C. Sample, T. Watson, Steve E. Hutchinson, B. Hallaq, Jennifer Cowley, C. Maple
{"title":"数据保真度:安全的软肋","authors":"C. Sample, T. Watson, Steve E. Hutchinson, B. Hallaq, Jennifer Cowley, C. Maple","doi":"10.1109/RCIS.2017.7956552","DOIUrl":null,"url":null,"abstract":"The events of 2016 created a growing concern over the weaponization of information. Weaponized information is actually a symptom of a larger problem, namely, data fidelity. This group of researchers began considering the impact and issues that associate with data fidelity in cyber security. Presently, a fundamental universal assumption existing in cyber security solutions is that the entered data being secured is an accurate, faithful representation of the actual events that are occurring in the real world. This assumption of data fidelity is present in every major cyber security product. This work-in-progress paper acknowledges the data fidelity problem, by providing a model that couples the data object with the environment in an attempt to reduce the potential for weaponized information, thereby improving data fidelity.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Data fidelity: Security's soft underbelly\",\"authors\":\"C. Sample, T. Watson, Steve E. Hutchinson, B. Hallaq, Jennifer Cowley, C. Maple\",\"doi\":\"10.1109/RCIS.2017.7956552\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The events of 2016 created a growing concern over the weaponization of information. Weaponized information is actually a symptom of a larger problem, namely, data fidelity. This group of researchers began considering the impact and issues that associate with data fidelity in cyber security. Presently, a fundamental universal assumption existing in cyber security solutions is that the entered data being secured is an accurate, faithful representation of the actual events that are occurring in the real world. This assumption of data fidelity is present in every major cyber security product. This work-in-progress paper acknowledges the data fidelity problem, by providing a model that couples the data object with the environment in an attempt to reduce the potential for weaponized information, thereby improving data fidelity.\",\"PeriodicalId\":193156,\"journal\":{\"name\":\"2017 11th International Conference on Research Challenges in Information Science (RCIS)\",\"volume\":\"94 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 11th International Conference on Research Challenges in Information Science (RCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RCIS.2017.7956552\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RCIS.2017.7956552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The events of 2016 created a growing concern over the weaponization of information. Weaponized information is actually a symptom of a larger problem, namely, data fidelity. This group of researchers began considering the impact and issues that associate with data fidelity in cyber security. Presently, a fundamental universal assumption existing in cyber security solutions is that the entered data being secured is an accurate, faithful representation of the actual events that are occurring in the real world. This assumption of data fidelity is present in every major cyber security product. This work-in-progress paper acknowledges the data fidelity problem, by providing a model that couples the data object with the environment in an attempt to reduce the potential for weaponized information, thereby improving data fidelity.