Proceedings of the 2014 New Security Paradigms Workshop 2014
DOI: 10.1145/2683467.2683469
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security as Social Experiment

Abstract: Lessons from previous experiences are often overlooked when deploying security-sensitive technology in the real world. At the same time, security assessments often suffer from a lack of real-world data. This appears similar to general problems in technology assessment, where knowledge about (side-)effects of a new technology often only appears when it is too late. In this context, the paradigm of new technologies as social experiments was proposed, to achieve more conscious and gradual deployment of new techno… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 36 publications
(35 reference statements)
0
7
0
Order By: Relevance
“…QADTs do not take into account the dynamic nature of the system and its dependencies, which can lead to incorrect risk assessments Pieters et al (2014) Proposes a framework for security risk analysis using "attacker profiles" to model different attack scenarios. Introduces the attacker profile library, the attack navigator, and the attack simulator.…”
Section: Kordy Et Al (2013b)mentioning
confidence: 99%
“…QADTs do not take into account the dynamic nature of the system and its dependencies, which can lead to incorrect risk assessments Pieters et al (2014) Proposes a framework for security risk analysis using "attacker profiles" to model different attack scenarios. Introduces the attacker profile library, the attack navigator, and the attack simulator.…”
Section: Kordy Et Al (2013b)mentioning
confidence: 99%
“…A lot of different security models have been suggested to deal with the unique problems that come up when trying to keep cloud computer settings safe. The Cloud Security Alliance (CSA) Security [3] Guidance is one of these frameworks. It gives a complete list of best practices for protecting various parts of cloud settings, such as data security, identification and access control, and compliance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Given this definition of adversarial risk, how can we leverage the understanding of this type of risk in studies that conceive of the introduction of new technology into society as a social experiment? In the cyber security domain, understanding the adversarial aspects of new technologies as social experiments is key (Dechesne, Hadžiosmanović and Pieters 2014;Pieters, Hadžiosmanović and Dechesne 2014;. Dechesne, Hadžiosmanović and Pieters (2014) discuss this for the case of smart electricity pilots in the Netherlands.…”
Section: Adversarial Risks In Social Experimentsmentioning
confidence: 99%
“…In the cyber security domain, understanding the adversarial aspects of new technologies as social experiments is essential, because of the societal damage associated with cyber attackers and attacks enabled by new technologies (Pieters, Hadžiosmanović and Dechesne 2014;. In this chapter, we extend this analysis by developing a typology of adversarial risks in social experiments.…”
Section: Introductionmentioning
confidence: 99%