Outsourcing Information Security

Outsourcing Information Security
Title Outsourcing Information Security PDF eBook
Author C. Warren Axelrod
Publisher Artech House
Pages 292
Release 2004
Genre Computers
ISBN 9781580539555

Download Outsourcing Information Security Book in PDF, Epub and Kindle

This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

Managing Information Security Risks

Managing Information Security Risks
Title Managing Information Security Risks PDF eBook
Author Christopher J. Alberts
Publisher Addison-Wesley Professional
Pages 516
Release 2003
Genre Business & Economics
ISBN 9780321118868

Download Managing Information Security Risks Book in PDF, Epub and Kindle

Describing OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation), a method of evaluating information security risk, this text should be of interest to risk managers.

Information Systems Outsourcing

Information Systems Outsourcing
Title Information Systems Outsourcing PDF eBook
Author Rudy Hirschheim
Publisher Springer
Pages 481
Release 2021-06-05
Genre Business & Economics
ISBN 9783030458218

Download Information Systems Outsourcing Book in PDF, Epub and Kindle

This book highlights research that contributes to a better understanding of emerging challenges in information systems (IS) outsourcing. Important topics covered include: how to digitally innovate through IS outsourcing; how to govern outsourced digitalization projects; how to cope with complex multi-vendor and micro-services arrangements; how to manage data sourcing and data partnerships, including issues of cybersecurity; and how to cope with the increasing demands of internationalization and new sourcing models, such as crowdsourcing, cloud sourcing and robotic process automation. These issues are approached from the client’s perspective, vendor’s perspective, or both. Given its scope, the book will be of interest to all researchers and students in the fields of Information Systems, Management, and Organization, as well as corporate executives and professionals seeking a more profound analysis of the underlying factors and mechanisms of outsourcing.

Economics of Information Security and Privacy

Economics of Information Security and Privacy
Title Economics of Information Security and Privacy PDF eBook
Author Tyler Moore
Publisher Springer Science & Business Media
Pages 328
Release 2010-07-20
Genre Computers
ISBN 1441969675

Download Economics of Information Security and Privacy Book in PDF, Epub and Kindle

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.

Strategic Information Security

Strategic Information Security
Title Strategic Information Security PDF eBook
Author John Wylder
Publisher CRC Press
Pages 242
Release 2003-11-24
Genre Business & Economics
ISBN 0203497082

Download Strategic Information Security Book in PDF, Epub and Kindle

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now

Enterprise Information Security and Privacy

Enterprise Information Security and Privacy
Title Enterprise Information Security and Privacy PDF eBook
Author C. Warren Axelrod
Publisher Artech House Publishers
Pages 231
Release 2009
Genre Business & Economics
ISBN 9781596931909

Download Enterprise Information Security and Privacy Book in PDF, Epub and Kindle

Heres a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps you understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. You gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy.

A Business Guide to Information Security

A Business Guide to Information Security
Title A Business Guide to Information Security PDF eBook
Author Alan Calder
Publisher Kogan Page Publishers
Pages 198
Release 2005
Genre Business & Economics
ISBN 9780749443955

Download A Business Guide to Information Security Book in PDF, Epub and Kindle

Nontechnical, simple, and straightforward, this handbook offers valuable advice to help managers protect their companies from malicious and criminal IT activity.