{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T11:10:25Z","timestamp":1771845025157,"version":"3.50.1"},"reference-count":61,"publisher":"World Scientific Pub Co Pte Lt","issue":"06","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2014,11]]},"abstract":"<jats:p> Due to ever-increasing trend in outsourcing information technology projects in today's competitive world, the risk management in information technology outsourcing (ITO) projects is a challenging issue. Hence, this paper reviews and extracts present corresponding risks by literature review to implement risk management in ITO. After reviewing a number of frameworks in the literatures related to prioritizing of extracted risk factors, a new framework is presented to determine the priority of them. Because of network structure of the proposed framework and multi-dimensional nature of the project risk, the fuzzy analytic network process (fuzzy ANP) is applied to prioritize risk factors. Also, since identifying and prioritizing of risk factors cannot necessarily meet the organization's needs related to the project risk, the ways to respond to these factors are evaluated. For this purpose, responses to the five highest ranked risk factors are considered. Prioritization of responses to these risk factors is done by applying fuzzy technique for order preference by similarity to ideal solution (fuzzy TOPSIS) based on four criteria: quality, cost, time, and scope. Results, achieved from experts' judgment, show that the risk factor \"Supplier's lack of expertise with an IT operation\" is the most significant. Also, the best response for this factor, is \"Review of monetary value and volume of suppliers' contracts prior to their selection\" according to experts' point of view. In addition, a sensitivity analysis is carried out for validating the results. <\/jats:p>","DOI":"10.1142\/s021962201450076x","type":"journal-article","created":{"date-parts":[[2014,9,5]],"date-time":"2014-09-05T05:32:08Z","timestamp":1409895128000},"page":"1283-1323","source":"Crossref","is-referenced-by-count":17,"title":["Identifying and Analyzing Risks and Responses for Risk Management in Information Technology Outsourcing Projects Under Fuzzy Environment"],"prefix":"10.1142","volume":"13","author":[{"given":"Homa","family":"Samadi","sequence":"first","affiliation":[{"name":"School of Industrial Engineering, Islamic Azad University of South Tehran Branch, Tehran, Iran"}]},{"given":"Salman","family":"Nazari-Shirkouhi","sequence":"additional","affiliation":[{"name":"School of Industrial Engineering, College of Engineering, University of Tehran, Iran"}]},{"given":"Abbas","family":"Keramati","sequence":"additional","affiliation":[{"name":"School of Industrial Engineering, College of Engineering, University of Tehran, Iran"}]}],"member":"219","published-online":{"date-parts":[[2014,12,2]]},"reference":[{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1016\/0040-1625(94)90029-9"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.4.334"},{"key":"rf6","volume-title":"Information Systems Outsourcing: Myths, Metaphors and Realities","author":"Lacity M. C.","year":"1993"},{"key":"rf8","volume-title":"Outsourcing Information Technology, Systems and Services","author":"Klepper R.","year":"1998"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2004.04.003"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1108\/09576059810209973"},{"key":"rf13","doi-asserted-by":"publisher","DOI":"10.1109\/17.913162"},{"key":"rf14","volume-title":"A Guide to the Project Management Body of Knowledge","year":"2012"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2009.01.004"},{"key":"rf16","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.032"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(00)00022-6"},{"key":"rf18","first-page":"75","volume":"4","author":"Bhattacharya S.","year":"2003","journal-title":"Information Systems"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(02)00095-9"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2003.10.004"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.11.005"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.01.060"},{"key":"rf23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2009.06.002"},{"key":"rf24","first-page":"78","volume":"14","author":"Pan C. G.","year":"2006","journal-title":"World Academy of Science, Engineering and Technology"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2601029"},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1080\/014461999371709"},{"key":"rf28","doi-asserted-by":"publisher","DOI":"10.1080\/02522667.2002.10698996"},{"key":"rf29","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(99)00069-6"},{"key":"rf30","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2004.10.003"},{"key":"rf31","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2007.05.004"},{"key":"rf32","volume-title":"Decision Making with Dependence and Feedback: The Analytic Network Process","author":"Saaty T. L.","year":"1996"},{"key":"rf33","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"rf34","volume-title":"Fuzzy Mathematical Models in Engineering and Management Science","author":"Kaufmann A.","year":"1988"},{"key":"rf35","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488503002387"},{"key":"rf36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2009.09.017"},{"key":"rf37","volume-title":"The Analytic Hierarchy Process","author":"Saaty T. L.","year":"1980"},{"key":"rf38","doi-asserted-by":"publisher","DOI":"10.1002\/int.20148"},{"key":"rf39","doi-asserted-by":"publisher","DOI":"10.1007\/s00477-006-0042-9"},{"key":"rf40","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(99)00155-4"},{"key":"rf41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.01.001"},{"key":"rf42","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-007-9125-z"},{"key":"rf43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-48318-9"},{"key":"rf44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-46768-4"},{"key":"rf45","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(97)00410-4"},{"key":"rf46","doi-asserted-by":"publisher","DOI":"10.1016\/S0261-5177(01)00050-4"},{"key":"rf47","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001739"},{"key":"rf48","doi-asserted-by":"publisher","DOI":"10.1007\/s001700300033"},{"key":"rf49","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2005.01.006"},{"key":"rf50","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(97)00377-1"},{"key":"rf51","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(94)00289-J"},{"key":"rf52","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622011004683"},{"key":"rf53","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622009003739"},{"key":"rf54","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622005001520"},{"key":"rf55","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622008002922"},{"key":"rf56","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622008002867"},{"key":"rf57","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622010003889"},{"key":"rf58","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2011.03.005"},{"key":"rf59","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622011004282"},{"key":"rf60","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2011.01.009"},{"key":"rf61","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622009003405"},{"key":"rf62","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622012500095"},{"key":"rf64","first-page":"73","volume":"35","author":"Hirschheim R.","year":"1993","journal-title":"Sloan Management Review"},{"key":"rf65","first-page":"94","volume":"73","author":"Cross J.","year":"1995","journal-title":"Harvard Business Review"},{"key":"rf66","first-page":"26","volume":"37","author":"Earl M. J.","year":"1996","journal-title":"Sloan Management Review"},{"key":"rf67","doi-asserted-by":"publisher","DOI":"10.1145\/233977.233986"},{"key":"rf68","doi-asserted-by":"publisher","DOI":"10.1086\/467005"},{"key":"rf69","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2006070103"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021962201450076X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T04:49:10Z","timestamp":1565153350000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S021962201450076X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":61,"journal-issue":{"issue":"06","published-online":{"date-parts":[[2014,12,2]]},"published-print":{"date-parts":[[2014,11]]}},"alternative-id":["10.1142\/S021962201450076X"],"URL":"https:\/\/doi.org\/10.1142\/s021962201450076x","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}