358 results on '"Pieters, W."'
Search Results
2. Developing a Cyber Operations Computational Ontology
- Author
-
Maathuis, C, Pieters, W, and van den Berg, J
- Published
- 2018
3. Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures
- Author
-
Chockalingam, S., Pieters, W., Teixeira, A.M.H., Gelder, P.H.A.J.M. van, Chockalingam, S., Pieters, W., Teixeira, A.M.H., and Gelder, P.H.A.J.M. van
- Abstract
Item does not contain fulltext, Both intentional attacks and accidental technical failures can lead to abnormal behaviour in components of industrial control systems. In our previous work, we developed a framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two classes, including knowledge elicitation to construct the directed acyclic graph of BN models. In this paper, we add a systematic method for knowledge elicitation to construct the Conditional Probability Tables (CPTs) of BN models, thereby completing a holistic framework to distinguish between attacks and technical failures. In order to elicit reliable probabilities from experts, we need to reduce the workload of experts in probability elicitation by reducing the number of conditional probabilities to elicit and facilitating individual probability entry. We utilise DeMorgan models to reduce the number of conditional probabilities to elicit as they are suitable for modelling opposing influences i.e., combinations of influences that promote and inhibit the child event. To facilitate individual probability entry, we use probability scales with numerical and verbal anchors. We demonstrate the proposed approach using an example from the water management domain.
- Published
- 2023
4. Bias and noise in security risk assessments, an empirical study on the information position and confidence of security professionals
- Author
-
Wit, J.J. de, Pieters, W., Gelder, P.H.A.J.M. van, Wit, J.J. de, Pieters, W., and Gelder, P.H.A.J.M. van
- Abstract
06 juli 2023, Item does not contain fulltext, Professionals working in both the physical and cybersecurity domain need to assess and evaluate security risks. As information on risks in general and security risks in particular is often imperfect and intractable, these professionals are facing a challenge in judging both likelihood and consequences, but how much do their existing psychological biases play a role in these judgments? In this paper, we present new empirical evidence on the perception of the information position and confidence levels of security professionals, the influence of detailed information and the conjunction fallacy, and the level of noise in security assessments. This paper adds to the literature by examining, for the first time, risk assessments by professionals in realistic, real life, security cases. The results show clear indications for overconfidence, comparative ignorance, influence of the conjunction fallacy, and influence of individual experience on security decision making in the professional security domain. The observed phenomena might have far reaching effects on security risk management in organizations and society.
- Published
- 2023
5. Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures
- Author
-
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André M.H. (author), van Gelder, P.H.A.J.M. (author), Chockalingam, S. (author), Pieters, W. (author), Teixeira, André M.H. (author), and van Gelder, P.H.A.J.M. (author)
- Abstract
Both intentional attacks and accidental technical failures can lead to abnormal behaviour in components of industrial control systems. In our previous work, we developed a framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two classes, including knowledge elicitation to construct the directed acyclic graph of BN models. In this paper, we add a systematic method for knowledge elicitation to construct the Conditional Probability Tables (CPTs) of BN models, thereby completing a holistic framework to distinguish between attacks and technical failures. In order to elicit reliable probabilities from experts, we need to reduce the workload of experts in probability elicitation by reducing the number of conditional probabilities to elicit and facilitating individual probability entry. We utilise DeMorgan models to reduce the number of conditional probabilities to elicit as they are suitable for modelling opposing influences i.e., combinations of influences that promote and inhibit the child event. To facilitate individual probability entry, we use probability scales with numerical and verbal anchors. We demonstrate the proposed approach using an example from the water management domain., Safety and Security Science, Organisation & Governance
- Published
- 2023
- Full Text
- View/download PDF
6. Effectiveness of qualitative and quantitative security obligations
- Author
-
Pieters, W., Padget, J., Dechesne, F., Dignum, V., and Aldewereld, H.
- Published
- 2015
- Full Text
- View/download PDF
7. Hacken op het werk: Technologie, gedrag en veiligheid
- Author
-
Pieters, W. and Pieters, W.
- Abstract
Inaugural address, 24 maart 2022, Inaugural lecture, Contains fulltext : 248275.pdf (Author’s version postprint ) (Open Access)
- Published
- 2022
8. Security at the end of the tunnel: The anatomy of VPN mental models among experts and non-experts in a corporate context
- Author
-
Binkhorst, V., Fiebig, T., Krombholz, K., Pieters, W., Labunets, K., Binkhorst, V., Fiebig, T., Krombholz, K., Pieters, W., and Labunets, K.
- Abstract
31st USENIX Security Symposium ((August 10-12, 2022, Boston, MA, USA), Item does not contain fulltext, With the worldwide COVID-19 pandemic in 2020 and 2021 necessitating working from home, corporate Virtual Private Networks (VPNs) have become an important item securing the continued operation of companies around the globe. However, due to their different use case, corporate VPNs and how users interact with them differ from public VPNs, which are now commonly used by end-users. In this paper, we present a first explorative study of eleven experts' and seven non-experts' mental models in the context of corporate VPNs. We find a partial alignment of these models in the high-level technical understanding while diverging in important parameters of how, when, and why VPNs are being used. While, in general, experts have a deeper technical understanding of VPN technology, we also observe that even they sometimes hold false beliefs on security aspects of VPNs. In summary, we show that the mental models of corporate VPNs differ from those for related security technology, e.g., HTTPS. Our findings allow us to draft recommendations for practitioners to encourage a secure use of VPN technology (through training interventions, better communication, and system design changes in terms of device management). Furthermore, we identify avenues for future research, e.g., into experts' knowledge and balancing privacy and security between system operators and users.
- Published
- 2022
9. Vulnerabilities and responsibilities: dealing with monsters in computer security
- Author
-
Pieters, W. and Consoli, L.
- Published
- 2009
- Full Text
- View/download PDF
10. Hoe maak je je organisatie weerbaar?
- Author
-
Pieters, W.
- Subjects
Work, Health and Performance - Abstract
Contains fulltext : 240148.pdf (Publisher’s version ) (Open Access) 5 p.
- Published
- 2021
11. Individual preferences in security risk decision making: an exploratory study under security professionals
- Author
-
de Wit, J.J., Pieters, W., van Gelder, P.H.A.J.M., Passerini, Giorgio, Garzia, Fabio, and Lombardi, Mara
- Subjects
Decision biases ,Security risk assessment ,Probability neglect ,Risk management ,Preferences ,Decision making - Abstract
Risk assessments in the (cyber) security domain are often, if not always, based on subjective expert judgement. For the first time, to the best of our knowledge, the individual preferences of professionals from the security domain are studied. In on online survey they are asked to mention, rate and rank their preferences when assessing a security risk. The survey setup allows to differentiate between easily accessible or “on top of mind” attributes and guided or stimulated attributes. The security professionals are also challenged to both non-compensatory and compensatory decision making on the relevance of the attributes. The results of this explorative study indicate a clear difference and shift in the individual perceived relevance of attributes in these different settings. Another remarkable finding of this study is the predominant focus on impact attributes by the respondents and the less significant position of likelihood or probability. The majority of professionals seem to ignore likelihood in their security risk assessment. This might be due to so called probability neglect as introduced by other scholars. the security in organisations and society is depending on the assessment and judgement of these professionals, understanding their preferences and the influence of cognitive biases is paramount. This study contributes to this body of knowledge and might raise attention to this important topic in both the academic and professional security domain.
- Published
- 2021
12. Philosophy of security engineering
- Author
-
Pieters, W., Michelfelder, D.P., Doorn, N., Michelfelder, D.P., and Doorn, N.
- Subjects
Security engineering ,Engineering ,business.industry ,Engineering ethics ,business ,Work, Health and Performance - Abstract
Item does not contain fulltext In this contribution, we cover the major philosophical concepts describing the field of security engineering, drawing on literature from philosophy, criminology, and engineering disciplines, with a focus on computer science and cybersecurity. We show that security distinguishes itself as a topic in engineering because it entails a combination of (a) dealing with adversaries and adversarial risk, (b) the intricacies of non-functional requirements and associated verifiability problems, (c) poorly established guidelines for a "science of security" and associated metrics, and (d) a heavily politicized context. While outlining these topics, we will touch upon several key debates in the field, such as secret versus transparent security, and user versus designer responsibility.
- Published
- 2021
13. Vraag hackers om in te breken
- Author
-
Pieters, W.
- Subjects
Work, Health and Performance - Abstract
Item does not contain fulltext 1 p.
- Published
- 2021
14. Biases in security risk management: Do security professionals follow prospect theory in their decisions?
- Author
-
Wit, J.J. de, Pieters, W., Jansen, S.J.T., and Gelder, P.H.A.J.M. van
- Subjects
Decision biases ,Risk management ,Security ,Prospect theory ,Decision making ,Work, Health and Performance - Abstract
Security professionals play a decisive role in security risk decision making, with important implications for security in organisations and society. Because of this subjective input in security understanding possible biases in this process is paramount. In this paper, well known biases as observed and described in prospect theory are studied in individual security risk decision making by security professionals. To this end, we distributed a questionnaire among security professionals including both original dilemmas from prospect theory and dilemmas adapted to the context of incident prevention. It was hypothesised that security professionals dealing with risks and decision making under risk on an almost daily basis would or should be less vulnerable to decision biases involving risks, in particular when framed in terms of incident prevention. The results show that security professionals are vulnerable to decision biases at the same scale as lay people, but some biases are weaker when decision problems are framed in terms of security as opposed to monetary gains and losses. Of the individual characteristics defining experience, only the general education level observably affects vulnerability for biases in security decision making in this study. A higher general education level leads to a significantly higher vulnerability to decision biases. By highlighting the vulnerability of security professionals to decision biases, this study contributes essential awareness and knowledge for improved decision making, for example by different representation of probabilities and uncertainty., Journal of Integrated Security and Safety Science, Vol. 1 No. 1 (2021)
- Published
- 2021
15. Investigating the effect of security and privacy on IoT device purchase behaviour
- Author
-
Ho-Sam-Sooi, N., Pieters, W., Kroesen, M., Ho-Sam-Sooi, N., Pieters, W., and Kroesen, M.
- Abstract
Item does not contain fulltext, Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and assesses whether these effects are sensitive to framing, using a mixed methods approach. The first part of the study focuses on quantifying the effect of security and privacy compared to the effect of other device attributes such as price or functionality, by testing a causal model with choice models that have been developed from stated choice data. The second part aims to reveal the underlying mechanisms that determine the effect of privacy and security on purchase behaviour by means of a qualitative survey. The results suggest that security and privacy can strongly affect purchase behaviour, under the circumstances that privacyand security-related information is available and communicated in an understandable manner, allowing consumers to compare devices. Moreover, the results show that a description of security that focuses on gains is more effective in nudging consumers towards buying secure devices. Future efforts could build upon this study by comparing the effect of security and privacy to more device attributes, such as ease of use or cost reduction. The results can serve as a basis for interventions that nudge consumers towards buying more secure and privacy-friendly devices.
- Published
- 2021
16. Philosophy of security engineering
- Author
-
Michelfelder, D.P., Doorn, N., Pieters, W., Michelfelder, D.P., Doorn, N., and Pieters, W.
