Reference
- Berinato, S., & Scalet, S. (n.d.). The ABCs of Security. www.cio.com. Retrieved November 5, 2009, from www.cio.com/security/edit/securitv_abc.html
- Bickers, C. (2000). Playing It Safe. Far Eastern Economic Review, 163 (23), 56–58 Cocchiarella, T., & Ramer, R. (2004). Unseen Dangers in Offshore IT? Retrieved September 9, 2009, from http://www.tfsecurity.com/unseendangers.html
- Endorf, C. (2004). Outsourcing Security: the Need, the Risks, the Providers, and the Process. Information Systems Security, 12 (6), 17–23.
- Giordano, V. (2000). Is It Right for Your Company? Communications News, 37 (9), 66–68.
- Khalfan, A. (2004). Information Security Considerations in IS/IT Outsourcing Projects. International Journal of Information Management, 24, 29–42.
- Kliem, R. (2004). Managing the Risks of Offshore IT Development Projects. Information Systems Management, 21 (3), 22–28.
- Klosek, J. (2005). Data Privacy and Security Are a Significant Part of the Outsourcing Equation. Intellectual Property and Technology Law Journal, 17 (6), 15–19.
- Kooser, A. C. (2001). In the Outdoor. Entrepreneur, 29 (11), 15–16.
- Kroenke, D. (2009). Using MIS. Upper Saddle River: Pearson Prentice Hall.
- Leigh, J. (2006). Managing Outsourcing Security Risks. www._SecurityPark.net. Retrieved November 5, 2009, from http://www.securitypark.co.uk/pfv.asp?articleid= 2496.
- Masuda, B. (2006). Managing the Risks of Managed Security Services. Information Systems Security, 15 (1), 35–42.
- Plewes, A. (2007, July 23). Is Outsourcing too Risky? Analysis: Not if you Plan Right…. Retrieved September 9, 2009, from Silicon.com
- Rao, M. (2004). Key Issues for Global IT Sourcing: Country and Individual Factors. EDPACS, 32 (4), 1–12.
- Ramanujan, S., & Jane, S. (2006). A Legal Perspective on Outsourcing and Offshoring. Journal of American Academy of Business, 8 (2).
- neoIT, Security and Data Privacy Best Practices in Offshoring. (n.d.). neoIT. Retrieved November 5, 2009, from www.neoIT.com.
- Perkins, B. (2003). A Reality Check on Going Offshore. Computerworld, 37 (24), 42. Sullivan, L. (2004, July). The “O” Word: Outsourcing Overseas. Risk management magazine, 51, 24–30.
- Tafti, M. (2005). Risks Factors Associated with Offshore IT Outsourcing. Industrial Management & Data Systems, 105 (5), 549–560.
- Thibodeau, P. and Mearian, L. (2003). Real-Time IT Heading Offshore. Computerworld, 37 (42), 1–6.
- Twing, D. (2005, September). Reviewing the Security Aspect of Outsourcing. Network World. 22 (36), p. 59.
- Umanskiy, L. A. (2006). Security’s Input on Outsourcing. Security Management, 50 (10), 44–48.
- Vijayan, J. (2008). IT Wary of Insider Attacks As Economy Slows Down. Computerworld, 42 (43), 16.
- Wei, J., & Peach, B. (2006). Development of a Risk Assessment Model for Global Information Technology Outsourcing. Journal of International Technology and Information Management, 15 (4), 35–50.