Investigating security capabilities in service level agreements as trust-enhancing instruments

Many government agencies (GAs) increasingly rely on external computing, communications and storage services supplied by service providers (SPs) to process, store or transmit sensitive data to increase scalability and decrease the costs of maintaining services. The relationships with external SPs are...

Full description

Bibliographic Details
Main Authors: Nugraha, Y, Martin, A
Format: Conference item
Published: Springer, Cham 2017
_version_ 1797078698843701248
author Nugraha, Y
Martin, A
author_facet Nugraha, Y
Martin, A
author_sort Nugraha, Y
collection OXFORD
description Many government agencies (GAs) increasingly rely on external computing, communications and storage services supplied by service providers (SPs) to process, store or transmit sensitive data to increase scalability and decrease the costs of maintaining services. The relationships with external SPs are usually established through service level agreements (SLAs) as trust-enhancing instruments. However, there is a concern that existing SLAs are mainly focused on the system availability and performance aspects, but overlook security in SLAs. In this paper, we investigated ‘real world’ SLAs in terms of security guarantees between GAs and external SPs, using Indonesia as a case study. This paper develops a grounded adaptive Delphi method to clarify the current and potential attributes of security-related SLAs that are common among external service offerings. To this end, we conducted a longitudinal study of the Indonesian government auctions of 59 e-procurement services from 2010-2016 to find ‘auction winners’. Further, we contacted five selected major SPs (n = 15 participants) to participate in a three-round Delphi study. Using a grounded theory analysis, we examined the Delphi study data to categorise and generalise the extracted statements in the process of developing propositions. We observed that most of the GAs placed significant importance on service availability, but security capabilities of the SPs were not explicitly expressed in SLAs. Additionally, the GAs often use the provision of service availability to demand additional security capabilities supplied by the SPs. We also observed that most of the SPs found difficulties in addressing data confidentiality and integrity in SLAs. Overall, our findings call for a proposition-driven analysis of the Delphi study data to establish the foundation for incorporating security capabilities into security-related SLAs.
first_indexed 2024-03-07T00:35:27Z
format Conference item
id oxford-uuid:813c97e9-2ed1-4801-8397-3734c65b5fd4
institution University of Oxford
last_indexed 2024-03-07T00:35:27Z
publishDate 2017
publisher Springer, Cham
record_format dspace
spelling oxford-uuid:813c97e9-2ed1-4801-8397-3734c65b5fd42022-03-26T21:29:02ZInvestigating security capabilities in service level agreements as trust-enhancing instrumentsConference itemhttp://purl.org/coar/resource_type/c_5794uuid:813c97e9-2ed1-4801-8397-3734c65b5fd4Symplectic Elements at OxfordSpringer, Cham2017Nugraha, YMartin, AMany government agencies (GAs) increasingly rely on external computing, communications and storage services supplied by service providers (SPs) to process, store or transmit sensitive data to increase scalability and decrease the costs of maintaining services. The relationships with external SPs are usually established through service level agreements (SLAs) as trust-enhancing instruments. However, there is a concern that existing SLAs are mainly focused on the system availability and performance aspects, but overlook security in SLAs. In this paper, we investigated ‘real world’ SLAs in terms of security guarantees between GAs and external SPs, using Indonesia as a case study. This paper develops a grounded adaptive Delphi method to clarify the current and potential attributes of security-related SLAs that are common among external service offerings. To this end, we conducted a longitudinal study of the Indonesian government auctions of 59 e-procurement services from 2010-2016 to find ‘auction winners’. Further, we contacted five selected major SPs (n = 15 participants) to participate in a three-round Delphi study. Using a grounded theory analysis, we examined the Delphi study data to categorise and generalise the extracted statements in the process of developing propositions. We observed that most of the GAs placed significant importance on service availability, but security capabilities of the SPs were not explicitly expressed in SLAs. Additionally, the GAs often use the provision of service availability to demand additional security capabilities supplied by the SPs. We also observed that most of the SPs found difficulties in addressing data confidentiality and integrity in SLAs. Overall, our findings call for a proposition-driven analysis of the Delphi study data to establish the foundation for incorporating security capabilities into security-related SLAs.
spellingShingle Nugraha, Y
Martin, A
Investigating security capabilities in service level agreements as trust-enhancing instruments
title Investigating security capabilities in service level agreements as trust-enhancing instruments
title_full Investigating security capabilities in service level agreements as trust-enhancing instruments
title_fullStr Investigating security capabilities in service level agreements as trust-enhancing instruments
title_full_unstemmed Investigating security capabilities in service level agreements as trust-enhancing instruments
title_short Investigating security capabilities in service level agreements as trust-enhancing instruments
title_sort investigating security capabilities in service level agreements as trust enhancing instruments
work_keys_str_mv AT nugrahay investigatingsecuritycapabilitiesinservicelevelagreementsastrustenhancinginstruments
AT martina investigatingsecuritycapabilitiesinservicelevelagreementsastrustenhancinginstruments