首页 > 最新文献

Computers & Security最新文献

英文 中文
Cookies, identifiers and other data that google silently stores on android handsets 谷歌在安卓手机上静默存储的cookie、标识符和其他数据
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-06-01 Epub Date: 2026-02-07 DOI: 10.1016/j.cose.2026.104850
D.J. Leith
It is known that cookies and other data can be used to track user activity and infringe privacy, but most work to date has focussed on the cookies stored by web browsers rather than by other mobile apps. We report on the results of a measurement study investigating the cookies, identifiers and other data stored on Android handsets by Google Play Services, the Google Play store and other pre-installed Google apps. We decrypt handset network traffic and analyse the data stored on the handset disk. We find that multiple cookies and identifiers are sent by Google servers and stored on the handset, even when no Google apps have ever been opened by the user. This includes advertising analytics/tracking cookies, links and device identifiers. No consent is sought for storing any of this data and there is no opt out. Our measurements raise concerns that Google is violating EU data privacy regulations, which generally require specific, informed and unambiguous user consent before data can be stored on a handset.
众所周知,cookie和其他数据可以用来跟踪用户活动并侵犯隐私,但迄今为止,大多数工作都集中在网络浏览器存储的cookie上,而不是其他移动应用程序。我们报告了一项测量研究的结果,该研究调查了谷歌Play Services、谷歌Play store和其他预装谷歌应用程序在Android手机上存储的cookie、标识符和其他数据。我们解密手机网络通信并分析存储在手机磁盘上的数据。我们发现,即使用户从未打开过谷歌应用程序,谷歌服务器也会发送多个cookie和标识符并存储在手机上。这包括广告分析/跟踪cookie、链接和设备标识符。存储这些数据无需征得同意,也没有选择退出的权利。我们的测量引起了人们对b谷歌违反欧盟数据隐私法规的担忧,这些法规通常要求在数据存储在手机上之前获得具体、知情和明确的用户同意。
{"title":"Cookies, identifiers and other data that google silently stores on android handsets","authors":"D.J. Leith","doi":"10.1016/j.cose.2026.104850","DOIUrl":"10.1016/j.cose.2026.104850","url":null,"abstract":"<div><div>It is known that cookies and other data can be used to track user activity and infringe privacy, but most work to date has focussed on the cookies stored by web browsers rather than by other mobile apps. We report on the results of a measurement study investigating the cookies, identifiers and other data stored on Android handsets by Google Play Services, the Google Play store and other pre-installed Google apps. We decrypt handset network traffic and analyse the data stored on the handset disk. We find that multiple cookies and identifiers are sent by Google servers and stored on the handset, even when no Google apps have ever been opened by the user. This includes advertising analytics/tracking cookies, links and device identifiers. No consent is sought for storing any of this data and there is no opt out. Our measurements raise concerns that Google is violating EU data privacy regulations, which generally require specific, informed and unambiguous user consent before data can be stored on a handset.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"165 ","pages":"Article 104850"},"PeriodicalIF":5.4,"publicationDate":"2026-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146161962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of cybersecurity recommendations from smart home vendors’ chatbots on user’s cybersecurity coping process 智能家居厂商的聊天机器人网络安全建议对用户网络安全应对过程的影响
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-06-01 Epub Date: 2026-02-08 DOI: 10.1016/j.cose.2026.104858
Jengchung Victor Chen, Yang-Suen Chen, Thanh-Minh Ha Le
The growth of smart home devices does not only increase at-home convenience but also amplifies cybersecurity risks. While technological solutions are critical, enhancing user cybersecurity awareness is equally important for mitigating these risks. This study investigates whether cybersecurity recommendations from smart home vendors’ chatbots influence users’ coping processes, as part of awareness formation. Drawing on technology threat avoidance theory, we conceptualize awareness as a developmental process encompassing threat appraisal, coping appraisal, and subsequent coping responses. We integrate social information processing theory to examine how chatbot design elements (i.e., social presence and message personalization) serve as informational cues shaping users’ appraisals and coping behaviors. Using data from 533 U.S. smart home users collected via Amazon Mechanical Turk, we employ partial least squares (PLS) analysis. Results indicate that chatbot’s social presence and message personalization increase both perceived cybersecurity threat and perceived avoidability. These appraisals, in turn, promote problem-focused coping (i.e., purchasing devices with built-in cybersecurity safeguards) and emotion-focused coping (inward and outward). Among coping outcomes, only outward emotion-focused coping increases problem-focused coping, whereas inward emotion-focused coping shows no significant effect.
