中文部分
[1] 徐綺憶,「資訊系統委外程度與績效之影響因素:一個二階層的實徵性研究」,國立中央大學,博士論文,民國八十八年。[2] 吳巴珊,「企業資訊委外服務之策略研究-以連鎖零售體系個案為實例」,國立台灣大學,碩士論文,民國九十一年。[3] 吳琮璠,謝清佳,資訊管理理論與實務,三版,台北,智勝文化事業有限公司,民國八十七年。
[4] 林永銘,「軟體籌獲流程成熟度評估模式之建置與實證調查」,國立臺灣科技大學,碩士論文,民國九十四年。[5] 李永山,「台灣中小型企業對資訊委外決策之研究」,國立臺灣大學,博士論文,民國八十八年。[6] 戎懷章,「資訊業務委外管理機制之設計與運用」,私立淡江大學,碩士論文,民國八十九年。[7] 萬金生,「自我性能影響個人參與資訊委外績效之研究:以臺灣公營機構為例」,國立中山大學,碩士論文,民國八十八年。[8] 劉雯瑜,『資訊系統外包決策模式―以「需求能力評估矩陣」為基礎』,國立雲林科技大學,碩士論文,民國八十八年。[9] 盧彥旭,「資訊系統委外選商評選準則及權重之建立」,世新大學,民國八十九年。[10] 黃淑秋,「資訊系統委外過程參與成員認知差異之研究-以科技框架分析」,國立中山大學,碩士論文,民國九十一年[11] 林佑達,「政府資訊委外廠商服務品質之研究」,國立台北大學,碩士論文,民國九十年。[12] 許維澤,「資訊委外採用ASP 模式之成功關鍵因素」,元智大學,碩士論文,民國九十一年。[13] 呂美玲,「從交易成本觀點探討資訊系統之委外決策」,銘傳大學,碩士論文,民國九十一年。[14] 鄭義熙,「政府資訊作業系統委外管理之研究-以國稅局資訊系統為例」,義守大學,碩士論文,民國八十九年。[15] 我國CMM/CMMI應用現況與發展趨勢,財團法人資訊工業策進會,2004年10月。
[16] 經濟部工業局提升資訊軟體品質(CMMI)計畫網站,“http://www.cmmi-taiwan.org.tw/”,查詢時間:民國九十六年五月二十日。
[17] 林永銘,「軟體籌獲流程成熟度評估模式之建置與實證調查」,臺灣科技大學,碩士論文,民國九十四年。
[18] 黃勝彥,「應用模糊德菲層級分析法於汽車營業據點區位選擇之研究-以某日產汽車公司為例」,中華大學,碩士論文,民國九十四年。[19] 黃聖芫,「Fuzzy AHP 之常態模糊數與三角模糊數比較分析之研究」,育達商業技術學院,碩士論文,民國九十二年。[20] 張森林,「油電動力混合式車輛發展策略之模糊多準則評估」,國立交通大學,碩士論文,民國八十七年。[21] 行政院主計處網站,“http://www.dgbas.gov.tw/ct.asp”,查詢時間:民國九十五年五月二十日。
[22] 盧素涵,『軟體能力成熟度模式(CMM for Software)之發展現況』,工研院IEK中心電子資訊研究組,產業評析報告,民國九十一年十月十八日。
[23] 錢惠枝,『台灣地區綜合證券商成長策略與購併模式之研究』,國立政治大學,碩士論文,民國八十四年。[24] 鄧振源、曾國雄,「層級分析法(AHP)的內涵與運用(上)。(下)」,中國統計學報,第27卷第6 期,民國七十八年。
[25] 陳昭君,『層級分析法(AHP)之基本概念』,http://www.ntut.edu.tw/~tsengsh/homework/1/2-21.pdf,查詢時間:民國九十五年五月二十七日。
[26] 王天津、羅偉碩、陳威廷、郭閔然,『模糊德菲法應用在入口網站成功關鍵因素之研究』, http://www.im.jwit.edu.tw/csim/csim/submissions/90129.pdf,查詢時間:民國九十五年五月二十七日。
[27] 徐村和,「模糊德菲層級分析法」,模糊系統學刊,第4卷,第1期,第59- 72頁,民國八十七年。[28] 林子銘、李淑芳,『臺灣地區資訊系統外包決策考慮因素研究』,國立中央大學,碩士論文,民國八十二年
[29] 湯宗益、周冠中,『臺灣地區金融產業資訊系統外包決策與規劃』,台銀季刊,第四十七卷第二期,頁23-51,民國八十四年。
[30] 黃振中,許瓊文,「政府資訊系統委外作業之個案研究」,管理學報,頁138-145,民國八十六年。
[31] 李永山,「台灣中小型企業對資訊委外決策之研究」,台灣大學商學研究所博士論文,民國八十八年。
[32] 黃仁伯,「資訊系統委外環境與類型探討」,交通大學經營管理研究所,博士論文,民國90年。英文部分
[33] Claver, E.; González, M.R.; Gascó, J.L. and Llopis, J. ”Information systems outsourcing reasons, reservations and success factors”, Logistics Information Management, Vol. 15, No. 4, pp. 294-308, 2002。
[34] IEEE and EIA, IEEE/EIA 12207.0-1996, Industry Implementation of International Standard ISO/IEC 12207:1995 – Information Technology – Software Life Cycle Processes
[35] Bernard, T., Gallagher, B., Bate, R., Wilson, H., CMMI Acquisition Module (CMMI-AM)Version 1.1 CMU/SEI-2004-TR-001, U.S.A:Carnegie Mellon University Software Engineering Institute, Pittsburgh, Pennsylvania, U.S.A (2004)
[36] CMMI Product Team, “Capability Maturity Model Integration (CMMI) Version 1.1 Staged Representation” CMU/SEI-2002-TR-012, Carnegie Mellon University Software Engineering Institute, Pittsburgh, Pennsylvania, U.S.A. (2002)
[37] Satty, Thomas L., “The Analytic Hierarchy Process”, New York: McGraw-Hill. (1980)
[38] San Antonio Software Process Improvement Network (SASPIN), “Looking at the CMMI Framework from an Acquirer’s Perspective”, Carnegie Mellon University, 8 June 2005
[39] Schermerborn, J. R., Hunt, J. G., & Osborn, R. N. Managing organizational behavior (2nd ed.). New York: John Wiley & Sons. (1985)
[40] Klir G. J., and Yuan B., “Fuzzy Sets and Fuzzy Logic–Theory and Application, Prentice-Hall Inc.”, New Jersey. (1995)
[41] Horng, J.; Chen, S.; Chang, Y.; Lee, C.; “A new method for fuzzy information retrieval based on fuzzy hierarchical clustering and fuzzy inference techniques” Fuzzy Systems, IEEE Transactions on Volume 13, Issue 2, pp. 216 – 228, (2005)
