{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:09:43Z","timestamp":1773547783288,"version":"3.50.1"},"reference-count":134,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2012,3,16]],"date-time":"2012-03-16T00:00:00Z","timestamp":1331856000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3,16]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Service outsourcing\/offshoring represents an increasing phenomenon. Several factors (e.g. cost reduction, flexibility, access to new technologies and skills, access to new markets, focus on core activities) motivate the location of (IT or business) processes abroad and\/or out of the companies' boundaries. This choice determines also relevant risks. Knowledge and data protection constitutes one of the most relevant issues in service outsourcing\/offshoring because it can strongly affect the success of these projects. The purpose of this paper is to propose an assessment framework that highlights the main risks of offshoring and outsourcing projects.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Building on the model developed by Monczka <jats:italic>et al.<\/jats:italic> (2005), this work proposes a FMEA assessment framework that highlights the main risks of offshoring and outsourcing projects, their causes, effects and some possible (preventing\/correcting) actions. The proposed framework has been implemented and tested in a multinational company for a long time involved in service offshoring\/outsourcing projects.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Adopting a failure mode and effect analysis (FMEA) approach, the study describes the main possible failures, their causes, effects and possible (preventive and corrective) actions, along all of the phases of typical outsourcing\/offshoring projects.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper develops an assessment framework able to identify the security risk profile of companies engaged in outsourcing\/offshoring projects by considering the technical, legal and managerial aspects jointly; and detecting the causes of possible security failures and the related preventive and corrective actions.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571211210059","type":"journal-article","created":{"date-parts":[[2012,3,10]],"date-time":"2012-03-10T07:02:59Z","timestamp":1331362979000},"page":"405-440","source":"Crossref","is-referenced-by-count":34,"title":["Security risks in service offshoring and outsourcing"],"prefix":"10.1108","volume":"112","author":[{"given":"Guido","family":"Nassimbeni","sequence":"first","affiliation":[]},{"given":"Marco","family":"Sartor","sequence":"additional","affiliation":[]},{"given":"Daiana","family":"Dus","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020920252750100_b1","doi-asserted-by":"crossref","unstructured":"Allen, S. and Chandrashekar, A. (2000), \u201cOutsourcing services: the contract is just the beginning\u201d, Business Horizons, Vol. 43 No. 2, pp. 25\u201034.","DOI":"10.1016\/S0007-6813(00)88558-4"},{"key":"key2022020920252750100_b2","doi-asserted-by":"crossref","unstructured":"Amara, N., Landry, R. and Traor\u00e8, N. (2008), \u201cManaging the protection of innovations in knowledge\u2010intensive business services\u201d, Research Policy, Vol. 37 No. 9, pp. 1530\u201047.","DOI":"10.1016\/j.respol.2008.07.001"},{"key":"key2022020920252750100_b3","doi-asserted-by":"crossref","unstructured":"Anderson, E. and Gatignon, H. (1986), \u201cModes of foreign entry: a transaction cost analysis and propositions\u201d, Journal of International Business Studies, Vol. 17 No. 3, pp. 1\u201026.","DOI":"10.1057\/palgrave.jibs.8490432"},{"key":"key2022020920252750100_b5","doi-asserted-by":"crossref","unstructured":"Apke, T.M. (2003), \u201cInternational protection of trade secrets when using internet\u201d, Management Decision, Vol. 41 No. 1, pp. 43\u20107.","DOI":"10.1108\/00251740310452907"},{"key":"key2022020920252750100_b6","unstructured":"Aron, R. and Singh, J.V. (2005), \u201cGetting offshoring right\u201d, Harvard Business Review, Vol. 83 No. 12, pp. 135\u201043."},{"key":"key2022020920252750100_b131","doi-asserted-by":"crossref","unstructured":"Arundel, A. (2001), \u201cThe relative effectiveness of patents and secrecy for appropriation\u201d, Research Policy, Vol. 30 No. 4, pp. 611\u201024.","DOI":"10.1016\/S0048-7333(00)00100-1"},{"key":"key2022020920252750100_b8","doi-asserted-by":"crossref","unstructured":"Baden\u2010Fuller, C., Targett, D. and Hunt, B. (2000), \u201cOutsourcing to outmanoeuvre: outsourcing re\u2010defines competitive strategy and structure\u201d, European Management Journal, Vol. 18 No. 3, pp. 285\u201095.","DOI":"10.1016\/S0263-2373(00)00010-4"},{"key":"key2022020920252750100_b10","doi-asserted-by":"crossref","unstructured":"Belcourt, M. (2006), \u201cOutsourcing \u2013 the benefits and the risks\u201d, Human Resource Management Review, Vol. 16 No. 2, pp. 269\u201079.","DOI":"10.1016\/j.hrmr.2006.03.011"},{"key":"key2022020920252750100_b11","doi-asserted-by":"crossref","unstructured":"Belsis, P., Kokolakis, S. and Kiountouzis, E. (2005), \u201cInformation systems security from a knowledge management perspective\u201d, Information Management & Computer Security, Vol. 13 No. 3, pp. 189\u2010202.","DOI":"10.1108\/09685220510602013"},{"key":"key2022020920252750100_b12","doi-asserted-by":"crossref","unstructured":"Bhalla, A., Sodhi, M.S. and Son, B. (2008), \u201cIs more IT offshoring better? An exploratory