Return to Article Details Risk analysis in information technology and communication outsourcing Download Download PDF