Cyber Security and Privacy Experiments: A Design and Reporting Toolkit

被引:5
|
作者
Coopamootoo, Kovila P. L. [1 ]
Gross, Thomas [1 ]
机构
[1] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
基金
欧洲研究理事会;
关键词
CONFIDENCE;
D O I
10.1007/978-3-319-92925-5_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cyber security increasingly flourishing into a scientific discipline, there has been a number of proposals to advance evidence-based research, ranging from introductions of evidence-based methodology [8], proposals to make experiments dependable [30], guidance for experiment design [8,38], to overviews of pitfalls to avoid when writing about experiments [42]. However, one is still given to wonder: What are the best practices in reporting research that act as tell-tale signs of reliable research. We aim at developing a set of indicators for complete reporting that can drive the quality of experimental research as well as support the reviewing process. As method, we review literature on key ingredients for sound experiment and studied fallacies and shortcomings in other fields. We draw on lessons learned and infuse them into indicators. We provide definition, reporting examples, importance and impact and guiding steps to be taken for each indicator. As results, we offer a toolkit with nine systematic indictors for designing and reporting experiments. We report on lessons and challenges from an initial sharing of this toolkit with the community. The toolkit is a valuable companion for researchers. It incites the consideration of scientific foundations at experiment design and reporting phases. It also supports program committees and reviewers in quality decisions, thereby impacting the state of our field.
引用
收藏
页码:243 / 262
页数:20
相关论文
共 50 条
  • [41] Cyber range design framework for cyber security education and training
    M. N. Katsantonis
    A. Manikas
    I. Mavridis
    D. Gritzalis
    International Journal of Information Security, 2023, 22 : 1005 - 1027
  • [42] Cyber range design framework for cyber security education and training
    Katsantonis, M. N.
    Manikas, A.
    Mavridis, I.
    Gritzalis, D.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1005 - 1027
  • [43] Privacy and security by design: Comparing the EU and Israeli approaches to embedding privacy and security
    Haber, Eldar
    Tamo-Larrieux, Aurelia
    COMPUTER LAW & SECURITY REVIEW, 2020, 37
  • [44] Achieving data security and privacy across healthcare applications using cyber security mechanisms
    Zhu, Shanying
    Saravanan, Vijayalakshmi
    Muthu, BalaAnand
    ELECTRONIC LIBRARY, 2020, 38 (5-6): : 979 - 995
  • [45] Between privacy and security: the factors that drive intentions to use cyber-security applications
    Chassidim, Hadas
    Perentis, Christos
    Toch, Eran
    Lepri, Bruno
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2021, 40 (16) : 1769 - 1783
  • [46] Editorial: Special issue on cyber security, privacy and ethics of information systems
    Acquisti, Alessandro
    Dinev, Tamara
    Keil, Mark
    INFORMATION SYSTEMS FRONTIERS, 2019, 21 (06) : 1203 - 1205
  • [47] Future connected vehicles: Communications demands, privacy and cyber-security
    Olovsson, Tomas
    Svensson, Tommy
    Wu, Jiaming
    COMMUNICATIONS IN TRANSPORTATION RESEARCH, 2022, 2
  • [48] A (lack of) review on Cyber-security and Privacy Concerns in Hearing Aids
    Katrakazas, Panagiotis
    Koutsouris, Dimitrios
    2018 31ST IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS (CBMS 2018), 2018, : 223 - 226
  • [49] Security and privacy in cloud-assisted cyber-physical systems
    Alcaraz, Cristina
    Huang, Xinyi
    Rome, Erich
    COMPUTER NETWORKS, 2018, 138 : 13 - 14
  • [50] Information Systems Development and Usage with Consideration of Privacy and Cyber Security Aspects
    Jablonski, Janusz
    Robak, Silva
    PROCEEDINGS OF THE 2019 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2019, : 547 - 554