study of western companies offshoring to South East Asia\u201d, Journal of Operations Management, Vol. 26 No. 2, pp. 322\u201035.","DOI":"10.1016\/j.jom.2007.02.005"},{"key":"key2022020920252750100_b13","doi-asserted-by":"crossref","unstructured":"Binns, R. and Driscoll, B. (1998), \u201cIntellectual property issues in R&D contracts\u201d, Pharmaceutical Science & Technology Today, Vol. 1 No. 3, pp. 95\u20109.","DOI":"10.1016\/S1461-5347(98)00033-9"},{"key":"key2022020920252750100_b14","doi-asserted-by":"crossref","unstructured":"Blackley, J.A. and Leach, J. (1996), \u201cSecurity considerations in outsourcing IT services\u201d, Information Security Technical Report, Vol. 1 No. 3, pp. 11\u201017.","DOI":"10.1016\/S1363-4127(97)83014-2"},{"key":"key2022020920252750100_b15","doi-asserted-by":"crossref","unstructured":"Blind, K. and Thumm, N. (2004), \u201cInterrelation between patenting and standardisation strategies: empirical evidence and policy implications\u201d, Research Policy, Vol. 33 No. 10, pp. 1583\u201098.","DOI":"10.1016\/j.respol.2004.08.007"},{"key":"key2022020920252750100_b16","doi-asserted-by":"crossref","unstructured":"Blumberg, D.F. (1998), \u201cStrategic assessment of outsourcing and downsizing in the service market\u201d, Managing Service Quality, Vol. 8 No. 1, pp. 5\u201018.","DOI":"10.1108\/09604529810199340"},{"key":"key2022020920252750100_b17","doi-asserted-by":"crossref","unstructured":"Bojanc, R. and Jerman\u2010Blazic, B. (2008), \u201cAn economic modelling approach to information security risk management\u201d, International Journal of Information Management, Vol. 28 No. 5, pp. 413\u201022.","DOI":"10.1016\/j.ijinfomgt.2008.02.002"},{"key":"key2022020920252750100_b18","doi-asserted-by":"crossref","unstructured":"Bond, R.T., Audley, H. and Knyrim, R.S. (2002), \u201cData protection \u2013 third country transfer: data transfer to third countries: standard contractual clauses of the European Commission\u201d, Computer Law & Security Report, Vol. 18 No. 3, pp. 187\u201090.","DOI":"10.1016\/S0267-3649(02)00510-1"},{"key":"key2022020920252750100_b19","doi-asserted-by":"crossref","unstructured":"Bounfour, A. (1999), \u201cIs outsourcing of intangibles a real source of competitive advantage?\u201d, International Journal of Applied Quality Management, Vol. 2 No. 2, pp. 127\u201051.","DOI":"10.1016\/S1096-4738(99)80087-6"},{"key":"key2022020920252750100_b20","doi-asserted-by":"crossref","unstructured":"Broderick, J.S. (2001), \u201cInformation security risk management \u2013 when should it be managed?\u201d, Information Security Technical Report, Vol. 6 No. 3, pp. 12\u201018.","DOI":"10.1016\/S1363-4127(01)00303-X"},{"key":"key2022020920252750100_b21","doi-asserted-by":"crossref","unstructured":"Budhwar, P.S., Luthar, H.K. and Bhatnagar, J. (2006), \u201cThe dynamics of HRM systems in Indian BPO firms\u201d, Journal of Labor Research, Vol. 27 No. 3, pp. 339\u201060.","DOI":"10.1007\/s12122-006-1027-7"},{"key":"key2022020920252750100_b147","unstructured":"Capunzo, M., Cavallo, P., Boccia, G., Brunetti, L. and Pizzuti, S. (2004), \u201cA FMEA clinical laboratory case study: how to make problems and improvements measurable\u201d, Clinical Leadcership and Management Review, Vol. 18 No. 1, pp. 37\u201041."},{"key":"key2022020920252750100_b26","doi-asserted-by":"crossref","unstructured":"Chang, A.J.\u2010T. and Yeh, Q.\u2010J. (2006), \u201cOn security preparations against possible IS threats across industries\u201d, Information Management & Computer Security, Vol. 14 No. 4, pp. 343\u201060.","DOI":"10.1108\/09685220610690817"},{"key":"key2022020920252750100_b29","doi-asserted-by":"crossref","unstructured":"Colwill, C. and Gray, A. (2007), \u201cCreating an effective security risk model for outsourcing decisions\u201d, BT Technology Journal, Vol. 25 No. 1, pp. 79\u201087.","DOI":"10.1007\/s10550-007-0011-y"},{"key":"key2022020920252750100_b30","doi-asserted-by":"crossref","unstructured":"Cullen, S., Seddon, P.B. and Willcocks, L.P. (2005), \u201cIT outsourcing configuration: research into defining and designing outsourcing arrangements\u201d, Journal of Strategic Information Systems, Vol. 14 No. 4, pp. 357\u201087.","DOI":"10.1016\/j.jsis.2005.07.001"},{"key":"key2022020920252750100_b31","doi-asserted-by":"crossref","unstructured":"Currie, W.L., Michell, V. and Abanishe, O. (2008), \u201cKnowledge process outsourcing in financial services: the vendor perspective\u201d, European Management Journal, Vol. 26 No. 2, pp. 94\u2010104.","DOI":"10.1016\/j.emj.2007.11.002"},{"key":"key2022020920252750100_b33","doi-asserted-by":"crossref","unstructured":"Desouza, K.C. (2008), \u201cThe neglected dimension in strategic sourcing: security\u201d, Strategic Outsourcing: An International Journal, Vol. 1 No. 3, pp. 288\u201092.","DOI":"10.1108\/17538290810915326"},{"key":"key2022020920252750100_b34","doi-asserted-by":"crossref","unstructured":"Doomun, M.R. (2008), \u201cMulti\u2010level information system security in outsourcing domain\u201d, Business Process Management Journal, Vol. 14 No. 6, pp. 849\u201057.","DOI":"10.1108\/14637150810916026"},{"key":"key2022020920252750100_b35","doi-asserted-by":"crossref","unstructured":"Dossani, R. and Kenney, M. (2007), \u201cThe next wave of globalization: relocating service provision to India\u201d, World Development, Vol. 35 No. 5, pp. 772\u201091.","DOI":"10.1016\/j.worlddev.2006.09.014"},{"key":"key2022020920252750100_b36","doi-asserted-by":"crossref","unstructured":"Elango, B. (2008), \u201cUsing