메뉴 건너뛰기




Volumn 112, Issue 3, 2012, Pages 405-440

Security risks in service offshoring and outsourcing

Author keywords

Data security; Failure mode and effect analysis; Knowledge management; Offshoring; Outsourcing; Security risks; Service industries

Indexed keywords

CORE ACTIVITY; CORRECTIVE ACTIONS; DATA PROTECTION; DESIGN/METHODOLOGY/APPROACH; FAILURE MODE AND EFFECT ANALYSIS; MANAGERIAL ASPECTS; MULTINATIONAL COMPANIES; OFF-SHORING; OUTSOURCING PROJECTS; SECURITY FAILURE; SECURITY RISKS; SERVICE INDUSTRIES; SERVICE OUTSOURCING;

EID: 84858228381     PISSN: 02635577     EISSN: None     Source Type: Journal    
DOI: 10.1108/02635571211210059     Document Type: Article
Times cited : (37)

References (134)
  • 1
    • 0034147463 scopus 로고    scopus 로고
    • Outsourcing services: The contract is just the beginning
    • Allen, S. & Chandrashekar, A. (2000), "Outsourcing services: the contract is just the beginning", Business Horizons, Vol. 43 No. 2, pp. 25-34.
    • (2000) Business Horizons , vol.43 , Issue.2 , pp. 25-34
    • Allen, S.1    Chandrashekar, A.2
  • 2
    • 50649092007 scopus 로고    scopus 로고
    • Managing the protection of innovations in knowledge-intensive business services
    • Amara, N., Landry, R. & Traorè, N. (2008), "Managing the protection of innovations in knowledge-intensive business services", Research Policy, Vol. 37 No. 9, pp. 1530-47.
    • (2008) Research Policy , vol.37 , Issue.9 , pp. 1530-47
    • Amara, N.1    Landry, R.2    Traorè, N.3
  • 3
    • 84986146859 scopus 로고
    • Modes of foreign entry: A transaction cost analysis and propositions
    • Anderson, E. & Gatignon, H. (1986), "Modes of foreign entry: a transaction cost analysis and propositions", Journal of International Business Studies, Vol. 17 No. 3, pp. 1-26.
    • (1986) Journal of International Business Studies , vol.17 , Issue.3 , pp. 1-26
    • Anderson, E.1    Gatignon, H.2
  • 4
    • 84858205191 scopus 로고    scopus 로고
    • International protection of trade secrets when using the Internet
    • Apke, T.M. (2003), "International protection of trade secrets when using internet", Management Decision, Vol. 41 No. 1, pp. 43-7. (Pubitemid 36332732)
    • (2003) Management Decision -London then Bradford , vol.41 , Issue.1-2 , pp. 43-47
    • Apke, T.M.1
  • 5
    • 29044432277 scopus 로고    scopus 로고
    • Getting offshoring right
    • Aron, R. & Singh, J.V. (2005), "Getting offshoring right", Harvard Business Review, Vol. 83 No. 12, pp. 135-43. (Pubitemid 41788065)
    • (2005) Harvard Business Review , vol.83 , Issue.12 , pp. 135-143
    • Aron, R.1    Singh, J.V.2
  • 6
    • 0042875722 scopus 로고    scopus 로고
    • The relative effectiveness of patents and secrecy for appropriation
    • DOI 10.1016/S0048-7333(00)00100-1, PII S0048733300001001
    • Arundel, A. (2001), "The relative effectiveness of patents and secrecy for appropriation", Research Policy, Vol. 30 No. 4, pp. 611-24. (Pubitemid 33675447)
    • (2001) Research Policy , vol.30 , Issue.4 , pp. 611-624
    • Arundel, A.1
  • 7
    • 0142166973 scopus 로고    scopus 로고
    • Outsourcing to outmanoeuvre: Outsourcing re-defines competitive strategy and structure
    • Baden-Fuller, C., Targett, D. & Hunt, B. (2000), "Outsourcing to outmanoeuvre: outsourcing re-defines competitive strategy and structure", European Management Journal, Vol. 18 No. 3, pp. 285-95.
    • (2000) European Management Journal , vol.18 , Issue.3 , pp. 285-95
    • Baden-Fuller, C.1    Targett, D.2    Hunt, B.3
  • 8
    • 33744514578 scopus 로고    scopus 로고
    • Outsourcing - The benefits and the risks
    • DOI 10.1016/j.hrmr.2006.03.011, PII S1053482206000234
    • Belcourt, M. (2006), "Outsourcing - the benefits and the risks", Human Resource Management Review, Vol. 16 No. 2, pp. 269-79. (Pubitemid 43811916)
    • (2006) Human Resource Management Review , vol.16 , Issue.2 , pp. 269-279
    • Belcourt, M.1
  • 9
    • 24144458931 scopus 로고    scopus 로고
    • Information systems security from a knowledge management perspective
    • DOI 10.1108/09685220510602013
    • Belsis, P., Kokolakis, S. & Kiountouzis, E. (2005), "Information systems security from a knowledge management perspective", Information Management & Computer Security, Vol. 13 No. 3, pp. 189-202. (Pubitemid 41227074)
    • (2005) Information Management and Computer Security , vol.13 , Issue.3 , pp. 189-202
    • Belsis, P.1    Kokolakis, S.2    Kiountouzis, E.3
  • 10
    • 38949170950 scopus 로고    scopus 로고
    • Is more IT offshoring better?. An exploratory study of western companies offshoring to South East Asia
    • DOI 10.1016/j.jom.2007.02.005, PII S0272696307000459
    • Bhalla, A., Sodhi, M.S. & Son, B. (2008), "Is more IT offshoring better? An exploratory study of western companies offshoring to South East Asia", Journal of Operations Management, Vol. 26 No. 2, pp. 322-35. (Pubitemid 351215678)
    • (2008) Journal of Operations Management , vol.26 , Issue.2 , pp. 322-335
    • Bhalla, A.1    Sodhi, M.S.2    Son, B.-G.3
  • 11
    • 0031843728 scopus 로고    scopus 로고
    • Intellectual property issues in RεtD contracts
    • DOI 10.1016/S1461-5347(98)00033-9, PII S1461534798000339
    • Binns, R. & Driscoll, B. (1998), "Intellectual property issues in R&D contracts", Pharmaceutical Science & Technology Today, Vol. 1 No. 3, pp. 95-9. (Pubitemid 28326330)
    • (1998) Pharmaceutical Science and Technology Today , vol.1 , Issue.3 , pp. 95-99
    • Binns, R.1    Driscoll, B.2
  • 12
    • 77955444113 scopus 로고    scopus 로고
    • Security considerations in outsourcing IT services
    • Blackley, J.A. & Leach, J. (1996), "Security considerations in outsourcing IT services", Information Security Technical Report, Vol. 1 No. 3, pp. 11-17.
