企业IT外包风险评价模型与控制策略研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
企业IT外包在过去十年中迅速发展,但蕴含着巨大的风险。相关研究取得了较多成果,但仍然存在风险分析不够深入清晰、风险评价不够科学合理以及风险控制策略不够完备有效等问题。本文针对上述问题,对企业IT外包风险理论研究的发展现状作出了评述,以变精度模糊粗糙集(Variable Precision Rough Set,简称VPFRS)为基础,结合交易成本理论和模糊群决策(Fuzzy Group Decision Making,简称FGDM)等方法,研究企业IT外包风险机制、评价方法和控制策略。
     针对企业IT外包风险形成机理模糊、相互关系复杂等问题,深入分析了企业IT外包风险机制。基于交易成本理论,将风险机制分成风险源(风险因素的集合)到风险的传导机制,分析了资产专属性等风险因素和套牢等五种主要风险,并详细讨论了二者之间的作用原理和相互关系。为企业IT外包风险的分析、评价和控制提供了更好的依据,也为本文后续研究奠定了基础。
     为解决企业IT外包风险评价中复杂性、不确定性和模糊性等问题,提出了基于FRS和FGDM的风险评价群决策模型,即FRGDM模型。模型利用FRS理论降低模糊决策表属性维并直接获取属性的权重,并以评价者给出的语义评价转化为三角模糊数,用模糊群决策方法评价和排序综合风险。模型结合了FGDM与FRS的优点,提高了评价的可靠性和效率,在核电公司外包项目评价选择中得到了验证。
     为进一步提高企业IT外包风险评价的鲁棒性、可靠性,降低评价和决策风险,探讨了允许分类错误可变情况下的风险评价问题,提出了基于VPFRS和FGDM的风险评价群决策模型,即VPFRGDM模型。首先,对于给定的错误分类水平上限u,用模糊群决策中的模糊逼近于理想点方法评价和排序候选者的综合风险水平。然后,在整个允许错误分类水平区间上评价风险,实现决策优化。模型结合了两种理论的优点,进一步提高了评价的鲁棒性、可靠性和决策效率,并为决策者提供了选择精度水平做出正确决策的便利。
     为解决企业IT外包风险控制策略中存在的机理不够清晰、针对性不强等问题,研究了风险控制策略组合。对现有研究成果做了全面的归纳和提炼,进一步分类为主要和辅助策略组合;探讨了策略组合对风险因素的作用机制,并说明了实施流程。该组合提高了控制策略的针对性和有效性。
     针对企业IT外包风险的动态性、不确定性,解决风险监控中对知识的强调不够等问题,提出了基于VPFRS的风险监控集成螺旋模型。模型以基于VPFRS的知识发现方法为中心,依据积累的大量历史数据,按照两种方法,即给定u下和最佳允许分类错误区间下挖掘规则。由于方法具有较强的规则挖掘能力,容错能力、鲁棒性和计算效率进一步提高,提高了控制IT外包风险的效率和效果,提供的实例也证明了该模型的应用价值。
IT outsourcing of enterprise has been developing fast during last decade with great risk involved. It inherits natureally risks of IT and possesses unique risks, on which attracts many research interests and achievements. However, there still exists space for improvement in the analysis of risk mechanism, the approach of evaluation and the strategy of control. Aiming at the problems mentioned above, this paper, after reviewing on the research development on IT outsourcing risk of enterprise, studies risk mechanism, and provides group decision making model of evaluation and the strategy of control. The study, based on Variable Precision Fuzzy Rough Set(VPFRS), combining Transaction Cost Theory(TCT) and Fuzzy Group Decision-making(FGDM), provides a comprehensive and flexible methodology for study on IT outsourcing risk in enterprise.
     Aiming at the complexity of forming mechanism and mutual relationship between IT outsourcing risk of enterprise, the thesis initializes to study risk mechanism. Based on TCT, the thesis proposes a two layer transferring mechanism of risk sources (the set of risk drivers) and risk, analyzes risk drivers such as Asset Specificity and five main risks such Lock-in, and discusses the principle of function and relationship between the two components above. The analysis offers more convenience and accuracy for the analysis, evaluation and control of risk, namely, a firm foundation for subsequential work.
     In order to solve the complexity, uncertainty, amguity and subjective bias in IT outsourcing risk evaluation, a new integrated model is proposed to evaluate IT outsourcing risk of enterprise, which is called Fuzzy Rough Group Decision-Making (FRGDM). On the basis of recent work, the model decreases the dimension of condition feature and derives the weight of features directly from fuzzy decision table, then transforms the semantic evaluation given by evaluators into triangle fuzzy numbers, finally rates and ranks alternatives' aggregative risk with FGDM. The model integrates the advantage of FGDM and FRST, improves the reliability and efficiency, which is verified by the case of the choice of outsourcing projects in a nuclear power station.
     For the purpose of further improving the robustness, reliability of the evaluation of IT outsourcing risk of enterprise, under variable admissible inclusion error is discussed and a new integrated model, Variable Precision Fuzzy Rough Group Decision-making (VPFRGDM) is proposed. First of all, under a given u, the model rates and ranks aggregative risk of alternatives with fuzzy Technique for Order Performance by Similarity to Ideal Solution(TOPSIS) in FGDM. Finally, then evaluates the risk on the whole admissible inclusion error interval to optimize decision-making. The model enhances the reasonableness of FGDM, further improvs the robustness and reliability of the evaluation, and improves the efficiency with better flexibility and comprehensiveness to choose the best precision level in IT offshore outsourcing risk decision-making.
