{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:45:21Z","timestamp":1725504321356},"reference-count":61,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T00:00:00Z","timestamp":1112313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Information Management"],"published-print":{"date-parts":[[2005,4]]},"DOI":"10.1016\/j.ijinfomgt.2004.10.002","type":"journal-article","created":{"date-parts":[[2004,12,13]],"date-time":"2004-12-13T22:57:31Z","timestamp":1102978651000},"page":"117-136","source":"Crossref","is-referenced-by-count":46,"title":["Information systems outsourcing reasons in the largest Spanish firms"],"prefix":"10.1016","volume":"25","author":[{"given":"Reyes","family":"Gonzalez","sequence":"first","affiliation":[]},{"given":"Jose","family":"Gasco","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Llopis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.ijinfomgt.2004.10.002_bib1","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1108\/09576059810209973","article-title":"Constructing customised models and providing information to support IS outsourcing decisions","volume":"11","author":"Akomode","year":"1998","journal-title":"Logistics Information Management"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2004.10.002_bib2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1201\/1086\/43314.10.2.20010506\/31401.6","article-title":"The effects of outsourcing on information security","volume":"10","author":"Alner","year":"2001","journal-title":"Information Systems Security"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib3","doi-asserted-by":"crossref","first-page":"535","DOI":"10.2307\/249554","article-title":"Production and transaction economies and IS outsourcing","volume":"22","author":"Ang","year":"1998","journal-title":"MIS Quarterly"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib4","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0378-7206(94)90091-4","article-title":"Firms that choose outsourcing","volume":"26","author":"Arnett","year":"1994","journal-title":"Information and Management"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2004.10.002_bib5","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/0378-7206(95)00045-3","article-title":"Transaction cost approach to outsourcing behavior","volume":"30","author":"Aubert","year":"1996","journal-title":"Information and Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib6","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1057\/palgrave.ejis.3000372","article-title":"Outsourcing information systems","volume":"10","author":"Baldwing","year":"2001","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2004.10.002_bib7","first-page":"60","article-title":"The hidden cost of IT outsourcing","volume":"42","author":"Barth\u00e9lemy","year":"2001","journal-title":"MIT Sloan Management Review"},{"issue":"6","key":"10.1016\/j.ijinfomgt.2004.10.002_bib8","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1016\/S0263-2373(98)00040-1","article-title":"The impact of corporate outsourcing on company value","volume":"16","author":"Bryce","year":"1998","journal-title":"European Management Journal"},{"key":"10.1016\/j.ijinfomgt.2004.10.002_bib9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0268-4012(92)90049-V","article-title":"To outsource or not?","volume":"12","author":"Buck-Lew","year":"1992","journal-title":"International Journal of Information Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.4018\/irmj.2000010102","article-title":"Knowledge management strategies for virtual organizations","volume":"13","author":"Burn","year":"2000","journal-title":"Information Resources Management Journal"},{"key":"10.1016\/j.ijinfomgt.2004.10.002_bib11","unstructured":"Caldwell, B. (1996). The new outsourcing partnership. Information Week, (585), 50\u201364."},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib12","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1057\/jit.1995.25","article-title":"Theoretical perspectives on the outsourcing of information systems","volume":"10","author":"Cheon","year":"1995","journal-title":"Journal of Information Technology"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib13","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0378-7206(95)00054-2","article-title":"Toward IT support for coordination in network organizations","volume":"30","author":"Ching","year":"1996","journal-title":"Information and Management"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib14","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1057\/jit.1995.26","article-title":"The outsourcing of information services","volume":"10","author":"Clark","year":"1995","journal-title":"Journal of Information Technology"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib15","doi-asserted-by":"crossref","first-page":"5","DOI":"10.4018\/irmj.1995010101","article-title":"Information systems outsourcing by large American industrial firms","volume":"8","author":"Collins","year":"1995","journal-title":"Information Resources Management Journal"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib16","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1080\/07399019408964665","article-title":"Outsourcing and the new IT executive. A trends report","volume":"11","author":"Corbett","year":"1994","journal-title":"Information Systems Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib17","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1080\/10580539208906854","article-title":"The real cost of outsourcing","volume":"9","author":"Du\u00e9","year":"1992","journal-title":"Information Systems Management"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2004.10.002_bib18","first-page":"26","article-title":"The risk of outsourcing IT","volume":"37","author":"Earl","year":"1996","journal-title":"Sloan Management Review"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2004.10.002_bib19","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1108\/09576050310499309","article-title":"Action","volume":"16","author":"Fink","year":"2003","journal-title":"Logistics Information Management"},{"key":"10.1016\/j.ijinfomgt.2004.10.002_bib20","series-title":"Managing information technology in turbulent