본문 바로가기
  • Home

Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise

  • Journal of Knowledge Information Technology and Systems
  • Abbr : JKITS
  • 2012, 7(1), pp.167-173
  • Publisher : Korea Knowledge Information Technology Society
  • Research Area : Interdisciplinary Studies > Interdisciplinary Research
  • Published : February 29, 2012

Jiyeon Kim 1 Kim,Hyung Jong 1

1서울여자대학교

Accredited

ABSTRACT

As many enterprises implement an information system to manage their business, IT outsourcing that operates and manages the system is increasing. Information systems can integrate all business resources and manage business processes, which enables the outsourced employees to obtain critical information about enterprise business. Actually, a large portion of security incidents regarding information leakage of enterprises are being caused by IT outsourcing. However, there is a lack of guidelines that can be used to establish security measures for the outsourcing, because domestic and foreign information security management systems (ISMS) do not specify various types of IT outsourcing even though they provide security requirements for organizations. In this paper, we classify various types of IT outsourcing and define their characteristics considering information system’s architecture, such as the status of network isolation, IT resource type, employees’ location and their access authorization.

Citation status

* References for papers published after 2023 are currently being built.