Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making

Peter J. Caven, S. Gopavaram, L. Camp
{"title":"Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making","authors":"Peter J. Caven, S. Gopavaram, L. Camp","doi":"10.1109/MILCOM55135.2022.10017736","DOIUrl":null,"url":null,"abstract":"President Biden's Executive Order on Improving the Nation's Cybersecurity included two core components to enhance the security and integrity of the software supply chain: Labels and Software Bills of Materials. The National Institute of Standards and Technology (NIST) was tasked with establishing a security labeling program. Its initial design was based on Energy Star, a voluntary labeling program established by the Environmental Protection Agency (EPA) to allow businesses to communicate energy consumption information to consumers. Similarly, the National Telecommunications and Information Administration (NTIA) defined the minimum elements for the Software Bill of Materials (SBOM). These SBOMs are analogous to nutrition facts labels, as they detail all the software components used in a product. What combination of information, on labels or bills of materials, should be provided at each stage of the acquisition lifecycle? To answer this question we built on previous research on labels, procurement standards, best practices for IoT and software, and information proposed for labeling and SBOM programs. From that, we identified candidate features (and the purposes of those features) that were potentially salient during the acquisition process. We recruited participants from the Department of Defense community to sort those features according to their importance. We conclude that neither a single label nor a list of information can adequately support risk-informed decision-making across the acquisition process. We report how participants' information requirements correlated with their work roles. We offer recommendations for the next steps to design an effective label system to support cybersecurity-aware procurement.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM55135.2022.10017736","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

President Biden's Executive Order on Improving the Nation's Cybersecurity included two core components to enhance the security and integrity of the software supply chain: Labels and Software Bills of Materials. The National Institute of Standards and Technology (NIST) was tasked with establishing a security labeling program. Its initial design was based on Energy Star, a voluntary labeling program established by the Environmental Protection Agency (EPA) to allow businesses to communicate energy consumption information to consumers. Similarly, the National Telecommunications and Information Administration (NTIA) defined the minimum elements for the Software Bill of Materials (SBOM). These SBOMs are analogous to nutrition facts labels, as they detail all the software components used in a product. What combination of information, on labels or bills of materials, should be provided at each stage of the acquisition lifecycle? To answer this question we built on previous research on labels, procurement standards, best practices for IoT and software, and information proposed for labeling and SBOM programs. From that, we identified candidate features (and the purposes of those features) that were potentially salient during the acquisition process. We recruited participants from the Department of Defense community to sort those features according to their importance. We conclude that neither a single label nor a list of information can adequately support risk-informed decision-making across the acquisition process. We report how participants' information requirements correlated with their work roles. We offer recommendations for the next steps to design an effective label system to support cybersecurity-aware procurement.
整合人类智能绕过采购决策中的信息不对称
拜登总统关于改善国家网络安全的行政命令包括两个核心组成部分,以加强软件供应链的安全性和完整性:标签和软件材料清单。美国国家标准与技术研究所(NIST)的任务是建立一个安全标签计划。它最初的设计是基于“能源之星”,这是一个由环境保护署(EPA)建立的自愿标签计划,允许企业向消费者传达能源消耗信息。类似地,国家电信和信息管理局(NTIA)定义了软件物料清单(SBOM)的最小元素。这些soms类似于营养成分标签,因为它们详细说明了产品中使用的所有软件组件。在采购生命周期的每个阶段,应该提供标签或物料清单上的哪些信息组合?为了回答这个问题,我们基于之前对标签、采购标准、物联网和软件的最佳实践以及标签和SBOM计划提出的信息的研究。由此,我们确定了在获取过程中可能突出的候选功能(以及这些功能的目的)。我们从国防部招募了一些参与者,根据这些特征的重要性对它们进行分类。我们得出的结论是,在整个收购过程中,单个标签或信息列表都不能充分支持风险知情的决策。我们报告了参与者的信息需求如何与他们的工作角色相关联。我们为下一步设计一个有效的标签系统提供建议,以支持网络安全意识采购。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信