Information security as a credence good

With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may...

Full description

Saved in:
Bibliographic Details
Main Authors: KE, Ping Fan, HUI, Kai-Lung, YUE, Wei Thoo
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2013
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4761
https://ink.library.smu.edu.sg/context/sis_research/article/5764/viewcontent/usec13_submission_14__1_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5764
record_format dspace
spelling sg-smu-ink.sis_research-57642020-01-16T10:28:50Z Information security as a credence good KE, Ping Fan HUI, Kai-Lung YUE, Wei Thoo With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may exploit their professional advantage and provide fraudulent diagnosis of clients’ vulnerabilities. Such an incentive to mis-represent clients’ risks is often called the credence goods problem in the economics literature[3]. Although different mechanisms have been introduced to tackle the credence goods problem, in the information security outsourcing context, such mechanisms may not work well with the presence of system interdependency risks[6], which are introduced by inter-connecting multiple clients’ systems by the MSSP. In particular, we find that allowing clients to seek alternative diagnosis of their vulnerabilities may not remove the MSSP’s fraudulent behaviors. We shall explore alternative ways to solve the credence goods problem in the information security outsourcing context. 2013-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4761 info:doi/10.1007/978-3-642-41320-9_6 https://ink.library.smu.edu.sg/context/sis_research/article/5764/viewcontent/usec13_submission_14__1_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information security outsourcing credence good interdependency risks Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information security outsourcing
credence good
interdependency risks
Information Security
spellingShingle Information security outsourcing
credence good
interdependency risks
Information Security
KE, Ping Fan
HUI, Kai-Lung
YUE, Wei Thoo
Information security as a credence good
description With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may exploit their professional advantage and provide fraudulent diagnosis of clients’ vulnerabilities. Such an incentive to mis-represent clients’ risks is often called the credence goods problem in the economics literature[3]. Although different mechanisms have been introduced to tackle the credence goods problem, in the information security outsourcing context, such mechanisms may not work well with the presence of system interdependency risks[6], which are introduced by inter-connecting multiple clients’ systems by the MSSP. In particular, we find that allowing clients to seek alternative diagnosis of their vulnerabilities may not remove the MSSP’s fraudulent behaviors. We shall explore alternative ways to solve the credence goods problem in the information security outsourcing context.
format text
author KE, Ping Fan
HUI, Kai-Lung
YUE, Wei Thoo
author_facet KE, Ping Fan
HUI, Kai-Lung
YUE, Wei Thoo
author_sort KE, Ping Fan
title Information security as a credence good
title_short Information security as a credence good
title_full Information security as a credence good
title_fullStr Information security as a credence good
title_full_unstemmed Information security as a credence good
title_sort information security as a credence good
publisher Institutional Knowledge at Singapore Management University
publishDate 2013
url https://ink.library.smu.edu.sg/sis_research/4761
https://ink.library.smu.edu.sg/context/sis_research/article/5764/viewcontent/usec13_submission_14__1_.pdf
_version_ 1770575024069017600