    • (1996) Information Security Technical Report , vol.1 , Issue.3 , pp. 11-17
    • Blackley, J.A.1    Leach, J.2
  • 13
    • 11844260645 scopus 로고    scopus 로고
    • Interrelation between patenting and standardisation strategies: Empirical evidence and policy implications
    • DOI 10.1016/j.respol.2004.08.007, PII S0048733304001118
    • Blind, K. & Thumm, N. (2004), "Interrelation between patenting and standardisation strategies: empirical evidence and policy implications", Research Policy, Vol. 33 No. 10, pp. 1583-98. (Pubitemid 40085923)
    • (2004) Research Policy , vol.33 , Issue.10 , pp. 1583-1598
    • Blind, K.1    Thumm, N.2
  • 14
    • 84992969843 scopus 로고    scopus 로고
    • Strategic assessment of outsourcing and downsizing in the service market
    • Blumberg, D.F. (1998), "Strategic assessment of outsourcing and downsizing in the service market", Managing Service Quality, Vol. 8 No. 1, pp. 5-18. (Pubitemid 128023674)
    • (1998) Managing service quality , vol.8 , Issue.1 , pp. 5-18
    • Blumberg, D.F.1
  • 15
    • 49649121953 scopus 로고    scopus 로고
    • An economic modelling approach to information security risk management
    • Bojanc, R. & Jerman-Blazic, B. (2008), "An economic modelling approach to information security risk management", International Journal of Information Management, Vol. 28 No. 5, pp. 413-22.
    • (2008) International Journal of Information Management , vol.28 , Issue.5 , pp. 413-22
    • Bojanc, R.1    Jerman-Blazic, B.2
  • 16
    • 84979835554 scopus 로고    scopus 로고
    • Data protection - Third country transfers. Data transfer to third countries: Standard contractual clauses of the European Commission
    • DOI 10.1016/S0267-3649(02)00510-1, PII S0267364902005101
    • Bond, R.T., Audley, H. & Knyrim, R.S. (2002), "Data protection - third country transfer: data transfer to third countries: standard contractual clauses of the European Commission", Computer Law & Security Report, Vol. 18 No. 3, pp. 187-90. (Pubitemid 34623729)
    • (2002) Computer Law and Security Report , vol.18 , Issue.3 , pp. 187-190
    • Bond, R.T.J.1    Audley, H.2    Knyrim, R.S.3
  • 17
    • 33750024369 scopus 로고    scopus 로고
    • Is outsourcing of intangibles a real source of competitive advantage?
    • Bounfour, A. (1999), "Is outsourcing of intangibles a real source of competitive advantage?", International Journal of Applied Quality Management, Vol. 2 No. 2, pp. 127-51.
    • (1999) International Journal of Applied Quality Management , vol.2 , Issue.2 , pp. 127-51
    • Bounfour, A.1
  • 18
    • 33645885572 scopus 로고    scopus 로고
    • Information security risk management - When should it be managed?
    • Broderick, J.S. (2001), "Information security risk management - when should it be managed?", Information Security Technical Report, Vol. 6 No. 3, pp. 12-18.
    • (2001) Information Security Technical Report , vol.6 , Issue.3 , pp. 12-18
    • Broderick, J.S.1
  • 19
    • 33747040232 scopus 로고    scopus 로고
    • The dynamics of HRM systems in Indian BPO firms
    • DOI 10.1007/s12122-006-1027-7
    • Budhwar, P.S., Luthar, H.K. & Bhatnagar, J. (2006), "The dynamics of HRM systems in Indian BPO firms", Journal of Labor Research, Vol. 27 No. 3, pp. 339-60. (Pubitemid 44213987)
    • (2006) Journal of Labor Research , vol.27 , Issue.3 , pp. 339-360
    • Budhwar, P.S.1    Luthar, H.K.2    Bhatnagar, J.3
  • 21
    • 33746622997 scopus 로고    scopus 로고
    • On security preparations against possible is threats across industries
    • DOI 10.1108/09685220610690817
    • Chang, A.J.-T. & Yeh, Q.-J. (2006), "On security preparations against possible IS threats across industries", Information Management & Computer Security, Vol. 14 No. 4, pp. 343-60. (Pubitemid 44151552)
    • (2006) Information Management and Computer Security , vol.14 , Issue.4 , pp. 343-360
    • Chang, A.J.-T.1    Yeh, Q.-J.2
  • 22
    • 33947392571 scopus 로고    scopus 로고
    • Creating an effective security risk model for outsourcing decisions
    • DOI 10.1007/s10550-007-0011-y
    • Colwill, C. & Gray, A. (2007), "Creating an effective security risk model for outsourcing decisions", BT Technology Journal, Vol. 25 No. 1, pp. 79-87. (Pubitemid 46455703)
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 79-87
    • Colwill, C.1    Gray, A.2
  • 23
    • 27344451131 scopus 로고    scopus 로고
    • IT outsourcing configuration: Research into defining and designing outsourcing arrangements
    • DOI 10.1016/j.jsis.2005.07.001, PII S0963868705000375
    • Cullen, S., Seddon, P.B. & Willcocks, L.P. (2005), "IT outsourcing configuration: research into defining and designing outsourcing arrangements", Journal of Strategic Information Systems, Vol. 14 No. 4, pp. 357-87. (Pubitemid 41525798)
    • (2005) Journal of Strategic Information Systems , vol.14 , Issue.4 , pp. 357-387
    • Cullen, S.1    Seddon, P.B.2    Willcocks, L.P.3
  • 24
    • 40849126698 scopus 로고    scopus 로고
    • Knowledge process outsourcing in financial services: The vendor perspective
    • Currie, W.L., Michell, V. & Abanishe, O. (2008), "Knowledge process outsourcing in financial services: the vendor perspective", European Management Journal, Vol. 26 No. 2, pp. 94-104.
    • (2008) European Management Journal , vol.26 , Issue.2 , pp. 94-104
    • Currie, W.L.1    Michell, V.2    Abanishe, O.3
  • 26
    • 57149139126 scopus 로고    scopus 로고
    • Multi-level information system security in outsourcing domain
    • Doomun, M.R. (2008), "Multi-level information system security in outsourcing domain", Business Process Management Journal, Vol. 14 No. 6, pp. 849-57.
    • (2008) Business Process Management Journal , vol.14 , Issue.6 , pp. 849-57
    • Doomun, M.R.1
  • 27
    • 34247123147 scopus 로고    scopus 로고
    • The Next Wave of Globalization: Relocating Service Provision to India
    • DOI 10.1016/j.worlddev.2006.09.014, PII S0305750X07000113
    • Dossani, R. & Kenney, M. (2007), "The next wave of globalization: relocating service provision to India", World Development, Vol. 35 No. 5, pp. 772-91. (Pubitemid 46586048)
    • (2007) World Development , vol.35 , Issue.5 , pp. 772-791
    • Dossani, R.1    Kenney, M.2
  • 29
    • 38949103697 scopus 로고    scopus 로고
    • Offshore outsourcing of professional services: A transaction cost economics perspective
    • DOI 10.1016/j.jom.2007.02.008, PII S0272696307000502
    • Ellram, L.M., Tate, W.L. & Billington, C. (2008), "Offshore outsourcing of professional services: a transaction cost economics perspective", Journal of Operations Management, Vol. 26 No. 2, pp. 148-63. (Pubitemid 351215683)
    • (2008) Journal of Operations Management , vol.26 , Issue.2 , pp. 148-163
    • Ellram, L.M.1    Tate, W.L.2    Billington, C.3
  • 30
    • 0242328846 scopus 로고    scopus 로고
    • A practical guide to successful outsourcing
    • Embleton, P.R. & Wright, P.C. (1998), "A practical guide to successful outsourcing", Empowerment in Organizations, Vol. 6 No. 3, pp. 94-106.
