Information Technology Offshore Outsourcing Security Risks and Safeguards

2010 ◽  
Vol 6 (3) ◽  
pp. 29-46 ◽  
Author(s):  
Wei June ◽  
O’Connell Jason ◽  
Loho-Noya Meiga
2012 ◽  
Vol 25 (4) ◽  
pp. 46-64 ◽  
Author(s):  
Soni Agrawal ◽  
Kishor Goswami ◽  
Bani Chatterjee

Firms from developed countries are increasingly offshore outsourcing services to developing countries to have cost as well competitive advantages. Although this is a growing practice, there has been limited empirical attention in understanding the outsourcing phenomenon, particularly from the perspective of service provider firms that execute important business processes for their overseas clients. Despite growing trends to outsource, only a few service provider firms report success. This puts the service provider firms under increasing pressure to add value and improve quality of relationship. They have to depend not only on tangible factors but some intangible factors also play an important role in their performance. In this paper, the authors try to find out factors that influence performance of service provider firms. Multiple regressions using four indicators of firm performance are carried out to see the influence of certain factors on information technology enabled service (ITES) firms’ performance.


Author(s):  
Loreen Marie Powell

The advancements of technology have altered the way many small businesses operate in the United States of America (USA) (Butcher-Powell, 2006). Small businesses have been forced to embrace technology or lose valuable employees and business. As such, many small businesses have merged to wireless networks and adopted various forms of telework. Today, it is estimated that more than 60% of the workforce are teleworkers (Butcher-Powell, 2006; DecisionOne, 2002). While moving to a remote workforce is good for small businesses, it also places a substantial amount of security risks upon the small business. Butcher-Powell (2006) documented some of the security risks associated with corporations employing a remote workforce, indicating that teleworker’s lack of information systems and security training can compromise the corporation’s network. The study investigates one particular method for aiding teleworker’s: informal information technology communities of practice in cyberspace. One hundred and forty four teleworker’s were surveyed on what sort of IT-related activities they devote time to, how much problem-solving they attempt via technology discussion groups with respect to those activities, and their perceived community and organizational benefits to participating in such discussion groups. The study found significant differences in perceived value of technology discussion groups among teleworkers.


Author(s):  
Smita Gupta ◽  
Narendra S. Chaudhari

Offshore outsourcing is a term covering a range of information technology (IT) and business services delivered to companies in developed countries by IT personnel based in developing countries. The significant cost savings achieved by the offshore model is the prime factor in its growing acceptance and use. IT software and service outsourcing is becoming a new reality for employers, employees, government and academicians. The widespread use of Internet, standardization of software development methodologies, efficient IT project management techniques, low cost of telecommunications, have provided the necessary thrust for global production of software and services. In this chapter, we analyze the impact of today’s offshore outsourcing movement to the United States economy, education, jobs, wages, and social issues. We suggest that offshoring is a viable economic model. It leads to improved productivity, lower inflation and eventually growth in jobs and wages. The U.S. will also see significant numbers of “in-sourced” jobs because of subsidiaries of foreign based companies. Future job growth in different areas of business and skills, require young students and present IT workforce to acquire them with education and training. Federal Reserve chairman Alan Greenspan has also expressed the need to produce highly skilled workers. The loss of jobs of IT workers is the difficult aspect of offshoring. Laid-off workers should be provided assistance to find a new comparable job, both by the U.S. government and companies. In this chapter, we make some recommendations to reduce, minimize and overcome the hardships caused by the IT outsourcing.


2020 ◽  
Vol 8 (6) ◽  
pp. 3987-3991

The Information Technology has evolved and we have reached at an era of Internet of Things (IoT). According to International Telecommunication Union’s Global Standards Initiative (GSI), it is the network of all kinds of ‘things’ embedded with electronics, sensors, actuators, software etc. Things connected in open Internet poses high security risks. Majority of these devices use Message Queuing Telemetry Transport (MQTT) protocol for exchanging information. Most of the devices with limited storage and computing power are connected using MQTT. Since the protocol doesn't provide any mechanism for encryption, the security aspect of the protocol is really weak. This paper describes the need for empowering security in MQTT. In this research work, we benchmark different cryptographic algorithms and propose the best possible algorithm to enable higher level of security in MQTT. This work further demonstrates how to use the proposed algorithm to enable lightweight key exchange mechanism among MQTT devices.


Pervasive computing evolved tremendously as an exciting new paradigm to provide data collection, computing, and communication services all the time and everywhere. It has introduced a new world of computing and became an integral part of many fields and application domains. It allows users to interact with wired and wireless networks that support any information technology. In spite of many advantages associated with pervasive computing, communication services have some security risks. For sensitive and confidential data there should be some security mechanisms. In this paper, we present privacy issues and challenges that are preventing people from adopting the pervasive computing environment and we give a survey on the solutions that have been carried to minimize risks


Innovar ◽  
2018 ◽  
Vol 28 (68) ◽  
pp. 105-116
Author(s):  
Elsa Nieves-Rodriguez ◽  
Lorena A. Palacios-Chacon ◽  
Myra Mabel Pérez Rivera ◽  
Victor Quiñones-Cintrón

Offshore outsourcing by organizations has been gaining momentum, powered by advances in information technology and costs differentials. A review of the literature on the subject, though, shows that those scholars who have focused on offshore outsourcing have centered their attention on the activities of multinational enterprises (MNEs) in the manufacturing and services sectors, leaving behind small and medium enterprises (SMEs). Through a number of propositions, this paper suggests that SMEs could also benefit from offshore outsourcing given their particular characteristics and needs. The paper also discusses the similarities and differences in the motivations that SMEs might have in subcontracting their activities outside their boundaries in comparison to MNEs. Knowing this information is important for foreign suppliers in order to adapt and expand their offerings to the needs of these particular firms.


Author(s):  
Karl Knapp ◽  
Sushil K. Sharma ◽  
Kevin King

Offshore information technology (IT) outsourcing has been becoming mainstream alternative to inhouse operations. While offshore development is a relatively new trend in IT, the concept of outsourcing manufacturing and service operations has been going on for more than 50 years. Many Asian countries are driving their economic success through taking offshore projects from developed countries. These countries have advantages of low-cost and available labor force. Various studies conducted over the last 10 years have shown that outsourcing allows firms to reduce high overhead costs, improve productivity, contribute flexibility, and thus improve overall performance of the firm. However, offshore IT outsourcing brings new challenges and risks. The skeptics believe that outsourcing may weaken the local business competitiveness of the region, investors’ confidence in investing in local businesses, and may create a spiral effect on economic indicators such as: unemployment, enrollment in schools, living styles, housing, and construction, and so forth`. This study investigates the socio-economic impacts of offshore IT outsourcing in the United States using a system dynamics model.


Author(s):  
M. J. Warren

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.


2021 ◽  
Vol 22 (3) ◽  
pp. 133-141
Author(s):  
Katarzyna Kucia

Risk management is one of the most important areas in modern business management. Risk is an integral part of the functioning of all economic entities, including enterprises. At a time of intense development of information technology, cybersecurity can be considered an important determinant of risk, which has a significant impact on all activities undertaken by the company. In the COVID-19 emergency, most organizations were forced to move some areas of their operations into cyberspace, increasing their exposure to cybersecurity risks. The purpose of this article is to identify methods and techniques to protect against the negative consequences of cyber security risks in Polish companies in the era of COVID-19 epidemic threat.


Sign in / Sign up

Export Citation Format

Share Document