kakabadse, A. (2000), "Critical review - outsourcing: a paradigm shift", Journal of Management Development, Vol. 19 No. 8, pp. 670-728.
-
(2000)
Journal of Management Development
, vol.19
, Issue.8
, pp. 670-728
-
-
Kakabadse, N.1
Kakabadse, A.2
-
53
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
Kankanhalli, A., Teo, H.-H., Tan, B.C.Y. & Wei, K.-K. (2003), "An integrative study of information systems security effectiveness", International Journal of Information Management, Vol. 23 No. 2, pp. 139-54.
-
(2003)
International Journal of Information Management
, vol.23
, Issue.2
, pp. 139-54
-
-
Kankanhalli, A.1
Teo, H.-H.2
Tan, B.C.Y.3
Wei, K.-K.4
-
54
-
-
34250776507
-
Security and Trust in IT Business Outsourcing: A Manifesto
-
DOI 10.1016/j.entcs.2006.08.030, PII S1571066107003015
-
Karabulut, Y., Kerschbaum, F., Massacci, F., Robinson, P. & Yautsiukhin, A. (2007), "Security and trust in IT business outsourcing: a manifesto", Electronic Notes in Theoretical Computer Science, Vol. 179 No. 6, pp. 47-58. (Pubitemid 46963712)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.179
, pp. 47-58
-
-
Karabulut, Y.1
Kerschbaum, F.2
Massacci, F.3
Robinson, P.4
Yautsiukhin, A.5
-
55
-
-
33749496395
-
A framework for outsourcing IS/IT security services
-
DOI 10.1108/09685220610707421
-
Karyda, M., Mitrou, E. & Quirchmayr, G. (2006), "A framework for outsourcing IS/IT security services", Information Management & Computer Security, Vol. 14 No. 5, pp. 402-15. (Pubitemid 44515714)
-
(2006)
Information Management and Computer Security
, vol.14
, Issue.5
, pp. 402-415
-
-
Karyda, M.1
Mitrou, E.2
Quirchmayr, G.3
-
56
-
-
84979796965
-
Outsourcing to China - Risks and benefit
-
Kennedy, G. & Clark, D. (2006), "Outsourcing to China - risks and benefit", Computer Law & Security Report, Vol. 22 No. 3, pp. 250-3.
-
(2006)
Computer Law & Security Report
, vol.22
, Issue.3
, pp. 250-3
-
-
Kennedy, G.1
Clark, D.2
-
57
-
-
1242265180
-
Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors
-
Khalfan, A.M. (2004), "Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors", International Journal of Information Management, Vol. 24 No. 1, pp. 29-42.
-
(2004)
International Journal of Information Management
, vol.24
, Issue.1
, pp. 29-42
-
-
Khalfan, A.M.1
-
58
-
-
67349147567
-
Global outsourcing of back office services: Lessons, trends, and enduring challenges
-
Lacity, M.C., Willcocks, L.P. & Rottman, J.W. (2008), "Global outsourcing of back office services: lessons, trends, and enduring challenges", Strategic Outsourcing: An International Journal, Vol. 1 No. 1, pp. 13-34.
-
(2008)
Strategic Outsourcing: An International Journal
, vol.1
, Issue.1
, pp. 13-34
-
-
Lacity, M.C.1
Willcocks, L.P.2
Rottman, J.W.3
-
59
-
-
0030378916
-
IT outsourcing contracts: Practical issues for management
-
Lee, K.O. (1996), "IT outsourcing contracts: practical issues for management", Industrial Management & Data Systems, Vol. 96 No. 1, pp. 15-20.
-
(1996)
Industrial Management & Data Systems
, vol.96
, Issue.1
, pp. 15-20
-
-
Lee, K.O.1
-
60
-
-
0346330115
-
Development of certification and audit processes of application service provider for IT outsourcing
-
Leem, C.S. & Lee, H.J. (2004), "Development of certification and audit processes of application service provider for IT outsourcing", Technovation, Vol. 24 No. 1, pp. 63-71.
-
(2004)
Technovation
, vol.24
, Issue.1
, pp. 63-71
-
-
Leem, C.S.1
Lee, H.J.2
-
61
-
-
33750961813
-
Offshoring Work: Business Hype or the Onset of Fundamental Transformation?
