Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 2

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems

Information security in IT global sourcing models

,

DOI: http://dx.doi.org/10.15439/2014F44

Citation: Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 2, pages 14411447 ()

Full text

Abstract. In the dynamic environment, organizations are required to build their competitive advantage not only on own resources, but also on resources commissioned from external providers, accessed through various forms of sourcing, including the sourcing of IT services. This paper presents some of the aspects of information security, in the context of the modern implementation of new IT sourcing methods. IT sourcing solutions are presented, as employed by modern companies, together with potential benefits offered. The main focus is put on the determination of the most important risks involved in information sharing in IT sourcing relations, as well as minimization and reduction of such risks, with particular attention to various cloud computing services on offer.