kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 90) Show all publications
Andreasson, A., Artman, H., Brynielsson, J. & Franke, U. (2025). Cyber situation awareness during an emerging cyberthreat: a case study. International Journal of Information Security, 24(5), Article ID 217.
Open this publication in new window or tab >>Cyber situation awareness during an emerging cyberthreat: a case study
2025 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 24, no 5, article id 217Article in journal (Refereed) Published
Abstract [en]

The digitalization of our societies makes them increasingly vulnerable to emerging cyberthreats. These cyberthreats can manifest themselves in the form of organized, sophisticated, and persistent threat actors, as well as nonadversarial mistakes. Staff involved in responding to cyberthreats and handling incidents in organizations need cyber situation awareness. This paper presents a case study on what challenges members of staff involved in cybersecurity in a large, complex organization experience when developing cyber situation awareness while handling a remote code execution vulnerability in the form of Log4Shell. Two types of qualitative empirical material were used for the case study, data collected through semi-structured interviews with ten informants, and internal documentation. The empirical material was analyzed to create a timeline of events in the organization. The results show how information about the threat spread throughout the organization, the types of artifacts that served as common operational pictures, and the role played by information sharing in maintaining staff cyber situation awareness. Three major challenges to the organization were found: (i) information sharing among staff was not effortless, (ii) there was no organization-wide common operational picture established, and (iii) inaccurate information was shared. This study adds a real-world contribution to the literature on organizational handling of cyberthreats.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Common operational picture, Cyber situation awareness, Cybersecurity, Log4j, Log4Shell, Public sector
National Category
Information Systems, Social aspects Information Systems Business Administration
Identifiers
urn:nbn:se:kth:diva-372052 (URN)10.1007/s10207-025-01106-z (DOI)001581739200001 ()2-s2.0-105017586059 (Scopus ID)
Note

Not duplicate with DiVA 1955293

QC 20251023

Available from: 2025-10-23 Created: 2025-10-23 Last updated: 2025-10-23Bibliographically approved
Franke, U. (2025). How Do ML Students Explain Their Models and What Can We Learn from This?. In: Software Business - 15th International Conference, ICSOB 2024, Proceedings: . Paper presented at 15th International Conference on Software Business, ICSOB 2024, Utrecht, Netherlands, Kingdom of the, Nov 18 2024 - Nov 20 2024 (pp. 351-365). Springer Nature
Open this publication in new window or tab >>How Do ML Students Explain Their Models and What Can We Learn from This?
2025 (English)In: Software Business - 15th International Conference, ICSOB 2024, Proceedings, Springer Nature , 2025, p. 351-365Conference paper, Published paper (Refereed)
Abstract [en]

In recent years, artificial intelligence (AI) has made great progress. However, despite impressive results, modern data-driven AI systems are often very difficult to understand, challenging their use in software business and prompting the emergence of the explainable AI (XAI) field. This paper explores how machine learning (ML) students explain their models and draws implications for practice from this. Data was collected from ML master students, who were given a two-part assignment. First they developed a model predicting insurance claims based on an existing data set, then they received a request for explanation of insurance premiums in accordance with the GDPR right to meaningful information and had to come up with such an explanation. The students also peer-graded each other’s explanations. Analyzing this data set and comparing it to responses from actual insurance firms from a previous study illustrates some potential pitfalls—narrow technical focus and offering mere data dumps. There were also some promising directions—feature importance, graphics, and what-if scenarios—where the software business practice could benefit from being inspired by the students. The paper is concluded with a reflection about the importance of multiple kinds of expertise and team efforts for making the most of XAI in practice.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
experiment, explainable AI, GDPR, insurance
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-362218 (URN)10.1007/978-3-031-85849-9_28 (DOI)001476891400026 ()2-s2.0-105001269309 (Scopus ID)
Conference
15th International Conference on Software Business, ICSOB 2024, Utrecht, Netherlands, Kingdom of the, Nov 18 2024 - Nov 20 2024
Note

