The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
The demand for outsourcing in the information systems (IS) field has become a part of basic corporate strategy and has experienced a considerable growth in recent years. The proce...
This study examines the risk consequences of participation in inter-organisational information systems (IOS). The research aims to identify the risk mitigation and risk absorption...
Martin Hughes, Philip Powell, Niki Panteli, Willia...
Many organizations would benefit from enterprise-wide, shared information systems. It is common for these organizations to have in place a number of smaller information systems, e...
Abstract. Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption propos...