OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Security risks in service offshoring and outsourcing
Guido Nassimbeni, Marco Sartor, Daiana Dus
Industrial Management & Data Systems (2012) Vol. 112, Iss. 3, pp. 405-440
Closed Access | Times Cited: 49

Showing 1-25 of 49 citing articles:

Motivations of manufacturing reshoring: an interpretative framework
Luciano Fratocchi, Alessandro Ancarani, Paolo Barbieri, et al.
International Journal of Physical Distribution & Logistics Management (2016) Vol. 46, Iss. 2, pp. 98-127
Open Access | Times Cited: 219

Information system security commitment: A study of external influences on senior management
Kevin Barton, Gurvirender Tejay, Michael Lane, et al.
Computers & Security (2016) Vol. 59, pp. 9-25
Closed Access | Times Cited: 56

Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors
Gurpreet Dhillon, Romilla Syed, Filipe de Sá-Soares
Information & Management (2016) Vol. 54, Iss. 4, pp. 452-464
Closed Access | Times Cited: 55

Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions
Faheem Ahmed Shaikh, Mikko Siponen
Information Systems Frontiers (2023) Vol. 26, Iss. 3, pp. 1109-1120
Open Access | Times Cited: 14

Global purchasing strategy and International Purchasing Offices: Evidence from case studies
Fu Jia, Richard Lamming, Marco Sartor, et al.
International Journal of Production Economics (2013) Vol. 154, pp. 284-298
Closed Access | Times Cited: 52

International purchasing offices: Literature review and research directions
Marco Sartor, Guido Orzes, Guido Nassimbeni, et al.
Journal of Purchasing and Supply Management (2013) Vol. 20, Iss. 1, pp. 1-17
Open Access | Times Cited: 41

Antecedents for enhanced level of cyber-security in organisations
Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia, et al.
Journal of Enterprise Information Management (2020) Vol. 34, Iss. 6, pp. 1597-1629
Open Access | Times Cited: 31

International purchasing offices in China: A dynamic evolution model
Fu Jia, Richard Lamming, Marco Sartor, et al.
International Business Review (2013) Vol. 23, Iss. 3, pp. 580-593
Open Access | Times Cited: 29

Uncovering the nature of the relationship between outsourcing motivations and the degree of outsourcing: An empirical study on Finnish small and medium-sized enterprises
Aleksandre Asatiani, Esko Penttinen, Ashish Kumar
Journal of Information Technology (2019) Vol. 34, Iss. 1, pp. 39-58
Open Access | Times Cited: 22

A framework to study vendors’ contribution in a client vendor relationship in information technology service outsourcing in India
Daisy Mathur Jain, Reema Khurana
Benchmarking An International Journal (2016) Vol. 23, Iss. 2, pp. 338-358
Closed Access | Times Cited: 19

Countertrade: compensatory requests to sell abroad
Guido Nassimbeni, Marco Sartor, Guido Orzes
J for Global Business Advancement (2014) Vol. 7, Iss. 1, pp. 69-69
Closed Access | Times Cited: 17

International purchasing offices in China: roles and resource/capability requirements
Marco Sartor, Guido Orzes, Guido Nassimbeni, et al.
International Journal of Operations & Production Management (2015) Vol. 35, Iss. 8, pp. 1125-1157
Open Access | Times Cited: 17

Inter-organisational information security: a systematic literature review
Fredrik Karlsson, Ella Kolkowska, Frans Prenkert
Information and Computer Security (2016) Vol. 24, Iss. 5, pp. 418-451
Closed Access | Times Cited: 17

A new approach for assessing the correlated risk
Jeh‐Nan Pan, Sheau‐Chiann Chen
Industrial Management & Data Systems (2012) Vol. 112, Iss. 9, pp. 1348-1365
Closed Access | Times Cited: 16

Integrating SWOT analysis into the FMEA methodology to improve corrective action decision making
Agung Sutrisno, Hyuck M. Kwon, Indra Gunawan, et al.
International Journal of Productivity and Quality Management (2015) Vol. 17, Iss. 1, pp. 104-104
Open Access | Times Cited: 14

Information security implications of using NLP in IT outsourcing: a Diffusion of Innovation theory perspective
Baber Majid Bhatti, Sameera Mubarak, Sev Nagalingam
Automated Software Engineering (2021) Vol. 28, Iss. 2
Open Access | Times Cited: 10

SEC-TOE Framework: Exploring Security Determinants in Big Data Solutions Adoption
Khairulliza Ahmad Salleh, Lech J. Janczewski, Fernando Beltrán
Pacific Asia Conference on Information Systems (2015), pp. 203
Closed Access | Times Cited: 10

Build–operate–transfer (BOT): an emerging entry mode for service offshoring
Guido Orzes, Marco Sartor, Guido Nassimbeni, et al.
Production Planning & Control (2017) Vol. 28, Iss. 4, pp. 295-309
Closed Access | Times Cited: 10

Global sourcing processes in the Italian agricultural breweries
Barbara Francioni, Ilaria Curina, Giorgia Masili, et al.
British Food Journal (2019) Vol. 121, Iss. 10, pp. 2277-2295
Closed Access | Times Cited: 10

Decision making in choosing information systems
Livio Cricelli, Michele Grimaldi, Musadaq Hanandi
VINE (2014) Vol. 44, Iss. 2, pp. 162-184
Closed Access | Times Cited: 9

Analysis and management of risks associated with outsourcing in China
Jalal El Fadil, Josée St‐Pierre
Strategic Outsourcing An International Journal (2016) Vol. 9, Iss. 2, pp. 218-242
Closed Access | Times Cited: 9

Knowledge Security - A Conceptual Analysis
Ilona Ilvonen
(2013)
Closed Access | Times Cited: 9

Mitigating hidden costs in service offshoring: a strategic management perspective
Songyue Zheng, Qiang Wang
Industrial Management & Data Systems (2017) Vol. 117, Iss. 6, pp. 1058-1076
Closed Access | Times Cited: 8

Improvement Strategy Selection in FMEA – Classification, Review and New Opportunity Roadmaps
Agung Sutrisno, Hyuck M. Kwon, Tzong‐Ru Lee, et al.
Operations and Supply Chain Management An International Journal (2014), pp. 54-63
Open Access | Times Cited: 7

Strategy for privacy assurance in offshoring arrangements
Chitra Sharma, Anjali Kaushik
Journal of Global Operations and Strategic Sourcing (2017) Vol. 10, Iss. 2, pp. 232-254
Closed Access | Times Cited: 7

Page 1 - Next Page

Scroll to top