Assessment, trust, and cooperation in IT-security
This is a study of how IT-Security experts build trust and cooperate within and across organisations. The key research questions are 1) how do these specialists learn to trust others, and 2) why their preferences and strategies evolved the way they did. Using qualitative interviews and quantitative...
Main Author: | |
---|---|
Other Authors: | |
Published: |
University of Oxford
2018
|
Online Access: | https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757923 |
id |
ndltd-bl.uk-oai-ethos.bl.uk-757923 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-bl.uk-oai-ethos.bl.uk-7579232019-02-05T03:29:26ZAssessment, trust, and cooperation in IT-securityWeissinger, Laurin BenediktVarese, Federico ; Biggs, Michael ; Dupont, Benoît2018This is a study of how IT-Security experts build trust and cooperate within and across organisations. The key research questions are 1) how do these specialists learn to trust others, and 2) why their preferences and strategies evolved the way they did. Using qualitative interviews and quantitative network analysis, the project finds that in this microcosm of risk-aware specialists, cooperation is rational due to complexity and uncertainty, while social control mechanisms are overly costly. In order to ascertain who is trustworthy and skilled, IT-Security specialists take precautions and then screen and probe potential co-operators thoroughly by querying and triangulating multiple information sources. Experts believe that generally, trusting individuals is possible, while they tend not to trust organisations as such, due to their complexity, and their political and economic incentives. Thus, when having to rely on organisations, security experts combine bureaucratic means, like standard compliance and performing audits, with their preferred approach based on interpersonal trust, networks, and individual assessment. Nevertheless, IT-Security experts efficiently manage assessment means and comprehensiveness. The in-depth network study of a security team finds that advice is given based on shared experience and nationality, while friendship nominations are value-driven: besides a strong tendency to not nominate anyone, the smaller group of those who see value in official certifications and education tend to nominate fewer friends, distinctly shunning those who consider these signals unimportant. This finding speaks to the growing institutionalisation and professionalisation of IT-Security caused by sector growth and state in- volvement. Most interviewees oppose this development, which is seen to water down security objectives. This thesis is based on primary data: expert interviews with specialists from over 30 countries, and longitudinal network data from an IT-Security team. The interviews explore how trust and cooperation are established, while the network data are used to quantitatively investigate network evolution.University of Oxfordhttps://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757923http://ora.ox.ac.uk/objects/uuid:a1e310e3-023f-4228-8acc-a988af0a0a64Electronic Thesis or Dissertation |
collection |
NDLTD |
sources |
NDLTD |
description |
This is a study of how IT-Security experts build trust and cooperate within and across organisations. The key research questions are 1) how do these specialists learn to trust others, and 2) why their preferences and strategies evolved the way they did. Using qualitative interviews and quantitative network analysis, the project finds that in this microcosm of risk-aware specialists, cooperation is rational due to complexity and uncertainty, while social control mechanisms are overly costly. In order to ascertain who is trustworthy and skilled, IT-Security specialists take precautions and then screen and probe potential co-operators thoroughly by querying and triangulating multiple information sources. Experts believe that generally, trusting individuals is possible, while they tend not to trust organisations as such, due to their complexity, and their political and economic incentives. Thus, when having to rely on organisations, security experts combine bureaucratic means, like standard compliance and performing audits, with their preferred approach based on interpersonal trust, networks, and individual assessment. Nevertheless, IT-Security experts efficiently manage assessment means and comprehensiveness. The in-depth network study of a security team finds that advice is given based on shared experience and nationality, while friendship nominations are value-driven: besides a strong tendency to not nominate anyone, the smaller group of those who see value in official certifications and education tend to nominate fewer friends, distinctly shunning those who consider these signals unimportant. This finding speaks to the growing institutionalisation and professionalisation of IT-Security caused by sector growth and state in- volvement. Most interviewees oppose this development, which is seen to water down security objectives. This thesis is based on primary data: expert interviews with specialists from over 30 countries, and longitudinal network data from an IT-Security team. The interviews explore how trust and cooperation are established, while the network data are used to quantitatively investigate network evolution. |
author2 |
Varese, Federico ; Biggs, Michael ; Dupont, Benoît |
author_facet |
Varese, Federico ; Biggs, Michael ; Dupont, Benoît Weissinger, Laurin Benedikt |
author |
Weissinger, Laurin Benedikt |
spellingShingle |
Weissinger, Laurin Benedikt Assessment, trust, and cooperation in IT-security |
author_sort |
Weissinger, Laurin Benedikt |
title |
Assessment, trust, and cooperation in IT-security |
title_short |
Assessment, trust, and cooperation in IT-security |
title_full |
Assessment, trust, and cooperation in IT-security |
title_fullStr |
Assessment, trust, and cooperation in IT-security |
title_full_unstemmed |
Assessment, trust, and cooperation in IT-security |
title_sort |
assessment, trust, and cooperation in it-security |
publisher |
University of Oxford |
publishDate |
2018 |
url |
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757923 |
work_keys_str_mv |
AT weissingerlaurinbenedikt assessmenttrustandcooperationinitsecurity |
_version_ |
1718973922180857856 |