Original Research
Guidelines for identifying risk vulnerabilities associated with ICT sourcing
South African Journal of Business Management | Vol 38, No 4 | a592 |
DOI: https://doi.org/10.4102/sajbm.v38i4.592
| © 2018 A. Cachia, C. J. Kruger
| This work is licensed under CC Attribution 4.0
Submitted: 10 October 2018 | Published: 31 December 2007
Submitted: 10 October 2018 | Published: 31 December 2007
About the author(s)
A. Cachia, Department of Informatics, University of Pretoria, South AfricaC. J. Kruger, Department of Informatics, University of Pretoria, South Africa
Full Text:
PDF (174KB)Abstract
As organizations broaden their organizational boundaries with sourcing practices, it is imperative to identify risk vulnerabilities from a wider perspective than before. Specifically, organizations that make substantial use of ICT suppliers need to understand the risk vulnerabilities associated with ICT sourcing partnerships. Unfortunately, due to vulnerabilities being addressed from different levels of erudition, an inclusive list of risk vulnerabilities, associated with ICT suppliers, does not exist within the ICT industry. This article not only address ICT risk management discrepancies and the importance of ICT supplier management, but in drawing on the collective knowledge contained in diverse sources, two distinct lists containing risk vulnerabilities, from the customer organization’s perspective, are generated, all, in order to accelerate the understanding of exposure when dealing with ICT suppliers.
Keywords
No related keywords in the metadata.
Metrics
Total abstract views: 1646Total article views: 669
Crossref Citations
1. Africa as a source location: literature review and implications
Dr Keith Perks and Dr Phani Tej Adidam, Oguji Nnamdi, Richard Owusu
International Journal of Emerging Markets vol: 9 issue: 3 first page: 424 year: 2014
doi: 10.1108/IJoEM-09-2012-0123