2018
DOI: 10.1007/978-3-030-04537-1_2
|View full text |Cite
|
Sign up to set email alerts
|

An Evidence Quality Assessment Model for Cyber Security Policymaking

Abstract: One key factor underpinning a state's capacity to respond to policy challenges of cybersecurity is the quality of evidence supporting such decision making. As part of this process, policy advisers, essentially a diverse group including everyone from civil servants to elected policy makers, are asked to assess evidence from a mix of sources. Sometimes with little relevant expertise and often in time-critical scenarios, assessing threat, risk and proportionate response based on a mix of official briefings, acade… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Cybersecurity is "viewed as a niche technical subject requiring a computer science degree just to grapple with its impenetrable jargon" [5]. While technical command of cybersecurity is an acknowledged issue amongst boards [9], policymakers [10], and public [11], it is inadequate measure of effectiveness of cybersecurity games as it overlooks a key factor: decision-making.…”
Section: Research Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Cybersecurity is "viewed as a niche technical subject requiring a computer science degree just to grapple with its impenetrable jargon" [5]. While technical command of cybersecurity is an acknowledged issue amongst boards [9], policymakers [10], and public [11], it is inadequate measure of effectiveness of cybersecurity games as it overlooks a key factor: decision-making.…”
Section: Research Contributionsmentioning
confidence: 99%
“…During game-play, information from a wide range of sources is provided to participants, which is a scenario inject. This can include supporting cybersecurity evidence such as technical advisory, media items, non-confidential government or agency reports, confidential intelligence briefing, industry analysis and academic research [10]. Scenario injects can have certain characteristics such as time pressure, escalation, reputation and resource allocation, which challenges decision-making, and are shown in Figure 2.…”
Section: Scenario Injectsmentioning
confidence: 99%