{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:15Z","timestamp":1750307295181,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,11]],"date-time":"2010-10-11T00:00:00Z","timestamp":1286755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,11]]},"DOI":"10.1145\/1899503.1899537","type":"proceedings-article","created":{"date-parts":[[2010,12,14]],"date-time":"2010-12-14T16:00:54Z","timestamp":1292342454000},"page":"304-313","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Critical success factors for information systems outsourcing management"],"prefix":"10.1145","author":[{"given":"Hanlie","family":"Smuts","sequence":"first","affiliation":[{"name":"University of South Africa, Featherbrooke Estate, South Africa"}]},{"given":"Alta","family":"van der Merwe","sequence":"additional","affiliation":[{"name":"University of South Africa, Pretoria, South Africa"}]},{"given":"Paula","family":"Kotz\u00e9","sequence":"additional","affiliation":[{"name":"University of South Africa, Pretoria, South Africa"}]},{"given":"Marianne","family":"Loock","sequence":"additional","affiliation":[{"name":"University of South Africa, UNISA, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2010,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aalders R. 2001. The IT outsourcing guide. West Sussex: John Wiley &amp; Sons Ltd.   Aalders R. 2001. The IT outsourcing guide. West Sussex: John Wiley &amp; Sons Ltd."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/09576059810209973"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.8.3.235"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1104004.1104007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9084-5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.10.006"},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"87","article-title":"The Seven Deadly Sins of Outsourcing","volume":"17","author":"Barth\u00e9lemy J.","year":"1993","journal-title":"The Academy of Management Executive"},{"volume-title":"International Journal of Operations &amp","author":"Beaumont N.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/512360.512371"},{"key":"e_1_3_2_1_10_1","unstructured":"Beyah G. &amp; Gallivan M. 2001. Knowledge Management as a Framework for Understanding Public Sector Outsourcing. Paper presented at the 34th International Conference on System Sciences Hawaii.   Beyah G. &amp; Gallivan M. 2001. Knowledge Management as a Framework for Understanding Public Sector Outsourcing. Paper presented at the 34th International Conference on System Sciences Hawaii."},{"issue":"6687","key":"e_1_3_2_1_11_1","first-page":"6687","article-title":"Some considerations about IT outsourcing process","author":"Boldea I.","year":"2008","journal-title":"MPRA Paper"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Carmel E. &amp; Tjia P. 2005. Offshoring Information Technology: Sourcing and Outsourcing to a Global Workforce. New York: Cambridge University Press.  Carmel E. &amp; Tjia P. 2005. Offshoring Information Technology: Sourcing and Outsourcing to a Global Workforce. New York: Cambridge University Press.","DOI":"10.1017\/CBO9780511541193"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017366.2017371"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/09576050210436138"},{"key":"e_1_3_2_1_15_1","unstructured":"Cullen S. &amp; Willcocks L. 2003. Intelligent IT outsourcing: eight building blocks to success. Oxford: Butterworth-Heinemann.  Cullen S. &amp; Willcocks L. 2003. Intelligent IT outsourcing: eight building blocks to success. Oxford: Butterworth-Heinemann."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/714042463"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035233.1035236"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000005315"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Fink D. 1994. A security framework for Information Systems outsourcing. Information Management &amp; Computer Security 2(4) 3--8.  Fink D. 1994. A security framework for Information Systems outsourcing. Information Management &amp; Computer Security 2(4) 3--8.","DOI":"10.1108\/09685229410068235"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1108\/14637150810916035"},{"key":"e_1_3_2_1_21_1","unstructured":"Gartner. 2006. Stop outsourcing and begin disciplined multisourcing. In G00137530 (Ed.) (pp. 1--12): Gartner Inc.  Gartner. 2006. Stop outsourcing and begin disciplined multisourcing. In G00137530 (Ed.) (pp. 1--12): Gartner Inc."},{"key":"e_1_3_2_1_22_1","unstructured":"Gartner. 2009a. Hype Cycle for IT Outsourcing. In G00168445 (Ed.) (pp. 1--80): Gartner Inc.  Gartner. 2009a. Hype Cycle for IT Outsourcing. In G00168445 (Ed.) (pp. 1--80): Gartner Inc."},{"key":"e_1_3_2_1_23_1","unstructured":"Gartner. 2009b. Alternative delivery and Acquisition models for IT services: CIO challenges with these new bundles. In G00165499 (Ed.) (pp. 1--16): Gartner Inc.  Gartner. 2009b. Alternative delivery and Acquisition models for IT services: CIO challenges with these new bundles. In G00165499 (Ed.) (pp. 1--16): Gartner Inc."},{"key":"e_1_3_2_1_24_1","unstructured":"Gilb T. 1988. Principles of Software Engineering Management. Wokingham England: The Addison-Wesley Publishing Company.   Gilb T. 1988. Principles of Software Engineering Management. Wokingham England: The Addison-Wesley Publishing Company."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Gonzalez R. Gasco J. &amp; Llopis J. 2005. Information systems outsourcing success factors: a review and some results. Information Management &amp; Computer Security 13(5) 399--418.  Gonzalez R. Gasco J. &amp; Llopis J. 2005. Information systems outsourcing success factors: a review and some results. Information Management &amp; Computer Security 13(5) 399--418.","DOI":"10.1108\/09685220510627287"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Gottschalk P. &amp; Solli-Saether H. 2006. Maturity model for IT outsourcing relationships. Industrial Management &amp; Data Systems 106(2) 200--212.  Gottschalk P. &amp; Solli-Saether H. 2006. Maturity model for IT outsourcing relationships. Industrial Management &amp; Data Systems 106(2) 200--212.","DOI":"10.1108\/02635570610649853"},{"volume-title":"Project Management: A Systems Approach to Planning, Sheduling and Controlling","year":"1995","author":"Kerzner H.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1108\/09576050310483817"},{"key":"e_1_3_2_1_29_1","unstructured":"Kroenke D. 2009. MIS and you. In P. P. Hall (Ed.) Using MIS. Fairfield: Fairfield University Dolan School of Business.  Kroenke D. 2009. MIS and you. In P. P. Hall (Ed.) Using MIS. Fairfield: Fairfield University Dolan School of Business."},{"key":"e_1_3_2_1_30_1","unstructured":"Lacity M. C. &amp; Hirschheim R. 1993. Information Systems Outsourcing: Myths Metaphors and Realities. Chichester West Sussex: John Wiley &amp; Sons.   Lacity M. C. &amp; Hirschheim R. 1993. Information Systems Outsourcing: Myths Metaphors and Realities. Chichester West Sussex: John Wiley &amp; Sons."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Lacity M. C. &amp; Willcocks L. P. 2009. Information Systems and Outsourcing: Studies in Theory and Practice. Basingstoke Hampshire: Palgrave Macmillan.   Lacity M. C. &amp; Willcocks L. P. 2009. Information Systems and Outsourcing: Studies in Theory and Practice. Basingstoke Hampshire: Palgrave Macmillan.","DOI":"10.1057\/9780230594838"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1108\/13673270910962851"},{"key":"e_1_3_2_1_33_1","unstructured":"Laudon K. C. &amp; Laudon J. P. 1995. Essentials of Management Information Systems: Organisation and Technology. Englewood Cliffs: Prentice-Hall Inc.   Laudon K. C. &amp; Laudon J. P. 1995. Essentials of Management Information Systems: Organisation and Technology. Englewood Cliffs: Prentice-Hall Inc."},{"key":"e_1_3_2_1_34_1","unstructured":"Leedy P. D. &amp; Ormrod J. E. 1989. Practical Research (Eighth ed.). New Jersey: Pearson Merrill Prentice Hall.  Leedy P. D. &amp; Ormrod J. E. 1989. Practical Research (Eighth ed.). New Jersey: Pearson Merrill Prentice Hall."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/13598540010312945"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Myers M. D. &amp; Avison D. 2002. Qualitative Research in Information Systems. London: Sage Publications.   Myers M. D. &amp; Avison D. 2002. Qualitative Research in Information Systems. London: Sage Publications.","DOI":"10.4135\/9781849209687"},{"key":"e_1_3_2_1_37_1","unstructured":"Narayanan S. &amp; Swaminathan J. M. 2007 1 November 2009. Information Technology Offshoring to India: Pitfalls Opportunities and Trends Retrieved 14 November 2009 2009 from http:\/\/public.kenan-flagler.unc.edu\/Faculty\/swaminaj\/research\/paper\/NS2.pdf  Narayanan S. &amp; Swaminathan J. M. 2007 1 November 2009. Information Technology Offshoring to India: Pitfalls Opportunities and Trends Retrieved 14 November 2009 2009 from http:\/\/public.kenan-flagler.unc.edu\/Faculty\/swaminaj\/research\/paper\/NS2.pdf"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029997.1030011"},{"key":"e_1_3_2_1_39_1","unstructured":"PA. Consulting. Group. 2009. Outsourcing - what lies beneath PA Consulting international outsourcing survey 2009.  PA. Consulting. Group. 2009. Outsourcing - what lies beneath PA Consulting international outsourcing survey 2009."},{"key":"e_1_3_2_1_40_1","unstructured":"Piccoli G. 2008. Information Systems for Managers: Texts and Cases Crawfordsville: John Wiley &amp; Sons.   Piccoli G. 2008. Information Systems for Managers: Texts and Cases Crawfordsville: John Wiley &amp; Sons."