智能家居设备的增长不仅增加了家庭的便利性,也放大了网络安全风险。虽然技术解决方案至关重要,但提高用户的网络安全意识对于减轻这些风险同样重要。本研究调查了智能家居供应商的聊天机器人的网络安全建议是否会影响用户的应对过程,作为意识形成的一部分。利用技术威胁回避理论,我们将意识概念化为一个包括威胁评估、应对评估和随后的应对反应的发展过程。我们整合社会信息处理理论来研究聊天机器人设计元素(即社交存在和信息个性化)如何作为信息线索来塑造用户的评价和应对行为。使用通过亚马逊土耳其机器人收集的533名美国智能家居用户的数据,我们采用偏最小二乘(PLS)分析。结果表明,聊天机器人的社交存在和信息个性化增加了网络安全威胁感知和网络安全回避感知。这些评估反过来又促进了以问题为中心的应对(即购买内置网络安全保障的设备)和以情绪为中心的应对(向内和向外)。在应对结果中,只有以外向情绪为中心的应对增加了以问题为中心的应对,而以内向情绪为中心的应对没有显著影响。
{"title":"Impact of cybersecurity recommendations from smart home vendors’ chatbots on user’s cybersecurity coping process","authors":"Jengchung Victor Chen,&nbsp;Yang-Suen Chen,&nbsp;Thanh-Minh Ha Le","doi":"10.1016/j.cose.2026.104858","DOIUrl":"10.1016/j.cose.2026.104858","url":null,"abstract":"<div><div>The growth of smart home devices does not only increase at-home convenience but also amplifies cybersecurity risks. While technological solutions are critical, enhancing user cybersecurity awareness is equally important for mitigating these risks. This study investigates whether cybersecurity recommendations from smart home vendors’ chatbots influence users’ coping processes, as part of awareness formation. Drawing on technology threat avoidance theory, we conceptualize awareness as a developmental process encompassing threat appraisal, coping appraisal, and subsequent coping responses. We integrate social information processing theory to examine how chatbot design elements (i.e., social presence and message personalization) serve as informational cues shaping users’ appraisals and coping behaviors. Using data from 533 U.S. smart home users collected via Amazon Mechanical Turk, we employ partial least squares (PLS) analysis. Results indicate that chatbot’s social presence and message personalization increase both perceived cybersecurity threat and perceived avoidability. These appraisals, in turn, promote problem-focused coping (i.e., purchasing devices with built-in cybersecurity safeguards) and emotion-focused coping (inward and outward). Among coping outcomes, only outward emotion-focused coping increases problem-focused coping, whereas inward emotion-focused coping shows no significant effect.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"165 ","pages":"Article 104858"},"PeriodicalIF":5.4,"publicationDate":"2026-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146193030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coping with input stage challenges in information security policy development: Information security managers’ perspectives in a hybrid work environment 应对信息安全政策发展中的输入阶段挑战:混合工作环境中信息安全管理人员的观点
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-05-01 Epub Date: 2026-02-06 DOI: 10.1016/j.cose.2026.104857
Mai Nguyen, Sara Rungård, Shang Gao
The purpose of this paper is to investigate how information security managers cope with the challenges in the input stage when developing an information security policy (ISP) in the context of hybrid work in the financial sector. To address this, an empirical study was conducted using semi-structured interviews with eight information security managers in Sweden’s financial sector. The data is analyzed through qualitative thematic analysis. The lens of institutional theory was also applied to interpret the results. According to the results, 18 challenges and their associated solutions for five selected inputs (i.e., risk assessment, industry standards and guidelines, regulations, existing policies and organizational business requirements) within the input stage of the ISP development are identified. For example, one recurring challenge at the input stage of an organization’s risk assessment is the potential intrusion into employees’ privacy when work occurs in their homes. Risks that are easy to identify and evaluate in a controlled office environment often become less visible or more difficult to assess in home-based settings. This creates uncertainty during the input stage because organizations must address these dispersed and varied risks without intruding on employees’ private lives. This study advances the understanding of the input stage’s challenges in the ISP development process in a hybrid work environment. While previous research has primarily examined the ISP’s input stage in traditional office-based contexts, hybrid work introduces additional complexity. According to the results, organizations must balance essential information security requirements with increasing demands for workplace flexibility. They need to ensure that security expectations remain clear and actionable, yet adaptable enough to accommodate employees working remotely. This tension between maintaining operational security and supporting flexibility poses a significant challenge at the input stage related to organizational business requirements when developing effective ISPs for hybrid work. Furthermore, through the lens of institutional theory, the results indicate that some inputs are more strongly affected by isomorphism (i.e., coercive influence), whereas mimetic and normative influences appear less directly associated with specific inputs. Additionally, a primary practical implication is the encapsulated knowledge on the challenges managers may face and the associated solutions in the input phase of ISP development in the context of hybrid work in the financial sector. Managers can adopt and adapt the suggested solutions to further strengthen their work practices in the input stage of the ISP development.
本文的目的是调查信息安全管理人员如何应对输入阶段的挑战,当制定信息安全政策(ISP)在金融部门的混合工作的背景下。为了解决这个问题,我们对瑞典金融部门的8位信息安全经理进行了半结构化访谈,进行了一项实证研究。数据通过定性专题分析进行分析。制度理论的镜头也被用于解释结果。根据结果,在ISP开发的输入阶段,针对五个选定的输入(即风险评估、行业标准和指南、法规、现有政策和组织业务需求)确定了18个挑战及其相关解决方案。例如,在组织风险评估的输入阶段,一个反复出现的挑战是,当员工在家中工作时,可能会侵犯他们的隐私。在受控的办公室环境中容易识别和评估的风险往往在家庭环境中变得不那么明显或更难评估。这在输入阶段产生了不确定性,因为组织必须在不侵犯员工私人生活的情况下解决这些分散和多样化的风险。本研究促进了对混合工作环境下ISP开发过程中输入阶段挑战的理解。虽然以前的研究主要是在传统的办公室环境中检查ISP的输入阶段,但混合工作引入了额外的复杂性。根据调查结果,组织必须平衡基本的信息安全需求和日益增长的工作场所灵活性需求。他们需要确保安全期望保持清晰和可操作的,并且有足够的适应性来适应远程工作的员工。在为混合工作开发有效的isp时,维护操作安全性和支持灵活性之间的紧张关系在与组织业务需求相关的输入阶段提出了重大挑战。此外,通过制度理论的视角,研究结果表明,一些投入更强烈地受到同构(即强制性影响)的影响,而模仿和规范性影响似乎与特定投入的直接联系较少。此外,一个主要的实际含义是,在金融部门混合工作的背景下,在ISP开发的输入阶段,管理人员可能面临的挑战和相关解决方案的浓缩知识。管理人员可以采纳和调整建议的解决方案,以进一步加强他们在互联网服务提供商发展的投入阶段的工作实践。
{"title":"Coping with input stage challenges in information security policy development: Information security managers’ perspectives in a hybrid work environment","authors":"Mai Nguyen,&nbsp;Sara Rungård,&nbsp;Shang Gao","doi":"10.1016/j.cose.2026.104857","DOIUrl":"10.1016/j.cose.2026.104857","url":null,"abstract":"<div><div>The purpose of this paper is to investigate how information security managers cope with the challenges in the input stage when developing an information security policy (ISP) in the context of hybrid work in the financial sector. To address this, an empirical study was conducted using semi-structured interviews with eight information security managers in Sweden’s financial sector. The data is analyzed through qualitative thematic analysis. The lens of institutional theory was also applied to interpret the results. According to the results, 18 challenges and their associated solutions for five selected inputs (i.e., risk assessment, industry standards and guidelines, regulations, existing policies and organizational business requirements) within the input stage of the ISP development are identified. For example, one recurring challenge at the input stage of an organization’s risk assessment is the potential intrusion into employees’ privacy when work occurs in their homes. Risks that are easy to identify and evaluate in a controlled office environment often become less visible or more difficult to assess in home-based settings. This creates uncertainty during the input stage because organizations must address these dispersed and varied risks without intruding on employees’ private lives. This study advances the understanding of the input stage’s challenges in the ISP development process in a hybrid work environment. While previous research has primarily examined the ISP’s input stage in traditional office-based contexts, hybrid work introduces additional complexity. According to the results, organizations must balance essential information security requirements with increasing demands for workplace flexibility. They need to ensure that security expectations remain clear and actionable, yet adaptable enough to accommodate employees working remotely. This tension between maintaining operational security and supporting flexibility poses a significant challenge at the input stage related to organizational business requirements when developing effective ISPs for hybrid work. Furthermore, through the lens of institutional theory, the results indicate that some inputs are more strongly affected by isomorphism (i.e., coercive influence), whereas mimetic and normative influences appear less directly associated with specific inputs. Additionally, a primary practical implication is the encapsulated knowledge on the challenges managers may face and the associated solutions in the input phase of ISP development in the context of hybrid work in the financial sector. Managers can adopt and adapt the suggested solutions to further strengthen their work practices in the input stage of the ISP development.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104857"},"PeriodicalIF":5.4,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dapadv: Differentiated adversarial perturbation generation method in problem space for android malware detection 针对android恶意软件检测的问题空间差分对抗摄动生成方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-05-01 Epub Date: 2026-01-29 DOI: 10.1016/j.cose.2026.104845
Junwei Tang , Sijie Zhou , Tao Peng , Wenlong Tian
Learning-based methods have been widely applied in the field of Android malware detection. However, adversarial samples pose a serious challenge to such methods, as carefully constructed adversarial samples may evade detection by these detectors. To evaluate the robustness of the mainstream Android malware detection, in this paper, we propose a novel differentiated adversarial perturbation generation method in problem space. We first slice a large number of benign applications to get a set of code slices that preserve context semantics. An improved optimal perturbation screening method based on Hierarchical Attention Network is proposed to effectively select the optimal slice from the code slice set as the perturbation of the target attack model. We perform dynamic adaptive compute based on the target attack model to achieve the optimal adversarial perturbation. After adding perturbation to the target sample, the sample is repackaged and signed to verify the adversarial effect of the detection model. The experimental results on multiple malware datasets show that the adversarial samples generated by our method can significantly reduce the accuracy of the target detectors and achieve better adversarial attack effect compared with the existing methods.
基于学习的方法在Android恶意软件检测领域得到了广泛的应用。然而,对抗性样本对这些方法构成了严重的挑战,因为精心构建的对抗性样本可能会逃避这些检测器的检测。为了评估主流Android恶意软件检测的鲁棒性,本文提出了一种新的问题空间差分对抗摄动生成方法。我们首先对大量良性应用程序进行切片,以获得一组保留上下文语义的代码切片。提出了一种改进的基于层次关注网络的最优摄动筛选方法,从编码片集中有效地选择最优片作为目标攻击模型的摄动。在目标攻击模型的基础上进行动态自适应计算,实现最优的对抗摄动。在对目标样品进行扰动后,对样品进行重新包装和签名,以验证检测模型的对抗效果。在多个恶意软件数据集上的实验结果表明,与现有方法相比,本文方法生成的对抗样本可以显著降低目标检测器的准确率,达到更好的对抗攻击效果。
{"title":"Dapadv: Differentiated adversarial perturbation generation method in problem space for android malware detection","authors":"Junwei Tang ,&nbsp;Sijie Zhou ,&nbsp;Tao Peng ,&nbsp;Wenlong Tian","doi":"10.1016/j.cose.2026.104845","DOIUrl":"10.1016/j.cose.2026.104845","url":null,"abstract":"<div><div>Learning-based methods have been widely applied in the field of Android malware detection. However, adversarial samples pose a serious challenge to such methods, as carefully constructed adversarial samples may evade detection by these detectors. To evaluate the robustness of the mainstream Android malware detection, in this paper, we propose a novel differentiated adversarial perturbation generation method in problem space. We first slice a large number of benign applications to get a set of code slices that preserve context semantics. An improved optimal perturbation screening method based on Hierarchical Attention Network is proposed to effectively select the optimal slice from the code slice set as the perturbation of the target attack model. We perform dynamic adaptive compute based on the target attack model to achieve the optimal adversarial perturbation. After adding perturbation to the target sample, the sample is repackaged and signed to verify the adversarial effect of the detection model. The experimental results on multiple malware datasets show that the adversarial samples generated by our method can significantly reduce the accuracy of the target detectors and achieve better adversarial attack effect compared with the existing methods.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104845"},"PeriodicalIF":5.4,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond self-reporting: Uncovering the operational realities of SME cybersecurity through expert assessment 超越自我报告:通过专家评估揭示中小企业网络安全的运营现实
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-05-01 Epub Date: 2026-01-15 DOI: 10.1016/j.cose.2026.104839
ALLADEAN CHIDUKWANI, SEBASTIAN ZANDER, POLYCHRONIS KOUTSAKIS
This study builds upon the foundational research of Chidukwani et al. (2022, 2024) to critically examine and validate cybersecurity assertions made by small and medium-sized enterprises (SMEs). Through a mixed-method multiple case study design, the research employed a comprehensive methodology to gain firsthand insights into SME cybersecurity postures. Central to this study is the introduction of the Validated Cybersecurity Posture Assessment Framework (VCPAF), a novel multi-layered methodology tailored to the SME context. VCPAF integrates self-reported assessments, expert-led interviews, technical vulnerability scanning, artifact and documentation review, and a triangulated scoring and gap analysis. This holistic and iterative approach enables a more accurate and context-sensitive validation of cybersecurity practices, bridging the gap between perceived and actual security postures.