- Abstract
Item does not contain fulltext, In this contribution, we cover the major philosophical concepts describing the field of security engineering, drawing on literature from philosophy, criminology, and engineering disciplines, with a focus on computer science and cybersecurity. We show that security distinguishes itself as a topic in engineering because it entails a combination of (a) dealing with adversaries and adversarial risk, (b) the intricacies of non-functional requirements and associated verifiability problems, (c) poorly established guidelines for a "science of security" and associated metrics, and (d) a heavily politicized context. While outlining these topics, we will touch upon several key debates in the field, such as secret versus transparent security, and user versus designer responsibility.
- Published
- 2021
17. Risk personalization: Governing uncertain collective risk through individual decisions
- Author
-
Spruit, S.L., Bruijne, M.L.C. de, Pieters, W., Spruit, S.L., Bruijne, M.L.C. de, and Pieters, W.
- Abstract
Item does not contain fulltext, Individuals are regularly made responsible for risks they wish to take: one can consent to processing of personal data, and decide what to buy based on risk information on product labels. However, both large-scale processing of personal data and aggregated product choices may carry collective risks for society. In such situations, governance arrangements implying individual responsibility are at odds with uncertain collective risks from new technologies. We, therefore, investigate the governance challenges of what we call risk personalization: a form of governance for dealing with uncertain collective risks that allocates responsibility for governing those risks to individuals. We situate risk personalization at the intersection of two trends: governance of uncertain risk, and emphasis on individual responsibility. We then analyze three cases selected based on diversity: social media, nanomaterials, and Uber. Cross-case comparison highlights issues of risk personalization pertaining to (i) the nature of the risk, (ii) governance arrangements in place, and (iii) mechanisms for allocating responsibility to individuals. We identify governance challenges in terms of (i) meaningful choice, (ii) effectiveness in mitigating risk, and (iii) collective decision making capacity. We conclude that the risk personalization lens stimulates reflection on the effectiveness and legitimacy of risk governance in light of individual agency.
- Published
- 2021
18. An adversarial risk analysis framework for cybersecurity
- Author
-
Rios Insua, D., Couce Vieira, A., Rubio, J.A., Pieters, W., Labunets, K., Rasines, D.G., Rios Insua, D., Couce Vieira, A., Rubio, J.A., Pieters, W., Labunets, K., and Rasines, D.G.
- Abstract
Item does not contain fulltext, Risk analysis is an essential methodology for cybersecurity as it allows organizations to deal with cyber threats potentially affecting them, prioritize the defense of their assets, and decide what security controls should be implemented. Many risk analysis methods are present in cybersecurity models, compliance frameworks, and international standards. However, most of them employ risk matrices, which suffer shortcomings that may lead to suboptimal resource allocations. We propose a comprehensive framework for cybersecurity risk analysis, covering the presence of both intentional and nonintentional threats and the use of insurance as part of the security portfolio. A simplified case study illustrates the proposed framework, serving as template for more complex problems.
- Published
- 2021
19. Safe-by-design in engineering: An overview and comparative analysis of engineering disciplines
- Author
-
Gelder, P.H.A.J.M. van, Klaassen, P., Taebi, B., Walhout, B., Ommen, R. van, Poel, I. van de, Robaey, Z., Asveld, L., Balkenende, R., Hollmann, F., Kampen, E.J. van, Khakzad, N., Krebbers, R., Lange, J. de, Pieters, W., Terwel, K., Visser, E., Werff, T. van der, Jung, D., Gelder, P.H.A.J.M. van, Klaassen, P., Taebi, B., Walhout, B., Ommen, R. van, Poel, I. van de, Robaey, Z., Asveld, L., Balkenende, R., Hollmann, F., Kampen, E.J. van, Khakzad, N., Krebbers, R., Lange, J. de, Pieters, W., Terwel, K., Visser, E., Werff, T. van der, and Jung, D.
- Abstract
Contains fulltext : 237091.pdf (Publisher’s version ) (Open Access), In this paper, we provide an overview of how Safe-by-Design is conceived and applied in practice in a large number of engineering disciplines. We discuss the differences, commonalities, and possibilities for mutual learning found in those practices and identify several ways of putting those disciplinary outlooks in perspective. The considered engineering disciplines in the order of historically grown technologies are construction engineering, chemical engineering, aerospace engineering, urban engineering, software engineering, bio-engineering, nano-engineering, and finally cyber space engineering. Each discipline is briefly introduced, the technology at issue is described, the relevant or dominant hazards are examined, the social challenge(s) are observed, and the relevant developments in the field are described. Within each discipline the risk management strategies, the design principles promoting safety or safety awareness, and associated methods or tools are discussed. Possible dilemmas that the designers in the discipline face are highlighted. Each discipline is concluded by discussing the opportunities and bottlenecks in addressing safety. Commonalities and differences between the engineering disciplines are investigated, specifically on the design strategies for which empirical data have been collected. We argue that Safe-by-Design is best considered as a specific elaboration of Responsible Research and Innovation, with an explicit focus on safety in relation to other important values in engineering such as well-being, sustainability, equity, and affordability. Safe-by-Design provides for an intellectual venue where social science and the humanities (SSH) collaborate on technological developments and innovation by helping to proactively incorporate safety considerations into engineering practices, while navigating between the extremes of technological optimism and disproportionate precaution. As such, Safe-by-Design is also a practical tool for policymakers an
- Published
- 2021
20. Bayesian network model to distinguish between intentional attacks and accidental technical failures: A case study of floodgates
- Author
-
Chockalingam, S., Pieters, W., Teixeira, A., Gelder, P.H.A.J.M. van, Chockalingam, S., Pieters, W., Teixeira, A., and Gelder, P.H.A.J.M. van
- Abstract
Contains fulltext : 237105.pdf (Publisher’s version ) (Open Access), Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused by both (intentional) attacks and (accidental) technical failures. When operators notice abnormal behaviour, they should be able to distinguish between those two causes to take appropriate measures, because for example replacing a sensor in case of intentional incorrect sensor measurements would be ineffective and would not block corresponding the attack vector. In the previous work, we developed the attack-failure distinguisher framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two causes, including the knowledge elicitation method to construct the directed acyclic graph and conditional probability tables of BN models. As a full case study of the attack-failure distinguisher framework, this paper presents a BN model constructed to distinguish between attacks and technical failures for the problem of incorrect sensor measurements in floodgates, addressing the problem of floodgate operators. We utilised experts who associate themselves with the safety and/or security community to construct the BN model and validate the qualitative part of constructed BN model. The constructed BN model is usable in water management infrastructures to distinguish between intentional attacks and accidental technical failures in case of incorrect sensor measurements. This could help to decide on appropriate response strategies and avoid further complications in case of incorrect sensor measurements.
