Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sociotechnical systems
biblio
A Framework for Risk Assessment in Augmented Reality-Equipped Socio-Technical Systems
Submitted by grigby1 on Wed, 02/03/2021 - 12:10pm
privacy
visualization
technical entities
taxonomy
sociotechnical systems
socio-technical systems
socio-economic effects
security of data
safety modeling
Safety
risk management
risk assessment
risk analysis
resilience
pubcrawl
Analytical models
immersive visual technology
immersive systems
Human Factors
human capabilities
Human behavior
extended human function
dependability threat
cyber physical systems
composability
augmented reality-equipped socio-technical systems
augmented reality
AR-relevant dependability threats
AR-extended human failures
AR-equipped socio-technical systems
biblio
Social Action in Socially Situated Agents
Submitted by aekwall on Mon, 02/10/2020 - 11:08am
Evolution
Social Agents
traditional action
sociotechnical systems
Socio technical systems
socially situated agents
social self awareness
social action
shared world
Rivers
interacting systems
goal-rationality
evolutionary instability
Scalability
behavioural instability
social sciences
software agents
interactive systems
Human Factors
psychology
Interference
Mathematical model
multi-agent systems
Neurons
pubcrawl
Task Analysis
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 8:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
biblio
Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
IoT socio-technical systems
Communities of Interest
computer architecture
Cyber defence
cyber security
digital economy
digital-enabled enterprises
functionality requirement
IA Architecture
Information Assurance
information management
internet
Internet infrastructure developments
Internet of Things
information sharing
Protocols
pubcrawl
resilience
Resiliency
Resilient Security Architectures
risk exposure
security
security of data
sociotechnical systems
STS
Trusted Computing
socio-technical systems
biblio
Revani: Revising and Verifying Normative Specifications for Privacy
Submitted by ozgurkafali on Fri, 06/17/2016 - 7:36am
Design patterns
model checking
multiagent systems
privacy
requirements engineering
social norms
sociotechnical systems
biblio
Toward a Normative Approach for Forensicability: Extended Abstract
Submitted by ozgurkafali on Sat, 04/02/2016 - 11:51am
Forensic logging
Requirements
security
social norms
sociotechnical systems
biblio
Soft systems methodology in net-centric cyber defence system development
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
modeling
system dynamics model
System Dynamics
system behaviour
SSM
soft systems methodology
sociotechnical systems
situational awareness
security of data
SA
net-centric information system
net-centric hypothesis
net-centric cyber defence system development
net-centric approach
Net-Centric
collaboration
interdependent dynamic relationships
information value
Information systems
information sharing community
information security
information reach
information environment
human activity system
Distributed Information Systems
data sources
complexity
Communities
command and control
collaborative communities
file
Tutorial: Policy-Governed Secure Collaboration
Submitted by mpsingh on Wed, 04/29/2015 - 10:33am. Contributor:
Munindar P. Singh
Science of Security
Foundations
Policy
sociotechnical systems
HotSoS 2015
Academia
Presentation
Tutorials