     In order to improve the efficiency and effectiveness of countermeasures to alleviate IT outsourcing risk in enterprise, risk mitigation system is also studied. First of all, the thesis summarizes and refines literal developments in IT outsourcing risk of enterprise mitigation system, further categorizes the mitigation system into two subsystems, namely, main and complementary. Then, for the first time to our best knowledge, the thesis studies how the mitigation system functions on risk drivers instead of risks, and finally instructs the process of implementing the dynamic mitigation system. The system improves the pertinency and effectiveness, fit for providing a foundation for establishing the research methodology on the mitigation system for IT outsourcing risk of enterprise.
     Appropriate for the complex and dynamic nature of IT outsourcing risk, aiming at the less emphasis on knowledge, an integrated spiral monitoring model based on VPFRS is proposed. The model take advantage of Knowledge Discovery in Database(KDD)method based on VPFRS, which digs rules from historical data accumulated through two approaches, namely, rules digging approach under given u and the best precision interval. Since the KDD method is capable of finding rules easily understood from historical data, better dealing with errors and robustness, the monitoring model could help decision-makers judge risk condition more accurately and efficiently during the IT outsourcing process. The value of the model is also verified by the case.
引文
[1] Acosta, J., Nebot, A., Villar, P., et al. Optimization of Fuzzy Partitions for Inductive Reasoning Using Genetic Algorithms[J]. International Journal of Systems Science, 2007, 38(12): 991-1011.
    [2] Alchian, A. A., Demsetz, H. Production. Information Cost and Economic Organisation[J]. American Economic Review, 1972,62: 777-792.
    [3] Alter, S., Ginzberg, M. Managing Uncertainty in MIS Implementation[J]. Sloan Manage Review, 1978, 20(1): 23-31.
    [4] Ammar, H., Nikzadeh, T., Dugan, J. B. Risk Assessment of Software-System Specifications[J]. IEEE Transactions On Reliability, 2001, 50(2): 171-183.
    [5] Anderson, S. W., Dekker, H. C. Management Control for Market Transactions: The Relations between Transaction Costs, Incomplete Contract Design and Subsequent Performance[J]. Management science, 2005, 51(12): 1734-1752.
    [6] Ang, S., Cummings, L. Strategic Response to Institutional in Uences on Information Systems Outsourcing[J]. Organization Science, 1997, 8(3): 235-256.
    [7] Aubert, B., Rivard, S., Patry, M. Development of Measures to Assess Dimensions of IT Operation Transactions [C]. Proceedings of the Fifteenth International Conference on Information Systems, Vancouver, 1994.
    [8] Aubert, B. A., Dusault, S., Patty, M., et al. Managing the Risk of IT Outsourcing[J].Cahier du GRESI, 1998, 7: 1-17.
    [9] Aubert, B. A., Houde, J. K, Patry, M., et al. Characteristics of IT Outsourcing Contracts [C]. Proceedings of the 36th Hawaii International Conference on System Sciences, Hawaii, IEEE, 2003.
    [10] Aubert, B. A., Patry, M., Rivard, S. Assessing the Risk of IT Outsourcing[J].Cahier du GRESI, 1997, 8: 1-13.
    [11] Aubert, B. A., Patry, M., Rivard, S. A Tale of Two Outsourcing Contracts: An Agency-Theoretical Perspective[J]. Wirtschafts informatik, 2003,45(2): 181-190.
    [12] Aubert, B. A., Patry, M., Rivard, S., et al. IT Outsourcing Risk Management at British Petroleum [C]. Proceedings of the 34th Hawaii International Conference on System Sciences, Maui, HI, 2001.
    [13] Aubert, B. A., Rivard, S., Patry, M. A Transaction Costs Approach to Outsourcing: Some Empirical Evidence[J]. Information and Management, 1996, 30: 51-64.
    [14] Aubert, B. A., Rivard, S., Patry, M. A Transaction Cost Model of IT Outsourcing[J].Information &Management., 2004,41: 921-932.
    [15] Buyukozkan, G, Feyzioglu, O. Group Decision Making to Better Respond Customer Needs in Software Development[J]. Computers & Industrial Engineering,2005,48:427-441.
    [16] Bahli, B. An Assessment of Information Technology Outsourcing Risks[D]: [Ph.D].Unitversity of Montreal 2002.
    [17] Bahli, B., Rivard, S. The Information Technology Outsourcing Risk:A Transaction Cost and Agency Theory-Based Perspective[J]. Journal of Information Technology,2003,18:211-221.
    [18] Bahli, B., Rivard, S. Validating Measures of Information Technology Outsourcing Risk Factors[J]. Omega, 2005, 33: 175-187.
    [19] Bailor, C. Five Elements to Consider after You've Outsourced[J]. Customer Relationship Management, 2005, 4: 25-30.
    [20] Baker, G., Gibbons, R., Murphy, K. J. Relational Contracts and the Theory of the Firm[J]. Quarterly Journal of Economics, 2002,117: 39-84.
    [21] Barki, H., Pinsonneault, A. A Model of Organizational Integration, Implementation Effort, and Performance[J]. Organization Science, 2005, 16(2): 165-179.
    [22] Barki, H., Rivard, S., Talbot, J. Toward an Assessment of Software Development Risk[J]. Journal of Management Information Systems, 1993, 10(2): 203-225.
    [23] Barzel, Y. Measurement Cost and the Organisation of Markets[J]. Journal of Law and Economics, 1982, 25(1): 27-48.
