{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:27:05Z","timestamp":1743121625313,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319264691"},{"type":"electronic","value":"9783319264707"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26470-7_7","type":"book-chapter","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T07:21:07Z","timestamp":1452756067000},"page":"131-152","source":"Crossref","is-referenced-by-count":1,"title":["A System Dynamics Simulator for Decision Support in Risk-Based IT Outsourcing Capabilities Management"],"prefix":"10.1007","author":[{"given":"Tarcio R.","family":"Bezerra","sequence":"first","affiliation":[]},{"given":"Ant\u00e3o","family":"Moura","sequence":"additional","affiliation":[]},{"given":"Seth","family":"Bullock","sequence":"additional","affiliation":[]},{"given":"Dietmar","family":"Pfahl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,15]]},"reference":[{"key":"7_CR1","unstructured":"Office of Government Commerce (OGC): ITIL Core Books, Service Strategy, TSO, UK (2007)"},{"key":"7_CR2","first-page":"99","volume":"17","author":"B Barney","year":"1991","unstructured":"Barney, B.: Firm resources and sustained competitive advantage. J. Manag. 17, 99\u2013120 (1991)","journal-title":"J. Manag."},{"issue":"6","key":"7_CR3","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1108\/17410390710830691","volume":"20","author":"OK Ngwenyama","year":"2007","unstructured":"Ngwenyama, O.K., Sullivan, W.E.: Outsourcing contracts as instruments of risk management: insights from two successful public contracts\u2019. J. Enterp. Inf. Manage. 20(6), 615\u2013640 (2007)","journal-title":"J. Enterp. Inf. Manage."},{"key":"7_CR4","unstructured":"Martens, B., Teuteberg, F.: Why risk management matters in IT outsourcing: a literature review and elements of a research agenda. In: Proceedings of the 17th European Conference on Information Systems, p. 1\u201313 (2009)"},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jsis.2009.06.002","volume":"18","author":"MC Lacity","year":"2009","unstructured":"Lacity, M.C., Khan, S.A., Willcocks, L.P.: A review of the IT outsourcing literature: Insights for practice. J. Strateg. Inf. Syst. 18(3), 130\u2013146 (2009)","journal-title":"J. Strateg. Inf. Syst."},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.omega.2004.04.003","volume":"332","author":"B Bahli","year":"2005","unstructured":"Bahli, B., Rivard, S.: Validating measures of information technology outsourcing risk factors. Omega 332, 175\u2013187 (2005)","journal-title":"Omega"},{"key":"7_CR7","unstructured":"Bezerra, T.R., Bullock, S., Moura, A.: A simulation model for risk management support in IT outsourcing. In: Proceedings of the 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications SIMULTECH 2014\u2014Vienna, Austria, 28\u201330 August, pp. 339-351 (2014). ISBN 978-989-758-038-3"},{"key":"7_CR8","unstructured":"International Standards Organization: ISO 31000:2008\u2014Risk Management: Principles and Guidelines on Implementation (2008)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1057\/jit.2010.21","volume":"25","author":"M Lacity","year":"2010","unstructured":"Lacity, M., Khan, S., Yan, A., Willcocks, L.: A review of the IT outsourcing empirical literature and future research directions. J. Inf. Technol. 25, 395\u2013433 (2010)","journal-title":"J. Inf. Technol."},{"issue":"1","key":"7_CR10","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.ejor.2005.01.060","volume":"174","author":"KM Osei-Bryson","year":"2006","unstructured":"Osei-Bryson, K.M., Ngwenyama, O.K.: Managing risks in information systems outsourcing: an approach to analyzing outsourcing risks and structuring incentive contracts. Eur. J. Oper. Res. 174(1), 245\u2013264 (2006)","journal-title":"Eur. J. Oper. Res."},{"key":"7_CR11","first-page":"1","volume":"416","author":"OK Ngwenyama","year":"2006","unstructured":"Ngwenyama, O.K., Technology, I., Sullivan, W.E., Patricia, B.: \u2018Secrets of a successful outsourcing contract: A risk analysis framework for analyzing risk factors. Technology 416, 1\u201312 (2006)","journal-title":"Technology"},{"issue":"1999","key":"7_CR12","first-page":"285","volume":"8","author":"LP Willcocks","year":"2000","unstructured":"Willcocks, L.P., Lacity, M.C., Kern, T.: Risk mitigation in IT outsourcing strategy revisited : Longitudinal case research at LISA. Inf. Syst. 8(1999), 285\u2013314 (2000)","journal-title":"Inf. Syst."},{"key":"7_CR13","unstructured":"Earl, M.J.: The risk of outsourcing IT. Sloan Manage. Rev. Spring (1996)"},{"key":"7_CR14","unstructured":"Abdel-Hamid, T.K., Madnick, S.E.: Software project dynamics: an integrated approach. Prentice-Hall, Englewood Cliffs (1991)"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S0164-1212(96)00156-2","volume":"38","author":"CY Lin","year":"1997","unstructured":"Lin, C.Y., Abdel-Hamid, T.K., Sherif, J.S.: Software-engineering process simulation model (SEPS). J. Syst. Softw. 