outsourcing for strategic competitiveness in small and medium\u2010sized firms\u201d, Competitiveness Review: An International Business Journal incorporating Journal of Global Competitiveness, Vol. 18 No. 4, pp. 322\u201032.","DOI":"10.1108\/10595420810920806"},{"key":"key2022020920252750100_b37","doi-asserted-by":"crossref","unstructured":"Ellram, L.M., Tate, W.L. and Billington, C. (2008), \u201cOffshore outsourcing of professional services: a transaction cost economics perspective\u201d, Journal of Operations Management, Vol. 26 No. 2, pp. 148\u201063.","DOI":"10.1016\/j.jom.2007.02.008"},{"key":"key2022020920252750100_b38","doi-asserted-by":"crossref","unstructured":"Embleton, P.R. and Wright, P.C. (1998), \u201cA practical guide to successful outsourcing\u201d, Empowerment in Organizations, Vol. 6 No. 3, pp. 94\u2010106.","DOI":"10.1108\/14634449810210832"},{"key":"key2022020920252750100_b39","doi-asserted-by":"crossref","unstructured":"Faisal, M.N., Banwet, D.K. and Shankar, R. (2007), \u201cInformation risks management in supply chains: an assessment and mitigation framework\u201d, Journal of Enterprise Information Management, Vol. 20 No. 6, pp. 677\u201099.","DOI":"10.1108\/17410390710830727"},{"key":"key2022020920252750100_b40","doi-asserted-by":"crossref","unstructured":"Fenn, C., Shooter, R. and Allan, K. (2002), \u201cIT security outsourcing: how safe is your IT security?\u201d, Computer Law & Security Report, Vol. 18 No. 2, pp. 109\u201011.","DOI":"10.1016\/S0267-3649(02)03009-1"},{"key":"key2022020920252750100_b41","doi-asserted-by":"crossref","unstructured":"Fink, D. (1994), \u201cA security framework for information system outsourcing\u201d, Information Management & Computer Security, Vol. 2 No. 4, pp. 3\u20108.","DOI":"10.1108\/09685229410068235"},{"key":"key2022020920252750100_b132","doi-asserted-by":"crossref","unstructured":"Flowerday, S. and von Solms, R. (2005), \u201cReal\u2010time information integrity=system integrity+data integrity+continuous assurances\u201d, Computers & Security, Vol. 24 No. 8, pp. 604\u201013.","DOI":"10.1016\/j.cose.2005.08.004"},{"key":"key2022020920252750100_b43","doi-asserted-by":"crossref","unstructured":"Franceschini, F., Galetto, M., Pignatelli, A. and Varetto, M. (2003), \u201cOutsourcing: guidelines for a structured approach\u201d, Benchmarking: An International Journal, Vol. 10 No. 3, pp. 246\u201060.","DOI":"10.1108\/14635770310477771"},{"key":"key2022020920252750100_b44","doi-asserted-by":"crossref","unstructured":"Frost, C. (2000), \u201cOutsourcing or increasing risks?\u201d, Balance Sheet, Vol. 8 No. 2, pp. 34\u20107.","DOI":"10.1108\/09657960010338599"},{"key":"key2022020920252750100_b133","doi-asserted-by":"crossref","unstructured":"Fulford, H. and Doherty, N.F. (2003), \u201cThe application of information security policies in large UK\u2010based organizations: an exploratory investigation\u201d, Information Management & Computer Security, Vol. 11 No. 3, pp. 106\u201014.","DOI":"10.1108\/09685220310480381"},{"key":"key2022020920252750100_b134","doi-asserted-by":"crossref","unstructured":"Gerber, M. and von Solms, R. (2008), \u201cInformation security requirements \u2013 interpreting the legal aspects\u201d, Computers & Security, Vol. 27 Nos 5\/6, pp. 124\u201035.","DOI":"10.1016\/j.cose.2008.07.009"},{"key":"key2022020920252750100_b48","doi-asserted-by":"crossref","unstructured":"Ghodeswar, B. and Vaidyanathan, J. (2008), \u201cBusiness process outsourcing: an approach to gain access to world\u2010class capabilities\u201d, Business Process Management Journal, Vol. 14 No. 1, pp. 23\u201038.","DOI":"10.1108\/14637150810849382"},{"key":"key2022020920252750100_b49","doi-asserted-by":"crossref","unstructured":"Ghodsypour, S.H. and O'Brien, C. (1998), \u201cA decision support system for supplier selection using an integrated analytic hierarchy process and linear programming\u201d, International Journal of Production Economics, Vol. 56 No. 1, pp. 199\u2010212.","DOI":"10.1016\/S0925-5273(97)00009-1"},{"key":"key2022020920252750100_b50","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Gasco, J. and Llopis, J. (2006), \u201cInformation systems offshore outsourcing: a descriptive analysis\u201d, Industrial Management & Data Systems, Vol. 106 No. 9, pp. 1233\u201048.","DOI":"10.1108\/02635570610712555"},{"key":"key2022020920252750100_b51","doi-asserted-by":"crossref","unstructured":"Graf, M. and Mudambi, S.M. (2005), \u201cThe outsourcing of IT\u2010enabled business processes: a conceptual model of the location decision\u201d, Journal of International Management, Vol. 11 No. 2, pp. 253\u201068.","DOI":"10.1016\/j.intman.2005.03.010"},{"key":"key2022020920252750100_b53","doi-asserted-by":"crossref","unstructured":"Gupta, A. and Hammond, R. (2005), \u201cInformation systems security issues and decisions for small businesses: an empirical examination\u201d, Information Management & Computer Security, Vol. 13 No. 4, pp. 297\u2010310.","DOI":"10.1108\/09685220510614425"},{"key":"key2022020920252750100_b54","doi-asserted-by":"crossref","unstructured":"Hagen, J.M., Albrechsten, E. and Hovden, J. (2008), \u201cImplementation and effectiveness of organizational information security measures\u201d, Information Management & Computer Security, Vol. 16 No. 4, pp. 377\u201097.","DOI":"10.1108\/09685220810908796"},{"key":"key2022020920252750100_b56","doi-asserted-by":"crossref","unstructured":"Haugen, S. and Roger