    
    [24] Bendor-Samuel, P., Gools, K., Risk-Reward Pricing, a White Paper, 2001.
    [25] Beynon, M. J., Peel, M. J. Variable Precision Rough Set Theory and Data Discretisation: An Application to Corporate Failure Prediction[J]. Omega, 2001,29(6): 561-576.
    [26] Bhattacharya, S., Behara, R. S., Gundersen, D. E. Business Risk Perspectives on Information Systems Outsourcing[J]. International Journal of Accounting Information Systems, 2003, 4(1): 75-93.
    [27] Boehm, B. W. Software Risk Management.[M]. Washington D.C.: IEEE Computer Society Press, 1989.
    [28] Boehm, B. W. Software Risk Management: Principles and Practices[J]. IEEE Software, 1991, 8(1): 32-41.
    [29] Breu, K., Hemingway, C. J. Making Organisations Virtual: The Hidden Cost of Distributed Teams[J]. Journal of Information Technology, 2004, 19: 191-202.
    [30] Brown, M., Falk, A., Fehr, E. Relational Contracts and the Nature of Market Interactions [J]. Econometrica, May 2004, 72(3): 747-780.
    [31] Carlsson, C, Fuller, R. On Possibilistic Mean Value and Variance of Fuzzy Numbers [J]. Fuzzy Sets and Systems, 2001,122(2): 315-326.
    [32] Carmel, E., Nicholson, B. Small Firms and Offshore Software Outsourcing: High Transaction Costs and Their Mitigation[J]. Journal of global information management, 2005, 13(3): 33-54.
    [33] Carson, S. J., Madhok, A., Wu, T. Uncertainty, Opportunism, and Governance: The Effects of Volatility and Ambiguity on Formal and Relational Contracting[J].Academy of Management Journal, 2006,49(5): 1058-1077.
    [34] Charette, R. N. Software Engineering Risk Analysis and Management[M]. New York: Intertext Publications McGraw-Hill Book, 1989.
    [35] Chen, C. T. Extensions of the Topsis for Group Decision-Making under Fuzzy Environment[J]. Fuzzy Sets and Systems, 2000, 114: 1-9.
    [36] Chen, L. S., Cheng, C. H. Selecting Is Personnel Use Fuzzy Gdss Based on Metric Distance Method[J]. European Journal of Operational Research, 2005, 160(3):803-820.
    [37] Chen, L., Soliman, K. S. Managing IT Outsourcing: A Value-Driven Approach to Outsourcing Using Application Service Providers[J]. Logistics Information Management, 2002, 15(3): 180-189.
    [38] Chen, S., Lee, S. L., Lee, C. A New Method for Generating Fuzzy Rules from Numerical Data for Handling Classification Problems[J]. Appl. Artif. Intell., 2001,15(7): 645-664.
    [39] Chen, S. M. Evaluating the Rate of Aggregative Risk in Software Development Using Fuzzy Set Theory[J]. International Journal of Cybernet Systems, 1999, 30:57-75.
    [40] Christiaanse, E., Venkatraman, N. Beyond Sabre: An Empirical Test of Expertise Exploitation in Electronic Channels[J]. MIS Quarterly Executive, 2002, 26(1):15-38.
    [41] Chulani, S., Boehm, B., Steece, B. Bayesian Analysis of Empirical Software Engineering Cost Models[J]. Software Engineering, IEEE Transactions on 1999,25( 4): 573 -583.
    [42] Clark, T. D. J., Zmud, R. W., McGray, G E. The Outsourcing of Information Services: Transforming the Nature of Business in the Information Industry[J].Journal of Information Technology 1995, 10(4): 221-237.
    [43] Coase, R. The Nature of the Firm[J]. Econoinica, 1937,4: 386 — 405.
    [44] Cullen, S., Seddon, P. B., Willcocks, L. P. IT Outsourcing Configuration: Research into Defining and Designing Outsourcing Arrangements[J]. The Journal of Strategic Information Systems, 2005, 14(4): 357-387
    [45] Currie, W. L. A Knowledge-Based Risk Assessment Framework for Evaluating Web-Enabled Application Outsourcing Projects[J]. International Journal of Project Management, 2003,21(3): 207-217.
    [46] Das, T., Teng, B. Between Trust and Control: Developing Confidence in Partner Cooperation in Alliances[J]. The Academy of Management Review, 1998, 23(3):491-512.
    [47] Deng, T., Chen, Y., Xu, W., et al. A Novel Approach to Fuzzy Rough Sets Based on a Fuzzy Covering[J]. Information Sciences, 2007, 177(11): 2308-2326.
    [48] Dubois, D., Prade, H. Putting Rough Sets and Fuzzy Sets Together[M]. Dordrecht:Kluwer Academic Publishers, 1992.
    [49] Earl, M. J. The Risks of Outsourcing IT[J]. Sloan management review, 1996, 3:26-32.
    [50] Eisenhardt, K. M. Agency Theory: An Assessment and Review[J]. Academy of Management Review, 1989, 14(1): 57-74.
    [51] Fan, Z. P., Xiao, S. H., Hu, G F. An Optimization Method for Integrating Two Kinds of Preference Information in Group Decision-Making[J]. Computers & Industrial Engineering, 2004, 46(2): 329-335.
    [52] Fenton, N., Neil, M. Software Metrics and Risk [C]. FESMA99 2nd European Software Measurement Conference, Amsterdam, 1999.
