메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Risk of insider threats in information technology outsourcing: Can deceptive techniques be applied?

Author keywords

Honeypots; IDS; Information technology outsourcing; IT security; Risk

Indexed keywords

BUSINESS DECISIONS; HONEYPOTS; IDS; INFORMATION TECHNOLOGY OUTSOURCING; INSIDER THREATS; IT OUTSOURCINGS; IT SECURITY; LITTLE RESEARCHES; OUTSOURCE; RISK FACTORS; SECURITY RISKS; SECURITY THREATS;

EID: 66149159220     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 1
    • 71549157959 scopus 로고
    • Determinants of Information Technology Outsourcing: A cross-sectional Analysis
    • L. Loh and N. Venkatraman, "Determinants of Information Technology Outsourcing: A cross-sectional Analysis", Journal of Management Information Systems 9(1), 1992
    • (1992) Journal of Management Information Systems , vol.9 , Issue.1
    • Loh, L.1    Venkatraman, N.2
  • 2
    • 62349104124 scopus 로고    scopus 로고
    • Why do some firms outsource IT more aggressively than others? The effects of organizational characteristics on IT Outsourcing decisions
    • Wonsock Oh, "Why do some firms outsource IT more aggressively than others? The effects of organizational characteristics on IT Outsourcing decisions", Proceedings of the 38th Hawaii Conference on system sciences, 2005
    • (2005) Proceedings of the 38th Hawaii Conference on system sciences
    • Wonsock, O.1
  • 6
    • 0034966257 scopus 로고    scopus 로고
    • B. A. Aubert, M. Patry, S. Rivard and H. Smith, H, IT Outsourcing Risk Management at British Petroleum, Proceedings of the 34th Hawaii International Conference on System Sciences HICSS, Jan 5-8, 2001
    • B. A. Aubert, M. Patry, S. Rivard and H. Smith, H, "IT Outsourcing Risk Management at British Petroleum", Proceedings of the 34th Hawaii International Conference on System Sciences HICSS, Jan 5-8, 2001
  • 7
    • 0003113895 scopus 로고    scopus 로고
    • The Risks of Outsourcing IT
    • Spring
    • M. J Earl, "The Risks of Outsourcing IT", Sloan Management Review, 37, 3, Spring 1996
    • (1996) Sloan Management Review , vol.37 , pp. 3
    • Earl, M.J.1
  • 8
    • 0012597186 scopus 로고    scopus 로고
    • Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA
    • L. Willcocks, M. Lacity, T. Kern, "Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA", Journal of Strategic Information Systems, 8, 1999
    • (1999) Journal of Strategic Information Systems , vol.8
    • Willcocks, L.1    Lacity, M.2    Kern, T.3
  • 9
    • 0042484572 scopus 로고    scopus 로고
    • CSI/FBI computer crime and security survey
    • R. Power, 2002 CSI/FBI computer crime and security survey. Computer Security Issues & Trends 8, 1 (2002)
    • (2002) Computer Security Issues & Trends , vol.8 , pp. 1
    • Power, R.1
  • 13
    • 62349138792 scopus 로고    scopus 로고
    • The Honeynet Project: Trapping the Hackers
    • March/April
    • L. Spitzner, "The Honeynet Project: Trapping the Hackers," IEEE Security & Privacy, March/April 2004
    • (2004) IEEE Security & Privacy
    • Spitzner, L.1
  • 15
    • 62349102743 scopus 로고    scopus 로고
    • Cybersecurity Considerations for Information Systems
    • 2nd. Edition, ed. D. Garson, CRC Press
    • C. E. Irvine, "Cybersecurity Considerations for Information Systems", Handbook of Public Information Systems, 2nd. Edition, ed. D. Garson, CRC Press, 2004
    • (2004) Handbook of Public Information Systems
    • Irvine, C.E.1
  • 17
    • 17444417128 scopus 로고    scopus 로고
    • Averting Security Missteps in Outsourcing
    • Michael Lesk, "Averting Security Missteps in Outsourcing", IEEE Security and Privacy, 2005
    • (2005) IEEE Security and Privacy
    • Lesk, M.1
  • 19
    • 62349085853 scopus 로고    scopus 로고
    • Co-operators Life CEO Apologizes for Theft of Sensitive Customer Data,
    • 30 Jan
    • CBC Online News, "Co-operators Life CEO Apologizes for Theft of Sensitive Customer Data," 30 Jan. 2003; www.cbc.ca/stories/2003/01/30/ cooperators030130
    • (2003) CBC Online News
  • 20
    • 17444411077 scopus 로고    scopus 로고
    • Computer File with Vital ID Data Goes Missing
    • CTV.ca, 31 Jan
    • A. Mullholland, "Computer File with Vital ID Data Goes Missing," CTV.ca, 31 Jan. 2003; www.ctv.ca/servlet/ArticleNews/story/ CTVNews/1043943775310-127
    • (2003)
    • Mullholland, A.1
  • 21
    • 62349118729 scopus 로고    scopus 로고
    • Anderson. Computer security threat monitoring and surveillance Technical report, James P. Anderson Co., Fort Washington, PA, April 1980
    • Anderson. "Computer security threat monitoring and surveillance" Technical report, James P. Anderson Co., Fort Washington, PA, April 1980
  • 22
    • 0003894350 scopus 로고
    • Tcpdump
    • Available via anonymous FTP from
    • V. Jacobson, C. Leres and S. McCanne, "Tcpdump", Available via anonymous FTP from ftp.ee.lbl.gov. 1989
    • (1989)
    • Jacobson, V.1    Leres, C.2    McCanne, S.3
  • 23
    • 0034270431 scopus 로고    scopus 로고
    • Defending Yourself: The Role of Intrusion Detection Systems
    • John McHugh, Alan Christie, and Julia Allen, "Defending Yourself: The Role of Intrusion Detection Systems", IEEE Software, 2000
    • (2000) IEEE Software
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 24
    • 62349118429 scopus 로고    scopus 로고
    • R. A. Kemmerer and G. Vigna,Intrusion detection: a brief history and overview, IEEE Security & Privacy, URL http://computer.org/ computer/sp/articles/kem/, 2002
    • R. A. Kemmerer and G. Vigna,"Intrusion detection: a brief history and overview", IEEE Security & Privacy, URL http://computer.org/ computer/sp/articles/kem/, 2002


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.