The myths and realities of information technology insourcing
Communications of the ACM
Application Service Providers: Will They Succeed?
Information Systems Frontiers
B2B Procurement and Marketplace Transformation
Information Technology and Management
IT outsourcing evolution---: past, present, and future
Communications of the ACM - Wireless networking security
Advanced topics in global information management
Offshore software development: an alternative solution for information technology staffing
Strategies for managing IS/IT personnel
A transaction cost model of IT outsourcing
Information and Management
Proceedings of the 2nd international conference on Service oriented computing
Information systems outsourcing: a survey and analysis of the literature
ACM SIGMIS Database
A framework for information technology outsourcing risk management
ACM SIGMIS Database
A marketing maturity model for IT: building a customer-centric IT organization
IBM Systems Journal
Computers and Operations Research
A logistic regression framework for information technology outsourcing lifecycle management
Computers and Operations Research
International Journal of Business Information Systems
Information systems services outsourcing reality in large Portuguese organisations
International Journal of Business Information Systems
Assessing the risk exposure in IT outsourcing for large companies
International Journal of Information Technology and Management
Should We Go Our Own Way? Backsourcing Flexibility in IT Services Contracts
Journal of Management Information Systems
Research Note---Returns to Information Technology Outsourcing
Information Systems Research
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.02 |
From the Publisher:A common practice involving enormous sums of money, outsourcing is paying a third party to take control of one of a company's functions and then "sell" the service back to it. Prominent IS community members warn of the dangers in surrendering complete management control of their strategic assets. The key question is not "should we outsource IS?" but "where and how can we take advantage of the rapidly developing market of IS service providers?" This book provides answers to the question based on extremely detailed studies of six successful insourcing companies.