references - inflibnetshodhganga.inflibnet.ac.in/bitstream/10603/37604/14/14_references.pdf25....
TRANSCRIPT
178
References
1. Abdi, Hervé, "Partial least square regression (PLS regression)", Encyclopedia for research methods for the
social sciences, 2003, pp 792-795
2. Adam, Everett E., Lawrence M. Corbett, Benito E. Flores, Norma J. Harrison, T. S. Lee, Boo-Ho Rho,
Jaime Ribera, Danny Samson, and Roy Westbrook, "An international study of quality improvement
approach and firm performance," International Journal of Operations & Production Management, Vol 17,
no. 9, 1997, pp 842-873
3. Agarwal, Shalini, Khaitan, Sakate, Shrivastava , Satyendra, and Banks, Mathew, “Destination India:
Offshore Outsourcing And Its Implications”, Computer and Telecommunications Law Review (C.T.L.R.),
Volume 11, ISSUE 8, 2005, pp 246-262
4. Akbar, Mohammad Muzahid, and Noorjahan Parvez, “Impact of service quality, trust, and customer
satisfaction on customers loyalty”, ABAC Journal 29, No 1, 2009, pp 24-38
5. AMI-Partners, Research Study on Current Usage Behavior of IT Security within the Software /
Outsourcing verticals with a focus on Secure Coding among 35 CMMI Level 4 and 5 companies, 2010
6. Anuwichanont, J., and Mechinda, P., “The impact of perceived value on spa loyalty and its moderating
effect of destination equity,” Journal of Business & Economics Research, Vol 7, No 12, 2009, pp 73-89
7. Aranda, Daniel Arias, "Service operations strategy, flexibility and performance in engineering consulting
firms," International Journal of Operations & Production Management, Vol 23, No 11, 2003, pp 1401-1421
8. Aris, Syaripah, Ruzaini Hj, Syed, Arshad, Noor, Habibah, and Mohamed, Azlinah, “Conceptual
Framework on Risk Management in IT Outsourcing Projects”, WSEAS Transactions on Information
Science & Applications, Issue 4, Volume 5, 2008, pp 816-831
9. Arnott, D C., Warwick Business School, University of Warwick, Coventry, UK, 22 May 2009 edition,
Trust: A bibliography; Earlier version published: Arnott, D.C. (2007), Research on Trust: A bibliography
and brief bibliometric analysis of the special issue submissions, European Journal of Marketing – Special
Issue on Trust, 41:9/10, pp 1203-1240
10. Arora A and Athreye S, “The software industry and India’s economic development”, Information
Economics and Policy, Vol 14, 2002, pp 253-273
179
11. Arora, Ashish, Arunachalam, V. S., Asundi, Jai, and Fernandes, Ronald, The globalization of software: The
case of the Indian software industry, report submitted to the Sloan Foundation, Pittsburgh: Carnegie Mellon
University, 2001
12. Asubonteng, Patrick, McCleary, Karl J., and Swan, John E., “SERVQUAL revisited: a critical review of
service quality”, The Journal Of Services Marketing, Vol. 10, No. 6, 1996, pp 62-81
13. A.T. Kearney, The 7 habits of highly effective IT Governance, Powerful lessons in transforming business
and information technology, 2008
14. Bahl, S., Wali, O. P., and Kumaraguru, P., “Information security practices followed in the Indian software
services industry: An exploratory study”, In Cybersecurity Summit (WCS), 2011 Second Worldwide,
IEEEXplore, June 2011, pp 1-7
15. Bahl, Sanjay, and Wali, O. P., "An empirical analysis of perceived significance of information security
service quality to predict the organisational performance in software service industry", CSI Transactions on
ICT, Springer, Vol 1, Issue 3, 2013, pp 221-230
16. Bahl, Sanjay, and Wali, O. P., "Perceived significance of information security governance to predict the
information security service quality in Software Service Industry – An empirical analysis", Information
Management and Computer Security, Emerald (Paper accepted for publishing on May 16, 2013, coming in
Vol 22, No 1, 2014)
17. Bajpai, N. and Radjou, N, “Raising the Global Competitiveness of Tamilnadu’s Information Technology
Industry”, Development Discussion Paper No. 728, Harvard Institute for International Development, 1999
18. Bajpai, N and Shastri, V, “Software Industry in India: A Case Study”, Development Discussion Paper No.
667, Harvard Institute for International Development, 1998
19. Baldrige National Quality Program, “2008 Criteria for Performance Excellence”, National Institute of
Standards and Technology, Department of Commerce
20. Baldrige National Quality Program, “2011-2012 Criteria for Performance Excellence”, National Institute of
Standards and Technology, Department of Commerce
180
21. Barbalet, Jack, "A characterization of trust, and its consequences", Theory and society, Vol 38, no. 4, 2009,
pp 367-382
22. Barg, Matthew, Bica, Ioana and Chiu, Bobby, “Software & Services Industry Report”, September 2012,
Sustainalytics
23. Barney, J.B. and Hansen, M.H., “Trustworthiness as a Source of Competitive Advantage”, Strategic
Management Journal, 15 (Winter Special Issue), 1994, pp 175-190
24. Bekmamedova, Nargiza, Prananto, Adi, McKay, Judy, and Vorobiev, Artem, "Towards Better
Understanding of the Relationship between Formal Controls and Trust in IS Outsourcing", Proceedings of
the 19th Australasian Conference on Information Systems (ACIS), 2008
25. Benvenuto, Nicholas A. and Brand, David, “Outsourcing - A Risk Management Perspective”, Information
Systems Audit and Control Association (ISACA), Information Systems Control Journal, Volume 5, 2005
26. Berger, Charles, Blauth, Robert, Boger, David, Bolster, Christopher, Burchill, Gary, DuMouchel, William,
Pouliot, Fred, Richter, Reinhard, Rubinoff, Allan, Shen, Diane, Timko, Mike, and Walden, David, A
special issue on Kano’s Methods for Understanding Customer-defined Quality, Center for Quality
Management Journal, Vol. 4, Fall 1993
27. Bernheim, Carlos Tünnermann and De Souza, Chaui Marilena, Challenges of the university in the
knowledge society, five years after the World Conference on Higher Education, UNESCO Forum
Occasional Paper Series, Paper No. 4, Paris, December, 2003
28. Bertin, Marcos E. J., “The Impact of Corporate Governance on the Quality of Management”, Version1.2,
International Academy for Quality, June 2005
29. Bertrand, Ayse and Kothe, Emilie, FDI in Figures, OECD Investment Division, Secretariat of the OECD
Investment Committee, April 2013
30. Bharadwaj, S.G, and Varadarajan P.R, “Sustainable Competitive Advantage in Service Industries: A
conceptual Model and Research Propositions”, Journal of Marketing, Vol.57, Issue 4, 1993, pp 83
31. Black, S., and Porter, L., “Identification of the critical factors of TQM”, Decision Sciences, Vol 27, No 1,
1996, pp 1-21
181
32. Blinder, Alan S. "Offshoring: The next industrial revolution." Foreign Affairs 85, 2006, pp 113
33. Blomqvist, Kirsimarja, and Stahle, P., "Building organizational trust", A paper submitted for the 16th
Annual IMP Conference, Sept 6-9, 2000, Bath, UK
34. Bojanc, Rok, "Quantitative Model for Information Security Risk Management", Management, Knowledge
and Learning, International Conference, 2012, pp267-275
35. Bou-Llusar, J. Carlos, Escrig-Tena, Ana B., Roca-Puig, Vicente, Beltra´n-Martı´n, Inmaculada, “An
empirical assessment of the EFQM Excellence Model: Evaluation as a TQM framework relative to the
MBNQA Model”, Journal of Operations Management, Vol 27, No 1, 2009, pp 1-22
36. Bowen, Pauline, Hash, Joan, and Wilson, Mark, Information Security Handbook: A Guide for Managers
(NIST Special Publication 800-100), Recommendations of the National Institute of Standards and
Technology, October 2006, http://csrc.nist.gov/publications/nistpubs/index.html
37. Breslin, John G., O'Sullivan David, Passant Alexandre, and Vasiliu Laurentiu, "Semantic Web computing
in industry", Computers in Industry 61, no. 8, 2010, pp 729-741
38. Buang, Abdul Aziz, Lim, Guan Choo, and Samimi, Paris, "A critical review on synthetic globalization
indexes", International Journal on Fundamental Psychology and Social Sciences 2, no. 1, 2012, pp 28-31
39. Busi, Marco and McIvor, Ronan, “Setting the Outsourcing Research Agenda: The Top-10 Most Urgent
Outsourcing Areas,” Strategic Outsourcing: An International Journal, Vol. 1 No. 3, 2008
40. Butler, John K., "Toward understanding and measuring conditions of trust: Evolution of a conditions of
trust inventory", Journal of management, 17, no. 3, 1991, pp 643-663
41. Caralli, Richard A., and Wilson, William R., “The Challenges of Security Management”, Survivable
Enterprise Management Team, Networked Systems Survivability Program, Software Engineering Institute,
2004
42. Carrascal, Luis M., Galván, Ismael, and Gordo, Oscar, "Partial least squares regression as an alternative to
current regression methods used in ecology", Oikos, 118, no. 5, 2009, pp 681-690
43. Casadesus-Masanell, Ramon, and Khanna, Tarun, "Globalization and trust: Theory and evidence from
cooperatives", William Davidson Institute Working Paper 592, University of Michigan, June 2003
182
44. Castelfranchi, Cristiano, and Falcone, Rino, "Trust and control: a dialectic link," Applied Artificial
Intelligence 14, no. 8, 2000, pp 799-823
45. Castells, Manuel, “Information Technology, Globalization and Social Development”, United Nations
Research Institute for Social Development Discussion Paper No. 114, September 1999
46. Cattaneo, Olivier, Engman, Michael, Sáez, Sebastián, and Stern, Robert M., eds. International trade in
services: new trends and opportunities for developing countries, World Bank, 2010
47. Chase-Dunn, Christopher, Kawano, Yukio, and Brewer, Benjamin D., "Trade globalization since 1795:
Waves of integration in the world-system", American Sociological Review, 2000, pp 77-95