Fieldwork included site visits, inspections, direct observations, and in-depth interviews with key personnel to validate initial survey responses from Chidukwani et al. (2024). Benchmarking against the NIST Cybersecurity Framework (CSF), the study revealed significant disparities between SMEs’ self-reported cybersecurity practices and evidence from expert assessments. SMEs consistently overstated their cybersecurity maturity, often conflating IT support with cybersecurity services. Overestimations were particularly notable across the NIST CSF’s five core functions: Identify, Protect, Detect, Respond, and Recover with critical weaknesses identified in asset management, patch management, network security, access control, monitoring, and incident response. Additionally, misunderstandings regarding IT provider responsibilities and regulatory obligations were found to exacerbate vulnerabilities.
We conclude that self-reporting alone is insufficient for accurately assessing SME cybersecurity posture. To close the gap between perceived and actual security practices, independent validation and tailored frameworks are critical. We advocate for sector-specific adaptations of established standards, transparent service provider agreements, and mandatory employee training. Additionally, introducing an industry standardised terminology and taxonomy similar to those used in healthcare insurance would simplify service offerings, and improve SME understanding of cybersecurity responsibilities.
本研究以Chidukwani等人(2022,2024)的基础研究为基础,批判性地检验和验证中小企业(SMEs)的网络安全主张。通过混合方法的多案例研究设计,本研究采用了一种综合的方法来获得中小企业网络安全状况的第一手见解。本研究的核心是引入验证网络安全态势评估框架(VCPAF),这是一种针对中小企业环境量身定制的新型多层方法。VCPAF集成了自我报告评估、专家领导的访谈、技术漏洞扫描、工件和文档审查,以及三角评分和差距分析。这种整体和迭代的方法使网络安全实践的验证更加准确和上下文敏感,弥合了感知和实际安全状态之间的差距。实地工作包括实地考察、视察、直接观察和对关键人员的深入访谈,以验证Chidukwani等人(2024)的初步调查结果。该研究以NIST网络安全框架(CSF)为基准,揭示了中小企业自我报告的网络安全实践与专家评估证据之间的显著差异。中小企业一贯夸大其网络安全成熟度,经常将IT支持与网络安全服务混为一谈。在NIST CSF的五个核心功能:识别、保护、检测、响应和恢复中,对资产管理、补丁管理、网络安全、访问控制、监控和事件响应中的关键弱点进行了高估。此外,发现对IT提供者责任和监管义务的误解加剧了漏洞。我们的结论是,仅仅自我报告不足以准确评估中小企业的网络安全态势。为了缩小感知到的和实际的安全实践之间的差距,独立的验证和定制的框架至关重要。我们提倡针对特定行业调整已建立的标准、透明的服务提供商协议和强制性的员工培训。此外,引入类似于医疗保险中使用的行业标准化术语和分类法将简化服务提供,并提高中小企业对网络安全责任的理解。
{"title":"Beyond self-reporting: Uncovering the operational realities of SME cybersecurity through expert assessment","authors":"ALLADEAN CHIDUKWANI,&nbsp;SEBASTIAN ZANDER,&nbsp;POLYCHRONIS KOUTSAKIS","doi":"10.1016/j.cose.2026.104839","DOIUrl":"10.1016/j.cose.2026.104839","url":null,"abstract":"<div><div>This study builds upon the foundational research of Chidukwani et al. (2022, 2024) to critically examine and validate cybersecurity assertions made by small and medium-sized enterprises (SMEs). Through a mixed-method multiple case study design, the research employed a comprehensive methodology to gain firsthand insights into SME cybersecurity postures. Central to this study is the introduction of the Validated Cybersecurity Posture Assessment Framework (VCPAF), a novel multi-layered methodology tailored to the SME context. VCPAF integrates self-reported assessments, expert-led interviews, technical vulnerability scanning, artifact and documentation review, and a triangulated scoring and gap analysis. This holistic and iterative approach enables a more accurate and context-sensitive validation of cybersecurity practices, bridging the gap between perceived and actual security postures.</div><div>Fieldwork included site visits, inspections, direct observations, and in-depth interviews with key personnel to validate initial survey responses from Chidukwani et al. (2024). Benchmarking against the NIST Cybersecurity Framework (CSF), the study revealed significant disparities between SMEs’ self-reported cybersecurity practices and evidence from expert assessments. SMEs consistently overstated their cybersecurity maturity, often conflating IT support with cybersecurity services. Overestimations were particularly notable across the NIST CSF’s five core functions: Identify, Protect, Detect, Respond, and Recover with critical weaknesses identified in asset management, patch management, network security, access control, monitoring, and incident response. Additionally, misunderstandings regarding IT provider responsibilities and regulatory obligations were found to exacerbate vulnerabilities.</div><div>We conclude that self-reporting alone is insufficient for accurately assessing SME cybersecurity posture. To close the gap between perceived and actual security practices, independent validation and tailored frameworks are critical. We advocate for sector-specific adaptations of established standards, transparent service provider agreements, and mandatory employee training. Additionally, introducing an industry standardised terminology and taxonomy similar to those used in healthcare insurance would simplify service offerings, and improve SME understanding of cybersecurity responsibilities.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104839"},"PeriodicalIF":5.4,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insecure by design? A human-centric security perspective on AI-assisted software development 不安全的设计?人工智能辅助软件开发中以人为中心的安全视角
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-05-01 Epub Date: 2026-01-23 DOI: 10.1016/j.cose.2026.104842
Magdalena Glas , Christoph Nirschl , Bar Lanyado , Johan van Niekerk
Generative artificial intelligence (AI) tools are increasingly used in software development, improving the efficiency of software developers. However, this adoption introduces notable security challenges. AI/generated code is not secure by default, as it is often based on large-scale training data that includes open-source code of varying quality and trustworthiness. Developers using these tools may be unaware of the associated risks or may place excessive trust in the security of the output. This briefing paper outlines the key security risks associated with generative AI and offers human-centered strategies for mitigation. Since these risks arise not only from how generative AI models are built but also from how humans interact with them, we adopt a human-centric perspective. To this end, we provide recommendations for individuals, organizations, and educators to help harness the potential of generative AI in software development while effectively managing the associated security risks.
