2020
DOI: 10.1080/19331681.2020.1776658
|View full text |Cite
|
Sign up to set email alerts
|

A tale of two cybers - how threat reporting by cybersecurity firms systematically underrepresents threats to civil society

Abstract: View related articles View Crossmark data Citing articles: 3 View citing articles A tale of two cybers-how threat reporting by cybersecurity firms systematically underrepresents threats to civil society

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…From this perspective, a promising initiative is STIX CyBox [143]: its goal is creating a threat intelligence platform shared by multiple parties, facilitating the entire process of incident detection and response. Nonetheless, such platforms must (i) contain unbiased data-otherwise there a the risk of manipulating future developments [109]-and (ii) comply with the existing regulation, hence requiring the involvement of the respective authorities.…”
Section: Data Availability (Executives and Legislation Authorities)mentioning
confidence: 99%
“…From this perspective, a promising initiative is STIX CyBox [143]: its goal is creating a threat intelligence platform shared by multiple parties, facilitating the entire process of incident detection and response. Nonetheless, such platforms must (i) contain unbiased data-otherwise there a the risk of manipulating future developments [109]-and (ii) comply with the existing regulation, hence requiring the involvement of the respective authorities.…”
Section: Data Availability (Executives and Legislation Authorities)mentioning
confidence: 99%
“…non-governmental organizations, educational institutions and individuals). 116 As schools, non-governmental organizations and individuals are more likely to be concerned with issues of social power, harms and equality, this prioritization has knock-on gender effects.…”
Section: Recommendationsmentioning
confidence: 99%
“…Moreover, there are still considerable challenges involved in attributing malicious cyber activity to particular state sponsors and doing so promptly and in a manner that is independently verifiable. Attribution capabilities also vary across states and cybersecurity companies may be biased in their reporting on the activities of proxy hacker groups (Maschmeyer et al, 2021). Relying on multiple sources to code proxy relationships should mitigate this problem, but it is possible that some proxy relationships may be mis-specified by the various sources.…”
Section: Cyber Proxiesmentioning
confidence: 99%