48. Chin, W. W. , “The partial least squares approach to structural equation modelling”, Marcoulides, G. A.
(Ed.), Modern Methods for Business Research, New Jersey: Lawrence Erlbaum Associates, 1988
49. Chin, W. W., Marcolin, B. L., Newsted, P. R., “A partial least squares latent variable modeling approach
for measuring interaction effects: results from a Monte Carlo simulation study and voice mail
emotion/adoption study”, Proceedings of the Seventeenth International Conference on Information
Systems, J. I. DeGross, S. Jarvenpaa, and A. Srinivasan (eds.), 1996
50. Chin, W.W., “Issues and opinion on structural equation modelling”, MIS Quarterly, Vol 22, No 1, 1998a,
pp 7-16
51. Chin, W.W. , “The partial least squares approach for structural equation modelling”, Marcoulides, George
A. (Ed), Modern methods for business research, Methodology for business and management., 1998b, pp
295-336
52. Chin, W. W. and Newsted, P. R. , “Structural Equation Modeling Analysis with Small Samples Using
Partial Least Squares”, in Hoyle, R. H. (ed.) Statistical Strategies for Small Sample Research, Thousand
Oaks: Sage Publications, 1999, pp 307-342
53. Churchill, G.A., “A paradigm for developing better measures of marketing constructs”, Journal of
Marketing Research, Vol 16, No 1, 1979, pp 64-73
54. Clift, Hamish and Mandeville, Tom, "Towards a Global Civilisation: An Evolutionary Perspective", 14th
International Schumpeter Society Conference, Brisbane, Australia, 2-5 July 2012
183
55. Colgate, Mark, “Creating Sustainable Competitive Advantage Through Marketing Information System
Technology: A triangulation Methodology Within the Banking Industry”, International Journal of Bank
Marketing, Vol 16 Issue 2, 1998, pp 80-89
56. Commonwealth of Australia, “Trusted Information Sharing Network for Critical Information Protection,
Leading Practices and Guidelines for Enterprise Security Governance”, June 2006
57. Computer Emergency Response Team (CERT-In), PricewaterhouseCoopers (PwC) and Federation of
Indian Chambers of Commerce and Industry (FICCI), From Strength to Strength - Raising the Benchmark
for Information Security in India, Technology Risk Management, 2007 – 2008
58. Conboy, Martin, “Outsourcing makes the world a better place”, Outsource Magazine, January 23, 2013
59. Cook, Lori S. and Verma, Rohit, “Exploring the Linkages between Quality System, Service Quality, and
Performance Excellence: Service Providers’ Perspectives”, Quality Management Journal, Vol 9, No 2,
2002, pp 44-56
60. Corbett, Michael F, “The outsourcing revolution: why it makes sense and how to do it right”, Kaplan
Publishing, 2004
61. Corporate Governance Task Force Report on Information Security Governance: A Call To Action, April
2004
62. Costa, Ana Cristina, and Bijlsma-Frankema, Katinka, "Trust and Control Interrelations New Perspectives
on the Trust—Control Nexus," Group and Organization Management, Vol 32, no. 4, 2007, pp 392-406
63. Crease, Robert P. "The paradox of trust in science." Physics World 17, no. 3, 2004, pp18
64. Creswell, John, W., and Miller, Dana, L., “Determining Validity in Qualitative Inquiry”, Theory into
Practice, Volume 39, Number 3, Summer 2000
65. Cronbach, L.J., “Coefficient alpha and the internal structure of tests”, Psychometrika, Vol. 16, No 3, 1951,
pp 297-334
66. Crosby, P. B., Quality is free, McGraw-Hill New York, 1979
184
67. Curkovic, S., Melnyk, S., Calantone, R. and Handfield, R., “Validating the Malcolm Baldrige National
Quality Award framework through structural equation modelling”, International Journal Production
Research Vol 38, No 4, 2000, pp 765-791
68. Currall, Steven C., and Epstein, Marc J., "The fragility of organizational trust: Lessons from the rise and
fall of Enron", Organizational Dynamics 32, no. 2, 2003, pp 193-206
69. Currall, Steven C., and Judge, Timothy A., "Measuring trust between organizational boundary role
persons", Organizational behavior and Human Decision processes, 64, no. 2, 1995, pp 151-170
70. Dann, Z, and Barclay, I., “Complexity Theory and Knowledge Management Application”, The Electronic
Journal of Knowledge Management, Volume 4, Issue 1, 2006
71. Dasgupta, P. “Trust as a Commodity,” in Trust: Making and Breaking Cooperative Relations, D. Gambetta
(Ed.), Basil Blackwell, New York, 1988, pp. 49-72
72. Data Security Council of India (DSCI) - KPMG Survey 2009, State of Data Security and Privacy in the
Indian Industry, Released on December 30, 2009
73. Davis D., Project10X’s Semantic Wave 2008 Report: Industry Roadmap to Web 3.0 & Multibillion Dollar
Market Opportunities, Executive Summary, October 2008, www.project10x.com
74. Davis, Jeff, The Global Outsourcing Report 2005, Media‘s CIO Insight, Horasis and Going Global
Ventures
75. D’Costa, Anthony.P, “Uneven and Combined Development: Understanding India’s Software Exports”,
World Development, Vol 31, Issue 1, January 2003, pp 211-226
76. De Bruin, Tonia, Freeze, Ronald, Kaulkarni, Uday, & Rosemann, Michael, Understanding the Main Phases
of Developing a Maturity Assessment Model, In Campbell, B, Underwood, J, & Bunker, D (Eds.)
