PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Determinants of data security of the ordering company during an outsourcing project

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Purpose: The purpose of this study is to identify and analyze the key factors that enhance data security in outsourcing processes. The research aims to provide practical recommendations for organizations seeking to mitigate risks associated with the transfer and management of sensitive information in an outsourcing context. Design/methodology/approach: The study employed a quantitative approach, utilizing a structured survey conducted in 2023 on a sample of 723 respondents. The collected data were analyzed using multiple correspondence analysis (MCA) to identify patterns and relationships between variables related to data security practices. Findings: The research highlights that developing a comprehensive data security policy, employing advanced encryption technologies, conducting regular security audits, and fostering employee awareness significantly enhance data security in outsourcing processes. The findings emphasize the interconnectedness of these factors and their collective role in minimizing security risks. Research limitations/implications: The study is limited by its reliance on a single quantitative method and a uniform sample, which may not fully capture sectoral or regional variations in outsourcing practices. Future research should explore qualitative methods and a more diverse sample to deepen the understanding of contextual factors affecting data security. Practical implications: The study provides actionable insights for organizations to improve data security through structured policies, technological advancements, and targeted training programs. It underscores the importance of collaboration with outsourcing providers to ensure adherence to high security standards. Social implications: Improved data security in outsourcing processes enhances trust between organizations, clients, and stakeholders. It contributes to broader societal benefits by safeguarding personal and sensitive information, thereby reducing the likelihood of data breaches and their associated consequences. Originality/value: This study integrates theoretical perspectives with empirical findings, offering a comprehensive understanding of data security challenges in outsourcing. The use of MCA provides a novel approach to identifying the interrelations between key determinants, delivering valuable insights for both academics and practitioners in the field.
Rocznik
Tom
Strony
159--174
Opis fizyczny
Bibliogr. 33 poz.
Twórcy
Bibliografia
  • 1. Annarelli, A., Colabianchi, S., Nonino, F., Palombi, G. (2021). The effectiveness of outsourcing cybersecurity practices: A study of the Italian context. Proceedings of the Future Technologies Conference (FTC) 2021, Vol. 3 (pp. 17-31). Springer.
  • 2. Arshad, A., Ahmad, A., Maynard, S. (2022). Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda. arXiv preprint arXiv:2208.12875. Available at: https://arxiv.org/abs/2208.12875
  • 3. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.X. (2007). Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, 598-609. https ://doi . org /10.1145/1315245.1315318
  • 4. Bertino, E. (2009). Secure Data Outsourcing. In: Encyclopedia of Database Systems (pp. 2555-2559). Springer. Available at: https://link.springer.com/referenceworkentry/ 10.1007/978-0-387-39940-9_328
  • 5. Chakrabarty, S. (2006). Making Sense of the Sourcing and Shoring Maze: Various Outsourcing and Offshoring in the 21st Century: A Socio-Economic Perspective. London: Idea Group Publishing.
  • 6. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J. (2009). Controlling data in the cloud: Outsourcing computation without outsourcing control. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 85-90. https://doi. org/10.1145/1655008.1655020
  • 7. Cullen, S., Seddon, P., Willcocks, L. (2005). Managing outsourcing: The life cycle imperative. MIS Quarterly Executive, 4(1), 1-12.
  • 8. Galvin, B. (2019). Lean Sigma Mastery Collection: 7 Books in 1: Lean Six Sigma, Lean Analytics, Lean Enterprise, Agile Project Management, Kaizen, Kahban, Scrum. Independently Published.
  • 9. Ghosh, A., Scott, J.E. (2008). Outsourcing: Data Security and Privacy Issues in India. Issues in Information Systems, 9(2), 15-24. Available at: https://iacis.org/iis/2008/S2008_888.pdf
  • 10. Gupta, S., Puranam, P., Srikanth, K. (2006). Services sourcing in the banking and financial services industries. Exploding myths and describing emerging best practices. London: London Business School and Capco Institute.
