85
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Information Technology Offshore Outsourcing Security Risks and Safeguards

Pages 29-46 | Published online: 10 Sep 2014

Reference

  • Berinato, S., & Scalet, S. (n.d.). The ABCs of Security. www.cio.com. Retrieved November 5, 2009, from www.cio.com/security/edit/securitv_abc.html
  • Bickers, C. (2000). Playing It Safe. Far Eastern Economic Review, 163 (23), 56–58 Cocchiarella, T., & Ramer, R. (2004). Unseen Dangers in Offshore IT? Retrieved September 9, 2009, from http://www.tfsecurity.com/unseendangers.html
  • Endorf, C. (2004). Outsourcing Security: the Need, the Risks, the Providers, and the Process. Information Systems Security, 12 (6), 17–23.
  • Giordano, V. (2000). Is It Right for Your Company? Communications News, 37 (9), 66–68.
  • Khalfan, A. (2004). Information Security Considerations in IS/IT Outsourcing Projects. International Journal of Information Management, 24, 29–42.
  • Kliem, R. (2004). Managing the Risks of Offshore IT Development Projects. Information Systems Management, 21 (3), 22–28.
  • Klosek, J. (2005). Data Privacy and Security Are a Significant Part of the Outsourcing Equation. Intellectual Property and Technology Law Journal, 17 (6), 15–19.
  • Kooser, A. C. (2001). In the Outdoor. Entrepreneur, 29 (11), 15–16.
  • Kroenke, D. (2009). Using MIS. Upper Saddle River: Pearson Prentice Hall.
  • Leigh, J. (2006). Managing Outsourcing Security Risks. www._SecurityPark.net. Retrieved November 5, 2009, from http://www.securitypark.co.uk/pfv.asp?articleid= 2496.
  • Masuda, B. (2006). Managing the Risks of Managed Security Services. Information Systems Security, 15 (1), 35–42.
  • Plewes, A. (2007, July 23). Is Outsourcing too Risky? Analysis: Not if you Plan Right…. Retrieved September 9, 2009, from Silicon.com
  • Rao, M. (2004). Key Issues for Global IT Sourcing: Country and Individual Factors. EDPACS, 32 (4), 1–12.
  • Ramanujan, S., & Jane, S. (2006). A Legal Perspective on Outsourcing and Offshoring. Journal of American Academy of Business, 8 (2).
  • neoIT, Security and Data Privacy Best Practices in Offshoring. (n.d.). neoIT. Retrieved November 5, 2009, from www.neoIT.com.
  • Perkins, B. (2003). A Reality Check on Going Offshore. Computerworld, 37 (24), 42. Sullivan, L. (2004, July). The “O” Word: Outsourcing Overseas. Risk management magazine, 51, 24–30.
  • Tafti, M. (2005). Risks Factors Associated with Offshore IT Outsourcing. Industrial Management & Data Systems, 105 (5), 549–560.
  • Thibodeau, P. and Mearian, L. (2003). Real-Time IT Heading Offshore. Computerworld, 37 (42), 1–6.
  • Twing, D. (2005, September). Reviewing the Security Aspect of Outsourcing. Network World. 22 (36), p. 59.
  • Umanskiy, L. A. (2006). Security’s Input on Outsourcing. Security Management, 50 (10), 44–48.
  • Vijayan, J. (2008). IT Wary of Insider Attacks As Economy Slows Down. Computerworld, 42 (43), 16.
  • Wei, J., & Peach, B. (2006). Development of a Risk Assessment Model for Global Information Technology Outsourcing. Journal of International Technology and Information Management, 15 (4), 35–50.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.