Information security in IT global sourcing models
Małgorzata Sobińska, Kazimierz Perechuda
DOI: http://dx.doi.org/10.15439/2014F44
Citation: Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 2, pages 1441–1447 (2014)
Abstract. In the dynamic environment, organizations are required to build their competitive advantage not only on own resources, but also on resources commissioned from external providers, accessed through various forms of sourcing, including the sourcing of IT services. This paper presents some of the aspects of information security, in the context of the modern implementation of new IT sourcing methods. IT sourcing solutions are presented, as employed by modern companies, together with potential benefits offered. The main focus is put on the determination of the most important risks involved in information sharing in IT sourcing relations, as well as minimization and reduction of such risks, with particular attention to various cloud computing services on offer.