IT security outsourcing is the establishment of a contractual relationship between an organization with an outside vendor which assumes responsibility for the organisation’s security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making process leads to a substantial degree of uncertainty. This is especially so in the realm of IS security since the protection of both hardware and software systems is placed in the hands of an external provider. This paper is a fuller and more comprehensive paper of a previous paper outlining the effectiveness of the decision making process by means of a conceptual model using Soft System Methodology techniques that integrates security benefits, costs and...
As days pass and the cyber space grows, so does the number of computer crimes. The need for enterpri...
Physical security is considered an integral part of information systems security. The idea that smal...
Outsourcing the management of electronic journals has significantly reduced the autonomy academic li...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Information systems are used in overt and covert conflict and information operations target an oppon...
Information systems are used in overt and covert conflict and information operations target an oppon...
Records management practices are mandatory in many business and government operations. Records manag...
The push to secure organizational information has brought about the need to develop better metrics f...
This paper will discuss honeypots and their use and effectiveness as a security measure in an IT env...
In 1983, then-President Ronald Reagan’s National Commission on Excellence in Education released a re...
The Project used a multiscalar approach to scale up the model: through partnerships with civil soci...
Physical security is considered an integral part of information systems security. The idea that smal...
It is a well known fact that while Email is a valuable tool to any business that it has also become ...
This dissertation investigates a major change in U.S. Government research and development policy awa...
Identity and identification are linked by variable meanings and applications and are essential in ma...
As days pass and the cyber space grows, so does the number of computer crimes. The need for enterpri...
Physical security is considered an integral part of information systems security. The idea that smal...
Outsourcing the management of electronic journals has significantly reduced the autonomy academic li...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Information systems are used in overt and covert conflict and information operations target an oppon...
Information systems are used in overt and covert conflict and information operations target an oppon...
Records management practices are mandatory in many business and government operations. Records manag...
The push to secure organizational information has brought about the need to develop better metrics f...
This paper will discuss honeypots and their use and effectiveness as a security measure in an IT env...
In 1983, then-President Ronald Reagan’s National Commission on Excellence in Education released a re...
The Project used a multiscalar approach to scale up the model: through partnerships with civil soci...
Physical security is considered an integral part of information systems security. The idea that smal...
It is a well known fact that while Email is a valuable tool to any business that it has also become ...
This dissertation investigates a major change in U.S. Government research and development policy awa...
Identity and identification are linked by variable meanings and applications and are essential in ma...
As days pass and the cyber space grows, so does the number of computer crimes. The need for enterpri...
Physical security is considered an integral part of information systems security. The idea that smal...
Outsourcing the management of electronic journals has significantly reduced the autonomy academic li...