Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

作者: Wolter Pieters , Dina Hadžiosmanović , Francien Dechesne

DOI: 10.1007/S11948-015-9648-Y

关键词: Meaning (linguistics)Adversarial systemComputer securityEmerging technologiesField (Bourdieu)Philosophy of scienceSoftware deploymentEngineeringCyberspaceSocial experiment

摘要: Conceiving new technologies as social experiments is a means to discuss responsible deployment of that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in paradigm been mostly safety-related, meaning potential harm caused by design plus accidental events environment. In some domains, such cyberspace, adversarial agents (attackers) be at least important when it comes undesirable effects deployed technologies. cases, conditions for experimentation need implemented differently, attackers behave strategically rather than probabilistically. this contribution, we outline how aspects are already taken into account technology field cyber security, what can learn from this. particular, show importance roles with

参考文章(60)
Rop Gonggrijp, Willem-Jan Hengeveld, Studying the Nedap/Groenendaal ES3B voting computer: a computer security perspective usenix workshop on accurate electronic voting technology. pp. 1- 1 ,(2007)
Z. Robaey, Who owns hazard? The role of ownership in the GM social experiment The ethics of consumption: The citizen, the market and the law : EurSafe2013, Uppsala, Sweden, 11-14 September 2013, 2013, ISBN 978-90-8686-231-3, págs. 51-53. pp. 51- 53 ,(2013) , 10.3920/978-90-8686-784-4_7
Jukka Vuorinen, , Pekka Tetri, , The Order Machine – The Ontology of Information Security Journal of the Association for Information Systems. ,vol. 13, pp. 1- ,(2012) , 10.17705/1JAIS.00306
Per Sandin, Helena Röcklinsberg, The Ethics of Consumption Journal of Agricultural & Environmental Ethics. ,vol. 29, pp. 1- 4 ,(2016) , 10.1007/S10806-015-9588-1
Axel Rennoch, Ina Schieferdecker, Jürgen Großmann, Security Testing Approaches – For Research, Industry and Standardization International Conference on Trustworthy Computing and Services. pp. 397- 406 ,(2013) , 10.1007/978-3-662-43908-1_49
Henry Prakken, Dan Ionita, Roel Wieringa, Risk Assessment as an Argumentation Game CLIMA XIV Proceedings of the 14th International Workshop on Computational Logic in Multi-Agent Systems - Volume 8143. pp. 357- 373 ,(2013) , 10.1007/978-3-642-40624-9_22
George Huitema, Robin Hoenkamp, Adrienne de Moor-van Vugt, The Neglected Consumer: The Case of the Smart Meter Rollout in the Netherlands Social Science Research Network. ,(2011)
Wolter Pieters, Christian W. Probst, Zofia Lukszo, Lorena Montoya, Cost-effectiveness of Security Measures: A model-based Framework Approaches and processes for managing the economics of information systems. pp. 139- 156 ,(2014) , 10.4018/978-1-4666-4983-5.CH009
Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon, Code-Carrying Authorization european symposium on research in computer security. ,vol. 5283, pp. 563- 579 ,(2008) , 10.1007/978-3-540-88313-5_36
European Data Protection: Coming of Age European Data Protection: Coming of Age. pp. 451- 451 ,(2012) , 10.1007/978-94-007-5170-5