38, 263\u2013277 (1997)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1002\/spip.411","volume":"14","author":"V Garousi","year":"2009","unstructured":"Garousi, V., Khosrovian, K., Pfahl, D.: A customizable pattern-based software process simulation model: design, calibration and application. Softw. Process Improv. Pract. 14(3), 165\u2013180 (2009)","journal-title":"Softw. Process Improv. Pract."},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Costa, M.D., Braga, J.L., Abrantes, L.A., Ambr\u00f3sio, B.G.: Support to the decision making process in human resources management in software projects based on simulation models. Rev. Eletr\u00f4nica de Sistemas de Informa\u00e7\u00e3o 12, (1), jan\u2013mai 2013, artigo 51 (2013). doi:\n                  10.5329\/RESI.2013.1201005","DOI":"10.5329\/RESI.2013.1201005"},{"issue":"3","key":"7_CR18","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0164-1212(01)00066-8","volume":"59","author":"DX Houston","year":"2001","unstructured":"Houston, D.X., Mackulak, G.T., Collofello, J.S.: Stochastic simulation of risk factor potential effects for software development risk management. J. Syst. Softw. 59(3), 247\u2013257 (2001)","journal-title":"J. Syst. Softw."},{"key":"7_CR19","first-page":"263","volume-title":"Value-based software engineering","author":"D Pfahl","year":"2005","unstructured":"Pfahl, D.: ProSim\/RA\u2014software process simulation in support of risk assessment. In: Biffl, S., Aurum, A., Boehm, B., Erdogmus, H., Gr\u00fcnbacher, P. (eds.) Value-based software engineering, pp. 263\u2013286. Springer Press, Berlin (2005)"},{"key":"7_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSS.2010.47","author":"W Gui-sem","year":"2010","unstructured":"Gui-sem, W., Xiang-yang, L.: The risk analysis on IT service outsourcing of enterprise with system dynamics. Int. Conf. Serv. Sci. (2010). doi:\n                  10.1109\/ICSS.2010.47","journal-title":"Int. Conf. Serv. Sci."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Tan, B., Anderson, E.G., Dyer, J.S., Parker, G.G.: Evaluating system dynamics models of risky projects using decision trees: alternative energy projects as an illustrative example. Syst. Dyn. Rev. 26(1), 1\u201317 (2010)","DOI":"10.1002\/sdr.433"},{"key":"7_CR22","unstructured":"Pfahl D.: An integrated approach to simulation-based learning in support of strategic and project management in software organisations. Ph.D. thesis, Universit\u00e4t Kaiserslautern, Germany"},{"key":"7_CR23","volume-title":"Aspectos e Fatores da Terceiriza\u00e7\u00e3o de Sistemas de Informa\u00e7\u00e3o no Setor P\u00fabico: Um Estudo em Institui\u00e7\u00f5es P\u00fablicas de Alagoas","author":"MC Cunha","year":"2011","unstructured":"Cunha, M.C.: Aspectos e Fatores da Terceiriza\u00e7\u00e3o de Sistemas de Informa\u00e7\u00e3o no Setor P\u00fabico: Um Estudo em Institui\u00e7\u00f5es P\u00fablicas de Alagoas. Universidade Federal de Pernambuco\u2019, Tese de Doutorado (2011)"},{"key":"7_CR24","unstructured":"Rivard, S., Albert, B., Patry, M.: Assessing the risk of IT outsourcing. IEEE (1998)"},{"key":"7_CR25","volume-title":"Managing the risk of IT outsourcing","author":"S Rivard","year":"1998","unstructured":"Rivard, S., Albert, B., Patry, M., Dussault, S.: Managing the risk of IT outsourcing. IEEE, Montreal (1998)"},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1080\/0268396032000130214","volume":"18","author":"B Bahli","year":"2003","unstructured":"Bahli, B., Rivard, S.: The information technology outsourcing risk: A transaction cost and agency theory-based perspective. J. Inf. Technol. 18, 211\u2013221 (2003)","journal-title":"J. Inf. Technol."},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Madachy, R.J.: Software process dynamics. Wiley, Hoboken (2007)","DOI":"10.1002\/9780470192719"},{"key":"7_CR28","unstructured":"Carvalho, S.: Um processo para gest\u00e3o de contratos de aquisi\u00e7\u00e3o de servi\u00e7os de desenvolvimento de software na administra\u00e7\u00e3o p\u00fablica. Masters Dissertation, UFPE, Recife, Brazil (2009)"},{"key":"7_CR29","unstructured":"The Ventana Simulation Environment\u2014Vensim DSS. \n                  http:\/\/www.vensim.com"},{"key":"7_CR30","unstructured":"http:\/\/www.minitab.com"}],"container-title":["Advances in Intelligent Systems and Computing","Simulation and Modeling Methodologies, Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26470-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:00:47Z","timestamp":1559368847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26470-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319264691","9783319264707"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26470-7_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}