    • (1998) Empowerment in Organizations , vol.6 , Issue.3 , pp. 94-106
    • Embleton, P.R.1    Wright, P.C.2
  • 31
    • 35548986219 scopus 로고    scopus 로고
    • Information risks management in supply chains: An assessment and mitigation framework
    • Faisal, M.N., Banwet, D.K. & Shankar, R. (2007), "Information risks management in supply chains: an assessment and mitigation framework", Journal of Enterprise Information Management, Vol. 20 No. 6, pp. 677-99.
    • (2007) Journal of Enterprise Information Management , vol.20 , Issue.6 , pp. 677-99
    • Faisal, M.N.1    Banwet, D.K.2    Shankar, R.3
  • 32
    • 84979792294 scopus 로고    scopus 로고
    • IT security outsourcing: How safe is your IT security?
    • DOI 10.1016/S0267-3649(02)03009-1, PII S0267364902030091
    • Fenn, C., Shooter, R. & Allan, K. (2002), "IT security outsourcing: how safe is your IT security?", Computer Law & Security Report, Vol. 18 No. 2, pp. 109-11. (Pubitemid 34249783)
    • (2002) Computer Law and Security Report , vol.18 , Issue.2 , pp. 109-111
    • Fenn, C.1    Shooter, R.2    Allan, K.3
  • 33
    • 0642264602 scopus 로고
    • A security framework for information system outsourcing
    • Fink, D. (1994), "A security framework for information system outsourcing", Information Management & Computer Security, Vol. 2 No. 4, pp. 3-8.
    • (1994) Information Management & Computer Security , vol.2 , Issue.4 , pp. 3-8
    • Fink, D.1
  • 34
    • 28044459683 scopus 로고    scopus 로고
    • Real-time information integrity = system integrity + data integrity + continuous assurances
    • DOI 10.1016/j.cose.2005.08.004, PII S0167404805001458
    • Flowerday, S. & von Solms, R. (2005), "Real-time information integrity-system integritydata integritycontinuous assurances", Computers & Security, Vol. 24 No. 8, pp. 604-13. (Pubitemid 41690973)
    • (2005) Computers and Security , vol.24 , Issue.8 , pp. 604-613
    • Flowerday, S.1    Von Solms, R.2
  • 36
    • 0242265591 scopus 로고    scopus 로고
    • Outsourcing or increasing risks?
    • Frost, C. (2000), "Outsourcing or increasing risks?", Balance Sheet, Vol. 8 No. 2, pp. 34-7.
    • (2000) Balance Sheet , vol.8 , Issue.2 , pp. 34-7
    • Frost, C.1
  • 37
    • 0042363355 scopus 로고    scopus 로고
    • The application of information security policies in large UK-based organizations: An exploratory investigation
    • Fulford, H. & Doherty, N.F. (2003), "The application of information security policies in large UK-based organizations: an exploratory investigation", Information Management & Computer Security, Vol. 11 No. 3, pp. 106-14.
    • (2003) Information Management & Computer Security , vol.11 , Issue.3 , pp. 106-14
    • Fulford, H.1    Doherty, N.F.2
  • 38
    • 53049103408 scopus 로고    scopus 로고
    • Information security requirements - Interpreting the legal aspects
    • Gerber, M. & von Solms, R. (2008), "Information security requirements - interpreting the legal aspects", Computers & Security, Vol. 27 Nos 5/6, pp. 124-35.
    • (2008) Computers & Security , vol.27 , Issue.5-6 , pp. 124-35
    • Gerber, M.1    Von Solms, R.2
  • 39
    • 38949184939 scopus 로고    scopus 로고
    • Business process outsourcing: An approach to gain access to world-class capabilities
    • Ghodeswar, B. & Vaidyanathan, J. (2008), "Business process outsourcing: an approach to gain access to world-class capabilities", Business Process Management Journal, Vol. 14 No. 1, pp. 23-38.
    • (2008) Business Process Management Journal , vol.14 , Issue.1 , pp. 23-38
    • Ghodeswar, B.1    Vaidyanathan, J.2
  • 40
    • 0032156562 scopus 로고    scopus 로고
    • A decision support system for supplier selection using an integrated analytic hierarchy process and linear programming
    • PII S0925527397000091
    • Ghodsypour, S.H. & O'Brien, C. (1998), "A decision support system for supplier selection using an integrated analytic hierarchy process and linear programming", International Journal of Production Economics, Vol. 56 No. 1, pp. 199-212. (Pubitemid 128400944)
    • (1998) International Journal of Production Economics , vol.56-57 , pp. 199-212
    • Ghodsypour, S.H.1    O'Brien, C.2
  • 41
    • 33750032354 scopus 로고    scopus 로고
    • Information systems offshore outsourcing: A descriptive analysis
    • DOI 10.1108/02635570610712555
    • Gonzalez, R., Gasco, J. & Llopis, J. (2006), "Information systems offshore outsourcing: a descriptive analysis", Industrial Management & Data Systems, Vol. 106 No. 9, pp. 1233-48. (Pubitemid 44570976)
    • (2006) Industrial Management and Data Systems , vol.106 , Issue.9 , pp. 1233-1248
    • Gonzalez, R.1    Gasco, J.2    Llopis, J.3
  • 42
    • 22144493283 scopus 로고    scopus 로고
    • The outsourcing of IT-enabled business processes: A conceptual model of the location decision
    • DOI 10.1016/j.intman.2005.03.010, PII S1075425305000190
    • Graf, M. & Mudambi, S.M. (2005), "The outsourcing of IT-enabled business processes: a conceptual model of the location decision", Journal of International Management, Vol. 11 No. 2, pp. 253-68. (Pubitemid 40984487)
    • (2005) Journal of International Management , vol.11 , Issue.SPEC. ISS. , pp. 253-268
    • Graf, M.1    Mudambi, S.M.2
  • 43
    • 24144453387 scopus 로고    scopus 로고
    • Information systems security issues and decisions for small businesses: An empirical examination
    • DOI 10.1108/09685220510614425
    • Gupta, A. & Hammond, R. (2005), "Information systems security issues and decisions for small businesses: an empirical examination", Information Management & Computer Security, Vol. 13 No. 4, pp. 297-310. (Pubitemid 41227070)
    • (2005) Information Management and Computer Security , vol.13 , Issue.4 , pp. 297-310
    • Gupta, A.1    Hammond, R.2
  • 44
    • 54949146918 scopus 로고    scopus 로고
    • Implementation and effectiveness of organizational information security measures
    • Hagen, J.M., Albrechsten, E. & Hovden, J. (2008), "Implementation and effectiveness of organizational information security measures", Information Management & Computer Security, Vol. 16 No. 4, pp. 377-97.