Australasian Conference on Information Systems (ACIS), November 30 – December 2 2005, Australia,
New South Wales, Sydney
77. Department of Electronics and Information Technology, Annual Report 2012 -2013, Ministry of
Communications and Information Technology, Government of India
185
78. Department of Industrial Policy & Promotion, Annual Report 2010-11, Ministry of Commerce and
Industry, Government of India
79. DiRomualdo, A., and Gurbaxani, V. , “Strategic intent for IT outsourcing”, Sloan Management Review,
Summer, 1998, pp 67–80
80. Dlamini, M. T., Eloff, Jan HP, and Eloff, Mariki M., "Information security: The moving target", computers
& security, 28, no. 3, 2009, pp 189-198
81. Dreher, Axel, “Does Globalization Affect Growth? Evidence from a new Index of Globalization”, Applied
Economics 38, 10, 2006, pp 1091-1110. Updated in: Dreher, Axel, Noel Gaston and Pim Martens,
Measuring Globalisation – Gauging its Consequences, 2008, New York, Springer
82. Drezner, Daniel W., Globalization and Policy Convergence, International Studies Review, Vol. 3, No. 1,
Spring, 2001, pp 53-78
83. Duke University CIBER / Archstone Consulting study 2nd Bi-annual, Offshore Survey Results, December
2005
84. Eiser, J. Richard, and White, Mathew P., "A psychological approach to understanding how trust is built and
lost in the context of risk," In CARR conference ‘Taking Stock of Trust’, London School of Economics,
December, vol. 12. 2005
85. Emsley, David, and Kidon, Filip, "Developing Trust in Multiple Stages: The implications for management
accounting”
86. Ferrin, Donald L., Dirks, Kurt T. and Shah, Pri P., “Many routes Toward Trust: A Social Network Analysis
of the Determinants of Interpersonal Trust”, Academy of Management Best Conference Paper 2003 OB:
C1
87. Fink, Dieter, “A Security Framework for Information Systems Outsourcing”, Information Management &
Computer Security, Vol. 2 No. 4, 1994, pp 3-8
88. Firesmith, Donald G., “Common Concepts Underlying Safety, Security, and Survivability Engineering”,
No CMU/SEI-2003-TN-033, Carnegi-Mellon Univ Pittsburgh PA Software Engineering Inst, 2003
186
89. Ford, Matthew W., and Evans, James R., “Conceptual Foundations of Strategic Planning in the Malcolm
Baldrige Criteria for Performance Excellence”, Quality Management Journal Vol. 7, No. 1, 2000, pp 8-26
90. Fornell, C., Larcker, D.F., “Evaluating structural equation models with unobservable variables and
measurement error”, Journal of Marketing Research, Vol 18, 1981, pp 39-50
91. Forrester Report, 3.3 Million U.S. Jobs To Go Offshore, November 11, 2002
92. Fotopoulos, Christos B. and Psomas, Evangelos L., “The impact of “soft” and “hard” TQM elements on
quality management results”, International Journal of Quality & Reliability Management, Vol. 26 No. 2,
2009, pp 150-163
93. Gable, Guy, G., “Integrating Case Study and Survey Research Methods: An Example in Information
Systems”, European Journal of Information Systems, 3(2), 1994
94. Gazzini, Alessandro, and Holt, Matthew, “Limiting the Impact of Data Breaches: The Case of the Sony
Playstation Network”, Booz & Company, June 8, 2011, pp 1-12
95. Gefen, D., Straub, D., “A practical guide to factorial validity using PLS-graph: tutorial and annotated
example”, Communications of the Association for Information Systems Vol 16, 2005, pp 91-109
96. Geisser,S., “A predictive approach to the random effect model”, Biometrika, Vol 61, No1, 1974, pp 101-
107
97. Ghani, Ejaz and Kharas, Homi, “The Service Revolution”, Economic Premise, Number 14, World Bank,
2010
98. Ghemawat, Pankaj, "Why the world isn't flat", Foreign Policy, 2007, pp 54-60
99. Ghobadian, Abby, Gallear, David, and Hopkins, Michael, “TQM and CSR Nexus”, International Journal of
Quality and Reliability Management, Vol 24, No 2, 2007, pp 704-721
100. Giddens, A., The Consequence of Modernity, Oxford: Oxford Polity Press, 1990
101. Global Insight, ‘The Comprehensive impact of offshore IT software and services outsourcing on the US
economy and the IT industry’, Lexington, MA, March 2004
187
102. Golder, P. N., Mitra, D., and Moorman, C., “What is quality? an integrative framework of processes and
states,” Journal of Marketing, Vol 76, No 4, 2012, pp 1-23
103. Golembiewski, Robert T. and McConkie, Mark, The Centrality of Interpersonal Trust in Group Processes,
Theories of Group Processes, Wiley, 1975
104. Goles, Tim and Chin, Wynne W., “Information Systems Outsourcing Relationship Factors: Detailed
Conceptualization and Initial Evidence”, The DATA BASE for Advances in Information Systems, Vol. 36,
No. 4, Fall 2005
105. Goodhue, D., Lewis, W., Thompson, R., “PLS, small sample size, and statistical power in MIS research”,
Proceeding of the 39th Hawaii International Conference on System Sciences, Vol 8, IEEE, 2006
106. Gonzalez, Reyes, Gasco, Jose and Llopis, Juan, “Information Systems Offshore Outsourcing A Descriptive
Analysis”, Industrial Management & Data Systems, Vol. 106, No. 9, 2006a, pp 1233-1248
107. Gonzalez, Reyes, Gasco, Jose, and Llopis, Juan, "Information systems outsourcing: A literature analysis,"
Information & Management, Vol 43, no. 7, 2006b, pp 821-834
108. Gonzalez, Reyes, Gasco, Jose and Llopis, Juan, “Information Systems Outsourcing Reasons and Risks: An
Empirical Study,” International Journal of Social Sciences Vol 4, No 3, 2009, pp 180-191
109. Gooris, Julien, and Peeters, Carine, "Home–Host Country Distance in Offshore Governance Choices",
Journal of International Management, 2013
110. Gregory, Holly J., “International Comparison of Corporate Governance Guidelines and Codes of Best
Practice Developing & Emerging Markets”, Weil, Gotshal & Manges LLP, Fall Edition 2002
111. Grönroos, Christian, "The relationship marketing process: communication, interaction, dialogue, value",
Journal of Business & Industrial Marketing, 19, no. 2, 2004, pp 99-113
112. Grover, Varun, Cheon, Myun Joong, and Teng, James T.C., “The Effect of Service Quality and Partnership
on the Outsourcing of Information Systems Functions”, Journal of Management Information Systems, Vol.
12, No. 4, Spring 1996, pp 89-116
113. Gulla, Umesh, and Gupta, M. P., "Outsourcing in Government Sector: A Strategic Perspective", Delivering
E-government, 2006, pp 170
188
114. Gupta, Atul, McDaniel, Jason C. and Herath, S. Kanthi, “Quality management in service firms: sustaining
structures of total quality service”, Managing Service Quality, Vol. 15 No. 4, 2005 pp 389-402
115. Gustavsson, R., Mellstrand, P., and Törnqvist, B., "Information Security Models and Their Economics",
CRISP Deliverable D 1, 2005
116. Hair, Joe, F., Ringle, Christian, M., Sarstedt, Marko, “PLS-SEM: Indeed a Silver Bullet”, Journal of
Marketing Theory and Practice, Vol. 19, No. 2, Spring 2011, pp 139-152
117. Hallowell, Roger, "The relationships of customer satisfaction, customer loyalty, and profitability: an
empirical study", International journal of service industry management, 7, no. 4, 1996, pp27-42
118. Hanlon, Dennis, Vision and Support in New Venture Start-Ups,
www.babson.edu/entrep/fer/Babson2001/XI/XIB/XIB/xi-b.htm#Top, 2001
119. Hausknost, Daniel, and Haas, Willi, "The role of innovation in a socio-ecological transition of the
European Union”, Neujobs Working Paper No. D 1.4, April 2013
120. Hendricks, K.B., Singhal, V.R., “Does Implementing an Effective TQM Program Actually Improve
Operating Performance? Empirical evidence from firms that have won quality awards,” Management
Science, September 1997, Vol. 43 No. 9, pp 1258 -1274
121. Henseler, Jörg, Christian M. Ringle, Rudolf R. Sinkovics, “The Use of Partial Least Squares Path
Modeling in International Marketing”, Advances in International Marketing, Vol. 20, No 1, Rudolf R.