生成式人工智能(AI)工具越来越多地用于软件开发,提高了软件开发人员的效率。然而,这种采用引入了明显的安全挑战。人工智能/生成的代码在默认情况下是不安全的,因为它通常基于大规模的训练数据,其中包括不同质量和可信度的开源代码。使用这些工具的开发人员可能没有意识到相关的风险,或者可能过度信任输出的安全性。本简报概述了与生成式人工智能相关的主要安全风险,并提供了以人为本的缓解策略。由于这些风险不仅来自于生成人工智能模型的构建方式,还来自于人类与它们的互动方式,因此我们采用了以人为中心的观点。为此,我们为个人、组织和教育工作者提供建议,以帮助在有效管理相关安全风险的同时,在软件开发中利用生成人工智能的潜力。
{"title":"Insecure by design? A human-centric security perspective on AI-assisted software development","authors":"Magdalena Glas ,&nbsp;Christoph Nirschl ,&nbsp;Bar Lanyado ,&nbsp;Johan van Niekerk","doi":"10.1016/j.cose.2026.104842","DOIUrl":"10.1016/j.cose.2026.104842","url":null,"abstract":"<div><div>Generative artificial intelligence (AI) tools are increasingly used in software development, improving the efficiency of software developers. However, this adoption introduces notable security challenges. AI/generated code is not secure by default, as it is often based on large-scale training data that includes open-source code of varying quality and trustworthiness. Developers using these tools may be unaware of the associated risks or may place excessive trust in the security of the output. This briefing paper outlines the key security risks associated with generative AI and offers human-centered strategies for mitigation. Since these risks arise not only from how generative AI models are built but also from how humans interact with them, we adopt a human-centric perspective. To this end, we provide recommendations for individuals, organizations, and educators to help harness the potential of generative AI in software development while effectively managing the associated security risks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104842"},"PeriodicalIF":5.4,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OPSA-DP: A trajectory privacy protection scheme based on the optimal decision-making of obfuscation points OPSA-DP:一种基于模糊点最优决策的轨迹隐私保护方案
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-05-01 Epub Date: 2026-02-01 DOI: 10.1016/j.cose.2026.104843
Hui Wang , Ruike Guan , Peiqian Liu, Kun Liu
Ignoring the semantic integrity of trajectory data and the security of sensitive locations may expose personal privacy to threats. To address the issue of ensuring user privacy security while maintaining the usability of published trajectory data, this paper proposes a trajectory privacy protection scheme based on the optimal decision-making of obfuscation points (OPSA-DP). Firstly, user stay points are extracted using the velocity threshold-based dynamic window stay point detection algorithm (VT-DWA). Hotspot areas are then obtained through density-based clustering (DBSCAN), and eventually dividing these hotspot areas into sensitive regions using the sensitive region division algorithm (SRDA) to accurately locate sensitive regions within the trajectory.Secondly, a personalized allocation model is established to accurately allocate privacy budgets to each stay point, based on the regional characteristics identified in the previous step and the spatial attributes and privacy sensitivity levels of each stay point. Finally, multiple sets of confusion points are generated within sensitive regions, and the optimal obfuscation points are accurately selected using the scoring function in the obfuscation point selection algorithm (OPSA). The moving points adjacent to sensitive regions are reconstructed to address potential trajectory mutation after replacement, thereby ensuring the final output trajectory exhibits both integrity and continuity. Experiments show that compared with existing methods, this scheme improves trajectory usability and can effectively resist semantic inference attacks, providing a new solution for balancing privacy protection and service value.