    • (2008) Information Management & Computer Security , vol.16 , Issue.4 , pp. 377-97
    • Hagen, J.M.1    Albrechsten, E.2    Hovden, J.3
  • 45
    • 0032620195 scopus 로고    scopus 로고
    • Identifying and controlling computer crime and employee fraud
    • Haugen, S. & Roger Selin, J. (1999), "Identifying and controlling computer crime and employee fraud", Industrial Management & Data Systems, Vol. 99 No. 8, pp. 340-4. (Pubitemid 129303896)
    • (1999) Industrial Management and Data Systems , vol.99 , Issue.8 , pp. 340-344
    • Haugen, S.1    Selin, J.R.2
  • 46
    • 0041482688 scopus 로고    scopus 로고
    • Corporate system security: Towards an integrated management approach
    • Higgins, H.N. (1999), "Corporate system security: towards an integrated management approach", Information Management & Computer Security, Vol. 7 No. 5, pp. 217-22. (Pubitemid 129654356)
    • (1999) Information Management and Computer Security , vol.7 , Issue.5 , pp. 217-222
    • Higgins, H.N.1
  • 47
    • 0037228072 scopus 로고    scopus 로고
    • The law, cybercrime, risk assessment and cyber protection
    • Hinde, S. (2003), "The law, cybercrime, risk assessment and cyber protection", Computers & Security, Vol. 22 No. 2, pp. 90-5.
    • (2003) Computers & Security , vol.22 , Issue.2 , pp. 90-5
    • Hinde, S.1
  • 48
    • 33747460356 scopus 로고    scopus 로고
    • Outsourcing, information leakage and the risk of losing technology-based competencies
    • DOI 10.1108/09555340610686967
    • Hoecht, A. & Trott, P. (2006), "Outsourcing, information leakage and the risk of losing technology-based competencies", European Business Review, Vol. 18 No. 5, pp. 395-412. (Pubitemid 44259719)
    • (2006) European Business Review , vol.18 , Issue.5 , pp. 395-412
    • Hoecht, A.1    Trott, P.2
  • 49
    • 70350717638 scopus 로고    scopus 로고
    • Redefining the paradigm of global competition: Offshoring of service firms
    • Jagersma, P.K. & Gorp, D.M.V. (2007), "Redefining the paradigm of global competition: offshoring of service firms", Business Strategy Series, Vol. 8 No. 1, pp. 35-42.
    • (2007) Business Strategy Series , vol.8 , Issue.1 , pp. 35-42
    • Jagersma, P.K.1    Gorp, D.M.V.2
  • 50
    • 85088338113 scopus 로고    scopus 로고
    • De facto property right protection and MNC location choices
    • Jandhyala, S. (2008), "De facto property right protection and MNC location choices", Academy of Management Proceedings, pp. 1-6.
    • (2008) Academy of Management Proceedings , pp. 1-6
    • Jandhyala, S.1
  • 51
    • 0942280366 scopus 로고    scopus 로고
    • The composition of foreign direct investment and protection of intellectual property rights: Evidence from transition economies
    • Javorcik, B.S. (2004), "The composition of foreign direct investment and protection of intellectual property rights: evidence from transition economies", European Economic Review, Vol. 48 No. 1, pp. 39-62.
    • (2004) European Economic Review , vol.48 , Issue.1 , pp. 39-62
    • Javorcik, B.S.1
  • 52
    • 84986019329 scopus 로고    scopus 로고
    • Critical review - Outsourcing: A paradigm shift
    • Kakabadse, N. & Kakabadse, A. (2000), "Critical review - outsourcing: a paradigm shift", Journal of Management Development, Vol. 19 No. 8, pp. 670-728.
    • (2000) Journal of Management Development , vol.19 , Issue.8 , pp. 670-728
    • Kakabadse, N.1    Kakabadse, A.2
  • 55
    • 33749496395 scopus 로고    scopus 로고
    • A framework for outsourcing IS/IT security services
    • DOI 10.1108/09685220610707421
    • Karyda, M., Mitrou, E. & Quirchmayr, G. (2006), "A framework for outsourcing IS/IT security services", Information Management & Computer Security, Vol. 14 No. 5, pp. 402-15. (Pubitemid 44515714)
    • (2006) Information Management and Computer Security , vol.14 , Issue.5 , pp. 402-415
    • Karyda, M.1    Mitrou, E.2    Quirchmayr, G.3
  • 56
    • 84979796965 scopus 로고    scopus 로고
    • Outsourcing to China - Risks and benefit
    • Kennedy, G. & Clark, D. (2006), "Outsourcing to China - risks and benefit", Computer Law & Security Report, Vol. 22 No. 3, pp. 250-3.
    • (2006) Computer Law & Security Report , vol.22 , Issue.3 , pp. 250-3
    • Kennedy, G.1    Clark, D.2
  • 57
    • 1242265180 scopus 로고    scopus 로고
    • Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors
    • Khalfan, A.M. (2004), "Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors", International Journal of Information Management, Vol. 24 No. 1, pp. 29-42.
    • (2004) International Journal of Information Management , vol.24 , Issue.1 , pp. 29-42
    • Khalfan, A.M.1
  • 58
    • 67349147567 scopus 로고    scopus 로고
    • Global outsourcing of back office services: Lessons, trends, and enduring challenges
    • Lacity, M.C., Willcocks, L.P. & Rottman, J.W. (2008), "Global outsourcing of back office services: lessons, trends, and enduring challenges", Strategic Outsourcing: An International Journal, Vol. 1 No. 1, pp. 13-34.
    • (2008) Strategic Outsourcing: An International Journal , vol.1 , Issue.1 , pp. 13-34
    • Lacity, M.C.1    Willcocks, L.P.2    Rottman, J.W.3
  • 59
    • 0030378916 scopus 로고    scopus 로고
    • IT outsourcing contracts: Practical issues for management
    • Lee, K.O. (1996), "IT outsourcing contracts: practical issues for management", Industrial Management & Data Systems, Vol. 96 No. 1, pp. 15-20.
    • (1996) Industrial Management & Data Systems , vol.96 , Issue.1 , pp. 15-20
    • Lee, K.O.1
  • 60
    • 0346330115 scopus 로고    scopus 로고
    • Development of certification and audit processes of application service provider for IT outsourcing
    • Leem, C.S. & Lee, H.J. (2004), "Development of certification and audit processes of application service provider for IT outsourcing", Technovation, Vol. 24 No. 1, pp. 63-71.
    • (2004) Technovation , vol.24 , Issue.1 , pp. 63-71
    • Leem, C.S.1    Lee, H.J.2
  • 61
    • 33750961813 scopus 로고    scopus 로고
    • Offshoring Work: Business Hype or the Onset of Fundamental Transformation?