Sinkovics and Pervez N. Ghauri, eds., Bingley, UK: Emerald Group, 2009, pp 277-319
122. Heskett, James L., and Schlesinger, L. A., "Putting the service-profit chain to work", Harvard business
review 72, no. 2, 1994, pp 164-174
123. Hillson, David A, "Towards a risk maturity model", International Journal of Project and Business Risk
Management, 1, no. 1, 1997, pp 35-45
124. Höck, M. and Ringle, C.M., “Local strategic networks in the software industry: An empirical analysis of
the value continuum”, International Journal Knowledge Management Studies, Vol. 4, No. 2, 2010, pp 132-
151
189
125. Hoekman, Bernard, and Mattoo, Aaditya, "Services trade and growth", Opening Markets for Trade in
Services: Countries and Sectors in Bilateral and WTO Negotiations, 2008, pp 21-58
126. Hoffman, Nicole P., “An Examination of the "Sustainable Competitive Advantage" Concept: Past, Present,
and Future”, Academy of Marketing Science Review, volume 2000 no. 4, 2000, pp 1-16
127. Hosmer, L.T., “Trust: The Connecting Link Between Organizational Theory and Philosophical Ethics”,
Academy of Management Review, 20, no 2, 1995, pp 379-403
128. Hurley, Robert F, "The decision to trust," Harvard Business Review, 84, no. 9, 2006, pp 55-62
129. IBM Institute for Business Value, “Global Location Trends: Annual report 2011”, November 2011
130. ICAEW IT Faculty, “Building Trust in the Digital Age: Rethinking Privacy, Property and Security”,
Making Information Systems Work, November 2011
131. Ilie, Virginia, and Parikh, Mihir, “A Process View of Information Systems Outsourcing Research:
Conceptual Gaps and Future Research Directions”, Association for Information Systems, Proceedings of
the Tenth Americas, 2004, paper 448
132. ISACA, An Introduction to the Business Model for Information Security, 2009
133. ISACA, The business model for information security, ISACA, 2010
134. ISO / IEC 27001, Information technology-Security techniques-Information security management systems-
Requirements, 2009
135. IT Governance Institute, Board briefing on IT Governance, Second Edition, 2003
136. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and
Executive Management, 2nd Edition
137. Jacoby, Jacob, and Matell, Michael S., "Three-point Likert scales are good enough", Journal of Marketing
Research, 8, no. 4, 1971, pp 495-500
138. Jarvenpaa, Sirkka L., and Shaw, Thomas R., "Global virtual teams: Integrating models of trust,"
Organizational virtualness, 1998, pp 35-52
190
139. Jelassi, Tawfik, and Modwel, Suman, "The sustainability of India’s comparative advantage in it offshore
outsourcing", 2006
140. Johnston, Robert, “The determinants of service quality: satisfiers and dissatisfiers”, International Journal of
Service Industry Management, Vol. 6 No. 5, 1995
141. Jones, T. O., and W. E. Sasser Jr., "Why Satisfied Customers Defect," Harvard Business Review 73, no. 6,
November–December 1995, pp 88-99
142. Jorek, Norbert, Gott, Johan, and Battat, Michelle “The Shifting Geography Of Offshoring”, A.T. Kearney
Global Services Location Index, 2009
143. Jöreskog, K. G. and Wold, H., “The ML and PLS Techniques for Modeling with Latent Variables:
Historical and Comparative Aspects’ “, Systems Under Direct Observations: Causality, Structure,
Prediction, Part I, Amsterdam: North-Holland Publication, 1982, pp 263-270
144. Kahn, Beverly K., Strong, Diane M., and Wang, Richard Y., “Information Quality Benchmarks: Product
and Service Performance”, Communications of the ACM, Vol. 45, No. 4ve, April 2002, pp 184-192
145. Kaka, N.F., Sinha, J., “An upgrade for the Indian IT services industry”, McKinsey Quarterly, Special
Edition, 2005, pp 84–89
146. Kaku, Michio, “Hyperspace: a scientific odyssey through parallel universes, time warps, and the tenth
dimension”, Oxford University Press, 1994
147. Kaku, Michio, “Physics of the Future”, Random House Digital, Inc., 2012
148. Kambhampati, Uma S., “The software industry and development: the case of India”, Progress in
Development Studies, January 2002, vol. 2, no. 1, pp 23-45
149. Kashyap, Vipul. "Trust, but verify: Emergence, trust, and quality in intelligent systems", IEEE Intelligent
Systems 19, no. 5, Sept 2004, pp 85-87
150. Kasper-Fuehrera, Eva C., and Ashkanasy, Neal M., "Communicating trustworthiness and building trust in
interorganizational virtual organizations", Journal of Management, 27, no. 3, 2001, pp 235-254
191
151. Kellner, Douglas, "Theorizing Globalization," Sociological Theory 20, no. 3, 2002, pp 285-305
152. Khan, Mushtaq H., Governance, Economic Growth and Development since the 1960s: Background paper
for World Economic and Social Survey, 2006
153. Khan, Naureen, Currie,Wendy, L., Weerakkody, Vishanth, and Desai, Bhavini, “Evaluating Offshore IT
Outsourcing in India: Supplier and Customer Scenarios”, System Sciences 2003, IEEE Computer Society,
Proceedings of the 36th Hawaii International Conference on System Sciences, 2003
154. Khodyakov, Dmitry, "Trust as a Process A Three-Dimensional Approach", Sociology, Vol 41, no. 1, 2007,
pp 115-132
155. Kiely, Laree, and Benzel, Terry V., "Systemic security management", Security & Privacy, IEEE 4, no. 6,
2006, pp 74-77
156. Kim, Dan, "Cognition-Based Versus Affect-Based Trust Determinants in E-Commerce: Cross-Cultural
Comparison Study", ICIS, 2005
157. Klepper, R. and Jones, W.O, “Outsourcing Information Technology, Systems and Services”, 1998
Publication: Book Outsourcing information technology, systems and services, 1998, Prentice-Hall, Inc.
Upper Saddle River, NJ, USA
158. Knapp, Karl, Sharma, Sushil, and King, Kevin, "Macro-economic and social impacts of offshore
outsourcing of information technology: Practitioner and academic perspectives", International Journal of E-
Business Research, Vol 3, no. 4, 2007, pp 112-132
159. Kohler, Horst, Towards a better globalization, Foreign Trade Review, Vol XXXIX, NO. 2, JULY-
SEPTEMBER 2004, Foreign trade review, Golden jubilee commemorative issue 2013, Published by IIFT,
New Delhi
160. Kong, Lingjie, “Data Protection and Transborder Data Flow in the European and Global Context”, The
European Journal of International Law Vol. 21 no. 2, 2010, pp 441-456
161. Koskosas, Ioannis, Kakoulidis, Konstantinos, and Siomos, Christos, "Information Security: Corporate
Culture and Organizational Commitment", International Journal of Humanities and Social Science, Vol. 1
No. 3, March 2011
192
162. Kotrlik, J., and Williams, H., “The Incorporation of effect size in information technology, learning, and
performance research”, Organizational Systems Research Association, Information Technology, Learning,
and Performance Journal Vol 21, No 1, 2003, pp 1-7
163. Kovacich, Gerald L., and Halibozek, Edward P., The manager's handbook for corporate security:
establishing and managing a successful assets protection program, Butterworth-Heinemann, 2003
164. Kshetri, Nir, “Institutional factors affecting offshore business process and information technology
outsourcing”, Journal of International Management, Vol 13, No 1, 2007, pp 38-56
165. Lacity, Mary Celia, and Hirschhei, Rudy A., Information Systems Outsourcing; Myths, Metaphors, and
Realitie, John Wiley & Sons, Inc., 1993
166. Lacity, Mary C., Khan, Shaji A., and Willcocks, Leslie P., "A review of the IT outsourcing literature:
Insights for practice", The Journal of Strategic Information Systems, 18, no. 3, 2009, pp 130-146
