2019 APWG Symposium on Electronic Crime Research (eCrime) 2019
DOI: 10.1109/ecrime47957.2019.9037589
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Unintended Harms of Cybersecurity Countermeasures

Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks to their services or systems. In some cases, those countermeasures will produce unintended consequences, which must then be addressed. Unintended consequences can potentially induce harm, adversely affecting user behaviour, user inclusion, or the infrastructure itself (including other services or countermeasures). Here we propose a framework for preemptively identifying unintended harms of risk count… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(22 citation statements)
references
References 84 publications
0
22
0
Order By: Relevance
“…The authors posit that analytical tools are necessary to reduce these harms, and as part of risk assessment. Similarly, Chua et al [17] encourage risk managers to explore the potential for unintended harms to emerge as a result of their own risk controls. The authors' framework emphasises the need to support vulnerable populations who may experience harms if risk controls work against them rather than for them.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors posit that analytical tools are necessary to reduce these harms, and as part of risk assessment. Similarly, Chua et al [17] encourage risk managers to explore the potential for unintended harms to emerge as a result of their own risk controls. The authors' framework emphasises the need to support vulnerable populations who may experience harms if risk controls work against them rather than for them.…”
Section: Related Workmentioning
confidence: 99%
“…Risk controls in an IT environment potentially restrict behaviour, users, and infrastructure [17], in turn affecting actual user behaviour, through their representations in IT systems. A risk owner making decisions about IT-security and related technical systems is unlikely to have a direct view of what users are doing.…”
Section: Prevention and Preservation Of Behavioursmentioning
confidence: 99%
See 1 more Smart Citation
“…For registered domains, an incorrect decision may have unintended adverse effects [23], [42]. In case of the seizure of a benign domain, its legitimate owner can no longer provide its service to end users.…”
Section: A Making Accurate Takedown Decisionsmentioning
confidence: 99%
“…By using the mean, we do not attach any statistical meaning to the absence of data and do not skew the distribution. (19)(20)(21)(22)(30)(31)(32)(33)(34)(35)(36) are set to zero and binary feature values (23)(24)(25)(26)(27)(28)(29) to false as no data means that DNS records for the domain were never queried, suggesting unpopularity. Table IX presents the performance metrics of the machine learning algorithms that we evaluate in Section V-B, for a base ensemble model trained and tested on the initial 2017 iteration.…”
Section: Appendix a Machine Learning Protocolmentioning
confidence: 99%