Inter-Organisational Information Sharing - Between a Rock and a Hard Place

Although inter-organisational collaboration is common, most information security (IS) research has focused on IS issues within organisations. Confidentiality, integrity of data and availability (CI ...

[1]  Selim G. Akl,et al.  Efficient enforcement of dynamic cryptographic access control policies for outsourced data , 2011, 2011 Information Security for South Africa.

[2]  D. Polkinghorne Language and meaning: Data collection in qualitative research. , 2005 .

[3]  Hui Xiong,et al.  Towards controlling virus propagation in information systems with point-to-group information sharing , 2009, Decis. Support Syst..

[4]  Janis L. Gogan,et al.  INFOSEC in a Basket, 2004-2013 , 2014, AMCIS.

[5]  John R. Williams,et al.  Interoperable internet scale security framework for RFID networks , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.

[6]  Matthew Pemble,et al.  Transferring business and support functions: the information security risks of outsourcing and off-shoring , 2004 .

[7]  Per Oscarson,et al.  Actual and Perceived Information Systems Security , 2007 .

[8]  Ponnurangam Kumaraguru,et al.  Information security practices followed in the Indian software services industry: An exploratory study , 2011, 2011 Second Worldwide Cybersecurity Summit (WCS).

[9]  Peter Berghmans,et al.  Information Security Risks in Enabling e-Government: The Impact of IT Vendors , 2011, Inf. Syst. Manag..

[10]  M. Razvi Doomun,et al.  Multi-level information system security in outsourcing domain , 2008, Bus. Process. Manag. J..

[11]  Kjell Andersson,et al.  Copper Corrosion in Nuclear Waste Disposal , 2013 .

[12]  Yuh-Min Chen,et al.  Secure resource sharing on cross-organization collaboration using a novel trust method , 2007 .

[13]  Dimitris Gritzalis,et al.  Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship , 2007, TrustBus.

[14]  C. Robertson,et al.  Stakeholder Perceptions of Offshoring and Outsourcing: The Role of Embedded Issues , 2010 .

[15]  Pierluigi Ritrovato,et al.  Dynamic security perimeters for inter-enterprise service integration , 2007, Future Gener. Comput. Syst..

[16]  Gurpreet Dhillon,et al.  Principles of information systems security - text and cases , 2006 .

[17]  日本規格協会 情報技術-セキュリティ技術-情報セキュリティ管理策の実践のための規範 : ISO/IEC 27002 = Information technology-Security techniques-Code of practice for information security controls : ISO/IEC 27002 , 2013 .

[18]  Gurpreet Dhillon,et al.  Technical opinion: Information system security management in the new millennium , 2000, CACM.

[19]  日本規格協会 情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001 , 2005 .

[20]  Gurpreet Dhillon,et al.  Organizational Transformation and Information Security Culture: A Telecom Case Study , 2014, SEC.