167. Lacity, M.C., Willcocks, L. P., and Feeny, D.F., “The Value Of Selective Sourcing,” Sloan Management
Review, Vol 37, No 3, 1996, pp 13-25
168. Lake, David A., Global governance: A relational contracting approach, Globalization and Governance,
Routledge, 1999, ISBN: 0-415-21604-4
169. Laš, Lukáš, and Jukka Aukia, "Contradictory Asia-Pacific Era Regionalism", In The Scale of Globalization.
Think Globally, Act Locally, Change Individually in the 21st Century, 193-202. Ostrava: University of
Ostrava, 2011
170. Lee, Jae-Nam, Huynh, Minh Q., and Hirschhei, Rudy, "An integrative model of trust on IT outsourcing:
Examining a bilateral perspective", Information Systems Frontiers 10, no. 2, 2008, pp 145-163
171. Lee H., Lee Y., Yoo D., “The determinants of perceived service quality and its relationship with
satisfaction”, Journal of Service Marketing, Vol 14, No 3, 2000
172. Lehner, F., and Haas, N., “Knowledge management success factors- Proposal of an empirical research”,
Electronic Journal of Knowledge Management Vol 8, No 1, 2010, pp 79-90
193
173. Levis, M., Helfert, M. and Brady, M., “Information Quality Management: Review of an Evolving Research
Area”, In Robbert, Mary Ann et al.(Hrsg.): Proceedings of the 2007 International Conference on
Information Quality (MIT IQ Conference), Cambridge, 2007
174. Lewicki, R. J. and Bunker, B. B., Developing and Maintaining Trust in Working Relationships, Trust in
Organizations: Frontiers of Theory and Research, Sage Publications, 1996
175. Lewin, Prof. Arie Y., Peacock, Mark, Dr. Peeters, Carine, Russell, Jeff, Sutton, Gary, Duke University
CIBER / Archstone Consulting study, 2nd Bi-annual, Offshore Survey Results, December 2005
176. Li, Suhong, Ragu-Nathan, Bhanu, Ragu-Nathan, T. S., and Rao, S. Subba, "The impact of supply chain
management practices on competitive advantage and organizational performance", Omega 34, no. 2, 2006,
pp 107-124
177. Lin, C., Chow, W. S., Madu, C. N., Kuei, C. H., and Pei Yu, P., “A structural equation model of supply
chain quality management and organizational performance”, International Journal of Production
Economics, Vol 96, No 3, 2005, pp 355-365
178. Lindström, J., and Hägerfors, A., "A model for explaining strategic IT-and information security to senior
management", International Journal of Public Information Systems, 5, no. 1, 2009, pp 17-29
179. Lodahl, Tom and Redditt, Kay Lewis, “IT Governance for IT Effectiveness”, Cutter IT Journal, Vol. 22,
No. 12, December 2009, pp 17-22
180. Lorenz, Edward. "Trust, contract and economic cooperation." Cambridge Journal of Economics 23, no. 3,
1999, pp 301-315
181. Luhmann, N. , Familiarity, confidence, trust: Problems and alternatives, In D. Gambetta (Ed.), Trust:
Making and breaking cooperative relations, Oxford: Basil Blackwell, 1988, pp. 94-108,
182. Luhmann, Niklas, “Trust: A Mechanism for the Reduction of Social Complexity”, Trust and Power, New
York: Wiley, 1979a, pp 4-103
183. Luhmann, Niklas, Trust; and, Power: two works by Niklas Luhmann. Chichester: Wiley, 1979b
184. Lum, Mark, “Offshore Outsourcing and Information Confidentiality Foreign Practices and US Laws:
Trends, Incidents, and Possible Solutions”, SANS Institute, April 2004
194
185. Luor, Ted, Tainyi, Lu, His-Peng, Tao, Yu-Hui, Lin, Tom, M., Y., and Tung, Chi-Hsiang, “Determinants Of
Client Intention Of Software Outsourcing Vendors: A Model From Taiwan’s Financial Industry”, Journal
Of Academy Of Business And Economics, Volume 8, Number 1, 2008
186. Maconachy, W. Victor, Schou, Corey D., Ragsdale, Daniel, and Welch, Don, "A model for information
assurance: An integrated approach", In Proceedings of the 2001 IEEE Workshop on Information Assurance
and Security, vol. 310, New York, USA, 2001
187. Madu, Christian N., and Madu, Assumpta A., “Dimensions of e-quality”, International Journal of Quality &
Reliability Management, Vol 19, No 3, 2002
188. Maitra, Saikat, and Yan, Jun, "Principle component analysis and partial least squares: Two dimension
reduction techniques for regression", Applying Multivariate Statistical Models, 2008, pp 79
189. Marshall, R. Scott, Nguyen, Thang V., and Bryant, Scott E., "A dynamic model of trust development and
knowledge sharing in strategic alliances", Journal of General Management, 31, no. 1, 2005, pp 41-57
190. Mashayekhi, Mina, “Exploiting the potential of trade in services for development, Services: A new frontier
for sustainable development”, UNCTAD/DITC/TNCD/2013/4, Global Services Forum, 28-29 May 2013
191. Matell, Michael S., and Jacoby, Jacob, "Is there an optimal number of alternatives for Likert scale items?
Study I: Reliability and validity", Educational and psychological measurement, 31, 1971, pp 657-674
192. Mayer, Colin, “Corporate Governance, Competition and Performance”, OECD Working Papers No. 164,
1996
193. Mayer, Roger C., Davis, James H., and Schoorman, F. David, "An integrative model of organizational
trust", Academy of management review, 20, no. 3, 1995, pp 709-734
194. McCraw, Thomas K, "Schumpeter's Business Cycles as Business History”, Business History Review 80,
no. 02, 2006, pp 231-261
195. McCue, Andy, “Introduction to outsourcing”, Outsourcing & Offshoring, Lyonsdown Media Group,
September 2008
195
196. McCumber, John, "Information systems security: A comprehensive model", In Proceedings of the 14th
National Computer Security Conference, 1991
197. McFarlan, F. W., and Nolan, R. L., “How to manage an IT outsourcing alliance”, Sloan Management
Review, Winter, 1995, pp 9-23
198. McKnight, D. H., Cummings, L. L., and Chervany, N. L., “Initial Trust Formation in New Organizational
Relationships”, Academy of Management Review, 23, 3, 1998, pp. 473-490
199. McLean, John, "Security models and information flow", Research in Security and Privacy, Proceedings,
1990 IEEE Computer Society Symposium, pp 180-187
200. Mead, Nancy R., Hough, Eric D., Stehney II, Theodore R., “Security Quality Requirements Engineering
(SQUARE) Methodology”, No CMU/SEI-2005-TR-009, Software Engineering Institute, Carnegie Mellon
University, November 2005
201. Melville, N., Kraemer, K., Gurbaxani, V., 2004. “Review: Information technology and organizational
performance: An integrative model of IT business value”, MIS Quarterly, Vol 28, No 2, June 2004, pp
283–322
202. Meyer, Susan M., and Collier, David A., “An empirical test of the causal relationships in the Baldrige
Health Care Pilot Criteria, Journal of Operations Management”, Vol 19, No 4, 2001, pp 403-426
203. Michell, Paul, Reast, John, and Lynch, James, "Exploring the foundations of trust", Journal of Marketing
Management 14, no. 1-3, 1998, pp 159-172
204. Milberg, William and Schöller, Deborah, “Globalization, Offshoring and Economic Insecurity in
Industrialized Countries”, Prepared for U.N. Department of Economic and Social Affairs, March 11th,
2008
205. Miroudot, S., Lanz, R. and Ragoussis, A., “Trade in intermediate goods and services”, OECD Trade Policy
Working Papers, No. 93, OECD, 2009
206. Miroudot, Sébastien, Sauvage, Jehan, and Shepherd, Ben, "Trade costs and productivity in services
sectors", Economics Letters 114, no. 1, 2012, pp 36-38
196
207. Mishra, Saurabh, Lundstrom, Susanna, and Anand, Rahul, "Service export sophistication and economic
growth", World Bank Policy Research Working Paper Series, Vol, 2011
208. Mordini, Emilio, Global governance of the technological revolution, International Federation for
Information Processing, Volume 156, 2004 pp585-592,
209. Morgan, Robert M., and Hunt, Shelby D., "The commitment-trust theory of relationship marketing", The
journal of marketing, 1994, pp 20-38
210. Morton, Michael Scott, "How information technologies can transform organizations", Computerization and
controversy: Value conflicts and social choices, 1996, pp 148-160
211. Narasimhan, S. and Kannan, V., “Total Quality Management as the Foundation of Sustainability – Turning
a New Leaf”, European Journal of Social Sciences, Volume 24, Number 3, 2011, pp 444-451
212. Nasscom, The IT-BPO Sector in India, Strategic Review, 2012
