Analysis of IT Outsourcing Services Failures Based on an Existing Risk Model
暂无分享,去创建一个
Ana Paula Cabral Seixas Costa | Maisa Mendonça Silva | Lúcio Câmara e Silva | Thiago Poleto | Ana Paula Henriques de Gusmao | M. M. Silva | T. Poleto | A. P. H. D. Gusmão | A. Costa | L. C. Silva | L. C. Silva | Thiago Poleto
[1] József Mezei,et al. How different are ranking methods for fuzzy numbers? A numerical study , 2013, Int. J. Approx. Reason..
[2] Jae-Nam Lee,et al. Complementarity between client and vendor IT capabilities: An empirical investigation in IT outsourcing projects , 2016, Decis. Support Syst..
[3] Margaret A. Hurley,et al. KPMG survey: the IT outsourcing decision , 1997, Inf. Manag. Comput. Secur..
[4] John M. Ward,et al. Reconciling the IT/business relationship: a troubled marriage in need of guidance , 1996, J. Strateg. Inf. Syst..
[5] E. G. Lanser. The ins and outs of outsourcing. , 2000, Healthcare executive.
[6] Tinggui Chen,et al. A Novel Dynamic Algorithm for IT Outsourcing Risk Assessment Based on Transaction Cost Theory , 2015 .
[7] Bo Feng,et al. Identifying risk factors of IT outsourcing using interdependent information: An extended DEMATEL method , 2012, Expert Syst. Appl..
[8] Xiang Li,et al. Risk identification and conduction model for financial institution IT outsourcing in China , 2012, Information Technology and Management.
[9] Ana Paula Cabral Seixas Costa,et al. A multidimensional approach to information security risk management using FMEA and fuzzy theory , 2014, Int. J. Inf. Manag..
[10] Izak Benbasat,et al. Factors That Influence the Social Dimension of Alignment Between Business and Information Technology Objectives , 2000, MIS Q..
[11] Siba Sankar Mahapatra,et al. Risk assessment in IT outsourcing using fuzzy decision-making approach: An Indian perspective , 2014, Expert Syst. Appl..
[12] Etienne E. Kerre,et al. Reasonable properties for the ordering of fuzzy quantities (II) , 2001, Fuzzy Sets Syst..
[13] H. Rommelfanger,et al. Linear programming with fuzzy objectives , 1989 .
[14] Ronald Maier,et al. Security and compliance challenges in complex IT outsourcing arrangements: A multi-stakeholder perspective , 2014, Comput. Secur..
[15] Leslie P. Willcocks,et al. An Empirical Investigation of Information Technology Sourcing Practices: Lessons From Experience , 1998, MIS Q..
[16] W. Alec Cram. Success Factors for Information Systems Outsourcing: A Meta-Analysis , 2009, AMCIS.
[17] J. Adamo. Fuzzy decision trees , 1980 .
[18] Lanser Eg. The ins and outs of outsourcing. , 2000 .
[19] Sanfa Cai,et al. Producer Services Outsourcing Risk Control Based on Outsourcing Contract Design: Industrial Engineering Perspective , 2011 .
[20] Vijay Sethi,et al. Rationality in Strategic Information Technology Decisions: The Impact of Shared Domain Knowledge and IT Unit Structure , 2002, Decis. Sci..
[21] Amrit Tiwana,et al. Complementarities Between Organizational IT Architecture and Governance Structure , 2010, Inf. Syst. Res..
[22] Anne C. Rouse,et al. Explaining I.T. Outsourcing Purchasers' Dissatisfaction , 2006, PACIS.
[23] Mohammed H. A. Tafti,et al. Risks factors associated with offshore IT outsourcing , 2005, Ind. Manag. Data Syst..
[24] Selçuk Perçin,et al. Fuzzy multi-criteria risk-benefit analysis of business process outsourcing (BPO) , 2008, Inf. Manag. Comput. Secur..
[25] R. Nolan,et al. How to Manage an IT Outsourcing Alliance , 1995 .
[26] D. Elmuti,et al. The effects of global outsourcing strategies on participants’ attitudes and organizational effectiveness , 2000 .
[27] Saeid Abbasbandy,et al. Ranking of Fuzzy Numbers, Some Recent and New Formulas , 2009, IFSA/EUSFLAT Conf..
[28] Varun Grover,et al. The Effect of Service Quality and Partnership on the Outsourcing of Information Systems Functions , 1996, J. Manag. Inf. Syst..