references - inflibnetshodhganga.inflibnet.ac.in/bitstream/10603/37604/14/14_references.pdf25....

31
178 References 1. Abdi, Hervé, "Partial least square regression (PLS regression)", Encyclopedia for research methods for the social sciences, 2003, pp 792-795 2. Adam, Everett E., Lawrence M. Corbett, Benito E. Flores, Norma J. Harrison, T. S. Lee, Boo-Ho Rho, Jaime Ribera, Danny Samson, and Roy Westbrook, "An international study of quality improvement approach and firm performance," International Journal of Operations & Production Management, Vol 17, no. 9, 1997, pp 842-873 3. Agarwal, Shalini, Khaitan, Sakate, Shrivastava , Satyendra, and Banks, Mathew, “Destination India: Offshore Outsourcing And Its Implications”, Computer and Telecommunications Law Review (C.T.L.R.), Volume 11, ISSUE 8, 2005, pp 246-262 4. Akbar, Mohammad Muzahid, and Noorjahan Parvez, Impact of service quality, trust, and customer satisfaction on customers loyalty”, ABAC Journal 29, No 1, 2009, pp 24-38 5. AMI-Partners, Research Study on Current Usage Behavior of IT Security within the Software / Outsourcing verticals with a focus on Secure Coding among 35 CMMI Level 4 and 5 companies, 2010 6. Anuwichanont, J., and Mechinda, P., “The impact of perceived value on spa loyalty and its moderating effect of destination equity,” Journal of Business & Economics Research, Vol 7, No 12, 2009, pp 73-89 7. Aranda, Daniel Arias, "Service operations strategy, flexibility and performance in engineering consulting firms," International Journal of Operations & Production Management, Vol 23, No 11, 2003, pp 1401-1421 8. Aris, Syaripah, Ruzaini Hj, Syed, Arshad, Noor, Habibah, and Mohamed, Azlinah, “Conceptual Framework on Risk Management in IT Outsourcing Projects”, WSEAS Transactions on Information Science & Applications, Issue 4, Volume 5, 2008, pp 816-831 9. Arnott, D C., Warwick Business School, University of Warwick, Coventry, UK, 22 May 2009 edition, Trust: A bibliography; Earlier version published: Arnott, D.C. (2007), Research on Trust: A bibliography and brief bibliometric analysis of the special issue submissions, European Journal of Marketing Special Issue on Trust, 41:9/10, pp 1203-1240 10. Arora A and Athreye S, “The software industry and India’s economic development”, Information Economics and Policy, Vol 14, 2002, pp 253-273

Upload: hakhuong

Post on 05-May-2018

212 views

Category:

Documents


0 download

TRANSCRIPT

178

References

1. Abdi, Hervé, "Partial least square regression (PLS regression)", Encyclopedia for research methods for the

social sciences, 2003, pp 792-795

2. Adam, Everett E., Lawrence M. Corbett, Benito E. Flores, Norma J. Harrison, T. S. Lee, Boo-Ho Rho,

Jaime Ribera, Danny Samson, and Roy Westbrook, "An international study of quality improvement

approach and firm performance," International Journal of Operations & Production Management, Vol 17,

no. 9, 1997, pp 842-873

3. Agarwal, Shalini, Khaitan, Sakate, Shrivastava , Satyendra, and Banks, Mathew, “Destination India:

Offshore Outsourcing And Its Implications”, Computer and Telecommunications Law Review (C.T.L.R.),

Volume 11, ISSUE 8, 2005, pp 246-262

4. Akbar, Mohammad Muzahid, and Noorjahan Parvez, “Impact of service quality, trust, and customer

satisfaction on customers loyalty”, ABAC Journal 29, No 1, 2009, pp 24-38

5. AMI-Partners, Research Study on Current Usage Behavior of IT Security within the Software /

Outsourcing verticals with a focus on Secure Coding among 35 CMMI Level 4 and 5 companies, 2010

6. Anuwichanont, J., and Mechinda, P., “The impact of perceived value on spa loyalty and its moderating

effect of destination equity,” Journal of Business & Economics Research, Vol 7, No 12, 2009, pp 73-89

7. Aranda, Daniel Arias, "Service operations strategy, flexibility and performance in engineering consulting

firms," International Journal of Operations & Production Management, Vol 23, No 11, 2003, pp 1401-1421

8. Aris, Syaripah, Ruzaini Hj, Syed, Arshad, Noor, Habibah, and Mohamed, Azlinah, “Conceptual

Framework on Risk Management in IT Outsourcing Projects”, WSEAS Transactions on Information

Science & Applications, Issue 4, Volume 5, 2008, pp 816-831

9. Arnott, D C., Warwick Business School, University of Warwick, Coventry, UK, 22 May 2009 edition,

Trust: A bibliography; Earlier version published: Arnott, D.C. (2007), Research on Trust: A bibliography

and brief bibliometric analysis of the special issue submissions, European Journal of Marketing – Special

Issue on Trust, 41:9/10, pp 1203-1240

10. Arora A and Athreye S, “The software industry and India’s economic development”, Information

Economics and Policy, Vol 14, 2002, pp 253-273

179

11. Arora, Ashish, Arunachalam, V. S., Asundi, Jai, and Fernandes, Ronald, The globalization of software: The

case of the Indian software industry, report submitted to the Sloan Foundation, Pittsburgh: Carnegie Mellon

University, 2001

12. Asubonteng, Patrick, McCleary, Karl J., and Swan, John E., “SERVQUAL revisited: a critical review of

service quality”, The Journal Of Services Marketing, Vol. 10, No. 6, 1996, pp 62-81

13. A.T. Kearney, The 7 habits of highly effective IT Governance, Powerful lessons in transforming business

and information technology, 2008

14. Bahl, S., Wali, O. P., and Kumaraguru, P., “Information security practices followed in the Indian software

services industry: An exploratory study”, In Cybersecurity Summit (WCS), 2011 Second Worldwide,

IEEEXplore, June 2011, pp 1-7

15. Bahl, Sanjay, and Wali, O. P., "An empirical analysis of perceived significance of information security

service quality to predict the organisational performance in software service industry", CSI Transactions on

ICT, Springer, Vol 1, Issue 3, 2013, pp 221-230

16. Bahl, Sanjay, and Wali, O. P., "Perceived significance of information security governance to predict the

information security service quality in Software Service Industry – An empirical analysis", Information

Management and Computer Security, Emerald (Paper accepted for publishing on May 16, 2013, coming in

Vol 22, No 1, 2014)

17. Bajpai, N. and Radjou, N, “Raising the Global Competitiveness of Tamilnadu’s Information Technology

Industry”, Development Discussion Paper No. 728, Harvard Institute for International Development, 1999

18. Bajpai, N and Shastri, V, “Software Industry in India: A Case Study”, Development Discussion Paper No.

667, Harvard Institute for International Development, 1998

19. Baldrige National Quality Program, “2008 Criteria for Performance Excellence”, National Institute of

Standards and Technology, Department of Commerce

20. Baldrige National Quality Program, “2011-2012 Criteria for Performance Excellence”, National Institute of

Standards and Technology, Department of Commerce

180

21. Barbalet, Jack, "A characterization of trust, and its consequences", Theory and society, Vol 38, no. 4, 2009,

pp 367-382

22. Barg, Matthew, Bica, Ioana and Chiu, Bobby, “Software & Services Industry Report”, September 2012,

Sustainalytics

23. Barney, J.B. and Hansen, M.H., “Trustworthiness as a Source of Competitive Advantage”, Strategic

Management Journal, 15 (Winter Special Issue), 1994, pp 175-190

24. Bekmamedova, Nargiza, Prananto, Adi, McKay, Judy, and Vorobiev, Artem, "Towards Better

Understanding of the Relationship between Formal Controls and Trust in IS Outsourcing", Proceedings of

the 19th Australasian Conference on Information Systems (ACIS), 2008

25. Benvenuto, Nicholas A. and Brand, David, “Outsourcing - A Risk Management Perspective”, Information

Systems Audit and Control Association (ISACA), Information Systems Control Journal, Volume 5, 2005

26. Berger, Charles, Blauth, Robert, Boger, David, Bolster, Christopher, Burchill, Gary, DuMouchel, William,

Pouliot, Fred, Richter, Reinhard, Rubinoff, Allan, Shen, Diane, Timko, Mike, and Walden, David, A

special issue on Kano’s Methods for Understanding Customer-defined Quality, Center for Quality

Management Journal, Vol. 4, Fall 1993

27. Bernheim, Carlos Tünnermann and De Souza, Chaui Marilena, Challenges of the university in the

knowledge society, five years after the World Conference on Higher Education, UNESCO Forum

