2012 IEEE Ninth International Conference on Services Computing 2012
DOI: 10.1109/scc.2012.53
|View full text |Cite
|
Sign up to set email alerts
|

Accelerating the Deployment of Security Service Infrastructure with Collective Intelligence and Analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…IT outsourcing has already been popular for decades (Hätönen and Eriksson, 2009), but recently new forms of outsourcing arrangements such as selective outsourcing (Cullen et al, 2005) and new procurement models such as cloud computing started to attract attention (Vouk, 2008). Such developments have led to complex IT outsourcing arrangements (Vukovic et al, 2012) which typically are highly dynamic and involve not only multiple suppliers and customers (Gallivan and Oh, 1999) but also auditing organizations (Sinclair et al, 2011). However, the promise of reduced costs and increased flexibility comes with additional challenges related to distributed and difficult to manage IT landscapes.…”
Section: Auditing Service Providers 287 Backgroundmentioning
confidence: 99%
“…IT outsourcing has already been popular for decades (Hätönen and Eriksson, 2009), but recently new forms of outsourcing arrangements such as selective outsourcing (Cullen et al, 2005) and new procurement models such as cloud computing started to attract attention (Vouk, 2008). Such developments have led to complex IT outsourcing arrangements (Vukovic et al, 2012) which typically are highly dynamic and involve not only multiple suppliers and customers (Gallivan and Oh, 1999) but also auditing organizations (Sinclair et al, 2011). However, the promise of reduced costs and increased flexibility comes with additional challenges related to distributed and difficult to manage IT landscapes.…”
Section: Auditing Service Providers 287 Backgroundmentioning
confidence: 99%
“…To continuously improve compliance posture, adhering to a variety of regulations, enterprises require accurate and in-depth insights into employees' existing and required system access rights [12]. To generate comprehensive audit trails enterprises rely on detailed knowledge about how employees access existing systems.…”
Section: People Insights -Compliancementioning
confidence: 99%