忽视轨迹数据的语义完整性和敏感位置的安全性可能会使个人隐私受到威胁。为解决在保证发布轨迹数据可用性的同时保证用户隐私安全的问题,提出了一种基于模糊点最优决策(OPSA-DP)的轨迹隐私保护方案。首先,利用基于速度阈值的动态窗口停留点检测算法(VT-DWA)提取用户停留点;然后通过基于密度的聚类(DBSCAN)获得热点区域,最后利用敏感区域划分算法(SRDA)将热点区域划分为敏感区域,精确定位轨迹内的敏感区域。其次,根据前一步识别的区域特征,结合各住宿点的空间属性和隐私敏感程度,建立个性化的隐私预算分配模型,将隐私预算准确分配到各住宿点;最后,在敏感区域内生成多组混淆点,并利用混淆点选择算法(OPSA)中的评分函数精确选择最优混淆点。对敏感区域附近的移动点进行重构,以解决替换后可能发生的轨迹突变,从而保证最终输出轨迹的完整性和连续性。实验表明,与现有方法相比,该方案提高了轨迹可用性,能够有效抵御语义推理攻击,为平衡隐私保护和服务价值提供了新的解决方案。
{"title":"OPSA-DP: A trajectory privacy protection scheme based on the optimal decision-making of obfuscation points","authors":"Hui Wang ,&nbsp;Ruike Guan ,&nbsp;Peiqian Liu,&nbsp;Kun Liu","doi":"10.1016/j.cose.2026.104843","DOIUrl":"10.1016/j.cose.2026.104843","url":null,"abstract":"<div><div>Ignoring the semantic integrity of trajectory data and the security of sensitive locations may expose personal privacy to threats. To address the issue of ensuring user privacy security while maintaining the usability of published trajectory data, this paper proposes a trajectory privacy protection scheme based on the optimal decision-making of obfuscation points (OPSA-DP). Firstly, user stay points are extracted using the velocity threshold-based dynamic window stay point detection algorithm (VT-DWA). Hotspot areas are then obtained through density-based clustering (DBSCAN), and eventually dividing these hotspot areas into sensitive regions using the sensitive region division algorithm (SRDA) to accurately locate sensitive regions within the trajectory.Secondly, a personalized allocation model is established to accurately allocate privacy budgets to each stay point, based on the regional characteristics identified in the previous step and the spatial attributes and privacy sensitivity levels of each stay point. Finally, multiple sets of confusion points are generated within sensitive regions, and the optimal obfuscation points are accurately selected using the scoring function in the obfuscation point selection algorithm (OPSA). The moving points adjacent to sensitive regions are reconstructed to address potential trajectory mutation after replacement, thereby ensuring the final output trajectory exhibits both integrity and continuity. Experiments show that compared with existing methods, this scheme improves trajectory usability and can effectively resist semantic inference attacks, providing a new solution for balancing privacy protection and service value.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104843"},"PeriodicalIF":5.4,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the attack surface of space organizations: A data-driven analysis 评估空间组织的攻击面:数据驱动的分析
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-05-01 Epub Date: 2026-02-03 DOI: 10.1016/j.cose.2026.104848
Francesco Casaril, Letterio Galletta
The increasing digitalization of the space industry and the rapid expansion of commercial space activities have increased the sector’s exposure to cyber threats. As satellite operators and aerospace entities rely on Internet-connected devices (ICDs) for control, communication, and ground-based operations, their attack surface expands accordingly. Despite this growing risk, there remains a lack of standardized methodologies tailored to measuring real-world cybersecurity exposure of ICDs in the space sector. Existing frameworks often overlook the unique characteristics of space infrastructure, including persistent connectivity, long system lifespans, and limited patching opportunities. To address this gap, we propose the Risk Exposure Framework (REF), a methodology to quantify cybersecurity exposure using Internet-facing asset data. REF integrates elements from well-established risk assessment models with targeted analysis of exposed services, known vulnerabilities, and exploit availability. The framework calculates risk through a structured approach that combines Exposure and Likelihood scores based on observable attack surface metrics. Our methodology allows one to compare exposure levels across organizations and supports alignment with sector-specific cybersecurity requirements, and it is adaptable to other critical infrastructure environments where external exposure plays a central role in cyber risk. Unlike general-purpose frameworks, REF directly captures space-specific traits by relying on observable network exposure indicators and by aligning with the principles of attack surface measurement in space environments. REF quantifies the externally observable posture of space organisations, primarily ground-segment and enterprise networks, based on Internet-facing exposure and exploitability. The framework does not model spacecraft constraints, but it can reflect their downstream effects when those constraints manifest at network boundaries. This paper also examines how the REF methodology can support existing cybersecurity policy frameworks and risk assessment strategies in both Europe and the United States.