Occasional Paper Series, Paper No. 4, Paris, December, 2003

28. Bertin, Marcos E. J., “The Impact of Corporate Governance on the Quality of Management”, Version1.2,

International Academy for Quality, June 2005

29. Bertrand, Ayse and Kothe, Emilie, FDI in Figures, OECD Investment Division, Secretariat of the OECD

Investment Committee, April 2013

30. Bharadwaj, S.G, and Varadarajan P.R, “Sustainable Competitive Advantage in Service Industries: A

conceptual Model and Research Propositions”, Journal of Marketing, Vol.57, Issue 4, 1993, pp 83

31. Black, S., and Porter, L., “Identification of the critical factors of TQM”, Decision Sciences, Vol 27, No 1,

1996, pp 1-21

181

32. Blinder, Alan S. "Offshoring: The next industrial revolution." Foreign Affairs 85, 2006, pp 113

33. Blomqvist, Kirsimarja, and Stahle, P., "Building organizational trust", A paper submitted for the 16th

Annual IMP Conference, Sept 6-9, 2000, Bath, UK

34. Bojanc, Rok, "Quantitative Model for Information Security Risk Management", Management, Knowledge

and Learning, International Conference, 2012, pp267-275

35. Bou-Llusar, J. Carlos, Escrig-Tena, Ana B., Roca-Puig, Vicente, Beltra´n-Martı´n, Inmaculada, “An

empirical assessment of the EFQM Excellence Model: Evaluation as a TQM framework relative to the

MBNQA Model”, Journal of Operations Management, Vol 27, No 1, 2009, pp 1-22

36. Bowen, Pauline, Hash, Joan, and Wilson, Mark, Information Security Handbook: A Guide for Managers

(NIST Special Publication 800-100), Recommendations of the National Institute of Standards and

Technology, October 2006, http://csrc.nist.gov/publications/nistpubs/index.html

37. Breslin, John G., O'Sullivan David, Passant Alexandre, and Vasiliu Laurentiu, "Semantic Web computing

in industry", Computers in Industry 61, no. 8, 2010, pp 729-741

38. Buang, Abdul Aziz, Lim, Guan Choo, and Samimi, Paris, "A critical review on synthetic globalization

indexes", International Journal on Fundamental Psychology and Social Sciences 2, no. 1, 2012, pp 28-31

39. Busi, Marco and McIvor, Ronan, “Setting the Outsourcing Research Agenda: The Top-10 Most Urgent

Outsourcing Areas,” Strategic Outsourcing: An International Journal, Vol. 1 No. 3, 2008

40. Butler, John K., "Toward understanding and measuring conditions of trust: Evolution of a conditions of

trust inventory", Journal of management, 17, no. 3, 1991, pp 643-663

41. Caralli, Richard A., and Wilson, William R., “The Challenges of Security Management”, Survivable

Enterprise Management Team, Networked Systems Survivability Program, Software Engineering Institute,

2004

42. Carrascal, Luis M., Galván, Ismael, and Gordo, Oscar, "Partial least squares regression as an alternative to

current regression methods used in ecology", Oikos, 118, no. 5, 2009, pp 681-690

43. Casadesus-Masanell, Ramon, and Khanna, Tarun, "Globalization and trust: Theory and evidence from

cooperatives", William Davidson Institute Working Paper 592, University of Michigan, June 2003

182

44. Castelfranchi, Cristiano, and Falcone, Rino, "Trust and control: a dialectic link," Applied Artificial

Intelligence 14, no. 8, 2000, pp 799-823

45. Castells, Manuel, “Information Technology, Globalization and Social Development”, United Nations

Research Institute for Social Development Discussion Paper No. 114, September 1999

46. Cattaneo, Olivier, Engman, Michael, Sáez, Sebastián, and Stern, Robert M., eds. International trade in

services: new trends and opportunities for developing countries, World Bank, 2010

47. Chase-Dunn, Christopher, Kawano, Yukio, and Brewer, Benjamin D., "Trade globalization since 1795:

Waves of integration in the world-system", American Sociological Review, 2000, pp 77-95

48. Chin, W. W. , “The partial least squares approach to structural equation modelling”, Marcoulides, G. A.

(Ed.), Modern Methods for Business Research, New Jersey: Lawrence Erlbaum Associates, 1988

49. Chin, W. W., Marcolin, B. L., Newsted, P. R., “A partial least squares latent variable modeling approach

for measuring interaction effects: results from a Monte Carlo simulation study and voice mail

emotion/adoption study”, Proceedings of the Seventeenth International Conference on Information

Systems, J. I. DeGross, S. Jarvenpaa, and A. Srinivasan (eds.), 1996

50. Chin, W.W., “Issues and opinion on structural equation modelling”, MIS Quarterly, Vol 22, No 1, 1998a,

pp 7-16

51. Chin, W.W. , “The partial least squares approach for structural equation modelling”, Marcoulides, George

A. (Ed), Modern methods for business research, Methodology for business and management., 1998b, pp

295-336

52. Chin, W. W. and Newsted, P. R. , “Structural Equation Modeling Analysis with Small Samples Using

Partial Least Squares”, in Hoyle, R. H. (ed.) Statistical Strategies for Small Sample Research, Thousand

Oaks: Sage Publications, 1999, pp 307-342

53. Churchill, G.A., “A paradigm for developing better measures of marketing constructs”, Journal of

Marketing Research, Vol 16, No 1, 1979, pp 64-73

54. Clift, Hamish and Mandeville, Tom, "Towards a Global Civilisation: An Evolutionary Perspective", 14th

International Schumpeter Society Conference, Brisbane, Australia, 2-5 July 2012

183

55. Colgate, Mark, “Creating Sustainable Competitive Advantage Through Marketing Information System

Technology: A triangulation Methodology Within the Banking Industry”, International Journal of Bank

Marketing, Vol 16 Issue 2, 1998, pp 80-89

56. Commonwealth of Australia, “Trusted Information Sharing Network for Critical Information Protection,

Leading Practices and Guidelines for Enterprise Security Governance”, June 2006

57. Computer Emergency Response Team (CERT-In), PricewaterhouseCoopers (PwC) and Federation of

Indian Chambers of Commerce and Industry (FICCI), From Strength to Strength - Raising the Benchmark

for Information Security in India, Technology Risk Management, 2007 – 2008

58. Conboy, Martin, “Outsourcing makes the world a better place”, Outsource Magazine, January 23, 2013

59. Cook, Lori S. and Verma, Rohit, “Exploring the Linkages between Quality System, Service Quality, and

Performance Excellence: Service Providers’ Perspectives”, Quality Management Journal, Vol 9, No 2,

2002, pp 44-56

60. Corbett, Michael F, “The outsourcing revolution: why it makes sense and how to do it right”, Kaplan

Publishing, 2004

61. Corporate Governance Task Force Report on Information Security Governance: A Call To Action, April

2004

62. Costa, Ana Cristina, and Bijlsma-Frankema, Katinka, "Trust and Control Interrelations New Perspectives

on the Trust—Control Nexus," Group and Organization Management, Vol 32, no. 4, 2007, pp 392-406

63. Crease, Robert P. "The paradox of trust in science." Physics World 17, no. 3, 2004, pp18

64. Creswell, John, W., and Miller, Dana, L., “Determining Validity in Qualitative Inquiry”, Theory into

Practice, Volume 39, Number 3, Summer 2000

65. Cronbach, L.J., “Coefficient alpha and the internal structure of tests”, Psychometrika, Vol. 16, No 3, 1951,

pp 297-334

66. Crosby, P. B., Quality is free, McGraw-Hill New York, 1979

184

67. Curkovic, S., Melnyk, S., Calantone, R. and Handfield, R., “Validating the Malcolm Baldrige National

Quality Award framework through structural equation modelling”, International Journal Production

Research Vol 38, No 4, 2000, pp 765-791

68. Currall, Steven C., and Epstein, Marc J., "The fragility of organizational trust: Lessons from the rise and

fall of Enron", Organizational Dynamics 32, no. 2, 2003, pp 193-206

69. Currall, Steven C., and Judge, Timothy A., "Measuring trust between organizational boundary role

persons", Organizational behavior and Human Decision processes, 64, no. 2, 1995, pp 151-170

70. Dann, Z, and Barclay, I., “Complexity Theory and Knowledge Management Application”, The Electronic

Journal of Knowledge Management, Volume 4, Issue 1, 2006

71. Dasgupta, P. “Trust as a Commodity,” in Trust: Making and Breaking Cooperative Relations, D. Gambetta

(Ed.), Basil Blackwell, New York, 1988, pp. 49-72

72. Data Security Council of India (DSCI) - KPMG Survey 2009, State of Data Security and Privacy in the

Indian Industry, Released on December 30, 2009

73. Davis D., Project10X’s Semantic Wave 2008 Report: Industry Roadmap to Web 3.0 & Multibillion Dollar

Market Opportunities, Executive Summary, October 2008, www.project10x.com

74. Davis, Jeff, The Global Outsourcing Report 2005, Media‘s CIO Insight, Horasis and Going Global

Ventures

75. D’Costa, Anthony.P, “Uneven and Combined Development: Understanding India’s Software Exports”,

World Development, Vol 31, Issue 1, January 2003, pp 211-226

76. De Bruin, Tonia, Freeze, Ronald, Kaulkarni, Uday, & Rosemann, Michael, Understanding the Main Phases

of Developing a Maturity Assessment Model, In Campbell, B, Underwood, J, & Bunker, D (Eds.)

Australasian Conference on Information Systems (ACIS), November 30 – December 2 2005, Australia,

New South Wales, Sydney

77. Department of Electronics and Information Technology, Annual Report 2012 -2013, Ministry of

Communications and Information Technology, Government of India

185

78. Department of Industrial Policy & Promotion, Annual Report 2010-11, Ministry of Commerce and

Industry, Government of India

79. DiRomualdo, A., and Gurbaxani, V. , “Strategic intent for IT outsourcing”, Sloan Management Review,

Summer, 1998, pp 67–80

80. Dlamini, M. T., Eloff, Jan HP, and Eloff, Mariki M., "Information security: The moving target", computers

& security, 28, no. 3, 2009, pp 189-198

81. Dreher, Axel, “Does Globalization Affect Growth? Evidence from a new Index of Globalization”, Applied

Economics 38, 10, 2006, pp 1091-1110. Updated in: Dreher, Axel, Noel Gaston and Pim Martens,

Measuring Globalisation – Gauging its Consequences, 2008, New York, Springer

82. Drezner, Daniel W., Globalization and Policy Convergence, International Studies Review, Vol. 3, No. 1,

Spring, 2001, pp 53-78

83. Duke University CIBER / Archstone Consulting study 2nd Bi-annual, Offshore Survey Results, December

2005

84. Eiser, J. Richard, and White, Mathew P., "A psychological approach to understanding how trust is built and

lost in the context of risk," In CARR conference ‘Taking Stock of Trust’, London School of Economics,

December, vol. 12. 2005

85. Emsley, David, and Kidon, Filip, "Developing Trust in Multiple Stages: The implications for management

accounting”

86. Ferrin, Donald L., Dirks, Kurt T. and Shah, Pri P., “Many routes Toward Trust: A Social Network Analysis

of the Determinants of Interpersonal Trust”, Academy of Management Best Conference Paper 2003 OB:

C1

87. Fink, Dieter, “A Security Framework for Information Systems Outsourcing”, Information Management &

Computer Security, Vol. 2 No. 4, 1994, pp 3-8

88. Firesmith, Donald G., “Common Concepts Underlying Safety, Security, and Survivability Engineering”,

No CMU/SEI-2003-TN-033, Carnegi-Mellon Univ Pittsburgh PA Software Engineering Inst, 2003

186

89. Ford, Matthew W., and Evans, James R., “Conceptual Foundations of Strategic Planning in the Malcolm

Baldrige Criteria for Performance Excellence”, Quality Management Journal Vol. 7, No. 1, 2000, pp 8-26

90. Fornell, C., Larcker, D.F., “Evaluating structural equation models with unobservable variables and

measurement error”, Journal of Marketing Research, Vol 18, 1981, pp 39-50

91. Forrester Report, 3.3 Million U.S. Jobs To Go Offshore, November 11, 2002

92. Fotopoulos, Christos B. and Psomas, Evangelos L., “The impact of “soft” and “hard” TQM elements on

quality management results”, International Journal of Quality & Reliability Management, Vol. 26 No. 2,

2009, pp 150-163

93. Gable, Guy, G., “Integrating Case Study and Survey Research Methods: An Example in Information

Systems”, European Journal of Information Systems, 3(2), 1994

94. Gazzini, Alessandro, and Holt, Matthew, “Limiting the Impact of Data Breaches: The Case of the Sony

Playstation Network”, Booz & Company, June 8, 2011, pp 1-12

95. Gefen, D., Straub, D., “A practical guide to factorial validity using PLS-graph: tutorial and annotated

example”, Communications of the Association for Information Systems Vol 16, 2005, pp 91-109

96. Geisser,S., “A predictive approach to the random effect model”, Biometrika, Vol 61, No1, 1974, pp 101-

107

97. Ghani, Ejaz and Kharas, Homi, “The Service Revolution”, Economic Premise, Number 14, World Bank,

2010

98. Ghemawat, Pankaj, "Why the world isn't flat", Foreign Policy, 2007, pp 54-60

99. Ghobadian, Abby, Gallear, David, and Hopkins, Michael, “TQM and CSR Nexus”, International Journal of

Quality and Reliability Management, Vol 24, No 2, 2007, pp 704-721

100. Giddens, A., The Consequence of Modernity, Oxford: Oxford Polity Press, 1990

101. Global Insight, ‘The Comprehensive impact of offshore IT software and services outsourcing on the US

economy and the IT industry’, Lexington, MA, March 2004

187

102. Golder, P. N., Mitra, D., and Moorman, C., “What is quality? an integrative framework of processes and

states,” Journal of Marketing, Vol 76, No 4, 2012, pp 1-23

103. Golembiewski, Robert T. and McConkie, Mark, The Centrality of Interpersonal Trust in Group Processes,

Theories of Group Processes, Wiley, 1975

104. Goles, Tim and Chin, Wynne W., “Information Systems Outsourcing Relationship Factors: Detailed

Conceptualization and Initial Evidence”, The DATA BASE for Advances in Information Systems, Vol. 36,

No. 4, Fall 2005

105. Goodhue, D., Lewis, W., Thompson, R., “PLS, small sample size, and statistical power in MIS research”,

Proceeding of the 39th Hawaii International Conference on System Sciences, Vol 8, IEEE, 2006

106. Gonzalez, Reyes, Gasco, Jose and Llopis, Juan, “Information Systems Offshore Outsourcing A Descriptive

Analysis”, Industrial Management & Data Systems, Vol. 106, No. 9, 2006a, pp 1233-1248

107. Gonzalez, Reyes, Gasco, Jose, and Llopis, Juan, "Information systems outsourcing: A literature analysis,"

Information & Management, Vol 43, no. 7, 2006b, pp 821-834

108. Gonzalez, Reyes, Gasco, Jose and Llopis, Juan, “Information Systems Outsourcing Reasons and Risks: An

Empirical Study,” International Journal of Social Sciences Vol 4, No 3, 2009, pp 180-191

109. Gooris, Julien, and Peeters, Carine, "Home–Host Country Distance in Offshore Governance Choices",

Journal of International Management, 2013

110. Gregory, Holly J., “International Comparison of Corporate Governance Guidelines and Codes of Best

Practice Developing & Emerging Markets”, Weil, Gotshal & Manges LLP, Fall Edition 2002

111. Grönroos, Christian, "The relationship marketing process: communication, interaction, dialogue, value",

Journal of Business & Industrial Marketing, 19, no. 2, 2004, pp 99-113

112. Grover, Varun, Cheon, Myun Joong, and Teng, James T.C., “The Effect of Service Quality and Partnership

on the Outsourcing of Information Systems Functions”, Journal of Management Information Systems, Vol.

12, No. 4, Spring 1996, pp 89-116

113. Gulla, Umesh, and Gupta, M. P., "Outsourcing in Government Sector: A Strategic Perspective", Delivering

E-government, 2006, pp 170

188

114. Gupta, Atul, McDaniel, Jason C. and Herath, S. Kanthi, “Quality management in service firms: sustaining

structures of total quality service”, Managing Service Quality, Vol. 15 No. 4, 2005 pp 389-402

115. Gustavsson, R., Mellstrand, P., and Törnqvist, B., "Information Security Models and Their Economics",

CRISP Deliverable D 1, 2005

116. Hair, Joe, F., Ringle, Christian, M., Sarstedt, Marko, “PLS-SEM: Indeed a Silver Bullet”, Journal of

Marketing Theory and Practice, Vol. 19, No. 2, Spring 2011, pp 139-152

117. Hallowell, Roger, "The relationships of customer satisfaction, customer loyalty, and profitability: an

empirical study", International journal of service industry management, 7, no. 4, 1996, pp27-42

118. Hanlon, Dennis, Vision and Support in New Venture Start-Ups,

www.babson.edu/entrep/fer/Babson2001/XI/XIB/XIB/xi-b.htm#Top, 2001

119. Hausknost, Daniel, and Haas, Willi, "The role of innovation in a socio-ecological transition of the

European Union”, Neujobs Working Paper No. D 1.4, April 2013

120. Hendricks, K.B., Singhal, V.R., “Does Implementing an Effective TQM Program Actually Improve

Operating Performance? Empirical evidence from firms that have won quality awards,” Management

Science, September 1997, Vol. 43 No. 9, pp 1258 -1274

121. Henseler, Jörg, Christian M. Ringle, Rudolf R. Sinkovics, “The Use of Partial Least Squares Path

Modeling in International Marketing”, Advances in International Marketing, Vol. 20, No 1, Rudolf R.

