121 research outputs found

    Reve\{a,i\}ling the risks: a phenomenology of information security

    Get PDF
    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we distinguish between revealed and reveiled security instead. Linking these notions with the concepts of confidence and trust, we are able to give a phenomenological explanation of the electronic voting controversy in the Netherlands

    Informational precaution

    Get PDF
    In environmental ethics, the precautionary principle states that parties should refrain from actions in the face of scientific uncertainties about serious or irreversible harm to public health or the environment. A similar principle is lacking when judging effects of information technology. Such a principle would be helpful in guiding discussions, and that is why we try to develop a precautionary principle for information technology in this paper.\ud \ud As the effects of information technology are primarily social, social sustainability would be a key concept in developing the principle, where environmental sustainability fulfils this role in the traditional one. However, present definitions of social sustainability often consider it as an additional condition for environmental sustainability, rather than as an end in itself. Social sustainability, as meant in this paper, is the property of a development that it safeguards the continuity and stability of a social system. This may include maintaining trust and power relations in society. Based on this definition of social sustainability, we establish a precautionary principle with respect to the social sustainability of information technology.\ud \ud The principle of informational precaution, as we call it, aims at protecting the social environment of technology by providing information security, just as the traditional precautionary principle aims at protecting the natural environment of technology by providing physical, chemical and biological safety. By providing causal insulation in the infosphere, i.e. separation of pieces of information, information technology may be able to protect the social environment. The principle of informational precaution then states that people should refrain from changing causal insulations in the infosphere, if there is uncertainty about possible serious or irreversible harm to society.\u

    Explanation and trust: what to tell the user in security and AI?

    Get PDF
    There is a common problem in artificial intelligence (AI) and information security. In AI, an expert system needs to be able to justify and explain a decision to the user. In information security, experts need to be able to explain to the public why a system is secure. In both cases, the goal of explanation is to acquire or maintain the users' trust. In this paper, we investigate the relation between explanation and trust in the context of computing science. This analysis draws on literature study and concept analysis, using elements from system theory as well as actor-network theory. We apply the conceptual framework to both AI and information security, and show the benefit of the framework for both fields by means of examples. The main focus is on expert systems (AI) and electronic voting systems (security). Finally, we discuss consequences of our analysis for ethics in terms of (un)informed consent and dissent, and the associated division of responsibilities

    The Precautionary Principle in a World of Digital Dependencies

    Get PDF
    As organizations become deperimeterized, a new paradigm in software engineering ethics becomes necessary. We can no longer rely on an ethics of consequences, but might instead rely on the precautionary principle, which lets software engineers focus on creating a more extensive moral framework.\u

    Cloud security in vogelvlucht

    Get PDF
    Cloud computing is dé hype in IT op het moment, en hoewel veel aspecten niet nieuw zijn, leidt het concept wel tot de noodzaak voor nieuwe vormen van beveiliging. Het idee van cloud computing biedt echter ook juist kansen om hierover na te denken: wat is de rol van informatiebeveiliging in een wereldwijd netwerk van afhankelijkheden? Op een workshop in Brussel in januari 2010 kwamen experts uit technische, juridische en filosofische hoek bijeen om hierover van gedachten te wisselen. Binnenkort verschijnen de bijbehorende artikelen in het boek “Computers, privacy and data protection: an element of choice” (Gutwirth et al., 2011). Ter gelegenheid daarvan een overzicht over het thema

    High security, human significance: Informatiebeveiliging in Twente

    Get PDF
    De Universiteit Twente staat voor high tech en human touch, en dat laat ook het security-onderzoek zien. Dat de mens de zwakste schakel is wisten we natuurlijk al, maar de interactie tussen beveiligingstechniek en samenleving gaat verder dan dat. Hoe kunnen we informatiebeveiliging inzetten om maatschappelijke problemen aan te pakken? Hoe zorgen we dat de ingezette technieken geen nieuwe vormen van misbruik uitlokken? En hoe kunnen we iets zinnigs zeggen over de veiligheid van systemen inclusief de sociale omgeving in organisaties

    Laptop theft: a case study on effectiveness of security mechanisms in open organizations

    Get PDF
    Organizations rely on physical, technical and procedural mechanisms to protect their physical assets. Of all physical assets, laptops are the probably the most troublesome to protect, since laptops are easy to remove and conceal. Organizations open to the public, such as hospitals and universities, are easy targets for laptop thieves, since every day hundreds of people not employed by the organization wander in the premises. The problem security professionals face is how to protect the laptops in such open organizations. \ud \ud In this study, we look at the eectiveness of the security mechanisms against laptop theft in two universities. We analyze the logs from laptop thefts in both universities and complement the results with penetration tests. The results from the study show that surveillance cameras and access control have a limited role in the security of the organization and that the level of security awareness of the employees plays the biggest role in stopping theft. The results of this study are intended to aid security professionals in the prioritization of security mechanisms

    Portunes: analyzing multi-domain insider threats

    Get PDF
    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides, as well as existing relationships with employees. To secure a system, security professionals should therefore consider attacks that include non-digital aspects such as key sharing or exploiting trust relationships among employees. In this paper, we present Portunes, a framework for security design and audit, which incorporates three security domains: (1) the security of the computer system itself (the digital domain), (2) the security of the location where the system is deployed (the physical domain) and (3) the security awareness of the employees that use the system (the social domain). The framework consists of a model, a formal language and a logic. It allows security professionals to formally model elements from the three domains in a single framework, and to analyze possible attack scenarios. The logic enables formal specification of the attack scenarios in terms of state and transition properties

    Benefits of Location-Based Access Control:A Literature Study

    Get PDF
    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud (i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud (iii) formulating design criteria for facilities and working environments for optimal LBAC usage

    Game mechanics and technological mediation: an ethical perspective on the effects of MMORPG’s

    Get PDF
    <p>In the past decades, video games have grown from a niche market to one of the major entertainment media, enticing millions of players worldwide. When ethical aspects of video games are being debated, the discussion oftentimes revolves around effects of their content, such as violence. This paper argues that effects of game mechanics, such as reward mechanisms, should be considered as well, as these are at the core of the appeal of games. We analyze the ethical dimension of behavioral game design present in Massively Multiplayer Online Role Playing Games (MMORPG’s). Using the framework of technological mediation, we show how opaque and seductive game mechanics can invite problematic usage patterns, such as excessive use with negative effects on well-being, and how designers can take responsibility for morally acceptable impact of their games. Having a practical focus, the paper concludes with several proposals for better design.</p
    corecore