2007
DOI: 10.4102/sajbm.v38i4.592
|View full text |Cite
|
Sign up to set email alerts
|

Guidelines for identifying risk vulnerabilities associated with ICT sourcing

Abstract: As organizations broaden their organizational boundaries with sourcing practices, it is imperative to identify risk vulnerabilities from a wider perspective than before. Specifically, organizations that make substantial use of ICT suppliers need to understand the risk vulnerabilities associated with ICT sourcing partnerships. Unfortunately, due to vulnerabilities being addressed from different levels of erudition, an inclusive list of risk vulnerabilities, associated with ICT suppliers, does not exist within t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Additionally, their study shows that application service providers and co-sourcing are the most common form of ICT outsourcing in South Africa. Furthermore, Cachia and Kruger (2007) identified the vulnerabilities and risks associated with ICT sourcing in South Africa.…”
Section: Africa As a Source Locationmentioning
confidence: 99%
“…Additionally, their study shows that application service providers and co-sourcing are the most common form of ICT outsourcing in South Africa. Furthermore, Cachia and Kruger (2007) identified the vulnerabilities and risks associated with ICT sourcing in South Africa.…”
Section: Africa As a Source Locationmentioning
confidence: 99%