    • DOI 10.1016/j.lrp.2006.07.009, PII S0024630106000586
    • Lewin, A.Y. & Peeters, C. (2006), "Offshoring work: business hype or the onset of fundamental transformation?", Long Range Planning, Vol. 39 No. 3, pp. 221-39. (Pubitemid 44734577)
    • (2006) Long Range Planning , vol.39 , Issue.3 , pp. 221-239
    • Lewin, A.Y.1    Peeters, C.2
  • 62
    • 20344396669 scopus 로고    scopus 로고
    • The voting analytic hierarchy process method for selecting supplier
    • DOI 10.1016/j.ijpe.2004.09.005, PII S0925527304003263
    • Liu, F. & Hai, H.L. (2005), "The voting analytic hierarchy process method for selecting supplier", International Journal of Production Economics, Vol. 97 No. 3, pp. 308-17. (Pubitemid 40788676)
    • (2005) International Journal of Production Economics , vol.97 , Issue.3 , pp. 308-317
    • Liu, F.-H.F.1    Hai, H.L.2
  • 63
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality yesterday's understanding
    • Loch, K.D., Carr, H.H. & Warkentin, M.E. (1992), "Threats to information systems: today's reality yesterday's understanding", MIS Quarterly, Vol. 16 No. 2, pp. 173-86.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-86
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 65
    • 0009886038 scopus 로고    scopus 로고
    • An unconventional approach to intellectual property protection: The case of an Australian firm transferring shipbuilding technologies to China
    • McGaughey, S.L., Liesch, P.W. & Poulson, D. (2000), "An unconventional approach to intellectual property protection: the case of an Australian firm transferring shipbuilding technologies to China", Journal of World Business, Vol. 35 No. 1, pp. 1-20.
    • (2000) Journal of World Business , vol.35 , Issue.1 , pp. 1-20
    • McGaughey, S.L.1    Liesch, P.W.2    Poulson, D.3
  • 66
    • 49249127269 scopus 로고    scopus 로고
    • Information security management objectives and practices: A parsimonious framework
    • Ma, Q., Johnston, A.C. & Michael Pearson, J. (2008), "Information security management objectives and practices: a parsimonious framework", Information Management & Computer Security, Vol. 16 No. 3, pp. 251-70.
    • (2008) Information Management & Computer Security , vol.16 , Issue.3 , pp. 251-70
    • Ma, Q.1    Johnston, A.C.2    Michael Pearson, J.3
  • 67
    • 43449091922 scopus 로고    scopus 로고
    • Offshore middlemen: Transnational intermediation in technology sourcing
    • Mahnke, V., Wareham, J. & Bjorn-Andersen, N. (2008), "Offshore middlemen: transnational intermediation in technology sourcing", Journal of Information Technology, No. 23, pp. 18-30.
    • (2008) Journal of Information Technology , Issue.23 , pp. 18-30
    • Mahnke, V.1    Wareham, J.2    Bjorn-Andersen, N.3
  • 68
    • 55349093310 scopus 로고    scopus 로고
    • A dynamic perspective on next-generation offshoring: The global sourcing of science and engineering talent
    • Manning, S., Massini, S. & Lewin, A.Y. (2008), "A dynamic perspective on next-generation offshoring: the global sourcing of science and engineering talent", Academy of Management Perspectives, Vol. 22 No. 3, pp. 35-54.
    • (2008) Academy of Management Perspectives , vol.22 , Issue.3 , pp. 35-54
    • Manning, S.1    Massini, S.2    Lewin, A.Y.3
  • 69
    • 84993026067 scopus 로고    scopus 로고
    • Business process outsourcing: A new test of management competence
    • May, A.S. (1998), "Business process outsourcing: a new test of management competence", Career Development International, Vol. 3 No. 4, pp. 136-41. (Pubitemid 128129767)
    • (1998) Career development international , vol.3 , Issue.4 , pp. 136-141
    • May, A.S.1
  • 70
    • 38949109595 scopus 로고    scopus 로고
    • A typology of offshoring and outsourcing in electronically transmitted services
    • DOI 10.1016/j.jom.2007.02.004, PII S0272696307000447
    • Metters, R. (2008), "A typology of offshoring and outsourcing in electronically transmitted services", Journal of Operations Management, Vol. 26 No. 2, pp. 198-211. (Pubitemid 351215677)
    • (2008) Journal of Operations Management , vol.26 , Issue.2 , pp. 198-211
    • Metters, R.1
  • 72
    • 32144446458 scopus 로고    scopus 로고
    • The internationalization of local manufacturing systems: Evidence from the Italian chair district
    • DOI 10.1080/09537280500110912, PII M4712438021
    • Nassimbeni, G. & Sartor, M. (2005), "The internationalisation of local manufacturing systems: evidences from the Italian chair district", Production Planning & Control, Vol. 16 No. 5, pp. 470-8. (Pubitemid 43203732)
    • (2005) Production Planning and Control , vol.16 , Issue.5 , pp. 470-478
    • Nassimbeni, G.1    Sartor, M.2
  • 73
    • 33746811797 scopus 로고    scopus 로고
    • International purchasing offices in China
    • DOI 10.1080/09537280600768239, PII N47Q63G050001550
    • Nassimbeni, G. & Sartor, M. (2006), "International purchasing offices in China", Production Planning & Control, Vol. 17 No. 5, pp. 494-507. (Pubitemid 44180276)
    • (2006) Production Planning and Control , vol.17 , Issue.5 , pp. 494-507
    • Nassimbeni, G.1    Sartor, M.2
  • 74
    • 34047169861 scopus 로고    scopus 로고
    • Sourcing in China: A typology
    • DOI 10.1016/j.ijpe.2006.09.011, PII S0925527306002453
    • Nassimbeni, G. & Sartor, M. (2007), "Sourcing in China: a typology", International Journal of Production Economics, Vol. 107 No. 2, pp. 333-49. (Pubitemid 46528161)
    • (2007) International Journal of Production Economics , vol.107 , Issue.2 , pp. 333-349
    • Nassimbeni, G.1    Sartor, M.2
  • 75
    • 33747338767 scopus 로고    scopus 로고
    • Transaction costs and control of outsourced accounting: Case evidence from India
    • DOI 10.1016/j.mar.2006.05.002, PII S104450050600031X
    • Nicholson, B., Jones, J. & Espenlaub, S. (2006), "Transaction costs and control of outsourced accounting: case evidence from India", Management Accounting Research, Vol. 17 No. 3, pp. 238-58. (Pubitemid 44241757)
    • (2006) Management Accounting Research , vol.17 , Issue.3 , pp. 238-258
    • Nicholson, B.1    Jones, J.2    Espenlaub, S.3
  • 76
    • 0041370064 scopus 로고    scopus 로고
    • Are your secrets safe? Knowledge protection in strategic alliances
    • DOI 10.1016/S0007-6813(01)80073-2, PII S0007681301800732
    • Norman, P.M. (2001), "Are your secrets safe? Knowledge protection in strategic alliances", Business Horizons, Vol. 44 No. 6, pp. 51-60. (Pubitemid 33618061)
    • (2001) Business Horizons , vol.44 , Issue.6 , pp. 51-60
    • Norman, P.M.1
  • 78
    • 0000335439 scopus 로고    scopus 로고
    • Institutional environment and the mechanisms of governance: The impact of intellectual property protection on the structure of inter-firm alliances
    • Oxley, J.E. (1999), "Institutional environment and the mechanisms of governance: the impact of intellectual property protection on the structure of inter-firm alliances", Journal of Economic Behaviour and Organization, Vol. 38 No. 3, pp. 283-309.
    • (1999) Journal of Economic Behaviour and Organization , vol.38 , Issue.3 , pp. 283-309
    • Oxley, J.E.1
  • 79
    • 33846947128 scopus 로고    scopus 로고
    • Offshore technology outsourcing: Overview of management and legal issues
    • Pai, A.K. & Basu, S. (2007), "Offshore technology outsourcing: overview of management and legal issues", Business Process Management Journal, Vol. 13 No. 1, pp. 21-46.
