服务供应链中外包方与提供商间的信息与决策问题研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
服务经济依托互联网和信息技术而迅速发展,由此催生了一个新兴的研究领域——服务科学(Services Science),从服务科学的角度认为:传统供应链中的任何企业已无法独立完成创造价值的任务。例如,从新产品的开发、生产、销售和售后服务这种周而复始的过程,应该是一种具有丰富科学内涵的服务供应链,服务供应链是服务科学领域的研究热点,服务外包是服务供应链中企业与企业之间协作的主要形式。
     本文运用管理科学、微分方程稳定性理论、随机过程、决策科学、博弈论、计量经济学、信息安全原理等多种理论和方法,致力于服务供应链中外包方与提供商间的信息与决策问题研究,主要包括以下几部分:
     (1)服务科学、服务供应链、服务外包的研究现状综述
     详细总结并分析了服务科学这一新兴学科领域的相关研究工作和已有研究成果,从服务型经济时代服务科学的产生背景出发,研究了服务的定义和特征,界定了现代服务业与服务型生产企业的内涵,总结了服务供应链及服务外包等领域的已有研究成果,指出该领域需要进一步研究的问题,然后提出本文的主要研究框架。
     (2)企业是否应该将某项服务业务外包给第三方服务提供商?
     阐述了服务外包的产生背景、服务外包给企业带来的好处和风险、服务外包的决策因素。研究了服务供应链中的企业是否进行服务外包的决策问题,基于群决策理论,给出了一种新的辅助服务外包决策的群决策方法,促进决策者达成共识。利用一个中小型企业IT服务外包的案例说明了基于Markov链的服务外包群决策支持方法的具体步骤和实施方法。
     (3)一旦决定将服务外包,作为服务外包方的企业如何选择服务提供商,
     如何与服务提供商协作以达到双赢的目标?在服务型经济环境中,企业与企业之间以服务外包形式进行的合作并不是短期事务型的,而是一种长期的、可持续发展的长期合作关系。对于服务外包方来说,传统外包活动主要以降低成本为中心,比较各个服务提供商提供的外包价格,价格最低者胜出。目前服务外包活动的目标已经发生了转变,不再以降低成本作为第一目标,而是结合可持续发展的长远目标,综合考虑外包成本、由服务外包可获得的利润以及潜在增长机遇。本部分研究了服务供应链中的服务外包协作关系及服务外包方与服务提供商博弈行为的演化问题,分析了服务外包活动的演化博弈特征和服务外包中各参与方的决策对长期演化行为的影响。基于合作博弈和演化博弈的理论基础建立了服务外包的动力学演化博弈模型,根据李亚普诺夫(Lyapunov)的非线性稳定性理论分析此类演化博弈的演化稳定策略(Evolutionarily Stable Strategy, ESS),并发现存在双赢——实现可持续发展的服务外包定价的可能性。
     (4)如何加强服务外包在实施过程中风险与安全的控制?
     在服务外包的实施过程中,经常会产生信息泄露、成本失控、服务质量失控、外包活动延期等各种风险,这些风险的成因复杂、控制方法各异。例如,IT服务外包中的信息安全风险一方面与服务外包方及其服务提供商有关,另一面也与不可控制且难以预见的第三方(如黑客)有关。本部分针对服务供应链上的IT服务外包所导致的信息安全问题,从密码学的角度研究了托管型软件服务的数据库安全,提出了一个基于齿轮齿条传动原理的数据库加密解密模型(P-R模型),给出了P-R模型的实施技术并研究了基于P-R模型的数据库相关操作、模型的计算复杂性以及系统性能。
     (5)决定服务质量信息传播的因素有哪些?服务质量信息对服务外包方与服务提供商的协作具有什么样的影响?
     在服务外包的交付和实施中,服务质量依赖于客户感知,服务质量的口碑是影响服务提供商绩效评价和业务增长的最重要因素之一,服务质量的口碑是通过信息传播的方式扩散的。本部分研究了服务质量的信息传播问题,利用传染病动力学理论建立了服务质量信息传播模型。通过模型仿真,研究并分析了服务质量信息传播率、服务外包方对较差服务质量的容忍度、知情不报者比率以及受影响客户群迁入迁出变化率对模型演化结果的影响,提出了控制和提高服务质量的策略和方法。在此基础上,进一步研究了周期性变化的服务质量信息传播率,建立了相应的信息传播模型并给出了模型的数值解。
     (6)服务质量中产品保修时间对企业收益有什么影响?怎样做出最优产品保修时间和最优产品销售价格的决策?
