期刊文献+

企业信息安全外包决策过程分析研究

Analysis and Research on the Decision Process of Enterprise Information Security Outsourcing
下载PDF
导出
摘要 本文探讨了企业在信息安全外包决策过程中所面临的复杂性和挑战,旨在为企业提供实用的指导和建议。首先,分析了信息安全外包的风险与挑战,如数据泄露、服务中断和第三方风险。然后,从技术、经济、法律与合规、以及道德风险四个维度详细阐述了影响外包决策的因素。通过系统化的决策流程,包括信息收集与评估、需求明确与目标设定、合作伙伴选择、合同制定与签署,以及实施与监控,企业可以有效管理外包项目,提升信息安全水平并优化成本效益。本文为企业在复杂的决策环境中做出明智选择提供了理论基础和实践指导。This article explores the complexity and challenges faced by enterprises in the decision-making process of information security outsourcing, aiming to provide practical guidance and suggestions for enterprises. Firstly, the risks and challenges of information security outsourcing were analyzed, such as data leakage, service interruption, and third-party risks. Then, the factors that affect outsourcing decisions were elaborated in detail from four dimensions: technology, economy, law and compliance, and moral hazard. Through a systematic decision-making process, including information collection and evaluation, requirement clarification and goal setting, partner selection, contract formulation and signing, as well as implementation and monitoring, enterprises can effectively manage outsourcing projects, improve information security levels, and optimize cost-effectiveness. This article provides a theoretical basis and practical guidance for enterprises to make wise choices in complex decision-making environments.
作者 张建龙
出处 《电子商务评论》 2024年第4期331-337,共7页 E-Commerce Letters
  • 相关文献

参考文献8

二级参考文献76

  • 1韩文龙,陈航.数字化的新生产要素与收入分配[J].财经科学,2021(3):56-68. 被引量:26
  • 2吕俊杰,邱菀华,王元卓.基于相互依赖性的信息安全投资博弈[J].中国管理科学,2006,14(3):7-12. 被引量:14
  • 3BISHOP M.计算机安全学[M].王立斌,黄征,等译.北京:电子工业出版社,2005.
  • 4Schwartz M J. More firms outsourcing security to MSSPs [EB/OL]. (2010) [2013-08-09]. http://www, informa- tionweek, com/security/management/more-firms-outsourc- ing-security-to-mssps/225700537.
  • 5Gordon L A, Loeb M P. The economics of information security investment[ J]. ACM Transactions on Information and System Security, 2002, 5(4) :438 -457.
  • 6Huang C D, Hu Q, Behara R S. An economic analysis of the optimal information security investment in the case of a risk-averse firm[ J]. International Journal of Production Economics, 2008, 114(2): 793-804.
  • 7Willcocks L P, Lacity M C, Kern T. Risk mitigation in IT outsourcing strategy revisited: longitudinal case re- search at LISA [ J]. The Journal of Strategic Information Systems, 1999, 8(3): 285-314.
  • 8Lee Jae-Nam, Miranda S M, Kim Yong-Mi. IT outsourc- ing strategies: universalistic, contingency, and configura- tional explanations of success[ J]. Information Systems Re- search, 2004, 15(2) : 110- 131.
  • 9Fenn C, Shooter R, Allan K. IT security outsourcing: how safe is your IT security?[J]. Computer Law & Secu- rity Review, 2002, 18(2): 109- 111.
  • 10Rowe B R. Will outsourcing IT security lead to a higher social level of security?[ C]//Workshop on the Economics of Information Security (WEIS). Pittsburgh: Carnegie Mellon University, 2007:1 - 37.

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部