  • 11. Infinit-O Global (2022). Data Security in Outsourcing. https://resourcecenter.infinit-o.com/blog/data-security-in-outsourcing/ Available at:
  • 12. Kamara, S., Lauter, K. (2010). Cryptographic cloud storage. Financial Cryptography and Data Security, 136-149. https ://doi . org /10.1007/978-3-642-14992-4_13
  • 13. Kern, T., Willcocks, L.P., Van Heck, E. (2013). The winner's curse in IT outsourcing: Strategies for avoiding relational trauma. MIS Quarterly Executive, 12(3), 109-123.
  • 14. Li, J., Li, X., Chen, X., Lee, P.P.C., Lou, W. (2014). A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1206-1216. https ://doi . org /10.1109/TPDS.2014.2318320
  • 15. Murphy, L. (2024). The influence of IT outsourcing on organizational success and innovation. Future Business Journal, 10, Article 84.
  • 16. Nassimbeni, G., Sartor, M., Dus, D. (2012). Security risks in service offshoring and outsourcing: An FMEA-based approach. International Journal of Production Research, 50(17), 4840-4856. Available at: https://www.researchgate.net/publication/220672171_ Security_risks_in_service_offshoring_and_outsourcing
  • 17. Pandita, S., Singhal, R. (2017). The influence of employee engagement on the work-life balance of employees in the IT sector. IUP Journal of Organizational Behavior, 16(1), 38-57.
  • 18. Pearson, S., Benameur, A. (2010). Privacy, security and trust issues arising from cloud computing. IEEE Second International Conference on Cloud Computing Technology and Science, 693-702. https ://doi . org /10.1109/CloudCom.2010.66
  • 19. Porter, M.E., Heppelmann, J.E. (2014). How smart, connected products are transforming competition. Harvard Business Review, 92(11), 64-88.
  • 20. Quelin, B., Duhamel, F. (2003). Bringing together strategic outsourcing and corporate strategy: Outsourcing motives and risks. European Management Journal, 21(5), 647-661. doi:10.1016
  • 21. Qureshi, S. (2016). Creating a better world with information and communication technologies: Health equity. Information Technology for Development, No. 22(1).
  • 22. Raišienė, A.G., Bilan, S., Smalskys, V., Gečienė, J. (2019). Emerging changes in attitudes to inter-institutional collaboration: the case of organizations providing social services in communities. Administratie si Management Public, No. 33.
  • 23. Ravichandran, T. (2016). Exploring the relationships between IT competence, innovation capacity and organizational agility. Information Systems, No. 27(1).
  • 24. Ren, K., Wang, C., Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69-73. https ://doi . org /10.1109/MIC.2012.14
  • 25. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11. https://doi.org/10.1016/j.jnca.2010.07.006
  • 26. Turban, E., Outland, J., King, D., Lee, J.K., Liang, T.P., Turban, D.C. (2018). Electronic commerce 2018: a managerial and social networks perspective. Springer.
  • 27. Uhl-Bien, M., Arena, M. (2017). Complexity leadership: Enabling people and organizations for adaptability. Organizational Dynamics, 46(1), 9-20. https://doi.org/10.1016/j.orgdyn. 2016.12.001
  • 28. Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W. (2011). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362-375. https://doi.org/10.1109/TC.2011.245
  • 29. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5(2), 220232. https://doi.org/10.1109/TSC.2011.24
  • 30. Wang, H., He, D., Tang, S. (2015). Security and searchability in secret sharing-based data outsourcing. International Journal of Information Security, 14(4), 307-318. Available at: https://link.springer.com/article/10.1007/s10207-015-0277-x
  • 31. Yin, J. et al. (2020). Does it pay to align a company's competitive strategy with its industry IT strategic role? Information and Management, No. 57(8).
  • 32. Zhang, R., Liu, L. (2010). Security models and requirements for healthcare application clouds. IEEE 3rd International Conference on Cloud Computing, 268-275. https://doi.org/10.1109/CLOUD.2010.35
  • 33. Zhen, Z., Xie, Z., Dong, K. (2021). Impact of IT governance mechanisms on organizational agility and the role of top management support and IT ambidexterity. International Journal of Accounting Information Systems, No. 40.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-6cba9e14-d210-4f4b-a9ac-d8fd40a42432
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.