-
DOI 10.1016/j.lrp.2006.07.009, PII S0024630106000586
-
Lewin, A.Y. & Peeters, C. (2006), "Offshoring work: business hype or the onset of fundamental transformation?", Long Range Planning, Vol. 39 No. 3, pp. 221-39. (Pubitemid 44734577)
-
(2006)
Long Range Planning
, vol.39
, Issue.3
, pp. 221-239
-
-
Lewin, A.Y.1
Peeters, C.2
-
62
-
-
20344396669
-
The voting analytic hierarchy process method for selecting supplier
-
DOI 10.1016/j.ijpe.2004.09.005, PII S0925527304003263
-
Liu, F. & Hai, H.L. (2005), "The voting analytic hierarchy process method for selecting supplier", International Journal of Production Economics, Vol. 97 No. 3, pp. 308-17. (Pubitemid 40788676)
-
(2005)
International Journal of Production Economics
, vol.97
, Issue.3
, pp. 308-317
-
-
Liu, F.-H.F.1
Hai, H.L.2
-
63
-
-
0000133760
-
Threats to information systems: Today's reality yesterday's understanding
-
Loch, K.D., Carr, H.H. & Warkentin, M.E. (1992), "Threats to information systems: today's reality yesterday's understanding", MIS Quarterly, Vol. 16 No. 2, pp. 173-86.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-86
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
64
-
-
0004242112
-
-
Taylor and Francis, New York, NY
-
McDermott, R.E., Mikulak, R.J. & Beauregard, M.R. (2008), The Basics of FMEA, Taylor and Francis, New York, NY.
-
(2008)
The Basics of FMEA
-
-
McDermott, R.E.1
Mikulak, R.J.2
Beauregard, M.R.3
-
65
-
-
0009886038
-
An unconventional approach to intellectual property protection: The case of an Australian firm transferring shipbuilding technologies to China
-
McGaughey, S.L., Liesch, P.W. & Poulson, D. (2000), "An unconventional approach to intellectual property protection: the case of an Australian firm transferring shipbuilding technologies to China", Journal of World Business, Vol. 35 No. 1, pp. 1-20.
-
(2000)
Journal of World Business
, vol.35
, Issue.1
, pp. 1-20
-
-
McGaughey, S.L.1
Liesch, P.W.2
Poulson, D.3
-
66
-
-
49249127269
-
Information security management objectives and practices: A parsimonious framework
-
Ma, Q., Johnston, A.C. & Michael Pearson, J. (2008), "Information security management objectives and practices: a parsimonious framework", Information Management & Computer Security, Vol. 16 No. 3, pp. 251-70.
-
(2008)
Information Management & Computer Security
, vol.16
, Issue.3
, pp. 251-70
-
-
Ma, Q.1
Johnston, A.C.2
Michael Pearson, J.3
-
67
-
-
43449091922
-
Offshore middlemen: Transnational intermediation in technology sourcing
-
Mahnke, V., Wareham, J. & Bjorn-Andersen, N. (2008), "Offshore middlemen: transnational intermediation in technology sourcing", Journal of Information Technology, No. 23, pp. 18-30.
-
(2008)
Journal of Information Technology
, Issue.23
, pp. 18-30
-
-
Mahnke, V.1
Wareham, J.2
Bjorn-Andersen, N.3
-
68
-
-
55349093310
-
A dynamic perspective on next-generation offshoring: The global sourcing of science and engineering talent
-
Manning, S., Massini, S. & Lewin, A.Y. (2008), "A dynamic perspective on next-generation offshoring: the global sourcing of science and engineering talent", Academy of Management Perspectives, Vol. 22 No. 3, pp. 35-54.
-
(2008)
Academy of Management Perspectives
, vol.22
, Issue.3
, pp. 35-54
-
-
Manning, S.1
Massini, S.2
Lewin, A.Y.3
-
69
-
-
84993026067
-
Business process outsourcing: A new test of management competence
-
May, A.S. (1998), "Business process outsourcing: a new test of management competence", Career Development International, Vol. 3 No. 4, pp. 136-41. (Pubitemid 128129767)
-
(1998)
Career development international
, vol.3
, Issue.4
, pp. 136-141
-
-
May, A.S.1
-
70
-
-
38949109595
-
A typology of offshoring and outsourcing in electronically transmitted services
-
DOI 10.1016/j.jom.2007.02.004, PII S0272696307000447
-
Metters, R. (2008), "A typology of offshoring and outsourcing in electronically transmitted services", Journal of Operations Management, Vol. 26 No. 2, pp. 198-211. (Pubitemid 351215677)
-
(2008)
Journal of Operations Management
, vol.26
, Issue.2
, pp. 198-211
-
-
Metters, R.1
-
71
-
-
38949147201
-
-
CASP/AT Kearney, Binghamton, NY
-
Monczka, R.M., Carter, J.R., Markham, W.J., Blascovich, J. & Slaight, T. (2005), Outsourcing Strategically for Sustainable Competitive Advantage, CASP/AT Kearney, Binghamton, NY.