Sinkovics and Pervez N. Ghauri, eds., Bingley, UK: Emerald Group, 2009, pp 277-319

122. Heskett, James L., and Schlesinger, L. A., "Putting the service-profit chain to work", Harvard business

review 72, no. 2, 1994, pp 164-174

123. Hillson, David A, "Towards a risk maturity model", International Journal of Project and Business Risk

Management, 1, no. 1, 1997, pp 35-45

124. Höck, M. and Ringle, C.M., “Local strategic networks in the software industry: An empirical analysis of

the value continuum”, International Journal Knowledge Management Studies, Vol. 4, No. 2, 2010, pp 132-

151

189

125. Hoekman, Bernard, and Mattoo, Aaditya, "Services trade and growth", Opening Markets for Trade in

Services: Countries and Sectors in Bilateral and WTO Negotiations, 2008, pp 21-58

126. Hoffman, Nicole P., “An Examination of the "Sustainable Competitive Advantage" Concept: Past, Present,

and Future”, Academy of Marketing Science Review, volume 2000 no. 4, 2000, pp 1-16

127. Hosmer, L.T., “Trust: The Connecting Link Between Organizational Theory and Philosophical Ethics”,

Academy of Management Review, 20, no 2, 1995, pp 379-403

128. Hurley, Robert F, "The decision to trust," Harvard Business Review, 84, no. 9, 2006, pp 55-62

129. IBM Institute for Business Value, “Global Location Trends: Annual report 2011”, November 2011

130. ICAEW IT Faculty, “Building Trust in the Digital Age: Rethinking Privacy, Property and Security”,

Making Information Systems Work, November 2011

131. Ilie, Virginia, and Parikh, Mihir, “A Process View of Information Systems Outsourcing Research:

Conceptual Gaps and Future Research Directions”, Association for Information Systems, Proceedings of

the Tenth Americas, 2004, paper 448

132. ISACA, An Introduction to the Business Model for Information Security, 2009

133. ISACA, The business model for information security, ISACA, 2010

134. ISO / IEC 27001, Information technology-Security techniques-Information security management systems-

Requirements, 2009

135. IT Governance Institute, Board briefing on IT Governance, Second Edition, 2003

136. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and

Executive Management, 2nd Edition

137. Jacoby, Jacob, and Matell, Michael S., "Three-point Likert scales are good enough", Journal of Marketing

Research, 8, no. 4, 1971, pp 495-500

138. Jarvenpaa, Sirkka L., and Shaw, Thomas R., "Global virtual teams: Integrating models of trust,"

Organizational virtualness, 1998, pp 35-52

190

139. Jelassi, Tawfik, and Modwel, Suman, "The sustainability of India’s comparative advantage in it offshore

outsourcing", 2006

140. Johnston, Robert, “The determinants of service quality: satisfiers and dissatisfiers”, International Journal of

Service Industry Management, Vol. 6 No. 5, 1995

141. Jones, T. O., and W. E. Sasser Jr., "Why Satisfied Customers Defect," Harvard Business Review 73, no. 6,

November–December 1995, pp 88-99

142. Jorek, Norbert, Gott, Johan, and Battat, Michelle “The Shifting Geography Of Offshoring”, A.T. Kearney

Global Services Location Index, 2009

143. Jöreskog, K. G. and Wold, H., “The ML and PLS Techniques for Modeling with Latent Variables:

Historical and Comparative Aspects’ “, Systems Under Direct Observations: Causality, Structure,

Prediction, Part I, Amsterdam: North-Holland Publication, 1982, pp 263-270

144. Kahn, Beverly K., Strong, Diane M., and Wang, Richard Y., “Information Quality Benchmarks: Product

and Service Performance”, Communications of the ACM, Vol. 45, No. 4ve, April 2002, pp 184-192

145. Kaka, N.F., Sinha, J., “An upgrade for the Indian IT services industry”, McKinsey Quarterly, Special

Edition, 2005, pp 84–89

146. Kaku, Michio, “Hyperspace: a scientific odyssey through parallel universes, time warps, and the tenth

dimension”, Oxford University Press, 1994

147. Kaku, Michio, “Physics of the Future”, Random House Digital, Inc., 2012

148. Kambhampati, Uma S., “The software industry and development: the case of India”, Progress in

Development Studies, January 2002, vol. 2, no. 1, pp 23-45

149. Kashyap, Vipul. "Trust, but verify: Emergence, trust, and quality in intelligent systems", IEEE Intelligent

Systems 19, no. 5, Sept 2004, pp 85-87

150. Kasper-Fuehrera, Eva C., and Ashkanasy, Neal M., "Communicating trustworthiness and building trust in

interorganizational virtual organizations", Journal of Management, 27, no. 3, 2001, pp 235-254

191

151. Kellner, Douglas, "Theorizing Globalization," Sociological Theory 20, no. 3, 2002, pp 285-305

152. Khan, Mushtaq H., Governance, Economic Growth and Development since the 1960s: Background paper

for World Economic and Social Survey, 2006

153. Khan, Naureen, Currie,Wendy, L., Weerakkody, Vishanth, and Desai, Bhavini, “Evaluating Offshore IT

Outsourcing in India: Supplier and Customer Scenarios”, System Sciences 2003, IEEE Computer Society,

Proceedings of the 36th Hawaii International Conference on System Sciences, 2003

154. Khodyakov, Dmitry, "Trust as a Process A Three-Dimensional Approach", Sociology, Vol 41, no. 1, 2007,

pp 115-132

155. Kiely, Laree, and Benzel, Terry V., "Systemic security management", Security & Privacy, IEEE 4, no. 6,

2006, pp 74-77

156. Kim, Dan, "Cognition-Based Versus Affect-Based Trust Determinants in E-Commerce: Cross-Cultural

Comparison Study", ICIS, 2005

157. Klepper, R. and Jones, W.O, “Outsourcing Information Technology, Systems and Services”, 1998

Publication: Book Outsourcing information technology, systems and services, 1998, Prentice-Hall, Inc.

Upper Saddle River, NJ, USA

158. Knapp, Karl, Sharma, Sushil, and King, Kevin, "Macro-economic and social impacts of offshore

outsourcing of information technology: Practitioner and academic perspectives", International Journal of E-

Business Research, Vol 3, no. 4, 2007, pp 112-132

159. Kohler, Horst, Towards a better globalization, Foreign Trade Review, Vol XXXIX, NO. 2, JULY-

SEPTEMBER 2004, Foreign trade review, Golden jubilee commemorative issue 2013, Published by IIFT,

New Delhi

160. Kong, Lingjie, “Data Protection and Transborder Data Flow in the European and Global Context”, The

European Journal of International Law Vol. 21 no. 2, 2010, pp 441-456

161. Koskosas, Ioannis, Kakoulidis, Konstantinos, and Siomos, Christos, "Information Security: Corporate

Culture and Organizational Commitment", International Journal of Humanities and Social Science, Vol. 1

No. 3, March 2011

192

162. Kotrlik, J., and Williams, H., “The Incorporation of effect size in information technology, learning, and

performance research”, Organizational Systems Research Association, Information Technology, Learning,

and Performance Journal Vol 21, No 1, 2003, pp 1-7

163. Kovacich, Gerald L., and Halibozek, Edward P., The manager's handbook for corporate security:

establishing and managing a successful assets protection program, Butterworth-Heinemann, 2003

164. Kshetri, Nir, “Institutional factors affecting offshore business process and information technology

outsourcing”, Journal of International Management, Vol 13, No 1, 2007, pp 38-56

165. Lacity, Mary Celia, and Hirschhei, Rudy A., Information Systems Outsourcing; Myths, Metaphors, and

Realitie, John Wiley & Sons, Inc., 1993

166. Lacity, Mary C., Khan, Shaji A., and Willcocks, Leslie P., "A review of the IT outsourcing literature:

Insights for practice", The Journal of Strategic Information Systems, 18, no. 3, 2009, pp 130-146

