• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用专家启发式方法在多学科背景下定义网络安全和网络安全风险。

Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation.

机构信息

O'Neill School of Public and Environmental Affairs, Indiana University, Bloomington, IN, USA.

出版信息

Risk Anal. 2022 Aug;42(8):1643-1669. doi: 10.1111/risa.13687. Epub 2021 Feb 14.

DOI:10.1111/risa.13687
PMID:33586204
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9543401/
Abstract

It is important to have and use standardized terminology and develop a comprehensive common understanding of what is meant by cyber security and cyber security risk given the multidisciplinary nature of cyber security and the pervasiveness of cyber security concerns throughout society. Using expert elicitation methods, collaborating cyber researchers from multiple disciplines and two sectors (academia, government-military) were individually interviewed and asked to define cyber security and cyber security risk. Data-driven thematic analysis was used to identify the most salient themes within each definition, sector, and cyber expert group as a whole with results compared to current standards definitions. Network analysis was employed to visualize the interconnection of salient themes within and across sectors and disciplines. When examined as a whole group, "context-driven," "resilient system functionality," and "maintenance of CIA (confidentiality, integrity, availability)" were the most salient themes and influential network nodes for the definition of cyber security, while "impacts of CIA vulnerabilities," "probabilities of outcomes," and "context-driven" were the most salient themes for cyber security risk. We used this expert elicitation process to develop comprehensive definitions of cyber security (cybersecurity) and cyber security risk that encompass the contextual frameworks of all the disciplines represented in the collaboration and explicitly incorporates human factors as significant cyber security risk factors.

摘要

鉴于网络安全的多学科性质和网络安全问题在整个社会的普遍存在,拥有并使用标准化术语并对网络安全和网络安全风险有一个全面的共同理解非常重要。研究人员采用专家启发式方法,对来自多个学科和两个领域(学术界、政府-军队)的合作网络研究人员进行了单独访谈,并要求他们定义网络安全和网络安全风险。使用数据驱动的主题分析方法,确定了每个定义、每个领域以及整个网络专家群体中最突出的主题,并将结果与当前的标准定义进行了比较。网络分析用于可视化各个领域和学科内部以及跨领域的突出主题之间的相互联系。当作为一个整体群体进行检查时,“上下文驱动”、“弹性系统功能”和“维护 CIA(机密性、完整性、可用性)”是网络安全定义中最突出的主题和有影响力的网络节点,而“CIA 漏洞的影响”、“结果的可能性”和“上下文驱动”是网络安全风险中最突出的主题。我们使用这种专家启发式方法来制定全面的网络安全(网络安全)和网络安全风险定义,这些定义涵盖了合作中所有学科的上下文框架,并明确将人为因素作为重要的网络安全风险因素。

相似文献

1
Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation.使用专家启发式方法在多学科背景下定义网络安全和网络安全风险。
Risk Anal. 2022 Aug;42(8):1643-1669. doi: 10.1111/risa.13687. Epub 2021 Feb 14.
2
Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.用于网络安全风险评估的恶意性特征描述与度量
Front Psychol. 2018 Feb 5;9:39. doi: 10.3389/fpsyg.2018.00039. eCollection 2018.
3
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
4
Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study.评估大型澳大利亚医疗保健环境中与网络安全相关的员工态度、意图和行为:混合方法研究。
JMIR Hum Factors. 2023 Oct 4;10:e48220. doi: 10.2196/48220.
5
Cyber security threats in the microbial genomics era: implications for public health.微生物基因组学时代的网络安全威胁:对公共卫生的影响。
Euro Surveill. 2020 Feb;25(6). doi: 10.2807/1560-7917.ES.2020.25.6.1900574.
6
Cybersecurity Challenges in Healthcare.医疗保健中的网络安全挑战。
Stud Health Technol Inform. 2022 Oct 26;300:190-202. doi: 10.3233/SHTI220951.
7
Security Requirements of Internet of Things-Based Healthcare System: a Survey Study.基于物联网的医疗保健系统的安全要求:一项调查研究。
Acta Inform Med. 2019 Dec;27(4):253-258. doi: 10.5455/aim.2019.27.253-258.
8
A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System.基于联合身份管理框架的数字医疗系统的网络风险评估方法
Sensors (Basel). 2024 Aug 15;24(16):5282. doi: 10.3390/s24165282.
9
Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.打破网络安全困境:协调安全需求与消除漏洞。
Sci Eng Ethics. 2014 Sep;20(3):701-15. doi: 10.1007/s11948-014-9551-y. Epub 2014 Apr 30.
10
Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.网络卫生方法在提高医疗机构网络安全和数据隐私意识中的应用:概念研究。
J Med Internet Res. 2023 Jul 27;25:e41294. doi: 10.2196/41294.

引用本文的文献

1
A taxonomy of cyber risk taxonomies.网络风险分类法的分类法。
Risk Anal. 2025 Feb;45(2):376-386. doi: 10.1111/risa.16629. Epub 2024 Aug 2.
2
Reconceptualizing cybersecurity awareness capability in the data-driven digital economy.在数据驱动的数字经济中重新认识网络安全意识能力。
Ann Oper Res. 2022 Aug 2:1-26. doi: 10.1007/s10479-022-04844-8.

本文引用的文献

1
Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.用于网络安全风险评估的恶意性特征描述与度量
Front Psychol. 2018 Feb 5;9:39. doi: 10.3389/fpsyg.2018.00039. eCollection 2018.
2
Cognitive biases and heuristics in medical decision making: a critical review using a systematic search strategy.医学决策中的认知偏差与启发式方法:运用系统检索策略的批判性综述
Med Decis Making. 2015 May;35(4):539-57. doi: 10.1177/0272989X14547740. Epub 2014 Aug 21.
3
Perception and communication of flood risks: a systematic review of empirical research.
洪水风险的感知和沟通:实证研究的系统综述。
Risk Anal. 2013 Jan;33(1):24-49. doi: 10.1111/j.1539-6924.2012.01844.x. Epub 2012 May 31.
4
Heuristic decision making.启发式决策。
Annu Rev Psychol. 2011;62:451-82. doi: 10.1146/annurev-psych-120709-145346.
5
Do doctors, nurses and managers have different thinking styles?医生、护士和管理人员的思维方式有差异吗?
Aust Health Rev. 2010 Aug;34(3):375-80. doi: 10.1071/AH09791.
6
Statistical illiteracy undermines informed shared decision making.统计知识的匮乏会破坏明智的共同决策。
Z Evid Fortbild Qual Gesundhwes. 2008;102(7):411-3. doi: 10.1016/j.zefq.2008.08.013.
7
Some limitations of "Risk = Threat x Vulnerability x Consequence" for risk analysis of terrorist attacks.“风险=威胁×脆弱性×后果”用于恐怖袭击风险分析的一些局限性。
Risk Anal. 2008 Dec;28(6):1749-61. doi: 10.1111/j.1539-6924.2008.01142.x. Epub 2008 Oct 16.
8
Judgment under Uncertainty: Heuristics and Biases.《不确定性下的判断:启发式与偏差》
Science. 1974 Sep 27;185(4157):1124-31. doi: 10.1126/science.185.4157.1124.
9
Interdisciplinary communication in the intensive care unit.重症监护病房中的跨学科交流。
Br J Anaesth. 2007 Mar;98(3):347-52. doi: 10.1093/bja/ael372. Epub 2007 Feb 1.