-
(2005)
Outsourcing Strategically for Sustainable Competitive Advantage
-
-
Monczka, R.M.1
Carter, J.R.2
Markham, W.J.3
Blascovich, J.4
Slaight, T.5
-
72
-
-
32144446458
-
The internationalization of local manufacturing systems: Evidence from the Italian chair district
-
DOI 10.1080/09537280500110912, PII M4712438021
-
Nassimbeni, G. & Sartor, M. (2005), "The internationalisation of local manufacturing systems: evidences from the Italian chair district", Production Planning & Control, Vol. 16 No. 5, pp. 470-8. (Pubitemid 43203732)
-
(2005)
Production Planning and Control
, vol.16
, Issue.5
, pp. 470-478
-
-
Nassimbeni, G.1
Sartor, M.2
-
73
-
-
33746811797
-
International purchasing offices in China
-
DOI 10.1080/09537280600768239, PII N47Q63G050001550
-
Nassimbeni, G. & Sartor, M. (2006), "International purchasing offices in China", Production Planning & Control, Vol. 17 No. 5, pp. 494-507. (Pubitemid 44180276)
-
(2006)
Production Planning and Control
, vol.17
, Issue.5
, pp. 494-507
-
-
Nassimbeni, G.1
Sartor, M.2
-
74
-
-
34047169861
-
Sourcing in China: A typology
-
DOI 10.1016/j.ijpe.2006.09.011, PII S0925527306002453
-
Nassimbeni, G. & Sartor, M. (2007), "Sourcing in China: a typology", International Journal of Production Economics, Vol. 107 No. 2, pp. 333-49. (Pubitemid 46528161)
-
(2007)
International Journal of Production Economics
, vol.107
, Issue.2
, pp. 333-349
-
-
Nassimbeni, G.1
Sartor, M.2
-
75
-
-
33747338767
-
Transaction costs and control of outsourced accounting: Case evidence from India
-
DOI 10.1016/j.mar.2006.05.002, PII S104450050600031X
-
Nicholson, B., Jones, J. & Espenlaub, S. (2006), "Transaction costs and control of outsourced accounting: case evidence from India", Management Accounting Research, Vol. 17 No. 3, pp. 238-58. (Pubitemid 44241757)
-
(2006)
Management Accounting Research
, vol.17
, Issue.3
, pp. 238-258
-
-
Nicholson, B.1
Jones, J.2
Espenlaub, S.3
-
76
-
-
0041370064
-
Are your secrets safe? Knowledge protection in strategic alliances
-
DOI 10.1016/S0007-6813(01)80073-2, PII S0007681301800732
-
Norman, P.M. (2001), "Are your secrets safe? Knowledge protection in strategic alliances", Business Horizons, Vol. 44 No. 6, pp. 51-60. (Pubitemid 33618061)
-
(2001)
Business Horizons
, vol.44
, Issue.6
, pp. 51-60
-
-
Norman, P.M.1
-
78
-
-
0000335439
-
Institutional environment and the mechanisms of governance: The impact of intellectual property protection on the structure of inter-firm alliances
-
Oxley, J.E. (1999), "Institutional environment and the mechanisms of governance: the impact of intellectual property protection on the structure of inter-firm alliances", Journal of Economic Behaviour and Organization, Vol. 38 No. 3, pp. 283-309.
-
(1999)
Journal of Economic Behaviour and Organization
, vol.38
, Issue.3
, pp. 283-309
-
-
Oxley, J.E.1
-
79
-
-
33846947128
-
Offshore technology outsourcing: Overview of management and legal issues
-
Pai, A.K. & Basu, S. (2007), "Offshore technology outsourcing: overview of management and legal issues", Business Process Management Journal, Vol. 13 No. 1, pp. 21-46.
-
(2007)
Business Process Management Journal
, vol.13
, Issue.1
, pp. 21-46
-
-
Pai, A.K.1
Basu, S.2
-
80
-
-
84858230908
-
The risk of allowing outside staff access to your information system
-
Peltier, T. & Edison, D. (1996), "The risk of allowing outside staff access to your information system", Information Security Technical Report, Vol. 1 No. 3, pp. 18-28.