167. Lacity, M.C., Willcocks, L. P., and Feeny, D.F., “The Value Of Selective Sourcing,” Sloan Management

Review, Vol 37, No 3, 1996, pp 13-25

168. Lake, David A., Global governance: A relational contracting approach, Globalization and Governance,

Routledge, 1999, ISBN: 0-415-21604-4

169. Laš, Lukáš, and Jukka Aukia, "Contradictory Asia-Pacific Era Regionalism", In The Scale of Globalization.

Think Globally, Act Locally, Change Individually in the 21st Century, 193-202. Ostrava: University of

Ostrava, 2011

170. Lee, Jae-Nam, Huynh, Minh Q., and Hirschhei, Rudy, "An integrative model of trust on IT outsourcing:

Examining a bilateral perspective", Information Systems Frontiers 10, no. 2, 2008, pp 145-163

171. Lee H., Lee Y., Yoo D., “The determinants of perceived service quality and its relationship with

satisfaction”, Journal of Service Marketing, Vol 14, No 3, 2000

172. Lehner, F., and Haas, N., “Knowledge management success factors- Proposal of an empirical research”,

Electronic Journal of Knowledge Management Vol 8, No 1, 2010, pp 79-90

193

173. Levis, M., Helfert, M. and Brady, M., “Information Quality Management: Review of an Evolving Research

Area”, In Robbert, Mary Ann et al.(Hrsg.): Proceedings of the 2007 International Conference on

Information Quality (MIT IQ Conference), Cambridge, 2007

174. Lewicki, R. J. and Bunker, B. B., Developing and Maintaining Trust in Working Relationships, Trust in

Organizations: Frontiers of Theory and Research, Sage Publications, 1996

175. Lewin, Prof. Arie Y., Peacock, Mark, Dr. Peeters, Carine, Russell, Jeff, Sutton, Gary, Duke University

CIBER / Archstone Consulting study, 2nd Bi-annual, Offshore Survey Results, December 2005

176. Li, Suhong, Ragu-Nathan, Bhanu, Ragu-Nathan, T. S., and Rao, S. Subba, "The impact of supply chain

management practices on competitive advantage and organizational performance", Omega 34, no. 2, 2006,

pp 107-124

177. Lin, C., Chow, W. S., Madu, C. N., Kuei, C. H., and Pei Yu, P., “A structural equation model of supply

chain quality management and organizational performance”, International Journal of Production

Economics, Vol 96, No 3, 2005, pp 355-365

178. Lindström, J., and Hägerfors, A., "A model for explaining strategic IT-and information security to senior

management", International Journal of Public Information Systems, 5, no. 1, 2009, pp 17-29

179. Lodahl, Tom and Redditt, Kay Lewis, “IT Governance for IT Effectiveness”, Cutter IT Journal, Vol. 22,

No. 12, December 2009, pp 17-22

180. Lorenz, Edward. "Trust, contract and economic cooperation." Cambridge Journal of Economics 23, no. 3,

1999, pp 301-315

181. Luhmann, N. , Familiarity, confidence, trust: Problems and alternatives, In D. Gambetta (Ed.), Trust:

Making and breaking cooperative relations, Oxford: Basil Blackwell, 1988, pp. 94-108,

182. Luhmann, Niklas, “Trust: A Mechanism for the Reduction of Social Complexity”, Trust and Power, New

York: Wiley, 1979a, pp 4-103

183. Luhmann, Niklas, Trust; and, Power: two works by Niklas Luhmann. Chichester: Wiley, 1979b

184. Lum, Mark, “Offshore Outsourcing and Information Confidentiality Foreign Practices and US Laws:

Trends, Incidents, and Possible Solutions”, SANS Institute, April 2004

194

185. Luor, Ted, Tainyi, Lu, His-Peng, Tao, Yu-Hui, Lin, Tom, M., Y., and Tung, Chi-Hsiang, “Determinants Of

Client Intention Of Software Outsourcing Vendors: A Model From Taiwan’s Financial Industry”, Journal

Of Academy Of Business And Economics, Volume 8, Number 1, 2008

186. Maconachy, W. Victor, Schou, Corey D., Ragsdale, Daniel, and Welch, Don, "A model for information

assurance: An integrated approach", In Proceedings of the 2001 IEEE Workshop on Information Assurance

and Security, vol. 310, New York, USA, 2001

187. Madu, Christian N., and Madu, Assumpta A., “Dimensions of e-quality”, International Journal of Quality &

Reliability Management, Vol 19, No 3, 2002

188. Maitra, Saikat, and Yan, Jun, "Principle component analysis and partial least squares: Two dimension

reduction techniques for regression", Applying Multivariate Statistical Models, 2008, pp 79

189. Marshall, R. Scott, Nguyen, Thang V., and Bryant, Scott E., "A dynamic model of trust development and

knowledge sharing in strategic alliances", Journal of General Management, 31, no. 1, 2005, pp 41-57

190. Mashayekhi, Mina, “Exploiting the potential of trade in services for development, Services: A new frontier

for sustainable development”, UNCTAD/DITC/TNCD/2013/4, Global Services Forum, 28-29 May 2013

191. Matell, Michael S., and Jacoby, Jacob, "Is there an optimal number of alternatives for Likert scale items?

Study I: Reliability and validity", Educational and psychological measurement, 31, 1971, pp 657-674

192. Mayer, Colin, “Corporate Governance, Competition and Performance”, OECD Working Papers No. 164,

1996

193. Mayer, Roger C., Davis, James H., and Schoorman, F. David, "An integrative model of organizational

trust", Academy of management review, 20, no. 3, 1995, pp 709-734

194. McCraw, Thomas K, "Schumpeter's Business Cycles as Business History”, Business History Review 80,

no. 02, 2006, pp 231-261

195. McCue, Andy, “Introduction to outsourcing”, Outsourcing & Offshoring, Lyonsdown Media Group,

September 2008

195

196. McCumber, John, "Information systems security: A comprehensive model", In Proceedings of the 14th

National Computer Security Conference, 1991

197. McFarlan, F. W., and Nolan, R. L., “How to manage an IT outsourcing alliance”, Sloan Management

Review, Winter, 1995, pp 9-23

198. McKnight, D. H., Cummings, L. L., and Chervany, N. L., “Initial Trust Formation in New Organizational

Relationships”, Academy of Management Review, 23, 3, 1998, pp. 473-490

199. McLean, John, "Security models and information flow", Research in Security and Privacy, Proceedings,

1990 IEEE Computer Society Symposium, pp 180-187

200. Mead, Nancy R., Hough, Eric D., Stehney II, Theodore R., “Security Quality Requirements Engineering

(SQUARE) Methodology”, No CMU/SEI-2005-TR-009, Software Engineering Institute, Carnegie Mellon

University, November 2005

201. Melville, N., Kraemer, K., Gurbaxani, V., 2004. “Review: Information technology and organizational

performance: An integrative model of IT business value”, MIS Quarterly, Vol 28, No 2, June 2004, pp

283–322

202. Meyer, Susan M., and Collier, David A., “An empirical test of the causal relationships in the Baldrige

Health Care Pilot Criteria, Journal of Operations Management”, Vol 19, No 4, 2001, pp 403-426

203. Michell, Paul, Reast, John, and Lynch, James, "Exploring the foundations of trust", Journal of Marketing

Management 14, no. 1-3, 1998, pp 159-172

204. Milberg, William and Schöller, Deborah, “Globalization, Offshoring and Economic Insecurity in

Industrialized Countries”, Prepared for U.N. Department of Economic and Social Affairs, March 11th,

2008

205. Miroudot, S., Lanz, R. and Ragoussis, A., “Trade in intermediate goods and services”, OECD Trade Policy

Working Papers, No. 93, OECD, 2009

206. Miroudot, Sébastien, Sauvage, Jehan, and Shepherd, Ben, "Trade costs and productivity in services

sectors", Economics Letters 114, no. 1, 2012, pp 36-38

196

207. Mishra, Saurabh, Lundstrom, Susanna, and Anand, Rahul, "Service export sophistication and economic

growth", World Bank Policy Research Working Paper Series, Vol, 2011

208. Mordini, Emilio, Global governance of the technological revolution, International Federation for

Information Processing, Volume 156, 2004 pp585-592,

209. Morgan, Robert M., and Hunt, Shelby D., "The commitment-trust theory of relationship marketing", The

journal of marketing, 1994, pp 20-38

210. Morton, Michael Scott, "How information technologies can transform organizations", Computerization and

controversy: Value conflicts and social choices, 1996, pp 148-160

211. Narasimhan, S. and Kannan, V., “Total Quality Management as the Foundation of Sustainability – Turning

a New Leaf”, European Journal of Social Sciences, Volume 24, Number 3, 2011, pp 444-451

