Reference Hub1
Managing the Risks of Outsourcing IT Security in Supply Chain

Managing the Risks of Outsourcing IT Security in Supply Chain

Theodosios Tsiakis, Panagiotis Tsiakis
ISBN13: 9781466620087|ISBN10: 1466620080|EISBN13: 9781466620094
DOI: 10.4018/978-1-4666-2008-7.ch028
Cite Chapter Cite Chapter

MLA

Tsiakis, Theodosios, and Panagiotis Tsiakis. "Managing the Risks of Outsourcing IT Security in Supply Chain." Outsourcing Management for Supply Chain Operations and Logistics Service, edited by Dimitris Folinas, IGI Global, 2013, pp. 477-495. https://doi.org/10.4018/978-1-4666-2008-7.ch028

APA

Tsiakis, T. & Tsiakis, P. (2013). Managing the Risks of Outsourcing IT Security in Supply Chain. In D. Folinas (Ed.), Outsourcing Management for Supply Chain Operations and Logistics Service (pp. 477-495). IGI Global. https://doi.org/10.4018/978-1-4666-2008-7.ch028

Chicago

Tsiakis, Theodosios, and Panagiotis Tsiakis. "Managing the Risks of Outsourcing IT Security in Supply Chain." In Outsourcing Management for Supply Chain Operations and Logistics Service, edited by Dimitris Folinas, 477-495. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2008-7.ch028

Export Reference

Mendeley
Favorite

Abstract

Enterprises are expeditiously outsourcing the non-core business processes and functions. This is happening in order for new efficiencies to be found and costs to be reduced along with the increase of shareholder value. Enterprises in a supply chain use networks to share information assets. Information Systems and Information Technology are essential for their business operations. Organizations resort to outsourcing, in order to balance the infinite requirements with organisational assets. Supply chains that are relying upon sourced Information Systems (or/and IT) are vulnerable from Information Security (IS) specific types of risks to supply chains. These systems and their components are at increasing risk of supply chain. The process of securing all elements of IT systems (whether it is hardware, software, or services) throughout their life cycle is critical. The scope of the chapter is to identify the basic process of outsourcing Information Security functions/processes in Supply Chain and moreover to adduce the practice of it.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.