A Study of Good-Enough Security in the Context of Rural Business Process Outsourcing

A Study of Good-Enough Security in the Context of Rural Business Process Outsourcing

Reena Singh, Hemant Jalota
Copyright: © 2018 |Pages: 14
DOI: 10.4018/978-1-5225-4053-3.ch014
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Data objects having low value like insurance or data-entry forms are shared between a client and rural business process outsourcing (RBPO) organisations for tasks like translation, proofreading, and data entry. These data objects are first decomposed into smaller parts and then assigned to RBPO users. Each user in a RBPO has access to only a few parts of a complete data object which he can leak to unauthorised users. But since the value of these parts is low, there is not enough incentive for the user to leak them. Such scenarios need good-enough security models that can provide reasonable security to an aggregate number of parts of low value data objects. In this chapter, the authors study the secure data assignment and leakage in RBPO by modeling it in the form of an optimisation problem. They discuss different scenarios of object decomposition and sharing, penalty assignment, and data leakage in the context of RBPO. They use LINGO toolbox to run their model and present insights.
Chapter Preview
Top

Rbpo

Data and distribution is integral to the RBPO scenarios. The data includes documents, scanned images, associated audio files, videos etc. We refer to individual resources as data objects in the rest of the paper and use the terms resource, assets and data objects interchangeably. RBPOs distribute tasks across agents in different rural service delivery centres. The back offices of RBPO are distributed in several locations. RBPO organizations get orders from clients to perform tasks like data-entry, translation, proof-reading etc. They handle a large number of data objects (of reasonable sizes) on a daily basis. An RBPO organization has many small centres distributed in several locations and is organised hierarchically with a head office, a few regional offices and many local offices. The local office has a kiosk centre in a village or a cluster of villages, with computing and Internet facilities, shared by the operators to carry out the tasks assigned to them (Vaidyanathan, 2009).

A good-enough security measure adopted by RBPO is decomposing a data object into smaller parts before sharing with users (Reena Singh, 2011; Gonsalves, 2015). Sharing objects after decomposition has two benefits:

  • Each part (or a set of parts) can be assigned to different users to carry out some task on it, independent from other users. Thus it decreases the total time required for task completion as many users can simultaneously work on different parts of the same data object.

  • Each user has access to only a part (or a set of parts) of a data object. Thus, the overall object security is maintained.

Complete Chapter List

Search this Book:
Reset