BAKE: a novel framework for iterative security design for identifying criminally-exploitable vulnerabilities in biotechnology products.

IF 2.6 Q1 CRIMINOLOGY & PENOLOGY
Crime Science Pub Date : 2025-01-01 Epub Date: 2025-10-02 DOI:10.1186/s40163-025-00256-8
Mariam Elgabry, Darren Nesbeth, Paul Ekblom, Shane Johnson
{"title":"BAKE: a novel framework for iterative security design for identifying criminally-exploitable vulnerabilities in biotechnology products.","authors":"Mariam Elgabry, Darren Nesbeth, Paul Ekblom, Shane Johnson","doi":"10.1186/s40163-025-00256-8","DOIUrl":null,"url":null,"abstract":"<p><p>Emerging \"in-body\" monitoring, such as via ingestible devices, promises the future of personalised health, yet discussions of crime and security implications remain of low priority. Here, we develop and deploy the scenario building of the Delphi process and the prototyping of the hackathon through a hybrid hackathon Delphi framework that we have labelled \"BAKE\". The aim of BAKE is to capture insight from experts regarding the risks posed by these devices; and to produce evidence for the utility of the model as a mechanism to identify at an early stage of design/development, criminally-exploitable vulnerabilities in biotechnology (bio-electronic devices), especially medical products/services. Findings from four expert groups include the identification of four crime forms (e.g., corporate exploitation, data breaches). Five secure by design principles (e.g., end-to-end encryption) and four governance mechanisms (e.g., independent body) were recognised. Four stakeholders were identified (e.g., technical, advocates for equitable treatment). Results indicate that the inclusion of non-traditional experts and early career researchers within the hackathon model can allow the identification of highly challenging threats within the cyber-physical device system. We demonstrated that hosting a hackathon with an embedded Delphi process can instigate secure by design thinking earlier in the product development life cycle of any emerging technology.</p>","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":"14 1","pages":"16"},"PeriodicalIF":2.6000,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12491385/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Crime Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1186/s40163-025-00256-8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2025/10/2 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 0

Abstract

Emerging "in-body" monitoring, such as via ingestible devices, promises the future of personalised health, yet discussions of crime and security implications remain of low priority. Here, we develop and deploy the scenario building of the Delphi process and the prototyping of the hackathon through a hybrid hackathon Delphi framework that we have labelled "BAKE". The aim of BAKE is to capture insight from experts regarding the risks posed by these devices; and to produce evidence for the utility of the model as a mechanism to identify at an early stage of design/development, criminally-exploitable vulnerabilities in biotechnology (bio-electronic devices), especially medical products/services. Findings from four expert groups include the identification of four crime forms (e.g., corporate exploitation, data breaches). Five secure by design principles (e.g., end-to-end encryption) and four governance mechanisms (e.g., independent body) were recognised. Four stakeholders were identified (e.g., technical, advocates for equitable treatment). Results indicate that the inclusion of non-traditional experts and early career researchers within the hackathon model can allow the identification of highly challenging threats within the cyber-physical device system. We demonstrated that hosting a hackathon with an embedded Delphi process can instigate secure by design thinking earlier in the product development life cycle of any emerging technology.

BAKE:用于识别生物技术产品中可被犯罪利用的漏洞的迭代安全设计的新框架。
新兴的“体内”监测,比如通过可食用的设备,为个性化健康的未来带来了希望,但关于犯罪和安全影响的讨论仍然不是很重要。在这里,我们开发和部署了Delphi过程的场景构建和编程马拉松的原型,通过一个混合编程马拉松Delphi框架,我们将其标记为“BAKE”。BAKE的目的是获取专家对这些设备带来的风险的见解;并为该模型的效用提供证据,作为一种机制,在设计/开发的早期阶段查明生物技术(生物电子装置),特别是医疗产品/服务中可被犯罪利用的漏洞。来自四个专家组的调查结果包括确定四种犯罪形式(例如,企业剥削、数据泄露)。五个安全设计原则(例如,端到端加密)和四个治理机制(例如,独立机构)得到认可。确定了四个利益攸关方(例如,技术、公平待遇倡导者)。结果表明,将非传统专家和早期职业研究人员纳入黑客马拉松模型可以识别网络物理设备系统中极具挑战性的威胁。我们证明,在任何新兴技术的产品开发生命周期早期,使用嵌入式Delphi流程举办黑客马拉松都可以通过设计思维促进安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Crime Science
Crime Science Social Sciences-Cultural Studies
CiteScore
11.90
自引率
8.20%
发文量
12
审稿时长
13 weeks
期刊介绍: Crime Science is an international, interdisciplinary, peer-reviewed journal with an applied focus. The journal''s main focus is on research articles and systematic reviews that reflect the growing cooperation among a variety of fields, including environmental criminology, economics, engineering, geography, public health, psychology, statistics and urban planning, on improving the detection, prevention and understanding of crime and disorder. Crime Science will publish theoretical articles that are relevant to the field, for example, approaches that integrate theories from different disciplines. The goal of the journal is to broaden the scientific base for the understanding, analysis and control of crime and disorder. It is aimed at researchers, practitioners and policy-makers with an interest in crime reduction. It will also publish short contributions on timely topics including crime patterns, technological advances for detection and prevention, and analytical techniques, and on the crime reduction applications of research from a wide range of fields. Crime Science publishes research articles, systematic reviews, short contributions and theoretical articles. While Crime Science uses the APA reference style, the journal welcomes submissions using alternative reference styles on a case-by-case basis.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信