     本部分以服务策略与服务成本为研究对象,通过产品售后服务策略的实例说明研究产品保修时间与产品销售价格决策问题的原因,总结了产品故障率曲线并建立起一般的保修时间与保修成本之间的函数关系。以产品保修时间和产品销售价格作为决策变量,以企业利润最大化作为决策目标,建立了产品保修时间和产品销售价格的决策模型,求出了最优产品保修时间和最优产品销售价格。分析了客户应当如何根据产品保修时间、产品故障率以及产品发生故障后的维修成本进行产品购买决策,也分析了实例中的销售服务方如何根据产品维修成本和产品故障率进行产品销售价格的决策。
     本论文的创新点主要体现在:
     (1)在传统的群决策理论与应用研究中,有两个重要的研究问题:决策专家权重的分配和群决策结果的算法。本文给出的服务供应链中服务外包决策的群决策权重分配方法综合考虑决策专家的缜密程度和偏激程度,通过纯数据分析计算权重,不介入人为的主观因素,所以能客观、公正地解决权重分配问题;本文给出的群决策结果算法从群决策过程中决策者偏好变化的数据里挖掘出状态转移概率矩阵,用Markov链的转移概率极限和不变概率测度求出的群决策结果,不仅与当前状态有关,还与群决策过程中决策者偏好调整的动态过程和发展趋势有关,用有限轮次的群决策过程达到无限轮次的群决策效果。
     (2)服务供应链中外包方与提供商间能否形成长期的、可持续发展的合作关系,关键是“定价”决策问题。本文从合作博弈与演化博弈的角度研究了服务供应链中外包方与提供商间博弈行为的演化问题,建立了动力学演化博弈模型,用李亚普诺夫(Lyapunov)非线性稳定性理论分析并求出此类演化博弈的演化稳定策略(Evolutionarily Stable Strategy, ESS)——如果“定价”满足一定的条件,必然存在一个“双赢解”的区域。
     (3)针对服务供应链中的IT服务外包可能产生的信息安全问题,从密码学角度研究了托管型软件服务的数据库安全问题,提出了基于齿轮齿条传动机制的数据库加密解密模型(P-R模型)原理,研究了P-R模型抗攻击能力的计算复杂性、实施方法、加密解密和数据库相关操作的效率等问题。与传统的使用单一加密算法和长密钥来加密数据库的数据库安全算法相比, P-R模型使用短密钥和简单加密算法,在不引起系统性能降低的前提下,不仅具有更好的数据库安全性,而且获得了更快的加密解密操作速度。
The Internet and related information technologies have recently enabled the rapid development of service-led economy and necessitated a new research area: Service Science (SS). Service Science emphasizes using fundamental science, models, theories and methods to manage the organization processes and resources of service activities, not only from the traditional service sector, but from the industry sector in so-called service-led economy environments. Traditional supply chains, which transform natural resources, raw materials and components into a generalized product are fast becoming science enriched Service-Oriented Supply Chains (SSC), in which any involved enterprise can no longer perform service activities independently. Service Outsourcing (SO) is the leading coordination method between any pair of enterprises related within the chain. The management and organization of such a Services Supply Chain presents a fundamental challenge in Service Science research.
     This dissertation applies the theories and approaches in Differential Equation and Stability Theory, Stochastic Process, Decision Science, Game Theory, Econometrics, and Information Security to the research on some information and decision-making issues which are encountered by Service Providers and Service Outsourcer involved in SSC when practicing strategic transformation. The dissertation includes the following parts:
     (1) Literature Review of Service Science, Service-Oriented Supply Chains, and Service Outsourcing
     Based on the backgrounds of service-led economy environments, we summarize related work in the newly developed research area of Service Science. We study the definitions, characteristics and connotations of service, generalized product, modern service sector, as well as service oriented businesses. We also recall achievements in the research of Service-Oriented Supply Chains and Service Outsourcing, indicate an outlook for future work, and present the research framework of this dissertation.
     (2) Whether an enterprise should outsource its service activities to a third-party service provider?
     This part illustrates the backgrounds of Service Outsourcing, the advantages and risks that businesses face when outsourcing service activities. It addresses the decision-making problem of service outsourcing and proposes a new group decision-making support approach to accelerate decision-makers towards reaching a consensus. An IT service outsourcing example is used to explain the implementation of such a Markov-based approach.
     (3) Once the service outsourcing is decided, how should the outsourcer choose and collaborate with its service provider to achieve a win-win partnership?
     Traditional outsourcing is transactional and aims only at lowering the cost for this activity. Therefore, service outsourcers simply compare the prices quoted to them by different service providers, and then choose the provider with the lowest price when making decisions. However, as the competition between outsourcers strengthens, along with the dependence among participants in the service-led economy environments, service outsourcing has evolved from the single aim of lowering cost to involving multiple objectives which consist not only of outsourcing cost, but profit and potential development opportunities as well. This part investigates service collaboration relationships in the Service-Oriented Supply Chain and the evolution of participants’behaviors in service outsourcing, and then analyzes the evolutionary game features of service outsourcing activity. Based on cooperative game theory and evolutionary game theory, we set up an evolutionary game model for service outsourcing, analyze its Evolutionarily Stable Strategy (ESS) in terms of Lyapunov’s nonlinear stability theory, and also probe into the pricing ranges for a win-win strategy in sustainable development of service outsourcing.
     (4) How to strengthen risk control in the process of service outsourcing?
     There are many risks generated from service outsourcing, the most important of which are information release, out-of-control cost and service quality, and the delay of predefined deadline. These risks are caused by various reasons and therefore the control methods for these risks are different from each other. For example, the information security risk involved in outsourcing IT services in the Service-Oriented Supply Chain is not confined to only the involved service outsourcers and service providers, but also to some other third parties, invisible and unpredictable, such as hackers. This part addresses the security of outsourced information systems, such as databases, from the perspective of cryptology. A database encryption/decryption model is put forward, which uses the field of a record from a database as the basic encryption granularity. This style of cryptography is referred to as the Pinion-Rack (PR) encryption and decryption model, and we also present implementation issues encountered when adopting this model. The computational complexity and system performance of the PR model are also analyzed.
     (5) What are the factors deciding the dissemination of service quality evaluation? How does it affect collaborations between service providers and service outsourcers?
     Service quality is one of the key risks in service outsourcing. The quality of a service activity depends mainly on customers’perception for the sake of the intangible features of service. Customers’perception of service quality decides the dissemination of service quality evaluations. Such evaluations affect both customers’buying attitudes and buying behaviour, and therefore business profits. This part studies the dissemination of service quality evaluations and develops a model for this kind of problem based on the Epidemic Dynamics Theory. It also analyzes how the following four arguments will affect simulation results of the service quality dissemination model, which includes the transmission rate of service quality evaluations, customers’tolerance degree of bad service quality, mobility rate of customer population, and the change rate of customers having an apathetic approach to evaluation service quality to active participation in the evaluation process. Then this part further introduces Hooke’s law of elasticity into the model and studies a kind of periodically changing transmission rate, puts forward a corresponding model and presents its simulation results.
     (6) How does product warranty time affect business profit? How to make decisions on optimal product warranty time and optimal product price?