-
(1996)
Information Security Technical Report
, vol.1
, Issue.3
, pp. 18-28
-
-
Peltier, T.1
Edison, D.2
-
81
-
-
18444396129
-
Transferring business and support functions: The information security risks of outsourcing and off-shoring
-
DOI 10.1016/S1361-3723(05)70183-4, PII S1361372305701834
-
Pemble, M. (2004), "Transferring business and support functions: the information security risks of outsourcing and off-shoring: (a beginner's guide to avoiding the abrogation of responsibility)", Computer Fraud & Security, Vol. 2004 No. 12, pp. 5-9. (Pubitemid 40642777)
-
(2004)
Computer Fraud and Security
, vol.2004
, Issue.12
, pp. 5-9
-
-
Pemble, M.1
-
82
-
-
84858205218
-
Security service level agreements for outsourced security functions
-
Pepper, B. (1996), "Security service level agreements for outsourced security functions", Information Security Technical Report, Vol. 1 No. 3, pp. 48-50.
-
(1996)
Information Security Technical Report
, vol.1
, Issue.3
, pp. 48-50
-
-
Pepper, B.1
-
83
-
-
36348935112
-
Defining the most desirable outsourcing contract between customer and vendor
-
Platz, L.A. & Temponi, C. (2007), "Defining the most desirable outsourcing contract between customer and vendor", Management Decision, Vol. 45 No. 10, pp. 1656-66.
-
(2007)
Management Decision
, vol.45
, Issue.10
, pp. 1656-66
-
-
Platz, L.A.1
Temponi, C.2
-
84
-
-
10644289334
-
A framework for the governance of information security
-
Posthumus, S. & von Solms, R. (2004), "A framework for the governance of information security", Computers & Security, Vol. 23 No. 8, pp. 638-46.
-
(2004)
Computers & Security
, vol.23
, Issue.8
, pp. 638-46
-
-
Posthumus, S.1
Von Solms, R.2
-
85
-
-
84993030046
-
The ten outsourcing traps to avoid
-
Power, M., Bonifazi, C. & Desouza, K.C. (2004), "The ten outsourcing traps to avoid", Journal of Business Strategy, Vol. 25 No. 2, pp. 37-42.
-
(2004)
Journal of Business Strategy
, vol.25
, Issue.2
, pp. 37-42
-
-
Power, M.1
Bonifazi, C.2
Desouza, K.C.3
-
86
-
-
84992948144
-
Outsourcing of logistics functions: A literature survey
-
Razzaque, M.A. & Sheng, C.C. (1998), "Outsourcing of logistics functions: a literature survey", International Journal of Physical Distribution & Logistics Management, Vol. 28 No. 2, pp. 89-107.
-
(1998)
International Journal of Physical Distribution & Logistics Management
, vol.28
, Issue.2
, pp. 89-107
-
-
Razzaque, M.A.1
Sheng, C.C.2
-
87
-
-
33749388479
-
Cooperation and opportunistic behaviour in transformational outsourcing
-
DOI 10.1108/03684920610675058, Systems, Cybernetics and Innovations
-
Rebernik, M. & Bradac, B. (2006), "Cooperation and opportunistic behaviour in transformational outsourcing", Kybernetes, Vol. 35 Nos 7/8, pp. 1005-13. (Pubitemid 44503328)
-
(2006)
Kybernetes
, vol.35
, Issue.7-8
, pp. 1005-1013
-
-
Rebernik, M.1
Bradac, B.2
-
88
-
-
84986105989
-
Information security in business environments
-
Sanderson, E. & Forcht, K.A. (1996), "Information security in business environments", Information Management & Computer Security, Vol. 4 No. 1, pp. 32-7.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.1
, pp. 32-7
-
-
Sanderson, E.1
Forcht, K.A.2
-
89
-
-
84993111723
-
A quantitative approach to the outsourcing-insourcing decision in an international context
-
DOI 10.1108/00251740410555461
-
Schniederjans, M.J. & Zuckweiler, K.M. (2004), "A quantitative approach to the outsourcing-insourcing decision in an international context", Management Decision, Vol. 42 No. 8, pp. 974-86. (Pubitemid 39320028)
-
(2004)
Management Decision -London then Bradford
, vol.42
, Issue.8
, pp. 974-986
-
-
Schniederjans, M.J.1
Zuckweiler, K.M.2
-
90
-
-
0036883502
-
FMEA methodology design, implementation and integration with HACCP system in a food company
-
DOI 10.1016/S0956-7135(02)00029-4, PII S0956713502000294
-
Scipioni, A., Saccarola, G., Centazzo, A. & Arena, F. (2002), "FMEA methodology design, implementation and integration with HACCP system in a food company", Food Control, Vol. 13 No. 8, pp. 495-501. (Pubitemid 35252335)
-
(2002)
Food Control
, vol.13
, Issue.8
, pp. 495-501
-
-
Scipioni, A.1
Saccarola, G.2
Centazzo, A.3
Arena, F.4
-
91
-
-
54249106837
-
Failure mode and effects analysis (FMEA) in the context of risk management in new product development: A case study in an automotive company
-
Segismundo, A. & Cauchick, A. (2008), "Failure mode and effects analysis (FMEA) in the context of risk management in new product development: a case study in an automotive company", International Journal of Quality & Reliability Management, Vol. 25 No. 9, pp. 899-912.
