Educause Security Discussion mailing list archives
Re: Researcher seeks volunteers for interview
From: Brad Judy <win-hied () BRADJUDY COM>
Date: Thu, 4 Mar 2010 14:06:56 -0500
I would start with a reference to your advisor (http://ist.psu.edu/ist/directory/faculty/?EmployeeID=68 ), who could be confirmed as faculty and confirm your work if needed, and a link to your information (http://www.psu.edu/cgi-bin/ldap/ldap_query.cgi?uid=mly107 ) . If there's an official web page for the project, that would be good too. This group is also going to be interested in the privacy controls you have in place for your research. Is there an IRB document that outlines how you will protect the identity and information you receive from participants? Presumably you submitted something to the PSU ORP (http://www.research.psu.edu/orp/index.asp). Brad Judy Emory University From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Michelle Young Sent: Thursday, March 04, 2010 1:43 PM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] Researcher seeks volunteers for interview Ha ha, ok that's fair. So any suggestions on how a poor master's student could convince someone... anyone to talk to her? Letters of recommendation from other Listserv participants? On Thu, Mar 4, 2010 at 1:04 PM, <Valdis.Kletnieks () vt edu> wrote: On Thu, 04 Mar 2010 12:31:25 EST, Michelle Young said:
Research volunteers from the field of cyber security, 18 years of age and older, are being sought to participate in a Penn State research study of cyber security professionals. Specifically, the research seeks to understand how cyber security professionals make decisions under complex circumstances. The study involves a one-hour telephone interview to
discuss
cognitive tasks, methods, and techniques used by the analyst to prevent
and
detect cyber security attacks.
Does detecting a social-engineering attack count? ;) Sorry Michelle - but that's somewhat a serious question. Security professionals are by nature at least somewhat paranoid, and unlikely to volunteer info unless they're reasonably sure they know who they're talking to. And it isn't just you - we don't even have a good handle on the number of compromised zombie computers out there, because most of the people who have any hard data are often not talking because either their employer gets a competitive advantage from the hard data, or not wanting the black hats to know how much we do/don't know about their activities.
Current thread:
- Researcher seeks volunteers for interview Michelle Young (Mar 04)
- <Possible follow-ups>
- Re: Researcher seeks volunteers for interview Valdis Kletnieks (Mar 04)
- Re: Researcher seeks volunteers for interview Bradley, Stephen W. Mr. (Mar 04)
- Re: Researcher seeks volunteers for interview Michelle Young (Mar 04)
- Re: Researcher seeks volunteers for interview Joel Rosenblatt (Mar 04)
- Re: Researcher seeks volunteers for interview Brad Judy (Mar 04)
- Re: Researcher seeks volunteers for interview Ness, Carl J (Mar 04)
- Re: Researcher seeks volunteers for interview Mark Montague (Mar 04)
- Re: Researcher seeks volunteers for interview Mike Waite (Mar 04)
- Re: Researcher seeks volunteers for interview Steven Alexander (Mar 04)
- Re: Researcher seeks volunteers for interview Megan Carney (Mar 08)