- Published
- 2021
21. Individual preferences in security risk decision making: an exploratory study under security professionals
- Author
-
de Wit, J.J. (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author), de Wit, J.J. (author), Pieters, W. (author), and van Gelder, P.H.A.J.M. (author)
- Abstract
Risk assessments in the (cyber) security domain are often, if not always, based on subjective expert judgement. For the first time, to the best of our knowledge, the individual preferences of professionals from the security domain are studied. In on online survey they are asked to mention, rate and rank their preferences when assessing a security risk. The survey setup allows to differentiate between easily accessible or “on top of mind” attributes and guided or stimulated attributes. The security professionals are also challenged to both non-compensatory and compensatory decision making on the relevance of the attributes. The results of this explorative study indicate a clear difference and shift in the individual perceived relevance of attributes in these different settings. Another remarkable finding of this study is the predominant focus on impact attributes by the respondents and the less significant position of likelihood or probability. The majority of professionals seem to ignore likelihood in their security risk assessment. This might be due to so called probability neglect as introduced by other scholars. the security in organisations and society is depending on the assessment and judgement of these professionals, understanding their preferences and the influence of cognitive biases is paramount. This study contributes to this body of knowledge and might raise attention to this important topic in both the academic and professional security domain., Safety and Security Science
- Published
- 2021
- Full Text
- View/download PDF
22. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
- Author
-
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André (author), van Gelder, P.H.A.J.M. (author), Chockalingam, S. (author), Pieters, W. (author), Teixeira, André (author), and van Gelder, P.H.A.J.M. (author)
- Abstract
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused by both (intentional) attacks and (accidental) technical failures. When operators notice abnormal behaviour, they should be able to distinguish between those two causes to take appropriate measures, because for example replacing a sensor in case of intentional incorrect sensor measurements would be ineffective and would not block corresponding the attack vector. In the previous work, we developed the attack-failure distinguisher framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two causes, including the knowledge elicitation method to construct the directed acyclic graph and conditional probability tables of BN models. As a full case study of the attack-failure distinguisher framework, this paper presents a BN model constructed to distinguish between attacks and technical failures for the problem of incorrect sensor measurements in floodgates, addressing the problem of floodgate operators. We utilised experts who associate themselves with the safety and/or security community to construct the BN model and validate the qualitative part of constructed BN model. The constructed BN model is usable in water management infrastructures to distinguish between intentional attacks and accidental technical failures in case of incorrect sensor measurements. This could help to decide on appropriate response strategies and avoid further complications in case of incorrect sensor measurements., Safety and Security Science, Organisation and Governance
- Published
- 2021
- Full Text
- View/download PDF
23. Investigating the effect of security and privacy on IoT device purchase behaviour
- Author
-
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author), Ho-Sam-Sooi, Nick (author), Pieters, W. (author), and Kroesen, M. (author)
- Abstract
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and assesses whether these effects are sensitive to framing, using a mixed methods approach. The first part of the study focuses on quantifying the effect of security and privacy compared to the effect of other device attributes such as price or functionality, by testing a causal model with choice models that have been developed from stated choice data. The second part aims to reveal the underlying mechanisms that determine the effect of privacy and security on purchase behaviour by means of a qualitative survey. The results suggest that security and privacy can strongly affect purchase behaviour, under the circumstances that privacy- and security-related information is available and communicated in an understandable manner, allowing consumers to compare devices. Moreover, the results show that a description of security that focuses on gains is more effective in nudging consumers towards buying secure devices. Future efforts could build upon this study by comparing the effect of security and privacy to more device attributes, such as ease of use or cost reduction. The results can serve as a basis for interventions that nudge consumers towards buying more secure and privacy-friendly devices., Organisation and Governance, Transport and Logistics
- Published
- 2021
- Full Text
- View/download PDF
24. The cyber insurance landscape
- Author
-
Insua, D.R., Baylon, C., Vila, J., Labunets, K., Pieters, W., Branley-Bell, D., Coventry, L., Briggs, P., Martínez, I., Sewnandan, J., Insua, D.R., Baylon, C., Vila, J., Labunets, K., Pieters, W., Branley-Bell, D., Coventry, L., Briggs, P., Martínez, I., and Sewnandan, J.
- Abstract
Item does not contain fulltext, This chapter provides an analysis of the cyber insurance landscape and begins with an overview of the cyber insurance ecosystem, presenting the cyber insurance life cycle and the main and secondary actors. It examines organisational decision-making involving cybersecurity and cyber insurance, both for companies as a whole and for Small and Medium Enterprises in particular. The chapter presents the cyber insurance ecosystem and discusses the different types of actors involved in the ecosystem and the relationships between them. Companies must make key investment decisions concerning cybersecurity measures on a regular basis, but there is a lack of research directly investigating how companies make these decisions, as identified by Weishaupl et al. There are many different processes influencing cybersecurity-related decisions inside a company. There are also many different factors, both internal and external, that can influence companies' cybersecurity decision-making and cyber insurance adoption. Many of impediments to cyber insurance adoption are problems that arise when companies try to buy cyber insurance.
