Abstract
Data objects having low value like insurance or data-entry forms are shared between a client and rural business process outsourcing (RBPO) organisations for tasks like translation, proofreading, and data entry. These data objects are first decomposed into smaller parts and then assigned to RBPO users. Each user in a RBPO has access to only a few parts of a complete data object which he can leak to unauthorised users. But since the value of these parts is low, there is not enough incentive for the user to leak them. Such scenarios need good-enough security models that can provide reasonable security to an aggregate number of parts of low value data objects. In this chapter, the authors study the secure data assignment and leakage in RBPO by modeling it in the form of an optimisation problem. They discuss different scenarios of object decomposition and sharing, penalty assignment, and data leakage in the context of RBPO. They use LINGO toolbox to run their model and present insights.
Original language | English |
---|---|
Title of host publication | Psychological and Behavioral Examinations in Cyber Security |
Publisher | IGI Global Publishing |
Pages | 239-252 |
Number of pages | 14 |
ISBN (Electronic) | 9781522540540 |
ISBN (Print) | 1522540539, 9781522540533 |
DOIs | |
Publication status | Published - 09-03-2018 |
Externally published | Yes |
All Science Journal Classification (ASJC) codes
- Computer Science(all)