212. Nasscom, The IT-BPO Sector in India, Strategic Review, 2012

213. NASSCOM Strategic Review 2010

214. Nguyen, Phong, Ali-baber, M., and Verner, June, Trust in software outsourcing relationships: an analysis of

Vietnamese practitioners' views, In 10th International Conference on Evaluation and Assessment in

Software Engineering (EASE), 2006

215. Nguyen, Phong Thanh, Babar, Muhammad Ali and Verner, June M, “Critical Factors in Establishing and

Maintaining Trust in Software Outsourcing Relationships”, ICSE'06, May 20-28, 2006, Shanghai, China

216. Nooteboom, B., “Trust as a governance device”, in M.C. Casson and A. Godley (eds) Cultural Factors in

Economic Growth, Berlin: Springer, 1999

217. Nooteboom, B., Trust: Forms, Foundations, Functions, Failures, and Figures, Edward Elgar Publishing,

2002

218. Oblinger, Diana G., and Hawkins, Brian L., "The myth about IT security", Educause Review 41, no. 3,

2006, pp 14-15

219. OECD, How imports improve productivity and competitiveness, based on OECD Trade Policy Working

Paper No. 93 “Trade in Intermediate Goods and Services”, May 2010

197

220. OECD, “Policy Priorities for International Trade and Jobs”, (ed.), Lippoldt, D., 2012

221. OECD, Trade and labour market outcomes in Germany. In: Lippoldt D (ed) Policy priorities for

international trade and jobs. OECD, Paris, 2012

222. Organisation for Economic Co-operation and Development, Report on the cross-border enforcement of

privacy laws, 2006

223. Organization for Economic Co-operation and Development (OECD), OECD Guidelines for the security of

information systems and networks: Towards a culture of security, 2002

224. Organization for Economic Co-operation and Development (OECD), OECD Recommendation on

Electronic Authentication and OECD Guidance for Electronic Authentication 23, 2007,

http://www.oecd.org/dataoecd/32/45/38921342.pdf

225. Omachonu V. K. and Ross J. E., “Principles Of Total Quality”, CRC Press, Boca Raton, Florida, USA, 3rd

edition, 2004

226. Oza, Nilay V., Hall, Tracy, Rainer, Austen, and Grey, Susan, Trust in software outsourcing relationships:

An empirical investigation of Indian software companies, Information and Software Technology 48, no. 5,

2006, pp 345-354

227. Paliszkiewicz, Joanna, "Orientation on Trust and Organizational Performance", Social psychology, 1997,

pp 35-51

228. Parasuraman, A., Berry, L. L. and Zeithaml, V. A., “A conceptual model of service quality and its

implications for future research”, Journal of Marketing, Vol. 49, 1985, pp 41-50

229. Parasuraman, A., Berry, L. L. and Zeithaml, V. A., “SERVQUAL: A multiple item scale for measuring

consumer perceptions of service quality”, Journal of Retailing, Vol 64, No 1, 1988, pp 12-40

230. Parasuraman, A., Berry, L. L., and Zeithaml, V. A., “Refinement and reassessment of the SERVQUAL

scale”, Journal of Retailing, Vol 67, No 4, 1991, pp 420-450

231. Patterson, Raymond A., Rolland, Erik, and Yeo, Lisa, “Security and Privacy in Outsourcing with

Customer-Specified Risk Tolerance”, The Electronic Journal for Ecommerce Tools and Applications, 2007

198

232. Paulk, Mark C., Weber, Charles V., Garcia, Suzanne M., Chrissis, Mary Beth C., and Bush, Marilyn, "Key

practices of the Capability Maturity Model version 1.1", 1993

233. Pavlou, Paul A. "Consumer acceptance of electronic commerce: integrating trust and risk with the

technology acceptance model", International journal of electronic commerce 7, no. 3, 2003, pp 101-134

234. Penn, Jonathan, Forrester Research Inc, “The State Of Enterprise IT Security: 2008 To 2009, Business Data

Services North America And Europe”, December 24, 2008

235. Peters, Richard G., Covello, Vincent T., and McCallum, David B., "The determinants of trust and

credibility in environmental risk communication: An empirical study", Risk analysis, 17, no. 1, 1997, pp

43-54

236. Ponemon Institute, 2013 Cost of Data Breach Study: Global Analysis

237. Ponemon Institute, The economics of IT risk and reputation, What business continuity and IT security

really mean to your organization, Findings from the IBM Global Study on the economic impact of IT risk,

Global technology services, Risk Management, Research Report, July 2013

238. Porter, M , 1985, Competitive Advantage, New York Free Press

239. Porter, Michael E and Millar, Victor E, “How information gives you competitive advantage”, Harvard

Business Review, July – August, 1985

240. Prajogo, Daniel I., and Sohal, Amrik S., "The relationship between organization strategy, total quality

management (TQM), and organization performance – the mediating role of TQM", European Journal of

Operational Research, 168, no. 1, 2006, pp 35-50

241. Prakash, Aseem and Hart, Jeffrey A., Globalization and governance: an introduction, Globalization and

Governance, Routledge, 1999, ISBN: 0-415-21604-4

242. Pryor, M. G., Toombs, L., Anderson, D., & White, J. C., “What management and quality theories are best

for small businesses?”, Journal of Management and Marketing Research, Volume 3, pp1-12, January 2010

243. Randeree, Ebrahim, Kishore, Rajiv, and Rao, H. Raghav, "Investigating trust in outsourcing", Advances in

Management Information Systems, Information technology outsourcing, 8, 2007, pp135

199

244. Raisinghani, Mahesh, S., Starr, Brandi, Hickerson, Blake, Morrison, Marshelle, and Howard, Michael,

“Information Technology/Systems Offshore Outsourcing: Key Risks and Success Factors”, Journal of

Information Technology Research, Vol 1, No 1, January-March, 2008, pp 72-92

245. Rajkumar, T.M. and Mani, R.V.S., “Offshore Software Development: The View from Indian Suppliers,”

Information Systems Management, Vol 18, No 2, Spring 2001, pp 1-11

246. Reichheld, Frederick P., and W. Earl Sasser, Jr., "Zero Defections: Quality Comes to Services." Harvard

business review, Sept – Oct 1990, pp 105-111

247. Reina Dennis S and Reina Michelle L, Building sustainable trust, OD Practitioner, Vol 39, No 1, 2007

248. Ringle, C. M., Wende, S., Will A. ,2005, SmartPLS 2.0 (beta), www.smartpls.de

249. RISEPTIS, “Trust in the Information Society, A Report of the Advisory Board”, Research and Innovation

on Security, Privacy and Trustworthiness in the Information Society, 2009

250. Robinson, Nick, “Organizational Profiling: A Path to Effective IT Governance”, Cutter IT Journal, Vol. 22,

No. 12, December 2009

251. Rosemann, Michael, and De Bruin, Tonia, "Towards a Business Process Management Maturity Model",

IECIS, 2005, pp 521-532

252. Rosenau, James N, “Governance, Order, and Change in World Politics,” in Governance Without

Government: Order and Change in World Politics, ed. By Rosenau and Ernst-Otto Czempiel, New York:

Cambridge University Press, 1992

253. Rosenbaum, Howard, Towards an understanding of trust: (The importance of trust in the digital networked

economy, February 19, 2004, Workshop Creating partnership online - Concepts and tools, Darmstadt,

Germany)

254. Rousseau, Denise M., Sitkin, Sim B., Burt, Ronald S., and Camerer, Colin, "Not so different after all: A

cross-discipline view of trust", Academy of management review 23, no. 3, 1998, pp 393-404

255. Rust, R. T., Moorman, C., and Dickson, P. R., “Getting return on quality: revenue expansion, cost

reduction, or both?,” The Journal of Marketing, Vol 66, October 2002, pp 7-24

200

256. Sabherwal, Rajiv, "The role of trust in outsourced IS development projects", Communications of the ACM,

42, no. 2, 1999, pp 80-86

257. Saez, Sebastián, Taglioni, Daria, Services Trade Competitiveness Analysis, Poverty reduction and

economic management, International trade department, The World Bank

258. Saint-Germain, René, “Information security management best practice based on ISO/IEC 17799”, The

Information Management Journal, Vol 39, No 4, July/August 2005, pp 60-66

259. Saitta, Jo Ann, and Fjermestad, Jerry, “A Basic Model for Information Technology Outsourcing”, Journal

of Information Science and Technology, Vol 2, No 4, 2005

260. Sako, Mari, "Does trust improve business performance," Organizational Trust: A Reader, New York:

Oxford University Press, 2006, pp 267-291

261. Samat, Nusrah, Ramayah, T., and Saad, Norizan Mat, “TQM practices, service quality, and market

orientation: some empirical evidence from a developing country”, Management Research News, Vol. 29,

