当前位置: X-MOL 学术Social Networks › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Building trust and co-designing a study of trust and co-operation: Observations from a network study in a high-risk, high-security environment
Social Networks ( IF 4.144 ) Pub Date : 2020-07-22 , DOI: 10.1016/j.socnet.2020.06.005
Laurin B. Weissinger

As part of a larger project on trust and co-operation in IT-Security, the author collected network data from an international security team specialized in cyber-incident response, leading to the only dataset of its kind. Collecting these data involved a number of challenges. First, the team in question had recently been established and was based in a large international firm. Thus, the author had to navigate legal and procedural issues, and stay on top of a changing environment. Second, actors in IT-Security are acutely aware of how data can be misused, requiring the author to build trust and demonstrate appropriate data handling. Attaining support from security managers was a key step to build trust with participants and the host organization. Third, precautions were necessary due to the project's security implications, as the study data could be abused by adversaries. Consequentially, it was necessary to engage in a co-design process, negotiating technical and procedural precautions. Not all measures initially agreed upon were feasible in practice.



中文翻译:

建立信任并共同设计信任与合作研究:高风险,高安全性环境中网络研究的观察结果

作为有关IT-Security中信任与合作的大型项目的一部分,作者从专门从事网络事件响应的国际安全团队收集了网络数据,从而获得了此类同类数据集。收集这些数据涉及许多挑战。首先,有关团队最近成立,并设在一家大型国际公司中。因此,作者不得不处理法律和程序问题,并时刻关注不断变化的环境。其次,IT-Security的参与者非常清楚如何滥用数据,要求作者建立信任并演示适当的数据处理。获得安全经理的支持是与参与者和主机组织建立信任的关键一步。第三,由于项目的安全隐患,必须采取预防措施,因为研究数据可能会被对手滥用。因此,有必要参与共同设计过程,就技术和程序上的预防措施进行谈判。并非所有最初商定的措施在实践中都是可行的。

更新日期:2020-07-22
down
wechat
bug