times","author":"Fried","year":"1995"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2004.10.002_bib21","doi-asserted-by":"crossref","first-page":"171","DOI":"10.3233\/HSM-2001-20301","article-title":"Virtual enterprise networks","volume":"20","author":"Georgantzas","year":"2001","journal-title":"Human System Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib22","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/0378-7206(94)90100-7","article-title":"A descriptive study on the outsourcing of information systems functions","volume":"27","author":"Grover","year":"1994","journal-title":"Information and Management"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib23","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1080\/07421222.1996.11518102","article-title":"The effect of service quality and partnership on the outsourcing of information systems functions","volume":"12","author":"Grover","year":"1996","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2004.10.002_bib24","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1080\/10580539208906881","article-title":"Outsourcing the IS function. Is it necessary for your organization?","volume":"9","author":"Gupta","year":"1992","journal-title":"Information Systems Management"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2004.10.002_bib25","doi-asserted-by":"crossref","first-page":"109","DOI":"10.2308\/jis.2000.14.2.109","article-title":"Information systems outsourcing announcements","volume":"14","author":"Hayes","year":"2000","journal-title":"Journal of Information Systems"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2004.10.002_bib26","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/52.914744","article-title":"Synching or sinking","volume":"18","author":"Heeks","year":"2001","journal-title":"IEEE Software"},{"key":"10.1016\/j.ijinfomgt.2004.10.002_bib27","first-page":"121","article-title":"How continental bank outsourced its \u201cCrown jewels\u201d","volume":"January\u2013February","author":"Huber","year":"1993","journal-title":"Harvard Business Review"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib28","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1080\/07399019408964668","article-title":"Applications maintenance outsourcing. An alternative to total outsourcing","volume":"11","author":"Judenberg","year":"1994","journal-title":"Information Systems Management"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib29","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1057\/jit.1995.27","article-title":"The role of risk and return in information technology outsourcing decisions","volume":"10","author":"Jurison","year":"1995","journal-title":"Journal of Information Technology"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib30","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/S0963-8687(00)00048-2","article-title":"Exploring information technology outsourcing relationship","volume":"9","author":"Kern","year":"2000","journal-title":"Journal of Strategic Information Systems"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib31","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1057\/palgrave\/ejis\/3000415","article-title":"Exploring relationships in information technology outsourcing","volume":"11","author":"Kern","year":"2002","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2004.10.002_bib32","doi-asserted-by":"crossref","first-page":"47","DOI":"10.2307\/41166122","article-title":"The winner's curse in IT outsourcing","volume":"44","author":"Kern","year":"2002","journal-title":"California Management Review"},{"issue":"6","key":"10.1016\/j.ijinfomgt.2004.10.002_bib33","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/S0378-7206(00)00046-X","article-title":"Developing a framework for analyzing IS outsourcing","volume":"37","author":"King","year":"2000","journal-title":"Information and Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib34","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1177\/030630709301900102","article-title":"Implementing information systems outsourcing","volume":"19","author":"Lacity","year":"1993","journal-title":"Journal of General Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib35","first-page":"73","article-title":"The information systems outsourcing Bandwagon","volume":"35","author":"Lacity","year":"1993","journal-title":"Sloan Management Review"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib36","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/07399019408964664","article-title":"Realizing outsourcing expectations. Incredible expectations, credible outcomes","volume":"11","author":"Lacity","year":"1994","journal-title":"Information Systems Management"},{"issue":"3\/4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib37","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/0959-8022(96)00005-7","article-title":"Interpreting information technology sourcing decisions from a transaction cost perspective","volume":"5","author":"Lacity","year":"1995","journal-title":"Accounting, Management and Information Technology"},{"issue":"7","key":"10.1016\/j.ijinfomgt.2004.10.002_bib38","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1046\/j.1365-2575.1997.00010.x","article-title":"Information systems sourcing","author":"Lacity","year":"1997","journal-title":"Information Systems Journal"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2004.10.002_bib39","doi-asserted-by":"crossref","first-page":"363","DOI":"10.2307\/249670","article-title":"An empirical investigation of information technology sourcing practices","volume":"22","author":"Lacity","year":"1998","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.ijinfomgt.2004.10.002_bib40","first-page":"84","article-title":"IT outsourcing maximize flexibility and control","volume":"May\u2013June","author":"Lacity","year":"1995","journal-title":"Harvard Business Review"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2004.10.002_bib41","first-page":"13","article-title":"The value of selective sourcing","volume":"137","author":"Lacity","year":"1996","journal-title":"Sloan Management Review"},{"issue":"6","key":"10.1016\/j.ijinfomgt.2004.10.002_bib42","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1016\/S0263-2373(99)00052-3","article-title":"Business strategies and IT outsourcing","volume":"17","author":"Loebbecke","year":"1999","journal-title":"European Management Journal"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib43","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1287\/isre.3.4.334","article-title":"Diffusion of information technology outsourcing","volume":"3","author":"Loh","year":"1992","journal-title":"Information Systems Research"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2004.10.002_bib44","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1023\/A:1011502306766","article-title":"An economic model to study dependencies between independent software vendors and application service providers","volume":"1","author":"Marchand","year":"2001","journal-title":"Electronic Commerce Research"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2004.10.002_bib45","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/0024-6301(93)90003-X","article-title":"Outsourcing information systems","volume":"26","author":"Martinsons","year":"1993","journal-title":"Long Range Planning"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2004.10.002_bib46","first-page":"8","article-title":"How to manage an IT outsourcing alliance","volume":"36","author":"McFarlan","year":"1995","journal-title":"Sloan Management Review"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib47","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1057\/jit.1995.32","article-title":"Financial and strategic motivations behind IS outsourcing","volume":"10","author":"McLellan","year":"1995","journal-title":"Journal of Information Technology"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2004.10.002_bib48","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/07399019408964666","article-title":"A sensible approach to outsourcing. The economic fundamentals","volume":"11","author":"Meyer","year":"1994","journal-title":"Information Systems Management"},{"issue":"7","key":"10.1016\/j.ijinfomgt.2004.10.002_bib49","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/233977.233989","article-title":"A two-level investigation of information systems outsourcing","volume":"39","author":"Nam","year":"1996","journal-title":"Communications of the ACM"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2004.10.002_bib50","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0378-7206(95)00030-9","article-title":"A dialectic view of information systems outsourcing","volume":"29","author":"Palvia","year":"1995","journal-title":"Information and Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib51","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/S0263-2373(98)00064-4","article-title":"Outsourcing IT in a changing world","volume":"17","author":"Shepherd","year":"1999","journal-title":"European Management Journal"},{"issue":"7","key":"10.1016\/j.ijinfomgt.2004.10.002_bib52","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/233977.233994","article-title":"Employment outsourcing in information systems","volume":"39","author":"Slaughter","year":"1996","journal-title":"Communications of the ACM"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2004.10.002_bib53","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1080\/07421222.1998.11518209","article-title":"Information systems outsourcing","volume":"15","author":"Smith","year":"1998","journal-title":"Journal of Management Information Systems"},{"issue":"1\/2","key":"10.1016\/j.ijinfomgt.2004.10.002_bib54","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1108\/09576050110363202","article-title":"Global strategies for SME-business","volume":"14","author":"Tetteh","year":"2001","journal-title":"Logistic Information Management"},{"issue":"9","key":"10.1016\/j.ijinfomgt.2004.10.002_bib55","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1108\/02635570010358348","article-title":"Using analytic Hierarchy process to analyze the information technology outsourcing decision","volume":"100","author":"Udo","year":"2000","journal-title":"Industrial Management and Data Systems"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2004.10.002_bib56","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/0263-2373(94)00059-G","article-title":"Co-operative partnership and \u2018Total\u2019 IT outsourcing","volume":"13","author":"Willcocks","year":"1995","journal-title":"European Management Journal"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2004.10.002_bib57","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/0024-6301(95)00038-K","article-title":"Outsourcing IT","volume":"28","author":"Willcocks","year":"1995","journal-title":"Long Range Planning"},{"key":"10.1016\/j.ijinfomgt.2004.10.002_bib58","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1057\/ejis.1996.21","article-title":"To outsource or not? Recent research on economics and evaluation practice","volume":"5","author":"Willcocks","year":"1996","journal-title":"European Journal of Information Systems"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2004.10.002_bib59","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/0268-4012(95)00035-6","article-title":"Information technology outsourcing in Europe and in the USA","volume":"15","author":"Willcocks","year":"1995","journal-title":"International Journal of Information Management"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2004.10.002_bib60","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/S0963-8687(00)00022-6","article-title":"Risk mitigation in IT outsourcing strategy revisited","volume":"8","author":"Willcocks","year":"1999","journal-title":"Journal of Strategic Information Systems"},{"key":"10.1016\/j.ijinfomgt.2004.10.002_bib61","series-title":"Markets and hierarchies. Analysis and antitrust implications","author":"Williamson","year":"1975"}],"container-title":["International Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S026840120400101X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S026840120400101X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T06:09:27Z","timestamp":1625119767000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S026840120400101X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,4]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2005,4]]}},"alternative-id":["S026840120400101X"],"URL":"https:\/\/doi.org\/10.1016\/j.ijinfomgt.2004.10.002","relation":{},"ISSN":["0268-4012"],"issn-type":[{"value":"0268-4012","type":"print"}],"subject":[],"published":{"date-parts":[[2005,4]]}}}