-
(2008)
International Journal of Quality & Reliability Management
, vol.25
, Issue.9
, pp. 899-912
-
-
Segismundo, A.1
Cauchick, A.2
-
92
-
-
33646755488
-
From business process outsourcing (BPO) to knowledge process outsourcing (KPO): Some issues
-
Sen, F. & Shiel, M. (2006), "From business process outsourcing (BPO) to knowledge process outsourcing (KPO): some issues", Human Systems Management, Vol. 25 No. 2, pp. 145-55.
-
(2006)
Human Systems Management
, vol.25
, Issue.2
, pp. 145-55
-
-
Sen, F.1
Shiel, M.2
-
93
-
-
0031337118
-
Managing security for outsourcing contracts
-
Sherwood, J. (1997), "Managing security for outsourcing contracts", Computers & Security, Vol. 16 No. 7, pp. 603-9.
-
(1997)
Computers & Security
, vol.16
, Issue.7
, pp. 603-9
-
-
Sherwood, J.1
-
94
-
-
38349188435
-
A model for outsourcing HRD
-
Simmonds, D. & Gibson, R. (2008), "A model for outsourcing HRD", Journal of European Industrial Training, Vol. 32 No. 1, pp. 4-18.
-
(2008)
Journal of European Industrial Training
, vol.32
, Issue.1
, pp. 4-18
-
-
Simmonds, D.1
Gibson, R.2
-
95
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M.T. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
96
-
-
33947403085
-
Intellectual property rights
-
Spinello, R.A. (2007), "Intellectual property rights", Library Hi Tech, Vol. 25 No. 1, pp. 12-22.
-
(2007)
Library Hi Tech
, vol.25
, Issue.1
, pp. 12-22
-
-
Spinello, R.A.1
-
97
-
-
0242453511
-
Promoting security awareness and commitment
-
Spurling, P. (1995), "Promoting security awareness and commitment", Information Management & Computer Security, Vol. 3 No. 2, pp. 20-6.
-
(1995)
Information Management & Computer Security
, vol.3
, Issue.2
, pp. 20-6
-
-
Spurling, P.1
-
99
-
-
33751204437
-
Ensuring consistent security implementation within a distributed and federated environment
-
DOI 10.1016/S1361-3723(06)70441-9, PII S1361372306704419
-
Stephenson, P. (2006), "Ensuring consistent security implementation within a distributed and federated environment", Computers & Security, Vol. 2006 No. 11, pp. 12-14. (Pubitemid 44792512)
-
(2006)
Computer Fraud and Security
, vol.2006
, Issue.11
, pp. 12-14
-
-
Stephenson, P.1
-
100
-
-
0347496991
-
-
McGraw-Hill, New York, NY
-
Stevenson, W.J. (2007), Operations Management, McGraw-Hill, New York, NY, pp. 504-37.
-
(2007)
Operations Management
, pp. 504-37
-
-
Stevenson, W.J.1
-
101
-
-
38949112456
-
Invisible costs in offshoring services work
-
DOI 10.1016/j.jom.2007.02.009, PII S0272696307000514
-
Stringfellow, A., Teagarden, M.B. & Nie, W. (2008), "Invisible costs in offshoring services work", Journal of Operations Management, Vol. 26 No. 2, pp. 164-79. (Pubitemid 351217085)
-
(2008)
Journal of Operations Management
, vol.26
, Issue.2
, pp. 164-179
-
-
Stringfellow, A.1
Teagarden, M.B.2
Nie, W.3
-
102
-
-
20444500877
-
Risks factors associated with offshore IT outsourcing
-
DOI 10.1108/02635570510599940
-
Tafti, M.H.A. (2005), "Risks factors associated with offshore IT outsourcing", Industrial Management & Data Systems, Vol. 105 No. 5, pp. 549-60. (Pubitemid 40822003)
-
(2005)
Industrial Management and Data Systems
, vol.105
, Issue.5
, pp. 549-560
-
-
Tafti, M.H.A.1
-
103
-
-
39449093331
-
United by a common language? Trade union responses in the UK and India to call centre offshoring
-
Taylor, P. & Bain, P. (2008), "United by a common language? Trade union responses in the UK and India to call centre offshoring", Antipode, Vol. 40 No. 1, pp. 131-54.
-
(2008)
Antipode
, vol.40
, Issue.1
, pp. 131-54
-
-
Taylor, P.1
Bain, P.2
-
104
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
Thomson, M.E. & von Solms, R. (1998), "Information security awareness: educating your users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73. (Pubitemid 128623423)
-
(1998)
Information Management and Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
105
-
-
0036798584
-
Data integrity assurance in a layered security strategy
-
Tickle, I. (2002), "Data integrity assurance in a layered security strategy", Computer Fraud & Security, Vol. 2002 No. 10, pp. 9-13.
-
(2002)
Computer Fraud & Security
, vol.2002
, Issue.10
, pp. 9-13
-
-
Tickle, I.1
-
106
-
-
0036432756
-
Security of personal data across national borders
-
DOI 10.1108/09685220210446588
-
Tran, E. & Atkinson, M. (2002), "Security of personal data across national borders", Information Management & Computer Security, Vol. 10 No. 5, pp. 237-41. (Pubitemid 35359381)
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.5
, pp. 237-241
-
-
Tran, E.1
Atkinson, M.2
-
107
-
-
0031325337
-
How MNCs choose entry modes and form alliances: The China experience
-
Tse, D.K., Pan, Y. & Au, K.Y. (1997), "How MNCs choose entry modes and form alliances: the China experience", Journal of International Business Studies, Vol. 28 No. 4, pp. 779-805. (Pubitemid 127360717)
-
(1997)
Journal of International Business Studies
, vol.28
, Issue.4
, pp. 779-805
-
-
Tse, D.K.1
Pan, Y.2
Au, K.Y.3
-
108
-
-
3242687828
-
Product-driven supply chain selection using integrated multi-criteria decision-making methodology
-
Wang, G., Huang, S.H. & Dismukes, J.P. (2004), "Product-driven supply chain selection using integrated multi-criteria decision-making methodology", International Journal of Production Economics, Vol. 91 No. 1, pp. 1-15.
-
(2004)
International Journal of Production Economics
, vol.91
, Issue.1
, pp. 1-15
-
-
Wang, G.1
Huang, S.H.2
Dismukes, J.P.3
-
109
-
-
84979842352
-
Outsourcing - Financial Services Authority report on offshoring
-
DOI 10.1016/j.clsr.2005.08.008, PII S0267364905001512
-
Wright, T. (2005), "Outsourcing - financial services authority report on offshoring", Computer Law & Security Report, Vol. 21 No. 6, pp. 500-4. (Pubitemid 41642016)
-
(2005)
Computer Law and Security Report
, vol.21
, Issue.6
, pp. 500-504
-
-
Wright, T.1
-
110
-
-
22944455911
-
Culture matters to multinationals' intellectual property businesses
-
DOI 10.1016/j.jwb.2005.05.005, PII S1090951605000337
-
Yang, D. (2005), "Culture matters to multinationals' intellectual property businesses", Journal of World Business, Vol. 40 No. 3, pp. 281-301. (Pubitemid 41051956)
-
(2005)
Journal of World Business
, vol.40
, Issue.3
, pp. 281-301
-
-
Yang, D.1
-
111
-
-
38949089272
-
Effective strategies for internal outsourcing and offshoring of business services: An empirical investigation
-
DOI 10.1016/j.jom.2007.02.003, PII S0272696307000435
-
Zeynep, A. & Masini, A. (2008), "Effective strategies for internal outsourcing and offshoring of business services: an empirical investigation", Journal of Operations Management, Vol. 26 No. 2, pp. 239-56. (Pubitemid 351215676)
-
(2008)
Journal of Operations Management
, vol.26
, Issue.2
, pp. 239-256
-
-
Zeynep Aksin, O.1
Masini, A.2
-
112
-
-
84986079225
-
Outsourcing - a strategic move: the process and the ingredients for success
-
DOI 10.1108/EUM0000000005473
-
Zhu, Z., Hsu, K. & Lillie, J. (2001), "Outsourcing - a strategic move: the process and the ingredients for success", Management Decision, Vol. 39 No. 5, pp. 373-8. (Pubitemid 33299584)
-
(2001)
Management Decision
, vol.39
, Issue.5-6
, pp. 373-378
-
-
Zhu, Z.1
Hsu, K.2
Lillie, J.3
-
113
-
-
0011511934
-
The pros and cons of IT oursourcing
-
Antonucci, Y.L., Lordi, F.C. & Tucker, J.J. III (1998), "The pros and cons of IT oursourcing", Journal of Accountancy, Vol. 185 No. 6, pp. 26-31.
