2021
DOI: 10.1080/1097198x.2021.1993725
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Risk Management in IT Outsourcing – A Quarter-century Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 90 publications
0
1
0
Order By: Relevance
“…However, when outsourcing EMRS, hospitals relinquish control of EMRS controls to an off-site company, potentially resulting in a loss of granular control over related operations and functions. Moreover, due to the information asymmetry in supply chain collaborations, hospitals often face challenges in ensuring that their partnering vendors effectively adhere to security regulations and protocols (Bhatti et al, 2017). Despite these challenges, in the context of EMRS management, hospitals are required to grant extensive remote access and management privileges to their vendors as part of the delegated agency relationship.…”
Section: Research Backgroundmentioning
confidence: 99%
“…However, when outsourcing EMRS, hospitals relinquish control of EMRS controls to an off-site company, potentially resulting in a loss of granular control over related operations and functions. Moreover, due to the information asymmetry in supply chain collaborations, hospitals often face challenges in ensuring that their partnering vendors effectively adhere to security regulations and protocols (Bhatti et al, 2017). Despite these challenges, in the context of EMRS management, hospitals are required to grant extensive remote access and management privileges to their vendors as part of the delegated agency relationship.…”
Section: Research Backgroundmentioning
confidence: 99%