    • (2007) Business Process Management Journal , vol.13 , Issue.1 , pp. 21-46
    • Pai, A.K.1    Basu, S.2
  • 80
    • 84858230908 scopus 로고    scopus 로고
    • The risk of allowing outside staff access to your information system
    • Peltier, T. & Edison, D. (1996), "The risk of allowing outside staff access to your information system", Information Security Technical Report, Vol. 1 No. 3, pp. 18-28.
    • (1996) Information Security Technical Report , vol.1 , Issue.3 , pp. 18-28
    • Peltier, T.1    Edison, D.2
  • 81
    • 18444396129 scopus 로고    scopus 로고
    • Transferring business and support functions: The information security risks of outsourcing and off-shoring
    • DOI 10.1016/S1361-3723(05)70183-4, PII S1361372305701834
    • Pemble, M. (2004), "Transferring business and support functions: the information security risks of outsourcing and off-shoring: (a beginner's guide to avoiding the abrogation of responsibility)", Computer Fraud & Security, Vol. 2004 No. 12, pp. 5-9. (Pubitemid 40642777)
    • (2004) Computer Fraud and Security , vol.2004 , Issue.12 , pp. 5-9
    • Pemble, M.1
  • 82
    • 84858205218 scopus 로고    scopus 로고
    • Security service level agreements for outsourced security functions
    • Pepper, B. (1996), "Security service level agreements for outsourced security functions", Information Security Technical Report, Vol. 1 No. 3, pp. 48-50.
    • (1996) Information Security Technical Report , vol.1 , Issue.3 , pp. 48-50
    • Pepper, B.1
  • 83
    • 36348935112 scopus 로고    scopus 로고
    • Defining the most desirable outsourcing contract between customer and vendor
    • Platz, L.A. & Temponi, C. (2007), "Defining the most desirable outsourcing contract between customer and vendor", Management Decision, Vol. 45 No. 10, pp. 1656-66.
    • (2007) Management Decision , vol.45 , Issue.10 , pp. 1656-66
    • Platz, L.A.1    Temponi, C.2
  • 84
    • 10644289334 scopus 로고    scopus 로고
    • A framework for the governance of information security
    • Posthumus, S. & von Solms, R. (2004), "A framework for the governance of information security", Computers & Security, Vol. 23 No. 8, pp. 638-46.
    • (2004) Computers & Security , vol.23 , Issue.8 , pp. 638-46
    • Posthumus, S.1    Von Solms, R.2
  • 87
    • 33749388479 scopus 로고    scopus 로고
    • Cooperation and opportunistic behaviour in transformational outsourcing
    • DOI 10.1108/03684920610675058, Systems, Cybernetics and Innovations
    • Rebernik, M. & Bradac, B. (2006), "Cooperation and opportunistic behaviour in transformational outsourcing", Kybernetes, Vol. 35 Nos 7/8, pp. 1005-13. (Pubitemid 44503328)
    • (2006) Kybernetes , vol.35 , Issue.7-8 , pp. 1005-1013
    • Rebernik, M.1    Bradac, B.2
  • 89
    • 84993111723 scopus 로고    scopus 로고
    • A quantitative approach to the outsourcing-insourcing decision in an international context
    • DOI 10.1108/00251740410555461
    • Schniederjans, M.J. & Zuckweiler, K.M. (2004), "A quantitative approach to the outsourcing-insourcing decision in an international context", Management Decision, Vol. 42 No. 8, pp. 974-86. (Pubitemid 39320028)
    • (2004) Management Decision -London then Bradford , vol.42 , Issue.8 , pp. 974-986
    • Schniederjans, M.J.1    Zuckweiler, K.M.2
  • 90
    • 0036883502 scopus 로고    scopus 로고
    • FMEA methodology design, implementation and integration with HACCP system in a food company
    • DOI 10.1016/S0956-7135(02)00029-4, PII S0956713502000294
    • Scipioni, A., Saccarola, G., Centazzo, A. & Arena, F. (2002), "FMEA methodology design, implementation and integration with HACCP system in a food company", Food Control, Vol. 13 No. 8, pp. 495-501. (Pubitemid 35252335)
    • (2002) Food Control , vol.13 , Issue.8 , pp. 495-501
    • Scipioni, A.1    Saccarola, G.2    Centazzo, A.3    Arena, F.4
  • 91
    • 54249106837 scopus 로고    scopus 로고
    • Failure mode and effects analysis (FMEA) in the context of risk management in new product development: A case study in an automotive company
    • Segismundo, A. & Cauchick, A. (2008), "Failure mode and effects analysis (FMEA) in the context of risk management in new product development: a case study in an automotive company", International Journal of Quality & Reliability Management, Vol. 25 No. 9, pp. 899-912.
    • (2008) International Journal of Quality & Reliability Management , vol.25 , Issue.9 , pp. 899-912
    • Segismundo, A.1    Cauchick, A.2
  • 92
    • 33646755488 scopus 로고    scopus 로고
    • From business process outsourcing (BPO) to knowledge process outsourcing (KPO): Some issues
    • Sen, F. & Shiel, M. (2006), "From business process outsourcing (BPO) to knowledge process outsourcing (KPO): some issues", Human Systems Management, Vol. 25 No. 2, pp. 145-55.
    • (2006) Human Systems Management , vol.25 , Issue.2 , pp. 145-55
    • Sen, F.1    Shiel, M.2
  • 93
    • 0031337118 scopus 로고    scopus 로고
    • Managing security for outsourcing contracts
    • Sherwood, J. (1997), "Managing security for outsourcing contracts", Computers & Security, Vol. 16 No. 7, pp. 603-9.
    • (1997) Computers & Security , vol.16 , Issue.7 , pp. 603-9
    • Sherwood, J.1
  • 95
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M.T. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 96
    • 33947403085 scopus 로고    scopus 로고
    • Intellectual property rights
    • Spinello, R.A. (2007), "Intellectual property rights", Library Hi Tech, Vol. 25 No. 1, pp. 12-22.
    • (2007) Library Hi Tech , vol.25 , Issue.1 , pp. 12-22
    • Spinello, R.A.1
  • 97
    • 0242453511 scopus 로고
    • Promoting security awareness and commitment
    • Spurling, P. (1995), "Promoting security awareness and commitment", Information Management & Computer Security, Vol. 3 No. 2, pp. 20-6.
    • (1995) Information Management & Computer Security , vol.3 , Issue.2 , pp. 20-6
    • Spurling, P.1
  • 99
    • 33751204437 scopus 로고    scopus 로고
    • Ensuring consistent security implementation within a distributed and federated environment
    • DOI 10.1016/S1361-3723(06)70441-9, PII S1361372306704419
    • Stephenson, P. (2006), "Ensuring consistent security implementation within a distributed and federated environment", Computers & Security, Vol. 2006 No. 11, pp. 12-14. (Pubitemid 44792512)
    • (2006) Computer Fraud and Security , vol.2006 , Issue.11 , pp. 12-14
    • Stephenson, P.1
  • 101
    • 38949112456 scopus 로고    scopus 로고
    • Invisible costs in offshoring services work
    • DOI 10.1016/j.jom.2007.02.009, PII S0272696307000514
    • Stringfellow, A., Teagarden, M.B. & Nie, W. (2008), "Invisible costs in offshoring services work", Journal of Operations Management, Vol. 26 No. 2, pp. 164-79. (Pubitemid 351217085)
    • (2008) Journal of Operations Management , vol.26 , Issue.2 , pp. 164-179
    • Stringfellow, A.1    Teagarden, M.B.2    Nie, W.3
  • 102
    • 20444500877 scopus 로고    scopus 로고
    • Risks factors associated with offshore IT outsourcing
    • DOI 10.1108/02635570510599940
    • Tafti, M.H.A. (2005), "Risks factors associated with offshore IT outsourcing", Industrial Management & Data Systems, Vol. 105 No. 5, pp. 549-60. (Pubitemid 40822003)
    • (2005) Industrial Management and Data Systems , vol.105 , Issue.5 , pp. 549-560
    • Tafti, M.H.A.1
  • 103
    • 39449093331 scopus 로고    scopus 로고
    • United by a common language? Trade union responses in the UK and India to call centre offshoring
    • Taylor, P. & Bain, P. (2008), "United by a common language? Trade union responses in the UK and India to call centre offshoring", Antipode, Vol. 40 No. 1, pp. 131-54.
    • (2008) Antipode , vol.40 , Issue.1 , pp. 131-54
    • Taylor, P.1    Bain, P.2
  • 104
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • Thomson, M.E. & von Solms, R. (1998), "Information security awareness: educating your users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73. (Pubitemid 128623423)
    • (1998) Information Management and Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2
  • 105
    • 0036798584 scopus 로고    scopus 로고
    • Data integrity assurance in a layered security strategy
    • Tickle, I. (2002), "Data integrity assurance in a layered security strategy", Computer Fraud & Security, Vol. 2002 No. 10, pp. 9-13.
    • (2002) Computer Fraud & Security , vol.2002 , Issue.10 , pp. 9-13
    • Tickle, I.1
  • 106
    • 0036432756 scopus 로고    scopus 로고
    • Security of personal data across national borders
    • DOI 10.1108/09685220210446588
    • Tran, E. & Atkinson, M. (2002), "Security of personal data across national borders", Information Management & Computer Security, Vol. 10 No. 5, pp. 237-41. (Pubitemid 35359381)
    • (2002) Information Management and Computer Security , vol.10 , Issue.5 , pp. 237-241
    • Tran, E.1    Atkinson, M.2
  • 107
    • 0031325337 scopus 로고    scopus 로고
    • How MNCs choose entry modes and form alliances: The China experience
    • Tse, D.K., Pan, Y. & Au, K.Y. (1997), "How MNCs choose entry modes and form alliances: the China experience", Journal of International Business Studies, Vol. 28 No. 4, pp. 779-805. (Pubitemid 127360717)
    • (1997) Journal of International Business Studies , vol.28 , Issue.4 , pp. 779-805
    • Tse, D.K.1    Pan, Y.2    Au, K.Y.3
  • 108
    • 3242687828 scopus 로고    scopus 로고
    • Product-driven supply chain selection using integrated multi-criteria decision-making methodology
    • Wang, G., Huang, S.H. & Dismukes, J.P. (2004), "Product-driven supply chain selection using integrated multi-criteria decision-making methodology", International Journal of Production Economics, Vol. 91 No. 1, pp. 1-15.
    • (2004) International Journal of Production Economics , vol.91 , Issue.1 , pp. 1-15
    • Wang, G.1    Huang, S.H.2    Dismukes, J.P.3
  • 109
    • 84979842352 scopus 로고    scopus 로고
    • Outsourcing - Financial Services Authority report on offshoring
    • DOI 10.1016/j.clsr.2005.08.008, PII S0267364905001512
    • Wright, T. (2005), "Outsourcing - financial services authority report on offshoring", Computer Law & Security Report, Vol. 21 No. 6, pp. 500-4. (Pubitemid 41642016)
    • (2005) Computer Law and Security Report , vol.21 , Issue.6 , pp. 500-504
    • Wright, T.1
  • 110
    • 22944455911 scopus 로고    scopus 로고
    • Culture matters to multinationals' intellectual property businesses
    • DOI 10.1016/j.jwb.2005.05.005, PII S1090951605000337
    • Yang, D. (2005), "Culture matters to multinationals' intellectual property businesses", Journal of World Business, Vol. 40 No. 3, pp. 281-301. (Pubitemid 41051956)
    • (2005) Journal of World Business , vol.40 , Issue.3 , pp. 281-301
    • Yang, D.1
  • 111
    • 38949089272 scopus 로고    scopus 로고
    • Effective strategies for internal outsourcing and offshoring of business services: An empirical investigation
    • DOI 10.1016/j.jom.2007.02.003, PII S0272696307000435
    • Zeynep, A. & Masini, A. (2008), "Effective strategies for internal outsourcing and offshoring of business services: an empirical investigation", Journal of Operations Management, Vol. 26 No. 2, pp. 239-56. (Pubitemid 351215676)
    • (2008) Journal of Operations Management , vol.26 , Issue.2 , pp. 239-256
    • Zeynep Aksin, O.1    Masini, A.2
  • 112
    • 84986079225 scopus 로고    scopus 로고
    • Outsourcing - a strategic move: the process and the ingredients for success
    • DOI 10.1108/EUM0000000005473
    • Zhu, Z., Hsu, K. & Lillie, J. (2001), "Outsourcing - a strategic move: the process and the ingredients for success", Management Decision, Vol. 39 No. 5, pp. 373-8. (Pubitemid 33299584)
    • (2001) Management Decision , vol.39 , Issue.5-6 , pp. 373-378
    • Zhu, Z.1    Hsu, K.2    Lillie, J.3
  • 114
    • 10144232763 scopus 로고    scopus 로고
    • Validating measures of information technology outsourcing risk factors
    • DOI 10.1016/j.omega.2004.04.003, PII S0305048304000635
    • Bahli, B. & Rivard, S. (2005), "Validating measures of information technology outsourcing risk factors", Omega, Vol. 33 No. 2, pp. 175-87. (Pubitemid 39615362)
    • (2005) Omega , vol.33 , Issue.2 , pp. 175-187
    • Bahli, B.1    Rivard, S.2
  • 115
    • 42049104143 scopus 로고    scopus 로고
    • Multinational investment and host country development: Location efficiencies for services offshoring
    • Bunyaratavej, K., Hahn, E.D. & Doh, J.P. (2008), "Multinational investment and host country development: location efficiencies for services offshoring", Journal of World Business, Vol. 43 No. 2, pp. 227-42.
    • (2008) Journal of World Business , vol.43 , Issue.2 , pp. 227-42
    • Bunyaratavej, K.1    Hahn, E.D.2    Doh, J.P.3
  • 116
    • 84993054455 scopus 로고    scopus 로고
    • Offshoring: Secure or open to the praying mantis?", Strategic Outsourcing: Secure
    • Burns, B. (2008), "Offshoring: secure or open to the praying mantis?", Strategic Outsourcing: An International Journal, Vol. 1 No. 1, pp. 77-86.
