期刊文献+

外包信息系统脆弱性评价模型研究 被引量:1

Vulnerability Evaluation Model for Outsourcing Information Systems
原文传递
导出
摘要 针对外包信息系统脆弱性评价问题,从技术脆弱性和管理脆弱性两个方面提出了信息系统脆弱评价指标体系。在此基础上,给出外包信息系统脆弱性评价流程,构建基于技术脆弱性和管理脆弱性的二维评价矩阵模型。最后通过一个制造企业的电子商务外包案例说明该评价模型的科学性和有效性。 Outsourcing information systems vulnerability evaluation is an important issue in the outsourcing decision process.The paper develops an assessment index system for outsourcing information systems vulnerability from the perspective of technology and management.On this basis,a framework for outsourcing information systems vulnerability evaluation is presented,and a two-dimension matrix evaluation model is developed.A case study on a manufacture factory's e-commerce outsourcing is given to illustrate the availability of the proposed model.
出处 《管理评论》 CSSCI 北大核心 2011年第6期76-80,共5页 Management Review
基金 国家自然科学基金项目(70902033) 国家自然科学基金重大项目(7089008070890083)
关键词 信息系统外包 信息安全 脆弱性 评价矩阵 IT outsourcing information security vulnerability evaluation matrix
  • 相关文献

参考文献23

  • 1Wang J. J, Yang D. L. Using a Hybrid Multicriterial Decision Aid Method for Information Systems Outsourcing[J]. Computers & Op- erations Research, 2007,34(12):3691-3700.
  • 2王建军,杨德礼.资源外包决策的系统分析模型[J].管理学报,2008,5(1):59-63. 被引量:3
  • 3Lacity M. C., Willcock L. An Empirical Investigation of Information System Sourcing Practice, Lesson from the Experience[J]. MIS Quarterly, 1998,22(3):363-408.
  • 4Chadee D., Raman R. International Outsourcing of Information Technology Services: Review and Future Directions[J]. International Marketing Review, 2009,26(4/5):411-438.
  • 5Lacity M. C., Khan S. A., Willcocks. L. P. A Review of the IT Outsourcing Literature: Insights for Practice[J]. Journal of Strategic In- formation Systems, 2009,18(3): 130-146.
  • 6冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:309
  • 7Dibbem, J., Goles, T., Hirschheim, R., B. Jayatilaka. Information Systems Outsourcing: A Survey and Analysis of the Literature[J]. Database for Advances in Information Systems, 2004,35(4):6-102.
  • 8Lacity M. C., Khan S., Yan A., Willcocks L. P. A Review of the IT Outsourcing Empirical Literature and Future Research Directions [J]. Journal of Information Technology, 2010,25(4):395-433.
  • 9Faro K. J., Lin S. k., Fung A. R. W. A Study on Information Security Management System Evaluation-assets, Threat and Vulnerabil- ity[J]. Computer Standards & Interfaces, 2004,26(6):501-513.
  • 10GB/T 20984-2007.信息安全技术信息安全风险评估规范[S].中国国家质量监督检验检疫局,2007.

二级参考文献42

共引文献371

同被引文献5

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部