- Published
- 2020
25. Mitigating cyberattack related domino effects in process plants via ICS segmentation
- Author
-
Arief, R., Khakzad, N., Pieters, W., Arief, R., Khakzad, N., and Pieters, W.
- Abstract
Item does not contain fulltext, Domino effects are high-impact phenomena that have caused catastrophic damage to several chemical and process plants around the world through secondary incidents caused by primary ones. With the increasing trend of cyberattacks targeting critical infrastructures, there is a concern that such cyberattacks may trigger domino effects, by manipulating industrial control systems in such a way that the physical consequences are likely to escalate. In this study, we have demonstrated that via network segmentation of industrial control systems, the plant robustness against cyberattack-related domino effects can be improved. To this end, a risk-based decision-making methodology is developed based on Bayesian network and graph theory to investigate and evaluate the robustness of segmentation alternatives. The application of the methodology to an illustrative case study shows the efficacy of the approach as a viable cyber risk mitigation measure in chemical and process plants.
- Published
- 2020
26. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review
- Author
-
Vervoort, T., De Oliveira, M.T., Pieters, W., Gelder, P.H.A.J.M. van, Olabarriaga, S.D., Marquering, H., Vervoort, T., De Oliveira, M.T., Pieters, W., Gelder, P.H.A.J.M. van, Olabarriaga, S.D., and Marquering, H.
- Abstract
Contains fulltext : 240214.pdf (Publisher’s version ) (Open Access), Cyberattacks against healthcare institutions threaten patient care. The risk of being targeted by a damaging attack is increased when medical devices are used which rely on unmaintained legacy software that cannot be replaced and may have publicly known vulnerabilities. This review aims to provide insight into solutions presented in the literature that mitigate risks caused by legacy software on medical devices. We performed a scoping review by categorising and analysing the contributions of a selection of articles, taken from a literature set discovered through bidirectional citation searching. We found 18 solutions, each fitting at least one of the categories of intrusion detection and prevention, communication tunnelling or hardware protections. Approaches taken include proxying Bluetooth communication through smartphones, behaviour-specification based anomaly detection and authenticating signals based on physical characteristics. These solutions are applicable to various use-cases, ranging from securing pacemakers to medical sensor networks. Most of the solutions are based on intrusion detection and on tunnelling insecure wireless communications. These technologies have distinct application areas, and the decision which one is most appropriate will depend on the type of medical device.
- Published
- 2020
27. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory
- Author
-
Wagen, W. van der, Pieters, W., Wagen, W. van der, and Pieters, W.
- Abstract
Item does not contain fulltext, Victims are often conceptualized as single, human and static entities with certain risk factors that make them more vulnerable and attractive for offenders. This framework is challenged by emerging forms of high-tech cybercrime, such as ransomware, botnets and virtual theft, in which the offender targets a composite of human, technical and virtual entities. This study critically assesses the current theorization of the cyber victim and offers an alternative approach. Drawing on actor-network theory and three empirical case studies, it analyses the cyber victim as a hybrid actor-network consisting of different entities that, together with the offender, make the victimization possible. The proposed concepts of victim composition, delegation and translation enable a more profound understanding of the hybrid and complex process of becoming a high-tech cyber victim. Keywords: cybercrime, cyber victimization, actor-network theory, botnet, ransomware, virtual theft.
- Published
- 2020
28. Effectiveness fettered by bureaucracy: Why surveillance technology is not evaluated
- Author
-
Cayford, M., Pieters, W., Cayford, M., and Pieters, W.
- Abstract
Item does not contain fulltext, The evaluation of the effectiveness of surveillance technology in intelligence agencies and oversight bodies is notably lacking. Assessments of surveillance technology concerning legal compliance, cost, and matters of privacy occupy a solid place, but effectiveness is rarely considered. Bureaucracy may explain this absence. Applying James Q. Wilson's observations on bureaucracy reveals that effectiveness is minimally treated because it is more difficult to evaluate than budget assessments and legal compliance, and because intelligence outcomes are unobservable and difficult to oversee. Effectiveness evaluation is thus fettered by bureaucracy. Considerations of bringing in effectiveness assessment must appreciate the realities of bureaucratic constraints to be successful.
