Assessment, trust, and cooperation in IT-security

This is a study of how IT-Security experts build trust and cooperate within and across organisations. The key research questions are 1) how do these specialists learn to trust others, and 2) why their preferences and strategies evolved the way they did. Using qualitative interviews and quantitative...

Full description

Bibliographic Details
Main Author: Weissinger, Laurin Benedikt
Other Authors: Varese, Federico ; Biggs, Michael ; Dupont, Benoît
Published: University of Oxford 2018
Online Access:https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757923
id ndltd-bl.uk-oai-ethos.bl.uk-757923
record_format oai_dc
spelling ndltd-bl.uk-oai-ethos.bl.uk-7579232019-02-05T03:29:26ZAssessment, trust, and cooperation in IT-securityWeissinger, Laurin BenediktVarese, Federico ; Biggs, Michael ; Dupont, Benoît2018This is a study of how IT-Security experts build trust and cooperate within and across organisations. The key research questions are 1) how do these specialists learn to trust others, and 2) why their preferences and strategies evolved the way they did. Using qualitative interviews and quantitative network analysis, the project finds that in this microcosm of risk-aware specialists, cooperation is rational due to complexity and uncertainty, while social control mechanisms are overly costly. In order to ascertain who is trustworthy and skilled, IT-Security specialists take precautions and then screen and probe potential co-operators thoroughly by querying and triangulating multiple information sources. Experts believe that generally, trusting individuals is possible, while they tend not to trust organisations as such, due to their complexity, and their political and economic incentives. Thus, when having to rely on organisations, security experts combine bureaucratic means, like standard compliance and performing audits, with their preferred approach based on interpersonal trust, networks, and individual assessment. Nevertheless, IT-Security experts efficiently manage assessment means and comprehensiveness. The in-depth network study of a security team finds that advice is given based on shared experience and nationality, while friendship nominations are value-driven: besides a strong tendency to not nominate anyone, the smaller group of those who see value in official certifications and education tend to nominate fewer friends, distinctly shunning those who consider these signals unimportant. This finding speaks to the growing institutionalisation and professionalisation of IT-Security caused by sector growth and state in- volvement. Most interviewees oppose this development, which is seen to water down security objectives. This thesis is based on primary data: expert interviews with specialists from over 30 countries, and longitudinal network data from an IT-Security team. The interviews explore how trust and cooperation are established, while the network data are used to quantitatively investigate network evolution.University of Oxfordhttps://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757923http://ora.ox.ac.uk/objects/uuid:a1e310e3-023f-4228-8acc-a988af0a0a64Electronic Thesis or Dissertation
collection NDLTD
sources NDLTD
description This is a study of how IT-Security experts build trust and cooperate within and across organisations. The key research questions are 1) how do these specialists learn to trust others, and 2) why their preferences and strategies evolved the way they did. Using qualitative interviews and quantitative network analysis, the project finds that in this microcosm of risk-aware specialists, cooperation is rational due to complexity and uncertainty, while social control mechanisms are overly costly. In order to ascertain who is trustworthy and skilled, IT-Security specialists take precautions and then screen and probe potential co-operators thoroughly by querying and triangulating multiple information sources. Experts believe that generally, trusting individuals is possible, while they tend not to trust organisations as such, due to their complexity, and their political and economic incentives. Thus, when having to rely on organisations, security experts combine bureaucratic means, like standard compliance and performing audits, with their preferred approach based on interpersonal trust, networks, and individual assessment. Nevertheless, IT-Security experts efficiently manage assessment means and comprehensiveness. The in-depth network study of a security team finds that advice is given based on shared experience and nationality, while friendship nominations are value-driven: besides a strong tendency to not nominate anyone, the smaller group of those who see value in official certifications and education tend to nominate fewer friends, distinctly shunning those who consider these signals unimportant. This finding speaks to the growing institutionalisation and professionalisation of IT-Security caused by sector growth and state in- volvement. Most interviewees oppose this development, which is seen to water down security objectives. This thesis is based on primary data: expert interviews with specialists from over 30 countries, and longitudinal network data from an IT-Security team. The interviews explore how trust and cooperation are established, while the network data are used to quantitatively investigate network evolution.
author2 Varese, Federico ; Biggs, Michael ; Dupont, Benoît
author_facet Varese, Federico ; Biggs, Michael ; Dupont, Benoît
Weissinger, Laurin Benedikt
author Weissinger, Laurin Benedikt
spellingShingle Weissinger, Laurin Benedikt
Assessment, trust, and cooperation in IT-security
author_sort Weissinger, Laurin Benedikt
title Assessment, trust, and cooperation in IT-security
title_short Assessment, trust, and cooperation in IT-security
title_full Assessment, trust, and cooperation in IT-security
title_fullStr Assessment, trust, and cooperation in IT-security
title_full_unstemmed Assessment, trust, and cooperation in IT-security
title_sort assessment, trust, and cooperation in it-security
publisher University of Oxford
publishDate 2018
url https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757923
work_keys_str_mv AT weissingerlaurinbenedikt assessmenttrustandcooperationinitsecurity
_version_ 1718973922180857856