No. 11, 2006, pp 713-728

262. Samson, Danny and Terziovski, Mile, “The relationship between total quality management practices and

operational performance”, Journal of Operations Management No 17, Vol 4, 1999, pp 393-409

263. Santosa, Paulus Insap, Wei, Kwok Kee, Chan, Chuan Chan, “User involvement and user satisfaction with

information-seeking activity”, European Journal of Information Systems Vol 14, No 4, 2005, pp 361-370

264. Schlarman, Steven, "The people, policy, technology (ppt) model: Core elements of the security process",

Information systems security, 10, no. 5, 2001

265. Schwab, Klaus, The Global Competitiveness Report 2012-2013, World Economic Forum

266. Sen, Sandip, Saha, Sabyasachi, and Banerjee, Dipyaman, "Trust-Based Contracting", In 8th Workshop

“Trust in Agent Societies” at AAMAS, vol. 5, Utrecht, The Netherlands July 2005

267. Seppänen, Risto, Blomqvist, Kirsimarja, and Sundqvist, Sanna, "Measuring inter-organizational trust—a

critical review of the empirical research in 1990–2003," Industrial Marketing Management 36, no. 2, 2007,

pp 249-265

201

268. Seth, Nitin, Deshmukh, S. G., and Vrat, Prem, “Service quality models: a review”, International Journal of

Quality & Reliability Management, Vol. 22, No. 9, 2005, pp 913-949

269. Siakas, Kerstin V., Maoutsidis, Dimitri, and Siakas, Errikos,"Trust facilitating good software outsourcing

relationships", In Software Process Improvement, Springer Berlin Heidelberg, 2006, pp171-182

270. Sibal, D. Rajeev, “India: The Next Superpower?- The Untold Story of India’s Economy”, London School

of Economics, IDEAS Report, 2012

271. Singh, J. and Sirdeshmukh, D, “Agency and trust mechanisms in customer satisfaction and loyalty

judgements”, Journal of the Academy of Marketing Science, 28, no 1, pp 150-67, 2000

272. Skopik, Florian, Ma, Zhendong, Smith, Paul, and Bleier, Thomas, "Designing a cyber attack information

system for national situational awareness", In Future Security, Springer, Berlin Heidelberg, 2012, pp 277-

288

273. Stank, T.P., Keller, S.B. and Daugherty, P.J., “Supply Chain Collaboration And Logistical Service

Performance”, Journal of Business Logistics, Vol. 22 No. 1, 2001

274. Stefanović, Zoran, "Globalization: Theoretical perspectives, impacts and institutional response of the

economy", Facta universitatis-series: Economics and Organization 5, no. 3, 2008, pp 263-272

275. Stone, Mervyn, “Cross-validatory choice and assessment of statistical predictions”, Journal of the Royal

Statistical Society, Series B (Methodological), 36, 1974, pp 111-147

276. Strutt, J. E., Sharp, J. V., Terry, E., and Miles, R., "Capability maturity models for offshore organisational

management", Environment international, 32, no. 8, 2006, pp 1094-1105

277. Susanto, Heru, Almunawar, Mohammad Nabil, and Tuan, Yong Chee, "Information security management

system standards: A comparative study of the big five", International Journal of Electrical & Computer

Sciences IJECS-IJENS, Vol 11, No 05, 2011

278. Sydow, Jörg, "Understanding the constitution of interorganizational trust", Trust within and between

organizations: Conceptual issues and empirical applications, Oxford University Press, 1998, pp 31-63

202

279. Tafti, Mohammed, H., A., “Risks factors associated with offshore IT outsourcing”, Industrial Management

& Data Systems, Vol. 105 No. 5, 2005, pp 549-560

280. The Ministry of International Trade and Industry, 1999

281. Thuraisingham, Bhavani, "Security standards for the semantic web", Computer Standards & Interfaces 27,

no. 3, 2005, pp 257-268

282. Tisdell, Clement A, “Trust and its implications for economic activity, welfare and globalization”, No.

90617 in Economic theory, Applications and Issues, University of Queensland, School of Economics, 2008

283. Tiwana, Amrit, and Bush, Ashley A, A Comparison of Transaction Cost, Agency, and Knowledge-Based

Predictors of IT Outsourcing Decisions: A U.S.-Japan Cross-Cultural Field Study, Journal of Management

Information Systems, Vol. 24, No. 1, Summer 2007

284. Tonkiss, Fran, "Trust, confidence and economic crisis", Intereconomics 44, no. 4, 2009, pp 196-202

285. Touré Dr Hamadoun I., Secretary-General of the International Telecommunication Union and the

Permanent Monitoring Panel on Information Security World Federation of Scientists, The Quest For Cyber

Peace, January 2011

286. Trautman, Lawrence J., and Altenbaumer-Price, Kara, “The Board’s Responsibility for Information

Technology Governance”, The John Marshall Journal of Computer and Information Law, Vol 28, Number

3, Spring 2011, pp 313-411

287. Treacy Michael and Wiersema Fred, “Customer Intimacy and Other Value Disciplines”, Harvard Business

Review, Vol 71, January 1993, pp 84-93

288. Trustwave Global Security Report 2013

289. United Nations Conference on Trade and Development(UNCTAD), World Investment Report 2004, “The

shift towards services”, United Nations, New York and Geneva, 2004

290. United Nations Publication, “Manual on Statistics of International Trade in Services”, Department of

Economic and Social Affairs Statistics Division, Statistical Papers, Series M NO. 86, 2002

203

291. Urban, Glen L., “The Trust Imperative”, MIT Sloan School of Management, Working Paper 4302-03,

March 2003

292. Urban, Wiesław, “Service Quality Gaps and their role in service enterprises development”, Technological

and economic development Of Economy, Baltic Journal on Sustainability, Vol 15, No 4, 2009, pp 631-645

293. Uslaner, Eric M., "Trust in the knowledge society", In International Forum on Social Capital for Economic

Revival, Economic and Social Research Institute, Cabinet Office, Japan, 2003

294. Van Grembergen, W., Introduction to the Minitrack: IT governance and its mechanisms, Proceedings of the

35th Hawaii International Conference on System Sciences (HICCS), IEEE, 2002

295. Vargo, Stephen L., and Lusch Robert F., "Evolving to a new dominant logic for marketing." Journal of

marketing ,2004, pp 1-17

296. Vargo, Stephen L., Nagao, Kaori, He, Yi, and Morgan, Fred W., “Satisfiers, Dissatisfiers, Criticals, and

Neutrals: A Review of Their Relative Effects on Customer (Dis)Satisfaction”, Academy of Marketing

Science Review, Vol. 11, No. 2, 2007

297. Viklund, Mattias, and Sjöberg, Lennart, "An Expectancy‐Value Approach to Determinants of Trust",

Journal of Applied Social Psychology, 38, no. 2, 2008, pp 294-313

298. Von Solms, Basie, “Corporate Governance and Information Security”, Computers & Security, 20, 2001, pp

215-218

299. Von Solms, Rossouw, Thomson, K. L., and Maninjwa, Mvikeli, "Information security governance control

through comprehensive policy architectures", In Information Security South Africa (ISSA), IEEE, 2011,

pp. 1-6

300. Wang, Ye Diana, and Emurian, Henry H., "An overview of online trust: Concepts, elements, and

implications." Computers in human behavior 21, no. 1, 2005, pp 105-125

301. Watson, Richard T., Pitt, Leyland F., Kavan, C. Bruce, “Measuring Information Systems Service Quality:

Lessons From Two Longitudinal Case Studies”, MIS Quarterly, March 1998, pp 61-79

302. Wignaraja, Ganeshan. Competitiveness Strategy in Developing Countries: A Manual for Policy Analysis,

Vol. 30, Routledge, 2003

204

303. Williamson, O. E. “Transaction Cost Economics: The Governance of Contractual Relations”, Journal of

Law and Economics, 22, 1979, pp 233-361

304. Wirtz, Jochen, "Development of a service guarantee model", Asia Pacific Journal of Management, Vol 15,

No 1, 1998, pp 51-75

305. Wold, H.O., “Softmodeling: The basic design and some extensions”, K.G.Jo¨reskog and H. O.Wold(Eds),

Systems under indirect observations, Part II, Amsterdam: North-Holland, 1982, Chapter 1, pp 1-54

306. Wold, H., “Introduction to the Second Generation of Multivariate Analysis”, Theoretical Empiricism, New

York: Paragon House, 1989, pp 7-11

307. Wong, A., Tjosvold, D., Wong, W.Y.L., Liu, C.K., “Relationships for quality improvement in the Hong

Kong China supply chain,” The International Journal of Quality and Reliability Management, Vol 16 No 1,

