497
Views
5
CrossRef citations to date
0
Altmetric
Articles

An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense

&

REFERENCES

  • Ashwort, M. J. (1981). Computer-aided design of ship steering systems: an investigation into the manoeuvering control of marine vessels. (Doctoral dissertation). Cardiff University, Cardiff, UK.
  • Blowfield, M., and Murray, A. (2011). Corporate responsibility (2nd ed.). Oxford, UK: Oxford University Press.
  • Borshchev, A., and Filippov, A. (2004). From system dynamics and discrete event to practical agent based modeling: Reasons, techniques, tools. Proceedings of the 22nd International Conference of the System Dynamics Society, pp. 25–29.
  • Boyer, S. A. (2009). SCADA: Supervisory control and data acquisition (4th ed.). Research Triangle Park, NC: ISA Press.
  • Cardenas, A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., and Sastry, S. (2011). Attacks against process control systems: Risk assessment, detection, and response. 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS’11, Hong Kong.
  • Carvajal, R. (1983). Systemic netfields: The systems’ paradigm crisis. Part I. Human Relations, 36(3), 227–245.
  • Charitoudi, K., and Blyth, A. (2013). A socio-technical approach to cyber risk management and impact assessment. Journal of Information Security, 4(1), 33–41.
  • Dam, K. H., Nikolic, I., and Lukszo, Z. (2013). Agent-based modelling of socio-technical system. Berlin: Springer-Verlag.
  • Dewsbury, G., and Dobson, J. (2007). Responsibility and dependable systems (limited ed.). London: Springer.
  • Eom, J.-H., Kim, N.-U., Kim, S.-H., and Chung, T.-M. (2012). Cyber military strategy for cyberspace superiority in cyber warfare Cyber Security. International Conference on Cyber Warfare and Digital Forensic (CyberSec), pp. 295–299.
  • Farwell, J. P., and Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23–40.
  • Fox, W. (1995). Sociotechnical system principles and guidelines: Past and present. Journal of Applied Behavioral Science, 31(1), 91–105.
  • Futoransky, A., Notarfrancesco, L., Richarte, G., and Sarraute, C. (2010). Building computer network attacks. Journal: Computing Research Repository.
  • Golany, B., Kaplan, E. H., Marmur, A., and Rothblum, U. G. (2009). Nature plays with dice – terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 192 (1).
  • Heumann, T., Türpe, S., and Keller, J. (2010). Quantifying the attack surface of a Web application. In F. C. Freiling (Ed.), Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 170, pp. 305--316. Berlin. Retrieved from http://www.bibsonomy.org/bibtex/14a21691aa4532a4a7a35c0689aa157cd/dblp
  • Jajodia, S., Noel, S., Kalapa, P., Albanese, M., and Williams, J. (2011). Cauldron mission – centric cyber situational awareness with defense in depth. MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011, pp. 1339–1344.
  • Johnson, M. E. (Ed.). (2009). Managing information risk and the economics of security. Berlin: Springer.
  • Kay, J. (2002). On complexity theory, exergy and industrial ecology: Some implications for construction ecology. In C. Kibert, J. Sendzimir, and B. Guy (Eds.), Construction ecology: Nature as the basis for green buildings, 72–107. London, UK: Spon Press.
  • Klipper, S. (2011). Information security risk management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010. Praxis.
  • Koster, F., Klaas, M., Nguyen, H., Brandle, M., Obermeier, S., and Brenne, W. (2009). Collaboration in security assessments for critical infrastructures. Fourth International Conference on Critical Infrastructures, 2009 - CRIS 2009, pp. 1–7.
  • Landoll, D. (2011). The security risk assessment handbook: A complete guide for performing security risk assessments (2nd ed.). Boca Raton, FL: CRC Press.
  • Lewis, H. W., Budnitz, R. J., Rowe, W. D., Kouts, H. J. C., von Hippel, F., Loewenstein, W. B., and Zachariasen, F. (1978). Risk assessment review group report to the U.S. Nuclear Regulatory Commission. IEEE Transactions on Nuclear Science, 26(5), 4686–4690.
  • Lund, M. S., Solhaug, B., and Stølen, K. (2011). Model driven risk analysis. The CORAS approach. Berlin: Springer.
  • Macaulay, T. (2008). Critical infrastructure: Understanding its component parts, vulnerabilities, operating risks, and interdependencies. Boca Raton, FL: CRC Press.
  • Macaulay, T., and Singer, B. (2012). Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS. Boca Raton, FL: CRC Press Taylor & Francis Group.
  • Nicholson, A., Webber, S., Dyer, S., Patel, T., and Janicke, H. (2012). SCADA security in the light of cyber warfare. Computers & Security, 31(4), 418–436.
  • Periorellis, P., and Dobson, J. (2002). Organisational failures in dependable collaborative enterprise systems. Journal of Object Technology, 1, 107–117.
  • Russell, C. T., Antkiewicz, M., Florer, P., Widup, S., and Woodyard, M. (2013). How bad is it? – a branching activity model to estimate the impact of information security breaches. The Twelfth Workshop on the Economics of Information Security (WEIS 2013), Washington, DC, Georgetown University.
  • Schneier, B. (2008, January 18). The psychology of security. Retrieved from http://www.schneier.com/essay-155.html
  • Shalizi, R. C. (2006). Methods and techniques of complex systems science: An overview. In T. S. Deisboeck, and J. Y. Kresh (Eds.), Complex systems science in biomedicine, pp. 33–114. New York, NY: Springer.
  • Shoniregun, C. A. (2005). Impacts and risk assessment of technology for Internet security, Vol. 17. Berlin: Springer.
  • Sommestad, T., Ekstedt, M., and Holm, H. (2012). The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal, 7(3), 363–373.
  • St. Andrews University. (2011). Sociotechnical systems engineering handbook. Fife, Scotland: Author.
  • Sun, L., Srivastava, R. P., and Mock, T. J. (2006). An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22(4), 109–142.
  • Tipton, H., and Krause, M. (2004). Information security management handbook (5th ed.). Boca Raton, FL: Auerbach Publications.
  • Trist, E., and Bamforth, K. (1951). Some social and psychological consequences of the longwall method of coal getting. Human Relations, 4(1), 3–38.
  • Verendel, V. (2009). Quantified security is a weak hypothesis: A critical survey of results and assumptions. Proceedings of New Security Paradigms Workshop, pp. 37–50.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.