{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:00:43Z","timestamp":1754157643947,"version":"3.41.2"},"reference-count":8,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2007,10,16]],"date-time":"2007-10-16T00:00:00Z","timestamp":1192492800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2007,10,16]]},"DOI":"10.1108\/09685220710831099","type":"journal-article","created":{"date-parts":[[2007,9,29]],"date-time":"2007-09-29T07:02:52Z","timestamp":1191049372000},"page":"350-361","source":"Crossref","is-referenced-by-count":5,"title":["Vendor availability: a key factor for outsourcing in Chilean ICT sector"],"prefix":"10.1108","volume":"15","author":[{"given":"Ranjan B.","family":"Kini","sequence":"first","affiliation":[]}],"member":"140","reference":[{"doi-asserted-by":"publisher","key":"b8","DOI":"10.1108\/09685220510627287"},{"unstructured":"Kini, R.B. (2000), \u201cInformation systems outsourcing evaluation strategy: a precursor for outsourcing\u201d, International Journal of Management, Vol. 17 No. 1, pp. 99\u2010109.","key":"b11"},{"unstructured":"Kini, R.B. and Griffioen\u2010Reitveld, N. (1996), \u201cIs outsourcing \u2010 beyond the 'Bandwagon'\u201d, International Journal of Computer Applications in Technology, Vol. 9 No. 1, pp. 48\u201052.","key":"b19"},{"unstructured":"Ortiz, S. (2004), \u201cGet the most out of outsourcing\u201d, Processor, Vol. 26 No. 4.","key":"b15"},{"unstructured":"Strassmann, P.A. (2004), \u201cOutsourcing the IT infrastructure\u201d, Computer World, January 12.","key":"b16"},{"unstructured":"Strassmann, P.A. (2005), \u201cDoes outsourcing deliver the goods?\u201d, Baseline Magazine, March 7.","key":"b17"},{"unstructured":"Garrett, D. (2004), \u201cThe pros & cons of outsourcing\u201d, Processor, Vol. 26 No. 4.","key":"frd2"},{"doi-asserted-by":"publisher","key":"frd3","DOI":"10.1145\/328236.328112"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220710831099","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220710831099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:03Z","timestamp":1753402143000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/15\/5\/350-361\/180969"}},"subtitle":[],"editor":[{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2007,10,16]]},"references-count":8,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2007,10,16]]}},"alternative-id":["10.1108\/09685220710831099"],"URL":"https:\/\/doi.org\/10.1108\/09685220710831099","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2007,10,16]]}}}