The derivation of a conceptual model for outsourcing IT security

Wilde, William, Warren, Matthew and Hutchinson, William 2006, The derivation of a conceptual model for outsourcing IT security, in Proceedings of the IADIS International Conference e-Society 2006, IADIS Press, Dublin, Ireland., pp. 234-238.

Attached Files
Name Description MIMEType Size Downloads

Title The derivation of a conceptual model for outsourcing IT security
Author(s) Wilde, William
Warren, MatthewORCID iD for Warren, Matthew
Hutchinson, William
Conference name IADIS International Conference (2006: Dublin, Ireland)
Conference location Dublin, Ireland
Conference dates 13-16 July 2006
Title of proceedings Proceedings of the IADIS International Conference e-Society 2006
Editor(s) Isaias, Pedro
McPherson, Maggie
Bannister, Frank
Publication date 2006
Conference series International Association for Development of the Information Society Conference
Start page 234
End page 238
Publisher IADIS Press
Place of publication Dublin, Ireland.
Keyword(s) information security
conceptual model
Summary IT security outsourcing is the establishment of a contractual relationship with an outside vendor to assume responsibility for one or more security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making process leads to a substantial degree of uncertainty. This is especially so in the realm of IS security since the protection of both hardware and software systems in is placed in the hands of an external provider. This is the second paper discussing the improvement of the effectiveness of the decision making process by means of a conceptual model using Soft System Methodology techniques that integrates security benefits, costs and their respective performance measures. In this paper the methodology used to develop the model and its validation are discussed.
ISBN 972892416X
Language eng
Field of Research 080609 Information Systems Management
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2006, IADIS
Persistent URL

Document type: Conference Paper
Collection: School of Information and Business Analytics
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 848 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 09:59:01 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact