{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:09:44Z","timestamp":1725516584706},"publisher-location":"Boston, MA","reference-count":17,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387097671"},{"type":"electronic","value":"9780387097688"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09768-8_21","type":"book-chapter","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T13:40:02Z","timestamp":1219153202000},"page":"301-310","source":"Crossref","is-referenced-by-count":1,"title":["Information Technology Outsourcing in the Service Economy: Client Maturity and Knowledge\/Power Asymmetries"],"prefix":"10.1007","author":[{"given":"Aris","family":"Komporozos-Athanasiou","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"21_CR1_Ref","first-page":"94","volume":"15","author":"S. Burgess","year":"2001","unstructured":"Burgess, S. 2001. \u201cThe Beauty of the Peacock Tail and the Problems with the Theory of Sexual Selection,\u201d TJ Magazine (15:2), pp. 94-102.","journal-title":"TJ Magazine"},{"key":"21_CR2_Ref","volume-title":"The Ant and the Peacock","author":"H. Cronin","year":"1991","unstructured":"Cronin, H. 1991. The Ant and the Peacock, Cambridge, UK: Cambridge University Press."},{"key":"21_CR3_Ref","volume-title":"Intelligent IT Outsourcing: Eight Building Blocks to Success","author":"S. Cullen","year":"2003","unstructured":"Cullen, S., and Willcocks, L. P. 2003. Intelligent IT Outsourcing: Eight Building Blocks to Success, Amsterdam: Elsevier."},{"issue":"4","key":"21_CR4_Ref","first-page":"67","volume":"39","author":"A. DiRomualdo","year":"1998","unstructured":"DiRomualdo, A., and Gurbaxani, V. 1998. \u201cStrategic Intent for IT Outsourcing,\u201d Sloan Management Review (39:4), pp. 67-80.","journal-title":"Sloan Management Review"},{"issue":"2","key":"21_CR5_Ref","doi-asserted-by":"crossref","first-page":"47","DOI":"10.2307\/41166122","volume":"44","author":"T. Kern","year":"2002","unstructured":"Kern, T., Willcocks, L. P., and van Heck, E. 2002. \u201cThe Winner\u2019s Curse in IT Outsourcing: Strategies for Avoiding Relational Trauma,\u201d California Management Review (44:2), pp. 47-69.","journal-title":"California Management Review"},{"key":"21_CR6_Ref","unstructured":"Komporozos-Athanasiou, A. 2006. \u201cThe Client Outsourcing Maturity Model as a Mechanism for Investigating IT Outsourcing Relationships in the Public Sector,\u201d HP Lab Tech Report (HPL-2006-169)."},{"key":"21_CR7_Ref","unstructured":"Komporozos-Athanasiou, A. 2007. \u201cAssessing Client Maturity: A Key to Successful Outsourcing,\u201d HP Labs Technical Report (HPL-2007-124)."},{"issue":"4","key":"21_CR8_Ref","first-page":"67","volume":"39","author":"W. F. McFarlan","year":"1995","unstructured":"McFarlan, W. F., and Nolan, R. L. 1995. \u201cHow to Manage an IT Outsourcing Alliance,\u201d Sloan Management Review (39:4), pp. 67-80.","journal-title":"Sloan Management Review"},{"issue":"1","key":"21_CR9_Ref","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1057\/palgrave\/ejis\/3000413","volume":"11","author":"Y. Merali","year":"2002","unstructured":"Merali, Y. 2002. \u201cThe Role of Boundaries in Knowledge Processes,\u201d European Journal of Information Systems (11:1), pp. 47-60.","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"21_CR10_Ref","doi-asserted-by":"crossref","first-page":"40","DOI":"10.2307\/41165942","volume":"43","author":"I. Nonaka","year":"1998","unstructured":"Nonaka, I., and Noboru, K. 1998. \u201cThe Concept of \u2018Ba\u2019: Building a Foundation for Knowledge Creation,\u201d California Management Review (43:3), pp. 40-54.","journal-title":"California Management Review"},{"key":"21_CR11_Ref","unstructured":"Perez-Hallerbach, I. \u201cAssessing the IT Outsourcing Maturity of Organizations: The Case of a Large Consumer Products Company,\u201d HP Labs Technical Report (HPL-2007-36)."},{"key":"21_CR12_Ref","unstructured":"Taylor, R., and Tofts, C. 2005. \u201cDeath by a Thousand SLAs: A Short Study of Commercial Suicide Pacts,\u201d HP Lab Tech Report (HPL-2005-11)."},{"key":"21_CR13_Ref","doi-asserted-by":"crossref","unstructured":"Taylor, R., and Tofts, C. 2008. \u201cModel Based Services Discovery and Management Industrial Research and Practice Paper,\u201d HP Lab Technical Report (HPL-2008-19).","DOI":"10.1109\/PICMET.2008.4599602"},{"key":"21_CR14_Ref","unstructured":"Taylor, R., Tofts, C., and Yearworth, M. 2004. \u201cOpen Analytics,\u201d HP Labs Tech Report (HPL-2004-138)."},{"issue":"3","key":"21_CR15_Ref","first-page":"51","volume":"38","author":"N. Venkatraman","year":"1997","unstructured":"Venkatraman, N. 1997. \u201cBeyond Outsourcing: Managing IT Resources as a Value Center,\u201d Sloan Management Review (38:3), pp. 51-54.","journal-title":"Sloan Management Review"},{"key":"21_CR16_Ref","doi-asserted-by":"crossref","unstructured":"Willcocks, L. P. 2006. \u201cMichel Foucault in the Social Study of ICTs: Critique and Reappraisal,\u201d Department of Information Systems Working Paper Series #138, London School of Economics and Political Science.","DOI":"10.1177\/0894439306287973"},{"key":"21_CR17_Ref","doi-asserted-by":"crossref","DOI":"10.1057\/9780230288034","volume-title":"Global Sourcing of Business and IT Services","author":"L. P. Willcocks","year":"2006","unstructured":"Willcocks, L. P., and Lacity, M. 2006. Global Sourcing of Business and IT Services, London: Palgrave Macillan 2006."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Information Technology in the Service Economy: Challenges and Possibilities for the 21st Century"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09768-8_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T17:14:48Z","timestamp":1684516488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09768-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387097671","9780387097688"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09768-8_21","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}