3,712 research outputs found

    Offshored Data Privacy: Determining the Factors and their relative Effect

    Get PDF
    For many US based companies’ offshoring, especially IT services, has become an inevitable part of business strategy. However, preserving the privacy of the sensitive information of offshored data remains as one of the major challenges and concerns. In this paper, we identify factors that affect the privacy preserving conduct of the offshore vendors and their employees towards clients’ data. We deploy a positivist case study method to examine the proposed relationships. We collected qualitative data through interviews from the project managers of client organizations as well as from the project managers of vendor organizations to test our proposed model. The result shows that the code of conduct set by the vendor organizations plays the most effective role in privacy preserving behavior of the vendors’ employees

    Outsourcing, Data Insourcing, and the Irrelevant Constitution

    Get PDF

    ENFORCING SECURITY ON CLOUD COMPUTING NETWORK: A THEORETICAL FRAME WORK

    Get PDF
    Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increasedscalability as well as providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service(PaaS), and Infrastructure-as-a-Service (IaaS). The paper highlighted various threats in cloud computing networking,and also proffered solution by discussing extensively various security measures to be enforced on the system to achievesecurity to a large extent. This paper presents a security architecture that enables a user of cloud networking to definesecurity requirements and enforces them in the cloud networking infrastructure.Keywords: Cloud Computing, Infrastructure, Abstraction, Services, Security & Framework

    Outsourcing, Data Insourcing, and the Irrelevant Constitution

    Get PDF
    Long before revelations of the National Security Agency\u27s data collection programs grabbed headlines, scholars and the press decried the burgeoning harms to privacy that metadata mining and new surveillance technologies present. Through publicly accessible social media sites, web-tracking technologies, private data mining consolidators, and its own databases, the government is just a mouse click away from a wealth of intimate personal information that was virtually inaccessible only a decade ago. At the heart of the conundrum is the government\u27s ability to source an unprecedented amount of personal data from private third parties. This trail of digital information is being insourced into government coffers with no constitutional accountability-much like governmental powers are being outsourced to private contractors without constitutional restraint. These phenomena reveal a troubling trend: the diminishment of the Constitution\u27s relevance when the government works in tandem with third parties. Outmoded Fourth Amendment doctrine offers no pathway around this problem. Nor has legislation kept apace with technological advancements to forestall abuses before they occur. Moreover, the primary theories for challenging the private exercise of public power-the private delegation and state action doctrines-rarely persuade modern courts. Rather than focusing on the privacy aspects of big data, this Article proceeds from the standpoint of the structural Constitution, and reframes existing doctrines for rendering the government constitutionally accountable for actions taken through a third party, on the theory that exclusive reliance on the political branches for the protection of individual privacy rights in the age of big data is insufficient

    Finance And Accounting Outsourcing: Three Studies Related To The Ethical And Economic Dimensions Of Accounting Outsourcing

    Get PDF
    This dissertation evaluates the economic and ethical considerations underlying the outsourcing of professional services such as finance and accounting. The dissertation is comprised of three separate, but related studies. The first study explores the adequacy of the disclosure rules recommended in the revised ethics rulings regarding disclosure of outsourcing relationships and the resulting ethical and economic repercussions for both, the AICPA members and their clients. The second study analyzes the disclosure rules recommended in the AICPA ethics rulings regarding disclosure of outsourcing relationships from an ethical standpoint. The third study adopts the perspective of the third party service provider. The third study analyzes the factors that provide a competitive advantage to leading service providers in accounting outsourcing markets in India. Taken together, these studies address issues that have not been addressed previously in accounting literature and will advance our understanding of a fast-growing phenomenon, the outsourcing of accounting services. Finance and accounting outsourcing may strongly influence the choice of future organizational form and structure thus making it important to develop an early understanding of this industry
    • …
    corecore