Reducing Process Model Input for LLM-Based Explanations: An Exploratory Study on Behavioral Abstraction Size and Explanation Quality. Patrick van Oerle, Rob Bemthuis and Faiza Bukhsh
They used LLMs as the judge of a content produced by another LLM. So I pointed out problem of bias and asked how they mitigated that. They had different containers for each LLM and they also used different LLMs (e.g., GPT, Llama).
Unlocking Sustainable Value in the Electrical and Electronic Equipment sector: A Value Network Approach. Frank Stiksma, Luís Ferreira Pires, João Luis Rebelo Moreira, Marten van Sinderen and Wilco Engelsman
- Electronic waste is seen as garbage (as if there were no economic value on it, but it does).
- Business models of EEE actors do not clearly reflect negative effects on society and enviornment
- Soceital and environmental costs shifted to society and environment.
- There is a push from the EU to move towards a circular economy.
- Lack of case0baed understanding of vlaue netwroks in EEE sector
The study aims to develop a possible approach to supor the design of sustainable-oreinted value networks in the EEE sector.
e-value modeling language is not so adequate because they do ont explicitly address sustainable values (too focused on profit).
Important observartion:
Eco-costs incorporate sustainable values in EEE value networks.
Digital Product Passports are lever for informed decision-making in sustainable value networks.
Future work:
Balanced Circular Economy policy mix
Modeling additional lifecycle value network
Scenario analysis incorporating eco-costs and implications
Developing a value-based metho dfor modeling EEE lifecycle networks and their economic and environmental impacts
Specification of information requirements in DPP model.
Towards a Taxonomy for Enterprise Architecture Debts. Jürgen Jung and Simon Hacks
Problems:
- EA drifts - complexity and bureaucracy grow
- sort-term decisions accumlate as EA debt
- misalighment between as-is and to-be
- lacking shared vocabulary for EA debts
- hard to inventory and ocmpare debts (harder to prioritize)
-prioritization of remediation remains inconsistent
- busines-IT alignment suffers without structure
- consequences across systems, processes etc.
Research Goal: Develop two completemantary taxonomies to characterize EA debts and assess their impact that enables managers and consultants to consistently describe, compare and prioritizes aligned with strategic goals.
Taxonomy 1:
For the collaboration dimension:
- Skills: lacking capability, missing training;
- Capacity: resources are lacking;
- Policty: existing rules hamper efficient collaboration; was called regulation before;
- Documentation: missing or flawed documentation; includes architecture models, enterprise and technical documents.
Lifecycle:
Taxonomy 2:
He made a demonstration with a case study. This is also in the paper
A CISO Perspective on Board-level Involvement in Information Security Governance. Sara Nodehi, Tim Huygh, Remko Helms and Laury Bollen
Qualitative exploratory design, interviewing board members of different kinds of organizations (finance, energy, healthcare and government), semi-structured interview, thematic analysis and then trying to fit the result in the theoretical framework they had already created.
This is the theorethical framework:
13 themes from 12 CISPs, classified in board responsibilities, board challenges and contextual factors. She made an interesting discussion about these themes, also focused in the paper
Recommendations:
- Direct reporting between CISOs and boards (it is important they share a common language)
- Resource planning beyound incidernts
- Translate KPIs into business terms (it is important to convey explicit info to the board on what the numbers mean in strategic terms)
- Cross-functional governance teams
- Cybersecurity lieracy for board members
- Integrate ISG into long-term strategy
Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework. Antoine Leblanc, Jacques Robin, Nourhène Ben Rabah, Zequan Huang and Bénédicte Le Grand
Best EDOC Paper Award
The threats:
- 2.75 times more ransomwares between 2023-2024
raising of advanced persistent threats
lack of examples for machine learning training
opacity of detection models
They have a project called the ANCILE Project, which uses, among other things, symbolic AI to deal with the above issues.
He talks about some requirements for the ontology. And they they started doing a literature review on Cybersecurity Ontologies.
They proceeded in categorizing the found ontologies using hte F4OC Framework, but being restricted by available information about the ontologies (only considered two characteristics: groundness in foundational ontologies and expressiveness).
He proceeded to discuss his findings (see paper for more detail).
They realized that still their classification contained some ontologies that were not very high-quality, and they attributed this to a lack in a new dimension to classify them. They decided to add "Credibility" as this extra dimension, strating from the definition of Credibility as the degree of fondicence that users,d evelopers and experts palce in it, particularly when applied to mission-critical domains like cybersecurity (SO/IEC 25012)
Their work led them to a new measurable definition of Credibility
Applying the new measurement, they are able to make a selection of the ontologies that they should use in the ANCILE project:
The final Decision leads to the following next steps:
Toward an Intent-Based and Ontology-Driven Autonomic Security Response in Security Orchestration Automation and Response. Zequan Huang, Jacques Robin, Nicolas Herbaut, Nourhène Ben Rabah and Bénédicte Le Grand
*This work has been made by the same group as the previous paper, and they are related.
Motivation:
They want to combin Autonomic Cyber Defense (ACD) with Intent-based Cyber Defense (IBCD), creating what they call a Unified Cyber Defense.
For meaning negotiation, they adopt the MITRE-D3FEND Ontology, and they extend it for precise mitigation
With the use of the extended ontology, they are able to define Security intent
This is how they see their new solution: