1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: lnit@ejournal.net.
2. Can I submit an abstract?
The journal publishes full research papers....[Read More]

Information Security Requirement: The Relationship between Information Asset Integrity and Availability for ICT Outsourcing

Nik Zulkarnaen Khidzir 1, Azlinah Mohamed 2, and Noor Habibah Arshad 2
1. Infrastructure University Kuala Lumpur, Faculty of Information Technology Infrastructure, Kuala Lumpur, Malaysia
2. Universiti Teknologi MARA, Faculty of Computer and Mathematical Sciences, Shah Alam, Malaysia
Abstract—Information Communication Technology (ICT) Outsourcing provides effective ways to cut cost and improve efficiency in ICT services. Unfortunately, the outsourcing strategy still invites some critical risks especially information security risks. Fundamental concepts of information security requirements such as confidentiality, integrity and availability of information assets involved in the ICT outsourcing cycle need to be identified extensively to ensure these information assets are secure from information security risks. Therefore, the aim of this study is to determine the relationship between key information assets integrity and availability in the ICT outsourcing cycle. Questionnaires were distributed to 300 private companies from various industry and government agencies in Malaysia for the study. Results of the correlation coefficient (r) values > 0.7 verifies that a strong positive relationship exists between two information security requirements; integrity and availability of key information assets in every phase of ICT outsourcing. Findings reveal that the higher the integrity level, the higher the availability level of the key information assets, providing significant empirical evidence on the relationship between key information assets integrity and availability in the ICT outsourcing cycle. Subsequently, the integrity and availability of these key information assets could be better managed and controlled. Organizations can re-evaluate and improve their practices in managing information assets and urgently address information security risks to gain optimum benefits from their ICT outsourcing ventures.

Index Terms—Information Availability, Information Assets, Security Requirement, ICT Outsourcing, Information Integrity, Information Security

Cite: Nik Zulkarnaen Khidzir, Azlinah Mohamed and Noor Habibah Arshad, "Information Security Requirement: The Relationship between Information Asset Integrity and Availability for ICT Outsourcing," Lecture Notes on Information Theory, Vol.1, No.3, pp. 118-123, Sept. 2013. doi: 10.12720/lnit.1.3.118-123
Copyright © 2012-2018 Lecture Notes on Information Theory, All Rights Reserved