{"id":"https://openalex.org/W7126050667","doi":"https://doi.org/10.1145/3774761.3774763","title":"Would 'Secure' Users Lead to Secure Commons? Surprisingly Not! A framework to evaluate effective power and collective outcomes in cybersecurity.","display_name":"Would 'Secure' Users Lead to Secure Commons? Surprisingly Not! A framework to evaluate effective power and collective outcomes in cybersecurity.","publication_year":2025,"publication_date":"2025-08-24","ids":{"openalex":"https://openalex.org/W7126050667","doi":"https://doi.org/10.1145/3774761.3774763"},"language":"en","primary_location":{"id":"doi:10.1145/3774761.3774763","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3774761.3774763","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 New Security Paradigms Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3774761.3774763","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026423753","display_name":"Partha Das Chowdhury","orcid":"https://orcid.org/0000-0002-5367-6659"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Partha Das Chowdhury","raw_affiliation_strings":["University of Bristol, Bristol, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-5367-6659","affiliations":[{"raw_affiliation_string":"University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124208867","display_name":"Karen Renaud","orcid":null},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Karen Renaud","raw_affiliation_strings":["University of Strathclyde, Glasgow, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-7187-6531","affiliations":[{"raw_affiliation_string":"University of Strathclyde, Glasgow, United Kingdom","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003424861","display_name":"Ingrid Ott","orcid":null},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ingrid Ott","raw_affiliation_strings":["Karlsruhe Institute of Technology, Karlsruhe, Germany"],"raw_orcid":"https://orcid.org/0000-0002-4515-2871","affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026423753"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80955927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"17","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7416999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7416999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.04230000078678131,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.03290000185370445,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.7555999755859375},{"id":"https://openalex.org/keywords/counterfactual-thinking","display_name":"Counterfactual thinking","score":0.6761999726295471},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6172000169754028},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.49619999527931213},{"id":"https://openalex.org/keywords/position-paper","display_name":"Position paper","score":0.4611999988555908},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4361000061035156},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.4138999879360199},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.397599995136261},{"id":"https://openalex.org/keywords/lead","display_name":"Lead (geology)","score":0.38999998569488525}],"concepts":[{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.7555999755859375},{"id":"https://openalex.org/C108650721","wikidata":"https://www.wikidata.org/wiki/Q1783253","display_name":"Counterfactual thinking","level":2,"score":0.6761999726295471},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6172000169754028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5066999793052673},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.49619999527931213},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46959999203681946},{"id":"https://openalex.org/C78780964","wikidata":"https://www.wikidata.org/wiki/Q7233193","display_name":"Position paper","level":2,"score":0.4611999988555908},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4399000108242035},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4361000061035156},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.4138999879360199},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.397599995136261},{"id":"https://openalex.org/C2777093003","wikidata":"https://www.wikidata.org/wiki/Q6508345","display_name":"Lead (geology)","level":2,"score":0.38999998569488525},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.3855000138282776},{"id":"https://openalex.org/C2778058735","wikidata":"https://www.wikidata.org/wiki/Q4692253","display_name":"Aggregate data","level":2,"score":0.35920000076293945},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3544999957084656},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.351500004529953},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.3287999927997589},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2939000129699707},{"id":"https://openalex.org/C158600405","wikidata":"https://www.wikidata.org/wiki/Q5054566","display_name":"Causal inference","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C2777932401","wikidata":"https://www.wikidata.org/wiki/Q1471594","display_name":"Collective action","level":3,"score":0.2903999984264374},{"id":"https://openalex.org/C166052673","wikidata":"https://www.wikidata.org/wiki/Q83021","display_name":"Empirical evidence","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C98184364","wikidata":"https://www.wikidata.org/wiki/Q1780131","display_name":"Argument (complex analysis)","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C2777256151","wikidata":"https://www.wikidata.org/wiki/Q7897273","display_name":"Unpacking","level":2,"score":0.2808000147342682},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.26589998602867126},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.2653000056743622},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.25870001316070557},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.2563999891281128},{"id":"https://openalex.org/C71889745","wikidata":"https://www.wikidata.org/wiki/Q1783264","display_name":"Counterfactual conditional","level":3,"score":0.2540000081062317},{"id":"https://openalex.org/C101097943","wikidata":"https://www.wikidata.org/wiki/Q5176983","display_name":"Counterintuitive","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3774761.3774763","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3774761.3774763","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 New Security Paradigms Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:strathprints.strath.ac.uk:94727","is_oa":true,"landing_page_url":"https://strathprints.strath.ac.uk/view/author/1324853.html>","pdf_url":"https://strathprints.strath.ac.uk/94727/7/Chowdhury-etal-ACM-2026-A-framework-to-evaluate-effective-power-and-collective-outcomes-in-cybersecurity.pdf","source":{"id":"https://openalex.org/S4306402226","display_name":"Strathprints: The University of Strathclyde institutional repository (University of Strathclyde)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I181647926","host_organization_name":"University of Strathclyde","host_organization_lineage":["https://openalex.org/I181647926"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire/6139f741-4a87-49a2-85d0-b4b9c01e3095","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/6139f741-4a87-49a2-85d0-b4b9c01e3095","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Das Chowdhury, P, Renaud, K & Ott, I 2026, Would \u2018Secure\u2019 Users Lead to Secure Commons? Surprisingly Not! A framework to evaluate effective power and collective outcomes in cybersecurity. in NSPW '25: Proceedings of the New Security Paradigms Workshop 2025. Proceedings of the New Security Paradigms Workshop, Association for Computing Machinery, pp. 17-36. https://doi.org/10.1145/3774761.3774763","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"doi:10.1145/3774761.3774763","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3774761.3774763","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 New Security Paradigms Workshop","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5322884321212769,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":83,"referenced_works":["https://openalex.org/W128619364","https://openalex.org/W1483280370","https://openalex.org/W1572831554","https://openalex.org/W1582830784","https://openalex.org/W1665211240","https://openalex.org/W1901363518","https://openalex.org/W1971219113","https://openalex.org/W1971295515","https://openalex.org/W1972446373","https://openalex.org/W1980479584","https://openalex.org/W1980864917","https://openalex.org/W2001791196","https://openalex.org/W2009806762","https://openalex.org/W2016310229","https://openalex.org/W2017836055","https://openalex.org/W2025043113","https://openalex.org/W2028329245","https://openalex.org/W2028570584","https://openalex.org/W2037202491","https://openalex.org/W2046274577","https://openalex.org/W2065255463","https://openalex.org/W2067050450","https://openalex.org/W2071869991","https://openalex.org/W2079037403","https://openalex.org/W2100783932","https://openalex.org/W2112767991","https://openalex.org/W2115218409","https://