     This part addresses service strategies and service costs in the Service-Oriented Supply Chain. It exemplifies the reason for studying the relationship between generalized product warranty time and product price, summarizes product failure ratio curves, and then sets up a general function of the warranty time and the warranty cost. Using product warranty time and product price as decision-making arguments and business profit as the decision-making objective, this part finally puts forward a decision-making model to solve the optimal product warranty time and optimal product price, and analyzes the decision-making processes for both service providers and service outsourcers with such a model.
     The main contributions of this dissertation are to:
     (1) Present a new group decision-making support approach for supporting service outsourcing decision-making. Prior studies in the research literature have not considered group decision preference adjustment as a continuous process and neglected its impact on group decision-making. This approach intends to address this neglected issue and is based on Markov chain models. Furthermore, we also present a new group decision weight allocation method which is shown to be more fair by taking into account both the individual decision-maker’s carefulness and the differences among the individual’s preference and other’s preferences.
     (2) Set up an evolutionary game model for service outsourcing based on game theory and dynamics, give the corresponding non-linear differential equations, analyze the Evolutionarily Stable Strategy (ESS) of the model, and probe into the pricing ranges for a win-win strategy in sustainable development of service outsourcing.
     (3) Put forward a new database encryption/decryption model to enhance database security in outsourced information systems. Better than traditional methods using a single algorithm with long keys to acquire data confidentiality, our model, termed as the pinion-rack encryption and decryption model, uses shorter length keys and simpler algorithms to acquire better data confidentiality without incurring too much negative effect on system performance. On the other hand, our approach exclusively involves sensitive data, in order to minimize the number of necessary encryption and decryption operations, thus being likely to further lower cryptographic overload.
引文
[1]. Hidaka, K. , Trends in Services Sciences in Japan and Abroad. Quarterly Review, 2006 (19): p. 35-47.
    [2]. Gartner.全球IT服务收入去年增6%. 2005 [cited 2006 Dec. 5th]; Available from: http://tech.sina.com.cn/it/2006-06-15/101612322.shtml.
    [3]. Dataquest. 2005年世界与地区性咨询与系统集成供应商市场份额前十名最终排名. 2005 [cited 2007 Mar. 1st].
    [4]. Engineering, US National Academy of, The Impact of Academic Research on Industrial Performance. 2003: National Academies Press.
    [5]. Dietrich, B.; Harrison, T. , Serving the Services Industry. OR/MS Today, 2006. 33(3).
    [6]. Spohrer, J. Services Sciences, Management, and Engineering (SSME) and Its Relation to Academic Disciplines. in Proceedings of First German Service Science Conference. 2006
    [7]. Spohrer, J.; Riechen, D., Services Science. Communications of ACM, 2006. 49(7): p. 30-34.
    [8]. Spohrer, J.; Maglio, P.; Bailey, J.; Gruhl, D. , Steps Toward a Science of Service Systems. IEEE Computer Magazine, 2007: p. 71-77.
    [9].危旭芳,服务业发展问题理论综述及其研究启示.南方经济, 2005. 6: p. 76-78.
    [10]. Albrecht, K., Service Within: Solving the Middle Management Leaderhsip Crisis 1990: McGraw-Hill Companies. 200.
    [11]. Albrecht, K.; Zemke, R., Service America!: Doing Business in the New Economy. 1985: Irwin Professional Pub. 203.
    [12]. Baumol, W.J., Macroeconomics of Unbalanced Growth: The Anatomy of Urban Crisis. The American Economic Review, 1967. 57(3): p. 415-426.
    [13]. Baumol, W.J., Productivity policy and the service sector, in Managing the Service Economy: Prospects and Problems, Inman, R.P., Editor. 1985, Cambridge University Press.
    [14]. Fuchs, V.R., The Service Economy. 1968: National Bureau of Economic Research.
    [15]. Fuchs, V.R., The Health Economy. 1986, Boston: Harvard University Press. 11-31.
    [16]. Fitzsimmons, J.A.; Fitzsimmons, M.J., Service Management Operations, Strategy, Information Technology (5th edition). 2006: Boston : McGraw-Hill/Irwin. 487.
    [17].贝思可.服务、服务营销的涵义及特征. 2005 [cited 2007 Dec. 15th]; Available from: http://www.surprising.cn/n358c49.aspx.
    [18]. Vargo, S. L.; Lusch, R. F., Evolving to a New Dominant Logic for Marketing. Journal of Marketing, 2004. 68: p. 1-17.
    [19]. Sampson, S. E.; Froehle, C. M., Foundation and Implication of aProposed Unified Services Theory. Production and Operations Management, 2006. 15(2): p. 329-343.
    [20].梁战平. 21世纪的新兴科学--服务科学. 2005 [cited 2008 Mar. 3rd]; Available from: http://www.chinainfo.gov.cn/data/200506/1_20050624_113144.html.
    [21]. Maula, M. Knowledge-Intensive Services, Knowledge/Information Management, and Dynamic Complexity-An Interdisciplinary Approach to Service Science. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [22]. Apte, U.; Ferrer, G.; Lewis, I.; Rendon, R. Service Supply Chain in the Department of Defense: Opportunities and Challenges. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [23]. IBM.随需应变概述. 2006 [cited 2007 Jun. 20th]; Available from: http://www-900.ibm.com/cn/ondemand/overview/flat.shtml.
    [24]. Bitner, M.J.; Goul, M.; Urban, S. Services Science Journey: Foundations, Progress, Challenges. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [25]. Spohrer, J.; Radnor, M. Welcom To Service lnnovation for 21 Centery 2004 [cited 2007 Dec. 20th]; Available from: www.almaden.ibm.com/asr/events/serviceinnovation/agenda.shtml.
    [26]. IBM, Service Science: A New Academic Discipline. 2004.
    [27]. Qiu, R.G., Information Technology as a Service, in Enterprise Service Computing: From Concept to Deployment. 2006, Idea Group Publishing: Hershey, PA.
    [28]. Fitzgerald, M. Research in development. MIT Technology Review 2005 [cited 2006 Feb. 4th]; Available from: http://www.technologyreview.com/articles/05/05/issue/brief_ibm.asp.
    [29]. IBM, IBM Palisade Summit Report: Service Science Education for 21st Century. 2006: Palisades, NY.
    [30]. Rosmarin, R., Sun’s Serviceman. Forbes Online, 2006.
    [31]. Wood, J.B., High tech Services. Services Science, Management & Engineering Lecture Series, 2006.
    [32]. Rust, R., A Call for a Wider Range of Service Research. Journal of Service Research, 2004. 6: p. 211.
    [33]. Rust, R.; Miu, C., What Academic Research tells us about Service. Communications of the ACM, 2006. 49(7): p. 40-54.
    [34]. V?h?, P.; Tolman, A.; Savioja, P.; Lampila, P.; Kangas, S. Service beyond - enabling technologies to boost service business. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [35].Larson, C.T. Holistic Trinity of Services Sciences: Management, Social, & Engineering Sciences. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [36]. Feldman, S.I.; Nathan, K.S.; Li, T.; Hidaka, K.; Schulze, C., The Clarion Call for Modern Services: China, Japan, Europe, and The U.S.Communications of the ACM, 2006. 49(7): p. 86-90.
    [37]. Weinhardt, C.; Neumann, D.; Holtmann, C., Germany: Computer-Aided Market Engineering. Communications of ACM, 2006. 49(7): p. 79.
    [38]. Chase, R.B. Psychology of the Experience: The Missing Link in Service Science. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [39]. Kurokawa, T. Service Science - A Japanese Perspective: Pitfalls and Opportunities. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [40]. Porter, M.E., Competitive Advantage. The Free Press, 1985.
    [41]. Botkin, J.; Matthews, J., Winning Combinations: The Coming Wave of Entrepreneurial Part-nerships Between Large and Small Companies[M]. 1992: New York: John Wiley & Sons, Inc.
    [42]. Normann, R.; Ramairez, R., From value chain to value constellation: Designing interactive strategy. Harvard Business Review, 1993. 71(4): p. 65-67.
    [43]. Anderson, E.G.; Morrice, D.J. A simulation model to study the dynamics in a service-oriented supply chain. in Proceedings of the 31st conference on Winter simulation: Simulation---a bridge to the future. 1999.
    [44]. Ellram, L.M.; Tate, W.L.; Billington, C., Understanding and managing the services supply chain. Journal of Supply Chain Management, 2004.
    [45]. Lovelock, C.; Wirtz, J., Service Marketing: People, Technology, Strategy, 6th Edition. 2006: Person Prentice Hall Upper Saddle.
    [46]. Aitken, J., Supply Chain Integration within the Context of a Supplier Association. 1998, Cranfield University.
    [47]. Baltacioglu, T., A New Framework for Service Supply Chains. The Service Industries Journal, 2007. 27(2): p. 105-124.
    [48]. Salminen, V.; Kalliokoski, P. Challenges of Industrial Service Business Development. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [49]. Sengupta, K.; Heiser, D.R.; Cook, L.S. , Manufacturing and Service Supply Chain Performance: A Comparative Analysis. The Journal of Supply Chain Management, 2006. 42(4): p. 4-15.
    [50]. Lillrank, P.; Tolkki, O. Constructing Service Machines- Global Sourcing of Knowledge-Intensive Services. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [51]. Fayard, D.; Lee, L.; Leitch, R.; Kettinger, W. The Role of Information Systems Integration and Absorptive Capacity on Interorganizational Cost Management in Supply Chains. in Twenty-Seventh International Conference on Information Systems. 2006. Milwaukee, USA.
    [52]. Hoffman, L.J.; Blum, J.; Lawson-Jenkins, K., Trust Beyond Security: An Expanded Trust Model. Communications of ACM, 2006. 49(7): p. 95-101.
    [53]. Harrison, T.P.; McGarraghy, S. Data Support Design for Services Science Modeling. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [54]. Fynes, B.; Lally, A.M. Innovation in Services: From Service Concepts to Service Experiences. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [55]. Liu, R.; Kumar, A. Managing Supply Chain Events to Build Sense-and-Respond Capability. in Twenty-Seventh International Conference on Information Systems. 2006. Milwaukee, USA.
    [56]. Schober, F. Negotiation of Investment Shares in Interorganizational Supply Chains: A Game-Theoretic Approach. in Twenty-Sixth International Conference on Information Systems. 2005.
    [57]. Wu, R.; Xue, L.; Whinston, A.B. Economic Analysis of the Supplier-Reseller Symbiotic Competition in an Online Distribution Business. in Twenty-Sixth International Conference on Information Systems. 2005.
    [58]. Dotoli, M.; Fanti, M.P.; Meloni, C.; Zhou, M.C., Design and Optimization of Integrated E-Supply Chain for Agile and Environmentally Conscious Manufacturing. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 2006. 36(1): p. 62-75.
    [59]. Riedl, R.; Brandst?tter, E. Measures for Quantitative Process-Tracing Methods. in Twenty-Seventh International Conference on Information Systems. 2006. Milwaukee, USA.
    [60]. Karmarkar, U. The Global Information Economy, Service Industrialization and the UCLA BIT Project. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [61]. Karmarkar, U., Will You Survive the Services Revolution? Harvard Business Review, 2004.
    [62]. Rangaswamy, A.; Pal, N. . Service Innovation and New Service Business Models: Harnessing e-Technology for Value Co-creation. in 2005 Workshop on“Service Innovation and New Service Business Models. 2005. Penn State, USA.
    [63]. Oxton, G. An Integrated Approach to Service Innovation. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [64]. [cited 2007 May. 29th]; Available from: http://www-900.ibm.com/cn/ondemand/sustain_growth/index.shtml.
    [65]. Quinn, J.B.; Hilmer, F.G., Strategic Outsourcing. Sloan Management Review, 1994. 35(4): p. 43-55.
    [66]. Quinn, J. B., Intelligent Enterprise: A Knowledge and Service Based Paradigm for Industry. The Free Press, 1992.
