skip to main content
10.1145/3285002.3285004acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

Against Mindset

Published:28 August 2018Publication History

ABSTRACT

The security field has adopted the social construct of the security mindset: the idea that there exists a single attitude that allows individuals to think like an attacker. However, there is little evidence that the security mindset is an appropriate construct. We suggest an alternative approach, consisting of multiple security-relevant attitudes, which are linked to security roles within the systems development life-cycle. To illustrate the usefulness of our approach, we show how the framework can be used to help shape curricula.

References

  1. C. Alexander. 1964. Notes on the synthesis of form. Harvard University Press, Cambridge, USA.Google ScholarGoogle Scholar
  2. C.R. Allen. 1919. The instructor, the man, and the job. J. B. Lippincott Company, Philadelphia, USA.Google ScholarGoogle Scholar
  3. L. Allery. 2009. How to teach practical skills. Education for Primary Care. 20, 1 (2009), 58--60.Google ScholarGoogle ScholarCross RefCross Ref
  4. O.H. Ammann, T. von Karman, and G.B. Woodruff. 1941. The failure of the Tacoma Narrows Bridge. Federal Works Agency, Washington, USA.Google ScholarGoogle Scholar
  5. L.W. Anderson, D.R. Krathwohl, P.W. Airasian, K.A. Cruikshank, R.E. Mayer, P.R. Pintrich, J. Raths, and M.C. Wittrock. 2001. A taxonomy for learning, teaching, and assessing. Longman, New York, USA.Google ScholarGoogle Scholar
  6. R.J. Anderson. 2010. Security engineering, 2nd edition. John Wiley & Sons, New York, USA.Google ScholarGoogle Scholar
  7. D. Andriessen, D. Sluijsmans, M. Snel, and A. Jacobs. 2017. Protocol verbeteren en verantwoorden van afstuderen in het HBO 2.0. Vereniging Hogescholen, The Hague, The Netherlands.Google ScholarGoogle Scholar
  8. J.N. Bassili. 2008. Attitude strength. In Attitudes and attitude change. W.D. Crano and R. Prislin, eds. Psychology Press, New York, USA, 237--260.Google ScholarGoogle Scholar
  9. J. Berg, J. Dickhaut, and K. McCabe. 1995. Trust, reciprocity, and social history. Games and Economic Behavior. 10, 1 (1995), 122--142.Google ScholarGoogle Scholar
  10. Y. Bertot and P. Casteran. 2004. Interactive theorem proving and program development. Springer, Berlin, Germany. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G.J.J. Biesta. 2013. The beautiful risk of education. Paradigm Publishers, Boulder, USA.Google ScholarGoogle Scholar
  12. P. Black and D. Wiliam. 2009. Developing the theory of formative assessment. Educational Assessment, Evaluation, and Accountability. 21, 1 (2009), 5--31.Google ScholarGoogle Scholar
  13. B.S. Bloom, M.D. Engelhart, E.J. Furst, W.H. Hill, and D.R. Krathwohl. 1956. Taxonomy of educational objectives. David McKay Company, New York, USA.Google ScholarGoogle Scholar
  14. G.C. Bowker and S.L. Star. 2000. Sorting things out. MIT Press, Cambridge, USA.Google ScholarGoogle Scholar
  15. J.D. Bransford, A.L. Brown, R.R. Cocking, M.S. Donovan, and J.W. Pellegrino. 2000. How people learn, 2nd edition. National Academies Press, Washington, USA.Google ScholarGoogle Scholar
  16. F.P. Brooks. 1995. The mythical man-month, 2nd edition. Addison-Wesley, Reading, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J.S. Bruner. 1966. Toward a theory of instruction. Harvard University Press, Cambridge, USA.Google ScholarGoogle Scholar
  18. J. Cappos and R. Weiss. 2014. Teaching the security mindset with reference monitors. In Proceedings of the 45th ACM Technical Symposium on Computer Science Education (SIGCSE '14). ACM Press, New York, USA, 523--528. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R.A. Caralli, J.F. Stevens, L.R. Young, and W.R. Wilson. 2007. Introducing OCTAVE Allegro. Carnegie Mellon University, Pittsburgh, USA.Google ScholarGoogle Scholar
  20. CEN. 2014. European e-competence framework 3.0. CWA 16234-1-2014. European Committee for Standardization, Brussels, Belgium.Google ScholarGoogle Scholar
  21. C.M. Christensen. 1997. The innovator's dilemma. Harvard Business School Press, Boston, USA.Google ScholarGoogle Scholar