openalex.org/W2132903355","https://openalex.org/W2135394003","https://openalex.org/W2145881505","https://openalex.org/W2150341374","https://openalex.org/W2160343382","https://openalex.org/W2167976277","https://openalex.org/W2171920515","https://openalex.org/W2221203134","https://openalex.org/W2229618114","https://openalex.org/W2328918612","https://openalex.org/W2343707506","https://openalex.org/W2611149039","https://openalex.org/W2621367954","https://openalex.org/W2883000584","https://openalex.org/W2883277750","https://openalex.org/W2943181656","https://openalex.org/W2945437145","https://openalex.org/W2963050170","https://openalex.org/W2976464904","https://openalex.org/W2977319455","https://openalex.org/W3010253162","https://openalex.org/W3033037255","https://openalex.org/W3084045387","https://openalex.org/W3096154439","https://openalex.org/W3124351849","https://openalex.org/W3141263172","https://openalex.org/W3158382612","https://openalex.org/W3167914866","https://openalex.org/W3169967937","https://openalex.org/W3200431970","https://openalex.org/W3205577829","https://openalex.org/W3208912235","https://openalex.org/W4210813858","https://openalex.org/W4210980496","https://openalex.org/W4233654598","https://openalex.org/W4234500067","https://openalex.org/W4237385580","https://openalex.org/W4288057711","https://openalex.org/W4309617322","https://openalex.org/W4323537854","https://openalex.org/W4361208106","https://openalex.org/W4361769008","https://openalex.org/W4377862279","https://openalex.org/W4382045977","https://openalex.org/W4382787684","https://openalex.org/W4385988197","https://openalex.org/W4388733474","https://openalex.org/W4390101918","https://openalex.org/W4391450791","https://openalex.org/W4395004223","https://openalex.org/W4399358333","https://openalex.org/W4401486530","https://openalex.org/W4402046903","https://openalex.org/W4403351345","https://openalex.org/W4406250839","https://openalex.org/W4406468425"],"related_works":[],"abstract_inverted_index":{"Individuals":[0],"are":[1,135,160],"often":[2],"held":[3],"responsible":[4],"when":[5],"adverse":[6,44],"cyber":[7,187],"incidents":[8],"occur.":[9,48],"The":[10,31,149],"ensuing":[11],"narrative,":[12],"explaining":[13],"the":[14,60,90,170,186,193,210],"occurrence,":[15],"points":[16],"to":[17,22,58,105,141,155,165,182,191,195,202],"confounding":[18],"factuals":[19],"e.g.,":[20],"inability":[21],"act":[23],"securely,":[24,123],"a":[25,54,77,107,139,163],"convincingly":[26],"deceptive":[27],"attack,":[28],"or":[29],"selfishness/laziness.":[30],"underlying":[32],"assumption":[33],"is":[34],"that:":[35],"if":[36,67,119],"only":[37],"humans":[38],"were":[39,69],"different":[40],"(acted":[41],"securely),":[42],"such":[43,205],"events":[45],"would":[46,65,125],"not":[47,126,137],"In":[49],"this":[50,103,124],"paper,":[51],"we":[52,75],"use":[53,102],"game":[55],"theoretic":[56],"approach":[57],"investigate":[59],"counterfactual":[61],"in":[62,138,162,169,185,209],"cyber:":[63],"what":[64],"happen":[66],"individuals":[68,96,120,134],"indeed":[70,161],"different?":[71],"To":[72],"that":[73,117,133,159],"end,":[74],"propose":[76],"generic":[78],"framework":[79,86,104,151],"drawing":[80],"upon":[81],"two":[82],"games.":[83],"Our":[84,114],"proposed":[85,150],"can":[87,152],"help":[88],"move":[89],"field":[91],"towards":[92],"judicious":[93],"responsibilization":[94,208],"of":[95,212],"and":[97,200],"eliminate":[98],"knee-jerk":[99],"scapegoating.":[100],"We":[101,131],"examine":[106],"specific":[108],"social":[109],"harm":[110,173],"\u2014":[111],"data":[112,213],"pollution.":[113],"explorations":[115],"show":[116,132],"even":[118],"always":[121],"behaved":[122],"necessarily":[127],"improve":[128],"collective":[129],"outcomes.":[130],"sometimes":[136],"position":[140,164],"change":[142],"security":[143,167],"outcomes,":[144],"however":[145],"secure":[146],"their":[147],"behaviours.":[148],"be":[153],"applied":[154],"highlight":[156],"those":[157],"entities":[158],"influence":[166],"outcomes":[168],"wider":[171],"aggregate":[172],"landscape.":[174],"Future":[175],"research":[176],"should":[177],"build":[178],"on":[179],"our":[180],"work":[181],"assign":[183],"responsibilities":[184],"domain,":[188],"explore":[189],"ways":[190],"operationalise":[192],"games":[194],"carry":[196],"out":[197],"empirical":[198],"research,":[199],"contribute":[201],"novel":[203],"paradigms":[204],"as":[206],"ethical":[207],"context":[211],"breaches.":[214]},"counts_by_year":[],"updated_date":"2026-01-30T23:21:52.101496","created_date":"2026-01-30T00:00:00"}