    [53] Fitzgerald, G., Willcocks, L. P. Relationships on Outsourcing: Contracts and Partnerships [C]. The Proceedings of the second European Conference in Information Systems, Breukelen, Netherlands, Nijenrode University press, 1994.
    [54] Gargiulo, M., Benassi, M. Trapped in Your Own Net? Network Cohesion, Structural Holes, and the Adaptation of Social Capital[J]. Organization Science,2000,11(2): 183-196.
    [55] Genus, A. Unstructuring Incompetence: Problems of Contracting, Rust and the Development of the Channel Tunnel[J]. Technology Analysis and Strategic Management, 1997, 9(4): 419-436.
    [56] Gonzalez, R., Gasco, J., Llopis, J. Information Systems Outsourcing Risks: A Study of Large Firms[J]. Industrial Management and Data Systems, 2005, 105(1):45-62.
    [57] Goo, J., Kishore, R., Rao, H. R., et al. The Role of Service Level Agreements in Relational Management of IT Outsourcing:An Empirical Study[J]. MISQ,forthcoming.
    [58] Griffiths, B., Beynon, M. J. Expositing Stages of VPRS Analysis in an Expert System: Application with Bank Credit Ratings[J]. Expert systems with applications,2005, 29(4): 879-888.
    [59] Grossman, S., Hart, O. The Costs and Benefits of Ownership: A Theory of Vertical and Lateral Integration[J]. Journal of Political Economy, 1986, 94(4): 691-719.
    [60] Hall, E. M. Managing Risk -Methods for Software System Development[M].Addison-Wesley, 1998.
    [61] Harris, A., Giunipero, L. C., Hult, G T. M. Impact of Organizational and Contract Flexibility on Outsourcing Contracts[J]. Industrial Marketing Management, 1998,27: 373-384.
    [62] Heide, B., John, G. The Role of Dependence Balancing in Safeguarding Transaction-Specific Assets in Conventional Channels[J]. Journal of Marketing Research, 1988, 52: 20-35.
    [63] Herrera, F., Martinez, L., Sanchez, P. J. Managing Non-Homogeneous Information in Group Decision Making[J]. European Journal of Operational Research, 2005,166(1): 115-132.
    [64] Hillson, D. Extending the Risk Process to Manage Opportunities[J]. International Journal of Project Management, 2002,20(3): 235-240.
    [65] Hong, T. P., Wang, T. T., Wang, S. L. Mining Fuzzy B-Certain and B-Possible Rules from Quantitative Data Based on the Variable Precision Rough-Set Model[J].Expert Systems with Applications, 2007, 32(1): 223-232.
    [66] Hou, T. H., Huang, C. C. Application of Fuzzy Logic and Variable Precision Rough Set Approach in a Remote Monitoring Manufacturing Process for Diagnosis Rule Induction[J]. Journal of Intelligent Manufacturing, 2004, 15(3):395-408.
    [67] Houston, D. X., Mackulak, G. T., Collofello, J. S. Stochastic Simulation of Risk Factor Potential Effects for Software Development Risk Management[J]. The Journal of Systems and Software, 2001, 59: 247-257.
    [68] Hughes, B., Cotterell, M. Software Project Management (3nd Edit)[M].UK:McGraw-Hill Companies, 2002.
    [69] Inkpen, A. C, Tsang, E. W. K. Social Capital, Networks, and Knowledge Transfer[J]. Academy of Management Review, 2005, 30(1): 146-165.
    [70] Jae-Nam, L., Young-Gul, K. Effects of Partnership Quality on Is Outsourcing:Conceptual Framework and Empirical Validation[J]. Journal of MIS, 1999, 15(4):29-61.
    [71] Jagielska, I., Matthews, C, Whitfort, T. An Investigation into the Application of Neural Networks, Fuzzy Logic, Genetic Algorithms, and Rough Sets to Automated Knowledge Acquisition for Classification Problems[J]. Neurocomputing, 1999, 24:37-54.
    [72] Jap, S. D., Ganesan, S. Control Mechanisms and the Relationship Life Cycle:Implications for Safeguarding Specific Investments and Developing Commitment[J]. Journal of Marketing Research, 2000, 37(2): 227-245.
    [73] Jarvenpaa, S., Staples, S. Exploring Perceptions of Organizational Ownership of Information and Expertise[J]. Journal of Management Information Systems, 2000,18(1): 151-183.
    [74] Jeffries, F. L., Reed, R. Trust and Adaptation in Relational Contracting[J].Academy of Management Review, 2000,25(4): 873-882.
    [75] Jennings, D. Outsourcing Opportunities for Financial Services[J]. Long Range Planning, 1996,29(3): 393-404.
    
    [76] Johnson, M. Outsourcing in Brief[M]. Oxford: Butterworth-Heinemann, 1997.
    [77] Jyrki, K., Victor, R. B. Empirical Evaluation of a Risk Management Method [C].SEI Conference on Risk Management, Atlantic City, NJ, 1997.
    [78] Kacprzyk, J. Group Decision Making with Fuzzy Linguistic Majority[J]. Fuzzy Sets and Systems, 1986, 18: 105-108.
    [79] Kaplan, S., Garrick, B. J. On the Quantitative Definition of Risk[J]. Risk Analysis,1981, 1(1): 11-27.
    [80] Kasemsiri, W., Kimpan, C. Printed Thai Character Recognition Using Fuzzy-Rough Sets[J]. Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology, 2001,1: 326-330.