-
(1998)
Journal of Accountancy
, vol.185
, Issue.6
, pp. 26-31
-
-
Antonucci, Y.L.1
Lordi, F.C.2
Tucker Iii., J.J.3
-
114
-
-
10144232763
-
Validating measures of information technology outsourcing risk factors
-
DOI 10.1016/j.omega.2004.04.003, PII S0305048304000635
-
Bahli, B. & Rivard, S. (2005), "Validating measures of information technology outsourcing risk factors", Omega, Vol. 33 No. 2, pp. 175-87. (Pubitemid 39615362)
-
(2005)
Omega
, vol.33
, Issue.2
, pp. 175-187
-
-
Bahli, B.1
Rivard, S.2
-
115
-
-
42049104143
-
Multinational investment and host country development: Location efficiencies for services offshoring
-
Bunyaratavej, K., Hahn, E.D. & Doh, J.P. (2008), "Multinational investment and host country development: location efficiencies for services offshoring", Journal of World Business, Vol. 43 No. 2, pp. 227-42.
-
(2008)
Journal of World Business
, vol.43
, Issue.2
, pp. 227-42
-
-
Bunyaratavej, K.1
Hahn, E.D.2
Doh, J.P.3
-
116
-
-
84993054455
-
Offshoring: Secure or open to the praying mantis?", Strategic Outsourcing: Secure
-
Burns, B. (2008), "Offshoring: secure or open to the praying mantis?", Strategic Outsourcing: An International Journal, Vol. 1 No. 1, pp. 77-86.
-
(2008)
An International Journal
, vol.1
, Issue.1
, pp. 77-86
-
-
Burns, B.1
-
117
-
-
34848815664
-
Why 'nearshore' means that distance matters
-
DOI 10.1145/1290958.1290959, 1290959
-
Carmel, E. & Abbott, P. (2007), "Why 'nearshore' means that distance matters", Communications of the ACM, Vol. 50 No. 10, pp. 40-6. (Pubitemid 47504997)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 40-46
-
-
Carmel, E.1
Abbott, P.2
-
118
-
-
33646715932
-
IT-driven offshoring: The exaggerated 'development opportunity'
-
Chandrasekhar, C.P. & Jayati, G. (2006), "IT-driven offshoring: the exaggerated 'development opportunity'", Human Systems Management, Vol. 25 No. 2, pp. 91-101.
-
(2006)
Human Systems Management
, vol.25
, Issue.2
, pp. 91-101
-
-
Chandrasekhar, C.P.1
Jayati, G.2
-
119
-
-
78649802149
-
-
Franco Angeli, Milano
-
Chiarini, A. & Vicenza, M. (2004), Strumenti statistici avanzati per la gestione della qualità. Affidabilità , FMEA, FTA,SPC,DOE, Franco Angeli, Milano.
-
(2004)
Strumenti Statistici Avanzati per la Gestione della Qualità. Affidabilità, FMEA, FTA,SPC,DOE
-
-
Chiarini, A.1
Vicenza, M.2
-
120
-
-
34247884532
-
Knowledge transfer and organizational learning in IS offshore sourcing
-
Chua, A.L. & Pan, S.L. (2008), "Knowledge transfer and organizational learning in IS offshore sourcing", Omega, Vol. 36 No. 2, pp. 267-81.
-
(2008)
Omega
, vol.36
, Issue.2
, pp. 267-81
-
-
Chua, A.L.1
Pan, S.L.2
-
121
-
-
33747829825
-
A satisficing model of outsourcing
-
DOI 10.1108/13598540610682462
-
De Boer, L., Gaytan, J. & Arroyo, P. (2006), "A satisficing model of outsourcing", Supply Chain Management: An International Journal, Vol. 11 No. 5, pp. 444-55. (Pubitemid 44286261)
-
(2006)
Supply Chain Management
, vol.11
, Issue.5
, pp. 444-455
-
-
De Boer, L.1
Gaytan, J.2
Arroyo, P.3
-
122
-
-
42949108711
-
The impact of international outsourcing on individual employment security: A micro-level analysis
-
Geishecker, I. (2008), "The impact of international outsourcing on individual employment security: a micro-level analysis", Labour Economics, Vol. 15 No. 3, pp. 291-314.
-
(2008)
Labour Economics
, vol.15
, Issue.3
, pp. 291-314
-
-
Geishecker, I.1
-
123
-
-
33847248065
-
When outsourcing is not an option: International relocation of investment bank research - Or isn't it?
-
Grote, M.H. & Täube, F.A. (2007), "When outsourcing is not an option: international relocation of investment bank research - or isn't it?", Journal of International Management, Vol. 13 No. 1, pp. 57-77.