    [67]. Egger, H.; Falkinger, J., The distributional effects of international outsourcing in a 2 x2 production model. The North American Journal of Economics and Finance, 2003. 14(2): p. 189-206.
    [68]. Sohail, M. S.; Sohal, A. S., The use of third party logistics services: a Malaysian perspective. Technovation, 2003. 23(5): p. 401-408.
    [69]. Huiskonen, J.; Pirttila, T., Lateral coordination in a logistics outsourcing relationship. International Journal of Production Economics, 2002. 78(2): p. 177-185.
    [70]. Lacity, M.; Willcocks, L.; Feeny, D., Commercializing the Back Officeat Lloyds of London: Outsourcing and Strategic Partnerships Revisited. European Management Journal, 2004. 22(2): p. 127-140.
    [71]. MacPherson, A., The role of producer service outsourcing in the innovation performance of New York state manufacturing firms. Annals of the Association of American Geographers, 1997. 87(1): p. 52-71.
    [72]. Avagliano, T. 7th Annual Outsourcing Index. 2004 [cited; Available from: http://www.outsourcing.com/content.asp?page=01b/other/oe/q304/7index_2.html&nonav=true.
    [73]. Currie, W.L.; Seltsikas, P., Exploring the supply-side of IT outsourcing: evaluating the emerging role of application service providers. European Journal of Information Systems, 2001. 10(3): p. 123-134.
    [74]. Beaumont, N., Service level agreements: An essential aspect of outsourcing. Service Industries Journal, 2006. 26(4): p. 381-395.
    [75]. Consulting, Anderson, A Study on Outsourcing. 1993.
    [76]. Reve, T., The Firm as a Nexus of Internal and External Contracts, in The Firm as a Nexus Treaties, Aoki, M.e.a., Editor. 1990: Sage, London, UK. p. 136-138.
    [77]. Bettis, R. A.; Bradley, S. P.; Hamel, G., Outsourcing and industrial decline. Academy of Management Executive, 1992. 6(1): p. 7-22.
    [78]. Gilley, K. M.; Rasheed, A., Making More by Doing Less: An Analysis of Outsourcing and Its Effects on Firm Performance. Journal of Management, 2000. 26: p. 763-790.
    [79]. Vining, A.; Globerman, S. A., Conceptual Framework for Understanding the outsourcing Decision. European Management Journal, 1999. 17: p. 645-654.
    [80]. Insinga, R. C.; Werle, M. J., Ling Oursourcing to Business Strategy. Academy of Management Executive, 2000. 14(4): p. 58-70.
    [81].Barthelemy, J.; Quelin, B.V. Competence, Specificity, and Outsourcing: Impact on the Complexity of the Contract. in Academy of Management Conference. 2002.
    [82]. Benn, I.; Pearcy, J., Strategic Outsourcing: Exploring the Skills of Third Parties. 2003: Arnold.
    [83]. Thompson, A.A.; Jr Stirckland, A.J., Strategic Management (Thirteenth Edition). 2004: McGraw-Hill.
    [84]. Barthelemy, J.; Geyer, D., IT outsourcing: : Evidence from France and Germany. European Management Journal, 2001. 19(2): p. 195-202.
    [85]. Arrow, K.J. , Social Choice and Individual Values. 1963, New York: JohnWiley & Sons.
    [86]. Dyer, J.S.; Sarin, R.K., Group Preference Aggregation Rules Based on Strength of Preference. Management Science, 1979. 25(9): p. 22-34.
    [87]. Keeney, R.L.; Kirkwood, C.W., Group decision making using cardinal social welfare functions. Management Science, 1975. 22(4): p. 430-437.
    [88]. French, S. , Decision Theory: An Introduction to the Mathematics of rationality. 1986, Chichester: Ellis Harwood.
    [89]. Bordley, R.F.; Wolff, R.W., On the Aggregation of Individual Probability Estimates. Management Science, 1981. 27(8): p. 959-964.
    [90]. Mallach, E.G., Decision Support and Data Warehouse Systems. 2000, New York: McGraw-Hill.
    [91]. Potter, R.E.; Balthazard, P., The role of individual memory and attention processes during electronic brainstorming. MIS Quarterly, 2004. 28(4): p. 621-643.
    [92]. Shyur, H.J.; Shih, H.S., A hybrid MCDM model for strategic vendor selection. Mathematical and Computer Modeling, 2006. 44(7-8): p. 749-761.
    [93]. Chen, S.Y.; Fu, G.T., Combining fuzzy iteration model with dynamic programming to solve multiobjective multistage decision making problems. Fuzzy Sets and Systems, 2005. 152(3): p. 499-512.
    [94]. Williams, A.H.; Cookson, R.A., Equity-efficiency trade-offs in health technology assessment. International Journal of Technology Assessment in Health Care, 2006. 22(1): p. 1-9.
    [95]. Winston, L.W., Operations Research Decision Making. Thomson Learning, 2002. 4: p. 142-152.
    [96]. Vandenberg, M.; Rogers, P.A. Choosing the Contractor to Meet Your Specific Requirements and Ensuring a Rewarding Relationship. in Choosing the Best Supplier IIR Conference. 2000.
    [97]. Williams, H. Employment Framework For Information Technology Outsourcing. [cited 2007 Jun. 6th]; Available from: http://www.apsc.gov.aulpublications98Jitoutsourcing.pdf.
    [98]. Walden, E.A. On the Structure and Function of Outsourcing Contracts: An Integrative Analysis of the Economics behind Vendor-Client Relationships. [cited; Available from: http:/lwww.ericwalden.net.
    [99].Gainey, T.W.; Klaas, B.S., The Outsourcing of Training and Development: Factors Impacting Client Satisfaction. Journal of Management, 2002. 181(0): p. 1-23.
    [100]. Reuvid, J.; Hinks, J.,业务外包. 2004:华夏出版社.
    [101]. Dossani, R. The Next Wave of Globalization: Relocating Service Provision to India. in Proceedings of First Service Science Conference. 2006. Pittsburgh, USA.
    [102]. Huiskonen, J.; Pirttila, T., Lateral Coordination in a Logistics Outsourcing Relationship. International Journal of Production Economics, 2002. 78: p. 177-185.
    [103]. Holmstrom, B. , Contractual Models of the Labor Market. American Economic Review, 1981. 71(2): p. 308-313.
    [104]. Honess, S., Outsourcing -- A legal perspective on contract critical success factors. Information Security Technical Report, 1996. 1(3): p. 57-58.
    [105]. Harris, A.; Giunipero, L.C.; Hult, G.T.M., Impact of Organizational and Contract Flexibility on Outsourcing Contracts. Industrial Marketing Management, 1998. 27(5): p. 373-384.
    [106]. Allen, S.; Chandrashekar, A., Outsourcing services: The contract is just the beginning. Business Horizons, 2000. 43(2): p. 25-34.
    [107]. Aubert, B.A.; Rivard, S.; Patry, M., A Transaction Cost Model of IT Outsourcing. Information & Management, 2004. 41(7): p. 921-932.
    [108]. Burnett, R., Legal risk management for the IT industry. Computer Law & Security Report, 2005. 21(1): p. 61-67.
    [109]. Barthelemy, J., The Hard and Soft Sides of IT Outsourcing Management. European Management Journal, 2003. 21(5): p. 539-548.
    [110]. Langfield-Smith, K.; Smith, D., Management control systems and trust in outsourcing relationships. Management Accounting Research, 2003. 14(3): p. 281-307.
    [111]. Fisher, R. A., The Genetic Theory of Natural Selection. 1930, Oxford: Clarendon Press.
    [112]. Lewontin, R.C., Evolution and the Theory of Games. Journal of Theoretical Biology, 1961. 1: p. 382-403.
    [113]. Jr. Marshall, J.T., Ecologic Races of Song Sparrows in the San Francisco Bay Region: Part I. Habitat and Abundance. The Condor, 1948. 50(5): p. 193-215.
    [114]. Jr. Marshall, J.T., Ecologic Races of Song Sparrows in the San Francisco Bay Region: Part II. Geographic Variation. The Condor, 1948. 50(6): p. 233-256.
    [115]. Alchian, A.A., Uncertainty, Evolution, and Economic Theory. The Journal of Political Economy, 1950. 58(3): p. 211-221.
    [116]. Smith, H.N., The Frontier Hypothesis and the Myth of the West. American Quarterly, 1950. 2(1): p. 3-11.
    [117]. Smith, J.M., Evolution and the Theory of Games. American Scientist, 1973. 64(1): p. 41-45.
    [118]. Smith, J.M.; Price, G., The Logic of Animal Conflict. Nature, 1973. 146: p. 15-18.
    [119]. Smith, J.M., Evolution and the Theory of Games. 1982: Cambridge University Press.
    [120]. Taylor, P.D.; Jonker, L.B., Evolutionarily Stable Strategy and Game Dynamics. Math Bioscience, 1978. 40: p. 145-156.
    [121]. Axelrod, R., The Evolution of Cooperation. 1984, New York: Basic Books.
    [122]. Samuelson, L., Evolutionary Games and Equilibrium Selection. 1997, Cambridge, MA: MIT Press.
    [123]. Schneider, T. D., Evolution of Biological Information. Journal of Nucleic Acids Research 2000. 28: p. 2794-2799.
    [124]. Stauffer, D., Life, Love and Death: Models of Biological Reproduction and Aging. 1999, Koln, Euroland: Institute for Theoretical Physics.
    [125]. Redondo, F.V. . , Game Theory and Economics. 2001: Cambridge University Press.
    [126]. Tuyls, K.; Verbeeck, K.; Lenarts, T. A Selection-Mutation Modelfor Q-Learning in Multi-Agent Systems. in The ACM International Conference Proceedings Series: Automomous Agents and Multi-Agent Systems. 2003. Melbourne, Australia.
    [127]. Tuyls, K.; Verbeeck, K.; Maes, S. . On a Dynamical Analysis of Reinforcement Learning in Games: Emergence of Occam's Razor. in Central and Eastern European Conference on Multi-Agent Systems 2003. 2003. Prague, Czech Republic.
    [128]. Zhao, J.D.; Shen, H.Z.; Peng, Y. A Bargaining Game on Land Purchase. in 2005 International Conferencr on Management Science & Engineering. 2005. Haerbin, China.
    [129]. Tuyls, K.; Nowe, A.; Lenaerts, T.; Manderick, B., An Evolutionary Game. Theoretic Perspective on Learning in Multi-Agent Systems, 2004. 139(2): p. 297-240.
    [130]. Schaffer, M.E., Evolutionarily Stable Strategies for a Finite Population and a Variable Contest Size. Journal of Theoretical Biology, 1988. 132(4): p. 469-478.
    [131]. Foster, D.; Young, P., Stochastic Evolutionary Game Dynamics. Theoretical Population Biology, 1990.
    [132]. Webull, J.W., Evolutionary Game Theory. 1995: Cambridge MIT Press.
    [133]. Ritzberger, K.; Weibull, J.W., Evolutionary Selection in Normal-Form Games. Econometrica, 1995. 63(6): p. 1371-1399.
    [134]. Friedman, D., Evolutionary Games in Economics. Econometrica, 1991. 59(3): p. 637-666.
    [135]. Basu, K., Civil institutions and evolution: Concepts, critique and models. Journal of Development Economics, 1995. 46(1): p. 19-33.
    [136]. Dufwenberg, M.; Guth, W., Indirect Evolution vs. Strategic Delegation: a Comparison of Two Approaches to Explaining Economic Institutions. European Journal of Political Economy, 1999. 15: p. 281-295.
    [137]. Guttman, J.M., On the evolutionary stability of preferences for reciprocity. European Journal of Political Economy, 2000.
    [138]. Nyborg, K.; Rege, M., On Social Norms: the Evolution of Considerate Smoking Behavior. Journal of Economic Behavior and Organization, 2003. 52(3): p. 323-340.
