Human Aspect of Threat Analysis: A Replication

08/02/2022
by   Katja Tuma, et al.
0

Background: Organizations are experiencing an increasing demand for security-by-design activities (e.g., STRIDE analyses) which require a high manual effort. This situation is worsened by the current lack of diverse (and sufficient) security workforce and inconclusive results from past studies. To date, the deciding human factors (e.g., diversity dimensions) that play a role in threat analysis have not been sufficiently explored. Objective: To address this issue, we plan to conduct a series of exploratory controlled experiments. The main objective is to empirically measure the human-aspects that play a role in threat analysis alongside the more well-known measures of analysis performance. Method: We design the experiments as a differentiated replication of past experiments with STRIDE. The replication design is aimed at capturing some similar measures (e.g., of outcome quality) and additional measures (e.g., diversity dimensions). We plan to conduct the experiments in an academic setting. Limitations: Obtaining a balanced population (e.g., wrt gender) in advanced computer science courses is not realistic. The experiments we plan to conduct with MSc level students will certainly suffer this limitation.

READ FULL TEXT
research
08/02/2022

A replication of a controlled experiment with two STRIDE variants

To avoid costly security patching after software deployment, security-by...
research
02/01/2023

An exploratory study of diversity among computer science graduate students at top North American universities

Although different organizations have defined policies toward diversity ...
research
05/08/2020

Human Error in IT Security

This paper details on the analysis of human error, an IT security issue,...
research
08/03/2022

The Role of Diversity in Cybersecurity Risk Analysis: An Experimental Plan

Cybersecurity threat and risk analysis (RA) approaches are used to ident...
research
07/04/2021

Implicit Gender Bias in Computer Science – A Qualitative Study

Gender diversity in the tech sector is - not yet? - sufficient to create...
research
09/13/2022

An Overview of Phishing Victimization: Human Factors, Training and the Role of Emotions

Phishing is a form of cybercrime and a threat that allows criminals, phi...
research
03/10/2021

Financial factors selection with knockoffs: fund replication, explanatory and prediction networks

We apply the knockoff procedure to factor selection in finance. By build...

Please sign up or login with your details

Forgot password? Click here to reset