[HTML][HTML] Values and value conflicts in the context of OSINT technologies for cybersecurity incident response: A value sensitive design perspective

T Riebe, J Bäumler, MA Kaufhold, C Reuter - … Supported Cooperative Work …, 2023 - Springer
The negotiation of stakeholder values as a collaborative process throughout technology
development has been studied extensively within the fields of Computer Supported …

What's in a cyber threat intelligence sharing platform? A mixed-methods user experience investigation of MISP

B Stojkovski, G Lenzini, V Koenig, S Rivas - Proceedings of the 37th …, 2021 - dl.acm.org
The ever-increasing scale and complexity of cyber attacks and cyber-criminal activities
necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse …

Designing for ethical innovation: A case study on ELSI co-design in emergency

M Liegl, A Boden, M Büscher, R Oliphant… - International Journal of …, 2016 - Elsevier
The ever more pervasive 'informationalization'of crisis management and response brings
both unprecedented opportunities and challenges. Recent years have seen the emergence …

'We Do Not Have the Capacity to Monitor All Media': A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams

MA Kaufhold, T Riebe, M Bayer, C Reuter - Proceedings of the CHI …, 2024 - dl.acm.org
Computer Emergency Response Teams (CERTs) provide advisory, preventive and reactive
cybersecurity services for authorities, citizens, and businesses. However, their responsibility …

Employing llms for incident response planning and review

S Hays, DJ White - arXiv preprint arXiv:2403.01271, 2024 - arxiv.org
Incident Response Planning (IRP) is essential for effective cybersecurity management,
requiring detailed documentation (or playbooks) to guide security personnel during …

Call to action: Mobilizing community discussion to improve information-sharing about vulnerabilities in industrial control systems and critical infrastructure

D Kapellmann, R Washburn - 2019 11th International …, 2019 - ieeexplore.ieee.org
Vulnerability management remains a significant challenge for organizations that handle
critical infrastructure worldwide. Hallmark cyber-physical incidents with disruptive and …

Judgment call the game: Using value sensitive design and design fiction to surface ethical concerns related to technology

S Ballard, KM Chappell, K Kennedy - Proceedings of the 2019 on …, 2019 - dl.acm.org
Artificial intelligence (AI) technologies are complex socio-technical systems that, while
holding much promise, have frequently caused societal harm. In response, corporations …

Privacy concerns and acceptance factors of osint for cybersecurity: A representative survey

T Riebe - Technology Assessment of Dual-Use ICTs: How to …, 2023 - Springer
Abstract The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity
threats is gaining popularity among many organizations. This is especially relevant to …

Determining system requirements for human-machine integration in cyber security incident response

MM Nyre-Yu - 2019 - search.proquest.com
In 2019, cyber security is considered one of the most significant threats to the global
economy and national security. Top US agencies have acknowledged this fact, and …

How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study

SRBM Kassim, S Li, B Arief - Cyber Security: A Peer-Reviewed …, 2022 - ingentaconnect.com
Computer security incident response teams (CSIRTs) have been established at national and
organisational levels to coordinate responses to computer security incidents. It is known that …