2021
DOI: 10.1007/s10515-021-00286-x
|View full text |Cite
|
Sign up to set email alerts
|

Information security implications of using NLP in IT outsourcing: a Diffusion of Innovation theory perspective

Abstract: Information technology outsourcing (ITO) is a USD multi-trillion industry. There is growing competition among ITO service providers to improve their service deliveries. Natural language processing (NLP) is a technique, which can be leveraged to gain a competitive advantage in the ITO industry. This paper explores the information security implications of using NLP in ITO. First, it explores the use of NLP to enhance information security risk management (ISRM) in ITO. Then, it delves into the information securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 48 publications
0
8
0
Order By: Relevance
“…Email is an unstructured text, and security has been studied using NLP technology for email attacks. It studied information management technology to secure competitiveness for security by applying NLP to information processing outsourcing [20]. Information security risk classification was divided, for example, attackers that cause confusion, such as falsification when exchanging documents, changing meaning by confusing synonyms, negative words, and affirmative words, changing a sentence as if it was approved by a human, making changes of the content contrary to a contract, and denying data agent access.…”
Section: Overall Structure Of Security In Natural Language Processing...mentioning
confidence: 99%
“…Email is an unstructured text, and security has been studied using NLP technology for email attacks. It studied information management technology to secure competitiveness for security by applying NLP to information processing outsourcing [20]. Information security risk classification was divided, for example, attackers that cause confusion, such as falsification when exchanging documents, changing meaning by confusing synonyms, negative words, and affirmative words, changing a sentence as if it was approved by a human, making changes of the content contrary to a contract, and denying data agent access.…”
Section: Overall Structure Of Security In Natural Language Processing...mentioning
confidence: 99%
“…The theory of innovation allows us to understand a phenomenon from a deeper perspective from its practice. There are different perspectives in the literature, such as the theory of agency, resources and capacities, among others, that consider innovation as an essential factor in business dynamics (Bhatti et al , 2021). The innovation theory considers more than specific aspects, such as the resources and capacities of the company and power.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…Although NLP has grown significantly in recent years, it is still vague how NLP techniques should be employed to protect IoT systems. 6 This idea served as the impetus for this research presented here. This work studied the wide variety of NLP applications that can be used for security in an IoT environment.…”
Section: Introductionmentioning
confidence: 99%