{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T13:26:39Z","timestamp":1774531599362,"version":"3.50.1"},"reference-count":41,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2003,3,1]],"date-time":"2003-03-01T00:00:00Z","timestamp":1046476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Accounting Information Systems"],"published-print":{"date-parts":[[2003,3]]},"DOI":"10.1016\/s1467-0895(03)00004-6","type":"journal-article","created":{"date-parts":[[2003,4,23]],"date-time":"2003-04-23T17:13:10Z","timestamp":1051117990000},"page":"75-93","source":"Crossref","is-referenced-by-count":38,"title":["Business risk perspectives on information systems outsourcing"],"prefix":"10.1016","volume":"4","author":[{"given":"Somnath","family":"Bhattacharya","sequence":"first","affiliation":[]},{"given":"Ravi S.","family":"Behara","sequence":"additional","affiliation":[]},{"given":"David E.","family":"Gundersen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/S1467-0895(03)00004-6_BIB1","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1080\/10919399509540251","article-title":"Outsourcing information system functions: an organization economics perspective","volume":"5","author":"Alpar","year":"1995","journal-title":"J. Organ. Comput."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB2","series-title":"Creating business advantage in the information age","author":"Applegate","year":"2002"},{"issue":"4","key":"10.1016\/S1467-0895(03)00004-6_BIB3","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0378-7206(94)90091-4","article-title":"Firms that choose outsourcing: a profile","volume":"26","author":"Arnett","year":"1994","journal-title":"Inf. Manage."},{"issue":"2","key":"10.1016\/S1467-0895(03)00004-6_BIB4","first-page":"46","article-title":"Trends in information outsourcing","volume":"31","author":"Behara","year":"1995","journal-title":"Int. J. Purch. Mater. Manage."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB5","first-page":"13","article-title":"Lemon county embarks on information technology and systems management","volume":"7","author":"Bhattacharya","year":"2002","journal-title":"J. Account. Case Res."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB6","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/52.62930","article-title":"Software risk management: principles and practices","volume":"1","author":"Boehm","year":"1991","journal-title":"IEEE Softw."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB7","first-page":"10","article-title":"E-biz revises outsourcing rules\u2014contracts must be shorter term, more flexible and more focused on uptime, experts say","author":"Booker","year":"2000","journal-title":"InternetWeek, March"},{"issue":"1","key":"10.1016\/S1467-0895(03)00004-6_BIB8","doi-asserted-by":"crossref","first-page":"23","DOI":"10.2307\/248822","article-title":"Issues in information systems management","volume":"11","author":"Brancheau","year":"1987","journal-title":"Manage. Inf. Syst. Q."},{"issue":"4","key":"10.1016\/S1467-0895(03)00004-6_BIB9","doi-asserted-by":"crossref","first-page":"371","DOI":"10.2307\/249521","article-title":"Alignment of the IS functions with the enterprise: toward a model of antecedents","volume":"18","author":"Brown","year":"1994","journal-title":"Manage. Inf. Syst. Q."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB10","series-title":"Corporate information systems management","author":"Cash","year":"1988"},{"key":"10.1016\/S1467-0895(03)00004-6_BIB11","series-title":"Project risk management: processes, techniques and insights","author":"Chapman","year":"1995"},{"issue":"5","key":"10.1016\/S1467-0895(03)00004-6_BIB12","first-page":"60","article-title":"The creative web: a new model for managing innovation","volume":"64","author":"Conklin","year":"2000","journal-title":"Ivey Bus. J."},{"issue":"3","key":"10.1016\/S1467-0895(03)00004-6_BIB13","first-page":"94","article-title":"IT outsourcing: British petroleum's competitive approach","volume":"73","author":"Cross","year":"1995","journal-title":"Harvard Bus. Rev."},{"issue":"3","key":"10.1016\/S1467-0895(03)00004-6_BIB14","doi-asserted-by":"crossref","first-page":"247","DOI":"10.2307\/248998","article-title":"Technology issues facing corporate management in the 1990s","volume":"13","author":"Dixon","year":"1989","journal-title":"Manage. Inf. Syst. Q."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB15","unstructured":"Greenstein M, Vasarhelyi M. Electronic commerce: security, risk management, and control. 2nd ed. McGrawHill-Irwin."},{"issue":"3","key":"10.1016\/S1467-0895(03)00004-6_BIB16","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1287\/isre.8.3.288","article-title":"Research report: diffusion of information systems outsourcing: a reevaluation of influence sources","volume":"8","author":"Hu","year":"1997","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"10.1016\/S1467-0895(03)00004-6_BIB17","first-page":"121","article-title":"How continental bank outsourced its \u201ccrown jewels\u201d","volume":"71","author":"Huber","year":"1993","journal-title":"Harvard Bus. Rev."},{"issue":"1","key":"10.1016\/S1467-0895(03)00004-6_BIB18","first-page":"73","article-title":"The information systems outsourcing bandwagon","volume":"35","author":"Lacity","year":"1993","journal-title":"Sloan Manage. Rev."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB19","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/07399019408964664","article-title":"Realizing outsourcing expectations","volume":"4","author":"Lacity","year":"1994","journal-title":"Inf. Syst. Manage."