TY - GEN
T1 - Information security as a credence good
AU - Ke, Ping Fan
AU - Hui, Kai Lung
AU - Yue, Wei T.
PY - 2013
Y1 - 2013
N2 - With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may exploit their professional advantage and provide fraudulent diagnosis of clients' vulnerabilities. Such an incentive to mis-represent clients' risks is often called the credence goods problem in the economics literature[3]. Although different mechanisms have been introduced to tackle the credence goods problem, in the information security outsourcing context, such mechanisms may not work well with the presence of system interdependency risks [6], which are introduced by inter-connecting multiple clients' systems by the MSSP. In particular, we find that allowing clients to seek alternative diagnosis of their vulnerabilities may not remove the MSSP's fraudulent behaviors. We shall explore alternative ways to solve the credence goods problem in the information security outsourcing context.
AB - With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may exploit their professional advantage and provide fraudulent diagnosis of clients' vulnerabilities. Such an incentive to mis-represent clients' risks is often called the credence goods problem in the economics literature[3]. Although different mechanisms have been introduced to tackle the credence goods problem, in the information security outsourcing context, such mechanisms may not work well with the presence of system interdependency risks [6], which are introduced by inter-connecting multiple clients' systems by the MSSP. In particular, we find that allowing clients to seek alternative diagnosis of their vulnerabilities may not remove the MSSP's fraudulent behaviors. We shall explore alternative ways to solve the credence goods problem in the information security outsourcing context.
KW - Credence good
KW - Information security outsourcing
KW - Interdependency risks
UR - https://openalex.org/W2175404060
UR - https://www.scopus.com/pages/publications/84892884240
U2 - 10.1007/978-3-642-41320-9_6
DO - 10.1007/978-3-642-41320-9_6
M3 - Conference Paper published in a book
SN - 9783642413193
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 83
EP - 93
BT - Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Revised Selected Papers
T2 - 16th International Conference on Financial Cryptography and Data Security, FC 2013
Y2 - 1 April 2013 through 1 April 2013
ER -