213. NASSCOM Strategic Review 2010
214. Nguyen, Phong, Ali-baber, M., and Verner, June, Trust in software outsourcing relationships: an analysis of
Vietnamese practitioners' views, In 10th International Conference on Evaluation and Assessment in
Software Engineering (EASE), 2006
215. Nguyen, Phong Thanh, Babar, Muhammad Ali and Verner, June M, “Critical Factors in Establishing and
Maintaining Trust in Software Outsourcing Relationships”, ICSE'06, May 20-28, 2006, Shanghai, China
216. Nooteboom, B., “Trust as a governance device”, in M.C. Casson and A. Godley (eds) Cultural Factors in
Economic Growth, Berlin: Springer, 1999
217. Nooteboom, B., Trust: Forms, Foundations, Functions, Failures, and Figures, Edward Elgar Publishing,
2002
218. Oblinger, Diana G., and Hawkins, Brian L., "The myth about IT security", Educause Review 41, no. 3,
2006, pp 14-15
219. OECD, How imports improve productivity and competitiveness, based on OECD Trade Policy Working
Paper No. 93 “Trade in Intermediate Goods and Services”, May 2010
197
220. OECD, “Policy Priorities for International Trade and Jobs”, (ed.), Lippoldt, D., 2012
221. OECD, Trade and labour market outcomes in Germany. In: Lippoldt D (ed) Policy priorities for
international trade and jobs. OECD, Paris, 2012
222. Organisation for Economic Co-operation and Development, Report on the cross-border enforcement of
privacy laws, 2006
223. Organization for Economic Co-operation and Development (OECD), OECD Guidelines for the security of
information systems and networks: Towards a culture of security, 2002
224. Organization for Economic Co-operation and Development (OECD), OECD Recommendation on
Electronic Authentication and OECD Guidance for Electronic Authentication 23, 2007,
http://www.oecd.org/dataoecd/32/45/38921342.pdf
225. Omachonu V. K. and Ross J. E., “Principles Of Total Quality”, CRC Press, Boca Raton, Florida, USA, 3rd
edition, 2004
226. Oza, Nilay V., Hall, Tracy, Rainer, Austen, and Grey, Susan, Trust in software outsourcing relationships:
An empirical investigation of Indian software companies, Information and Software Technology 48, no. 5,
2006, pp 345-354
227. Paliszkiewicz, Joanna, "Orientation on Trust and Organizational Performance", Social psychology, 1997,
pp 35-51
228. Parasuraman, A., Berry, L. L. and Zeithaml, V. A., “A conceptual model of service quality and its
implications for future research”, Journal of Marketing, Vol. 49, 1985, pp 41-50
229. Parasuraman, A., Berry, L. L. and Zeithaml, V. A., “SERVQUAL: A multiple item scale for measuring
consumer perceptions of service quality”, Journal of Retailing, Vol 64, No 1, 1988, pp 12-40
230. Parasuraman, A., Berry, L. L., and Zeithaml, V. A., “Refinement and reassessment of the SERVQUAL
scale”, Journal of Retailing, Vol 67, No 4, 1991, pp 420-450
231. Patterson, Raymond A., Rolland, Erik, and Yeo, Lisa, “Security and Privacy in Outsourcing with
Customer-Specified Risk Tolerance”, The Electronic Journal for Ecommerce Tools and Applications, 2007
198
232. Paulk, Mark C., Weber, Charles V., Garcia, Suzanne M., Chrissis, Mary Beth C., and Bush, Marilyn, "Key
practices of the Capability Maturity Model version 1.1", 1993
233. Pavlou, Paul A. "Consumer acceptance of electronic commerce: integrating trust and risk with the
technology acceptance model", International journal of electronic commerce 7, no. 3, 2003, pp 101-134
234. Penn, Jonathan, Forrester Research Inc, “The State Of Enterprise IT Security: 2008 To 2009, Business Data
Services North America And Europe”, December 24, 2008
235. Peters, Richard G., Covello, Vincent T., and McCallum, David B., "The determinants of trust and
credibility in environmental risk communication: An empirical study", Risk analysis, 17, no. 1, 1997, pp
43-54
236. Ponemon Institute, 2013 Cost of Data Breach Study: Global Analysis
237. Ponemon Institute, The economics of IT risk and reputation, What business continuity and IT security
really mean to your organization, Findings from the IBM Global Study on the economic impact of IT risk,
Global technology services, Risk Management, Research Report, July 2013
238. Porter, M , 1985, Competitive Advantage, New York Free Press
239. Porter, Michael E and Millar, Victor E, “How information gives you competitive advantage”, Harvard
Business Review, July – August, 1985
240. Prajogo, Daniel I., and Sohal, Amrik S., "The relationship between organization strategy, total quality
management (TQM), and organization performance – the mediating role of TQM", European Journal of
Operational Research, 168, no. 1, 2006, pp 35-50
241. Prakash, Aseem and Hart, Jeffrey A., Globalization and governance: an introduction, Globalization and
Governance, Routledge, 1999, ISBN: 0-415-21604-4
242. Pryor, M. G., Toombs, L., Anderson, D., & White, J. C., “What management and quality theories are best
for small businesses?”, Journal of Management and Marketing Research, Volume 3, pp1-12, January 2010
243. Randeree, Ebrahim, Kishore, Rajiv, and Rao, H. Raghav, "Investigating trust in outsourcing", Advances in
Management Information Systems, Information technology outsourcing, 8, 2007, pp135
199
244. Raisinghani, Mahesh, S., Starr, Brandi, Hickerson, Blake, Morrison, Marshelle, and Howard, Michael,
“Information Technology/Systems Offshore Outsourcing: Key Risks and Success Factors”, Journal of
Information Technology Research, Vol 1, No 1, January-March, 2008, pp 72-92
245. Rajkumar, T.M. and Mani, R.V.S., “Offshore Software Development: The View from Indian Suppliers,”
Information Systems Management, Vol 18, No 2, Spring 2001, pp 1-11
246. Reichheld, Frederick P., and W. Earl Sasser, Jr., "Zero Defections: Quality Comes to Services." Harvard
business review, Sept – Oct 1990, pp 105-111
247. Reina Dennis S and Reina Michelle L, Building sustainable trust, OD Practitioner, Vol 39, No 1, 2007
248. Ringle, C. M., Wende, S., Will A. ,2005, SmartPLS 2.0 (beta), www.smartpls.de
249. RISEPTIS, “Trust in the Information Society, A Report of the Advisory Board”, Research and Innovation
on Security, Privacy and Trustworthiness in the Information Society, 2009
250. Robinson, Nick, “Organizational Profiling: A Path to Effective IT Governance”, Cutter IT Journal, Vol. 22,
No. 12, December 2009
251. Rosemann, Michael, and De Bruin, Tonia, "Towards a Business Process Management Maturity Model",
IECIS, 2005, pp 521-532
252. Rosenau, James N, “Governance, Order, and Change in World Politics,” in Governance Without
Government: Order and Change in World Politics, ed. By Rosenau and Ernst-Otto Czempiel, New York:
Cambridge University Press, 1992
253. Rosenbaum, Howard, Towards an understanding of trust: (The importance of trust in the digital networked
economy, February 19, 2004, Workshop Creating partnership online - Concepts and tools, Darmstadt,
Germany)
254. Rousseau, Denise M., Sitkin, Sim B., Burt, Ronald S., and Camerer, Colin, "Not so different after all: A
cross-discipline view of trust", Academy of management review 23, no. 3, 1998, pp 393-404
255. Rust, R. T., Moorman, C., and Dickson, P. R., “Getting return on quality: revenue expansion, cost
reduction, or both?,” The Journal of Marketing, Vol 66, October 2002, pp 7-24
200
256. Sabherwal, Rajiv, "The role of trust in outsourced IS development projects", Communications of the ACM,
42, no. 2, 1999, pp 80-86
257. Saez, Sebastián, Taglioni, Daria, Services Trade Competitiveness Analysis, Poverty reduction and
economic management, International trade department, The World Bank
258. Saint-Germain, René, “Information security management best practice based on ISO/IEC 17799”, The
Information Management Journal, Vol 39, No 4, July/August 2005, pp 60-66
259. Saitta, Jo Ann, and Fjermestad, Jerry, “A Basic Model for Information Technology Outsourcing”, Journal
of Information Science and Technology, Vol 2, No 4, 2005
260. Sako, Mari, "Does trust improve business performance," Organizational Trust: A Reader, New York:
Oxford University Press, 2006, pp 267-291
261. Samat, Nusrah, Ramayah, T., and Saad, Norizan Mat, “TQM practices, service quality, and market