[42] Soon Ang, ”Hierarchical Elements in Software Contracts“, Journal of Organizational Computing, Volume: 3. Issue: 3. pp. 329, 1993
[43] Antonucci, Yvonne Lederer and James J. Tucker, III. “IT Outsourcing: Current Trends, Benefits, and Risks.” Information Strategy: The Executive’s Journal, 4, no. 3, pp. 16-26, 1998
[44] Benko, C., “If Information System Outsourcing is the Solution, What is the Problem ?,” Journal of Systems Management, pp.32-35, November 1992
[45] Corbett, M. F., “Outsourcing and the New IT Executive”Information Systems Management, pp. 19-22, 1994
[46] Due, R. T., “The real cost of outsourcing”, Information systems management. , Vol. 9, No.1, pp. 78-81, 1992
[47] Michael J. Earl, “The Risks of Outsourcing IT”, Management of Technology and Innovation, Vol. 37, No. 3, pp. 26–32, 1996
[48] Anthony DiRomualdo & Vijay Gurbaxani, “Strategic Intent for IT Outsourcing”, Working Paper ITR-140, University of California, Irvine., 1998
[49] Foxman, N., “Succeeding in Outsourcing, Cultivate the Outsourcing Relationship,” Information Systems Management, Vol.11, Iss. 1, pp77-80, Winter, 1994
[50] Fried, Louis., “Outsourcing Confessions.” Computerworld. pp. 67-69, February 8, 1993.
[51] Grover, V. and Teng JTC, “The Decision to Outsource Information System Functions”, Journal of System Management, .pp . 34-38., Nov, 1993
[52] Grover, V. and Teng J.T.C., “A Descriptive Study on the Outsourcing of Information System Functions”, Information and Management, vol 27.pp.33-44., 1994
[52] Harrar. G., “Outsource tales.”, Forbes ASAP, pp. 37–39, June 7, 1993.
[54] Jones, C.; “Evaluating software outsourcing options”; Information Systems Management, pp.28-33, 1994, Fall
[55] Judenberg, J., “Application Maintenance Outsourcing,” Information System Management., pp.34-38., Fall 1994
[56] Lacity, Mary, Rudy Hirschheim, and Leslie Willcocks. “Realizing Outsourcing Expectations: Incredible Expectations, Credible Outcomes.”, Information Systems Management , pp.25-33, Fall 1994
[57] Lacity, M. C. and Hirschheim, R., “The Information Systems Outsourcing Bandwagon,” Sloan Management Review, Vol.35, No.1, pp.73-86, 1993
[42]〔64〕Loh, Lawrence and Venkatraman, N., “Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis”, Journal of Management Information Systems, Vol. 9 No. 1, pp. 7 – 24, Summer 1992
[58] Martinsons, M. G., “Outsourcing Information Systems: A Strategic Partnership with Risks,” Long Range Planning, Vol.26, No.3, pp.18-25, 1993
[59] Meyer, N. D., “A Sensible Approach To Outsourcing,” Information Systems Management, Vol.11, No.4, pp.23-27, 1994
[60] N. Venkatraman, “Beyond Outsourcing: Managing IT Resources as a Value Center”, Management of Technology and Innovation , Reprint 3834, Vol. 38, No. 3, pp. 51–64, Spring 1997
[61] Paul nelson, William Richmond and Abraham Seidmann, “Two Dimensions of software Acquisitions”, COMMUNICATIONS OF THE ACM, Vol. 39, No. 7, July 1996
[62] Powell, D., “To outsource Or Not To Outsource?”, Networking Management, pp.56-61, 1993 Feb.
[63] Quinn J. B. and Hilmer, F. G., “Strategic Outsourcing,” Sloan Management Review, Vol.35, No.4, pp.43-55, 1994
[64] Richmond, W.B. Seidmann, A. Whinston, A.B., “Incomplete Contracting Issues In Information Systems Development Outsourcing”, Rochester, Business - Managerial Economics Research Center, Paper number 90-08.
[65] Benko, C., “Outsourcing Evaluation: A Profitable Process,” Information Systems Management, Vol.10, No.2, pp. 45-50, Spring 1993.
[66] McFarlan, F. & R. Norlan, “How to Manage an IT Outsourcing Alliance,” Sloan Management Review, pp. 9-23, Winter 1995,