2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W) 2017
DOI: 10.1109/fas-w.2017.175
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Policies and Their Impact on Dynamic Data Driven Application Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Broniatowski used precisely this approach when exploring the consequences of different system design strategies for flexibility in a simulated intermodal freight transportation network. In addition Tucker et al . used this approach to explore the impact of cybersecurity policies, such as those restricting freedom of speech to protect privacy, on societal adoption of technology.…”
Section: Relationship To Other Standards Of Rigormentioning
confidence: 99%
See 1 more Smart Citation
“…Broniatowski used precisely this approach when exploring the consequences of different system design strategies for flexibility in a simulated intermodal freight transportation network. In addition Tucker et al . used this approach to explore the impact of cybersecurity policies, such as those restricting freedom of speech to protect privacy, on societal adoption of technology.…”
Section: Relationship To Other Standards Of Rigormentioning
confidence: 99%
“…Such approaches have clear analogies to the concepts discussed in this paper. 103 used this approach to explore the impact of cybersecurity policies, such as those restricting freedom of speech to protect privacy, on societal adoption of technology. Such approaches can give researchers confidence that the model generates the predicted simulated results; however, unless they are validated against empirical data, such models have more in common with the axiomatic approaches discussed above-they provide an explanation that can inform hypotheses to be tested and constructs to be validated.…”
Section: Relationship To Mathematical Models Of Complex Systemsmentioning
confidence: 99%
“…For example, health care is now considered a central field of study to systems engineering, bringing with it attendant concerns about security and privacy of health records. Similarly, although social media are considered by some as “purely social” systems, the expansion of the “Internet of Things” guarantees that they will also provide valuable signals about the performance of socio‐technical systems, meaning that attendant concerns about online security and privacy are also within scope of systems engineering design.…”
mentioning
confidence: 99%