3CURRIE W L. A knowledge - based risk assessment framework for evaluating web -enabled application outsourcing projects [J]. Project Management, 2003 (21) : 207 -217.
3[1]Applegate, L., Montealegre, R., (1991) Eastman Kodak Company: Managing information systems through strategic alliance [M]. Harvard Business School, Boston, MA.
4[2]Feeny, D., Willcocks, L. (1998) Capabilities for exploiting IT [J].Sloan Management Review, 39(3),1-26.
5[3]Rockart, J. F., Earl, M. J., Ross, J.W. (1996) Eight imperatives for the new IT organization [J].Sloan Management Review, 38 (1) pp43-55.
6[4]Lacity, M.C., Willcocks, L. (1998) An empirical investigation of information system sourcing practice, lesson from the experience [J]. MIS Quarterly 22 (3), 363-408.
7[5]Thibaut, J.W., Kelley, H.H. (1959) The social Psychology of Group[M]. Willey, New York.
8[6]Macneil, I.R. (1978) Contacts, adjustment of long-term economic relationship under classical neoclassical and relational contact law[J]. Northwestern University Law Review, 72, pp854-906.