{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T19:34:32Z","timestamp":1771011272701,"version":"3.50.1"},"reference-count":80,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,12,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper aims to offer the results of a survey about information systems (IS) outsourcing.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The methodology is a questionnaire survey of 357 IS managers in Spanish firms.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>IS outsourcing is a widespread activity that has been growing on a worldwide basis in recent years. The main outsourcing success factors for large Spanish firms are, in order of priority, the provider's understanding of clients' objectives, choosing the right provider, and the client's clear idea of what is sought through outsourcing.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Identifies the most important outsourcing success factors from the client point of view and present the relationships they have with certain characteristics of the firm like, for instance, its size.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685220510627287","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T18:09:20Z","timestamp":1168884560000},"page":"399-418","source":"Crossref","is-referenced-by-count":27,"title":["Information systems outsourcing success factors: a review and some results"],"prefix":"10.1108","volume":"13","author":[{"given":"Reyes","family":"Gonzalez","sequence":"first","affiliation":[]},{"given":"Jose","family":"Gasco","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Llopis","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012920402468300_b1","doi-asserted-by":"crossref","unstructured":"Alner, M. (2001), \u201cThe effects of outsourcing on information security\u201d, Information Systems Security, Vol. 10 No. 2, pp. 35\u201043.","DOI":"10.1201\/1086\/43314.10.2.20010506\/31401.6"},{"key":"key2022012920402468300_b2","doi-asserted-by":"crossref","unstructured":"Ang, S. and Straub, D. (1998), \u201cProduction and transaction economies and is outsourcing: a study of the US Bank industry\u201d, MIS Quarterly, Vol. 22 No. 4, pp. 535\u201052.","DOI":"10.2307\/249554"},{"key":"key2022012920402468300_b3","doi-asserted-by":"crossref","unstructured":"Arnett, K.P. and Jones, M.C. (1994), \u201cFirms that choose outsourcing: a profile\u201d, Information & Management, Vol. 26 No. 4, pp. 179\u201088.","DOI":"10.1016\/0378-7206(94)90091-4"},{"key":"key2022012920402468300_b4","doi-asserted-by":"crossref","unstructured":"Aubert, B.A., Rivard, S. and Patry, M.A. (1996), \u201cTransaction cost approach to outsourcing behavior: some empirical evidence\u201d, Information & Management, Vol. 30 No. 2, pp. 51\u201064.","DOI":"10.1016\/0378-7206(95)00045-3"},{"key":"key2022012920402468300_b5","doi-asserted-by":"crossref","unstructured":"Aubert, B.A., Rivard, S. and Patry, M.A. (2004), \u201cA transaction cost model of IS outsourcing\u201d, Information & Management, Vol. 41 No. 7, pp. 921\u201032.","DOI":"10.1016\/j.im.2003.09.001"},{"key":"key2022012920402468300_b6","doi-asserted-by":"crossref","unstructured":"Baldwing, L.P., Irani, Z. and Love, P. (2001), \u201cOutsourcing information systems: drawing lessons from a banking case study\u201d, European Journal of Information Systems, Vol. 10 No. 1, pp. 15\u201024.","DOI":"10.1057\/palgrave.ejis.3000372"},{"key":"key2022012920402468300_b7","unstructured":"Barth\u00e9lemy, J. (2001), \u201cThe hidden cost of IT outsourcing\u201d, MIT Sloan Management Review, Vol. 42 No. 3, pp. 60\u20109."