  22. CIS. 2016. The CIS critical security controls for effective cyber defense (version 6.1). Center for Internet Security, East Greenbush, USA.Google ScholarGoogle Scholar
  23. J.M. Clark and A. Paivio. 1991. Dual coding theory and education. Educational Psychology Review. 3, 3 (1991), 149--210.Google ScholarGoogle Scholar
  24. G. Conti and J. Caroland. 2011. Embracing the Kobayashi Maru. IEEE Security & Privacy. 9, 4 (2011), 48--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. L.F. Cranor and S. Garfinkel. 2005. Security and usability. O'Reilly Media, Sebastopol, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S.R. Cruess, R.L. Cruess, and Y. Steinert. 2008. Role modelling. British Medical Journal. 336, 7646 (2008), 718--721.Google ScholarGoogle Scholar
  27. M. Csikszentmihalyi. 1990. Flow. Harper & Row, New York, USA.Google ScholarGoogle Scholar
  28. T. de Jong. 2010. Cognitive load theory, educational research, and instructional design. Instructional Science. 38, 2 (2010), 105--134.Google ScholarGoogle ScholarCross RefCross Ref
  29. D. Dhillon. 2011. Developer-driven threat modeling. IEEE Security & Privacy. 9, 4 (2011), 41--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. W. Dietz and B.W. Bevens. 1970. Learn by doing. Walter Dietz, Summit, USA.Google ScholarGoogle Scholar
  31. T. Dimkov, W. Pieters, and P. Hartel. 2011. Training students to steal. In Proceedings of the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE '11). ACM Press, New York, USA, 21--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. J. Dolin and R. Evans. 2017. Transforming assessment. Springer, Berlin, Germany.Google ScholarGoogle Scholar
  33. C.R. Dooley. 1946. Training within industry in the United States. International Labour Review. 54, 3 (1946), 160--178.Google ScholarGoogle Scholar
  34. d.school. 2013. Bootcamp bootleg. Stanford University, Stanford, USA.Google ScholarGoogle Scholar
  35. W. Du. 2011. Hands-on lab exercises for computer security education. IEEE Security & Privacy. 9, 5 (2011), 70--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. W. Dutton. 2017. Fostering a cyber security mindset. Internet Policy Review. 6, 1 (2017), 110--123.Google ScholarGoogle Scholar
  37. European Union. 2016. General data protection regulation. Official Journal of the European Union. L 119, 4.5.2016 (2016), 1--88.Google ScholarGoogle Scholar
  38. J. Evers and R. Kneyber. 2015. Flip the system. Routledge, Abingdon, UK.Google ScholarGoogle Scholar
  39. N. Ferguson, B. Schneier, and T. Kohno. 2011. Cryptography engineering. John Wiley & Sons, New York, USA.Google ScholarGoogle Scholar
  40. R.P. Feynman. 1974. Cargo cult science. Engineering and Science. 37, 7 (1974), 10--13.Google ScholarGoogle Scholar
  41. J. Freund and J. Jones. 2014. Measuring and managing information risk. Butterworth-Heinemann, Oxford, UK. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. E.R. Fyfe, N.M. McNeil, J.Y. Son, and R.L. Goldstone. 2014. Concreteness fading in mathematics and science instruction. Educational Psychology Review. 26, 1 (2014), 9--25.Google ScholarGoogle ScholarCross RefCross Ref
  43. R.M. Gagne and L.J. Briggs. 1974. Principles of instructional design. Holt, Rinehart & Winston, New York, USA.Google ScholarGoogle Scholar
  44. A. Gawande. 2009. The checklist manifesto. Metropolitan Books, New York, USA.Google ScholarGoogle Scholar
  45. G. Gibbs. 2010. Using assessment to support student learning. Leeds Met Press, Leeds, UK.Google ScholarGoogle Scholar
  46. L. Giles. 1910. The art of war (a translation of a work by Sun Tzu). Luzac & Company, London, UK.Google ScholarGoogle Scholar
  47. A. Gordon. 2015. Official (ISC)2 guide to the CISSP CBK, 4th edition. CRC Press, Boca Raton, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. F.W. Guldenmund. 2000. The nature of safety culture. Safety Science. 34, 1 (2000), 215--257.Google ScholarGoogle ScholarCross RefCross Ref
  49. D.F. Haasl. 1965. Advanced concepts in fault tree analysis. In Proceedings of the System Safety Symposium. Boeing Company, Seattle, USA.Google ScholarGoogle Scholar