    [81] Kern, T., Willcocks, L., Van Heck, E. The Winner's Curse in IT Outsourcing:Strategies for Avoiding Relational Trauma[J]. California Management Review, 2002b, 44(2): 47-69.
    [82] Kern, T., Willcocks, L. P. Exploring Relationships in Information Technology Outsourcing: The Interaction Approach[J]. European Journal of Information Systems, 2002,11:3-19.
    [83] Kern, T., Willcocks, L. P., Lacity, M. C. Application Service Provision: Risk Assessment and Mitigation[J]. MIS Quarterly Executive, 2002, 1(2): 113-126.
    [84] Khalfan, A. M. Information Security Considerations in Is/IT Outsourcing Projects:A Descriptive Case Study of Two Sectors[J]. International Journal of Information Management, 2004, 24(1): 29-42.
    [85] Kim, H. J. IT Outsourcing in Public Organizations: How Does the Quality of Outsourcing Relationship Affect the IT Outsourcing Effectiveness? [D]: [Ph.D].Syracuse University, 2005.
    [86] Kim, Y. J., Sanders, G L. Strategic Actions in Information Technology Investment Based on Real Option Theory[J]. Decision Support Systems, 2002, 33(1): 1-11
    [87] Kirsch, L. J. The Management of Complex Tasks in Organizations: Controlling the Systems Development Process[J]. Organization Science, 1996, 7(1): 1-21.
    [88] Kirsch, L. J. Portfolios of Control Modes and Is Project Management[J].Information Systems Review 1997, 8 (3): 215-239.
    [89] Kirsch, L. J., Sambamurthy, V., Dong-Gil Ko, Russell, L. P. Controlling Information Systems Development Projects: The View from the Client[J].Management Science, 2002,48(4): 484-498.
    [90] Kirsch, L. T. Deploying Common Systems Globally: The Dynamics of Control[J].Information Systems Research, 2004, 15(4): 374-395.
    [91] Klein, B., Crawford, G, Alchian, A. Vertical Integration, Appropriable Rents, and the Competitive Contracting Process[J]. The Journal of Law and Economics, 1978,1:297-326.
    [92] Klein, B. A. Why Hold-Ups Occur: The Self-Enforcing Range of Contractual Relationships[J]. Economic Inquiry, 1996, 34: 444-463.
    [93] Klepper, R., Jones, O. W. Outsourcing Information Technology, Systems & Services[M]. Upper Saddle River, NJ: Prentice Hall, 1998.
    [94] Koss, A. P., Eaton, C. B. Co-Specific Investments, Hold-up and Self-Enforcing Contracts[J]. Journal of Economic Behaviour & Organisation, 1997, 32(3):457-470.
    [95] Krishnan, M. S., Kriebel, C. H., Kekre, S. , Mukhopadhyay, T. . An Empirical Analysis of Productivity and Quality in Software Products [J]. Management Science, 2000, (46): 745 - 759.
    [96] Laarhoven, P. J. M., Pedrycz, W. A Fuzzy Extension of Saaty's Priority Theory[J].Fuzzy Sets and Systems, 1983, 3: 229-241.
    [97] Lacity, M., Willcocks, L., Feeny, D. F. The Value of Selective IT Sourcing[J].Sloan management review, 1996,37(3): 13-25.
    [98] Lacity, M. C, Hirschheim, R. Information Systems Outsourcing: Myths,Metaphors and Realities[M]. Chichester: John Wiley & Sons, 1993.
    [99] Lacity, M. C, Willcocks, L. P. Global Information Technology Outsourcing: Search for Business Advantage[M]. Chichester: John Wiley & Sons, 2001.
    [100] Langfield-Smith, K., Smith, D. Management Control Systems and Trust in Outsourcing Relationships[J]. Management Accounting Research, 2003, 14:281-307.
    [101] Larson, A. Network Dyads in Entrepreneurial Settings: A Study of Governance of Exchange Relationships[J]. Administrative Science Quarterly 1992, 37: 76-104.
    [102] Lee, H. M. Generalization of the Group Decision Making Using Fuzzy Sets Theory for Evaluating the Rate of Aggregative Risk in Software Development[J].Information Sciences, 1999, 113: 301-311.
    [103] Lee, H. M. Applying Fuzzy Set Theory to Evaluate the Rate of Aggregative Risk in Software Development[J]. Fuzzy Sets and Systems, 1996, 79: 323-336.
    [104] Lee, H. M. Group Decision Making Using Fuzzy Sets Theory for Evaluating the Rate of Aggregative Risk in Software Development[J]. Fuzzy Sets and Systems,1996,80:261-271.
    [105] Leifer, R., Mills, K. An Information Processing Approach for Deciding Upon Control Strategies and Reducing Control Loss in Emerging Organizations[J].Journal of Management, 1996,22(1): 113-138.
    [106] Littlepage, G., Robison, W., Reddington, K. Effects of Task Experience and Group Experience on Group Performance, Member Ability, and Recognition of Expertise[J]. Organisational Behavior and Human Decision Processes, 1997, 69(2):133-147.
    [107] Liu, H. J., Tuo, H. Y, Liu, Y. C. Rough Neural Network of Variable Precision[J].Neural Processing Letters, 2004, 19: 73-87.
    [108] Marais, K. A New Approach to Risk Analysis with a Focus on Organizational Risk Factors[D]: [Ph.D]. Massachusetts Institute of Technology, 2005.