    [139]. Nyborg, K.; Rege, M., Does Public Policy Crowd Out Private Contributions to Public Goods. Public Choice, 2004. 115(3-4): p. 397-418.
    [140]. Arifovic, J.; Masson, P., Heterogeneity and Evolution of Expectations in a Model of Currency Crisis. Nonlinear Dynamics, Psychology, and Life Sciences, 2004. 8(2): p. 231-257.
    [141]. Daniel, G.; Arce, M.; Sandler, T., The Dilemma of the Prisoners' Dilemmas. Kyklos, 2005. 58(1): p. 3-24.
    [142].谢识予,有限理性条件下的进化博弈理论.上海财经大学学报, 2001. 3(5): p. 3-9.
    [143].张良桥,进化稳定均衡与纳什均衡-兼谈进化博弈理论的发展.经济科学, 2001. 3: p. 103-111.
    [144].盛昭瀚,蒋德鹏,演化经济学. 2002,上海:上海三联书店.
    [145].胡支军,黄登仕,证券组合投资分析的进化博弈方法.系统工程, 2004. 22(7): p. 44-49.
    [146].周峰,徐翔,农村税费改革:基于双层次互动进化博弈模型的分析.南京农业大学学报:哲学社会科学版, 2005. 5(1): p. 24-28.
    [147].刘振彪,陈晓红,企业家创新投资决策的进化博弈分析.管理工程学报, 2005. 19(1): p. 56-59.
    [148]. Cross, J., IT Outsourcing: British Petroleum's Competitive Approach. Harvard Business Review, 1995. 73(3): p. 94-103.
    [149]. Nelson, P.; Richmond, W.; Seidmann, A., Two Dimensions of Software Acquisition. Communications of ACM, 1996. 39(7): p. 29-35.
    [150]. Earl, M. J., The Risks of Outsourcing IT. Sloan Management Review, 1996: p. 26-32.
    [151]. Lacity, M.C.; Willcocks, L.P., An Empirical Investigation of Information Technology Sourcing Practices: Lesson From Experience. MIS Quarterly, 1998: p. 363-408.
    [152]. Loh, L.; Venkatraman, N., Determinants of Information Technology Outsourcing: ACross-Sectional Analysis. Journal of Management Information Systems, 1992. 9(1): p. 7-24.
    [153]. Hitt, Clemons, Snir. A Risk Analysis Framework for IT Outsourcing. [cited; Available from: http://tecom.cox.smu.edu/esnir/Outsourcing.pdf.
    [154]. Aubert, B. A.; Rivard, S.; Patry, M. Managing IT Outsourcing Risk: Lessons Learned. [cited; Available from: http://www.cirano.qc.ca/pdf/publication/2001s-39.pdf.
    [155]. Aubert, B. A.; Patry, M.; Rivard, S., Assessing the Risk of IT Outsourcing.
    [156]. Aubert, B. A.; Patry, M.; Rivard, S.; Smith, H. IT Outsourcing Risk Management at British Petroleum. [cited; Available from: http://www.cirano.qc.ca/pdflpublication/2000s-31.pdf.
    [157]. Aubert, B.A.; Dussault, S.; Patry, M.; Rivard, S., Managing the Risk of IT Outsourcing.
    [158]. Bahli, B.; Rivard, S., A Validation of Measures Associated with the Risk Factors in information Technology Outsourcing.
    [159]. DiRomualdo, A.; Gurbaxani, V., Strategic Intent for IT Outsourcing.
    [160]. Sung, K.; Chung, Y.S. Factors Influencing IS Outsourcing Implementation: An Empirical Study from the Inter-organizational Relationship Perspective. in Decision Sciences Institute, Annual Meeting Proceedings. 2002.
    [161]. Freier, A.; Karlton, P.; Kocher, P. , The SSL Protocol Version 3.0. 1996, Internet-Draft.
    [162]. Dierks, T. ; Allen, C. , The TLS Protocol - Version 1.0, in Internet-Draft. 1997.
    [163]. Iyer, B.; Mehrotra, S.; Mykletun, E.; Tsudik, G.; Wu, Y.H. . A framework for efficient storage security in RDBMS. in ADVANCES IN DATABASETECHNOLOGY - EDBT 2004. 2004.
    [164]. Biskup, J.; Bleumer, G., Cryptographic protection of health information: cost and benefit. 2005.
    [165]. IBM Data Encryption for IMS and DB2 Databases, Version 1.1. [cited 2006 May. 7th]; Available from: http://www-306.ibm.com/software/data/db2imstools/html/ibmdataencryp.html.
    [166]. Oracle Corporation: Database Encryption in Oracle9i. [cited 2006 May. 7th]; Available from: otn.oracle.com/deploy/security/oracle9i.
    [167]. Davida, G.; Wells, D.; Kam, J., A database encryption system with subkeys. ACM Transactions on Database Systems, 1981. 6(2): p. 312-328.
    [168]. Bouganim, L.; Pucheral, P. . Chip-Secured Data Access: Confidential Data on Untrusted Servers. in VLDB Conference. 2002. Hong Kong, China.
    [169]. Hacigumus, H.; Iyer, B.; Li, C.; Mehrotra, S. Executing SQL over Encrypted Data in the Database Service Provider Model. in Proceedings of the ACM SIGMOD International Conference on Management of Data,. 2002.
    [170]. He, J.; Wang, M. Cryptography and Relational Database Management Systems. in Proceedings of the 5th International Database Engineering and Applications Symposium. 2001.
    [171]. Damiani, E.; Vimercati, S.; Jajodia, S.; Paraboschi, S.; Samarati, P. Balancing confidentiality and efficiency in untrusted relational DBMSs. in Proceedings of the 10th ACM Conference on Computer and Communications Security. 2003. Washington D.C., USA.
    [172]. Hacigumus, H.; Iyer, B.; Sharad, M. Encrypted database integrity in database service provider model. in Certification and Security in E-Services. IFIP 17th World Computer Congress TC11 Stream on Security in E-Services. 2003.
