Skip to main content

Showing 1–3 of 3 results for author: Bunker, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2004.08573  [pdf

    cs.SI

    Convergence Behaviour of Bystanders: An Analysis of 2016 Munich Shooting Twitter Crisis Communication

    Authors: Deborah Bunker, Milad Mirbabaie, Stefan Stieglitz

    Abstract: While convergence behaviour archetypes can explain behaviour of individuals who actively converge on and participate in crises, less is known about individuals who converge on an event and choose to remain passive i.e. "bystanders". Bystanders are important, because of their proximity to an event and their function as an "eye-witness". To investigate the role of bystanders in crisis communications… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

    Comments: The 28th Australasian Conference on Information Systems

  2. arXiv:1610.08570  [pdf, other

    cs.CR

    TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication

    Authors: Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Scott Ruoti, Dan Bunker, Kent Seamons, Daniel Zappala

    Abstract: We describe TrustBase, an architecture that provides certificate-based authentication as an operating system service. TrustBase enforces best practices for certificate validation for all applications and transparently enables existing applications to be strengthened against failures of the CA system. The TrustBase system allows simple deployment of authentication systems that harden the CA system.… ▽ More

    Submitted 26 October, 2016; originally announced October 2016.

    Comments: 15 pages, 4 figures

  3. arXiv:1606.02509  [pdf

    cs.CY cs.CR

    Exploring Practitioner Perspectives of Sourcing Risks: Towards the Development of an Integrated Risk and Control Framework

    Authors: Deborah Bunker, Catherine Hardy, Abdul Babar, Ken Stevens

    Abstract: Outsourcing of information and communication technologies (ICT) and related services is an established and growing industry. Recent trends, such as the move toward multi-sourcing have increased the complexity and risk of these outsourcing arrangements. There is a critical research need to identify the risks faced by both the organisations that outsource ICT and the vendors that provide it in this… ▽ More

    Submitted 8 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/185