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1108\/02756660410525399"},{"key":"e_1_3_2_1_42_1","unstructured":"Power M. J. Desouza K. C. &amp; Bonifazi C. 2006. The Outsourcing Handbook: How to Implement a Successful Outsourcing Process. London: Kogan Page Limited.  Power M. J. Desouza K. C. &amp; Bonifazi C. 2006. The Outsourcing Handbook: How to Implement a Successful Outsourcing Process. London: Kogan Page Limited."},{"issue":"3","key":"e_1_3_2_1_43_1","first-page":"147","article-title":"Critical Capabilities for Offshore Outsourcing of Information Systems","volume":"6","author":"Ranganathan C.","year":"2007","journal-title":"MIS Quarterly Executive"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/233977.233984"},{"key":"e_1_3_2_1_45_1","unstructured":"Roehrig P. 2007. The Forrester Wave: Global IT Infrastructure Outsourcing Q2 2007. In Forrester (Ed.) (pp. 1--19).  Roehrig P. 2007. The Forrester Wave: Global IT Infrastructure Outsourcing Q2 2007. In Forrester (Ed.) (pp. 1--19)."},{"first-page":"177","volume-title":"J. Erasmus &amp","author":"Roodt J.","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293485"},{"issue":"3","key":"e_1_3_2_1_48_1","first-page":"225","article-title":"Benchmarking knowledge gaps through role simulations for assessing outsourcing viability. Benchmarking","volume":"15","author":"Shekhar S.","year":"2008","journal-title":"An International Journal"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/233977.233994"},{"key":"e_1_3_2_1_50_1","unstructured":"Softection. 2009. The 5 Golden Rules of Data Protection when Outsourcing Retrieved June 2009 2009 from www.softection.com  Softection. 2009. The 5 Golden Rules of Data Protection when Outsourcing Retrieved June 2009 2009 from www.softection.com"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Solli-Saether H. &amp; Gottschalk P. 2008. Maturity in IT outsourcing relationships: an exploratory study of client companies. Industrial Management &amp; Data Systems 108(5) 635--649.  Solli-Saether H. &amp; Gottschalk P. 2008. Maturity in IT outsourcing relationships: an exploratory study of client companies. Industrial Management &amp; Data Systems 108(5) 635--649.","DOI":"10.1108\/02635570810876769"},{"key":"e_1_3_2_1_52_1","unstructured":"Sood R. 2005. IT software and services: outsourcing &amp; offshoring. Austin Texas: AiAiYo Books.  Sood R. 2005. IT software and services: outsourcing &amp; offshoring. Austin Texas: AiAiYo Books."},{"key":"e_1_3_2_1_53_1","unstructured":"Sparrow E. 2003. Successful IT outsourcing: from choosing a provider to managing the project. London: Springer-Verlag.   Sparrow E. 2003. Successful IT outsourcing: from choosing a provider to managing the project. London: Springer-Verlag."},{"key":"e_1_3_2_1_54_1","unstructured":"Turner J. R. 1993. The Handbook of Project-based Management. London: McGraw-Hill Book Company.  Turner J. R. 1993. The Handbook of Project-based Management. London: McGraw-Hill Book Company."},{"key":"e_1_3_2_1_55_1","unstructured":"Vilvovsky S. 2008. Differences between Public and Private IT Outsourcing: Common Themes in the Literature. Paper presented at the 9th Annual International Digital Government Research Conference Montreal Canada.   Vilvovsky S. 2008. Differences between Public and Private IT Outsourcing: Common Themes in the Literature. Paper presented at the 9th Annual International Digital Government Research Conference Montreal Canada."},{"key":"e_1_3_2_1_56_1","unstructured":"Wessels P. L. Grobbelaar E. &amp; McGee A. 2003. Information Systems in the South African business environment (Second ed.). Durban: LexisNexis Butterworths.  Wessels P. L. Grobbelaar E. &amp; McGee A. 2003. Information Systems in the South African business environment (Second ed.). Durban: LexisNexis Butterworths."}],"event":{"name":"SAICSIT '10: 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists","sponsor":["AAIICT African Advanced Institute for Information & Communications Technology","NRF","ACM Association for Computing Machinery","CSIR CSIR","Microsoft Microsoft","ASFKP-ICT South Africa-Finland Knowledge Partnership on ICT","SAICSIT So. African Inst. Of Computer Scientists & Info Tecnologists","Telkom Telkom","IFIP"],"location":"Bela Bela South Africa","acronym":"SAICSIT '10"},"container-title":["Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1899503.1899537","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1899503.1899537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:46Z","timestamp":1750244386000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1899503.1899537"}},"subtitle":["a software development lifecycle view"],"short-title":[],"issued":{"date-parts":[[2010,10,11]]},"references-count":56,"alternative-id":["10.1145\/1899503.1899537","10.1145\/1899503"],"URL":"https:\/\/doi.org\/10.1145\/1899503.1899537","relation":{},"subject":[],"published":{"date-parts":[[2010,10,11]]},"assertion":[{"value":"2010-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}