2015
DOI: 10.3233/jcs-150536
|View full text |Cite
|
Sign up to set email alerts
|

Service security and privacy as a socio-technical problem

Abstract: Abstract. The security and privacy of the data that users transmit, more or less deliberately, to modern services is an open problem. It is not solely limited to the actual Internet traversal, a sub-problem vastly tackled by consolidated research in security protocol design and analysis. By contrast, it entails much broader dimensions pertaining to how users approach technology and understand the risks for the data they enter. For example, users may express cautious or distracted personas depending on the serv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 57 publications
(71 reference statements)
0
10
0
Order By: Relevance
“…Organisations can themselves be thought of as complex socio-technical systems (Davis et al , 2014). Indeed, Bella et al (2015) affirm that organisations comprise not only the software and hardware processes, but also people, physical objects and geographies. The main objective of this research is therefore: to develop a socio-technical systems framework to help identify and appropriately respond to any vulnerabilities that may result from the socio-technical gaps within the existing information and cybersecurity solutions …”
Section: Introductionmentioning
confidence: 99%
“…Organisations can themselves be thought of as complex socio-technical systems (Davis et al , 2014). Indeed, Bella et al (2015) affirm that organisations comprise not only the software and hardware processes, but also people, physical objects and geographies. The main objective of this research is therefore: to develop a socio-technical systems framework to help identify and appropriately respond to any vulnerabilities that may result from the socio-technical gaps within the existing information and cybersecurity solutions …”
Section: Introductionmentioning
confidence: 99%
“…(vii) Socio-techno-political aspects: The role of data in a wide range of platforms has in the last decade had large influence on many people's decision-making processes related to politics, economics, entertainment, and many others. Clearly, the increasingly central role of users in these environments creates opportunities for malicious actors, and the landscape of cybersecurity issues is expanding [4].…”
Section: Desiderata For Explanations In Cybersecuritymentioning
confidence: 99%
“…User A user is modelled as a non-deterministic entity, so she may choose any of the paths of interaction that the browser offers, namely Type/ClickURL or ClickButton. This means that our model user is the best approximation at capturing all possible personas that a real-world user may express [11]. It is also the most pessimistic assumption from a security standpoint; therefore, a ceremony that is secure for a non-deterministic user in the model will be secure for any user in practice.…”
Section: Description Of the Main Uml Activitiesmentioning
confidence: 99%
“…However, there seems to exist no standard approach to analyzing socio-technical properties and, in particular, to effectively modelling the user in support of that analysis. While this is subject of significant international effort, as demonstrated by the vast related work (Section 2), we base our work upon the recent ceremony concertina traversal methodology [11]. It prescribes selective focus on the layers that interpose between society and each technical system, and leverages on a previously identified layering of a ceremony [10].…”
mentioning
confidence: 99%
See 1 more Smart Citation