首页> 外文会议>International Conference on Cyber Conflict >Rethinking the data wheel: Automating open-access, public data on cyber conflict
【24h】

Rethinking the data wheel: Automating open-access, public data on cyber conflict

机译:重新思考数据轮:自动化开放访问,网络冲突的公共数据

获取原文

摘要

To date, researchers studying cyber conflict through publicly available information sources have either selected on the actor or selected on the intrusion method when coding events. Both approaches lead to distinct challenges when it comes to result validation and the avoidance of selection bias. This article describes prospects for open-source, public data collection for cyber security events. We present an initial data collection and analysis effort of interstate cyber conflict incidents involving the United States as a pilot study. Using a tailored collection of more than 155,000 documents from print-only media sources, we describe a method to process data, parse document elements, and populate an event dataset. Human coders are then tasked with validation of incident information, after which the search code is updated to ensure greater accuracy in subsequent runs. In the study, the data produced are compared with previously available data on cyber conflict involving the United States. We demonstrate that the method can effectively capture and describe cyber conflict incidents for researchers to study in a broad range of research efforts. Moreover, this method captures greater granularity within cyber conflict episodes, which are inherently multi-faceted. This approach to cyber conflict analysis carries with it several distinct advantages over alternative research designs, in that it promises to produce significantly larger amounts of pertinent metadata than might otherwise be possible.
机译:迄今为止,通过公开可用信息来源研究网络冲突的研究人员在演员中选择或在编码事件时选择入侵方法。两种方法都会导致结果验证和避免选择偏差时呈不同挑战。本文介绍了网络安全事件的开源,公共数据收集的前景。我们展示了涉及美国作为试点研究的州际网络冲突事件的初步数据收集和分析。使用仅在仅打印媒体源的量身定制的超过155,000个文档,我们描述了一种处理数据,解析文档元素并填充事件数据集的方法。然后,人类编码器将验证入射信息,之后更新搜索代码,以确保随后的运行中更高的准确性。在该研究中,产生的数据与涉及美国的网络冲突的先前可用数据进行比较。我们证明该方法可以有效地捕获和描述研究人员在广泛的研究工作中研究的网络冲突事件。此外,该方法在网络冲突剧集中捕获了更大的粒度,这是固有的多面的。这种对网络冲突分析的方法通过替代研究设计提供了几种独特的优势,因为它有望产生比其他可能的相关元数据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号