    [109] Marimin, M. U., Ltsuo, F. I., Hiroyuki, T. Linguistic Labels for Expressing Fuzzy Preference Relations in Fuzzy Group Decision Making[J]. IEEE Transaction on Systems, Man and Cybernetics, 1998, 28(2): 205-218.
    [110] McFarlan, F. W. Portfolio Approach to Information Systems[J]. Harvard Business Review, 1981,59(5): 142-150.
    [111] McFarlan, F. W., Nolan, R. L. How to Manage an IT Outsourcing Alliance[J].Sloan management review, 1995, 36(2): 9-23
    [112] Mi, J. S., Wu, W. Z., Zhang, W. X. Approaches to Knowledge Reduction Based on Variable Precision Rough Set Model[J]. Information sciences, 2004, 159(3-4):255-272.
    [113] Mieszkowicz-Rolka, A., Rolka, L. Remarks on Approximation Quality in Variable Precision Fuzzy Rough Sets Model[J]. Lecture Notes in Artificial Intelligence,2004, Spinger-Verlag GmbH: 402-411.
    [114] Mieszkowicz-Rolka, A., Rolka, L. Variable Precision Fuzzy Rough Sets[J].Transactions on Rough Sets 1,2004, Springer-Verlag GmbH: 144-160.
    [115] Mojsilovic, A., Ray, B., Lawrence, R., et al. A Logistic Regression Framework for Information Technology Outsourcing Lifecycle Management[J]. Computers & Operations Research, 2007,34(12): 3609-3627.
    [116] Nair, K. G. K., Prasad, P. N. Offshore Outsourcing: A Swot Analysis of a State in India[J]. Information systems management, 2004,21(3): 34-40.
    [117] Nam, K. Three Essays on Information Systems Outsourcing[D]: [Ph.D].Unpublished dissertation thesis, State University of NY at Buffalo, 1995.
    [118] Ngwenyama, O. K., Bryson, N. Making the Information Systems Outsourcing Decision: A Transaction Cost Approach to Analyzing Outsourcing Decision Problems[J]. EJOR, 1999,115: 351-367.
    [119] Olcer, A. I., Odabasi, A. Y. A New Fuzzy Multiple Attributive Group Decision Making Methodology and Its Application to Propulsion/Maneuvering System Selection ProbIem[J]. EJOR, 2005, 1: 93-114.
    [120] Orlandi, E. Risk Assessment and Risk Evaluation of Cio's Position [C].Proceedings of the IEEE 39th International Camahan Conference on Security Technology, 2005:126-129.
    
    [121] Osei-Bryson, K. M., Ngwenyama, O. K. Managing Risks in Information System Outsourcing: An Approach to Analyzing Outsourcing Risks and Structuring Incentive Contracts[J]. European Journal of Operational Research, 2006, 174: 245-264.
    [122] Ouchi, W. G. Markets, Bureaucracies, and Clans [J]. Administrative Science Quarterly, 1980, 25(1): 129-141.
    [123] Paulk, M. C., Curits, B., Chrissis, M. B., et al. Capability Maturity Model for Software, Version 1.1[M]. CMU Software engineering Institute, 1993.
    [124] Pawlak, Z. Rough Sets[J]. International Journal of Computer and Information Science, 1982,11(5): 341-356.
    [125] Pearlson, K. E. Managing and Using Information Systems: A Strategic Approach[M]. Chichester: Wiley, 2001.
    [126] Perkins, S. W., Rao, C. R. The Role of Experience in Information Use and Decision Making by Marketing Managers[J]. Journal of Marketing Research, 1990,27(1): 1-10.
    [127] Piccoli, G, Ives, B. Trust and the Unintended Effects of Behavior Control in Virtual Teams[J]. MIS Quarterly Executive, 2003,27(3): 365-395.
    [128] Pilling, B. K., Crosby, L. A. a. J., D.W. Relational Bonds in Industrial Exchange:An Experimental Test of the Transaction Cost Economic Framework[J]. Journal of Business Research, 1994, 30: 237-251.
    [129] Pinnington, A., Woolcock, P. The Role of Vendor Companies in Is/IT Outsourcing[J]. International Journal of Information Management, 1997, 17(3):199-210.
    [130] Pisano, G P. The R& D Boundaries of the Firm: An Empirical Analysis[J].Administrative Science Quarterly, 1990,35(1): 153-176.
    [131] Poppo, L., Zenger, T. Do Formal Contracts and Relational Governance Function as Substitutes or Complements?[J]. Strategic Management Journal, 2002, 23:707-725.
    [132] Porter, M. E., Millar, V. How Information Gives You Competitive Advantage[J].Harvard Business Review, 1985,63(4): 149-160.
    [133] Qu, Z., Brocklehurst, M. What Will It Take for China to Become a Competitive Force in Offshore Outsourcing? An Analysis of the Role of Transaction Costs in Supplier Selection[J]. Journal of Information Technology, 2003, 18(1): 53-67.
    [134] Raffoul, W., The Road to Outsourcing Success: Outsourcing Maturity Management Model, ZDNet Tech Update,http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2851971,00.html,last access: 2007/08/16.
    [135] Raz, T., Michael, E. Use and Benefits of Tools for Project Risk Management[J].International Journal of Project Management, 2001,19: 9-17.
    [136] Roily, I., Masao, M. Generalized Fuzzy Rough Sets by Conditional Probability Relations[J]. International Journal of Pattern Recognition & Artificial Intelligence,2002,16(7): 865-881.
    [137] Rottman, J. W. Successfully Outsourcing Embedded Software Development[J].Computers & Industrial Engineering, 2006, 39(1): 55-61.
