Characterising assurance: scepticism and mistrust in cyber security

被引:3
|
作者
Spencer, Matt [1 ]
机构
[1] Univ Warwick, Ctr Interdisciplinary Methodol, Coventry, W Midlands, England
基金
英国科研创新办公室;
关键词
Cyber security; assurance; characterisation; mistrust; narrative; TECHNOLOGY; SCIENCE;
D O I
10.1080/17530350.2022.2098515
中图分类号
G [文化、科学、教育、体育]; C [社会科学总论];
学科分类号
03 ; 0303 ; 04 ;
摘要
This paper presents an analysis of recent transformations in cyber security assurance, a field of evaluation that aims to establish whether technical products are secure. I work from a set of narratives about problems with assurance, drawn from interviews with practitioners based in the UK. I focus on characterisation: the stories practitioners tell, the cast of characters that populate them, and how such stories act to problematise the domain. Mistrust, it is argued, can be understood in terms of the capacities of sceptical narratives to efface the power of security certifications to be taken on 'face value.' A text-based view of mistrust is thus developed that can be differentiated from the conventional disposition-centred view. Examining mistrust, then, leads us to ask not how to change dispositions to make them 'more trusting,' but rather to critical questions about the palette of characters that feature in cyber security. I close the essay by offering a commentary on the way characterisation leads to the anticipation of experts in formulations of policy and on the possible 'counter-characterisation' that might be developed, for instance around 'caring' characters.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning
    Cheng, Shi
    Qu, Yan
    Wang, Chuyue
    Wan, Jie
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2023, 15 (01)
  • [22] Cyber Security
    Welander, Peter
    CONTROL ENGINEERING, 2009, 56 (01) : 40 - 43
  • [23] Cyber security
    Colias, M
    HOSPITALS & HEALTH NETWORKS, 2004, 78 (05): : 60 - +
  • [24] Taxonomy of cyber security metrics to measure strength of cyber security
    Gupta Bhol S.
    Mohanty J.R.
    Kumar Pattnaik P.
    Materials Today: Proceedings, 2023, 80 : 2274 - 2279
  • [25] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [26] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [27] Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)
    Watters, Paul A.
    McCombie, Stephen
    Layton, Robert
    Pieprzyk, Josef
    JOURNAL OF MONEY LAUNDERING CONTROL, 2012, 15 (04): : 430 - +
  • [28] Supplier quality assurance: Mistrust, myths, misconception, misdirection and medicine
    Anand, KN
    TOTAL QUALITY MANAGEMENT, 1996, 7 (05): : 493 - 507
  • [29] Cyber Security without Cyber War
    O'Connell, Mary Ellen
    JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 187 - 209
  • [30] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188