    [173]. Devanbu, P.; Gertz, M.; Martel, C. Authentic third-party data publication. in Data and Applications Security. Developments and Directions. IFIP TC11/WG11.3 Fourteenth Annual Working Conference on Database Security. 2001.
    [174]. Pang, H. H.; Tan, K. L. Authenticating query results in edge computing. in Proceedings of the 20th International Conference on Data Engineering. 2004.
    [175]. Narasimha, M.; Tsudik, G. Authentication of outsourced databases using signature aggregation and chaining. in Database Systems for Advanced Applications. 11th International Conference, DASFAA 2006. 2006.
    [176]. Piattini, M. G.; Fernandez-Medina, E. . Secure databases: State of the art. in IEEE 34th Annual 2000 International Carnahan Conference on Security Technology. 2000.
    [177]. Jeong, M. A.; Kim, J. J.; Won, Y. W. . A flexible database security system using multiple access control policies. in Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies. 2003.
    [178]. FIPS Publication 46: Data encryption standard (DES). 1977,National Bureau of Standards.
    [179]. Rivest, R. L.; Shamir, A.; Adleman, L., A method for obtaining digital signature and public key cryptosystems. Communications of the ACM, 1983. 26(1): p. 96-99.
    [180]. Shen, H.Z.; Zhao, J.D. Application of intelligent agent in network payment security. in Proceedings of 29th Annual IEEE International Conference on Local Computer Networks. 2004.
    [181]. Shen, H.Z.; Zhao, J.D.; Wang, H.C. Illegal intrusion detection based on hidden information database. in Intelligence and Security Informatics. International Workshop, WISI 2006. 2006.
    [182]. Kahate, A. , Cryptography and network security. 2003, McGraw-Hill. p. 43-56.
    [183]. Schneier, B., Applied cryptography: Protocols, algorithms, and source code in C. 1995, John Wiley & Sons, Inc.: New York, NY, USA. p. 105-159.
    [184]. Hacigumus, H.; Iyer, B.; Mehrotra, S. . Providing database as a service. in Proceedings 18th International Conference on Data Engineering. 2002.
    [185]. McGuire, E.P., Industrial Product Warranties: Policies and Practices. 1988, New York: The Conference Board, Inc.
    [186]. Boulding, W.; Kalra, A.; Staelin, R.; Zeithaml, V.A., A Dynamic Process Model of Service Quality: From Expectations to Behavioral Intentions. Journal of Marketing Research, February, 1993: p. 7-27.
    [187]. Bansal, H.S.; Voyer, P.A., Word-of-Mouth Processes Within a Services Purchase Decision Context. Journal of Service Research, 2000. 3(2): p. 166-177.
    [188]. Liu, Z.; Lai, Y.C; Ye, N., Propagation and immunization of infection on general networks with both homogeneous and heterogeneous components. Physical Review, 2003(3).
    [189]. Riley, S.; Fraser, C.; Donnelly, C.A.; et al., Transmission Dynamics of the Etiological Agent of SARS in Hong Kong: Impact of Public Health. Science, 2003. 300(5627): p. 1961 - 1966.
    [190]. Lipsitch, M.; Cohen, T.; Cooper, B.; et al., Transmission Dynamics and Control of Severe Acute Respiratory Syndrome. Science, 2003.
    [191]. Zanette, D.H., Dynamics of rumor propagation on small-world networks. Physical Review, 2002. 65(4).
    [192]. Zanette, D.H., Critical behavior of propagation on small-world networks. Physical Review, 2001. 64(5).
    [193]. Pastor-Satorras, R.; Vespignani, A., Epidemic dynamics in finite size scale-free networks. Physical Review, 2002. 65(3).
    [194]. Edari, R.; McManus, P., RISK AND RESILIENCY FACTORS FOR VIOLENCE Pediatric Clinics of North America, 1998. 45(2): p. 203-305.
    [195]. Hauser, S.T.; Vieyra, M.A.B.; Jacobson, A.M.; Wertreib, D., Vulnerability and Resilience in Adolescence: Views from the Family. The Journal of Early Adolescence, 1985. 5(1): p. 81-100.
    [196]. Burger, J.V., Keys to Survival: Highlights in Resilience Research.Journal of Emotional and Behavioral Problems, 1994. 3(2): p. 6-10.
    [197]. Murthy, D.N.P., Product warranty and reliability Annual Operation Research, 2006. 143: p. 133-146.
    [198]. McGuire, E.P., Industrial Product Warranties: Policies and Practices. 1980, New York: The Conference Board, Inc.
    [199]. Brennan, J. R., Warranties: Planning, Analysis and Implementation. 1994, New York: McGraw-Hill, Inc.
    [200]. Djamaludin, I.; Murthy, D.N.P.; Blischke, W.R. , Bibliography on warranties. Chapter 33 in Blischke, W. R. 1996.
    [201]. Murthy, D.N.P., Product Warranty Handbook. 2000, New York: Marcel Dekker, Inc.
    [202]. Sahin, I.; H. Polatoglu. , Quality, Warranty and Preventive Maintenance. 1998, Boston: Kluwer Academic Publishers.
    [203]. Murthy, D.N.P.; Djamaludin, I., Product warranty-A review. International Journal of Production Economics, 2002. 79: p. 231-260.
    [204]. Blischke, W. R.; Murthy, D.N.P. , Warranty Cost Analysis. 1994, New York: Marcel Dekker, Inc.
    [205]. Blischke, W. R.; Murthy, D.N.P., Product Warranty Handbook. 1996, New York: Marcel Dekker, Inc.
    [206]. Blischke, W.R.; Murthy, D.N.P., Reliability: Modelling, Prediction and Optimization. 2000, New York: Wiley.
    [207]. Lyons, K., Warranty Management System. 2002, The University of Queensland.
    [208].陆朝荣,施毅,设备故障率和设备维修策略.石油化工技术经济, 2004. 3.