Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
The rapid growth of computer networks has led to proliferation of information security standards. To meet these security standards, some organizations outsource security protection to a managed security service provider (MSSP). However, this may give rise to system interdependency risks. This paper...
| Main Authors: | Hui, K., Hui, Wendy, Yue, W. |
|---|---|
| Format: | Journal Article |
| Published: |
ME Sharpe, Inc.
2013
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/31445 |
Similar Items
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
Uncovering Assumptions in Information Security
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
Security and quality issues in IT projects
by: El Desouki, Hassan, et al.
Published: (2010)
by: El Desouki, Hassan, et al.
Published: (2010)
Jordan's National Security Under King Hussein
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
The performance of New Zealand initial public offerings (IPOs): 1995-2000 / Arizza Sapuan
by: Sapuan, Arizza
Published: (2004)
by: Sapuan, Arizza
Published: (2004)
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009)
by: Armstrong, Helen, et al.
Published: (2009)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
A study on determinants of bond yield in Malaysia / Nurul Jannah Arifin and Nurul Atikah Yaacob
by: Arifin, Nurul Jannah, et al.
Published: (2018)
by: Arifin, Nurul Jannah, et al.
Published: (2018)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Human security application: the study of media safety in humanitarian missions / Siti Nurbaini Khairi and Noor Nirwandy Mat Noordin
by: Khairi, Siti Nurbaini, et al.
Published: (2014)
by: Khairi, Siti Nurbaini, et al.
Published: (2014)
Effects of population on food security, health care and education expenditure in China and India
by: Nordin, Nurhaiza
Published: (2016)
by: Nordin, Nurhaiza
Published: (2016)
An approach to visualising information security knowledge
by: Armstrong, Colin
Published: (2011)
by: Armstrong, Colin
Published: (2011)
Social sukuk: a new mechanism to fund social services / Saadiah Mohamad … [et al.]
by: Mohamad, Saadiah, et al.
Published: (2017)
by: Mohamad, Saadiah, et al.
Published: (2017)
Forecast Errors and the Effect of Underwriter Reputation and Auditor Influence During Listing on IPOs
by: Mahussin, Norlida
Published: (2003)
by: Mahussin, Norlida
Published: (2003)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Australia's 'New Security' Challenges
by: Hubbard, Christopher
Published: (2004)
by: Hubbard, Christopher
Published: (2004)
Pricing Asset-backed Securities: A Revised Model
by: Bradka, Lukas
Published: (2008)
by: Bradka, Lukas
Published: (2008)
The Wealth Effect of the Securities Commission and the Central Bank Announcement
by: Yu, Kee Su
Published: (1997)
by: Yu, Kee Su
Published: (1997)
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
US-Pakistan cooperation and Pakistan's security post 9/11
by: Tamana, Aazar
Published: (2010)
by: Tamana, Aazar
Published: (2010)
A Foucauldian governmentality analysis of security sector reform in Tunisia
by: Keskes, Hanen
Published: (2023)
by: Keskes, Hanen
Published: (2023)
Examining the factors influence bond market performance in Malaysia / Muhammad Syukri Mohd Jefri
by: Mohd Jefri, Muhammad Syukri
Published: (2018)
by: Mohd Jefri, Muhammad Syukri
Published: (2018)
Similar Items
-
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013) -
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018) -
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016) -
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025) -
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)