{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:24:50Z","timestamp":1725740690734},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642397356"},{"type":"electronic","value":"9783642397363"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39736-3_5","type":"book-chapter","created":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T04:44:59Z","timestamp":1373517899000},"page":"55-69","source":"Crossref","is-referenced-by-count":0,"title":["Pattern-Based Solution Risk Model for Strategic IT Outsourcing"],"prefix":"10.1007","author":[{"given":"Robert","family":"Gwadera","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference Very Large Data Bases, pp. 487\u2013499 (September 1994)"},{"issue":"5","key":"5_CR2","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.2307\/256670","volume":"37","author":"R.A. D\u2019Aveni","year":"1994","unstructured":"D\u2019Aveni, R.A., Ravenscraft, D.J.: Economies of integration versus bureaucracy costs: Does vertical integration improve performance? The Academy of Management Journal\u00a037(5), 1167\u20131206 (1994)","journal-title":"The Academy of Management Journal"},{"key":"5_CR3","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-540-87479-9_46","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"V. Grossi","year":"2008","unstructured":"Grossi, V., Romei, A., Ruggieri, S.: A case study in sequential pattern mining for it-operational risk. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part I. LNCS (LNAI), vol.\u00a05211, pp. 424\u2013439. Springer, Heidelberg (2008)"},{"key":"5_CR4","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-642-13657-3_32","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"R. Gwadera","year":"2010","unstructured":"Gwadera, R., Crestani, F.: Ranking sequential patterns with respect to significance. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010, Part I. LNCS (LNAI), vol.\u00a06118, pp. 286\u2013299. Springer, Heidelberg (2010)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Han, J., Fu, Y.: Mining multiple-level association rules in large databases. IEEE Transactions on Knowledge and Data Engineering\u00a011(5) (1999)","DOI":"10.1109\/69.806937"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1145\/584792.584896","volume-title":"Proceedings of the Eleventh International Conference on Information and Knowledge Management, CIKM 2002","author":"X. Huang","year":"2002","unstructured":"Huang, X., An, A., Cercone, N.: Comparison of interestingness functions for learning web usage patterns. In: Proceedings of the Eleventh International Conference on Information and Knowledge Management, CIKM 2002, pp. 617\u2013620. ACM, New York (2002)"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"47","DOI":"10.2307\/41166122","volume":"44","author":"T. Kern","year":"2002","unstructured":"Kern, T., Willcocks, L.P., Heck, E.V.: Winner\u2019s curse in it outsourcing: Strategies for avoiding relational trauma. California Management Review\u00a044(2), 47\u201369 (2002)","journal-title":"California Management Review"},{"key":"5_CR8","unstructured":"Mahnke, V., Overby, M.L., Vang, J.: Strategic it-outsourcing: What do we know and need to know? In: DRUID Summer Conference 2003 on Creating, Sharing and Transferring Knowledge, Copenhagen, June 12-14 (2003)"},{"key":"5_CR9","unstructured":"Martens, B., Teuteberg, F.: Why risk management matters in it outsourcing a systematic literature review and elements of a research agenda. In: 17th European Conference on Information Systems, Verona, Italy, June 8-10 (2009)"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/TKDE.2003.1161582","volume":"15","author":"E.R. Omiecinski","year":"2003","unstructured":"Omiecinski, E.R.: Alternative interest measures for mining associations in databases. IEEE Transactions on Knowledge and Data Engineering\u00a015, 57\u201369 (2003)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"5_CR11","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10844-005-0266-z","volume":"24","author":"N. Pasquier","year":"2005","unstructured":"Pasquier, N., Taouil, R., Bastide, Y., Stum, G., Lakhal, L.: Generating a condensed representation for association rules. Journal of Intelligent Information Systems\u00a024(1), 29\u201360 (2005)","journal-title":"Journal of Intelligent Information Systems"},{"key":"5_CR12","unstructured":"Pei, J., Han, J., Mao, R.: Closet: An efficient algorithm for mining frequent closed itemsets. In: Proceedings of the 2000 ACM-SIGMOD International Workshop of Data Mining and Knowledge Discovery (DMKD 2000), pp. 21\u201330 (2000)"},{"key":"5_CR13","unstructured":"Quinn, J.B., Helmer, F.G.: Strategic outsourcing. Sloan Management Review, 43\u201355 (Summer 1994)"},{"key":"5_CR14","unstructured":"Ruzaini, S., Aris, S.: Risk management practices in it outsourcing projects. In: 2008 International Symposium on Information Technology, ITSim 2008, August 26-28, vol.\u00a04, pp. 1\u20138 (2008)"},{"issue":"1","key":"5_CR15","first-page":"57","volume":"17","author":"N. Tatti","year":"2007","unstructured":"Tatti, N.: Maximum entropy based significance of itemsets. KAIS\u00a017(1), 57\u201377 (2007)","journal-title":"KAIS"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/1010614.1010616","volume":"22","author":"X. Wu","year":"2004","unstructured":"Wu, X., Zhang, C., Zhang, S.: Efficient mining of both positive and negative association rules. ACM Trans. Inf. Syst.\u00a022, 381\u2013405 (2004)","journal-title":"ACM Trans. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications and Theoretical Aspects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39736-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T14:28:24Z","timestamp":1557930504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39736-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642397356","9783642397363"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39736-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}