QC 20250414

Available from: 2025-04-09 Created: 2025-04-09 Last updated: 2025-07-01Bibliographically approved
Franke, U. & Orlando, A. (2025). Interdependent cyber risk and the role of insurers. Research in Economics, 79(3), Article ID 101059.
Open this publication in new window or tab >>Interdependent cyber risk and the role of insurers
2025 (English)In: Research in Economics, ISSN 1090-9443, E-ISSN 1090-9451, Vol. 79, no 3, article id 101059Article in journal (Refereed) Published
Abstract [en]

Increasing use of new digital services offers tremendous opportunities for modern society, but also entails new risks. One tool for managing cyber risk is cyber insurance. While cyber insurance has attracted much attention and optimism, interdependent cyber risks and lack of actuarial data have prompted some insurers to adopt a more proactive role, not only insuring losses but also assisting clients with preventive work such as managed detection and response solutions, i.e., investments in their own cybersecurity. The purpose of this paper is to propose and theoretically investigate yet a further extension of this role, where insurers facilitate security investments between interdependent firms, which get the opportunity to invest a share of their insurance premiums to improve the security of each other. It is demonstrated that if insurers can facilitate such investments, then under common theoretical assumptions this can make a positive contribution to overall welfare. The paper is concluded by a discussion of the relevance and applicability of this theoretical contribution in practice.

Place, publisher, year, edition, pages
Elsevier BV, 2025
Keywords
Cyber insurance, Cybersecurity investment, Interdependent cyber risk
National Category
Economic History
Identifiers
urn:nbn:se:kth:diva-362233 (URN)10.1016/j.rie.2025.101059 (DOI)001458704800001 ()2-s2.0-105001107893 (Scopus ID)
Note

QC 20250415

Available from: 2025-04-09 Created: 2025-04-09 Last updated: 2025-04-15Bibliographically approved
Kianpour, M. & Franke, U. (2025). The use of simulations in economic cybersecurity decision-making. Journal of Cybersecurity, 11(1), Article ID tyaf003.
Open this publication in new window or tab >>The use of simulations in economic cybersecurity decision-making
2025 (English)In: Journal of Cybersecurity, ISSN 2057-2085, Vol. 11, no 1, article id tyaf003Article in journal (Refereed) Published
Abstract [en]

This paper presents an in-depth examination of the use of simulations in economic cybersecurity decision-making, highlighting the dual nature of their potential and the challenges they present. Drawing on examples from existing studies, we explore the role of simulations in generating new knowledge about probabilities and consequences in the cybersecurity domain, which is essential in understanding and managing risk and uncertainty. Additionally, we introduce the concepts of "bookkeeping" and "abstraction" within the context of simulations, discussing how they can sometimes fail and exploring the underlying reasons for their failures. This discussion leads us to suggest a framework of considerations for effectively utilizing simulations in cybersecurity. This framework is designed not as a rigid checklist but as a guide for critical thinking and evaluation, aiding users in assessing the suitability and reliability of a simulation model for a particular decision-making context. Future work should focus on applying this framework in real-world settings, continuously refining the use of simulations to ensure they remain effective and relevant in the dynamic field of cybersecurity.

Place, publisher, year, edition, pages
Oxford University Press (OUP), 2025
Keywords
simulations, economics, decision-making under risk, decision-making under uncertainty, bias
National Category
Software Engineering
Identifiers
urn:nbn:se:kth:diva-360444 (URN)10.1093/cybsec/tyaf003 (DOI)001419613000001 ()2-s2.0-85218089039 (Scopus ID)
Note

QC 20250303

Available from: 2025-02-26 Created: 2025-02-26 Last updated: 2025-03-03Bibliographically approved
Franke, U. (2024). Algorithmic Transparency, Manipulation, and Two Concepts of Liberty. Philosophy & Technology, 37(1), Article ID 22.
Open this publication in new window or tab >>Algorithmic Transparency, Manipulation, and Two Concepts of Liberty
2024 (English)In: Philosophy & Technology, ISSN 2210-5433, E-ISSN 2210-5441, Vol. 37, no 1, article id 22Article in journal (Refereed) Published
Abstract [en]

As more decisions are made by automated algorithmic systems, the transparency of these systems has come under scrutiny. While such transparency is typically seen as beneficial, there is a also a critical, Foucauldian account of it. From this perspective, worries have recently been articulated that algorithmic transparency can be used for manipulation, as part of a disciplinary power structure. Klenk (Philosophy & Technology 36, 79, 2023) recently argued that such manipulation should not be understood as exploitation of vulnerable victims, but rather as indifference to whether the information provided enhances decision-making by revealing reasons. This short commentary on Klenk uses Berlin’s (1958) two concepts of liberty to further illuminate the concept of transparency as manipulation, finding alignment between positive liberty and the critical account.

