-
Convergence Behaviour of Bystanders: An Analysis of 2016 Munich Shooting Twitter Crisis Communication
Authors:
Deborah Bunker,
Milad Mirbabaie,
Stefan Stieglitz
Abstract:
While convergence behaviour archetypes can explain behaviour of individuals who actively converge on and participate in crises, less is known about individuals who converge on an event and choose to remain passive i.e. "bystanders". Bystanders are important, because of their proximity to an event and their function as an "eye-witness". To investigate the role of bystanders in crisis communications…
▽ More
While convergence behaviour archetypes can explain behaviour of individuals who actively converge on and participate in crises, less is known about individuals who converge on an event and choose to remain passive i.e. "bystanders". Bystanders are important, because of their proximity to an event and their function as an "eye-witness". To investigate the role of bystanders in crisis communications we analysed Twitter communication generated from the 2016 Munich Shooting event. Our findings revealed the impassive convergence behaviour archetype could influence an event as a passive and rational "eye-witness", by gathering and sharing information close to where the event is occurring.
△ Less
Submitted 18 April, 2020;
originally announced April 2020.
-
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication
Authors:
Mark O'Neill,
Scott Heidbrink,
Jordan Whitehead,
Scott Ruoti,
Dan Bunker,
Kent Seamons,
Daniel Zappala
Abstract:
We describe TrustBase, an architecture that provides certificate-based authentication as an operating system service. TrustBase enforces best practices for certificate validation for all applications and transparently enables existing applications to be strengthened against failures of the CA system. The TrustBase system allows simple deployment of authentication systems that harden the CA system.…
▽ More
We describe TrustBase, an architecture that provides certificate-based authentication as an operating system service. TrustBase enforces best practices for certificate validation for all applications and transparently enables existing applications to be strengthened against failures of the CA system. The TrustBase system allows simple deployment of authentication systems that harden the CA system. This enables system administrators, for example, to require certificate revocation checks on all TLS connections, or require STARTTLS for email servers that support it. TrustBase is the first system that is able to secure all TLS traffic, using an approach compatible with all operating systems. We design and evaluate a prototype implementation of TrustBase on Linux, evaluate its security, and demonstrate that it has negligible overhead and universal compatibility with applications. To demonstrate the utility of TrustBase, we have developed six authentication services that strengthen certificate validation for all applications.
△ Less
Submitted 26 October, 2016;
originally announced October 2016.
-
Exploring Practitioner Perspectives of Sourcing Risks: Towards the Development of an Integrated Risk and Control Framework
Authors:
Deborah Bunker,
Catherine Hardy,
Abdul Babar,
Ken Stevens
Abstract:
Outsourcing of information and communication technologies (ICT) and related services is an established and growing industry. Recent trends, such as the move toward multi-sourcing have increased the complexity and risk of these outsourcing arrangements. There is a critical research need to identify the risks faced by both the organisations that outsource ICT and the vendors that provide it in this…
▽ More
Outsourcing of information and communication technologies (ICT) and related services is an established and growing industry. Recent trends, such as the move toward multi-sourcing have increased the complexity and risk of these outsourcing arrangements. There is a critical research need to identify the risks faced by both the organisations that outsource ICT and the vendors that provide it in this changing landscape. To address growing concerns regarding the best way to deal with risk and control in this environment, our research focuses on establishing a Sourcing Risk and Control Framework to assist organisations identify these risks and develop effective mitigation strategies. In this paper we report on the first stage of our research that sought to document how sourcing risk is represented and considered in practice. To date, limited empirical research has been conducted in an Australian context. Using a series of workshops involving client and vendor representatives, we identified a broad range of risks and developed a cohesive categorisation scheme that incorporates functional and multi-stakeholder perspectives.
△ Less
Submitted 8 June, 2016;
originally announced June 2016.