It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
Digital security in all its forms, whether focused on computer security, information security, or cyber security, has practices of modelling at its core. Over recent decades, the goals of security in a digital context have widened to cover not only the protection of data and computing resource but also the protection and enablement of people using technology. Alongside this, there has been a concomitant diversification of the types of modelling that are used in digital security. In recent years, modellers have faced significant epistemological challenges, with tensions between different interdisciplinary perspectives about what models and modelling ought to be, and difficulties adequately communicating the virtues of different kinds of models among modellers and stakeholders such as policymakers or users. In this paper, we present a framework grounded in philosophy and social theory for understanding the methodological diversity of security modelling today: the MORS grid. Using the MORS grid, modellers can locate their own work of modelling, and explore methodological variations and political implications. We argue that in a subject that is increasingly recognized as being composed of different disciplinary positions, such a grid not only enables modellers to locate their own approach but also to appreciate the modelling positions of others. The grid is composed of four simple binaries: whether the modeller is an expert or non-expert, whether the modelling enquiry is model-oriented or target-oriented, whether the referent object (what needs to be protected) is determined prior to or posterior to the task of modelling, and whether the analyst adopts the design stance or the intentional stance. The paper presents the MORS grid through three lines of thought: first, we unpack the theoretical basis for each distinction in existing literature in the philosophy of science, security studies, and philosophy of mind; second, we provide a historical review of security modelling, and examine which positions on the MORS grid have predominated, and why; third, we set out the implications for modellers, policymakers and other stakeholders.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 Centre for Interdisciplinary Methodologies, University of Warwick , Coventry CV4 7AL , United Kingdom
2 Information Security Group, Royal Holloway, University of London , Egham TW20 0EX , United Kingdom
3 Department of Computer Science, Aalborg University , 9220 Aalborg East , Denmark