2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)最新文献

筛选
英文 中文
Controlled data sharing in E-health 电子保健中的受控数据共享
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059251
I. Matteucci, P. Mori, M. Petrocchi, Luca Wiegand
{"title":"Controlled data sharing in E-health","authors":"I. Matteucci, P. Mori, M. Petrocchi, Luca Wiegand","doi":"10.1109/STAST.2011.6059251","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059251","url":null,"abstract":"In the last few years, the necessity of having documents in electronic format has been growing over and over. This phenomenon affects also healthcare organizations that have adopted a new model for managing clinical information based on so called Electronic Patient Records. On the one hand, the introduction of such models allows to easily share information among several and widespread healthcare organizations. On the other hand, this arises several questions, like how to guarantee security requirements as, e.g., confidentiality, integrity, and privacy of the information shared. In this paper, we present a formal framework for specifying and analysing policies that regulate the information sharing, in such a way that the security requirements of the author of the policy are satisfied. In particular, we consider a set of authorization, obligation, and prohibition clauses aiming at preserving confidentiality, integrity, and privacy of the clinical data of a patient.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117151122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Trustworthy and effective communication of cybersecurity risks: A review 网络安全风险的可信与有效沟通:综述
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059257
Jason R. C. Nurse, S. Creese, M. Goldsmith, K. Lamberts
{"title":"Trustworthy and effective communication of cybersecurity risks: A review","authors":"Jason R. C. Nurse, S. Creese, M. Goldsmith, K. Lamberts","doi":"10.1109/STAST.2011.6059257","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059257","url":null,"abstract":"Slowly but surely, academia and industry are fully accepting the importance of the human element as it pertains to achieving security and trust. Undoubtedly, one of the main motivations for this is the increase in attacks (e.g., social engineering and phishing) which exploit humans and exemplify why many authors regard them as the weakest link in the security chain. As research in the socio-technical security and trust fields gains momentum, it is crucial to intermittently pause and reflect on their progress while also considering related domains to determine whether there are any established principles which may be transferred. Comparison of the states-of-the-arts may assist in planning work going forward and identifying useful future directions for the less mature socio-technical field. This paper seeks to fulfil several of these goals, particularly as they relate to the emerging cybersecurity-risk communication domain. The literature reviews which we conduct here are beneficial and indeed noteworthy as they pull together a number of the key aspects which may affect the trustworthiness and effectiveness of communications on cybersecurity risks. In particular, we draw on information-trustworthiness research and the established field of risk communication. An appreciation of these aspects and precepts is imperative if systems are to be designed that play to individuals' strengths and assist them in maintaining security and protecting their applications and information.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Security requirements engineering via commitments 通过承诺进行安全需求工程
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059249
F. Dalpiaz, E. Paja, P. Giorgini
{"title":"Security requirements engineering via commitments","authors":"F. Dalpiaz, E. Paja, P. Giorgini","doi":"10.1109/STAST.2011.6059249","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059249","url":null,"abstract":"Security Requirements Engineering (SRE) is concerned with the elicitation of security needs and the specification of security requirements of the system-to-be. Current approaches to SRE either express stakeholders' needs via high-level organisational abstractions that are hard to map to system design, or specify only technical security requirements. In this paper, we introduce SecCo, an SRE framework that starts with goal-oriented modelling of the security needs and derives security requirements from such needs. Importantly, SecCo relates security requirements to the interaction among actors. Security requirements are specified as social commitments — promises with contractual validity from one actor to another — that define constraints on the way actors can interact. These commitments shall be implemented by the system-to-be.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132642090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
User study of the improved Helios voting system interfaces 用户研究改进的Helios投票系统界面
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059254
Fatih Karayumak, M. Kauer, M. Olembo, Tobias Volk, M. Volkamer
{"title":"User study of the improved Helios voting system interfaces","authors":"Fatih Karayumak, M. Kauer, M. Olembo, Tobias Volk, M. Volkamer","doi":"10.1109/STAST.2011.6059254","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059254","url":null,"abstract":"There is increasing interest in cryptographic verifiability in remote electronic voting schemes. Helios is one example of an open-source implementation. In previous work, we proposed an improved version of the original Helios interface in version 3.1 for vote casting and individual verifiability. We now test this interface in a mock mayoral election set up with 34 users. Users are given instructions and fill out questionnaires before and after the vote casting process. Data on mouse movements and time is collected and a modified helmet with eye tracking lenses is used to capture eye movement data. The study shows that the interface is easy to use while people have difficulty understanding the motivation for and the concept of verifiability.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128003283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Information security as organizational power: A framework for re-thinking security policies 作为组织权力的信息安全:重新思考安全策略的框架
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059250
P. Inglesant, M. Sasse
