scholarly journals Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies

Author(s):  
Thomas Groß
Keyword(s):  
Author(s):  
Thomas Groß

AbstractBackground. In recent years, cyber security user studies have been appraised in meta-research, mostly focusing on the completeness of their statistical inferences and the fidelity of their statistical reporting. However, estimates of the field’s distribution of statistical power and its publication bias have not received much attention.Aim. In this study, we aim to estimate the effect sizes and their standard errors present as well as the implications on statistical power and publication bias.Method. We built upon a published systematic literature review of 146 user studies in cyber security (2006–2016). We took into account 431 statistical inferences including t-, $$\chi ^2$$ χ 2 -, r-, one-way F-tests, and Z-tests. In addition, we coded the corresponding total sample sizes, group sizes and test families. Given these data, we established the observed effect sizes and evaluated the overall publication bias. We further computed the statistical power vis-à-vis of parametrized population thresholds to gain unbiased estimates of the power distribution.Results. We obtained a distribution of effect sizes and their conversion into comparable log odds ratios together with their standard errors. We, further, gained funnel-plot estimates of the publication bias present in the sample as well as insights into the power distribution and its consequences.Conclusions. Through the lenses of power and publication bias, we shed light on the statistical reliability of the studies in the field. The upshot of this introspection is practical recommendations on conducting and evaluating studies to advance the field.


2012 ◽  
Author(s):  
Michael McNeese ◽  
Nancy J. Cooke ◽  
Anita D'Amico ◽  
Mica R. Endsley ◽  
Cleotilde Gonzalez ◽  
...  
Keyword(s):  

CICTP 2017 ◽  
2018 ◽  
Author(s):  
Haojie Ji ◽  
Guizhen Yu ◽  
Yunpeng Wang ◽  
Zhao Zhang ◽  
Hongmao Qin

2020 ◽  
Vol 140 (1) ◽  
pp. 15-28
Author(s):  
Masamori Kashiyama ◽  
Reo Kashiyama ◽  
Hiroto Seki ◽  
Hiroyuki Hosono
Keyword(s):  

Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document