Searched for: department%3A%22Engineering%252C%255C%252BSystems%255C%252Band%255C%252BServices%22
(1 - 5 of 5)
document
Pieters, W. (author), Hadžiosmanovi?, D. (author), Dechesne, F. (author)
onceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by...
journal article 2015
document
Van der Voort, M. (author), Pieters, W. (author), Consoli, L. (author)
In the past decades, computers have become more and more involved in society by the rise of ubiquitous systems, increasing the number of interactions between humans and IT systems. At the same time, the technology itself is getting more complex, enabling devices to act in a way that previously only humans could, based on developments in the...
journal article 2015
document
Arnold, F. (author), Pieters, W. (author), Stoelinga, M.I.A. (author)
Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Thus, penetration testing has so far been used as a qualitative research method. To enable quantitative approaches to security risk management, including decision support based on the cost...
conference paper 2013
document
Pieters, W. (author), Padget, J. (author), Dechesne, F. (author), Dignum, V. (author), Aldewereld, H.M. (author)
Security policies in organisations typically take the form of obligations for the employees. However, it is often unclear what the purpose of such obligations is, and how these can be integrated in the operational processes of the organisation. This can result in policies that may be either too strong or too weak, leading to unnecessary...
conference paper 2013
document
Pieters, W. (author), Arnold, F. (author), Stoelinga, M.I.A. (author)
Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Therefore, penetration testing has thus far been used as a qualitative research method. To enable quantitative approaches to security risk management, including decision support based on the cost...
report 2013
Searched for: department%3A%22Engineering%252C%255C%252BSystems%255C%252Band%255C%252BServices%22
(1 - 5 of 5)