{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:41:35Z","timestamp":1725471695493},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540476955"},{"type":"electronic","value":"9783540476962"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11908562_6","type":"book-chapter","created":{"date-parts":[[2006,10,12]],"date-time":"2006-10-12T11:04:00Z","timestamp":1160651040000},"page":"50-61","source":"Crossref","is-referenced-by-count":11,"title":["A Framework for Overcoming Supplier Related Threats in Global Projects"],"prefix":"10.1007","author":[{"given":"Darja","family":"\u0160mite","sequence":"first","affiliation":[]},{"given":"Juris","family":"Borzovs","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"6_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MS.1997.589227","volume":"30","author":"M.J. Carr","year":"1997","unstructured":"Carr, M.J.: Counterpoint: Risk Management May Not Be for Everyone. IEEE Software\u00a030(5), 21\u201324 (1997)","journal-title":"IEEE Software"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Carr, M., Kondra, S., Monarch, I., Ulrich, F., Walker, C.: Taxonomy-Based Risk Identification, CMU\/SEI-93-TR-6, ADA266992, SEI, Carnegie Mellon University, Pittsburgh (June 1993)","DOI":"10.21236\/ADA266992"},{"issue":"3","key":"6_CR3","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1002\/bltj.10077","volume":"8","author":"F.M. Dedolph","year":"2003","unstructured":"Dedolph, F.M.: The neglected management activity: Software risk management. Bell Labs Technical Journal\u00a08(3), 91\u201395 (2003)","journal-title":"Bell Labs Technical Journal"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","first-page":"55","volume-title":"Product Focused Software Process Improvement","author":"T. Dings\u00f8yr","year":"2005","unstructured":"Dings\u00f8yr, T.: An Evaluation of Research on Experience Factory. In: Bomarius, F., Komi-Sirvi\u00f6, S. (eds.) PROFES 2005. LNCS, vol.\u00a03547, pp. 55\u201366. Springer, Heidelberg (2005)"},{"issue":"2","key":"6_CR5","first-page":"8","volume":"15","author":"C. \u00c9mond","year":"2005","unstructured":"\u00c9mond, C.: From Donald Rumsfeld to Little Gibus...\u201cRevisited\u201d: Understanding and managing risks and other project uncertainties. Le Bulletin, PMI Monteral\u00a015(2), 8\u201311 (2005)","journal-title":"Le Bulletin, PMI Monteral"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Glaser, B., Strauss, A.: The discovery of grounded theory: Strategies of qualitative research. Wiedenfeld and Nicholson, London (1967)","DOI":"10.1097\/00006199-196807000-00014"},{"key":"6_CR7","unstructured":"Lee, J.-N., et al.: The Evolution of Outsourcing Research: What is the Next Issue? In: The Proc. of the 33rd Hawaii Int. Conf. on System Sciences (2000)"},{"key":"6_CR8","volume-title":"On research methods","author":"P. Jarvinen","year":"2001","unstructured":"Jarvinen, P.: On research methods. Opinpajan Kirja, Tampere (2001)"},{"key":"6_CR9","volume-title":"Global Software Development: Managing Virtual Teams and Environments","author":"D.W. Karolak","year":"1998","unstructured":"Karolak, D.W.: Global Software Development: Managing Virtual Teams and Environments. IEEE Computer Society, Los Alamitos (1998)"},{"key":"6_CR10","unstructured":"Loh, L., Venkatraman, N.: An empirical study of information technology outsourcing: Benefits, risks, and performance implications. In: Proc. of the 16th Int. Conf. on Information Systems, Amsterdam, The Netherlands, pp. 277\u2013288 (1995)"},{"key":"6_CR11","unstructured":"Merriam-Webster Online Dictionary, www.m-w.com"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Project Management Institute, A Guide to the Project Management Body of Knowledge: PMBOK guidem, 3rd edn. (2004) ISBN 1-930699-45-X","DOI":"10.1002\/pmj.21345"},{"key":"6_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511615351","volume-title":"Global IT Outsourcing: Software Development across Borders","author":"S. Sahay","year":"2003","unstructured":"Sahay, S., Nicholson, B., Krishna, S.: Global IT Outsourcing: Software Development across Borders. Cambridge University Press, Cambridge (2003)"},{"key":"6_CR14","volume-title":"Basics of qualitative research \u2013 Grounded theory procedures and techniques","author":"A. Strauss","year":"1990","unstructured":"Strauss, A., Corbin, J.: Basics of qualitative research \u2013 Grounded theory procedures and techniques. Sage Publications, Newbury Park (1990)"},{"key":"6_CR15","volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"A. Strauss","year":"1998","unstructured":"Strauss, A., Corbin, J.: Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage Publications, Thousand Oaks (1998)"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/11497455_20","volume-title":"Product Focused Software Process Improvement","author":"D. \u0160mite","year":"2005","unstructured":"\u0160mite, D.: A Case Study: Coordination Practices in Global Software Development. In: Bomarius, F., Komi-Sirvi\u00f6, S. (eds.) PROFES 2005. LNCS, vol.\u00a03547, pp. 234\u2013244. Springer, Heidelberg (2005)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/11767718_19","volume-title":"Product-Focused Software Process Improvement","author":"D. Smite","year":"2006","unstructured":"Smite, D., Moe, N.B.: An ISO 9001:2000 certificate and quality awards from outside \u2013 what\u2019s inside? \u2013 A case study. In: M\u00fcnch, J., Vierimaa, M. (eds.) PROFES 2006. LNCS, vol.\u00a04034, pp. 208\u2013221. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Software Process Improvement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11908562_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T09:29:42Z","timestamp":1683624582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11908562_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540476955","9783540476962"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11908562_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}