- Published
- 2020
29. Risk Personalization: Governing Uncertain Collective Risk Through Individual Decisions
- Author
-
Spruit, S. (author), de Bruijne, M.L.C. (author), Pieters, W. (author), Spruit, S. (author), de Bruijne, M.L.C. (author), and Pieters, W. (author)
- Abstract
Individuals are regularly made responsible for risks they wish to take: one can consent to processing of personal data, and decide what to buy based on risk information on product labels. However, both large-scale processing of personal data and aggregated product choices may carry collective risks for society. In such situations, governance arrangements implying individual responsibility are at odds with uncertain collective risks from new technologies. We, therefore, investigate the governance challenges of what we call risk personalization: a form of governance for dealing with uncertain collective risks that allocates responsibility for governing those risks to individuals. We situate risk personalization at the intersection of two trends: governance of uncertain risk, and emphasis on individual responsibility. We then analyze three cases selected based on diversity: social media, nanomaterials, and Uber. Cross-case comparison highlights issues of risk personalization pertaining to (i) the nature of the risk, (ii) governance arrangements in place, and (iii) mechanisms for allocating responsibility to individuals. We identify governance challenges in terms of (i) meaningful choice, (ii) effectiveness in mitigating risk, and (iii) collective decision making capacity. We conclude that the risk personalization lens stimulates reflection on the effectiveness and legitimacy of risk governance in light of individual agency., Organisation and Governance
- Published
- 2020
- Full Text
- View/download PDF
30. Effectiveness fettered by bureaucracy–why surveillance technology is not evaluated
- Author
-
Cayford, M.R. (author), Pieters, W. (author), Cayford, M.R. (author), and Pieters, W. (author)
- Abstract
The evaluation of the effectiveness of surveillance technology in intelligence agencies and oversight bodies is notably lacking. Assessments of surveillance technology concerning legal compliance, cost, and matters of privacy occupy a solid place, but effectiveness is rarely considered. Bureaucracy may explain this absence. Applying James Q. Wilson’s observations on bureaucracy reveals that effectiveness is minimally treated because it is more difficult to evaluate than budget assessments and legal compliance, and because intelligence outcomes are unobservable and difficult to oversee. Effectiveness evaluation is thus fettered by bureaucracy. Considerations of bringing in effectiveness assessment must appreciate the realities of bureaucratic constraints to be successful., Safety and Security Science, Organisation and Governance
- Published
- 2020
- Full Text
- View/download PDF
31. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review
- Author
-
Tervoort, Tom (author), De Oliveira, Marcela Tuler (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author), Olabarriaga, Silvia Delgado (author), Marquering, Henk (author), Tervoort, Tom (author), De Oliveira, Marcela Tuler (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author), Olabarriaga, Silvia Delgado (author), and Marquering, Henk (author)
- Abstract
Cyberattacks against healthcare institutions threaten patient care. The risk of being targeted by a damaging attack is increased when medical devices are used which rely on unmaintained legacy software that cannot be replaced and may have publicly known vulnerabilities. This review aims to provide insight into solutions presented in the literature that mitigate risks caused by legacy software on medical devices. We performed a scoping review by categorising and analysing the contributions of a selection of articles, taken from a literature set discovered through bidirectional citation searching. We found 18 solutions, each fitting at least one of the categories of intrusion detection and prevention, communication tunnelling or hardware protections. Approaches taken include proxying Bluetooth communication through smartphones, behaviour-specification based anomaly detection and authenticating signals based on physical characteristics. These solutions are applicable to various use-cases, ranging from securing pacemakers to medical sensor networks. Most of the solutions are based on intrusion detection and on tunnelling insecure wireless communications. These technologies have distinct application areas, and the decision which one is most appropriate will depend on the type of medical device., Organisation and Governance, Safety and Security Science
- Published
- 2020
- Full Text
- View/download PDF
32. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations
- Author
-
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, J. (author), Maathuis, E.C. (author), Pieters, W. (author), and van den Berg, J. (author)
- Abstract
Cyber operations are relatively a new phenomenon of the last two decades. During that period, they have increased in number, complexity, and agility, while their design and development have been processes well kept under secrecy. As a consequence, limited data(sets) regarding these incidents are available. Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations (such as attack, target identification and selection, and collateral damage), still methodologies and models are needed in order to plan, execute, and assess them in a responsibly and legally compliant way. Based on these facts, it is the aim of this article to propose a model that i)) estimates and classifies the effects of cyber operations, and ii) assesses proportionality in order to support targeting decisions in cyber operations. In order to do that, a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical – military experts. The proposed model was evaluated on two cyber operations use cases in a focus group with four technical – military experts. Both the design and the results of the evaluation are revealed in this article., Information and Communication Technology, Organisation and Governance
- Published
- 2020
- Full Text
- View/download PDF
33. Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures
- Author
-
Chockalingam, S., Pieters, W., Teixeira, Andre M. H., Khakzad, N., van Gelder, P.H.A.J.M., Pym, David, Fila, Barbara, and Cybenko, George
- Subjects
Decision support system ,Computer science ,Technical failure ,Bayesian network ,Intentional Attack ,Technical Failure ,Industrial control system ,Formalism (philosophy of mathematics) ,Risk analysis (engineering) ,Bayesian Network ,Accidental ,Fishbone Diagram ,Security ,Ishikawa diagram ,Safety ,Knowledge elicitation - Abstract
Because of modern societies' dependence on industrial control systems, adequate response to system failures is essential. In order to take appropriate measures, it is crucial for operators to be able to distinguish between intentional attacks and accidental technical failures. However, adequate decision support for this matter is lacking. In this paper, we use Bayesian Networks (BNs) to distinguish between intentional attacks and accidental technical failures, based on contributory factors and observations (or test results). To facilitate knowledge elicitation, we use extended fishbone diagrams for discussions with experts, and then translate those into the BN formalism. We demonstrate the methodology using an example in a case study from the water management domain.
