{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T03:11:12Z","timestamp":1717816272453},"reference-count":33,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1,1]]},"abstract":"<p>The safety of a company's secrets and proprietary competitive practices becomes an important concern when the company is involved in outsourcing. This concern becomes even more critical when the company is engaged in analytics outsourcing where the company shares proprietary data about the internal processes. While there is a growing concern about the larger costs and risks of the wholesale outsourcing of analytics functions in the business press, there are no statistics on the risks or a sense of how big they might be. This paper attempts to fill this gap by building a mathematical model of the vendor-client interaction that will allow some baseline quantification of the risks that are inherent in analytics outsourcing. The paper also discusses the implications of these ideas for companies that work with outsourcing vendors and closes with some ideas for further research.<\/p>","DOI":"10.4018\/irmj.2015010101","type":"journal-article","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T01:40:53Z","timestamp":1427593253000},"page":"1-16","source":"Crossref","is-referenced-by-count":1,"title":["Quantifying the Risk of Intellectual Property Loss in Analytics Outsourcing"],"prefix":"10.4018","volume":"28","author":[{"given":"Handanhal","family":"Ravinder","sequence":"first","affiliation":[{"name":"Information and Operations Management Department, Montclair State University, Montclair, NJ, USA"}]},{"given":"Ram B.","family":"Misra","sequence":"additional","affiliation":[{"name":"Information and Operations Management Department, Montclair State University, Montclair, NJ, USA"}]},{"given":"Haiyan","family":"Su","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, Montclair State University, Montclair, NJ, USA"}]}],"member":"2432","reference":[{"key":"irmj.2015010101-0","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-5273(02)00471-1"},{"key":"irmj.2015010101-1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0930"},{"key":"irmj.2015010101-2","doi-asserted-by":"crossref","unstructured":"Aubert, B. A., Dussault, S., Patry, M., & Rivard, S. (1999). Managing the risk of IT outsourcing. In System Sciences, 1999. HICSS-32.Proceedings of the 32nd Annual Hawaii International Conference on (pp. 10-pp). IEEE.","DOI":"10.1109\/HICSS.1999.772972"},{"key":"irmj.2015010101-3","doi-asserted-by":"crossref","unstructured":"Aubert, B. A., Patry, M., & Rivard, S. (1998). Assessing the risk of IT outsourcing. In System Sciences, 1998.,Proceedings of the Thirty-First Hawaii International Conference on (Vol. 6, pp. 685-692). IEEE.","DOI":"10.1109\/HICSS.1998.654830"},{"key":"irmj.2015010101-4","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-2171.2007.tb00055.x"},{"issue":"6","key":"irmj.2015010101-5","first-page":"41","article-title":"The Building Blocks of the Learning Organization.","volume":"31","author":"J. K.Bennett","year":"1994","journal-title":"Training (New York, N.Y.)"},{"key":"irmj.2015010101-6","doi-asserted-by":"publisher","DOI":"10.1002\/smj.2053"},{"key":"irmj.2015010101-7","doi-asserted-by":"crossref","unstructured":"Cowan, R. (2005). Network models of innovation and knowledge diffusion. Clusters, Networks and Innovation, 29-53.","DOI":"10.1093\/oso\/9780199275557.003.0002"},{"key":"irmj.2015010101-8","first-page":"12","article-title":"Gearing up to become a learning organization.","author":"A. J.DiBella","year":"1997","journal-title":"Journal for Quality and Participation"},{"key":"irmj.2015010101-9","unstructured":"Evangelista, S., Franck, C., Rosner, D., & Fox, J. (2011). Commercial capability outsourcing \u2013 a significant risk to the industry? White Paper, Deloitte Consulting LLP."},{"key":"irmj.2015010101-10","unstructured":"Fogarty, D. & Bell, P.C. (2014). Should you outsource analytics? MIT Sloan Management Review Magazine, Winter 2014."},{"key":"irmj.2015010101-11","first-page":"3","article-title":"The propagation of innovation waves.","volume":"4","author":"T.Hagerstrand","year":"1952","journal-title":"Lund Studies in Human Geography, Series B"},{"key":"irmj.2015010101-12","doi-asserted-by":"publisher","DOI":"10.2307\/2393655"},{"key":"irmj.2015010101-13","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9310.2009.00574.x"},{"key":"irmj.2015010101-14","doi-asserted-by":"publisher","DOI":"10.1108\/09555340610686967"},{"key":"irmj.2015010101-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2005.02.004"},{"key":"irmj.2015010101-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2006.03.005"},{"key":"irmj.2015010101-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2013.08.001"},{"key":"irmj.2015010101-18","doi-asserted-by":"crossref","unstructured":"Khidzir, N. Z., Mohamed, A., & Arshad, N. H. (2013). ICT Outsourcing Information Security Risk Factors: An Exploratory Analysis of Threat Risks Factor for Critical Project Characteristics. Journal of Industrial and Intelligent Information Vol, 1(4).","DOI":"10.12720\/jiii.1.4.218-222"},{"key":"irmj.2015010101-19","doi-asserted-by":"publisher","DOI":"10.1109\/ISAM.2009.5376919"},{"key":"irmj.2015010101-20","unstructured":"Korrapati, R. B. (2009). Risks and success factors in information technology (IT) outsourcing. In Proceedings of the Academy of Information and Management Sciences,Allied Academies International Conference, January 1 (pp. 31-5). IRM Press."},{"key":"irmj.2015010101-21","doi-asserted-by":"publisher","DOI":"10.1007\/s00199-007-0326-4"},{"key":"irmj.2015010101-22","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.43.4.546"},{"key":"irmj.2015010101-23","doi-asserted-by":"crossref","DOI":"10.4135\/9781412985093","volume":"Vol. 48","author":"V.Mahajan","year":"1985","journal-title":"Models for innovation diffusion"},{"key":"irmj.2015010101-24","first-page":"123","author":"S. J.Mantel","year":"1987","journal-title":"The role of third-parties in the diffusion of innovations: a survey. Innovation: Adaptation and Growth"},{"key":"irmj.2015010101-25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.2012.01086.x"},{"issue":"8","key":"irmj.2015010101-26","first-page":"61","article-title":"Hardwiring the Learning Organization.","volume":"51","author":"J.Redding","year":"1997","journal-title":"Training & Development"},{"key":"irmj.2015010101-27","doi-asserted-by":"publisher","DOI":"10.1093\/jxb\/10.2.290"},{"key":"irmj.2015010101-28","author":"E. M.Rogers","year":"2010","journal-title":"Diffusion of Innovations"},{"key":"irmj.2015010101-29","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2002.tb01654.x"},{"key":"irmj.2015010101-30","first-page":"111","author":"E.Von Hippel","year":"2007","journal-title":"The sources of innovation"},{"key":"irmj.2015010101-31","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2012.701769"},{"key":"irmj.2015010101-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2010.10.002"}],"container-title":["Information Resources Management Journal"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=125894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T02:23:59Z","timestamp":1717813439000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/irmj.2015010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2015,1,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"URL":"https:\/\/doi.org\/10.4018\/irmj.2015010101","relation":{},"ISSN":["1040-1628","1533-7979"],"issn-type":[{"value":"1040-1628","type":"print"},{"value":"1533-7979","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,1]]}}}