REFERENCES
- Akoka , J. and Comyn-Wattiau , I. 1996 . A knowledge-based system for auditing computer and management information systems . Expert Systems with Applications , 11 ( 3 ) : 361 – 375 .
- Andriole , S. J. 2007 . Mining for digital gold: Technology due diligence for CIOs . Communications of the Association for Information Systems , 20 ( 24 ) : 371 – 381 .
- Andriole , S. J. 2008 . Technology due diligence: Best practices for chief information officers, venture capitalists, and technology vendors , Hershey , PA : Information Science Reference .
- Baublits , T. , Lee , H. S. , Stanis , G. , Sundberg , B. and Tan , Z.-D. 2005 . “ Development of an IT Assessment Program for Acquisition ” . In Final Report of the student project , Austin , TX : University of Texas at Austin .
- Bayuk , J. 2009 . Vendor due diligence . ISACA Journal , 3 : 34 – 38 .
- Bhatia , M. 2007 . IT merger due diligence—A blueprint . Information System Control Journal , 1 : 46 – 49 .
- Bing , G. 2008 . Due diligence planning questions , 105 – 110 . Westport, CT: Praeger Publishers .
- Boehm , B. W. 1988 . Spiral model of software development and enhancement . IEEE Computer , 21 ( 5 ) : 61 – 72 .
- Casella, M. J., & Mattie, J. A. (2007). Auditing alternative investment—A practical guide for investor entities, investee fund managers and auditors. http://http://www.pwc.com/us/en/alternative-investment/assets/0407_au322.pdf (http://http://www.pwc.com/us/en/alternative-investment/assets/0407_au322.pdf)
- Choobineh , J. , Dhillon , G. , Grimaila , M. R. and Rees , J. 2007 . Management of information security: Challenges and research directions . Communications of the Association for Information Systems , 20 : 958 – 971 .
- Goodman , S. E. and Ramer , R. 2007 . Global sourcing of IT services and information security: prudence before playing . Communications of the Association for Information Systems , 20 : 812 – 823 .
- Gregor , S. 2006 . The nature of theory in information systems . MIS Quarterly , 30 ( 3 ) : 611 – 642 .
- Hevner , A. R. , Ram , S. , March , S. T. and Park , J. 2004 . Design science in information system research . MIS Quarterly , 28 ( 1 ) : 75 – 105 .
- ISACA . 2008 . ITAF: A professional practices framework for IT assurance , Rolling Meadows, IL: ISACA .
- ITGI . 2007 . COBIT 4.1: Control objectives for information and related technology , Rolling Meadows, IL: IT Governance Institute .
- ITGI . 2008 . Enterprise value: Governance of IT investments—The Val IT Framework 2.0 , Rolling Meadows, IL: IT Governance Institute .
- ITGI . 2009 . Enterprise risk: Identify, govern and manage IT risk, The IT risk framework , Exposure draft. Rolling Meadows, IL: IT Governance Institute .
- Kitchenham , B. 2004 . Procedures for performing systematic reviews , Keele University Technical Report. Keele, UK: Keele University .
- Knowledge Leader. (2006). IT due diligence checklist. http://www.knowledgeleader.com (http://http://www.knowledgeleader.com)
- Lee , J. N. 2008 . Exploring the vendor's process model in information technology outsourcing . Communications of the Association for Information Systems , 22 : 569 – 588 .
- Mehta , M. and Hirschheim , R. 2007 . Strategic alignment in mergers and acquisitions: Theorizing IS integration decision making . Journal of Association for Information System , 8 ( 3 ) : 143 – 174 .
- Pickard , S. S. 2002 . Due diligence list , New York: Writers Club Press .
- PWC. (2011). Operational due diligence. http://http://www.pwc.com/nz/en/transactions/operational-due-diligence.jhtml (http://http://www.pwc.com/nz/en/transactions/operational-due-diligence.jhtml)
- Roztocki , N. and Weistroffer , H. R. 2005 . Evaluating information technology investments: A fuzzy activity-based costing approach . Journal of Information Science and Technology , 2 ( 5 ) : 30 – 43 .
- Roztocki , N. and Weistroffer , H. R. 2008 . Information technology investments in emerging economies . Information Technology for Development , 14 ( 1 ) : 1 – 10 .
- Silver , M. S. , Markus , L. M. and Beath , C. M. 1995 . The information technology interaction model: A foundation for the MBA core course . MIS Quarterly , 19 ( 3 ) : 361 – 390 .
- Sisco, M. (2002). The art of technology due diligence. http://http://articles.techrepublic.com.com/5100-10878_11-1038683.html (http://http://articles.techrepublic.com.com/5100-10878_11-1038683.html)
- Soy, S. K. (1997). The case study as a research method. (Unpublished paper). University of Texas at Austin, Austin, TX. http://http://www.ischool.utexas.edu/ ssoy/usesusers/l391d1b.htm (http://http://www.ischool.utexas.edu/ ssoy/usesusers/l391d1b.htm)
- Sundberg, B., Tan, Z.-D., Baublits, T., Lee, H.-J., Stanis, G., & Tranriverdi, H. (2006). A framework for conducting IT due diligence in mergers and acquisitions. ISACA Information System Control Journal Online, 6. http://http://www.isaca.org/Journal/Past-Issues/2006/Volume-6/Pages/JOnline-A-Framework-for-Conducting-IT-Due-Diligence-in-Mergers-and-Acquisitions1.aspx (http://http://www.isaca.org/Journal/Past-Issues/2006/Volume-6/Pages/JOnline-A-Framework-for-Conducting-IT-Due-Diligence-in-Mergers-and-Acquisitions1.aspx)
- VanGrembergen, W. (2000). The balanced scorecard and IT governance. ISACA Information System Control Journal, 2. http://http://www.isaca.org/Journal/Past-Issues/2000/Volume-2/Pages/The-Balanced-Scorecard-and-IT-Governance.aspx (http://http://www.isaca.org/Journal/Past-Issues/2000/Volume-2/Pages/The-Balanced-Scorecard-and-IT-Governance.aspx)
- World Bank . 2009 . “ Washington, DC: World Bank. Retrieved from http://data.worldbank.org/about/country-classifications/country-and-lending-groups ” . In County classification