2024
DOI: 10.1177/01622439241240411
|View full text |Cite
|
Sign up to set email alerts
|

Unscripted Practices for Uncertain Events: Organizational Problems in Cybersecurity Incident Management

Ashwin Jacob Mathew

Abstract: Scripts can help us understand the designer–user relationship, by offering analysis of designers’ intent in technological objects and examination of users’ behaviors through willingness (and unwillingness) to take on scripts. But how are we to understand these relationships in the context of cybersecurity, in the face of adversaries determined to gain unauthorized access to computer systems by actively subverting scripts? In effect, cybersecurity attacks involve re-scripting of computing systems to gain unauth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…In his analysis of the use and misuse of population registers in Italy for the purposes of monitoring, Gargiulo (2024) highlights an even stronger dissymmetry in "the primacy of de-inscription over subscription" for local authorities. The differentiation of users according to variations of alterity takes its starkest form in Mathew's (2024) argument that cybersecurity needs to account for users-as-attackers and users-as-defenders. Not only are the adversaries that Mathew analyzes uncertain, but they challenge practices of use and what it means to be a user of a technology or a system.…”
Section: Updating Scripts and Critical Interventionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In his analysis of the use and misuse of population registers in Italy for the purposes of monitoring, Gargiulo (2024) highlights an even stronger dissymmetry in "the primacy of de-inscription over subscription" for local authorities. The differentiation of users according to variations of alterity takes its starkest form in Mathew's (2024) argument that cybersecurity needs to account for users-as-attackers and users-as-defenders. Not only are the adversaries that Mathew analyzes uncertain, but they challenge practices of use and what it means to be a user of a technology or a system.…”
Section: Updating Scripts and Critical Interventionsmentioning
confidence: 99%
“…Contributions to this Special Issue may not solve this ambivalence, but they bring it to the fore. They showcase a continuum between explicit intentionality in subverting the script (Mathew 2024) to a lack of intentionality therein (Pelizza and Van Rossem 2023). At one end of the continuum, disruption is the ultimate goal.…”
Section: Updating Scripts and Critical Interventionsmentioning
confidence: 99%