- Published
- 2019
34. CYBECO: Supporting cyber-insurance from a behavioural choice perspective
- Author
-
Vassileiadis, Nikos, Vieira, Aitor Couce, Insua, David Ríos, Chatzigiannakis, Vassilis, Tsekeridou, Sofia, Gómez, Yolanda, Vila, José, Labunets, K., Pieters, W., Briggs, Pamela, and Branley-Bell, Dawn
- Published
- 2019
35. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations
- Author
-
Maathuis, E.C., Pieters, W., van den Berg, Jan, and Gustafson, Stanley (Scott)
- Subjects
050502 law ,021110 strategic, defence & security studies ,Cyber warfare ,Targeting ,Process (engineering) ,Computer science ,Military advantage ,05 social sciences ,0211 other engineering and technologies ,Cyber weapons ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,Effects assessment ,Field (computer science) ,Cyberwarfare ,Risk analysis (engineering) ,Work (electrical) ,Collateral damage ,Cyber operations ,0505 law ,Military doctrine - Abstract
Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality. When planning and conducting them, military actors encounter difficulties since they lack methodologies and models that support their actions and assess their effects. To address these issues by tackling the underlying scientific and practical gap, this article proposes an assessment methodology for the intended and unintended effects of Cyber Operations, labeled as Military Advantage, Collateral Damage and Military Disadvantage, and aims at supporting the targeting process when engaging targets in Cyber Operations. To arrive at this methodology, an extensive review on literature, military doctrine and methodologies was conducted combined with two series of interviews with military commanders and field work in joint military exercises. The assessment methodology is proposed considering multidimensional factors, phases and steps in a technical - military approach. For validation, one realistic Cyber Operation case study was conducted in a focus group with nine military experts plus four face-to-face meetings with another four military experts.
- Published
- 2019
36. Atypical mitotic figures and the mitotic index in cervical intraepithelial neoplasia
- Author
-
Van Leeuwen, A. M., Burger, P. M., Pieters, W. J. L. M., and Hollema, H.
- Published
- 1995
- Full Text
- View/download PDF
37. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations
- Author
-
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, J. (author), Maathuis, E.C. (author), Pieters, W. (author), and van den Berg, J. (author)
- Abstract
Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality. When planning and conducting them, military actors encounter difficulties since they lack methodologies and models that support their actions and assess their effects. To address these issues by tackling the underlying scientific and practical gap, this article proposes an assessment methodology for the intended and unintended effects of Cyber Operations, labeled as Military Advantage, Collateral Damage and Military Disadvantage, and aims at supporting the targeting process when engaging targets in Cyber Operations. To arrive at this methodology, an extensive review on literature, military doctrine and methodologies was conducted combined with two series of interviews with military commanders and field work in joint military exercises. The assessment methodology is proposed considering multidimensional factors, phases and steps in a technical - military approach. For validation, one realistic Cyber Operation case study was conducted in a focus group with nine military experts plus four face-to-face meetings with another four military experts., Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public., Information and Communication Technology, Organisation and Governance
- Published
- 2019
- Full Text
- View/download PDF
38. CYBECO: Supporting cyber-insurance from a behavioural choice perspective
- Author
-
Vassileiadis, Nikos (author), Vieira, Aitor Couce (author), Insua, David Ríos (author), Chatzigiannakis, Vassilis (author), Tsekeridou, Sofia (author), Gómez, Yolanda (author), Vila, José (author), Labunets, K. (author), Pieters, W. (author), Briggs, Pamela (author), Branley-Bell, Dawn (author), Vassileiadis, Nikos (author), Vieira, Aitor Couce (author), Insua, David Ríos (author), Chatzigiannakis, Vassilis (author), Tsekeridou, Sofia (author), Gómez, Yolanda (author), Vila, José (author), Labunets, K. (author), Pieters, W. (author), Briggs, Pamela (author), and Branley-Bell, Dawn (author)
- Abstract
Organisation and Governance
- Published
- 2019
39. An Adversarial Risk Analysis Framework for Cybersecurity
- Author
-
Rios Insua, David (author), Couce-Vieira, Aitor (author), Rubio, Jose A. (author), Pieters, W. (author), Labunets, K. (author), G. Rasines, Daniel (author), Rios Insua, David (author), Couce-Vieira, Aitor (author), Rubio, Jose A. (author), Pieters, W. (author), Labunets, K. (author), and G. Rasines, Daniel (author)
- Abstract
Risk analysis is an essential methodology for cybersecurity as it allows organizations to deal with cyber threats potentially affecting them, prioritize the defense of their assets, and decide what security controls should be implemented. Many risk analysis methods are present in cybersecurity models, compliance frameworks, and international standards. However, most of them employ risk matrices, which suffer shortcomings that may lead to suboptimal resource allocations. We propose a comprehensive framework for cybersecurity risk analysis, covering the presence of both intentional and nonintentional threats and the use of insurance as part of the security portfolio. A simplified case study illustrates the proposed framework, serving as template for more complex problems., Organisation and Governance
- Published
- 2019
- Full Text
- View/download PDF
40. Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures
- Author
-
Chockalingam, S. (author), Pieters, W. (author), Teixeira, Andre M. H. (author), Khakzad, N. (author), van Gelder, P.H.A.J.M. (author), Chockalingam, S. (author), Pieters, W. (author), Teixeira, Andre M. H. (author), Khakzad, N. (author), and van Gelder, P.H.A.J.M. (author)
- Abstract
Because of modern societies' dependence on industrial control systems, adequate response to system failures is essential. In order to take appropriate measures, it is crucial for operators to be able to distinguish between intentional attacks and accidental technical failures. However, adequate decision support for this matter is lacking. In this paper, we use Bayesian Networks (BNs) to distinguish between intentional attacks and accidental technical failures, based on contributory factors and observations (or test results). To facilitate knowledge elicitation, we use extended fishbone diagrams for discussions with experts, and then translate those into the BN formalism. We demonstrate the methodology using an example in a case study from the water management domain., Safety and Security Science
- Published
- 2019
- Full Text
- View/download PDF
41. Comparison of Hydrofluoroalkane-Beclomethasone Dipropionate AutohalerTM with Budesonide TurbuhalerTM in Asthma Control
- Author
-
Worth, H., Muir, J. F., and Pieters, W. R.
- Published
- 2001
- Full Text
- View/download PDF
42. Developing a Cyber Operations Computational Ontology
- Author
-
Maathuis, E.C., Pieters, W., and van den Berg, Jan
- Subjects
Ontology ,Artificial Intelligence ,Cyber Warfare ,Cyber Security ,Cyber Operations ,Cyber Weapons - Abstract
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors. To tackle these issues, this article proposes a knowledge model for cyber operations implemented as a computational ontology following a design science approach grounded on extensive technical-military research. This model classifies the essential entities of cyber operations and is exemplified in three case studies. Validation results show that this model can be used to describe cyber operations clearly and concisely.
- Published
- 2018
43. Assement Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations
- Author
-
Maathuis, C.E., Pieters, W., and Berg, J. van den
- Subjects
Cyber warfare ,Targeting ,Collateral damage ,Military advantage ,Defence Research ,Cyber weapons ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Defence, Safety and Security ,Effects assessment ,Cyber operations - Abstract
Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality. When planning and conducting them, military actors encounter difficulties since they lack methodologies and models that support their actions and assess their effects. To address these issues by tackling the underlying scientific and practical gap, this article proposes an assessment methodology for the intended and unintended effects of Cyber Operations, labeled as Military Advantage, Collateral Damage and Military Disadvantage, and aims at supporting the targeting process when engaging targets in Cyber Operations. To arrive at this methodology, an extensive review on literature, military doctrine and methodologies was conducted combined with two series of interviews with military commanders and field work in joint military exercises. The assessment methodology is proposed considering multidimensional factors, phases and steps in a technical – military approach. For validation, one realistic Cyber Operation case study was conducted in a focus group with nine military experts plus four face-to-face meetings with another four military experts.
- Published
- 2018
44. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks
- Author
-
Bullée, Jan Willem Hendrik, Montoya, Lorena, Pieters, W., Junger, M., Hartel, P.H., and Industrial Engineering & Business Information Systems
- Subjects
Deception ,Social Engineering ,Information Security ,Literature study ,Persuasion ,UT-Hybrid-D - Abstract
The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineering attacks, (b) authority (1 of the 6 persuasion principles) is used considerably more often than others, and (c) single-principle attack steps occur more often than multiple-principle ones. The social engineers identified in the scenarios more often used persuasion principles compared to other social influences. The scenario analysis illustrates how to exploit the human element in security. The findings support the view that security mechanisms should include not only technical but also social countermeasures.
- Published
- 2018
45. Measuring the success of treatment for chronic obstructive pulmonary disease — patient, physician and healthcare payer perspectives
- Author
-
Van Der Molen, T., Pieters, W., Bellamy, D., and Taylor, R.
- Published
- 2002
- Full Text
- View/download PDF
46. C5a-induced migration of human monocytes is primed by dexamethasone.
- Author
-
Pieters, W R, Houben, L A, Koenderman, L, and Raaijmakers, J A
- Published
- 1995
- Full Text
- View/download PDF
47. Predictive Value of Human Papillomavirus Type for Histological Diagnosis of Women with Cervical Cytological Abnormalities.
- Author
-
Burger, M. P. M., Hollema, H, Pieters, W. J. L. M., and Quint, W. G. V.
- Published
- 1995
48. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory
- Author
-
van der Wagen, W. (Wytske), Pieters, W. (Wolter), van der Wagen, W. (Wytske), and Pieters, W. (Wolter)
- Abstract
Victims are often conceptualized as single, human and static entities with certain risk factors that make them more vulnerable and attractive for offenders. This framework is challenged by emerging forms of high-tech cybercrime, such as ransomware, botnets and virtual theft, in which the offender targets a composite of human, technical and virtual entities. This study critically assesses the current theorization of the cyber victim and offers an alternative approach. Drawing on actor-network theory and three empirical case studies, it analyses the cyber victim as a hybrid actor-network consisting of different entities that, together with the offender, make the victimization possible. The proposed concepts of victim composition, delegation and translation enable a more profound understanding of the hybrid and complex process of becoming a high-tech cyber victim. Keywords: cybercrime, cyber victimization, actor-network theory, botnet, ransomware, virtual theft.
- Published
- 2018
- Full Text
- View/download PDF
49. Developing a Cyber Operations Computational Ontology
- Author
-
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, J. (author), Maathuis, E.C. (author), Pieters, W. (author), and van den Berg, J. (author)
- Abstract
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors. To tackle these issues, this article proposes a knowledge model for cyber operations implemented as a computational ontology following a design science approach grounded on extensive technical-military research. This model classifies the essential entities of cyber operations and is exemplified in three case studies. Validation results show that this model can be used to describe cyber operations clearly and concisely., Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public., Information and Communication Technology, Organisation and Governance, Cyber Security
- Published
- 2018
50. Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment
- Author
-
Molin, E.J.E. (author), Meeuwisse, Kirsten (author), Pieters, W. (author), Chorus, C.G. (author), Molin, E.J.E. (author), Meeuwisse, Kirsten (author), Pieters, W. (author), and Chorus, C.G. (author)
- Abstract
It is often suggested in the literature that employees regard technical security measures (TSMs) as user-unfriendly, indicating a trade-off between security and usability. However, there is little empirical evidence of such a trade-off, nor about the strength of the associated negative correlation and the importance employees attach to both properties. This paper intends to fill these knowledge gaps by studying employees’ trade-offs concerning the usability and security of TSMs within a discrete choice experiment (DCE) framework. In our DCE, employees are asked to indicate the most preferred security packages that describe combinations of TSMs. In addition, security and usability perceptions of the security packages are explicitly measured and modelled. The models estimated from these observed responses indicate how each TSM affects perceived security, perceived usability and preference. The paper further illustrates how the modelling results can be applied to design highly secure packages that are still preferred by employees. The paper also makes a methodological contribution to the literature by introducing discrete choice experiments to the field of information security., Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public., Transport and Logistics, Safety and Security Science
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.