-
(2007)
Journal of International Management
, vol.13
, Issue.1
, pp. 57-77
-
-
Grote, M.H.1
Täube, F.A.2
-
125
-
-
33846004797
-
Offshoring: Dimensions and diffusion of a new business concept
-
Jahns, C., Hartmann, E. & Bals, L. (2006), "Offshoring: dimensions and diffusion of a new business concept", Journal of Purchasing & Supply Management, Vol. 12 No. 4, pp. 218-31.
-
(2006)
Journal of Purchasing & Supply Management
, vol.12
, Issue.4
, pp. 218-31
-
-
Jahns, C.1
Hartmann, E.2
Bals, L.3
-
126
-
-
33847319317
-
International outsourcing of services: A partnership model
-
Kedia, B.L. & Lahiri, S. (2007), "International outsourcing of services: a partnership model", Journal of International Management, Vol. 13 No. 1, pp. 22-37.
-
(2007)
Journal of International Management
, vol.13
, Issue.1
, pp. 22-37
-
-
Kedia, B.L.1
Lahiri, S.2
-
127
-
-
67349164051
-
Understanding offshoring: A research framework based on disintegration, location and externalization advantages
-
Kedia, B.L. & Mukherjee, D. (2008), "Understanding offshoring: a research framework based on disintegration, location and externalization advantages", Journal of World Business, Vol. 44 No. 3, pp. 250-61.
-
(2008)
Journal of World Business
, vol.44
, Issue.3
, pp. 250-61
-
-
Kedia, B.L.1
Mukherjee, D.2
-
128
-
-
33847247477
-
Institutional factors affecting offshore business process and information technology outsourcing
-
Kshetri, N. (2007), "Institutional factors affecting offshore business process and information technology outsourcing", Journal of International Management, Vol. 13 No. 1, pp. 38-56.
-
(2007)
Journal of International Management
, vol.13
, Issue.1
, pp. 38-56
-
-
Kshetri, N.1
-
129
-
-
33750687001
-
Drivers and obstacles of outsourcing practices in China
-
DOI 10.1108/09600030610714599
-
Lau, K.H. & Zhang, J. (2006), "Drivers and obstacles of outsourcing practices in China", International Journal of Physical Distribution & Logistics Management, Vol. 36 No. 10, pp. 776-92. (Pubitemid 44704572)
-
(2006)
International Journal of Physical Distribution and Logistics Management
, vol.36
, Issue.10
, pp. 776-792
-
-
Lau, K.H.1
Zhang, J.2
-
130
-
-
58149362591
-
Security considerations of network outsourcing
-
Leach, J. & Zergo, C.B. (1995), "Security considerations of network outsourcing", Network Security, Vol. 1995 No. 11, pp. 10-14.
-
(1995)
Network Security
, vol.1995
, Issue.11
, pp. 10-14
-
-
Leach, J.1
Zergo, C.B.2
-
131
-
-
0032045325
-
Accounting for endogeneity when assessing strategy performance: Does entry mode choice affect FDI survival?
-
Shaver, J.M. (1998), "Accounting for endogeneity when assessing strategy performance: does entry mode choice affect FDI survival?", Management Science, Vol. 44 No. 4, pp. 571-85. (Pubitemid 128591680)
-
(1998)
Management Science
, vol.44
, Issue.4
, pp. 571-585
-
-
Shaver, J.M.1
-
132
-
-
38949217981
-
Facilitating offshoring with enterprise technologies: Reducing operational friction in the governance and production of services
-
DOI 10.1016/j.jom.2007.02.006, PII S0272696307000460
-
Stratman, J.K. (2008), "Facilitating offshoring with enterprise technologies: reducing operational friction in the governance and production of services", Journal of Operations Management, Vol. 26 No. 2, pp. 275-87. (Pubitemid 351215679)
-
(2008)
Journal of Operations Management
, vol.26
, Issue.2
, pp. 275-287
-
-
Stratman, J.K.1
-
133
-
-
69749110589
-
Outsourcing: Think more expansively
-
Varadarajan, R. (2008), "Outsourcing: think more expansively", Journal of Business Research, Vol. 62 No. 11.
-
(2008)
Journal of Business Research
, vol.62
, Issue.11
-
-
Varadarajan, R.1
-
134
-
-
38949174959
-
Offshoring knowledge and service work: A conceptual model and research agenda
-
DOI 10.1016/j.jom.2007.02.007, PII S0272696307000484
-
Youngdahl, W. & Ramaswamy, K. (2008), "Offshoring knowledge and service work: a conceptual model and research agenda", Journal of Operations Management, Vol. 26 No. 2, pp. 212-21. (Pubitemid 351215681)
-
(2008)
Journal of Operations Management
, vol.26
, Issue.2
, pp. 212-221
-
-
Youngdahl, W.1
Ramaswamy, K.2
|