},{"key":"key2022012920402468300_b8","doi-asserted-by":"crossref","unstructured":"Behara, R.S., Gundersen, D.E. and Capozzoli, E.A. (1995), \u201cTrends in information systems outsourcing\u201d, International Journal of Purchasing and Materials Management, Vol. 31 No. 2, pp. 46\u201051.","DOI":"10.1111\/j.1745-493X.1995.tb00202.x"},{"key":"key2022012920402468300_b9","doi-asserted-by":"crossref","unstructured":"Brabander, B. and Thiers, G. (1984), \u201cSuccessful information system development in relation to situational factors which affect effective communication between MIS\u2010users and EDP\u2010specialists\u201d, Management Science, Vol. 30 No. 2, pp. 137\u201055.","DOI":"10.1287\/mnsc.30.2.137"},{"key":"key2022012920402468300_b10","doi-asserted-by":"crossref","unstructured":"Bryce, D.J. and Useem, M. (1998), \u201cThe impact of corporate outsourcing on company value\u201d, European Management Journal, Vol. 16 No. 6, pp. 635\u201043.","DOI":"10.1016\/S0263-2373(98)00040-1"},{"key":"key2022012920402468300_b11","doi-asserted-by":"crossref","unstructured":"Burn, J.M. and Ash, C. (2000), \u201cKnowledge management strategies for virtual organizations\u201d, Information Resources Management Journal, Vol. 13 No. 1, pp. 15\u201023.","DOI":"10.4018\/irmj.2000010102"},{"key":"key2022012920402468300_b12","unstructured":"Caldwell, B. (1996), \u201cThe new outsourcing partnership\u201d, Information Week, No. 585, pp. 50\u201064."},{"key":"key2022012920402468300_b13","doi-asserted-by":"crossref","unstructured":"Chen, Q. and Lin, B. (1998), \u201cGlobal outsourcing and its managerial implications\u201d, Human Systems Management, Vol. 17 No. 2, pp. 109\u201014.","DOI":"10.3233\/HSM-1998-17204"},{"key":"key2022012920402468300_b14","doi-asserted-by":"crossref","unstructured":"Ching, C.H., Holsapple, C.W. and Whinston, A.B. (1996), \u201cToward IT support for coordination in network organizations\u201d, Information & Management, Vol. 30 No. 4, pp. 179\u201099.","DOI":"10.1016\/0378-7206(95)00054-2"},{"key":"key2022012920402468300_b15","doi-asserted-by":"crossref","unstructured":"Clarck, T.D., Zmud, R.W. and McCray, G.E. (1995), \u201cThe outsourcing of information services: transforming the nature of business in the information industry\u201d, Journal of Information Technology, Vol. 10, pp. 221\u201037.","DOI":"10.1177\/026839629501000403"},{"key":"key2022012920402468300_b16","doi-asserted-by":"crossref","unstructured":"Claver, E., Gonzalez, R., Gasco, J. and Llopis, J. (2002), \u201cInformation systems outsourcing: reasons, reservations and success factors\u201d, Logistics Information Management, Vol. 15 No. 4, pp. 294\u2010308.","DOI":"10.1108\/09576050210436138"},{"key":"key2022012920402468300_b17","doi-asserted-by":"crossref","unstructured":"Collins, J.S. and Millen, R.A. (1995), \u201cInformation systems outsourcing by large American industrial firms: choices and impacts\u201d, Information Resources Management Journal, Vol. 8 No. 1, pp. 5\u201013.","DOI":"10.4018\/irmj.1995010101"},{"key":"key2022012920402468300_b18","doi-asserted-by":"crossref","unstructured":"Corbett, M.F. (1994), \u201cOutsourcing and the new IT executive. A trends report\u201d, Information Systems Management, Vol. 11 No. 4, pp. 19\u201022.","DOI":"10.1080\/07399019408964665"},{"key":"key2022012920402468300_b19","doi-asserted-by":"crossref","unstructured":"Currie, W.L. (1998), \u201cUsing multiple suppliers to mitigate the risk of IT outsourcing at ICI and Wessex water\u201d, Journal of Information Technology, Vol. 13 No. 3, pp. 169\u201080.","DOI":"10.1177\/026839629801300303"},{"key":"key2022012920402468300_b20","doi-asserted-by":"crossref","unstructured":"Currie, W.L. (2000), \u201cThe supply\u2010side of IT outsourcing: the trends towards mergers, acquisitions and joint ventures\u201d, International Journal of Physical Distribution & Logistics Management, Vol. 30 Nos 3\/4, pp. 238\u201054.","DOI":"10.1108\/09600030010325993"},{"key":"key2022012920402468300_b21","doi-asserted-by":"crossref","unstructured":"Currie, W.L. and Seltsikas, P. (2001), \u201cExploring the supply\u2010side of IT outsourcing: evaluating the emerging role of application service providers\u201d, European Journal of Information Systems, Vol. 10, pp. 123\u201034.","DOI":"10.1057\/palgrave.ejis.3000393"},{"key":"key2022012920402468300_b22","unstructured":"Diromualdo, A. and Gurbaxani, V. (1998), \u201cStrategic intent for IT outsourcing\u201d, Sloan Management Review, Vol. 39 No. 4, pp. 67\u201080."},{"key":"key2022012920402468300_b23","doi-asserted-by":"crossref","unstructured":"Dos Santos, B.L. (1989), \u201cInformation systems: similarities and differences across organizations\u201d, OMEGA, Vol. 17 No. 1, pp. 9\u201020.","DOI":"10.1016\/0305-0483(89)90015-7"},{"key":"key2022012920402468300_b24","doi-asserted-by":"crossref","unstructured":"Feeny, D.F., Edwards, B.R. and Simpson, K.M. (1992), \u201cUnderstanding the CEO\/CIO relationship\u201d, MIS Quarterly, Vol. 16 No. 4, pp. 435\u201048.","DOI":"10.2307\/249730"},{"key":"key2022012920402468300_b25","doi-asserted-by":"crossref","unstructured":"Fink, D. and Shoeib, A. (2003), \u201cAction: the most critical phase in outsourcing information technology\u201d, Logistics Information Management, Vol. 16 No. 5, pp. 302\u201011.","DOI":"10.1108\/09576050310499309"},{"key":"key2022012920402468300_b26","doi-asserted-by":"crossref","unstructured":"Georgantzas, N.C. (2001), \u201cVirtual enterprise networks: the fifth element of corporate governance\u201d, Human System Management, Vol. 20 No. 3, pp. 171\u201088.","DOI":"10.3233\/HSM-2001-20301"},{"key":"key2022012920402468300_b27","doi-asserted-by":"crossref","unstructured":"Grover, V., Cheon, M.J. and Teng, T.C. (1994), \u201cA descriptive study on the outsourcing of information systems functions\u201d, Information & Management, Vol. 27 No. 1, pp. 33\u201044.","DOI":"10.1016\/0378-7206(94)90100-7"},{"key":"key2022012920402468300_b28","doi-asserted-by":"crossref","unstructured":"Grover, V., Cheon, M.J. and Teng, T.C. (1996), \u201cThe effect of service quality and partnership on the outsourcing of information systems functions\u201d, Journal of Management Information Systems, Vol. 12 No. 4, pp. 89\u2010116.","DOI":"10.1080\/07421222.1996.11518102"},{"key":"key2022012920402468300_b29","doi-asserted-by":"crossref","unstructured":"Gupta, G. and Gupta, H. (1992), \u201cOutsourcing the IS function. Is it necessary for your organization?\u201d, Information Systems Management, Vol. 9 No. 3, pp. 44\u201050.","DOI":"10.1080\/10580539208906881"},{"key":"key2022012920402468300_b30","doi-asserted-by":"crossref","unstructured":"Hayes, D.C., Hunton, J.E. and Reck, J.J. (2000), \u201cInformation systems outsourcing announcements: investigating the impact on the market value of contract\u2010granting firms\u201d, Journal of Information Systems, Vol. 14 No. 2, pp. 109\u201025.","DOI":"10.2308\/jis.2000.14.2.109"},{"key":"key2022012920402468300_b31","doi-asserted-by":"crossref","unstructured":"Heeks, R. et al., (2001), \u201cSynching or sinking: global software outsourcing relationships\u201d, IEEE Software, Vol. 18 No. 2, pp. 54\u201060.","DOI":"10.1109\/52.914744"},{"key":"key2022012920402468300_b32","doi-asserted-by":"crossref","unstructured":"Hirschheim, R. and Dibbern, J. (2002), \u201cInformation systems outsourcing in the new economy \u2013 an introduction\u201d, in Hirschheim, R., Heinzl, A. and Dibbern, J. (Eds), Information Systems Outsourcing. Enduring Themes, Emergent Patterns and Future Directions, Springer, Berlin, pp. 3\u201023.","DOI":"10.1007\/978-3-662-04754-5_1"},{"key":"key2022012920402468300_b33","unstructured":"Huber, R.L. (1993), \u201cHow continental bank outsourced its \u2018Crown Jewels\u2019\u201d, Harvard Business Review, January\u2010February, pp. 121\u20109."