Selin, J. (1999), \u201cIdentifying and controlling computer crime and employee fraud\u201d, Industrial Management & Data Systems, Vol. 99 No. 8, pp. 340\u20104.","DOI":"10.1108\/02635579910262544"},{"key":"key2022020920252750100_b57","doi-asserted-by":"crossref","unstructured":"Higgins, H.N. (1999), \u201cCorporate system security: towards an integrated management approach\u201d, Information Management & Computer Security, Vol. 7 No. 5, pp. 217\u201022.","DOI":"10.1108\/09685229910292817"},{"key":"key2022020920252750100_b58","doi-asserted-by":"crossref","unstructured":"Hinde, S. (2003), \u201cThe law, cybercrime, risk assessment and cyber protection\u201d, Computers & Security, Vol. 22 No. 2, pp. 90\u20105.","DOI":"10.1016\/S0167-4048(03)00203-7"},{"key":"key2022020920252750100_b59","doi-asserted-by":"crossref","unstructured":"Hoecht, A. and Trott, P. (2006), \u201cOutsourcing, information leakage and the risk of losing technology\u2010based competencies\u201d, European Business Review, Vol. 18 No. 5, pp. 395\u2010412.","DOI":"10.1108\/09555340610686967"},{"key":"key2022020920252750100_b60","doi-asserted-by":"crossref","unstructured":"Jagersma, P.K. and Gorp, D.M.V. (2007), \u201cRedefining the paradigm of global competition: offshoring of service firms\u201d, Business Strategy Series, Vol. 8 No. 1, pp. 35\u201042.","DOI":"10.1108\/17515630710686860"},{"key":"key2022020920252750100_b136","doi-asserted-by":"crossref","unstructured":"Jandhyala, S. (2008), \u201cDe facto property right protection and MNC location choices\u201d, Academy of Management Proceedings, pp. 1\u20106.","DOI":"10.5465\/ambpp.2008.33636438"},{"key":"key2022020920252750100_b63","doi-asserted-by":"crossref","unstructured":"Javorcik, B.S. (2004), \u201cThe composition of foreign direct investment and protection of intellectual property rights: evidence from transition economies\u201d, European Economic Review, Vol. 48 No. 1, pp. 39\u201062.","DOI":"10.1016\/S0014-2921(02)00257-X"},{"key":"key2022020920252750100_b64","doi-asserted-by":"crossref","unstructured":"Kakabadse, N. and Kakabadse, A. (2000), \u201cCritical review \u2013 outsourcing: a paradigm shift\u201d, Journal of Management Development, Vol. 19 No. 8, pp. 670\u2010728.","DOI":"10.1108\/02621710010377508"},{"key":"key2022020920252750100_b137","doi-asserted-by":"crossref","unstructured":"Kankanhalli, A., Teo, H.\u2010H., Tan, B.C.Y. and Wei, K.\u2010K. (2003), \u201cAn integrative study of information systems security effectiveness\u201d, International Journal of Information Management, Vol. 23 No. 2, pp. 139\u201054.","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"key2022020920252750100_b66","doi-asserted-by":"crossref","unstructured":"Karabulut, Y., Kerschbaum, F., Massacci, F., Robinson, P. and Yautsiukhin, A. (2007), \u201cSecurity and trust in IT business outsourcing: a manifesto\u201d, Electronic Notes in Theoretical Computer Science, Vol. 179 No. 6, pp. 47\u201058.","DOI":"10.1016\/j.entcs.2006.08.030"},{"key":"key2022020920252750100_b67","doi-asserted-by":"crossref","unstructured":"Karyda, M., Mitrou, E. and Quirchmayr, G. (2006), \u201cA framework for outsourcing IS\/IT security services\u201d, Information Management & Computer Security, Vol. 14 No. 5, pp. 402\u201015.","DOI":"10.1108\/09685220610707421"},{"key":"key2022020920252750100_b70","doi-asserted-by":"crossref","unstructured":"Kennedy, G. and Clark, D. (2006), \u201cOutsourcing to China \u2013 risks and benefit\u201d, Computer Law & Security Report, Vol. 22 No. 3, pp. 250\u20103.","DOI":"10.1016\/j.clsr.2006.03.006"},{"key":"key2022020920252750100_b71","doi-asserted-by":"crossref","unstructured":"Khalfan, A.M. (2004), \u201cInformation security considerations in IS\/IT outsourcing projects: a descriptive case study of two sectors\u201d, International Journal of Information Management, Vol. 24 No. 1, pp. 29\u201042.","DOI":"10.1016\/j.ijinfomgt.2003.12.001"},{"key":"key2022020920252750100_b73","doi-asserted-by":"crossref","unstructured":"Lacity, M.C., Willcocks, L.P. and Rottman, J.W. (2008), \u201cGlobal outsourcing of back office services: lessons, trends, and enduring challenges\u201d, Strategic Outsourcing: An International Journal, Vol. 1 No. 1, pp. 13\u201034.","DOI":"10.1108\/17538290810857457"},{"key":"key2022020920252750100_b76","doi-asserted-by":"crossref","unstructured":"Lee, K.O. (1996), \u201cIT outsourcing contracts: practical issues for management\u201d, Industrial Management & Data Systems, Vol. 96 No. 1, pp. 15\u201020.","DOI":"10.1108\/02635579610107684"},{"key":"key2022020920252750100_b138","doi-asserted-by":"crossref","unstructured":"Leem, C.S. and Lee, H.J. (2004), \u201cDevelopment of certification and audit processes of application service provider for IT outsourcing\u201d, Technovation, Vol. 24 No. 1, pp. 63\u201071.","DOI":"10.1016\/S0166-4972(03)00145-7"},{"key":"key2022020920252750100_b78","doi-asserted-by":"crossref","unstructured":"Lewin, A.Y. and Peeters, C. (2006), \u201cOffshoring work: business hype or the onset of fundamental transformation?