Privacy Risk in Cybersecurity Data Sharing

被引:13
作者
Bhatia, Jaspreet [1 ]
Breaux, Travis D. [1 ]
Friedberg, Liora [2 ]
Hibshi, Hanan [1 ,3 ]
Smullen, Daniel [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Univ Penn, Philadelphia, PA 19104 USA
[3] King Abdulaziz Univ, Coll Comp, Jeddah, Saudi Arabia
来源
WISCS'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON INFORMATION SHARING AND COLLABORATIVE SECURITY | 2016年
关键词
Cybersecurity data sharing; risk perception; data usage; personal privacy; COLLECTION;
D O I
10.1145/2994539.2994541
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As information systems become increasingly interdependent, there is an increased need to share cybersecurity data across government agencies and companies, and within and across industrial sectors. This sharing includes threat, vulnerability and incident reporting data, among other data. For cyberattacks that include socio-technical vectors, such as phishing or watering hole attacks, this increased sharing could expose customer and employee personal data to increased privacy risk. In the US, privacy risk arises when the government voluntarily receives data from companies without meaningful consent from individuals, or without a lawful procedure that protects an individual's right to due process. In this paper, we describe a study to examine the trade-off between the need for potentially sensitive data, which we call incident data usage, and the perceived privacy risk of sharing that data with the government. The study is comprised of two parts: a data usage estimate built from a survey of 76 security professionals with mean eight years' experience; and a privacy risk estimate that measures privacy risk using an ordinal likelihood scale and nominal data types in factorial vignettes. The privacy risk estimate also factors in data purposes with different levels of societal benefit, including terrorism, imminent threat of death, economic harm, and loss of intellectual property. The results show which data types are high-usage, low-risk versus those that are low-usage, high-risk. We discuss the implications of these results and recommend future work to improve privacy when data must be shared despite the increased risk to privacy.
引用
收藏
页码:57 / 64
页数:8
相关论文
共 27 条
[1]  
[Anonymous], 2016, IEEE 24 INT REQ ENG
[2]  
[Anonymous], 2016, GLOB STAT INF SEC SU
[3]  
[Anonymous], INT SEC THREAT REP 2
[4]  
[Anonymous], FACT SHEET ADM CYB E
[5]  
[Anonymous], 2014, P 2014 ACM WORKSH IN
[6]  
[Anonymous], 2015 INT CRIM REP
[7]  
[Anonymous], 2012, NIST SPEC PUBL, DOI DOI 10.6028/NIST.SP.800-61R2
[8]  
[Anonymous], 2005, Productivity
[9]  
Auspurg Katrin., 2014, Factorial Survey Experiments
[10]  
Baird JohnC., 1978, FUNDAMENTALS SCALING