},{"key":"key2022012920402468300_b34","unstructured":"Hurst, I. and Hanessian, B.G. (1995), \u201cNavigating IT channels: integrate or outsource?\u201d, The McKinsey Quarterly, No. 3, pp. 103\u201010."},{"key":"key2022012920402468300_b35","doi-asserted-by":"crossref","unstructured":"Jarvenpaa, S.L. and Ives, B. (1991), \u201cExecutive involvement and participation in the management of information technology\u201d, MIS Quarterly, Vol. 15 No. 2, pp. 205\u201027.","DOI":"10.2307\/249382"},{"key":"key2022012920402468300_b36","doi-asserted-by":"crossref","unstructured":"Judenberg, J. (1994), \u201cApplications maintenance outsourcing. An alternative to total outsourcing\u201d, Information Systems Management, Vol. 11 No. 4, pp. 34\u20108.","DOI":"10.1080\/07399019408964668"},{"key":"key2022012920402468300_b37","doi-asserted-by":"crossref","unstructured":"Jurison, J. (1995), \u201cThe role of risk and return in information technology outsourcing decisions\u201d, Journal of Information Technology, Vol. 10 No. 4, pp. 239\u201047.","DOI":"10.1177\/026839629501000404"},{"key":"key2022012920402468300_b38","unstructured":"Kanter, J. (1992), \u201cInformation literacy for the CEO\u201d, in Holtham, C. (Ed.), Executive Information Systems and Decision Support, Chapman and Hall, London, pp. 17\u201028."},{"key":"key2022012920402468300_b39","unstructured":"Kearney, T. (2000), \u201cWhy outsourcing is in\u201d, Strategic Finance, Vol. 81 No. 9, pp. 34\u20108."},{"key":"key2022012920402468300_b40","doi-asserted-by":"crossref","unstructured":"Kern, T. and Willcocks, L. (2000), \u201cExploring information technology outsourcing relationship: theory and practice\u201d, Journal of Strategic Information Systems, Vol. 9 No. 4, pp. 321\u201050.","DOI":"10.1016\/S0963-8687(00)00048-2"},{"key":"key2022012920402468300_b41","doi-asserted-by":"crossref","unstructured":"Kern, T. and Willcocks, L. (2002), \u201cExploring relationships in information technology outsourcing: the interaction approach\u201d, European Journal of Information Systems, Vol. 11 No. 1, pp. 3\u201019.","DOI":"10.1057\/palgrave.ejis.3000415"},{"key":"key2022012920402468300_b42","doi-asserted-by":"crossref","unstructured":"Kern, L.P., Willcocks, E. and Van Heck, E. (2002), \u201cThe winner's curse in IT outsourcing: strategies for avoiding relational trauma\u201d, California Management Review, Vol. 44 No. 2, pp. 47\u201069.","DOI":"10.2307\/41166122"},{"key":"key2022012920402468300_b43","doi-asserted-by":"crossref","unstructured":"King, W.R. (2001), \u201cDeveloping a sourcing strategy for IS: a behavioral decision process and framework\u201d, IEEE Transactions on Engineering Management, Vol. 48 No. 1, pp. 15\u201024.","DOI":"10.1109\/17.913162"},{"key":"key2022012920402468300_b44","doi-asserted-by":"crossref","unstructured":"Lacity, M. and Hirschheim, R. (1993a), \u201cImplementing information systems outsourcing: key issues and experiences of an early adopter\u201d, Journal of General Management, Vol. 19 No. 1, pp. 17\u201031.","DOI":"10.1177\/030630709301900102"},{"key":"key2022012920402468300_b45","unstructured":"Lacity, M. and Hirschheim, R. (1993b), \u201cThe information systems outsourcing bandwagon\u201d, Sloan Management Review, Vol. 35 No. 1, pp. 73\u201086."