An integrated view of human, organizational, and technological challenges of IT security management

R Werlinger, K Hawkey, K Beznosov - Information Management & …, 2009 - emerald.com
Purpose–The purpose of this study is to determine the main challenges that IT security
practitioners face in their organizations, including the interplay among human …

Information system security commitment: A study of external influences on senior management

KA Barton, G Tejay, M Lane, S Terrell - Computers & Security, 2016 - Elsevier
This paper investigated how senior management is motivated to commit to information
system (IS) security. Research shows senior management participation is critical to …

Information security risk management in it outsourcing–a quarter-century systematic literature review

BM Bhatti, S Mubarak, S Nagalingam - Journal of Global …, 2021 - Taylor & Francis
ABSTRACT Information Security Risk Management (ISRM) in Information Technology
Outsourcing (ITO) is among the most critical and under-studied areas of ITO research. This …

Security risks in service offshoring and outsourcing

G Nassimbeni, M Sartor, D Dus - Industrial Management & Data …, 2012 - emerald.com
Purpose–Service outsourcing/offshoring represents an increasing phenomenon. Several
factors (eg cost reduction, flexibility, access to new technologies and skills, access to new …

Impact of additive manufacturing in different areas of Industry 4.0

A Haleem, M Javaid, S Rab - International Journal of …, 2020 - inderscienceonline.com
Additive manufacturing (AM) technologies are becoming an essential part of tomorrow's
smart factories, where software, technologies, and processes are being integrated to deliver …

Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective

SP Williams, CA Hardy, JA Holgate - Electronic Markets, 2013 - Springer
Achieving a sustainable information protection capability within complex business, legal and
technical environments is an integral part of supporting an organization's strategic and …

Impacts of risk and service type on nearshore and offshore investment location decisions: An empirical approach

ED Hahn, K Bunyaratavej, JP Doh - Management International Review, 2011 - Springer
Offshoring of services has gained considerable attention in management circles. However,
little empirical research has explored the emerging sourcing alternative of nearshoring …

[图书][B] The cloud security ecosystem: technical, legal, business and management issues

R Choo, R Ko - 2015 - books.google.com
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security
Ecosystem comprehensively discusses a range of cloud security topics from multi …

Adoption of security as a service

C Senk - Journal of Internet Services and Applications, 2013 - Springer
Security as a Service systems enable new opportunities to compose security infrastructures
for information systems. However, to date there are no holistic insights about their adoption …

Escaping 'localisms' in IT sourcing: tracing changes in institutional logics in an Italian firm

L Mola, A Carugati - European Journal of Information Systems, 2012 - Taylor & Francis
Organizations are limited in their choices by the institutional environment in which they
operate. This is particularly true for IT sourcing decisions that go beyond cost considerations …