航天工业的日益数字化和商业航天活动的迅速扩张增加了该部门面临网络威胁的风险。由于卫星运营商和航空航天实体依赖互联网连接设备(icd)进行控制、通信和地面操作,它们的攻击面也相应扩大。尽管这种风险越来越大,但仍然缺乏专门用于衡量空间部门icd在现实世界中的网络安全风险的标准化方法。现有框架往往忽视了空间基础设施的独特性,包括持久的连通性、较长的系统寿命和有限的修补机会。为了解决这一差距,我们提出了风险暴露框架(REF),这是一种使用面向互联网的资产数据量化网络安全风险的方法。REF将已建立的风险评估模型中的元素与公开服务、已知漏洞和利用可用性的目标分析集成在一起。该框架通过一种结构化的方法来计算风险,该方法结合了基于可观察到的攻击面指标的暴露和可能性得分。我们的方法允许人们比较跨组织的暴露水平,并支持与特定部门的网络安全要求保持一致,并且它适用于外部暴露在网络风险中起核心作用的其他关键基础设施环境。与通用框架不同,REF通过依赖可观察的网络暴露指标,并与空间环境中的攻击面测量原则保持一致,直接捕获空间特定特征。REF基于面向互联网的暴露和可利用性,量化空间组织(主要是地面段和企业网络)的外部可观察态势。该框架不模拟航天器约束,但当这些约束在网络边界出现时,它可以反映它们的下游影响。本文还研究了REF方法如何支持欧洲和美国现有的网络安全政策框架和风险评估策略。
{"title":"Assessing the attack surface of space organizations: A data-driven analysis","authors":"Francesco Casaril,&nbsp;Letterio Galletta","doi":"10.1016/j.cose.2026.104848","DOIUrl":"10.1016/j.cose.2026.104848","url":null,"abstract":"<div><div>The increasing digitalization of the space industry and the rapid expansion of commercial space activities have increased the sector’s exposure to cyber threats. As satellite operators and aerospace entities rely on Internet-connected devices (ICDs) for control, communication, and ground-based operations, their attack surface expands accordingly. Despite this growing risk, there remains a lack of standardized methodologies tailored to measuring real-world cybersecurity exposure of ICDs in the space sector. Existing frameworks often overlook the unique characteristics of space infrastructure, including persistent connectivity, long system lifespans, and limited patching opportunities. To address this gap, we propose the Risk Exposure Framework (REF), a methodology to quantify cybersecurity exposure using Internet-facing asset data. REF integrates elements from well-established risk assessment models with targeted analysis of exposed services, known vulnerabilities, and exploit availability. The framework calculates risk through a structured approach that combines Exposure and Likelihood scores based on observable attack surface metrics. Our methodology allows one to compare exposure levels across organizations and supports alignment with sector-specific cybersecurity requirements, and it is adaptable to other critical infrastructure environments where external exposure plays a central role in cyber risk. Unlike general-purpose frameworks, REF directly captures space-specific traits by relying on observable network exposure indicators and by aligning with the principles of attack surface measurement in space environments. REF quantifies the externally observable posture of space organisations, primarily ground-segment and enterprise networks, based on Internet-facing exposure and exploitability. The framework does not model spacecraft constraints, but it can reflect their downstream effects when those constraints manifest at network boundaries. This paper also examines how the REF methodology can support existing cybersecurity policy frameworks and risk assessment strategies in both Europe and the United States.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104848"},"PeriodicalIF":5.4,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding surveillance stress in cybersecurity professionals: A stage model perspective 理解网络安全专业人员的监控压力:一个阶段模型的视角
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-05-01 Epub Date: 2026-02-08 DOI: 10.1016/j.cose.2026.104859
Tripti Singh , Allen C. Johnston , Matthew Hudnall , Gregory J. Bott
As more organizations implement employee monitoring technologies to identify insider threats and enforce policy compliance, cybersecurity professionals are increasingly finding themselves in the position of surveilling their colleagues. This brings with it a type of stress distinct from traditional technostress or workload-induced pressure, one based on ethical uncertainty, interpersonal strain, and affective tension. Drawing on interviews with 20 cybersecurity professionals across sectors such as retail, academia, healthcare, finance, information technology, information security, and consulting, we develop a stage model of surveillance stress grounded in the transactional theory of stress and the challenge–hindrance framework. Our model explains how cybersecurity professionals assess the centrality and meaning of surveillance responsibilities, how they experience stress as either a challenge or a hindrance, and how they respond through coping strategies aimed at navigating moral unease and preserving social trust. Our findings show that professionals frequently experience moral ambiguity, concern about damaging workplace relationships, and emotional fatigue arising from uncertain surveillance data, alternating between viewing surveillance as professional growth and as a source of guilt, frustration, and exhaustion. They respond through technical adaptation, peer support, and emotional distancing, while organizational and individual factors shape these experiences. By shifting the analytical lens from the surveilled to the surveillant, this study surfaces the hidden psychological costs of cybersecurity work and offers new insight into the human consequences of digital surveillance.
随着越来越多的组织实施员工监控技术来识别内部威胁并强制执行政策合规,网络安全专业人员越来越发现自己处于监视同事的位置。这带来了一种不同于传统技术压力或工作量压力的压力,一种基于道德不确定性、人际关系紧张和情感紧张的压力。通过对零售业、学术界、医疗保健、金融、信息技术、信息安全和咨询等行业的20位网络安全专业人士的采访,我们在压力交易理论和挑战-障碍框架的基础上建立了监控压力的阶段模型。我们的模型解释了网络安全专业人员如何评估监控责任的中心地位和意义,他们如何将压力视为挑战或障碍,以及他们如何通过旨在驾驭道德不安和维护社会信任的应对策略做出反应。我们的研究结果表明,专业人士经常经历道德模糊,担心破坏工作场所的关系,以及由不确定的监控数据引起的情绪疲劳,在将监控视为职业成长和内疚、沮丧和疲惫的来源之间交替。他们通过技术适应、同伴支持和情感距离做出反应,而组织和个人因素塑造了这些经历。通过将分析镜头从被监视者转移到被监视者,本研究揭示了网络安全工作的隐藏心理成本,并为数字监视对人类的影响提供了新的见解。
