A study of good-enough security in the context of rural business process outsourcing

Reena Singh, Hemant Jalota

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Data objects having low value like insurance or data-entry forms are shared between a client and rural business process outsourcing (RBPO) organisations for tasks like translation, proofreading, and data entry. These data objects are first decomposed into smaller parts and then assigned to RBPO users. Each user in a RBPO has access to only a few parts of a complete data object which he can leak to unauthorised users. But since the value of these parts is low, there is not enough incentive for the user to leak them. Such scenarios need good-enough security models that can provide reasonable security to an aggregate number of parts of low value data objects. In this chapter, the authors study the secure data assignment and leakage in RBPO by modeling it in the form of an optimisation problem. They discuss different scenarios of object decomposition and sharing, penalty assignment, and data leakage in the context of RBPO. They use LINGO toolbox to run their model and present insights.

Original languageEnglish
Title of host publicationPsychological and Behavioral Examinations in Cyber Security
PublisherIGI Global Publishing
Pages239-252
Number of pages14
ISBN (Electronic)9781522540540
ISBN (Print)1522540539, 9781522540533
DOIs
Publication statusPublished - 09-03-2018
Externally publishedYes

Fingerprint

Outsourcing
Industry
Data acquisition
Insurance
Decomposition

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

Singh, R., & Jalota, H. (2018). A study of good-enough security in the context of rural business process outsourcing. In Psychological and Behavioral Examinations in Cyber Security (pp. 239-252). IGI Global Publishing. https://doi.org/10.4018/978-1-5225-4053-3.ch014
Singh, Reena ; Jalota, Hemant. / A study of good-enough security in the context of rural business process outsourcing. Psychological and Behavioral Examinations in Cyber Security. IGI Global Publishing, 2018. pp. 239-252
@inbook{a2e5877f6e324e6d90e879ca7997c7ef,
title = "A study of good-enough security in the context of rural business process outsourcing",
abstract = "Data objects having low value like insurance or data-entry forms are shared between a client and rural business process outsourcing (RBPO) organisations for tasks like translation, proofreading, and data entry. These data objects are first decomposed into smaller parts and then assigned to RBPO users. Each user in a RBPO has access to only a few parts of a complete data object which he can leak to unauthorised users. But since the value of these parts is low, there is not enough incentive for the user to leak them. Such scenarios need good-enough security models that can provide reasonable security to an aggregate number of parts of low value data objects. In this chapter, the authors study the secure data assignment and leakage in RBPO by modeling it in the form of an optimisation problem. They discuss different scenarios of object decomposition and sharing, penalty assignment, and data leakage in the context of RBPO. They use LINGO toolbox to run their model and present insights.",
author = "Reena Singh and Hemant Jalota",
year = "2018",
month = "3",
day = "9",
doi = "10.4018/978-1-5225-4053-3.ch014",
language = "English",
isbn = "1522540539",
pages = "239--252",
booktitle = "Psychological and Behavioral Examinations in Cyber Security",
publisher = "IGI Global Publishing",
address = "United States",

}

Singh, R & Jalota, H 2018, A study of good-enough security in the context of rural business process outsourcing. in Psychological and Behavioral Examinations in Cyber Security. IGI Global Publishing, pp. 239-252. https://doi.org/10.4018/978-1-5225-4053-3.ch014

A study of good-enough security in the context of rural business process outsourcing. / Singh, Reena; Jalota, Hemant.

Psychological and Behavioral Examinations in Cyber Security. IGI Global Publishing, 2018. p. 239-252.

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - A study of good-enough security in the context of rural business process outsourcing

AU - Singh, Reena

AU - Jalota, Hemant

PY - 2018/3/9

Y1 - 2018/3/9

N2 - Data objects having low value like insurance or data-entry forms are shared between a client and rural business process outsourcing (RBPO) organisations for tasks like translation, proofreading, and data entry. These data objects are first decomposed into smaller parts and then assigned to RBPO users. Each user in a RBPO has access to only a few parts of a complete data object which he can leak to unauthorised users. But since the value of these parts is low, there is not enough incentive for the user to leak them. Such scenarios need good-enough security models that can provide reasonable security to an aggregate number of parts of low value data objects. In this chapter, the authors study the secure data assignment and leakage in RBPO by modeling it in the form of an optimisation problem. They discuss different scenarios of object decomposition and sharing, penalty assignment, and data leakage in the context of RBPO. They use LINGO toolbox to run their model and present insights.

AB - Data objects having low value like insurance or data-entry forms are shared between a client and rural business process outsourcing (RBPO) organisations for tasks like translation, proofreading, and data entry. These data objects are first decomposed into smaller parts and then assigned to RBPO users. Each user in a RBPO has access to only a few parts of a complete data object which he can leak to unauthorised users. But since the value of these parts is low, there is not enough incentive for the user to leak them. Such scenarios need good-enough security models that can provide reasonable security to an aggregate number of parts of low value data objects. In this chapter, the authors study the secure data assignment and leakage in RBPO by modeling it in the form of an optimisation problem. They discuss different scenarios of object decomposition and sharing, penalty assignment, and data leakage in the context of RBPO. They use LINGO toolbox to run their model and present insights.

UR - http://www.scopus.com/inward/record.url?scp=85046563126&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85046563126&partnerID=8YFLogxK

U2 - 10.4018/978-1-5225-4053-3.ch014

DO - 10.4018/978-1-5225-4053-3.ch014

M3 - Chapter

AN - SCOPUS:85046563126

SN - 1522540539

SN - 9781522540533

SP - 239

EP - 252

BT - Psychological and Behavioral Examinations in Cyber Security

PB - IGI Global Publishing

ER -

Singh R, Jalota H. A study of good-enough security in the context of rural business process outsourcing. In Psychological and Behavioral Examinations in Cyber Security. IGI Global Publishing. 2018. p. 239-252 https://doi.org/10.4018/978-1-5225-4053-3.ch014