1999, pp 24–41

308. Woods, Guy, Research Paper no. 3 2007–08, “The statistical evidence for offshore outsourcing and its

impact on the Australian labour force”, Statistics and Mapping Section, Parliament of Australia, 2 August

2007

309. Woody, Carol, “Eliciting and Analyzing Quality Requirements: Management Influences on Software

Quality Requirements”, No. CMU/SEI-2005-TN-010, Software Engineering Institute, Carnegie Mellon

University, March 2005

310. Workman, Michael, Bommer, William H., and Straub, Detmar, "Security lapses and the omission of

information security measures: A threat control model and empirical test", Computers in Human Behavior,

24, no. 6, 2008, pp 2799-2816

311. World Economic Forum and INSEAD, “The Global Information Technology Report 2012, Living in a

Hyperconnected World”, Editors Soumitra Dutta and Beñat Bilbao-Osorio, 2012

312. World Trade Organization, International Trade Statistics 2012

313. Yacuzzi, Enrique, "A Primer on Governance and Performance in Small-and Medium-Sized Enterprises,"

Documento de Trabajo, No. 293, June 2005

205

314. Yalaho, A., “Plugging Into Offshore Outsourcing Of Software Development: A Multiple Case Study”,

Issues in Information Systems, Volume VIII, No. 2, 2007

315. Yearworth, Mike, Monahan, Brian, and Pym, David, “Predictive Modelling for Security Operations

Economics”, The Workshop on the Economics of Securing the Information Infrastructure, Washington,

DC, October 23-24, 2006

316. Zeithaml, Valarie A., "Service quality, profitability, and the economic worth of customers: what we know

and what we need to learn," Journal of the Academy of Marketing Science, Vol 28, No 1, 2000, pp 67-85

317. Zheng, Beiyao, Hall, Mark, A., Dugan, Elizabeth, Kidd, Kristin, E., and Levine, Douglas, “Development of

a Scale to Measure Patients' Trust in Health Insurers”, Health Services Research 37:1, February 2002

318. Zisis, Pandelis, Garefalakis, Alexandros and Sariannidis, Nikolaos, "The Application of Performance

Measurement in the Service Quality Concept: The Case of a Greek Service Organization," Journal of

Money, Investment and Banking, Issue 9, 2009, pp 21-47

Online articles:

319. http://www.outsourcing-center.com/2004-12-india-responds-to-growing-concerns-over-data-security-

article-37883.html , Article accessed on August 12, 2013: India Responds to Growing Concerns Over Data

Security, Gaurav Bhagowati, Business Writer, Everest India, December 1, 2004

320. http://www.moneycontrol.com/news/features/source-code-theft-may-blight-bpo-bubble_158589.html ,

Article accessed on August 12, 2013: Source code theft may blight BPO bubble, M Rohinesh, Jan 03, 2005

321. http://hindu.com/2002/08/28/stories/2002082803231300.htm , Article accessed on August 12, 2013:

Engineer held for bid to sell secrets, August 28, 2002

322. http://www.infoworld.com/d/developer-world/source-code-stolen-us-software-company-in-india-855 ,

Article accessed on August 12, 2013: Source code stolen from U.S. software company in India, John

Ribeiro, August 5, 2004

323. http://www.outsourcing-law.com/2009/10/insider-theft-of-trade-secrets-in-india-employee-of-captive-rd-

subsidiary-accused-of-source-code-theft-and-what-you-need-to-know-about-protecting-your-trade-secrets-

abroad/ , Article accessed on August 12, 2013: Insider Theft of Trade Secrets in India: Employee of

206

Captive R&D Subsidiary Accused of Source Code Theft (and What You Need to Know About Protecting

Your Trade Secrets Abroad), Bierce & Kenerson, P.C., October 9, 2009

324. http://www.nytimes.com/2006/10/05/business/worldbusiness/05call.html?_r=0 , Article accessed on

August 12, 2013: Security Breaches Worry Outsourcing Industry, Saritha Rai, October 5, 2006

325. http://articles.timesofindia.indiatimes.com/2005-04-23/special-report/27847921_1_mphasis-bfl-bpo-

employees-bpo-arm , Article accessed on August 12, 2013: India's first BPO scam unraveled, Abhay

Vaidya, April 23, 2005

326. http://www.hindustantimes.com/News-Feed/NM16/BPO-industry-battling-data-insecurity/Article1-

151322.aspx , Article accessed on August 12, 2013: BPO industry battling data insecurity, Preeti Singh

Saksena & Radhieka Mittal, September 17, 2006

327. http://articles.economictimes.indiatimes.com/2005-06-26/news/27490837_1_karan-bahree-infinity-e-

search-gurgaon-police, Article accessed on August 12, 2013: Gurgaon police dig into Sun's sting, June 26,

2005

328. http://articles.timesofindia.indiatimes.com/2007-08-24/ahmedabad/27961986_1_city-firm-new-firm-bpo ,

Article accessed on August 12, 2013: BPO accuses ex-employees of fraud, August 24, 2007

329. http://www.dnaindia.com/mumbai/1141842/report-pune-woman-held-in-12mn-cyber-theft , Article

accessed on August 12, 2013: Pune woman held in $12mn cyber theft, December 28, 2007

330. http://articles.timesofindia.indiatimes.com/2012-04-05/hyderabad/31293924_1_source-code-cid-mumbai-

engineer , Article accessed on August 12, 2013: Mumbai engineer held for source code theft, April 5, 2012

331. http://articles.timesofindia.indiatimes.com/2013-05-12/india/39203059_1_debit-pre-paid-cards-travel-cards

, Article accessed on August 12, 2013: Global ATM heist: Cyber cheats hacked into systems of Pune,

Bangalore companies, Mayur Shetty, Times of India, May 12, 2013

332. http://www.reuters.com/article/2013/05/13/us-usa-crime-cybercrime-electracard-

idUSBRE94C0K220130513 , Article accessed on August 12, 2013: Exclusive: Indian firm in global ATM

heist admits system breached, Kaustubh Kulkarni, Reuters, May 13, 2013

207

333. http://www.cigionline.org/publications/2013/5/change-conversation-change-venue-and-change-our-future ,

Article accessed on May 31, 2013: Change the Conversation, Change the Venue and Change Our Future,

Melissa E Hathaway, Centre for International Governance Innovation, May 14, 2013

334. http://www.economist.com/node/186628 , Article accessed on May 11, 2013: Innovation in Industry, Catch

the wave, The long cycles of industrial innovation are becoming shorter, The Economist, Feb 18th 1999

335. http://www.docstoc.com/docs/70372399/Download-Speech-By-Dean-Nitin-Nohria_-Harvard-Business---

%E2%80%9CIndia , Article accessed on September 5, 2010

336. http://www.unescap.org/unis/press/G_05_00.htm , Article accessed on Nov 12, 2011

337. KOF Index of Globalization 2011, Press Release,

http://globalization.kof.ethz.ch/static/pdf/press_release_2011_en.pdf, Article accessed on October 27, 2011

338. http://globalization.kof.ethz.ch, Article accessed on October 27, 2011

339. http://www.takinggovernanceforward.org, Article accessed on March 21, 2012

340. http://www.forbes.com/sites/jennagoudreau/2013/03/08/ibm-ceo-predicts-three-ways-technology-will-

transform-the-future-of-business/ , Article accessed on August 20, 2013

341. NASSCOM Resource Centre, http://www.nasscom.in/resource_center , Accessed on June 22, 2013

342. http://www.nasscom.in/upload/Perspective%202020%20Press%20release%20presentation.pdf Page 14,

Article accessed on May 12, 2012

343. NASSCOM 2009 press release of its report ‘Perspective 2020: Transform Business, Transform India’,

http://www.nasscom.in/perspective-2020, Article accessed on April 21, 2009

344. World Trade Organization, Statistics database, stat.wto.org, accessed on August 10, 2013

345. World Trade Organization, Services: rules for growth and investment;

http://www.wto.org/english/thewto_e/whatis_e/tif_e/agrm6_e.htm, Article accessed on August 15, 2013

346. http://193.145.233.67/dspace/bitstream/10045/28162/2/SIJOffshoreOutsourcing.pdf , Gonzalez, Reyes,

Juan Llopis, and Jose Gasco. "Information systems offshore outsourcing: managerial conclusions from

208

academic research." International Entrepreneurship and Management Journal (2013): 1-31, Article accessed

on August 30, 2013

347. http://www.spinaltwist.eclipse.co.uk/Files/Dissertation/Blomqvist.K.%20%20The%20many%20faces%20o

f%20trust.pdf , Blomqvist, Kirsimarja. "The many faces of trust." Scandinavian journal of management 13,

no. 3 (1997): 271-286, Article accessed August 30, 2013