美国 马里兰州 埃利科特城
3920 位关注者 500+ 位好友

加入领英,查看档案

关于

Academically and professionally experienced cyber security professional with over 23…

Dr. Char的文章

  • ECCWS CFP

    European Conference on Cyber Warfare and Security (ECCWS) call for papers closes December 3, 2015. Conference date July…

动态

立即加入,查看全部动态

工作经历和教育背景

  • Marshall University

查看Dr. Char的完整工作经历

查看他们的职位头衔、任职时间等。

点击“继续加入或登录”,即表示您同意遵守领英的《用户协议》《隐私政策》《Cookie 政策》

出版作品

  • Cyber + Culture Early Warning Study

    Carnegie Mellon University - Software Engineering Institute

    Cyber + Culture Early Warning Study examined the role of culture in cyber behaviors when kinetic activities are involved.

    查看作品
  • Attribution Beyond the IP

    e-Forensics

    Abstract: Hofstede, Hofstede and Minkov (2010) said, “Culture is everything.” Hofstede et al. (2010) claimed that culture acts as mental software, and influences all decisions, including technology usage. Yet a lack of studies exists in support of this generalized assertion. One potential test and measure of this statement by Hofstede et al. (2010) results in the examination of social network adoption rates within the framework of Hofstede’s cultural dimensions.

    Three well-known social…

    Abstract: Hofstede, Hofstede and Minkov (2010) said, “Culture is everything.” Hofstede et al. (2010) claimed that culture acts as mental software, and influences all decisions, including technology usage. Yet a lack of studies exists in support of this generalized assertion. One potential test and measure of this statement by Hofstede et al. (2010) results in the examination of social network adoption rates within the framework of Hofstede’s cultural dimensions.

    Three well-known social networking sites were chosen for this study: Facebook, LinkedIn and Twitter. A comparison that examines the percentage adoption rates globally within Hofstede’s six dimensions of culture was performed, using statistical analysis. These results provided the the basis necessary in order to determine if a relationship exists between culture and social networking adoption rates.

    The findings suggest a correlation between specific cultural values, some that differ across the three selected applications: Facebook, LinkedIn and Twitter. All three of the services examined revealed a strong relationship with indulgence and adoption rates. Other dimensions showed varying results across the three applications. Also observed was a noticeable lack of activity in certain dimensional values, these non-results also suggests a potential relationship between cultural dimensions and non-behaviors

    其他作者
    • Dr. Andre Karamanian
    查看作品
  • A Different Perspective on Attribution

    CyberTalk - SBL UK

    This article details an introduction to the examination of cyber behaviors through the lens of culture.

    其他作者
    查看作品
  • Applicability of Cultural Markers in Computer Network Attack Attribution

    Academic Conferences ECIW 2014

    Computer Network Attack (CNA) attribution presents on going challenges for information security professionals. What is needed is a new way to assist in attribution performance; this method must be technology independent. Culture offers a technology independent vector for analysing CNAs. The human mind uses both conscious and unconscious thought, and both of these processes are culturally influenced. This researcher seeks to determine if those cultural influences leave traces in CNA choices and…

    Computer Network Attack (CNA) attribution presents on going challenges for information security professionals. What is needed is a new way to assist in attribution performance; this method must be technology independent. Culture offers a technology independent vector for analysing CNAs. The human mind uses both conscious and unconscious thought, and both of these processes are culturally influenced. This researcher seeks to determine if those cultural influences leave traces in CNA choices and behaviors.

    Hofstede’s cultural dimensions provide a framework for evaluating and understanding various behaviors. Hofstede’s framework has been used in academia and business for research in order to better understand other cultures. Hofstede avails his data for researchers in all disciplines. The goal of this study is to determine if Hofstede’s framework can be applied to the cyber environment in order to understand CNAs with the hope of greater understanding of cyber adversary behaviors.

