A study of good-enough security in the context of rural business process outsourcing

Reena Singh, Hemant Jalota

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Abstract

Data objects having low value like insurance or data-entry forms are shared between a client and rural business process outsourcing (RBPO) organisations for tasks like translation, proofreading, and data entry. These data objects are first decomposed into smaller parts and then assigned to RBPO users. Each user in a RBPO has access to only a few parts of a complete data object which he can leak to unauthorised users. But since the value of these parts is low, there is not enough incentive for the user to leak them. Such scenarios need good-enough security models that can provide reasonable security to an aggregate number of parts of low value data objects. In this chapter, the authors study the secure data assignment and leakage in RBPO by modeling it in the form of an optimisation problem. They discuss different scenarios of object decomposition and sharing, penalty assignment, and data leakage in the context of RBPO. They use LINGO toolbox to run their model and present insights.

Original languageEnglish
Title of host publicationPsychological and Behavioral Examinations in Cyber Security
PublisherIGI Global Publishing
Pages239-252
Number of pages14
ISBN (Electronic)9781522540540
ISBN (Print)1522540539, 9781522540533
DOIs
Publication statusPublished - 09-03-2018
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint

Dive into the research topics of 'A study of good-enough security in the context of rural business process outsourcing'. Together they form a unique fingerprint.

Cite this