[1] Hätönen J, Eriksson T. 30+ years of research and practice of outsourcing:Exploring the past and anticipating the future[J]. Journal of International Management, 2009, 15: 142-155.[2] Lacity M, Hirschheim R. Implementing Information Systems Outsourcing: Key Issues and Experiences of an Early Adopter[J]. Journal of General Management, 1993,19 (1): 17-31.[3] 中国服务外包发展研究报告(2013)[M].北京:中国商务出版社,2013.[4] Ojelanki K Ngwenyama, Bryson N. Making the information systems outsourcing decision: A transaction cost approach to analyzing wutsourcing decision problems[J]. European Journal of Operational Research, 1999,115:351-367.[5] Reyes G, Joes G, Juan L. Information systems outsourcing reasons in the largest Spanish firms[J]. International Journal of Information Management, 2005,25(2):117-136. [6] Cengiz Kahrmana, Orhan Engin, Ozgur Kabak, et al. Information systems outsourcing decisions using a groupdecision-making approach[J].Engineering Applications of Artificial Intelligence, 2009,22:832-841.[7] 席代昭,范体军.基于Agent的信息技术外包方案评价体系结构[J].情报杂志,2007(9): 92-97.[8] 汪云峰,司春林.信息系统外包多阶段决策模型[J].经济管理, 2002,24:37-42.[9] Wong Alfred, Tjosvold D, ChenYi-feng. Managing outsourcing to develop business: Goal interdependence for sharing effective business practices in China[J]. Human Relations; 2010, 63(10): 1563-1586.[10] Mojsilovi A, Ray B, Richard L, et al. A logistic regression framework for information technology outsourcing lifecycle management[J]. Computers & Operations Research, 2007(34):3609-3627.[11] Coo Jahyun, Kishore R, Rao H R, et al. The role of service level agreements in relational management of information technology outsourcing: An empirical study [J]. MIS Quarterly, 2009,33(1):119-145.[12] 谭云清,李元旭. 接包企业的信任、任务承诺对发包商合作的影响-来自在华国际服务外包企业的证据[J].经济管理,2011,487(7):39-44.[13] 梅妹娥 谢刚.信息技术外包关系的治理:创新意图的影响研究[J].科研管理, 2013,34(8):130-138.[14] Wullenweber K , Jahner S, Krcmar H. Relational risk mitigation: The relationship approach to mitigating risks in business process outsourcing[C]// 2008 41st Annual Hawaii International Conference on System Sciences, 7-10 Jan. 2008 , Waikoloa, HI, USA.2008.[15] Hoecht A, Trott P. Outsourcing Information Leakage and the Risk of Losing Technology-Based Competencies[J]. European Business Review, 2006,18(5): 395-412.[16] 刘继承.企业信息系统与服务外包风险管理研究.情报理论与实践.2005,28(2):180-183.[17] 楼策群,林菡密.基于非对称信息理论的信息技术外包风险管理[J].情报科学.2006(3):347-351.[18] 代建生,孟卫东,魏立伟.具有双边道德风险的服务外包线性分成契约[J].系统管理学报,2014,23(3):403-409+415.[19] 催萍.承接服务外包对企业技术创新的影响:基于我国IT行业上市公司面板数据的实证研究[J].国际经贸探索,2010,26(8):47-51.[20] 李元旭,谭云清.国际服务外包下接包企业技术创新能力提升路径:基于溢出效应和吸收能力视角[J].中国工业经济,2010,12:66-75.[21] 张千军,刘益.承接方知识获取机制对ITO项目绩效的影响[J].科学学与科学技术管理,2013,34(7):74-82.[22] 王良,刘益,王亚娟. 任务不确定性与外部流程整合对项目绩效的作用机制研究:基于中国离岸信息技术外包产业的实证分析[J]. 科学学与科学技术管理,2013,34(1):20-30.[23] 王琦,刘咏梅,卫旭华. IT外包项目中控制机制与合作绩效的实证研究:基于IT服务提供商的视角[J]. 系统管理学报,2014,23(2):166-173+190. |