\u201d, Long Range Planning, Vol. 39 No. 3, pp. 221\u201039.","DOI":"10.1016\/j.lrp.2006.07.009"},{"key":"key2022020920252750100_b79","doi-asserted-by":"crossref","unstructured":"Liu, F. and Hai, H.L. (2005), \u201cThe voting analytic hierarchy process method for selecting supplier\u201d, International Journal of Production Economics, Vol. 97 No. 3, pp. 308\u201017.","DOI":"10.1016\/j.ijpe.2004.09.005"},{"key":"key2022020920252750100_b80","doi-asserted-by":"crossref","unstructured":"Loch, K.D., Carr, H.H. and Warkentin, M.E. (1992), \u201cThreats to information systems: today's reality yesterday's understanding\u201d, MIS Quarterly, Vol. 16 No. 2, pp. 173\u201086.","DOI":"10.2307\/249574"},{"key":"key2022020920252750100_b148","unstructured":"McDermott, R.E., Mikulak, R.J. and Beauregard, M.R. (2008), The Basics of FMEA, Taylor and Francis, New York, NY."},{"key":"key2022020920252750100_b139","doi-asserted-by":"crossref","unstructured":"McGaughey, S.L., Liesch, P.W. and Poulson, D. (2000), \u201cAn unconventional approach to intellectual property protection: the case of an Australian firm transferring shipbuilding technologies to China\u201d, Journal of World Business, Vol. 35 No. 1, pp. 1\u201020.","DOI":"10.1016\/S1090-9516(99)00031-0"},{"key":"key2022020920252750100_b81","doi-asserted-by":"crossref","unstructured":"Ma, Q., Johnston, A.C. and Michael Pearson, J. (2008), \u201cInformation security management objectives and practices: a parsimonious framework\u201d, Information Management & Computer Security, Vol. 16 No. 3, pp. 251\u201070.","DOI":"10.1108\/09685220810893207"},{"key":"key2022020920252750100_b82","doi-asserted-by":"crossref","unstructured":"Mahnke, V., Wareham, J. and Bjorn\u2010Andersen, N. (2008), \u201cOffshore middlemen: transnational intermediation in technology sourcing\u201d, Journal of Information Technology, No. 23, pp. 18\u201030.","DOI":"10.1057\/palgrave.jit.2000124"},{"key":"key2022020920252750100_b83","doi-asserted-by":"crossref","unstructured":"Manning, S., Massini, S. and Lewin, A.Y. (2008), \u201cA dynamic perspective on next\u2010generation offshoring: the global sourcing of science and engineering talent\u201d, Academy of Management Perspectives, Vol. 22 No. 3, pp. 35\u201054.","DOI":"10.5465\/amp.2008.34587994"},{"key":"key2022020920252750100_b84","doi-asserted-by":"crossref","unstructured":"May, A.S. (1998), \u201cBusiness process outsourcing: a new test of management competence\u201d, Career Development International, Vol. 3 No. 4, pp. 136\u201041.","DOI":"10.1108\/13620439810214367"},{"key":"key2022020920252750100_b86","doi-asserted-by":"crossref","unstructured":"Metters, R. (2008), \u201cA typology of offshoring and outsourcing in electronically transmitted services\u201d, Journal of Operations Management, Vol. 26 No. 2, pp. 198\u2010211.","DOI":"10.1016\/j.jom.2007.02.004"},{"key":"key2022020920252750100_b87","unstructured":"Monczka, R.M., Carter, J.R., Markham, W.J., Blascovich, J. and Slaight, T. (2005), Outsourcing Strategically for Sustainable Competitive Advantage, CASP\/AT Kearney, Binghamton, NY."},{"key":"key2022020920252750100_b91","doi-asserted-by":"crossref","unstructured":"Nassimbeni, G. and Sartor, M. (2005), \u201cThe internationalisation of local manufacturing systems: evidences from the Italian chair district\u201d, Production Planning & Control, Vol. 16 No. 5, pp. 470\u20108.","DOI":"10.1080\/09537280500110912"},{"key":"key2022020920252750100_b90","doi-asserted-by":"crossref","unstructured":"Nassimbeni, G. and Sartor, M. (2006), \u201cInternational purchasing offices in China\u201d, Production Planning & Control, Vol. 17 No. 5, pp. 494\u2010507.","DOI":"10.1080\/09537280600768239"},{"key":"key2022020920252750100_b89","doi-asserted-by":"crossref","unstructured":"Nassimbeni, G. and Sartor, M. (2007), \u201cSourcing in China: a typology\u201d, International Journal of Production Economics, Vol. 107 No. 2, pp. 333\u201049.","DOI":"10.1016\/j.ijpe.2006.09.011"},{"key":"key2022020920252750100_b92","doi-asserted-by":"crossref","unstructured":"Nicholson, B., Jones, J. and Espenlaub, S. (2006), \u201cTransaction costs and control of outsourced accounting: case evidence from India\u201d, Management Accounting Research, Vol. 17 No. 3, pp. 238\u201058.","DOI":"10.1016\/j.mar.2006.05.002"},{"key":"key2022020920252750100_b140","doi-asserted-by":"crossref","unstructured":"Norman, P.M. (2001), \u201cAre your secrets safe? Knowledge protection in strategic alliances\u201d, Business Horizons, Vol. 44 No. 6, pp. 51\u201060.","DOI":"10.1016\/S0007-6813(01)80073-2"},{"key":"key2022020920252750100_b94","unstructured":"Olsen, K.B. (2006), \u201cProductivity impacts of offshoring and outsourcing: a review\u201d, STI Working Paper 2006\/1, OECD Directorate for Science, Technology and Industry, Paris."},{"key":"key2022020920252750100_b95","doi-asserted-by":"crossref","unstructured":"Oxley, J.E. (1999), \u201cInstitutional environment and the mechanisms of governance: the impact of intellectual property protection on the structure of inter\u2010firm alliances\u201d, Journal of Economic Behaviour and Organization, Vol. 38 No. 3, pp. 283\u2010309.","DOI":"10.1016\/S0167-2681(99)00011-6"},{"key":"key2022020920252750100_b96","doi-asserted-by":"crossref","unstructured":"Pai, A.K. and Basu, S. (2007), \u201cOffshore technology outsourcing: overview of management and legal issues\u201d, Business Process Management Journal, Vol. 13 No. 1, pp. 21\u201046.","DOI":"10.1108\/14637150710721113"},{"key":"key2022020920252750100_b97","doi-asserted-by":"crossref","unstructured":"Peltier, T. and Edison, D. (1996), \u201cThe risk of allowing outside staff access to your information system\u201d, Information Security Technical Report, Vol. 1 No. 3, pp. 18\u201028.","DOI":"10.1016\/S1363-4127(97)83015-4"},{"key":"key2022020920252750100_b98","doi-asserted-by":"crossref","unstructured":"Pemble, M. (2004), \u201cTransferring