  50. D.F. Halpern. 1998. Teaching critical thinking for transfer across domains. American Psychologist. 53, 4 (1998), 449--455.Google ScholarGoogle ScholarCross RefCross Ref
  51. J. Hattie and H. Timperley. 2007. The power of feedback. Review of Educational Research. 77, 1 (2007), 81--112.Google ScholarGoogle Scholar
  52. C. Herley and P.C. van Oorschot. 2018. Science of security. IEEE Security & Privacy. 16, 1 (2018), 12--22.Google ScholarGoogle ScholarCross RefCross Ref
  53. R.J. Heuer. 1999. Psychology of intelligence analysis. Central Intelligence Agency, Langley, USA.Google ScholarGoogle Scholar
  54. E. Hollnagel, D.D. Woods, and N. Leveson. 2006. Resilience engineering. Ashgate, Aldershot, UK.Google ScholarGoogle Scholar
  55. C.M. Holloway and C.W. Johnson. 2006. Why system safety professionals should read accident reports. In Proceedings of the 1st IET International Conference on System Safety (SSCS '06). Institution of Engineering and Technology, Stevenage, UK, 325--331.Google ScholarGoogle Scholar
  56. G.J. Holzmann. 2003. The SPIN model checker. Addison-Wesley, Boston, USA.Google ScholarGoogle Scholar
  57. G.J. Holzmann. 2006. The power of 10. Computer. 39, 6 (2006), 95--99.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Homeland Security Advisory Council. 2012. CyberSkills Task Force report. United States Department of Homeland Security, Washington, USA.Google ScholarGoogle Scholar
  59. W.S. Humphrey. 1988. Characterizing the software process. IEEE Software. 5, 2 (1988), 73--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. IDEO.org. 2003. The field guide to human-centered design. IDEO, Palo Alto, USA.Google ScholarGoogle Scholar
  61. INCOSE. 2014. Systems engineering handbook, 4th edition. International Council on Systems Engineering, San Diego, USA.Google ScholarGoogle Scholar
  62. ISACA. 2008. Information technology assurance framework, 3rd edition. ISACA, Rolling Meadows, USA.Google ScholarGoogle Scholar
  63. ISACA. 2012. Control objectives for information and related technology, 5th edition. ISACA, Rolling Meadows, USA.Google ScholarGoogle Scholar
  64. K. Ishikawa. 1976. Cause-and-effect diagram. In Guide to quality control. Asian Productivity Organization, Tokyo, Japan, 18--28.Google ScholarGoogle Scholar
  65. ISO. 2011. Information security risk management. ISO 27005-2011. International Organization for Standardization, Geneva, Switzerland.Google ScholarGoogle Scholar
  66. ISO. 2013. Information security management systems. ISO 27001-2013. International Organization for Standardization, Geneva, Switzerland.Google ScholarGoogle Scholar
  67. ISO. 2013. Code of practice for information security controls. ISO 27002-2013. International Organization for Standardization, Geneva, Switzerland.Google ScholarGoogle Scholar
  68. ISO. 2014. Vulnerability disclosure. ISO 29147-2014. International Organization for Standardization, Geneva, Switzerland.Google ScholarGoogle Scholar
  69. ISO. 2015. Quality management systems. ISO 9001-2015. International Organization for Standardization, Geneva, Switzerland.Google ScholarGoogle Scholar
  70. D. Jackson. 2012. Software abstractions, 2nd edition. MIT Press, Cambridge, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. S.Johnson. 1998. Who moved my cheese? Putnam, New York, USA.Google ScholarGoogle Scholar
  72. Joint Task Force on Cybersecurity Education. 2017. Curriculum guidelines for post-secondary degree programs in cybersecurity (CSEC2017). ACM Press, New York, USA.Google ScholarGoogle Scholar
  73. L. Kimbell. 2015. Applying design approaches to policy making. University of Brighton, Brighton, UK.Google ScholarGoogle Scholar
  74. J.H.G. Klabbers. 2009. The magic circle, 3rd edition. Sense Publishers, Rotterdam, The Netherlands.Google ScholarGoogle Scholar
  75. L. Kohnfelder and P. Garg. 1999. The threats to our products. Microsoft Corporation, Redmond, USA.Google ScholarGoogle Scholar
  76. T. Kohno. 2009. What to contribute (Winter 2009 CSE 484 / CSE M 584). Retrieved from https://cubist.cs.washington.edu/Security/2009/01/04/what-to-contribute-winter-2009-cse-484-cse-m-584/.Google ScholarGoogle Scholar
