A Secure Knowledge Resource Management Theory for IT/IS Outsourcing: The Service Provider Perspective

A Secure Knowledge Resource Management Theory for IT/IS Outsourcing: The Service Provider Perspective

Kevin Duncan, Evan Duggan
Copyright: © 2014 |Volume: 5 |Issue: 1 |Pages: 15
ISSN: 1947-3478|EISSN: 1947-3486|EISBN13: 9781466654471|DOI: 10.4018/ijhcitp.2014010105
Cite Article Cite Article

MLA

Duncan, Kevin, and Evan Duggan. "A Secure Knowledge Resource Management Theory for IT/IS Outsourcing: The Service Provider Perspective." IJHCITP vol.5, no.1 2014: pp.55-69. http://doi.org/10.4018/ijhcitp.2014010105

APA

Duncan, K. & Duggan, E. (2014). A Secure Knowledge Resource Management Theory for IT/IS Outsourcing: The Service Provider Perspective. International Journal of Human Capital and Information Technology Professionals (IJHCITP), 5(1), 55-69. http://doi.org/10.4018/ijhcitp.2014010105

Chicago

Duncan, Kevin, and Evan Duggan. "A Secure Knowledge Resource Management Theory for IT/IS Outsourcing: The Service Provider Perspective," International Journal of Human Capital and Information Technology Professionals (IJHCITP) 5, no.1: 55-69. http://doi.org/10.4018/ijhcitp.2014010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

There is a delicate dance between outsourcing vendors and the secure management of their knowledge resources at play. The challenge for the vendor stems from their need to earn their clients trust by engendering high levels of confidence in their abilities to effectively deliver goods and services sought by the client without compromising the security of their knowledge resources. The potential for the outsourcing vendor project teams to interact with a diverse set of clients adds and even greater level of complexity. However, some IT/IS outsourcing vendors manage to successfully execute this balancing act. Given the socio-technical nature of this phenomenon the authors will look to institutional, resource-based view and managerial control theories as avenues via which they seek to gain some understanding as to how they secure their knowledge resources.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.