business and support functions: the information security risks of outsourcing and off\u2010shoring: (a beginner's guide to avoiding the abrogation of responsibility)\u201d, Computer Fraud & Security, Vol. 2004 No. 12, pp. 5\u20109.","DOI":"10.1016\/S1361-3723(05)70183-4"},{"key":"key2022020920252750100_b99","doi-asserted-by":"crossref","unstructured":"Pepper, B. (1996), \u201cSecurity service level agreements for outsourced security functions\u201d, Information Security Technical Report, Vol. 1 No. 3, pp. 48\u201050.","DOI":"10.1016\/S1363-4127(97)83019-1"},{"key":"key2022020920252750100_b100","doi-asserted-by":"crossref","unstructured":"Platz, L.A. and Temponi, C. (2007), \u201cDefining the most desirable outsourcing contract between customer and vendor\u201d, Management Decision, Vol. 45 No. 10, pp. 1656\u201066.","DOI":"10.1108\/00251740710838013"},{"key":"key2022020920252750100_b101","doi-asserted-by":"crossref","unstructured":"Posthumus, S. and von Solms, R. (2004), \u201cA framework for the governance of information security\u201d, Computers & Security, Vol. 23 No. 8, pp. 638\u201046.","DOI":"10.1016\/j.cose.2004.10.006"},{"key":"key2022020920252750100_b102","doi-asserted-by":"crossref","unstructured":"Power, M., Bonifazi, C. and Desouza, K.C. (2004), \u201cThe ten outsourcing traps to avoid\u201d, Journal of Business Strategy, Vol. 25 No. 2, pp. 37\u201042.","DOI":"10.1108\/02756660410525399"},{"key":"key2022020920252750100_b103","doi-asserted-by":"crossref","unstructured":"Razzaque, M.A. and Sheng, C.C. (1998), \u201cOutsourcing of logistics functions: a literature survey\u201d, International Journal of Physical Distribution & Logistics Management, Vol. 28 No. 2, pp. 89\u2010107.","DOI":"10.1108\/09600039810221667"},{"key":"key2022020920252750100_b104","doi-asserted-by":"crossref","unstructured":"Rebernik, M. and Bradac, B. (2006), \u201cCooperation and opportunistic behaviour in transformational outsourcing\u201d, Kybernetes, Vol. 35 Nos 7\/8, pp. 1005\u201013.","DOI":"10.1108\/03684920610675058"},{"key":"key2022020920252750100_b141","doi-asserted-by":"crossref","unstructured":"Sanderson, E. and Forcht, K.A. (1996), \u201cInformation security in business environments\u201d, Information Management & Computer Security, Vol. 4 No. 1, pp. 32\u20107.","DOI":"10.1108\/09685229610114187"},{"key":"key2022020920252750100_b107","doi-asserted-by":"crossref","unstructured":"Schniederjans, M.J. and Zuckweiler, K.M. (2004), \u201cA quantitative approach to the outsourcing\u2010insourcing decision in an international context\u201d, Management Decision, Vol. 42 No. 8, pp. 974\u201086.","DOI":"10.1108\/00251740410555461"},{"key":"key2022020920252750100_b149","doi-asserted-by":"crossref","unstructured":"Scipioni, A., Saccarola, G., Centazzo, A. and Arena, F. (2002), \u201cFMEA methodology design, implementation and integration with HACCP system in a food company\u201d, Food Control, Vol. 13 No. 8, pp. 495\u2010501.","DOI":"10.1016\/S0956-7135(02)00029-4"},{"key":"key2022020920252750100_b150","doi-asserted-by":"crossref","unstructured":"Segismundo, A. and Cauchick, A. (2008), \u201cFailure mode and effects analysis (FMEA) in the context of risk management in new product development: a case study in an automotive company\u201d, International Journal of Quality & Reliability Management, Vol. 25 No. 9, pp. 899\u2010912.","DOI":"10.1108\/02656710810908061"},{"key":"key2022020920252750100_b108","doi-asserted-by":"crossref","unstructured":"Sen, F. and Shiel, M. (2006), \u201cFrom business process outsourcing (BPO) to knowledge process outsourcing (KPO): some issues\u201d, Human Systems Management, Vol. 25 No. 2, pp. 145\u201055.","DOI":"10.3233\/HSM-2006-25207"},{"key":"key2022020920252750100_b109","doi-asserted-by":"crossref","unstructured":"Sherwood, J. (1997), \u201cManaging security for outsourcing contracts\u201d, Computers & Security, Vol. 16 No. 7, pp. 603\u20109.","DOI":"10.1016\/S0167-4048(97)80797-3"},{"key":"key2022020920252750100_b110","doi-asserted-by":"crossref","unstructured":"Simmonds, D. and Gibson, R. (2008), \u201cA model for outsourcing HRD\u201d, Journal of European Industrial Training, Vol. 32 No. 1, pp. 4\u201018.","DOI":"10.1108\/03090590810846539"},{"key":"key2022020920252750100_b111","doi-asserted-by":"crossref","unstructured":"Siponen, M.T. (2000), \u201cA conceptual foundation for organizational information security awareness\u201d, Information Management & Computer Security, Vol. 8 No. 1, pp. 31\u201041.","DOI":"10.1108\/09685220010371394"},{"key":"key2022020920252750100_b142","doi-asserted-by":"crossref","unstructured":"Spinello, R.A. (2007), \u201cIntellectual property rights\u201d, Library Hi Tech, Vol. 25 No. 1, pp. 12\u201022.","DOI":"10.1108\/07378830710735821"},{"key":"key2022020920252750100_b113","doi-asserted-by":"crossref","unstructured":"Spurling, P. (1995), \u201cPromoting security awareness and commitment\u201d, Information Management & Computer Security, Vol. 3 No. 2, pp. 20\u20106.","DOI":"10.1108\/09685229510792988"},{"key":"key2022020920252750100_b151","unstructured":"Stamatis, D.H. (2003), Failuire Mode Effect Analysis, Quality Press, Milwaukee, WI."},{"key":"key2022020920252750100_b114","doi-asserted-by":"crossref","unstructured":"Stephenson, P. (2006), \u201cEnsuring consistent security implementation within a distributed and federated environment\u201d, Computers & Security, Vol. 2006 No. 11, pp. 12\u201014.","DOI":"10.1016\/S1361-3723(06)70441-9"},{"key":"key2022020920252750100_b115","unstructured":"Stevenson, W.J. (2007), Operations Management, McGraw\u2010Hill, New York, NY, pp. 504\u201037."