@article{ART001641513},
author={Jiyeon Kim and Kim,Hyung Jong},
title={Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise},
journal={Journal of Knowledge Information Technology and Systems},
issn={1975-7700},
year={2012},
volume={7},
number={1},
pages={167-173}
TY - JOUR
AU - Jiyeon Kim
AU - Kim,Hyung Jong
TI - Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise
JO - Journal of Knowledge Information Technology and Systems
PY - 2012
VL - 7
IS - 1
PB - Korea Knowledge Information Technology Society
SP - 167
EP - 173
SN - 1975-7700
AB - As many enterprises implement an information system to manage their business, IT outsourcing that operates and manages the system is increasing. Information systems can integrate all business resources and manage business processes, which enables the outsourced employees to obtain critical information about enterprise business. Actually, a large portion of security incidents regarding information leakage of enterprises are being caused by IT outsourcing. However, there is a lack of guidelines that can be used to establish security measures for the outsourcing, because domestic and foreign information security management systems (ISMS) do not specify various types of IT outsourcing even though they provide security requirements for organizations. In this paper, we classify various types of IT outsourcing and define their characteristics considering information system’s architecture, such as the status of network isolation, IT resource type, employees’ location and their access authorization.
KW - IT outsourcing;Enterprise Security;Information security management system (ISMS);Information leakage;Network isolation
DO -
UR -
ER -
Jiyeon Kim and Kim,Hyung Jong. (2012). Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise. Journal of Knowledge Information Technology and Systems, 7(1), 167-173.
Jiyeon Kim and Kim,Hyung Jong. 2012, "Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise", Journal of Knowledge Information Technology and Systems, vol.7, no.1 pp.167-173.
Jiyeon Kim, Kim,Hyung Jong "Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise" Journal of Knowledge Information Technology and Systems 7.1 pp.167-173 (2012) : 167.
Jiyeon Kim, Kim,Hyung Jong. Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise. 2012; 7(1), 167-173.
Jiyeon Kim and Kim,Hyung Jong. "Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise" Journal of Knowledge Information Technology and Systems 7, no.1 (2012) : 167-173.
Jiyeon Kim; Kim,Hyung Jong. Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise. Journal of Knowledge Information Technology and Systems, 7(1), 167-173.
Jiyeon Kim; Kim,Hyung Jong. Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise. Journal of Knowledge Information Technology and Systems. 2012; 7(1) 167-173.
Jiyeon Kim, Kim,Hyung Jong. Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise. 2012; 7(1), 167-173.
Jiyeon Kim and Kim,Hyung Jong. "Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise" Journal of Knowledge Information Technology and Systems 7, no.1 (2012) : 167-173.