Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl


2013 | 2(28) | 112-123

Article title

IT security risks in modern sourcing models – cloud computing. An example


Title variants

Languages of publication



Information technologies have been developing nowadays at an amazing speed, affecting the functioning of organizations. Almost all of these organisations are involved in some way in sourcing activities, and each of them develops a sourcing relationship that suits its particular needs. In the article, different kinds of outsourcing models were discussed, which are applied in the contemporary management, with particular emphasis put on cloud computing. Cloud computing has become an omnipresent and an increasingly important technology and new risk areas have appeared. The main aim of this article was to present the most important risks related to the introduction of management models based on the most recent IT technologies, e.g. cloud computing, and emphasize the role of appropriate IT security management.


  • Wroclaw University of Economics
  • Wroclaw University of Economics


  • Barczak A., Sydoruk T., Management Information Systems Security (in Polish), Dom Wydawniczy Bellona, Warsaw 2003, pp. 80-82.
  • Bieńkowski M., Seven Threats for Cloud Computing Security (in Polish), 3.07.2008, http://webhosting.pl/Siedem.zagrozen.bezpieczenstwa.dla.komputerowych.chmur (29.01.2012).
  • Cloud computing – Is it Secure in the Cloud? (in Polish), 18.10.2011, http://internet-news.com.pl/cloud-computing-bezpiecznie-w-chmurze/ (10.03.2012).
  • Dziembek D., Enterprise information systems security risk analysis and assessment (in Polish), [in:] Zarządzanie ryzykiem w działalności gospodarczej, Part I, ed. E. Sitek, WZ PCz, Częstochowa 2006.
  • Hauke K., Owoc M.L., Properties of cloud computing for small and medium sized enterprises, [in:] Advanced Information Technologies for Management − AITM 2011, Information Systems in Business, eds. J. Korczak, H. Dudycz, M. Dyczkowski, Wroclaw University of Economics Research Papers no 205, ISSN 1899-3192, Wrocław 2011, pp. 123-130.
  • Into the cloud, out of the fog – Ernst & Young’s 2011 Global Information Security Survey, Insights on IT risk Business briefing, Nov. 2011, http://www.ey.com/Publication/vwLUAssets/Into_the_cloud_out_of_the_fog-2011_GISS/$FILE/Into_the_cloud_out_of_the_fog-2011%20GISS.pdf (21.02.2012).
  • Information systems security in banking institutions in Poland (In Polish), ed. J. Grzywacz, Oficyna Wydawnicza SGH in Warsaw, Warsaw 2003, pp. 11-13.
  • Information Technologies for Economists. Tools. Applications (in Polish), eds. A. Nowicki, T. Turek, Published by the University of Economics in Wrocław, Wrocław 2010, pp. 160-161.
  • Matuszewska B., Security in the cloud (in Polish), Gazeta.pl, 5.10.2011, http://komputerwfirmie.gazeta.
  • pl/itbiznes/1,54790,10412168,Bezpiecznie_w_chmurze.html. (1.03.2012).
  • Muszyński J., New Services, New Threats (in Polish), Networld, 15.12.2008, http://www.networld.pl/artykuly/329757/Nowe.uslugi.nowe.zagrozenia.html (18.09.2010).
  • Nowicki A., Ziora L., Application of cloud computing solutions in enterprises. Review of selected foreign practical applications, [in:] Advanced Information Technologies for Management − AITM 2011, Information Systems in Business, ed. J. Korczak, H. Dudycz, M. Dyczkowski, Wroclaw University of Economics Research Papers no 205, ISSN 1899-3192, Wrocław 2011, pp. 203-213.
  • Online CERT security reports, http://www.cert.pl/raporty.
  • Online Computer Security Institute reports, http://gocsi.com/members/reports.
  • Oshri I., Kotlarski J., Willcocks L.P., The handbook of global outsourcing and offshoring, second edition, Palgrave Macmillan Ltd., Houndmills Basingstoke Hampshire 2011.
  • Poniewierski A., The Method of Assessing The Risks of Information Systems Security for The Insurance Companies (in Polish), doctoral thesis, Academy of Economics in Poznań, Department of Computer Science and Electronic Economy, Poznań 2008, http://www.wbc.poznan.pl/dlibra/doccontent?id=110102&from=FBC (26.04.2012), p. 22.
  • Professional outsourcing, issue 7, Winter 2011, www.professionaloutsourcingmagazine.net (5.10.2012).
  • Sparrow E., Successful IT Outourcing, Springer, London 2003.
  • Strategies to Improve IT Efficiency in 2010.Using Predictive Analysis To Do More with Less, April 13, 2010, A Forrester Consulting Thought Leadership Paper Commissioned By TeamQuest, http://www.teamquest.com/pdfs/whitepaper/forrester-it-efficiency-2010.pdf (18.04.2013).
  • The level of IT threats is rising in connection with the development of new technologies fog − Ernst & Young’s 2010 Global Information Security Survey, February 2011, http://www.ey.com/PL/en/Newsroom/News-releases/PR11_Raport-GISS-2010 (24.02.2012).
  • Willcocks L.P., Lacity M.C., The new IT outsourcing landscape. From innovation to cloud computing, Palgrave Macmillan Ltd. – Houndmills Basingstoke Hampshire, 2012.
  • Young G.O., Synthetic structure of industrial plastics (Book style with paper title and editor), [in:] Plastics, second edition, vol. 3, ed. J. Peters, McGraw-Hill, New York, 1964, pp. 15-64.

Document Type

Publication order reference


YADDA identifier

JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.