80
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      To submit to the journal, click here

      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      DATA LEAKAGE IN ICT OUTSOURCING: RISKS AND COUNTERMEASURES

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Having been among the top ranks of worldwide ICT outsourcing indices for a number of years, Malaysia is familiar with the role outsourcing has played in changing today’s business landscape. However, concerns of data privacy and security, and the risks of data leakage arise during the course of outsourcing as the process may involve the exposure or handling of sensitive and confidential client and organization information to outsource providers since the company has little control over its outsourced data when it is in the provider’s possession. Empirical findings on the risks and countermeasures of data leakage are presented, in the context of outsourcing in Malaysia. From the findings, it was apparent that the inherent risks were signifi cant and that the countermeasures were positively correlated to reducing the risks. This study contributes to the limited pool of knowledge on data leakage issues in outsourcing. Organizations engaging in or contemplating outsourcing will find the results beneficial not only in understanding the data leakage concerns but also in supporting the high priority for these concerns to be addressed. However, more effort is required to enforce the countermeasures as prudent precautionary routines to reduce data leakage risks.  

          Related collections

          Author and article information

          Contributors
          Malaysia
          Malaysia
          Malaysia
          Journal
          Journal of Information and Communication Technology
          UUM Press
          March 24 2010
          : 9
          : 87-109
          Affiliations
          [1 ]Faculty of Computer & Mathematical Sciences Universiti Teknologi MARA
          Article
          10.32890/jict.9.2010.8101
          fc0fa1dd-c1ca-4bde-8d83-e97b69966eb9

          All content is freely available without charge to users or their institutions. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles in this journal without asking prior permission of the publisher or the author. Articles published in the journal are distributed under a http://creativecommons.org/licenses/by/4.0/.

          History

          Communication networks,Applied computer science,Computer science,Information systems & theory,Networking & Internet architecture,Artificial intelligence

          Comments

          Comment on this article