    [138] Rustagi, S. Antecedents of Success in Is Outsourcing: A Control Theory Perspective[D]: [Ph.D]. University of Pittsburgh, 2004.
    [139] SEI. The Sei Approach to Managing Software Technical Risks. [M]. Bridge:Bridge, 1992.
    [140] Shen, Q., Jensen, R. Selecting Informative Features with Fuzzy-Rough Sets and Its Application for Complex Systems Monitoring[J]. Pattern Recognition, 2004, 37:1351-1363.
    [141] Shin, Y. A Person-Environment Fit Model for Virtual Organizations[J]. Journal of Management, 2004,30: 725-743.
    [142] Sinclair, J. Collins Cobuild English Language Dictionary[M]. London: Collins,1992.
    [143] Slater, G, Spencer, D. The Uncertain Foundations of Transaction Cost Economics[J]. Journal of Economic Issues, 2000, 36(1): 61-87.
    [144] Slezak, D., Ziarko, W. Variable Precision Bayesian Rough Set Model[J]. LNAI on Rough sets, fuzzy sets, data mining, and granular computing, 2003,2639: 312-315.
    [145] Smolucha, J. Software Simulation Tools Minimize Risk [C]. WESCON/97 1997.
    [146] Snir, E. M. Economics of Information Technology Outsourcing and Markets[D]:[Ph.D]. University of Pennsylvania, 2000.
    [147] Srinivasan, P., Ruiz, M. E., D. H. Kraft. , Vol.37, . Vocabulary Mining for Information Retrieval: Rough Sets and Fuzzy Sets[J]. Information Processing and Management, 2001,37: 15-38.
    [148] Su, C. T., Hsu, J. H. Precision Parameter in the Variable Precision Rough Sets Model:An Application[J]. Omega, 2006, 34(2): 149-157.
    [149] Subramani, M. R., Venkatraman, N. Safeguarding Investments in Asymmetric Interorganizational Relationships: Theory and Evidence[J]. Academy of Management Journal, 2003,46(1): 46-62.
    [150] Sun, J., Liu, H., Qi, C. A Multistage Rule Induction Algorithm in Classification[J]. International Journal of Pattern Recognition & Artificial Intelligence, 2007, 21(4):693-708.
    [151] Tafti, M. H. A. Risks Factors Associated with Offshore IT Outsourcing[J].Industrial Management and Data Systems, 2005,105(5): 549-560.
    [152] Tallon, P. P., Kauffman, R. J., Lucas, H. C., et al. Using Real Options Analysis for Evaluating Uncertain Investments Information Technology: Insights from the ICIS 2001 Debate[J]. Communications of the Association for Information Systems,2002,9:136-167.
    [153] Thong, J. Y. L., Yap, C. S., Raman), K. S. Top Management Support, External Expertise and Information Systems Implementation in Small Businesses[J].Information Systems Research, 1996, 7(2): 248-267.
    [154] Tsang, C. H., Kwong, S., Wang, H. Genetic-Fuzzy Rule Mining Approach and Evaluation of Feature Selection Techniques for Anomaly Intrusion Detection[J].Pattern Recognition 2007,40(9): 2373-2391.
    [155] Uzzi, B. Social Structure and Competition in Interfirm Networks: The Paradox of Embeddedness[J]. Administrative Science Quarterly, 1997, 42: 35-67.
    [156] Verhoef, C. Quantitative Aspects of Outsourcing Deals[J]. Science of computer programming, 2005, 56(3): 275-313.
    [157] Vining, A., Gloverman, S. A Conceptual Framework for Understanding the Outsourcing Decision[J]. European Management Journal, 1999,17(6): 645-654.
    [158] Walker, G., Weber, D. A. Transaction Cost Approach to Make-or-Buy Decisions[J].Administrative Science Quarterly, 1984, 29(3): 373-391.
    [159] Walsh, K. R., Schneider, H. The Role of Motivation and Risk Behaviors in Software Development Success[J]. Information Research, 2002, 7(3): 65-72.
    [160] Wang, J. J., Yang, D. L. Using a Hybrid Multi-Criteria Decision Aid Method for Information Systems Outsourcing[J]. Computers & Operations Research, 2007,34(2): 3691-3700.
    [161] Wang, L. X., Mendel, J. M. Generating Fuzzy Rules from Numerical Data, with Applications[M]. University of Southern California, 1991.
    [162] Wang, T. E., Barron, T., Seidmann, A. Contracting Structures for Custom Software Development: The Impacts of Informational Rents and Uncertainty on Internal Development and Outsourcing[J]. Management Science, 1997,43(13): 1726-1745.
    [163] Wang, Z., Shao, X. Y, Zhang, G. J., et al. Integration of Variable Precision Rough Set and Fuzzy Clustering: An Application to Knowledge Acquisition for Manufacturing Process Planning[C]. Rough sets, fuzzy sets, data mining and granular computing, PT 2, LNCS 3642, 2005, Springer Berlin / Heidelberg:585-593.
    [164] Welborn, C. Using Fmea to Assess Outsourcing Risk[J]. Quality Progress, 2007,40(8): 17-21.
    [165] Willcocks, L., Lacity, M., Kern, T. Risk Mitigation in IT Outsourcing Strategy Revisited: Longitudinal Case Research at Lisa[J]. Journal of Strategic Information Systems, 1999, 8: 285-314.