    The preliminary findings support the hypothesis: culture influences CNA choices and behaviors. Two sets of data were examined across all six cultural dimensions. The analyzed data displayed statistically significant findings across three dimensions: power distance, individualism versus collectivism, and indulgence versus restraint.

    The tests performed were quantitative and included means comparison tests for the first data set, and group comparison tests in the second data set. The findings revealed valuable data in both the easily seen visible results, and in the areas that lacked data. These findings suggest that culture not only influences CNA choices and behaviors, but may also influence non-behaviors. The results of this research study suggest the need for additional research targeted toward specific cultural dimensions.

  • An Overview of Anomaly Detection

    IT Professional IEEE

    This article discusses how to accurately set up the environment for anomaly detection and various statistical methods associated with anomaly detection.

    其他作者
    • Dr. Kim Schaeffer
  • An Examination of PaaS Security Challenges

    Tech Target

    Discusses security issues and challenges associated with Platform as a Service

    查看作品
  • Cloud Computing Security: Routing and DNS Threats

    TechTarget

    Discussion of routing and DNS issues in the cloud and mitigation techniques.

    查看作品
  • DNS Attacks: Compromising DNS in the Cloud

    Tech Target

    Explanation of how DNS may be attacked in the cloud.

    查看作品
  • DNS in the Cloud: Building a Secure DNS Architecture

    Tech Target

    Steps to building a secure DNS architecture in the cloud.

    查看作品
  • Hofstede's Cultural Markers in Computer Network Attack Behaviors

    Academic Conferences - ICCWS 2014

    Culture, according to Hofstede, Hofstede and Minkov (2010) acts as “software of the mind”. This mental software should logically extend into computer network attack (CNA) behaviours. Sample (2013), successfully inferred this relationship when examining the relationship between nationalistic, patriotic website defacements and Hofstede’s cultural dimensions. However, Sample’s study (2013) dealt with a limited size data set, and only inferred the relationship between culture and CNA behaviours.…

    Culture, according to Hofstede, Hofstede and Minkov (2010) acts as “software of the mind”. This mental software should logically extend into computer network attack (CNA) behaviours. Sample (2013), successfully inferred this relationship when examining the relationship between nationalistic, patriotic website defacements and Hofstede’s cultural dimensions. However, Sample’s study (2013) dealt with a limited size data set, and only inferred the relationship between culture and CNA behaviours. This study advances the research by first, using a larger data set, and second, determining the nature of the relationship between culture and the number of these types of attacks.

    Geert Hofstede’s cultural dimensions provide a framework for evaluating and understanding various behaviours. Hofstede’s framework has been used in academia and business for research in order to better understand other cultures. Hofstede avails his data for researchers in all disciplines. The goal of this study is to determine the nature of the relationship between Hofstede’s power distance index (PDI) and individualism versus collectivism (IVC) cultural dimensions as these behaviours relate to nationalistic, patriotic themed website defacements.

    The preliminary findings re-affirm the existence of a relationship between high PDI values, low IVC values, and nationalistic, patriotic themed website defacements. The analysed data displayed significant findings across these two dimensions, and a noticeable lack of activity on the opposite end of the dimensional pole was observed. The non-results also suggest a potential link between cultural dimensions and non-behaviours. The tests performed were quantitative and included means comparison tests. Additionally, a new relationship was identified across a third dimension, Long-Term Orientation versus Short-Term Orientation (LTOvSTO). The final analysis will contain both these results and the correlational testing results.

    其他作者
    查看作品

荣誉奖项

  • Best PhD Paper and Presentation Award

    Academic Conferences & Publishing International ECIW 2013

    Awarded at the European Conference on Information Warfare (ECIW) 2013 conference in Jyvaskyla, Finland. For the paper entitled: Applicability of Cultural Markers in Computer Network Attack Attribution.

收到的推荐信

Dr. Char的更多动态

查看Dr. Char的完整档案

  • 浏览共同好友
  • 请求引荐
  • 直接联系Dr. Char
加入领英,查看完整档案

其他相似会员

学习在线课程,新技能轻松 get!