Searched for: author%3A%22Pieters%2C+W.%22
(1 - 20 of 33)

Pages

document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André M.H. (author), van Gelder, P.H.A.J.M. (author)
Both intentional attacks and accidental technical failures can lead to abnormal behaviour in components of industrial control systems. In our previous work, we developed a framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two classes, including knowledge elicitation to construct the directed...
journal article 2023
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André (author), van Gelder, P.H.A.J.M. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
journal article 2021
document
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author)
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and...
journal article 2021
document
de Wit, J.J. (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author)
Risk assessments in the (cyber) security domain are often, if not always, based on subjective expert judgement. For the first time, to the best of our knowledge, the individual preferences of professionals from the security domain are studied. In on online survey they are asked to mention, rate and rank their preferences when assessing a...
conference paper 2021
document
Spruit, S. (author), de Bruijne, M.L.C. (author), Pieters, W. (author)
Individuals are regularly made responsible for risks they wish to take: one can consent to processing of personal data, and decide what to buy based on risk information on product labels. However, both large-scale processing of personal data and aggregated product choices may carry collective risks for society. In such situations, governance...
journal article 2020
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber operations are relatively a new phenomenon of the last two decades. During that period, they have increased in number, complexity, and agility, while their design and development have been processes well kept under secrecy. As a consequence, limited data(sets) regarding these incidents are available. Although various academic and...
journal article 2020
document
Cayford, M.R. (author), Pieters, W. (author)
The evaluation of the effectiveness of surveillance technology in intelligence agencies and oversight bodies is notably lacking. Assessments of surveillance technology concerning legal compliance, cost, and matters of privacy occupy a solid place, but effectiveness is rarely considered. Bureaucracy may explain this absence. Applying James Q....
journal article 2020
document
Tervoort, Tom (author), Tuler de Oliveira, M. (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author), Olabarriaga, Silvia Delgado (author), Marquering, Henk (author)
Cyberattacks against healthcare institutions threaten patient care. The risk of being targeted by a damaging attack is increased when medical devices are used which rely on unmaintained legacy software that cannot be replaced and may have publicly known vulnerabilities. This review aims to provide insight into solutions presented in the...
journal article 2020
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality. When planning and conducting them, military actors encounter difficulties since they lack methodologies and models that support their actions and assess their effects. To address these issues by tackling the underlying scientific and practical gap, this...
conference paper 2019
document
Rios Insua, David (author), Couce-Vieira, Aitor (author), Rubio, Jose A. (author), Pieters, W. (author), Labunets, K. (author), G. Rasines, Daniel (author)
Risk analysis is an essential methodology for cybersecurity as it allows organizations to deal with cyber threats potentially affecting them, prioritize the defense of their assets, and decide what security controls should be implemented. Many risk analysis methods are present in cybersecurity models, compliance frameworks, and international...
journal article 2019
document
Vassileiadis, Nikos (author), Vieira, Aitor Couce (author), Insua, David Ríos (author), Chatzigiannakis, Vassilis (author), Tsekeridou, Sofia (author), Gómez, Yolanda (author), Vila, José (author), Labunets, K. (author), Pieters, W. (author), Briggs, Pamela (author), Branley-Bell, Dawn (author)
book chapter 2019
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, Andre M. H. (author), Khakzad, N. (author), van Gelder, P.H.A.J.M. (author)
Because of modern societies' dependence on industrial control systems, adequate response to system failures is essential. In order to take appropriate measures, it is crucial for operators to be able to distinguish between intentional attacks and accidental technical failures. However, adequate decision support for this matter is lacking. In...
conference paper 2019
document
van der Wagen, Wytske (author), Pieters, W. (author)
Victims are often conceptualized as single, human and static entities with certain risk factors that make them more vulnerable and attractive for offenders. This framework is challenged by emerging forms of high-tech cybercrime, such as ransomware, botnets and virtual theft, in which the offender targets a composite of human, technical and...
journal article 2018
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors. To...
journal article 2018
document
Bullée, Jan Willem Hendrik (author), Montoya, Lorena (author), Pieters, W. (author), Junger, M. (author), Hartel, P.H. (author)
The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and...
journal article 2018
document
Molin, E.J.E. (author), Meeuwisse, Kirsten (author), Pieters, W. (author), Chorus, C.G. (author)
It is often suggested in the literature that employees regard technical security measures (TSMs) as user-unfriendly, indicating a trade-off between security and usability. However, there is little empirical evidence of such a trade-off, nor about the strength of the associated negative correlation and the importance employees attach to both...
journal article 2018
document
Cayford, M.R. (author), Pieters, W. (author)
In recent years, Western governments have come under sharp criticism for their use of surveillance technology. They have been accused of sweeping up massive amounts of information without evidence of the technologies being effective in improving security. The view of critics is clear, but what do intelligence officials themselves say? This...
journal article 2018
document
Cayford, M.R. (author), Pieters, W. (author), Hijzen, Constant (author)
Intelligence agencies routinely use surveillance technology to perform surveillance on digital data. This practice raises many questions that feed a societal debate, including whether the surveillance technology is effective in achieving the given security goal, whether it is cost-efficient, and whether it is proportionate. Oversight bodies...
journal article 2018
document
Klemm, Christian (author), Pieters, W. (author)
In the past decades, video games have grown from a niche market to one of the major entertainment media, enticing millions of players worldwide. When ethical aspects of video games are being debated, the discussion oftentimes revolves around effects of their content, such as violence. This paper argues that effects of game mechanics, such as...
journal article 2017
document
Pieters, W. (author)
In the public debate, social implications of information technology are mainly seen through the privacy lens. Impact assessments of information technology are also often limited to privacy impact assessments, which are focused on individual rights and well-being, as opposed to the social environment. In this article, I argue that this...
journal article 2017
Searched for: author%3A%22Pieters%2C+W.%22
(1 - 20 of 33)

Pages