},{"key":"key2022020920252750100_b117","doi-asserted-by":"crossref","unstructured":"Stringfellow, A., Teagarden, M.B. and Nie, W. (2008), \u201cInvisible costs in offshoring services work\u201d, Journal of Operations Management, Vol. 26 No. 2, pp. 164\u201079.","DOI":"10.1016\/j.jom.2007.02.009"},{"key":"key2022020920252750100_b143","doi-asserted-by":"crossref","unstructured":"Tafti, M.H.A. (2005), \u201cRisks factors associated with offshore IT outsourcing\u201d, Industrial Management & Data Systems, Vol. 105 No. 5, pp. 549\u201060.","DOI":"10.1108\/02635570510599940"},{"key":"key2022020920252750100_b119","doi-asserted-by":"crossref","unstructured":"Taylor, P. and Bain, P. (2008), \u201cUnited by a common language? Trade union responses in the UK and India to call centre offshoring\u201d, Antipode, Vol. 40 No. 1, pp. 131\u201054.","DOI":"10.1111\/j.1467-8330.2008.00567.x"},{"key":"key2022020920252750100_b120","doi-asserted-by":"crossref","unstructured":"Thomson, M.E. and von Solms, R. (1998), \u201cInformation security awareness: educating your users effectively\u201d, Information Management & Computer Security, Vol. 6 No. 4, pp. 167\u201073.","DOI":"10.1108\/09685229810227649"},{"key":"key2022020920252750100_b144","doi-asserted-by":"crossref","unstructured":"Tickle, I. (2002), \u201cData integrity assurance in a layered security strategy\u201d, Computer Fraud & Security, Vol. 2002 No. 10, pp. 9\u201013.","DOI":"10.1016\/S1361-3723(02)01011-4"},{"key":"key2022020920252750100_b145","doi-asserted-by":"crossref","unstructured":"Tran, E. and Atkinson, M. (2002), \u201cSecurity of personal data across national borders\u201d, Information Management & Computer Security, Vol. 10 No. 5, pp. 237\u201041.","DOI":"10.1108\/09685220210446588"},{"key":"key2022020920252750100_b123","doi-asserted-by":"crossref","unstructured":"Tse, D.K., Pan, Y. and Au, K.Y. (1997), \u201cHow MNCs choose entry modes and form alliances: the China experience\u201d, Journal of International Business Studies, Vol. 28 No. 4, pp. 779\u2010805.","DOI":"10.1057\/palgrave.jibs.8490119"},{"key":"key2022020920252750100_b125","doi-asserted-by":"crossref","unstructured":"Wang, G., Huang, S.H. and Dismukes, J.P. (2004), \u201cProduct\u2010driven supply chain selection using integrated multi\u2010criteria decision\u2010making methodology\u201d, International Journal of Production Economics, Vol. 91 No. 1, pp. 1\u201015.","DOI":"10.1016\/S0925-5273(03)00221-4"},{"key":"key2022020920252750100_b126","doi-asserted-by":"crossref","unstructured":"Wright, T. (2005), \u201cOutsourcing \u2013 financial services authority report on offshoring\u201d, Computer Law & Security Report, Vol. 21 No. 6, pp. 500\u20104.","DOI":"10.1016\/j.clsr.2005.08.008"},{"key":"key2022020920252750100_b146","doi-asserted-by":"crossref","unstructured":"Yang, D. (2005), \u201cCulture matters to multinationals' intellectual property businesses\u201d, Journal of World Business, Vol. 40 No. 3, pp. 281\u2010301.","DOI":"10.1016\/j.jwb.2005.05.005"},{"key":"key2022020920252750100_b129","doi-asserted-by":"crossref","unstructured":"Zeynep, A. and Masini, A. (2008), \u201cEffective strategies for internal outsourcing and offshoring of business services: an empirical investigation\u201d, Journal of Operations Management, Vol. 26 No. 2, pp. 239\u201056.","DOI":"10.1016\/j.jom.2007.02.003"},{"key":"key2022020920252750100_b130","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Hsu, K. and Lillie, J. (2001), \u201cOutsourcing \u2013 a strategic move: the process and the ingredients for success\u201d, Management Decision, Vol. 39 No. 5, pp. 373\u20108.","DOI":"10.1108\/EUM0000000005473"},{"key":"key2022020920252750100_frd1","unstructured":"Antonucci, Y.L., Lordi, F.C. and Tucker, J.J. III (1998), \u201cThe pros and cons of IT oursourcing\u201d, Journal of Accountancy, Vol. 185 No. 6, pp. 26\u201031."},{"key":"key2022020920252750100_frd2","doi-asserted-by":"crossref","unstructured":"Bahli, B. and Rivard, S. (2005), \u201cValidating measures of information technology outsourcing risk factors\u201d, Omega, Vol. 33 No. 2, pp. 175\u201087.","DOI":"10.1016\/j.omega.2004.04.003"},{"key":"key2022020920252750100_frd3","doi-asserted-by":"crossref","unstructured":"Bunyaratavej, K., Hahn, E.D. and Doh, J.P. (2008), \u201cMultinational investment and host country development: location efficiencies for services offshoring\u201d, Journal of World Business, Vol. 43 No. 2, pp. 227\u201042.","DOI":"10.1016\/j.jwb.2007.11.001"},{"key":"key2022020920252750100_frd4","doi-asserted-by":"crossref","unstructured":"Burns, B. (2008), \u201cOffshoring: secure or open to the praying mantis?\u201d, Strategic Outsourcing: An International Journal, Vol. 1 No. 1, pp. 77\u201086.","DOI":"10.1108\/17538290810857493"},{"key":"key2022020920252750100_frd5","doi-asserted-by":"crossref","unstructured":"Carmel, E. and Abbott, P. (2007), \u201cWhy \u2018nearshore\u2019 means that distance matters\u201d, Communications of the ACM, Vol. 50 No. 10, pp. 40\u20106.","DOI":"10.1145\/1290958.1290959"},{"key":"key2022020920252750100_frd6","doi-asserted-by":"crossref","unstructured":"Chandrasekhar, C.P. and Jayati, G. (2006), \u201cIT\u2010driven offshoring: the exaggerated \u2018development opportunity\u2019\u201d, Human Systems Management, Vol. 25 No. 2, pp. 91\u2010101.","DOI":"10.3233\/HSM-2006-25202"},{"key":"key2022020920252750100_frd7","unstructured":"Chiarini, A. and Vicenza, M. (2004), Strumenti statistici avanzati per la gestione della qualit\u00e0. Affidabilit\u00e0, FMEA, FTA,SPC,DOE, Franco Angeli, Milano."