关于
Dr. Char的文章
动态
-
From high school to med school—Tristan Hornbuckle is making big moves! After earning 30 college credits through the Herd Academy, Marshall's dual…
From high school to med school—Tristan Hornbuckle is making big moves! After earning 30 college credits through the Herd Academy, Marshall's dual…
Dr. Char Sample点赞
-
Every day, the Dr. Ian Malcolm quotes ring truer and truer - you really should know a bit on how the tool is supposed to work and not go on blind…
Every day, the Dr. Ian Malcolm quotes ring truer and truer - you really should know a bit on how the tool is supposed to work and not go on blind…
Dr. Char Sample点赞
-
Bright light city gonna set my soul, gonna set my soul on fire…along with a neon Kurt the Koala ??…Day 1 of DEFCON33 is off to a cracking start! Dr…
Bright light city gonna set my soul, gonna set my soul on fire…along with a neon Kurt the Koala ??…Day 1 of DEFCON33 is off to a cracking start! Dr…
Dr. Char Sample点赞
工作经历和教育背景
出版作品
-
Cyber + Culture Early Warning Study
Carnegie Mellon University - Software Engineering Institute
Cyber + Culture Early Warning Study examined the role of culture in cyber behaviors when kinetic activities are involved.
-
Attribution Beyond the IP
e-Forensics
Abstract: Hofstede, Hofstede and Minkov (2010) said, “Culture is everything.” Hofstede et al. (2010) claimed that culture acts as mental software, and influences all decisions, including technology usage. Yet a lack of studies exists in support of this generalized assertion. One potential test and measure of this statement by Hofstede et al. (2010) results in the examination of social network adoption rates within the framework of Hofstede’s cultural dimensions.
Three well-known social…Abstract: Hofstede, Hofstede and Minkov (2010) said, “Culture is everything.” Hofstede et al. (2010) claimed that culture acts as mental software, and influences all decisions, including technology usage. Yet a lack of studies exists in support of this generalized assertion. One potential test and measure of this statement by Hofstede et al. (2010) results in the examination of social network adoption rates within the framework of Hofstede’s cultural dimensions.
Three well-known social networking sites were chosen for this study: Facebook, LinkedIn and Twitter. A comparison that examines the percentage adoption rates globally within Hofstede’s six dimensions of culture was performed, using statistical analysis. These results provided the the basis necessary in order to determine if a relationship exists between culture and social networking adoption rates.
The findings suggest a correlation between specific cultural values, some that differ across the three selected applications: Facebook, LinkedIn and Twitter. All three of the services examined revealed a strong relationship with indulgence and adoption rates. Other dimensions showed varying results across the three applications. Also observed was a noticeable lack of activity in certain dimensional values, these non-results also suggests a potential relationship between cultural dimensions and non-behaviors
其他作者 -
-
A Different Perspective on Attribution
CyberTalk - SBL UK
This article details an introduction to the examination of cyber behaviors through the lens of culture.
其他作者查看作品 -
Applicability of Cultural Markers in Computer Network Attack Attribution
Academic Conferences ECIW 2014
Computer Network Attack (CNA) attribution presents on going challenges for information security professionals. What is needed is a new way to assist in attribution performance; this method must be technology independent. Culture offers a technology independent vector for analysing CNAs. The human mind uses both conscious and unconscious thought, and both of these processes are culturally influenced. This researcher seeks to determine if those cultural influences leave traces in CNA choices and…
Computer Network Attack (CNA) attribution presents on going challenges for information security professionals. What is needed is a new way to assist in attribution performance; this method must be technology independent. Culture offers a technology independent vector for analysing CNAs. The human mind uses both conscious and unconscious thought, and both of these processes are culturally influenced. This researcher seeks to determine if those cultural influences leave traces in CNA choices and behaviors.
Hofstede’s cultural dimensions provide a framework for evaluating and understanding various behaviors. Hofstede’s framework has been used in academia and business for research in order to better understand other cultures. Hofstede avails his data for researchers in all disciplines. The goal of this study is to determine if Hofstede’s framework can be applied to the cyber environment in order to understand CNAs with the hope of greater understanding of cyber adversary behaviors.
The preliminary findings support the hypothesis: culture influences CNA choices and behaviors. Two sets of data were examined across all six cultural dimensions. The analyzed data displayed statistically significant findings across three dimensions: power distance, individualism versus collectivism, and indulgence versus restraint.
The tests performed were quantitative and included means comparison tests for the first data set, and group comparison tests in the second data set. The findings revealed valuable data in both the easily seen visible results, and in the areas that lacked data. These findings suggest that culture not only influences CNA choices and behaviors, but may also influence non-behaviors. The results of this research study suggest the need for additional research targeted toward specific cultural dimensions.
-
An Overview of Anomaly Detection
IT Professional IEEE
This article discusses how to accurately set up the environment for anomaly detection and various statistical methods associated with anomaly detection.
其他作者 -
-
An Examination of PaaS Security Challenges
Tech Target
Discusses security issues and challenges associated with Platform as a Service
-
Cloud Computing Security: Routing and DNS Threats
TechTarget
Discussion of routing and DNS issues in the cloud and mitigation techniques.
-
DNS Attacks: Compromising DNS in the Cloud
Tech Target
Explanation of how DNS may be attacked in the cloud.
