메뉴 건너뛰기




Volumn 14, Issue 6, 2008, Pages 849-857

Multi-level information system security in outsourcing domain

Author keywords

Data security; Information management; Outsourcing; Risk management

Indexed keywords


EID: 57149139126     PISSN: 14637154     EISSN: None     Source Type: Journal    
DOI: 10.1108/14637150810916026     Document Type: Article
Times cited : (24)

References (16)
  • 2
    • 38249010605 scopus 로고
    • Critical issues in information systems management: An international perspective
    • Badri, M. Critical issues in information systems management: an international perspective International Journal of Information Management 12 1992 179-91
    • (1992) International Journal of Information Management , vol.12 , pp. 179-91
    • Badri, M.1
  • 3
    • 0010157831 scopus 로고
    • If information system outsourcing is the solution, what is the problem?
    • Benko, C. If information system outsourcing is the solution, what is the problem? Journal of Systems Management 1992 32-5
    • (1992) Journal of Systems Management , pp. 32-5
    • Benko, C.1
  • 5
    • 0011420610 scopus 로고
    • Information systems outsourcing by large american industrial firms: Choices and impact
    • Collins, J., Millen, R. Information systems outsourcing by large american industrial firms: choices and impact Information Resources Management Journal 8 1 1995 5-13
    • (1995) Information Resources Management Journal , vol.8 , Issue.1 , pp. 5-13
    • Collins, J.1    Millen, R.2
  • 7
    • 0642264602 scopus 로고
    • A security framework for information systems outsourcing
    • Fink, D. A security framework for information systems outsourcing Information Management & Computer Security 2 4 1994 3-8
    • (1994) Information Management & Computer Security , vol.2 , Issue.4 , pp. 3-8
    • Fink, D.1
  • 9
    • 0010196376 scopus 로고
    • A descriptive study on the outsourcing of information systems functions
    • Grover, V., Cheon, M.J., Teng, T.C. A descriptive study on the outsourcing of information systems functions Information & Management 27 1 1994 33-44
    • (1994) Information & Management , vol.27 , Issue.1 , pp. 33-44
    • Grover, V.1    Cheon, M.J.2    Teng, T.C.3
  • 10
    • 0002439194 scopus 로고
    • Implementing information systems outsourcing: Key issues and experiences of an early adopter
    • Lacity, M.C., Hirschheim, R. Implementing information systems outsourcing: key issues and experiences of an early adopter Journal of General Management 19 1 1993 17-31
    • (1993) Journal of General Management , vol.19 , Issue.1 , pp. 17-31
    • Lacity, M.C.1    Hirschheim, R.2
  • 11
    • 57149137151 scopus 로고
    • Information Systems Department, City University of Hong Kong Hong Kong Working Paper No. 95/05
    • Lee, M. IT outsourcing contracts: practical issues for management Information Systems Department, City University of Hong Kong Hong Kong 1995 Working Paper No. 95/05
    • (1995) IT Outsourcing Contracts: Practical Issues for Management
    • Lee, M.1
  • 13
    • 0042145680 scopus 로고
    • Outsourcing information systems: A strategic partnership with risks
    • Martinsons, M.G. Outsourcing information systems: a strategic partnership with risks Long Range Planning 26 3 1993 18-25
    • (1993) Long Range Planning , vol.26 , Issue.3 , pp. 18-25
    • Martinsons, M.G.1
  • 14
    • 0041089365 scopus 로고
    • A sensible approach to outsourcing
    • Meyer, N.D. A sensible approach to outsourcing Information Systems Management 11 4 1994 23-7
    • (1994) Information Systems Management , vol.11 , Issue.4 , pp. 23-7
    • Meyer, N.D.1
  • 16
    • 0012597186 scopus 로고    scopus 로고
    • Risk mitigation in IT outsourcing strategy revisited: Longitudinal case, research at LISA
    • Willcocks, L., Lacity, M., Kern, T. Risk mitigation in IT outsourcing strategy revisited: longitudinal case, research at LISA Journal of Strategic Information Systems 1999 285-314
    • (1999) Journal of Strategic Information Systems , pp. 285-314
    • Willcocks, L.1    Lacity, M.2    Kern, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.