Factors Influencing the Organizational Decision to Outsource IT
Security: A Review and Research Agenda
- URL: http://arxiv.org/abs/2208.12875v1
- Date: Fri, 26 Aug 2022 21:57:23 GMT
- Title: Factors Influencing the Organizational Decision to Outsource IT
Security: A Review and Research Agenda
- Authors: Antra Arshad, Atif Ahmad, Sean Maynard
- Abstract summary: Little is known about the factors influencing organizational decisions in outsourcing such a critical function.
Our review of the research and practice literature identified several managerial factors and legal factors.
We present a research agenda consisting of fifteen questions to address five key gaps relating to knowledge of IT security outsourcing.
- Score: 0.3093890460224435
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: IT security outsourcing is the process of contracting a third-party security
service provider to perform, the full or partial IT security functions of an
organization. Little is known about the factors influencing organizational
decisions in outsourcing such a critical function. Our review of the research
and practice literature identified several managerial factors and legal
factors. We found research in IT security outsourcing to be immature and the
focus areas not addressing the critical issues facing industry practice. We
therefore present a research agenda consisting of fifteen questions to address
five key gaps relating to knowledge of IT security outsourcing, specifically
effectiveness of the outcome, lived experience of the practice, the temporal
dimension, multi-stakeholder perspectives, and the impact on IT security
practices, particularly agility in incident response.
Related papers
- WESE: Weak Exploration to Strong Exploitation for LLM Agents [95.6720931773781]
This paper proposes a novel approach, Weak Exploration to Strong Exploitation (WESE) to enhance LLM agents in solving open-world interactive tasks.
WESE involves decoupling the exploration and exploitation process, employing a cost-effective weak agent to perform exploration tasks for global knowledge.
A knowledge graph-based strategy is then introduced to store the acquired knowledge and extract task-relevant knowledge, enhancing the stronger agent in success rate and efficiency for the exploitation task.
arXiv Detail & Related papers (2024-04-11T03:31:54Z) - Investigating the Impact of Project Risks on Employee Turnover Intentions in the IT Industry of Pakistan [0.0]
This study investigates the influence of project risks in the IT industry on job satisfaction and turnover intentions.
It examines the role of both external and internal social links in shaping perceptions of job satisfaction.
arXiv Detail & Related papers (2024-03-09T11:06:49Z) - An Actionable Framework for Understanding and Improving Talent Retention
as a Competitive Advantage in IT Organizations [44.342141516382284]
This work presents an actionable framework for Talent Retention (TR) used in IT organizations.
Our framework encompasses a set of factors, contextual characteristics, barriers, strategies, and coping mechanisms.
Our findings indicated that software engineers can be differentiated from other professional groups.
arXiv Detail & Related papers (2024-02-02T17:08:14Z) - Service Level Agreements and Security SLA: A Comprehensive Survey [51.000851088730684]
This survey paper identifies state of the art covering concepts, approaches, and open problems of SLA management.
It contributes by carrying out a comprehensive review and covering the gap between the analyses proposed in existing surveys and the most recent literature on this topic.
It proposes a novel classification criterium to organize the analysis based on SLA life cycle phases.
arXiv Detail & Related papers (2024-01-31T12:33:41Z) - Trust-based Approaches Towards Enhancing IoT Security: A Systematic Literature Review [3.0969632359049473]
This research paper presents a systematic literature review on the Trust-based cybersecurity security approaches for IoT.
We highlighted the common trust-based mitigation techniques in existence for dealing with these threats.
Several open issues were highlighted, and future research directions presented.
arXiv Detail & Related papers (2023-11-20T12:21:35Z) - Pitfalls in Effective Knowledge Management: Insights from an
International Information Technology Organization [8.847473225998908]
This study aims to identify hindering factors that prevent individuals from effectively sharing and managing knowledge.
Several hindering factors were identified, grouped into personal social topics, organizational social topics, technical topics, environmental topics, and interrelated social and technical topics.
The presented recommendations for mitigating these hindering factors are focused on improving employees' actions, such as offering training and guidelines to follow.
arXiv Detail & Related papers (2023-04-16T09:45:08Z) - AI for IT Operations (AIOps) on Cloud Platforms: Reviews, Opportunities
and Challenges [60.56413461109281]
Artificial Intelligence for IT operations (AIOps) aims to combine the power of AI with the big data generated by IT Operations processes.
We discuss in depth the key types of data emitted by IT Operations activities, the scale and challenges in analyzing them, and where they can be helpful.
We categorize the key AIOps tasks as - incident detection, failure prediction, root cause analysis and automated actions.
arXiv Detail & Related papers (2023-04-10T15:38:12Z) - Getting Users Smart Quick about Security: Results from 90 Minutes of
Using a Persuasive Toolkit for Facilitating Information Security Problem
Solving by Non-Professionals [2.4923006485141284]
A balanced level of user engagement in security is difficult to achieve due to difference of priorities between the business perspective and the security perspective.
We have developed a persuasive software toolkit to engage users in structured discussions about security vulnerabilities in their company.
In the research reported here we examine how non-professionals perceived security problems through a short-term use of the toolkit.
arXiv Detail & Related papers (2022-09-06T11:37:21Z) - Artificial Intelligence for IT Operations (AIOPS) Workshop White Paper [50.25428141435537]
Artificial Intelligence for IT Operations (AIOps) is an emerging interdisciplinary field arising in the intersection between machine learning, big data, streaming analytics, and the management of IT operations.
Main aim of the AIOPS workshop is to bring together researchers from both academia and industry to present their experiences, results, and work in progress in this field.
arXiv Detail & Related papers (2021-01-15T10:43:10Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.