{"title":"Understanding surveillance stress in cybersecurity professionals: A stage model perspective","authors":"Tripti Singh ,&nbsp;Allen C. Johnston ,&nbsp;Matthew Hudnall ,&nbsp;Gregory J. Bott","doi":"10.1016/j.cose.2026.104859","DOIUrl":"10.1016/j.cose.2026.104859","url":null,"abstract":"<div><div>As more organizations implement employee monitoring technologies to identify insider threats and enforce policy compliance, cybersecurity professionals are increasingly finding themselves in the position of surveilling their colleagues. This brings with it a type of stress distinct from traditional technostress or workload-induced pressure, one based on ethical uncertainty, interpersonal strain, and affective tension. Drawing on interviews with 20 cybersecurity professionals across sectors such as retail, academia, healthcare, finance, information technology, information security, and consulting, we develop a stage model of surveillance stress grounded in the transactional theory of stress and the challenge–hindrance framework. Our model explains how cybersecurity professionals assess the centrality and meaning of surveillance responsibilities, how they experience stress as either a challenge or a hindrance, and how they respond through coping strategies aimed at navigating moral unease and preserving social trust. Our findings show that professionals frequently experience moral ambiguity, concern about damaging workplace relationships, and emotional fatigue arising from uncertain surveillance data, alternating between viewing surveillance as professional growth and as a source of guilt, frustration, and exhaustion. They respond through technical adaptation, peer support, and emotional distancing, while organizational and individual factors shape these experiences. By shifting the analytical lens from the surveilled to the surveillant, this study surfaces the hidden psychological costs of cybersecurity work and offers new insight into the human consequences of digital surveillance.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104859"},"PeriodicalIF":5.4,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AuditorMatch: A data-driven decision-support system for evaluating and selecting cybersecurity auditors AuditorMatch:一个数据驱动的决策支持系统,用于评估和选择网络安全审计员
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-05-01 Epub Date: 2026-02-03 DOI: 10.1016/j.cose.2026.104849
Rohit Negi, Gargi Sarkar, Sandeep Kumar Shukla
As digital infrastructures expand and cyber threats intensify, cybersecurity audits have become a critical assurance mechanism for detecting vulnerabilities, validating control effectiveness, and maintaining national cyber resilience. The quality of these audits is fundamentally dependent on the competence of the auditors / auditing organizations conducting them. In practice, auditee organizations often select an auditor / auditing organization through cost-driven or ad hoc processes. However, selecting the auditor / auditing organization is still a challenge for auditee organization despite the expanded vendor list provided by regulatory body as empaneled auditors. Inclusion of an auditor in the empaneled auditors list establishes eligibility but by itself does not provide any measure of its capability. To address this critical cybersecurity gap, we introduce AuditorMatch, a risk-informed cybersecurity evaluation and selection framework designed to strengthen audit assurance. AuditorMatch transforms heterogeneous CERT-In (The Computer Emergency Response Team established by the Government of India) empanelment records into a structured relational schema and applies a multi-criteria scoring model that incorporates technical capability, scope-specific audit experience, certification maturity, human-resource stability, and tooling diversity, factors that directly impact vulnerability detection quality and control assessment accuracy. Using the 2024 CERT-In empanelment dataset, we demonstrate how AuditorMatch provides a data-driven, defensible basis for selecting auditors whose competencies are aligned with an organization’s cyber risk profile. Beyond the Indian context, the framework provides a generalizable path toward standardizing cybersecurity audit quality, improving transparency in national audit ecosystems, and reinforcing systemic cyber resilience through improved assurance processes.
随着数字基础设施的扩展和网络威胁的加剧,网络安全审计已成为检测漏洞、验证控制有效性和维护国家网络弹性的关键保证机制。这些审计的质量从根本上取决于进行审计的审核员/审计组织的能力。在实践中,被审核方经常通过成本驱动或特别流程选择审核员/审计机构。然而,选择审核员/审核组织对于被审核员组织来说仍然是一个挑战,尽管监管机构提供了扩展的供应商名单作为内部审核员。将审核员列入被选派审核员名单可确定其资格,但其本身并不能衡量其能力。为了解决这一关键的网络安全缺口,我们引入了AuditorMatch,这是一个风险知情的网络安全评估和选择框架,旨在加强审计保证。AuditorMatch将异构CERT-In(印度政府建立的计算机应急响应小组)介入记录转换为结构化关系模式,并应用多标准评分模型,该模型结合了直接影响漏洞检测质量和控制评估准确性的技术能力、特定范围的审计经验、认证成熟度、人力资源稳定性和工具多样性等因素。使用2024年CERT-In从业数据集,我们展示了AuditorMatch如何为选择能力与组织网络风险概况相一致的审核员提供数据驱动的、可辩护的基础。除了印度之外,该框架还为标准化网络安全审计质量、提高国家审计生态系统的透明度以及通过改进保证流程加强系统网络弹性提供了一条可推广的途径。
{"title":"AuditorMatch: A data-driven decision-support system for evaluating and selecting cybersecurity auditors","authors":"Rohit Negi,&nbsp;Gargi Sarkar,&nbsp;Sandeep Kumar Shukla","doi":"10.1016/j.cose.2026.104849","DOIUrl":"10.1016/j.cose.2026.104849","url":null,"abstract":"<div><div>As digital infrastructures expand and cyber threats intensify, cybersecurity audits have become a critical assurance mechanism for detecting vulnerabilities, validating control effectiveness, and maintaining national cyber resilience. The quality of these audits is fundamentally dependent on the competence of the auditors / auditing organizations conducting them. In practice, auditee organizations often select an auditor / auditing organization through cost-driven or ad hoc processes. However, selecting the auditor / auditing organization is still a challenge for auditee organization despite the expanded vendor list provided by regulatory body as empaneled auditors. Inclusion of an auditor in the empaneled auditors list establishes eligibility but by itself does not provide any measure of its capability. To address this critical cybersecurity gap, we introduce AuditorMatch, a risk-informed cybersecurity evaluation and selection framework designed to strengthen audit assurance. AuditorMatch transforms heterogeneous CERT-In (The Computer Emergency Response Team established by the Government of India) empanelment records into a structured relational schema and applies a multi-criteria scoring model that incorporates technical capability, scope-specific audit experience, certification maturity, human-resource stability, and tooling diversity, factors that directly impact vulnerability detection quality and control assessment accuracy. Using the 2024 CERT-In empanelment dataset, we demonstrate how AuditorMatch provides a data-driven, defensible basis for selecting auditors whose competencies are aligned with an organization’s cyber risk profile. Beyond the Indian context, the framework provides a generalizable path toward standardizing cybersecurity audit quality, improving transparency in national audit ecosystems, and reinforcing systemic cyber resilience through improved assurance processes.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104849"},"PeriodicalIF":5.4,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1