{"title":"Information security as organizational power: A framework for re-thinking security policies","authors":"P. Inglesant, M. Sasse","doi":"10.1109/STAST.2011.6059250","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059250","url":null,"abstract":"Successful enforcement of information security requires an understanding of a complex interplay of social and technological forces. Drawing on socio-technical literature to develop an analytical framework, we examine the relationship between security policies and power in organizations. We use our framework to study three examples of security policy from a large empirical study n an international company. Each example highlights a different aspect of our framework. Our results, from in-depth interviews with 55 staff members at all levels, show that there is often non-compliance in the detail of organizational information security policies; this is not willful but is in response to shortcomings in the policy and to meet business needs. We conclude by linking our findings to recent research on the institutional economics of information security. We suggest ways in which our framework can be used by organizational decision-makers to review and re-think existing security policies.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130944657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On-line trust perception: What really matters 在线信任感知:真正重要的是什么
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059256
Elisa Costante, J. D. Hartog, M. Petkovic
{"title":"On-line trust perception: What really matters","authors":"Elisa Costante, J. D. Hartog, M. Petkovic","doi":"10.1109/STAST.2011.6059256","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059256","url":null,"abstract":"Trust is an essential ingredient in our daily activities. The fact that these activities are increasingly carried out using the large number of available services on the Internet makes it necessary to understand how users perceive trust in the online environment. A wide body of literature concerning trust perception and ways to model it already exists. A trust perception model generally lists a set of factors influencing a person trusting another person, a computer, or a website. Different models define different set of factors, but a single unifying model, applicable to multiple scenarios in different settings, is still missing. Moreover, there are no conclusions on the importance each factor has on trust perception. In this paper, we review the existing literature and provide a general trust perception model, which is able to measure the trustworthiness of a website. Such a model takes into account a comprehensive set of trust factors, ranking them based on their importance, and can be easily adapted to different application domains. A user study has been used to determine the importance, or weight, of each factor. The results of the study show evidence that such weight differs from one application domain (e.g. e-banking or e-health) to another. We also demonstrate that the weight of certain factors is related to the users knowledge in the IT Security field. This paper constitutes a first step towards the ability to measure the trustworthiness of a website, helping developers to create more trustworthy websites, and users to make their trust decisions when using on-line services.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
An approach to measure effectiveness of control for risk analysis with game theory 用博弈论衡量风险分析控制有效性的方法
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059252
Lisa Rajbhandari, E. Snekkenes
{"title":"An approach to measure effectiveness of control for risk analysis with game theory","authors":"Lisa Rajbhandari, E. Snekkenes","doi":"10.1109/STAST.2011.6059252","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059252","url":null,"abstract":"Security managers are facing problems choosing effective controls (countermeasures), as there is large number of controls at their disposal. Although the existing standards and methods provide guidance, they are not sufficiently comprehensive when it comes to deciding what attributes to look for and how to use them for determining the effectiveness of controls. The purpose of this paper is twofold: first we determine the attributes of controls and its measurement functions, in order to measure its effectiveness by means of Analytic Hierarchy Process (AHP). Secondly, we show how control metrics can be used by the analyst to make deployment decisions by means of Risk Analysis Using Game Theory (RAUGT). The approach is further validated by using a case study between a system owner who wants to determine the effectiveness of using the Password Testing System (PTS) to raise the bar for the attacker.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117064510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Camera use in the public domain: Towards a ”Big Sister” approach 相机在公共领域的使用:走向“大姐”的方式
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059253
M. V. D. Sar, I. Mulder, Sunil Choenni
{"title":"Camera use in the public domain: Towards a ”Big Sister” approach","authors":"M. V. D. Sar, I. Mulder, Sunil Choenni","doi":"10.1109/STAST.2011.6059253","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059253","url":null,"abstract":"The use of cameras is growing: not only personal computers and laptops are standard equipped with a camera, but also the public domain is increasingly equipped with cameras. Today's camera is not merely a pair of eyes. A surveillance camera can see much more than a single person can do. The rapid proliferation of camera technologies makes today's cameras beyond human vision. Although these cameras have a primarily goal to enforce public safety, the dark side of camera surveillance is often discussed. One could argue that such camera appearance affects human behavior. The current article reports how cameras influence people's behavior. Our findings are based on a set of exploratory studies. In line with other studies, we find that cameras do influence the behavior of people, and more surprisingly, they evoke emotions. On the basis of our findings, we discuss the potentials and pitfalls of the use of cameras in the public domain and propose a ‘Big Sister’ design approach to enhance public safety that brings value to the citizens and enlightens the dark side of camera surveillance.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信