Filters








10,006 Hits in 11.0 sec

How do information security workers use host data? A summary of interviews with security analysts [article]

Robert A. Bridges and Michael D. Iannacone and John R. Goodall and Justin M. Beaver
2018 arXiv   pre-print
The interviews focused on the current practices and future desires of SOC operators about host-based data collection capabilities, what is learned from the data, what tools are used, and how tools are  ...  Forest-level takeaways from the interviews center on problems stemming from size of data, correlation of heterogeneous but related data sources, signal-to-noise ratio of data, and analysts' time.  ...  Acknowledgments The authors also thank all security analysts that agreed to participate in this study, and those individuals who helped with arranging the interviews.  ... 
arXiv:1812.02867v1 fatcat:2jbgor3fgzcctkfv2nkhikugjm

Forming IDEAS Interactive Data Exploration & Analysis System [article]

Robert A. Bridges, Maria A. Vincent, Kelly M. T. Huffer, John R. Goodall, Jessie D. Jamieson, Zachary Burch
2018 arXiv   pre-print
Our hypothesis is that arming the analyst with easy-to-use data science tools will increase their work efficiency, provide them with the ability to resolve hypotheses with scientific inquiry of their data  ...  Modern cyber security operations collect an enormous amount of logging and alerting data.  ...  In summary, analysts require scientific inquiry of their data to resolve hypotheses.  ... 
arXiv:1805.09676v2 fatcat:adc75rrkjjgp3fddxxpf3ifs5a

Toward a Deeper Understanding of Data Analysis, Sensemaking, and Signature Discovery [chapter]

Sheriff Jolaoso, Russ Burtner, Alex Endert
2015 Lecture Notes in Computer Science  
Data analysts are tasked with the challenge of transforming an abundance of data into knowledge and insights.  ...  We present the results of interviews and observations of analysts and scientists in four domains (Biology, Cyber Security, Intelligence Analysis, and Data Science).  ...  This research is part of the Signature Discovery Initiative at Pacific Northwest National Laboratory, conducted under the Laboratory Directed Research and Development Program at PNNL, a multi-program national  ... 
doi:10.1007/978-3-319-22668-2_36 fatcat:2w4hfq566fa4zcxaiaojva2eia

Documenting Data Production Processes: A Participatory Approach for Data Work [article]

Milagros Miceli, Tianling Yang, Adriana Alvarado Garcia, Julian Posada, Sonja Mei Wang, Marc Pohl, Alex Hanna
2022 arXiv   pre-print
We draw on participatory design and collaborate with data workers at two companies located in Bulgaria and Argentina, where the collection and annotation of data for machine learning are outsourced.  ...  Our investigation comprises 2.5 years of research, including 33 semi-structured interviews, five co-design workshops, the development of prototypes, and several feedback instances with participants.  ...  Our deepest gratitude goes to the workers and organizations that participated in this research.  ... 
arXiv:2207.04958v2 fatcat:bipo7rmdovdzxga46y6jogjnhi

Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice

Louise Axon, Bushra A AlAhmadi, Jason R C Nurse, Michael Goldsmith, Sadie Creese
2020 Journal of Cybersecurity  
We report on the results of a study consisting of an online survey (N = 20) and interviews (N = 21) with security practitioners working in a range of different SOCs.  ...  techniques currently used and identification of how sonification might work alongside and address challenges to using them.  ...  We describe how we used the survey and interviews to collect information on the current use of visual data presentation approaches in SOCs in section 'Exploring current approaches to data presentation  ... 
doi:10.1093/cybsec/tyaa004 dblp:journals/cybersecurity/AxonANGC20 fatcat:4hkaq6o6pzefzliu3pizbfi7b4

Computer Security for Data Collection Technologies

Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard Anderson, Franziska Roesner, Tadayoshi Kohno
2016 Proceedings of the Eighth International Conference on Information and Communication Technologies and Development - ICTD '16  
We conduct a detailed threat modeling exercise to inform our view on potential security threats, and then conduct and analyze a survey and interviews with technology experts in these organizations to ground  ...  This work, a collaboration between computer security and ICTD researchers, explores security and privacy attitudes, practices, and needs within organizations that use Open Data Kit (ODK), a prominent digital  ...  Acknowledgments The authors thank the survey and interview respondents that made this work possible.  ... 
doi:10.1145/2909609.2909660 dblp:conf/ictd/CobbSRARK16 fatcat:ao532r4ivzd2xbw63xi2khaw5y

Computer security for data collection technologies

Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard Anderson, Franziska Roesner, Tadayoshi Kohno
2018 Development Engineering  
We conduct a detailed threat modeling exercise to inform our view on potential security threats, and then conduct and analyze a survey and interviews with technology experts in these organizations to ground  ...  This work, a collaboration between computer security and ICTD researchers, explores security and privacy attitudes, practices, and needs within organizations that use Open Data Kit (ODK), a prominent digital  ...  Acknowledgments The authors thank the survey and interview respondents that made this work possible.  ... 
doi:10.1016/j.deveng.2017.12.002 pmid:30555887 pmcid:PMC6277821 fatcat:mx5xi726qne7zadezwtepubshq

SoK: Anatomy of Data Breaches

Hamza Saleem, Muhammad Naveed
2020 Proceedings on Privacy Enhancing Technologies  
We use information from a variety of sources to develop our breach workflows, however, we emphasize that for many data breaches, information about crucial steps was absent.  ...  For generalizability, we present a general workflow of 50 data breaches from 2015. Based on our data breach analysis, we develop requirements that organizations need to meet to thwart data breaches.  ...  Acknowledgment This work was partly supported by a Northrop Grumman Cybersecurity Research Consortium (NGCRC) grant.  ... 
doi:10.2478/popets-2020-0067 fatcat:5f3m3q72xvcnld25lu4bb6d7cm

Extracting Useful Information from Security Assessment Interviews

J.M. Stanton, I.J. Fagnot
2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)  
We conducted N=68 interviews with managers, employees, and information technologists in the course of conducting security assessments of 15 small-and medium-sized organizations.  ...  Assessment interviews provide a rich source of information about the security culture and norms of an organization; this information can complement and contextualize the traditional sources of security  ...  Using a "ground-up" approach, we have analyzed a large body of security assessment interviews with an eye towards systematic analysis and use of the data contained therein.  ... 
doi:10.1109/hicss.2006.180 dblp:conf/hicss/StantonF06 fatcat:wmkauvgkd5ctlbu4noze3q2fmy

Human-AI Collaboration in Data Science

Dakuo Wang, Justin D. Weisz, Michael Muller, Parikshit Ram, Werner Geyer, Casey Dugan, Yla Tausczik, Horst Samulowitz, Alexander Gray
2019 Proceedings of the ACM on Human-Computer Interaction  
We conducted interviews with 20 data scientists who work at a large, multinational technology company and practice data science in various business settings.  ...  Despite these concerns, they remained optimistic about their future job security due to a view that the future of data science work will be a collaboration between humans and AI systems, in which both  ...  Passi and Jackson examined how data science workers deal with rules with doing data science and concluded that most scholars use rules as a basis and framework ("rules-based") but not as a set of required  ... 
doi:10.1145/3359313 fatcat:slieqtiphjbxnlrz5h2dq3gcau

Data Analysts and Their Software Practices: A Profile of the Sabermetrics Community and Beyond

Justin Middleton, Emerson Murphy-Hill, Kathryn T. Stolee
2020 Proceedings of the ACM on Human-Computer Interaction  
Therefore, we ask: how does a community recontextualize software development through the unique pressures of their work?  ...  We explore how their work lives at the intersection of science and entertainment, and as a consequence, baseball data serves as an accessible yet deep subject to practice analytic skills.  ...  Any opinions, findings, conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the LAS and/or any agency or entity of the United  ... 
doi:10.1145/3392859 fatcat:qzg3yrwuhrarffd47s5awpanfy

Data Watch The American Time Use Survey

Daniel S Hamermesh, Harley Frazis, Jay Stewart
2005 Journal of Economic Perspectives  
Since the American Time Use Survey uses the Current Population Survey as a sampling frame, the ATUS data files contain the same demographic information as the CPS.  ...  It updates labor force status using an abbreviated version of the basic CPS questionnaire and also updates information on usual hours of work, class of worker, industry, occupation, earnings and school  ... 
doi:10.1257/0895330053148029 fatcat:vbvygthgtncetlslzhhgi3z3km

Revisiting Qualitative Data Reuse

Libby Bishop, Arja Kuula-Luumi
2017 SAGE Open  
We use two distinct data sources that quantify the scale, types, and trends of reuse of qualitative data: (a) downloads of archived data collections held at data repositories and (b) publication citations  ...  Although the focus of this article is on the United Kingdom, some discussion of the international environment is provided, together with data and examples of reuse at the Finnish Social Science Data Archive  ...  Declaration of Conflicting Interests The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.  ... 
doi:10.1177/2158244016685136 fatcat:tnjh45s2s5bsfeau2jnsbjjuk4

Automation and occupational mobility: A data-driven network model [article]

R. Maria del Rio-Chanona, Penny Mealy, Mariano Beguerisse-Díaz, Francois Lafond, J. Doyne Farmer
2020 arXiv   pre-print
In this paper, we develop a new data-driven model to analyze how workers move through an empirically derived occupational mobility network in response to automation scenarios which increase labor demand  ...  However, relatively little work has sought to take a more holistic view on the process of labor reallocation and how employment prospects are impacted as displaced workers transition into new jobs.  ...  This work was supported by Partners for a New Economy, the Oxford Martin School Programme on Technological and Economic Change, the Oxford Martin School Programme on the Post-Carbon Transition and Baillie  ... 
arXiv:1906.04086v3 fatcat:gbpp7igccrgp5e4zbx7xtckf2q

Text, Sound and Videotape: The Future of Qualitative Data in the Global Network

Louise Corti
1999 IASSIST Quarterly  
Text, Sound and Videotape: The Future of Qualitative Data in the Global Network  ...  How do we define qualitative data?  ...  This paper seeks to address a number of issues. From an archival point of view, how do qualitative data differ from quantitative data?  ... 
doi:10.29173/iq726 fatcat:qmz7gmhqibbvblx2icmzcye7fm
« Previous Showing results 1 — 15 out of 10,006 results