},{"key":"key2022012920402468300_b46","doi-asserted-by":"crossref","unstructured":"Lacity, M. and Willcocks, L. (1997), \u201cInformation systems sourcing: examining the privatization option in USA public administration\u201d, Information Systems Journal, Vol. 7, pp. 85\u2010108.","DOI":"10.1046\/j.1365-2575.1997.00010.x"},{"key":"key2022012920402468300_b47","doi-asserted-by":"crossref","unstructured":"Lacity, M. and Willcocks, L. (1998), \u201cAn empirical investigation of information technology sourcing practices: lessons from experience\u201d, MIS Quarterly, Vol. 22 No. 3, pp. 363\u2010408.","DOI":"10.2307\/249670"},{"key":"key2022012920402468300_b48","doi-asserted-by":"crossref","unstructured":"Lacity, M., Hirschheim, R. and Willcocks, L. (1994), \u201cRealizing outsourcing expectations. Incredible expectations, credible outcomes\u201d, Information Systems Management, Vol. 11 No. 4, pp. 7\u201018.","DOI":"10.1080\/07399019408964664"},{"key":"key2022012920402468300_b49","unstructured":"Lacity, M.C., Willcocks, L.P. and Feeny, D.F. (1996), \u201cThe value of selective sourcing\u201d, Sloan Management Review, Vol. 37 No. 3, pp. 13\u201025."},{"key":"key2022012920402468300_b50","doi-asserted-by":"crossref","unstructured":"Lee, J\u2010N. (2001), \u201cThe impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success\u201d, Information & Management, Vol. 38 No. 5, pp. 323\u201035.","DOI":"10.1016\/S0378-7206(00)00074-4"},{"key":"key2022012920402468300_b51","doi-asserted-by":"crossref","unstructured":"Lee, J\u2010N. and Kim, Y\u2010G. (1999), \u201cEffect of partnership quality on is outsourcing success: conceptual framework and empirical validation\u201d, Journal of Management Information Systems, Vol. 15 No. 4, pp. 29\u201061.","DOI":"10.1080\/07421222.1999.11518221"},{"key":"key2022012920402468300_b52","doi-asserted-by":"crossref","unstructured":"Loebbecke, C. and Jelassi, T. (1999), \u201cBusiness strategies and IT outsourcing: the case of Compunet AG\u201d, European Management Journal, Vol. 17 No. 6, pp. 615\u201024.","DOI":"10.1016\/S0263-2373(99)00052-3"},{"key":"key2022012920402468300_b53","doi-asserted-by":"crossref","unstructured":"Loh, L. and Venkatraman, N. (1992), \u201cDifusion of information technology outsourcing: influence sources and the Kodak effect\u201d, Information Systems Research, Vol. 3 No. 4, pp. 334\u201058.","DOI":"10.1287\/isre.3.4.334"},{"key":"key2022012920402468300_b54","unstructured":"McFarlan, F.W. and Nolan, R.L. (1995), \u201cHow to manage an IT outsourcing alliance\u201d, Sloan Management Review, Vol. 36 No. 2, pp. 8\u201023."},{"key":"key2022012920402468300_b55","doi-asserted-by":"crossref","unstructured":"McLellan, K., Marcolin, B. and Beamish, P. (1995), \u201cFinancial and strategic motivations behind IS outsourcing\u201d, Journal of Information Technology, Vol. 10 No. 4, pp. 299\u2010321.","DOI":"10.1177\/026839629501000409"},{"key":"key2022012920402468300_b56","doi-asserted-by":"crossref","unstructured":"Marchand, N. and Jacobsen, H\u2010A. (2001), \u201cAn economic model to study dependencies between independent software vendors and application service providers\u201d, Electronic Commerce Research, Vol. 1 No. 3, pp. 315\u201034.","DOI":"10.1023\/A:1011502306766"},{"key":"key2022012920402468300_b57","doi-asserted-by":"crossref","unstructured":"Martinsons, M.G. (1993), \u201cOutsourcing information systems: a strategic partnership with risk\u201d, Long Range Planning, Vol. 26 No. 3, pp. 18\u201025.","DOI":"10.1016\/0024-6301(93)90003-X"},{"key":"key2022012920402468300_b58","unstructured":"Moran, N. (1999), \u201cChange in sentiment over IT outsourcing\u201d, Financial Times Survey, 4 August, p. 1."