Information security as a credence good

Ping Fan Ke, Kai Lung Hui, Wei T. Yue

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

Abstract

With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may exploit their professional advantage and provide fraudulent diagnosis of clients' vulnerabilities. Such an incentive to mis-represent clients' risks is often called the credence goods problem in the economics literature[3]. Although different mechanisms have been introduced to tackle the credence goods problem, in the information security outsourcing context, such mechanisms may not work well with the presence of system interdependency risks [6], which are introduced by inter-connecting multiple clients' systems by the MSSP. In particular, we find that allowing clients to seek alternative diagnosis of their vulnerabilities may not remove the MSSP's fraudulent behaviors. We shall explore alternative ways to solve the credence goods problem in the information security outsourcing context.

Original languageEnglish
Title of host publicationFinancial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Revised Selected Papers
Pages83-93
Number of pages11
DOIs
Publication statusPublished - 2013
Event16th International Conference on Financial Cryptography and Data Security, FC 2013 - Okinawa, Japan
Duration: 1 Apr 20131 Apr 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7862 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th International Conference on Financial Cryptography and Data Security, FC 2013
Country/TerritoryJapan
CityOkinawa
Period1/04/131/04/13

Keywords

  • Credence good
  • Information security outsourcing
  • Interdependency risks

Fingerprint

Dive into the research topics of 'Information security as a credence good'. Together they form a unique fingerprint.

Cite this