  77. D.R. Krathwohl. 2002. A revision of Bloom's taxonomy. Theory Into Practice. 41, 4 (2002), 212--218.Google ScholarGoogle ScholarCross RefCross Ref
  78. D.R. Krathwohl, B.S. Bloom, and B.B. Masia. 1964. Taxonomy of educational objectives. David McKay Company, New York, USA.Google ScholarGoogle Scholar
  79. T.S. Kuhn. 1962. The structure of scientific revolutions. University of Chicago Press, Chicago, USA.Google ScholarGoogle Scholar
  80. P. Kumaraguru, Y. Rhee, A. Acquisti, L.F. Cranor, J. Hong, and E. Nunge. 2007. Protecting people from phishing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '07). ACM Press, New York, USA, 905--914. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. J.A. Kupsch, B.P. Miller, E. Heymann, and E. Cesar. 2010. First principles vulnerability assessment. In Proceedings of the 2010 ACM Cloud Computing Security Workshop (CCSW '10). ACM Press, New York, USA, 87--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. P. Ladkin and K. Loer. 1998. Why-because analysis. RVS-Bk-98-01. Bielefeld University, Bielefeld, Germany.Google ScholarGoogle Scholar
  83. L. Lamport. 2002. Specifying systems. Addison-Wesley, Boston, USA.Google ScholarGoogle Scholar
  84. B. Larcom. 2012. Trike version 1.5.06 spreadsheet (help). Retrieved from https://sourceforge.net/projects/trike/files/trike/1.5.06/.Google ScholarGoogle Scholar
  85. J.H. Larkin and H.A. Simon. 1987. Why a diagram is (sometimes) worth ten thousand words. Cognitive Science. 11, 1 (1987), 65--100.Google ScholarGoogle Scholar
  86. T. Lenoir and H. Lowood. 2005. Theaters of war. In Collection, laboratory, theater. H. Schramm, L. Schwarte, and J. Lazardzig, eds. Walter de Gruyter, Berlin, Germany, 427--456.Google ScholarGoogle Scholar
  87. L. Lessig. 2006. Code v2. Basic Books, New York, USA.Google ScholarGoogle Scholar
  88. N. Leveson. 1994. High-pressure steam engines and computer software. Computer. 27, 10 (1994), 65--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. N. Leveson. 1995. Safeware. Addison-Wesley, Reading, USA.Google ScholarGoogle Scholar
  90. N. Leveson. 2011. Engineering a safer world. MIT Press, Cambridge, USA.Google ScholarGoogle Scholar
  91. S. Levy. 1984. Hackers. Anchor Press, Garden City, USA.Google ScholarGoogle Scholar
  92. R.R. Linde. 1975. Operating system penetration. In Proceedings of the 1975 National Computer Conference and Exposition (AFIPS '75). ACM Press, New York, USA, 361--368. Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. S. Lipner. 2004. The trustworthy computing security development lifecycle. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04). IEEE Computer Society, Washington, USA, 2--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. S. Lueders. 2016. CERN computer security (presentation given at Rotterdam UAS on 2018-09-16). CERN, Geneva, Switzerland.Google ScholarGoogle Scholar
  95. R.D. Marshall, E.O. Pfrang, E.V. Leyendecker, K.A. Woodward, R.P. Reed, M.B. Kasen, and T.R. Shives. 1982. Investigation of the Kansas City Hyatt Regency walkways collapse. NBS BSS 143. National Bureau of Standards, Washington, USA.Google ScholarGoogle Scholar
  96. D.B. McCoach, R.K. Gable, and J.P. Madura. 2013. Instrument development in the affective domain. Springer, Berlin, Germany.Google ScholarGoogle Scholar
  97. G. McGraw. 2006. Software security. Addison-Wesley, Boston, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. MISRA. 2013. Guidelines for the use of the C language in critical systems, 3rd edition. MIRA Limited, Nuneaton, UK.Google ScholarGoogle Scholar
  99. B. Moggridge. 2007. People and prototypes. In Designing interactions. MIT Press, Cambridge, USA, 641--735.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. NCSC. 2013. Policy for arriving at a practice for responsible disclosure. Ministry of Security and Justice, The Hague, NL.Google ScholarGoogle Scholar
  101. T.P. Nelms, J.M. Jones, and D.P. Gray. 1993. Role modeling. Journal of Nursing Education. 32, 1 (1993), 18--23.Google ScholarGoogle Scholar
  102. W. Newhouse, S. Keith, B. Scribner, and G. Witte. 2017. NICE cybersecurity workforce framework. NIST SP 800-181. National Institute of Standards and Technology, Gaithersburg, USA.Google ScholarGoogle Scholar