    • (2008) An International Journal , vol.1 , Issue.1 , pp. 77-86
    • Burns, B.1
  • 117
    • 34848815664 scopus 로고    scopus 로고
    • Why 'nearshore' means that distance matters
    • DOI 10.1145/1290958.1290959, 1290959
    • Carmel, E. & Abbott, P. (2007), "Why 'nearshore' means that distance matters", Communications of the ACM, Vol. 50 No. 10, pp. 40-6. (Pubitemid 47504997)
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 40-46
    • Carmel, E.1    Abbott, P.2
  • 118
    • 33646715932 scopus 로고    scopus 로고
    • IT-driven offshoring: The exaggerated 'development opportunity'
    • Chandrasekhar, C.P. & Jayati, G. (2006), "IT-driven offshoring: the exaggerated 'development opportunity'", Human Systems Management, Vol. 25 No. 2, pp. 91-101.
    • (2006) Human Systems Management , vol.25 , Issue.2 , pp. 91-101
    • Chandrasekhar, C.P.1    Jayati, G.2
  • 120
    • 34247884532 scopus 로고    scopus 로고
    • Knowledge transfer and organizational learning in IS offshore sourcing
    • Chua, A.L. & Pan, S.L. (2008), "Knowledge transfer and organizational learning in IS offshore sourcing", Omega, Vol. 36 No. 2, pp. 267-81.
    • (2008) Omega , vol.36 , Issue.2 , pp. 267-81
    • Chua, A.L.1    Pan, S.L.2
  • 121
    • 33747829825 scopus 로고    scopus 로고
    • A satisficing model of outsourcing
    • DOI 10.1108/13598540610682462
    • De Boer, L., Gaytan, J. & Arroyo, P. (2006), "A satisficing model of outsourcing", Supply Chain Management: An International Journal, Vol. 11 No. 5, pp. 444-55. (Pubitemid 44286261)
    • (2006) Supply Chain Management , vol.11 , Issue.5 , pp. 444-455
    • De Boer, L.1    Gaytan, J.2    Arroyo, P.3
  • 122
    • 42949108711 scopus 로고    scopus 로고
    • The impact of international outsourcing on individual employment security: A micro-level analysis
    • Geishecker, I. (2008), "The impact of international outsourcing on individual employment security: a micro-level analysis", Labour Economics, Vol. 15 No. 3, pp. 291-314.
    • (2008) Labour Economics , vol.15 , Issue.3 , pp. 291-314
    • Geishecker, I.1
  • 123
    • 33847248065 scopus 로고    scopus 로고
    • When outsourcing is not an option: International relocation of investment bank research - Or isn't it?
    • Grote, M.H. & Täube, F.A. (2007), "When outsourcing is not an option: international relocation of investment bank research - or isn't it?", Journal of International Management, Vol. 13 No. 1, pp. 57-77.
    • (2007) Journal of International Management , vol.13 , Issue.1 , pp. 57-77
    • Grote, M.H.1    Täube, F.A.2
  • 125
    • 33846004797 scopus 로고    scopus 로고
    • Offshoring: Dimensions and diffusion of a new business concept
    • Jahns, C., Hartmann, E. & Bals, L. (2006), "Offshoring: dimensions and diffusion of a new business concept", Journal of Purchasing & Supply Management, Vol. 12 No. 4, pp. 218-31.
    • (2006) Journal of Purchasing & Supply Management , vol.12 , Issue.4 , pp. 218-31
    • Jahns, C.1    Hartmann, E.2    Bals, L.3
  • 126
    • 33847319317 scopus 로고    scopus 로고
    • International outsourcing of services: A partnership model
    • Kedia, B.L. & Lahiri, S. (2007), "International outsourcing of services: a partnership model", Journal of International Management, Vol. 13 No. 1, pp. 22-37.
    • (2007) Journal of International Management , vol.13 , Issue.1 , pp. 22-37
    • Kedia, B.L.1    Lahiri, S.2
  • 127
    • 67349164051 scopus 로고    scopus 로고
    • Understanding offshoring: A research framework based on disintegration, location and externalization advantages
    • Kedia, B.L. & Mukherjee, D. (2008), "Understanding offshoring: a research framework based on disintegration, location and externalization advantages", Journal of World Business, Vol. 44 No. 3, pp. 250-61.
    • (2008) Journal of World Business , vol.44 , Issue.3 , pp. 250-61
    • Kedia, B.L.1    Mukherjee, D.2
  • 128
    • 33847247477 scopus 로고    scopus 로고
    • Institutional factors affecting offshore business process and information technology outsourcing
    • Kshetri, N. (2007), "Institutional factors affecting offshore business process and information technology outsourcing", Journal of International Management, Vol. 13 No. 1, pp. 38-56.
    • (2007) Journal of International Management , vol.13 , Issue.1 , pp. 38-56
    • Kshetri, N.1
  • 130
    • 58149362591 scopus 로고
    • Security considerations of network outsourcing
    • Leach, J. & Zergo, C.B. (1995), "Security considerations of network outsourcing", Network Security, Vol. 1995 No. 11, pp. 10-14.
    • (1995) Network Security , vol.1995 , Issue.11 , pp. 10-14
    • Leach, J.1    Zergo, C.B.2
  • 131
    • 0032045325 scopus 로고    scopus 로고
    • Accounting for endogeneity when assessing strategy performance: Does entry mode choice affect FDI survival?
    • Shaver, J.M. (1998), "Accounting for endogeneity when assessing strategy performance: does entry mode choice affect FDI survival?", Management Science, Vol. 44 No. 4, pp. 571-85. (Pubitemid 128591680)
    • (1998) Management Science , vol.44 , Issue.4 , pp. 571-585
    • Shaver, J.M.1
  • 132
    • 38949217981 scopus 로고    scopus 로고
    • Facilitating offshoring with enterprise technologies: Reducing operational friction in the governance and production of services
    • DOI 10.1016/j.jom.2007.02.006, PII S0272696307000460
    • Stratman, J.K. (2008), "Facilitating offshoring with enterprise technologies: reducing operational friction in the governance and production of services", Journal of Operations Management, Vol. 26 No. 2, pp. 275-87. (Pubitemid 351215679)
    • (2008) Journal of Operations Management , vol.26 , Issue.2 , pp. 275-287
    • Stratman, J.K.1
  • 133
    • 69749110589 scopus 로고    scopus 로고
    • Outsourcing: Think more expansively
    • Varadarajan, R. (2008), "Outsourcing: think more expansively", Journal of Business Research, Vol. 62 No. 11.
    • (2008) Journal of Business Research , vol.62 , Issue.11
    • Varadarajan, R.1
  • 134
    • 38949174959 scopus 로고    scopus 로고
    • Offshoring knowledge and service work: A conceptual model and research agenda
    • DOI 10.1016/j.jom.2007.02.007, PII S0272696307000484
    • Youngdahl, W. & Ramaswamy, K. (2008), "Offshoring knowledge and service work: a conceptual model and research agenda", Journal of Operations Management, Vol. 26 No. 2, pp. 212-21. (Pubitemid 351215681)
    • (2008) Journal of Operations Management , vol.26 , Issue.2 , pp. 212-221
    • Youngdahl, W.1    Ramaswamy, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.