The derivation of a conceptual model for outsourcing IT security

Wilde, William, Warren, Matthew and Hutchinson, William 2006, The derivation of a conceptual model for outsourcing IT security, in Proceedings of the IADIS International Conference e-Society 2006, IADIS Press, Dublin, Ireland., pp. 234-238.

Attached Files
Name Description MIMEType Size Downloads

Title The derivation of a conceptual model for outsourcing IT security
Author(s) Wilde, William
Warren, Matthew
Hutchinson, William
Conference name IADIS International Conference (2006: Dublin, Ireland)
Conference location Dublin, Ireland
Conference dates 13-16 July 2006
Title of proceedings Proceedings of the IADIS International Conference e-Society 2006
Editor(s) Isaias, Pedro
McPherson, Maggie
Bannister, Frank
Publication date 2006
Conference series International Association for Development of the Information Society Conference
Start page 234
End page 238
Publisher IADIS Press
Place of publication Dublin, Ireland.
Keyword(s) information security
outsourcing
conceptual model
Summary IT security outsourcing is the establishment of a contractual relationship with an outside vendor to assume responsibility for one or more security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making process leads to a substantial degree of uncertainty. This is especially so in the realm of IS security since the protection of both hardware and software systems in is placed in the hands of an external provider. This is the second paper discussing the improvement of the effectiveness of the decision making process by means of a conceptual model using Soft System Methodology techniques that integrates security benefits, costs and their respective performance measures. In this paper the methodology used to develop the model and its validation are discussed.
ISBN 972892416X
9789728924164
Language eng
Field of Research 080609 Information Systems Management
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2006, IADIS
Persistent URL http://hdl.handle.net/10536/DRO/DU:30006140

Document type: Conference Paper
Collection: School of Information and Business Analytics
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 405 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 09:59:01 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.