  103. T. Nipkow, L.C. Paulson, and M. Wenzel. 2002. Isabelle/HOL. Springer, Berlin, Germany.Google ScholarGoogle Scholar
  104. NIST. 2018. Framework for improving critical infrastructure cybersecurity (version 1.1). National Institute of Standards and Technology, Gaithersburg, USA.Google ScholarGoogle Scholar
  105. D. Norman. 2013. The design of everyday things, 2nd edition. Basic Books, New York, USA.Google ScholarGoogle Scholar
  106. G. Nuthall. 2007. The hidden lives of learners. NZCER Press, Wellington, New Zealand.Google ScholarGoogle Scholar
  107. G. Orwell. 1945. Animal farm. Secker & Warburg, London, UK.Google ScholarGoogle Scholar
  108. G. Orwell. 1949. Nineteen eighty-four. Secker & Warburg, London, UK.Google ScholarGoogle Scholar
  109. R. Paul and L. Elder. 2016. The art of Socratic questioning. Foundation for Critical Thinking, Tomales, USA.Google ScholarGoogle Scholar
  110. W. Pieters, J. Barendse, M. Ford, C.P.R. Heath, C.W. Probst, and R. Verbij. 2016. The navigation metaphor in security economics. IEEE Security & Privacy. 14, 3 (2016), 14--21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. W. Pieters and A. van Cleeff. 2009. The precautionary principle in a world of digital dependencies. Computer. 42, 6 (2009), 50--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. K. Popper. 1959. The logic of scientific discovery. Hutchinson & Company, London, UK.Google ScholarGoogle Scholar
  113. M.E. Porter. 1979. How competitive forces shape strategy. Harvard Business Review. 59, 2 (1979), 137--145.Google ScholarGoogle Scholar
  114. C.W. Probst, J. Willemson, and W. Pieters. 2015. The attack navigator. In Proceedings of the 2nd International Workshop on Graphical Models for Security (GraMSec '15). Springer, Berlin, Germany, 1--17.Google ScholarGoogle Scholar
  115. PwC. 2013. Internal control integrated framework. Committee of Sponsoring Organizations of the Treadway Commission, New York, USA.Google ScholarGoogle Scholar
  116. PwC. 2017. Enterprise risk management integrated framework. Committee of Sponsoring Organizations of the Treadway Commission, New York, USA.Google ScholarGoogle Scholar
  117. J. Romein. 1937. De dialektiek van de vooruitgang. In Het onvoltooid verleden. Querido, Amsterdam, The Netherlands, 9--64.Google ScholarGoogle Scholar
  118. R. Ross, M. McEvilley, and J.C. Oren. 2018. Systems security engineering. NIST SP 800-160v1. National Institute of Standards and Technology, Gaithersburg, USA.Google ScholarGoogle Scholar
  119. P. Saitta, B. Larcom, and M. Eddington. 2005. Trike version 1.0 methodology document. Retrieved from http://www.octotrike.org/papers/Trike_v1_Methodology_Document-draft.pdf.Google ScholarGoogle Scholar
  120. B. Schneier. 2008. The security mindset. Retrieved from https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html.Google ScholarGoogle Scholar
  121. B. Schneier. 2012. Liars and outliers. John Wiley & Sons, New York, USA.Google ScholarGoogle Scholar
  122. D.A. Schoen. 1983. The reflective practitioner. Basic Books, New York, USA.Google ScholarGoogle Scholar
  123. A. Shostack. 2008. Experiences threat modeling at Microsoft. In Proceedings of the Workshop on Modeling Security (MODSEC '08). Sun SITE Central Europe, Aachen, Germany, 41--51.Google ScholarGoogle Scholar
  124. A. Shostack. 2014. Threat modeling. John Wiley & Sons, New York, USA.Google ScholarGoogle Scholar
  125. H.A. Simon. 1962. The architecture of complexity. Proceedings of the American Philosophical Society. 106, 6 (1962), 467--482.Google ScholarGoogle Scholar
  126. H.A. Simon. 1996. The sciences of the artificial, 3rd edition. MIT Press, Cambridge, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  127. Software Engineering Institute. 2016. SEI CERT C coding standard, 2016 edition. Carnegie Mellon University, Pittsburgh, USA.Google ScholarGoogle Scholar
  128. T. Srivatanakul. 2005. Security analysis with deviational techniques. University of York, York, UK.Google ScholarGoogle Scholar
  129. T. Srivatanakul, J.A. Clark, and F. Polack. 2004. Effective security requirements analysis. In Proceedings of the 7th International Conference on Information Security (ISC '04). Springer, Berlin, Germany, 416--427.Google ScholarGoogle Scholar