orientation: some empirical evidence from a developing country”, Management Research News, Vol. 29,
No. 11, 2006, pp 713-728
262. Samson, Danny and Terziovski, Mile, “The relationship between total quality management practices and
operational performance”, Journal of Operations Management No 17, Vol 4, 1999, pp 393-409
263. Santosa, Paulus Insap, Wei, Kwok Kee, Chan, Chuan Chan, “User involvement and user satisfaction with
information-seeking activity”, European Journal of Information Systems Vol 14, No 4, 2005, pp 361-370
264. Schlarman, Steven, "The people, policy, technology (ppt) model: Core elements of the security process",
Information systems security, 10, no. 5, 2001
265. Schwab, Klaus, The Global Competitiveness Report 2012-2013, World Economic Forum
266. Sen, Sandip, Saha, Sabyasachi, and Banerjee, Dipyaman, "Trust-Based Contracting", In 8th Workshop
“Trust in Agent Societies” at AAMAS, vol. 5, Utrecht, The Netherlands July 2005
267. Seppänen, Risto, Blomqvist, Kirsimarja, and Sundqvist, Sanna, "Measuring inter-organizational trust—a
critical review of the empirical research in 1990–2003," Industrial Marketing Management 36, no. 2, 2007,
pp 249-265
201
268. Seth, Nitin, Deshmukh, S. G., and Vrat, Prem, “Service quality models: a review”, International Journal of
Quality & Reliability Management, Vol. 22, No. 9, 2005, pp 913-949
269. Siakas, Kerstin V., Maoutsidis, Dimitri, and Siakas, Errikos,"Trust facilitating good software outsourcing
relationships", In Software Process Improvement, Springer Berlin Heidelberg, 2006, pp171-182
270. Sibal, D. Rajeev, “India: The Next Superpower?- The Untold Story of India’s Economy”, London School
of Economics, IDEAS Report, 2012
271. Singh, J. and Sirdeshmukh, D, “Agency and trust mechanisms in customer satisfaction and loyalty
judgements”, Journal of the Academy of Marketing Science, 28, no 1, pp 150-67, 2000
272. Skopik, Florian, Ma, Zhendong, Smith, Paul, and Bleier, Thomas, "Designing a cyber attack information
system for national situational awareness", In Future Security, Springer, Berlin Heidelberg, 2012, pp 277-
288
273. Stank, T.P., Keller, S.B. and Daugherty, P.J., “Supply Chain Collaboration And Logistical Service
Performance”, Journal of Business Logistics, Vol. 22 No. 1, 2001
274. Stefanović, Zoran, "Globalization: Theoretical perspectives, impacts and institutional response of the
economy", Facta universitatis-series: Economics and Organization 5, no. 3, 2008, pp 263-272
275. Stone, Mervyn, “Cross-validatory choice and assessment of statistical predictions”, Journal of the Royal
Statistical Society, Series B (Methodological), 36, 1974, pp 111-147
276. Strutt, J. E., Sharp, J. V., Terry, E., and Miles, R., "Capability maturity models for offshore organisational
management", Environment international, 32, no. 8, 2006, pp 1094-1105
277. Susanto, Heru, Almunawar, Mohammad Nabil, and Tuan, Yong Chee, "Information security management
system standards: A comparative study of the big five", International Journal of Electrical & Computer
Sciences IJECS-IJENS, Vol 11, No 05, 2011
278. Sydow, Jörg, "Understanding the constitution of interorganizational trust", Trust within and between
organizations: Conceptual issues and empirical applications, Oxford University Press, 1998, pp 31-63
202
279. Tafti, Mohammed, H., A., “Risks factors associated with offshore IT outsourcing”, Industrial Management
& Data Systems, Vol. 105 No. 5, 2005, pp 549-560
280. The Ministry of International Trade and Industry, 1999
281. Thuraisingham, Bhavani, "Security standards for the semantic web", Computer Standards & Interfaces 27,
no. 3, 2005, pp 257-268
282. Tisdell, Clement A, “Trust and its implications for economic activity, welfare and globalization”, No.
90617 in Economic theory, Applications and Issues, University of Queensland, School of Economics, 2008
283. Tiwana, Amrit, and Bush, Ashley A, A Comparison of Transaction Cost, Agency, and Knowledge-Based
Predictors of IT Outsourcing Decisions: A U.S.-Japan Cross-Cultural Field Study, Journal of Management
Information Systems, Vol. 24, No. 1, Summer 2007
284. Tonkiss, Fran, "Trust, confidence and economic crisis", Intereconomics 44, no. 4, 2009, pp 196-202
285. Touré Dr Hamadoun I., Secretary-General of the International Telecommunication Union and the
Permanent Monitoring Panel on Information Security World Federation of Scientists, The Quest For Cyber
Peace, January 2011
286. Trautman, Lawrence J., and Altenbaumer-Price, Kara, “The Board’s Responsibility for Information
Technology Governance”, The John Marshall Journal of Computer and Information Law, Vol 28, Number
3, Spring 2011, pp 313-411
287. Treacy Michael and Wiersema Fred, “Customer Intimacy and Other Value Disciplines”, Harvard Business
Review, Vol 71, January 1993, pp 84-93
288. Trustwave Global Security Report 2013
289. United Nations Conference on Trade and Development(UNCTAD), World Investment Report 2004, “The
shift towards services”, United Nations, New York and Geneva, 2004
290. United Nations Publication, “Manual on Statistics of International Trade in Services”, Department of
Economic and Social Affairs Statistics Division, Statistical Papers, Series M NO. 86, 2002
203
291. Urban, Glen L., “The Trust Imperative”, MIT Sloan School of Management, Working Paper 4302-03,
March 2003
292. Urban, Wiesław, “Service Quality Gaps and their role in service enterprises development”, Technological
and economic development Of Economy, Baltic Journal on Sustainability, Vol 15, No 4, 2009, pp 631-645
293. Uslaner, Eric M., "Trust in the knowledge society", In International Forum on Social Capital for Economic
Revival, Economic and Social Research Institute, Cabinet Office, Japan, 2003
294. Van Grembergen, W., Introduction to the Minitrack: IT governance and its mechanisms, Proceedings of the
35th Hawaii International Conference on System Sciences (HICCS), IEEE, 2002
295. Vargo, Stephen L., and Lusch Robert F., "Evolving to a new dominant logic for marketing." Journal of
marketing ,2004, pp 1-17
296. Vargo, Stephen L., Nagao, Kaori, He, Yi, and Morgan, Fred W., “Satisfiers, Dissatisfiers, Criticals, and
Neutrals: A Review of Their Relative Effects on Customer (Dis)Satisfaction”, Academy of Marketing
Science Review, Vol. 11, No. 2, 2007
297. Viklund, Mattias, and Sjöberg, Lennart, "An Expectancy‐Value Approach to Determinants of Trust",
Journal of Applied Social Psychology, 38, no. 2, 2008, pp 294-313
298. Von Solms, Basie, “Corporate Governance and Information Security”, Computers & Security, 20, 2001, pp
215-218
299. Von Solms, Rossouw, Thomson, K. L., and Maninjwa, Mvikeli, "Information security governance control
through comprehensive policy architectures", In Information Security South Africa (ISSA), IEEE, 2011,
pp. 1-6
300. Wang, Ye Diana, and Emurian, Henry H., "An overview of online trust: Concepts, elements, and
implications." Computers in human behavior 21, no. 1, 2005, pp 105-125
301. Watson, Richard T., Pitt, Leyland F., Kavan, C. Bruce, “Measuring Information Systems Service Quality:
Lessons From Two Longitudinal Case Studies”, MIS Quarterly, March 1998, pp 61-79
302. Wignaraja, Ganeshan. Competitiveness Strategy in Developing Countries: A Manual for Policy Analysis,
Vol. 30, Routledge, 2003
204
303. Williamson, O. E. “Transaction Cost Economics: The Governance of Contractual Relations”, Journal of
Law and Economics, 22, 1979, pp 233-361
304. Wirtz, Jochen, "Development of a service guarantee model", Asia Pacific Journal of Management, Vol 15,
No 1, 1998, pp 51-75
305. Wold, H.O., “Softmodeling: The basic design and some extensions”, K.G.Jo¨reskog and H. O.Wold(Eds),
Systems under indirect observations, Part II, Amsterdam: North-Holland, 1982, Chapter 1, pp 1-54
306. Wold, H., “Introduction to the Second Generation of Multivariate Analysis”, Theoretical Empiricism, New
York: Paragon House, 1989, pp 7-11
307. Wong, A., Tjosvold, D., Wong, W.Y.L., Liu, C.K., “Relationships for quality improvement in the Hong
Kong China supply chain,” The International Journal of Quality and Reliability Management, Vol 16 No 1,
1999, pp 24–41
308. Woods, Guy, Research Paper no. 3 2007–08, “The statistical evidence for offshore outsourcing and its
impact on the Australian labour force”, Statistics and Mapping Section, Parliament of Australia, 2 August
2007
309. Woody, Carol, “Eliciting and Analyzing Quality Requirements: Management Influences on Software
Quality Requirements”, No. CMU/SEI-2005-TN-010, Software Engineering Institute, Carnegie Mellon
University, March 2005
310. Workman, Michael, Bommer, William H., and Straub, Detmar, "Security lapses and the omission of
information security measures: A threat control model and empirical test", Computers in Human Behavior,
24, no. 6, 2008, pp 2799-2816
311. World Economic Forum and INSEAD, “The Global Information Technology Report 2012, Living in a
Hyperconnected World”, Editors Soumitra Dutta and Beñat Bilbao-Osorio, 2012
312. World Trade Organization, International Trade Statistics 2012
313. Yacuzzi, Enrique, "A Primer on Governance and Performance in Small-and Medium-Sized Enterprises,"
Documento de Trabajo, No. 293, June 2005
205
314. Yalaho, A., “Plugging Into Offshore Outsourcing Of Software Development: A Multiple Case Study”,
Issues in Information Systems, Volume VIII, No. 2, 2007
315. Yearworth, Mike, Monahan, Brian, and Pym, David, “Predictive Modelling for Security Operations
Economics”, The Workshop on the Economics of Securing the Information Infrastructure, Washington,
DC, October 23-24, 2006
316. Zeithaml, Valarie A., "Service quality, profitability, and the economic worth of customers: what we know
and what we need to learn," Journal of the Academy of Marketing Science, Vol 28, No 1, 2000, pp 67-85
317. Zheng, Beiyao, Hall, Mark, A., Dugan, Elizabeth, Kidd, Kristin, E., and Levine, Douglas, “Development of
a Scale to Measure Patients' Trust in Health Insurers”, Health Services Research 37:1, February 2002
318. Zisis, Pandelis, Garefalakis, Alexandros and Sariannidis, Nikolaos, "The Application of Performance
Measurement in the Service Quality Concept: The Case of a Greek Service Organization," Journal of
Money, Investment and Banking, Issue 9, 2009, pp 21-47
Online articles:
319. http://www.outsourcing-center.com/2004-12-india-responds-to-growing-concerns-over-data-security-
article-37883.html , Article accessed on August 12, 2013: India Responds to Growing Concerns Over Data
Security, Gaurav Bhagowati, Business Writer, Everest India, December 1, 2004
320. http://www.moneycontrol.com/news/features/source-code-theft-may-blight-bpo-bubble_158589.html ,
Article accessed on August 12, 2013: Source code theft may blight BPO bubble, M Rohinesh, Jan 03, 2005
321. http://hindu.com/2002/08/28/stories/2002082803231300.htm , Article accessed on August 12, 2013:
Engineer held for bid to sell secrets, August 28, 2002
322. http://www.infoworld.com/d/developer-world/source-code-stolen-us-software-company-in-india-855 ,
Article accessed on August 12, 2013: Source code stolen from U.S. software company in India, John
Ribeiro, August 5, 2004
323. http://www.outsourcing-law.com/2009/10/insider-theft-of-trade-secrets-in-india-employee-of-captive-rd-
subsidiary-accused-of-source-code-theft-and-what-you-need-to-know-about-protecting-your-trade-secrets-
abroad/ , Article accessed on August 12, 2013: Insider Theft of Trade Secrets in India: Employee of
206
Captive R&D Subsidiary Accused of Source Code Theft (and What You Need to Know About Protecting
Your Trade Secrets Abroad), Bierce & Kenerson, P.C., October 9, 2009
324. http://www.nytimes.com/2006/10/05/business/worldbusiness/05call.html?_r=0 , Article accessed on
August 12, 2013: Security Breaches Worry Outsourcing Industry, Saritha Rai, October 5, 2006
325. http://articles.timesofindia.indiatimes.com/2005-04-23/special-report/27847921_1_mphasis-bfl-bpo-
employees-bpo-arm , Article accessed on August 12, 2013: India's first BPO scam unraveled, Abhay
Vaidya, April 23, 2005
326. http://www.hindustantimes.com/News-Feed/NM16/BPO-industry-battling-data-insecurity/Article1-
151322.aspx , Article accessed on August 12, 2013: BPO industry battling data insecurity, Preeti Singh
Saksena & Radhieka Mittal, September 17, 2006
327. http://articles.economictimes.indiatimes.com/2005-06-26/news/27490837_1_karan-bahree-infinity-e-
search-gurgaon-police, Article accessed on August 12, 2013: Gurgaon police dig into Sun's sting, June 26,
2005
328. http://articles.timesofindia.indiatimes.com/2007-08-24/ahmedabad/27961986_1_city-firm-new-firm-bpo ,
Article accessed on August 12, 2013: BPO accuses ex-employees of fraud, August 24, 2007
329. http://www.dnaindia.com/mumbai/1141842/report-pune-woman-held-in-12mn-cyber-theft , Article
accessed on August 12, 2013: Pune woman held in $12mn cyber theft, December 28, 2007
330. http://articles.timesofindia.indiatimes.com/2012-04-05/hyderabad/31293924_1_source-code-cid-mumbai-
engineer , Article accessed on August 12, 2013: Mumbai engineer held for source code theft, April 5, 2012
331. http://articles.timesofindia.indiatimes.com/2013-05-12/india/39203059_1_debit-pre-paid-cards-travel-cards
, Article accessed on August 12, 2013: Global ATM heist: Cyber cheats hacked into systems of Pune,
Bangalore companies, Mayur Shetty, Times of India, May 12, 2013
332. http://www.reuters.com/article/2013/05/13/us-usa-crime-cybercrime-electracard-
idUSBRE94C0K220130513 , Article accessed on August 12, 2013: Exclusive: Indian firm in global ATM
heist admits system breached, Kaustubh Kulkarni, Reuters, May 13, 2013
207
333. http://www.cigionline.org/publications/2013/5/change-conversation-change-venue-and-change-our-future ,
Article accessed on May 31, 2013: Change the Conversation, Change the Venue and Change Our Future,
Melissa E Hathaway, Centre for International Governance Innovation, May 14, 2013
334. http://www.economist.com/node/186628 , Article accessed on May 11, 2013: Innovation in Industry, Catch
the wave, The long cycles of industrial innovation are becoming shorter, The Economist, Feb 18th 1999
335. http://www.docstoc.com/docs/70372399/Download-Speech-By-Dean-Nitin-Nohria_-Harvard-Business---
%E2%80%9CIndia , Article accessed on September 5, 2010
336. http://www.unescap.org/unis/press/G_05_00.htm , Article accessed on Nov 12, 2011
337. KOF Index of Globalization 2011, Press Release,
http://globalization.kof.ethz.ch/static/pdf/press_release_2011_en.pdf, Article accessed on October 27, 2011
338. http://globalization.kof.ethz.ch, Article accessed on October 27, 2011
339. http://www.takinggovernanceforward.org, Article accessed on March 21, 2012
340. http://www.forbes.com/sites/jennagoudreau/2013/03/08/ibm-ceo-predicts-three-ways-technology-will-
transform-the-future-of-business/ , Article accessed on August 20, 2013
341. NASSCOM Resource Centre, http://www.nasscom.in/resource_center , Accessed on June 22, 2013
342. http://www.nasscom.in/upload/Perspective%202020%20Press%20release%20presentation.pdf Page 14,
Article accessed on May 12, 2012
343. NASSCOM 2009 press release of its report ‘Perspective 2020: Transform Business, Transform India’,
http://www.nasscom.in/perspective-2020, Article accessed on April 21, 2009
344. World Trade Organization, Statistics database, stat.wto.org, accessed on August 10, 2013
345. World Trade Organization, Services: rules for growth and investment;
http://www.wto.org/english/thewto_e/whatis_e/tif_e/agrm6_e.htm, Article accessed on August 15, 2013
346. http://193.145.233.67/dspace/bitstream/10045/28162/2/SIJOffshoreOutsourcing.pdf , Gonzalez, Reyes,
Juan Llopis, and Jose Gasco. "Information systems offshore outsourcing: managerial conclusions from
208
academic research." International Entrepreneurship and Management Journal (2013): 1-31, Article accessed
on August 30, 2013
347. http://www.spinaltwist.eclipse.co.uk/Files/Dissertation/Blomqvist.K.%20%20The%20many%20faces%20o
f%20trust.pdf , Blomqvist, Kirsimarja. "The many faces of trust." Scandinavian journal of management 13,
no. 3 (1997): 271-286, Article accessed August 30, 2013