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB20","doi-asserted-by":"crossref","unstructured":"Loh L. The economics and organization of information technology governance: sourcing strategies for corporate information infrastructure. Ph.D. Dissertation, Massachusetts Institute of Technology, 1993.","DOI":"10.1016\/0959-8022(93)90018-2"},{"key":"10.1016\/S1467-0895(03)00004-6_BIB21","series-title":"Proceedings of the Fifteenth International Conference on Information Systems, December 14\u201317, Vancouver, British Columbia, Canada","first-page":"73","article-title":"An organizational\u2013economic blueprint for information technology outsourcing: concepts and evidence","author":"Loh","year":"1994"},{"issue":"4","key":"10.1016\/S1467-0895(03)00004-6_BIB22","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1287\/isre.3.4.334","article-title":"Diffusion of information technology outsourcing: influence sources and the Kodak effect","volume":"3","author":"Loh","year":"1992","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"10.1016\/S1467-0895(03)00004-6_BIB23","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/07421222.1992.11517945","article-title":"Determinants of information technology outsourcing: a cross-sectional analysis","volume":"9","author":"Loh","year":"1992","journal-title":"J. Manage. Inf. Syst."},{"issue":"3","key":"10.1016\/S1467-0895(03)00004-6_BIB24","first-page":"554","article-title":"The REA accounting model: a generalized framework for accounting systems in a shared data environment","volume":"57","author":"McCarthy","year":"1982","journal-title":"Account. Rev."},{"issue":"2","key":"10.1016\/S1467-0895(03)00004-6_BIB25","first-page":"9","article-title":"How to manage an IT outsourcing alliance","volume":"36","author":"McFarlan","year":"1995","journal-title":"Sloan Manage. Rev."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB26","series-title":"Information systems management in practice","author":"McNurlin","year":"1989"},{"issue":"4","key":"10.1016\/S1467-0895(03)00004-6_BIB27","doi-asserted-by":"crossref","first-page":"475","DOI":"10.2307\/249452","article-title":"Information systems management issues for the 1990s","volume":"15","author":"Niederman","year":"1991","journal-title":"Manage. Inf. Syst. Q."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB28","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0378-7206(95)00030-9","article-title":"A dialectic view of information systems outsourcing: pros and cons","volume":"29","author":"Palvia","year":"1995","journal-title":"Inf. Manage."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB29","series-title":"A Guide to the Project Management Body of Knowledge","author":"PMBOK","year":"2000"},{"issue":"2","key":"10.1016\/S1467-0895(03)00004-6_BIB30","doi-asserted-by":"crossref","first-page":"63","DOI":"10.2307\/41165887","article-title":"Achieving success in information systems outsourcing","volume":"39","author":"Saunders","year":"1997","journal-title":"Calif. Manage. Rev."},{"issue":"2","key":"10.1016\/S1467-0895(03)00004-6_BIB31","first-page":"6","article-title":"Microsoft jumps in the app pool","volume":"17","author":"Scott","year":"2001","journal-title":"Account. Technol."},{"issue":"7","key":"10.1016\/S1467-0895(03)00004-6_BIB32","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/233977.233994","article-title":"Employment outsourcing in information systems","volume":"39","author":"Slaughter","year":"1996","journal-title":"Commun. ACM"},{"issue":"2","key":"10.1016\/S1467-0895(03)00004-6_BIB33","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1080\/07421222.1998.11518209","article-title":"Information systems outsourcing: a study of pre-event firm characteristics","volume":"15","author":"Smith","year":"1998","journal-title":"J. Manage. Inf. Syst."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB34","first-page":"B12","article-title":"PricewaterhouseCoopers weighs selling its business-process unit","author":"Spagat","year":"2001","journal-title":"Wall Street J."},{"issue":"1","key":"10.1016\/S1467-0895(03)00004-6_BIB35","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1111\/j.1540-5915.1995.tb00838.x","article-title":"Decisions to outsource information systems functions: testing a strategy-theoretic discrepancy model","volume":"26","author":"Teng","year":"1995","journal-title":"Decis. Sci."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB36","first-page":"14","article-title":"Seeking guarantees: application hosting providers are demanding service-level agreements from vendor partners","volume":"27","author":"Torode","year":"2000","journal-title":"Comput. Resell. News"},{"issue":"4","key":"10.1016\/S1467-0895(03)00004-6_BIB37","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1287\/mnsc.40.4.496","article-title":"The adoption of corporate governance mechanisms: a test of competing diffusion models","volume":"40","author":"Venkatraman","year":"1994","journal-title":"Manage. Sci."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB38","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/0378-7206(91)90056-8","article-title":"Key issues in information systems management: an international perspective","volume":"20","author":"Watson","year":"1991","journal-title":"Inf. Manage."},{"issue":"3","key":"10.1016\/S1467-0895(03)00004-6_BIB39","first-page":"3","article-title":"Effective software management: its time has come in internal auditing","volume":"13","author":"Weaver","year":"2000","journal-title":"Intern. Audit."},{"key":"10.1016\/S1467-0895(03)00004-6_BIB40","first-page":"18","article-title":"Ensuring value in outsourcing relationships","author":"Zahler","year":"1992","journal-title":"Resource"},{"key":"10.1016\/S1467-0895(03)00004-6_BIB41","series-title":"Eastman Kodak Co.: Managing Information Systems Through Strategic Alliances, Harvard Business School Case Teaching Note 5-193-037, 9 October 1995","article-title":"The Four-S Outsourcing Model","author":"Zucchini","year":"1992"}],"container-title":["International Journal of Accounting Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1467089503000046?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1467089503000046?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T23:50:56Z","timestamp":1553212256000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1467089503000046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,3]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,3]]}},"alternative-id":["S1467089503000046"],"URL":"https:\/\/doi.org\/10.1016\/s1467-0895(03)00004-6","relation":{},"ISSN":["1467-0895"],"issn-type":[{"value":"1467-0895","type":"print"}],"subject":[],"published":{"date-parts":[[2003,3]]}}}