skip to main content
10.1145/3285002.3285013acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

Shifting Paradigms: Using Strategic Foresight to Plan for Security Evolution

Published:28 August 2018Publication History

ABSTRACT

Everyone wants to know the future. Exploring the future is not to make predictions, but to anticipate which futures might happen, so we may make better decisions today. The foresight process is a tool which enables researchers to become more attuned to the future; the foresight process is designed to help anticipate emerging trends, rather than be surprised by dramatic change. This paper identifies possible futures in two ways: extrapolating from the present into the future, and starting from future states to reconstruct how they might be arrived at from the current state. The result is 12 fresh scenarios and 13 new paradigms.

References

  1. 1998. Proceedings of the 1998 Workshop on New Security Paradigms. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA.Google ScholarGoogle Scholar
  2. Marshall D. Abrams. 1998. Security engineering in an evolutionary acquisition environment. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Donald Beaver. 1998. Server-assisted cryptography.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Bishop and A. Hines. 2012. Teaching About the Future (1 ed.). 0, Vol. 1. Palgrave Macmillan.Google ScholarGoogle Scholar
  5. LiWu Chang and Ira S. Moskowitz. 1998. Parsimonious downgrading and decision trees applied to the inference problem.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D.L. Cooperrider, D. Whitney, and J.M. Stavros. 2008. Appreciative Inquiry Handbook (2 ed.). 1, Vol. 1. Crown Custom Publishing, Brunswick, OH.Google ScholarGoogle Scholar
  7. Crispin Cowan and Calton Pu. 1998. Death, taxes, and imperfect software: surviving the inevitable. (9 1998).Google ScholarGoogle Scholar
  8. E. Dragt. 2017. How to Research Trends (1 ed.). 1, Vol. 1. BIS Publishers BV.Google ScholarGoogle Scholar
  9. K.H.Dreborg. 1996. Essence of Backcasting. Futures 28, 9 (7 1996), 813--828. An optional note.Google ScholarGoogle Scholar
  10. Simon N. Foley. 1998. Evaluating system integrity.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Steven J. Greenwald. 1998. Discussion topic: what is the old security paradigm?. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Sohail Inayatullah. 1993. Causal Layered Analysis: Poststructuralism as Method. Futures 30, 8 (10 1993), 815--29.Google ScholarGoogle Scholar
  13. Sohail Inayatullah. 2014. Causal Layered Analysis Defined. The Futurist 48, 2 (2 2014).Google ScholarGoogle Scholar
  14. Michael Dunner Srinath Vasireddy Ray Escamilla J.D. Meier, Alex Mackman and Anandha Murukan. 2003. Improving Web Application Security: Threats and Countermeasures Roadmap (1 ed.). Microsoft Corporation.Google ScholarGoogle Scholar
  15. Erland Jonsson. 1998. An integrated framework for security and dependability.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Clifford Kahn. 1998. Tolerating penetrations and insider attacks by requiring independent corroboration.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Meng-Jang Lin, Aleta M. Ricciardi, and Keith Marzullo. 1998. A new model for availability in the face of self-propagating attacks.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. McDermott. 1998. Prolepsis on the problem of Trojan-horse based integrity attacks. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Standards Association of Australia. 1995. AS/NZS 4360: Risk Management. Standards Association of Australia.Google ScholarGoogle Scholar
  20. Cynthia Phillips and Laura Painton Swiler. 1998. A graph-based system for network-vulnerability analysis.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. The Millennium Project. 2009. Futures Wheel, Futures Research Methodology Version 3.0 (3 ed.). The Millennium Project, Washington, DC.Google ScholarGoogle Scholar
  22. Noah Raford and Andrew (ed.) Curry. 2012. The Future of Futures (1 ed.). 1, Vol. 1. Association of Professional Futurists, Houston, TX, Chapter 8, From Design Fiction to Experiential Futures.Google ScholarGoogle Scholar
  23. Thomas Riechmann and Franz J. Hauck. 1998. Meta objects for access control: a formal model for role-based principals.. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. H. Sackman. 1974. Delphi Assessment: Expert Opinion, Forecasting and Group Process. Technical Report AD-786 878/R-1283-PR. RAND Corporation.Google ScholarGoogle Scholar
  25. Chris Salter, O. Sami Saydjari, Bruce Schneier, and Jim Wallner. 1998. Toward a secure system engineering methodology. In Proceedings of the 1998 workshop on New security paradigms (NSPW '98). ACM, Charlottesville, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Shifting Paradigms: Using Strategic Foresight to Plan for Security Evolution

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              NSPW '18: Proceedings of the New Security Paradigms Workshop
              August 2018
              139 pages
              ISBN:9781450365970
              DOI:10.1145/3285002

              Copyright © 2018 ACM

              © 2018 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 28 August 2018

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

              Acceptance Rates

              NSPW '18 Paper Acceptance Rate11of31submissions,35%Overall Acceptance Rate62of170submissions,36%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader