000000165 001__ 165
000000165 005__ 20130522141940.0
000000165 037__ $$aLERSSE-RefJnlPaper-2008-006
000000165 041__ $$aeng
000000165 100__ $$aKonstantin Beznosov
000000165 100__ $$aOlga Beznosova
000000165 245__ $$aOn the Imbalance of the Security Problem Space and its Expected Consequences
000000165 260__ $$c2008-09-21
000000165 520__ $$aPurpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the attacker-defender game, and to propose questions for future research. Design/methodology/approach – The decomposition of the attacker-defender game into technological, human, and social factors enables one to analyze the concentration of public research efforts by defenders. First, representative activities are selected, then each activity is mapped into the technological, human and social (THS) basis. Afterwards, citation databases are used to estimate the relative volume of publications on each selected activity in the science and engineering communities. Finally, drawing on a number of relevant theories in organizational theory, sociology, and political science, avenues for exploring the social dimension by the defenders are discussed. Findings – The analysis suggests that over 94 percent of the public research in computer security has been concentrated on technological advances. Yet attackers seem to employ more and more human and social factors in their attacks. The social organization of the attackers allows them to achieve the results not possible otherwise, shifting the balance in their favour. It is suggested that the scope of research should be broadened, to involve organizational behavior and structure as well as social capital aspects that are currently not high on computer security research agenda. Research limitations/implications – The queries limit the search to public content written in the English language only. Since the authors are concerned with the relative (rather than absolute) volume of each activity, it is an open question whether this limitation biases the results. Practical implications – As the arms race in computer security progresses, social factors may become or already are increasingly important. The side that capitalizes on them sooner may gain the competitive advantage. Originality/value – A simple method for gauging the focus of research efforts in the computer security community and for considering computer security problem space through the lens of social sciences is developed.
000000165 6531_ $$aComputer applications
000000165 6531_ $$aData security
000000165 6531_ $$aHuman failure
000000165 6531_ $$aHOT Admin
000000165 8560_ $$fqiangw@ece.ubc.ca
000000165 8564_ $$uhttp://lersse-dl.ece.ubc.ca/record/165/files/165.pdf$$yTransfer from CDS 0.99.7
000000165 909C4 $$pKonstantin Beznosov and Olga Beznosova, "On the Imbalance of the Security Problem Space and its Expected Consequences," Journal of Information Management & Computer Security, Emerald, vol. 15 n.5, September 2007, pp.420-431.
000000165 980__ $$aRefJnlPaper