},{"key":"key2022020920252750100_frd8","doi-asserted-by":"crossref","unstructured":"Chua, A.L. and Pan, S.L. (2008), \u201cKnowledge transfer and organizational learning in IS offshore sourcing\u201d, Omega, Vol. 36 No. 2, pp. 267\u201081.","DOI":"10.1016\/j.omega.2006.06.008"},{"key":"key2022020920252750100_frd9","doi-asserted-by":"crossref","unstructured":"De Boer, L., Gaytan, J. and Arroyo, P. (2006), \u201cA satisficing model of outsourcing\u201d, Supply Chain Management: An International Journal, Vol. 11 No. 5, pp. 444\u201055.","DOI":"10.1108\/13598540610682462"},{"key":"key2022020920252750100_frd10","doi-asserted-by":"crossref","unstructured":"Geishecker, I. (2008), \u201cThe impact of international outsourcing on individual employment security: a micro\u2010level analysis\u201d, Labour Economics, Vol. 15 No. 3, pp. 291\u2010314.","DOI":"10.1016\/j.labeco.2007.06.015"},{"key":"key2022020920252750100_frd11","doi-asserted-by":"crossref","unstructured":"Grote, M.H. and T\u00e4ube, F.A. (2007), \u201cWhen outsourcing is not an option: international relocation of investment bank research \u2013 or isn't it?\u201d, Journal of International Management, Vol. 13 No. 1, pp. 57\u201077.","DOI":"10.1016\/j.intman.2006.09.007"},{"key":"key2022020920252750100_frd12","doi-asserted-by":"crossref","unstructured":"Handley, S.M. and Benton, W.C. Jr (2008), \u201cUnlocking the business outsourcing process model\u201d, Journal of Operations Management, Vol. 27 No. 5.","DOI":"10.1016\/j.jom.2008.11.002"},{"key":"key2022020920252750100_frd13","doi-asserted-by":"crossref","unstructured":"Jahns, C., Hartmann, E. and Bals, L. (2006), \u201cOffshoring: dimensions and diffusion of a new business concept\u201d, Journal of Purchasing & Supply Management, Vol. 12 No. 4, pp. 218\u201031.","DOI":"10.1016\/j.pursup.2006.10.001"},{"key":"key2022020920252750100_frd14","doi-asserted-by":"crossref","unstructured":"Kedia, B.L. and Lahiri, S. (2007), \u201cInternational outsourcing of services: a partnership model\u201d, Journal of International Management, Vol. 13 No. 1, pp. 22\u201037.","DOI":"10.1016\/j.intman.2006.09.006"},{"key":"key2022020920252750100_frd15","doi-asserted-by":"crossref","unstructured":"Kedia, B.L. and Mukherjee, D. (2008), \u201cUnderstanding offshoring: a research framework based on disintegration, location and externalization advantages\u201d, Journal of World Business, Vol. 44 No. 3, pp. 250\u201061.","DOI":"10.1016\/j.jwb.2008.08.005"},{"key":"key2022020920252750100_frd16","doi-asserted-by":"crossref","unstructured":"Kshetri, N. (2007), \u201cInstitutional factors affecting offshore business process and information technology outsourcing\u201d, Journal of International Management, Vol. 13 No. 1, pp. 38\u201056.","DOI":"10.1016\/j.intman.2006.05.003"},{"key":"key2022020920252750100_frd17","doi-asserted-by":"crossref","unstructured":"Lau, K.H. and Zhang, J. (2006), \u201cDrivers and obstacles of outsourcing practices in China\u201d, International Journal of Physical Distribution & Logistics Management, Vol. 36 No. 10, pp. 776\u201092.","DOI":"10.1108\/09600030610714599"},{"key":"key2022020920252750100_frd18","doi-asserted-by":"crossref","unstructured":"Leach, J. and Zergo, C.B. (1995), \u201cSecurity considerations of network outsourcing\u201d, Network Security, Vol. 1995 No. 11, pp. 10\u201014.","DOI":"10.1016\/1353-4858(96)89765-0"},{"key":"key2022020920252750100_frd19","doi-asserted-by":"crossref","unstructured":"Shaver, J.M. (1998), \u201cAccounting for endogeneity when assessing strategy performance: does entry mode choice affect FDI survival?\u201d, Management Science, Vol. 44 No. 4, pp. 571\u201085.","DOI":"10.1287\/mnsc.44.4.571"},{"key":"key2022020920252750100_frd20","doi-asserted-by":"crossref","unstructured":"Stratman, J.K. (2008), \u201cFacilitating offshoring with enterprise technologies: reducing operational friction in the governance and production of services\u201d, Journal of Operations Management, Vol. 26 No. 2, pp. 275\u201087.","DOI":"10.1016\/j.jom.2007.02.006"},{"key":"key2022020920252750100_frd21","doi-asserted-by":"crossref","unstructured":"Varadarajan, R. (2008), \u201cOutsourcing: think more expansively\u201d, Journal of Business Research, Vol. 62 No. 11.","DOI":"10.1016\/j.jbusres.2008.09.006"},{"key":"key2022020920252750100_frd22","doi-asserted-by":"crossref","unstructured":"Youngdahl, W. and Ramaswamy, K. (2008), \u201cOffshoring knowledge and service work: a conceptual model and research agenda\u201d, Journal of Operations Management, Vol. 26 No. 2, pp. 212\u201021.","DOI":"10.1016\/j.jom.2007.02.007"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571211210059","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211210059\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211210059\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:40Z","timestamp":1753400320000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/112\/3\/405-440\/183392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,16]]},"references-count":134,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3,16]]}},"alternative-id":["10.1108\/02635571211210059"],"URL":"https:\/\/doi.org\/10.1108\/02635571211210059","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2012,3,16]]}}}