-
DNS in the Cloud: Building a Secure DNS Architecture
Tech Target
Steps to building a secure DNS architecture in the cloud.
-
Hofstede's Cultural Markers in Computer Network Attack Behaviors
Academic Conferences - ICCWS 2014
Culture, according to Hofstede, Hofstede and Minkov (2010) acts as “software of the mind”. This mental software should logically extend into computer network attack (CNA) behaviours. Sample (2013), successfully inferred this relationship when examining the relationship between nationalistic, patriotic website defacements and Hofstede’s cultural dimensions. However, Sample’s study (2013) dealt with a limited size data set, and only inferred the relationship between culture and CNA behaviours.…
Culture, according to Hofstede, Hofstede and Minkov (2010) acts as “software of the mind”. This mental software should logically extend into computer network attack (CNA) behaviours. Sample (2013), successfully inferred this relationship when examining the relationship between nationalistic, patriotic website defacements and Hofstede’s cultural dimensions. However, Sample’s study (2013) dealt with a limited size data set, and only inferred the relationship between culture and CNA behaviours. This study advances the research by first, using a larger data set, and second, determining the nature of the relationship between culture and the number of these types of attacks.
Geert Hofstede’s cultural dimensions provide a framework for evaluating and understanding various behaviours. Hofstede’s framework has been used in academia and business for research in order to better understand other cultures. Hofstede avails his data for researchers in all disciplines. The goal of this study is to determine the nature of the relationship between Hofstede’s power distance index (PDI) and individualism versus collectivism (IVC) cultural dimensions as these behaviours relate to nationalistic, patriotic themed website defacements.
The preliminary findings re-affirm the existence of a relationship between high PDI values, low IVC values, and nationalistic, patriotic themed website defacements. The analysed data displayed significant findings across these two dimensions, and a noticeable lack of activity on the opposite end of the dimensional pole was observed. The non-results also suggest a potential link between cultural dimensions and non-behaviours. The tests performed were quantitative and included means comparison tests. Additionally, a new relationship was identified across a third dimension, Long-Term Orientation versus Short-Term Orientation (LTOvSTO). The final analysis will contain both these results and the correlational testing results.
其他作者查看作品
荣誉奖项
-
Best PhD Paper and Presentation Award
Academic Conferences & Publishing International ECIW 2013
Awarded at the European Conference on Information Warfare (ECIW) 2013 conference in Jyvaskyla, Finland. For the paper entitled: Applicability of Cultural Markers in Computer Network Attack Attribution.
收到的推荐信
3 位会员推荐了Dr. Char
加入领英,即可查看Dr. Char的更多动态
-
The Marshall University Institute for Cyber Security (ICS) has officially launched a strategic partnership with DroneTrace, LLC, a national leader in…
The Marshall University Institute for Cyber Security (ICS) has officially launched a strategic partnership with DroneTrace, LLC, a national leader in…
Dr. Char Sample点赞
-
We are back in the startup city at BlackHat for another year. Looking forward to a great few days of conversation and connection. Follow our…
We are back in the startup city at BlackHat for another year. Looking forward to a great few days of conversation and connection. Follow our…
Dr. Char Sample点赞
-
Falken the BSides Adelaide cyber wombat was sighted at Security BSides Las Vegas, catching up with the community at the annual Global BSides meetup…
Falken the BSides Adelaide cyber wombat was sighted at Security BSides Las Vegas, catching up with the community at the annual Global BSides meetup…
Dr. Char Sample点赞
-
Happy to share that Diana Kelley is officially joining Noma Security as our Chief Information Security Officer. There are many shapes for the CISO…
Happy to share that Diana Kelley is officially joining Noma Security as our Chief Information Security Officer. There are many shapes for the CISO…
Dr. Char Sample点赞
-
I am very, very happy to announce that I have committed myself to another unreasonably large & complicated effort for somebody in an already…
I am very, very happy to announce that I have committed myself to another unreasonably large & complicated effort for somebody in an already…
Dr. Char Sample点赞
-
This weekend was a circle closure in a side-quest in my career. Oddly, it wasn't some tech thing, but it was seeing "Fantastic Four: First Steps"…
This weekend was a circle closure in a side-quest in my career. Oddly, it wasn't some tech thing, but it was seeing "Fantastic Four: First Steps"…
Dr. Char Sample点赞
-
????? Yesterday, I experienced two heart attacks (the second one was very serious - Widowmaker) in a single day and was hospitalized. As a…
????? Yesterday, I experienced two heart attacks (the second one was very serious - Widowmaker) in a single day and was hospitalized. As a…
Dr. Char Sample点赞
-
Thanks to the Australian War College for the opportunity to participate as a Visiting Fellow for a second year, sharing my experiences in cyberspace…
Thanks to the Australian War College for the opportunity to participate as a Visiting Fellow for a second year, sharing my experiences in cyberspace…
Dr. Char Sample点赞
-
This is such a good article. Not to be self serving but the balance of generations is so important. The mix of sage experience and youthful…
This is such a good article. Not to be self serving but the balance of generations is so important. The mix of sage experience and youthful…
Dr. Char Sample点赞
-
I have been invited to give a keynote in Madrid later this year. Always great to share research success. #stem #aerospace #research
I have been invited to give a keynote in Madrid later this year. Always great to share research success. #stem #aerospace #research
Dr. Char Sample点赞