    [166] Williams, R. C., Pandelios, G. J., Behrens, S. G Software Risk Evaluation (Sre) Method Description (Version 2.0)[M]. Pittsburgh, Pennsylvania: : Software Engineering Institute, Carnegie Mellon University, 1999.
    [167] Williamson, O. E. The Economic Institutions of Capitalism[M]. New York The Free Press, 1985.
    [168] Williford, J., Chang, A. Modeling the Fedex IT Division: A System Dynamics Approach to Strategic IT Planning[J]. The Journal of Systems and Software, 1999,46: 203-211.
    [169] Wu, F., Li, H. Z. The Effect of Knowledge Management on the Successful Outsourcing of IT/IS[J]. Science Research Management, 2004, 25(2): 82-87.
    [170] Wybo, D. M., Goodhue, L. D. Using Interdependence as a Predictor of Data Standards: Theoretical and Measurement Issues[J]. Information and Management,1995, 29(6): 317-329.
    [171] Xie, G, Zhang, J. L., Lai, K. K. Risk Avoidance in Bidding for Software Projects Based on Life Cycle Management Theory[J]. International Journal of Project Management, 2006, 24(6): 516-521.
    [172] Yager, R. R. On Ordered Weighted Averaging Aggregation Operators in Multicriteria Decision Making[J]. IEEE Transaction on Systems, Man, and Cybernetics,SMC, 1988,18(1): 183-190.
    [173] Yager, R. R. Families of Owa Operators[J]. Fuzzy Sets and Systems, 1993, 59:125-148.
    [174] Yang, C, Huang, J. B. A Decision Model for Is Outsourcing[J]. International Journal of Information Management, 2000, 20: 225-239.
    [175] Ye, F. Strategic IT Partnerships in Transformational Outsourcing as a Distinctive Source of IT Value: A Social Capital Perspective[D]: [Ph.D]. University of Maryland,College Park, 2005.
    [176]Yuan,Y.,Shaw,M.J.Induction of Fuzzy Decision Trees[J].Fuzzy Sets and Systems,1995,69(2):125-139
    [177]Zaheer,A.,McEvily,B.,Perrone,V.Does Trust Matter? Exploring the Effects of Interorganizational and Interpersonal Trust on Performance[J].Organization Science,1998,9(2):141-159.
    [178]Zatolyuk,S.,Allgood,B.Evaluating a Country for Offshore Outsourcing:Software Development Providers in the Ukraine[J].Information Systems Management,2004,21(3):28-33
    [179]Ziarko,W.Variable Precision Rough Set Model[J].Journal of Computer and System Sciences,1993,46(1):39-59.
    [180]曹秀英,梁静国.基于粗集理论的属性权重确定方法[J].中国管理科学,2002,10(5):53-56.
    [181]陈湘晖,朱善君,吉吟东.基于熵和变精度粗集的规则不确定性量度[J].清华大学学报(自然科学版),2001,41(3):109-112.
    [182]杜昌平,周德云.一种基于变精度粗糙集的规则提取方法研究[J].西北工业大学学报,2006,24(3):380-383.
    [183]樊治平,王岩.信息技术外包决策的对策分析方法[J].管理工程学报,2000,16(3):5-8.
    [184]方德英.IT项目风险管理理论与方法研究[D]:[博士].天津大学,2003.
    [185]黄正华,胡宝清.模糊粗糙集理论研究进展[J].模糊系统与数学,2005,19(4):125-134.
    [186]菅利荣,达庆利,陈伟达.基于变精度粗糙集的分层知识粒度[J].管理工程学报,2004,18(2):60-63.
    [187]江文奇,华中生.一种决策者判断一致性的聚类方法[J].中国管理科学,2005,2:35-39.
    [188]李荣钧.模糊多准则决策理论与应用[M].北京:科学技术出版社,2002.
    [189]李小卯.信息技术外包套牢问题的研究[J].系统工程理论与实践,2002,(3):26-31.
    [190]刘慧捷.Itil如何提升IT外包成效?[J].中国计算机用户,2005,9:41-42.
    [191]潘郁,菅利荣,达庆利.多标准决策表中发现概率规则的变精度粗集方法[J].中国管理科学,2005,13(1):95-100.
    [192]凯西.施瓦尔贝.IT项目管理[M].北京:机械工业出版社,2001.
    [193]孙翎.基于粗糙集的工程项目投标风险知识发现研究[D]:[博士].华中科技大学,2003.
    [194]田庆锋.基于交易成本理论的信息技术外包风险分析及控制[D]:[硕士].西北工业大学,2004.
    [195]谢刚.基于VPRS的软件项目投标风险规避研究[D]:[博士].华中科技大学,2006.
    [196]谢刚,张金隆.基于VPRS的软件项目投标风险规避群决策研究[J].中国管理科学,2006,14(2):71-76.
    [197]谢怀军.银行信息技术外包及其风险管理[J].上海金融,2004,1:38-40.
    [198]张金隆,卢新元,谢刚.基于RS的不完全信息it项目风险决策算法研究[J].管理评论,2005,17(3):37-41.
    [199]张金隆,谢刚,卢新元.一种基于VPRS的IT项目投标风险要素评价方法[J].管理学报,2004,11(2):192-194.
    [200]张文修.粗糙集理论与方法[M].北京:科学出版社,2001.
    [201]张云川,蔡淑琴.服务商主导的IT外包风险规避[J].科研管理,2005,26(1):139-144.
    [202]赵卫东,陈国华.基于变精度粗集的判断矩阵构造方法[J].中国管理科学,2002,10(1):94-97.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700