  130. B. Suits. 1978. The grasshopper. University of Toronto Press, Toronto, Canada.Google ScholarGoogle Scholar
  131. M. Svinicki and W.J. McKeachie. 2014. Facilitating discussion. In McKeachie's teaching tips. Wadsworth, Belmont, USA, 38--57.Google ScholarGoogle Scholar
  132. F. Swiderski and W. Snyder. 2004. Threat modeling. Microsoft Press, Redmond, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. T. UcedaVelez and M.M. Morana. 2015. Risk centric threat modeling. John Wiley & Sons, New York, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. UFMCS. 2016. The applied critical thinking handbook (version 8.1). University of Foreign Military and Cultural Studies, Fort Leavenworth, USA.Google ScholarGoogle Scholar
  135. United States Congress. 2002. Sarbanes-Oxley act of 2002. United States Statutes at Large. 116, 1 (2002), 745--810.Google ScholarGoogle Scholar
  136. United States Department of Commerce. 1937. Report of airship Hindenburg accident investigation. Air Commerce Bulletin. 9, 2 (1937), 21--36.Google ScholarGoogle Scholar
  137. J.J.G. van Merrienboer, R.E. Clark, and M.B.M. de Croock. 2002. Blueprints for complex learning. Educational Technology Research and Development. 50, 2 (2002), 39--64.Google ScholarGoogle ScholarCross RefCross Ref
  138. R.B. Vaughn, D.A. Dampier, and M.B. Warkentin. 2004. Building an information security education program. In Proceedings of the 1st Annual Conference on Information Security Curriculum Development (InfoSecCD '04). ACM Press, New York, USA, 41--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. R. Wash. 2010. Folk models of home computer security. In Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS '10). ACM Press, New York, USA, 130--145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. R. Wass and C. Golding. 2014. Sharpening a tool for teaching. Teaching in Higher Education. 19, 6 (2014), 671--684.Google ScholarGoogle ScholarCross RefCross Ref
  141. C. Weissman. 1995. Penetration testing. In Information security. M.D. Abrams, S. Jajodia, and H.J. Podell, eds. IEEE Computer Society, Washington, USA, 269--296.Google ScholarGoogle Scholar
  142. W. Westera. 2001. Competences in education. Journal of Curriculum Studies. 33, 1 (2001), 75--88.Google ScholarGoogle ScholarCross RefCross Ref
  143. E.L. Wiener, B.G. Kanki, and R.L. Helmreich. 2010. Crew resource management. Academic Press, Cambridge, USA.Google ScholarGoogle Scholar
  144. G.P. Wiggins and J. McTighe. 2005. Understanding by design, 2nd edition. ASCD, Alexandria, USA.Google ScholarGoogle Scholar
  145. B.J. Wood and R.A. Duggan. 2000. Red teaming of advanced information assurance concepts. In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX '00). IEEE Computer Society, Washington, USA, 112--118.Google ScholarGoogle Scholar
  146. D. Wood, J.S. Bruner, and G. Ross. 1976. The role of tutoring in problem solving. Journal of Child Psychology and Psychiatry. 17, 2 (1976), 89--100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. M. Zenko. 2016. Red team. Basic Books, New York, USA.Google ScholarGoogle Scholar
  148. C. Zimmerman. 2014. Ten strategies of a world-class cybersecurity operations center. MITRE Corporation, Bedford, USA.Google ScholarGoogle Scholar

Index Terms

  1. Against Mindset

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      NSPW '18: Proceedings of the New Security Paradigms Workshop
      August 2018
      139 pages
      ISBN:9781450365970
      DOI:10.1145/3285002

      Copyright © 2018 Public Domain

      This paper is authored by an employee(s) of the United States Government and is in the public domain. Non-exclusive copying or redistribution is allowed, provided that the article citation is given and the authors and agency are clearly identified as its source.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 August 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      NSPW '18 Paper Acceptance Rate11of31submissions,35%Overall Acceptance Rate62of170submissions,36%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader