Research Methods & Current Research in Information Security

Speaker:  Edgar Weippl – Vienna, Austria
Topic(s):  Security and Privacy

Abstract

Over the past few years an increasing number of descriptive works have helped explain complex phenomena in the area of distributed systems security. These include the efficiency of spam campaigns, the distribution of bots, or the likelihood of users to accept false identities as friends in social networks. Studies in this field are characterized by the necessity of empirical research based on observing, describing and inferring the behaviour of complex systems.

Future research in the area of distributed systems security, including my own work, will use empirical research to complement design science as research method. Specifically, this approach consists of 1) passively observing large systems; (2) active probing that stimulates revealing behaviour of the systems; (3) developing solutions for relevant security problems; (4) and evaluating these contributions. Its impact on a large number of users makes this area of research relevant and urgent. By following the described methodology, it will be possible to improve security in an existing ecosystem in which changes can be deployed only over a long period of time.

About this Lecture

Number of Slides:  40
Duration:  30 minutes
Languages Available:  English, German
Last Updated: 

Request this Lecture

To request this particular lecture, please complete this online form.

Request a Tour

To request a tour with this speaker, please complete this online form.

All requests will be sent to ACM headquarters for review.