},{"key":"key2022012920402468300_b59","doi-asserted-by":"crossref","unstructured":"Newsted, P.R., Huff, S.L. and Munro, M.C. (1998), \u201cSurvey instruments in information systems\u201d, MIS Quarterly, Vol. 22 No. 4, pp. 553\u20104.","DOI":"10.2307\/249555"},{"key":"key2022012920402468300_b60","doi-asserted-by":"crossref","unstructured":"Ngwenyama, O.K. and Bryson, N. (1999), \u201cMaking the information systems outsourcing decision: a transaction cost approach to analyzing outsourcing decisions problems\u201d, European Journal of Operational Research, Vol. 115 No. 2, pp. 315\u201067.","DOI":"10.1016\/S0377-2217(97)00171-9"},{"key":"key2022012920402468300_b61","doi-asserted-by":"crossref","unstructured":"Palvia, P.C. (1995), \u201cA dialectic view of information systems outsourcing: pros and cons\u201d, Information & Management, Vol. 29 No. 5, pp. 265\u201075.","DOI":"10.1016\/0378-7206(95)00030-9"},{"key":"key2022012920402468300_b62","doi-asserted-by":"crossref","unstructured":"Poppo, L. and Zenger, T. (1998), \u201cTesting alternative theories of the firm: transaction cost, knowledge\u2010based, and measurement explanations for make\u2010or\u2010buy decisions in information services\u201d, Strategic Management Journal, Vol. 19 No. 9, pp. 853\u201077.","DOI":"10.1002\/(SICI)1097-0266(199809)19:9<853::AID-SMJ977>3.0.CO;2-B"},{"key":"key2022012920402468300_b63","unstructured":"Rockart, J.F., Earl, M.J. and Ross, J.W. (1996), \u201cEight imperatives for the new IT organization\u201d, Sloan Management Review, Vol. 38 No. 1, pp. 43\u201055."},{"key":"key2022012920402468300_b64","unstructured":"Ross, J.W., Beath, C.M. and Goodhue, D.L. (1996), \u201cDevelop long\u2010term competitiveness through IT assets\u201d, Sloan Management Review, Vol. 38 No. 1, pp. 31\u201042."},{"key":"key2022012920402468300_b65","doi-asserted-by":"crossref","unstructured":"Saunders, C., Gebelt, M. and Hu, Q. (1997), \u201cAchieving success in information systems outsourcing\u201d, California Management Review, Vol. 39 No. 2, pp. 63\u201079.","DOI":"10.2307\/41165887"},{"key":"key2022012920402468300_b66","unstructured":"Schein, E. (1994), \u201cThe role of the CEO in the management of change. The case of information technology\u201d, in Allen, T.J. and Scott Morton, M.S. (Eds), Information Technology and the Corporation of the 1990s, Oxford University Press, New York, NY, pp. 325\u201045."},{"key":"key2022012920402468300_b67","doi-asserted-by":"crossref","unstructured":"Shepherd, A. (1999), \u201cOutsourcing IT in a changing world\u201d, European Management Journal, Vol. 17 No. 1, pp. 64\u201084.","DOI":"10.1016\/S0263-2373(98)00064-4"},{"key":"key2022012920402468300_b68","doi-asserted-by":"crossref","unstructured":"Smith, M.A. (2002), \u201cApplication service provision: the IS infrastructure context\u201d, in Hirschheim, R., Heinzl, A. and Dibbern, J. (Eds), Information Systems Outsourcing. Enduring Themes, Emergent Patterns and Future Directions, Springer, Berlin, pp. 451\u201073.","DOI":"10.1007\/978-3-662-04754-5_20"},{"key":"key2022012920402468300_b69","doi-asserted-by":"crossref","unstructured":"Smith, M.A., Mitra, S. and Narasimhan, S. (1998), \u201cInformation systems outsourcing: a study of pre\u2010event firm characteristics\u201d, Journal of Management Information Systems, Vol. 15 No. 2, pp. 61\u201093.","DOI":"10.1080\/07421222.1998.11518209"},{"key":"key2022012920402468300_b70","doi-asserted-by":"crossref","unstructured":"Tetteh, E. and Burn, J. (2001), \u201cGlobal strategies for SME\u2010business: applying the SMALL framework\u201d, Logistic Information Management, Vol. 14 Nos 1\/2, pp. 171\u201080.","DOI":"10.1108\/09576050110363202"},{"key":"key2022012920402468300_b71","unstructured":"The Outsourcing Institute Membership (1998), \u201cThe outsourcing institute membership survey of current and potential outsourcing end\u2010users\u201d, available at: www.outsourcing.com."