Original Research

Guidelines for identifying risk vulnerabilities associated with ICT sourcing

A. Cachia, C. J. Kruger
South African Journal of Business Management | Vol 38, No 4 | a592 | DOI: https://doi.org/10.4102/sajbm.v38i4.592 | © 2018 A. Cachia, C. J. Kruger | This work is licensed under CC Attribution 4.0
Submitted: 10 October 2018 | Published: 31 December 2007

About the author(s)

A. Cachia, Department of Informatics, University of Pretoria, South Africa
C. J. Kruger, Department of Informatics, University of Pretoria, South Africa

Full Text:

PDF (174KB)

Abstract

As organizations broaden their organizational boundaries with sourcing practices, it is imperative to identify risk vulnerabilities from a wider perspective than before. Specifically, organizations that make substantial use of ICT suppliers need to understand the risk vulnerabilities associated with ICT sourcing partnerships. Unfortunately, due to vulnerabilities being addressed from different levels of erudition, an inclusive list of risk vulnerabilities, associated with ICT suppliers, does not exist within the ICT industry. This article not only address ICT risk management discrepancies and the importance of ICT supplier management, but in drawing on the collective knowledge contained in diverse sources, two distinct lists containing risk vulnerabilities, from the customer organization’s perspective, are generated, all, in order to accelerate the understanding of exposure when dealing with ICT suppliers.

Keywords

No related keywords in the metadata.

Metrics

Total abstract views: 1646
Total article views: 669

 

Crossref Citations

1. Africa as a source location: literature review and implications
Dr Keith Perks and Dr Phani Tej Adidam, Oguji Nnamdi, Richard Owusu
International Journal of Emerging Markets  vol: 9  issue: 3  first page: 424  year: 2014  
doi: 10.1108/IJoEM-09-2012-0123