},{"key":"key2022012920402468300_b72","unstructured":"The Yankee Group (2003), \u201cYankee group releases\u201d, available at: www.yankeegroup.com, 27 February."},{"key":"key2022012920402468300_b73","doi-asserted-by":"crossref","unstructured":"Udo, G.G. (2000), \u201cUsing analytic hierarchy process to analyze the information technology outsourcing decision\u201d, Industrial Management & Data Systems, Vol. 100 No. 9, pp. 421\u20109.","DOI":"10.1108\/02635570010358348"},{"key":"key2022012920402468300_b74","doi-asserted-by":"crossref","unstructured":"Willcocks, L. and Choi, Ch.J. (1995), \u201cCo\u2010operative partnership and \u2018Total\u2019 IT outsourcing: from contractual obligation to strategic alliance?\u201d, European Management Journal, Vol. 13 No. 1, pp. 76\u20108.","DOI":"10.1016\/0263-2373(94)00059-G"},{"key":"key2022012920402468300_b75","doi-asserted-by":"crossref","unstructured":"Willcocks, L., Lacity, M. and Fitzgerald, G. (1995), \u201cInformation technology outsourcing in Europe and the USA: assessment issues\u201d, International Journal of Information Management, Vol. 15 No. 5, pp. 333\u201051.","DOI":"10.1016\/0268-4012(95)00035-6"},{"key":"key2022012920402468300_b76","doi-asserted-by":"crossref","unstructured":"Willcocks, L., Fitzgerald, G. and Lacity, M. (1996), \u201cTo outsource or not? Recent research on economics and evaluation practice\u201d, European Journal of Information Systems, Vol. 6 No. 5, pp. 143\u201060.","DOI":"10.1057\/ejis.1996.21"},{"key":"key2022012920402468300_b77","doi-asserted-by":"crossref","unstructured":"Willcocks, L.P., Lacity, M.C. and Kern, T. (1999), \u201cRisk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA\u201d, Journal of Strategic Information Systems, Vol. 8 No. 3, pp. 285\u2010314.","DOI":"10.1016\/S0963-8687(00)00022-6"},{"key":"key2022012920402468300_b78","doi-asserted-by":"crossref","unstructured":"Yang, C.H. and Huang, J\u2010B. (2000), \u201cA decision model for IS outsourcing\u201d, International Journal of Information Management, Vol. 20 No. 3, pp. 225\u201039.","DOI":"10.1016\/S0268-4012(00)00007-4"},{"key":"key2022012920402468300_b79","doi-asserted-by":"crossref","unstructured":"Yap, C., Soh, C. and Raman, K. (1992), \u201cInformation systems success factors in small business\u201d, OMEGA, Vol. 20 Nos 5\/6, pp. 597\u2010609.","DOI":"10.1016\/0305-0483(92)90005-R"},{"key":"key2022012920402468300_b80","doi-asserted-by":"crossref","unstructured":"Zviran, M., Ahituv, N. and Armoni, A. (2001), \u201cBuilding outsourcing relationships across the global commuinity: the UPS\u2010Motorola experience\u201d, Journal of Strategic Information Systems, Vol. 10 No. 4, pp. 313\u201033.","DOI":"10.1016\/S0963-8687(01)00050-6"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510627287","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510627287\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510627287\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:56Z","timestamp":1753402136000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/5\/399-418\/171803"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12,1]]},"references-count":80,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,12,1]]}},"alternative-id":["10.1108\/09685220510627287"],"URL":"https:\/\/doi.org\/10.1108\/09685220510627287","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2005,12,1]]}}}