Place, publisher, year, edition, pages
Springer Nature, 2024
Keywords
Algorithmic transparency, Isaiah Berlin, manipulation
National Category
Philosophy
Identifiers
urn:nbn:se:kth:diva-367065 (URN)10.1007/s13347-024-00713-3 (DOI)2-s2.0-85185652600 (Scopus ID)
Note

QC 20250714

Available from: 2025-07-14 Created: 2025-07-14 Last updated: 2025-07-14Bibliographically approved
Franke, U. (2024). Att utveckla och implementera cybersäkerhetspolicy: Lärdomar från den finansiella sektorn. Statsvetenskaplig Tidskrift, 126(2), 251-272
Open this publication in new window or tab >>Att utveckla och implementera cybersäkerhetspolicy: Lärdomar från den finansiella sektorn
2024 (Swedish)In: Statsvetenskaplig Tidskrift, ISSN 0039-0747, Vol. 126, no 2, p. 251-272Article in journal (Refereed) Published
Abstract [en]

Modern society is increasingly dependent on digital services, making their dependability a top priority. But while there is a consensus that cybersecurity is important, there is no corresponding agreement on the true extent of the problem, the most effective countermeasures, or the proper division of labor and responsibilities. This makes cybersecurity policy very difficult. This article addresses this issue based on observations and experiences from a period of guest research at the Swedish Financial Supervisory Authority (Finansinspektionen), which made it possible to study how cybersecurity policy is developed and implemented in the Swedish financial sector. Observations include policy implementation challenges related to squaring different roles and perspectives mandated by different laws, and to collaboration between independent government authorities, but also policy development challenges: How can the full range of perspectives and tools be included in cybersecurity policy development? As Sweden now revises its cybersecurity policy, this is a key issue.

National Category
Computer and Information Sciences Political Science
Identifiers
urn:nbn:se:kth:diva-351288 (URN)
Funder
Swedish Foundation for Strategic Research, SM22-0057
Note

Den aktuella studien är finansierad av Stiftelsen för Strategisk Forskning (avtalsnummer SM22-0057)

QC 20240807

Available from: 2024-08-06 Created: 2024-08-06 Last updated: 2024-08-07Bibliographically approved
Andreasson, A., Artman, H., Brynielsson, J. & Franke, U. (2024). Cybersecurity work at Swedish administrative authorities: taking action or waiting for approval. Cognition, Technology & Work, 26(4), 709-731
Open this publication in new window or tab >>Cybersecurity work at Swedish administrative authorities: taking action or waiting for approval
2024 (English)In: Cognition, Technology & Work, ISSN 1435-5558, E-ISSN 1435-5566, Vol. 26, no 4, p. 709-731Article in journal (Refereed) Published
Abstract [en]

In recent years, the Swedish public sector has undergone rapid digitalization, while cybersecurity efforts have not kept even steps. This study investigates conditions for cybersecurity work at Swedish administrative authorities by examining organizational conditions at the authorities, what cybersecurity staff do to acquire the cyber situation awareness required for their role, as well as what experience cybersecurity staff have with incidents. In this study, 17 semi-structured interviews were held with respondents from Swedish administrative authorities. The results showed the diverse conditions for cybersecurity work that exist at the authorities and that a variety of roles are involved in that work. It was found that national-level support for cybersecurity was perceived as somewhat lacking. There were also challenges in getting access to information elements required for sufficient cyber situation awareness.

Place, publisher, year, edition, pages
Springer Nature, 2024
National Category
Computer and Information Sciences
Research subject
Human-computer Interaction
Identifiers
urn:nbn:se:kth:diva-354123 (URN)10.1007/s10111-024-00779-1 (DOI)001321655700001 ()2-s2.0-85205049306 (Scopus ID)
Funder
Swedish Armed Forces
Note

QC 20240930

Available from: 2024-09-29 Created: 2024-09-29 Last updated: 2025-04-29Bibliographically approved
Franke, U. (2024). Livspusslet: Rilke och Nozick. In: Katarina O'Nils Franke (Ed.), Rilke och filosoferna: (pp. 79-86). Malmö: Ellerströms förlag
Open this publication in new window or tab >>Livspusslet: Rilke och Nozick
2024 (Swedish)In: Rilke och filosoferna / [ed] Katarina O'Nils Franke, Malmö: Ellerströms förlag, 2024, p. 79-86Chapter in book (Other (popular science, discussion, etc.))
Place, publisher, year, edition, pages
Malmö: Ellerströms förlag, 2024
Keywords
Rainer Maria Rilke, Robert Nozick
National Category
Philosophy
Identifiers
urn:nbn:se:kth:diva-351289 (URN)
Note

QC 20240815

Part of ISBN 9789172477308

Available from: 2024-08-06 Created: 2024-08-06 Last updated: 2024-10-11Bibliographically approved
Franke, U. (2024). Rawlsian Algorithmic Fairness and a Missing Aggregation Property of the Difference Principle. Philosophy & Technology, 37(3), Article ID 87.
Open this publication in new window or tab >>Rawlsian Algorithmic Fairness and a Missing Aggregation Property of the Difference Principle
2024 (English)In: Philosophy & Technology, ISSN 2210-5433, E-ISSN 2210-5441, Vol. 37, no 3, article id 87Article in journal (Refereed) Published
Abstract [en]

Modern society makes extensive use of automated algorithmic decisions, fueled by advances in artificial intelligence. However, since these systems are not perfect, questions about fairness are increasingly investigated in the literature. In particular, many authors take a Rawlsian approach to algorithmic fairness. Based on complications with this approach identified in the literature, this article discusses how Rawls’s theory in general, and especially the difference principle, should reasonably be applied to algorithmic fairness decisions. It is observed that proposals to achieve Rawlsian algorithmic fairness often aim to uphold the difference principle in the individual situations where automated decision-making occurs. However, the Rawlsian difference principle applies to society at large and does not aggregate in such a way that upholding it in constituent situations also upholds it in the aggregate. But such aggregation is a hidden premise of many proposals in the literature and its falsity explains many complications encountered.

Place, publisher, year, edition, pages
Springer Nature, 2024
Keywords
Algorithmic fairness, Difference principle
National Category
Ethics Philosophy Information Systems
Identifiers
urn:nbn:se:kth:diva-350973 (URN)10.1007/s13347-024-00779-z (DOI)2-s2.0-85198326990 (Scopus ID)
Note

QC 20240724

Available from: 2024-07-24 Created: 2024-07-24 Last updated: 2024-07-24Bibliographically approved
Franke, U., Helgesson Hallström, C., Artman, H. & Dexe, J. (2024). Requirements on and Procurement of Explainable Algorithms-A Systematic Review of the Literature. In: DeLaIglesia, DH Santana, JFD Rivero, AJL (Ed.), NEW TRENDS IN DISRUPTIVE TECHNOLOGIES, TECH ETHICS, AND ARTIFICIAL INTELLIGENCE, DITTET 2024: . Paper presented at 4th International Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DITTET), JUL 03-05, 2024, Salamanca, SPAIN (pp. 40-52). Springer Nature, 1459
Open this publication in new window or tab >>Requirements on and Procurement of Explainable Algorithms-A Systematic Review of the Literature
2024 (English)In: NEW TRENDS IN DISRUPTIVE TECHNOLOGIES, TECH ETHICS, AND ARTIFICIAL INTELLIGENCE, DITTET 2024 / [ed] DeLaIglesia, DH Santana, JFD Rivero, AJL, Springer Nature , 2024, Vol. 1459, p. 40-52Conference paper, Published paper (Refereed)
Abstract [en]

Artificial intelligence is making progress, enabling automation of tasks previously the privilege of humans. This brings many benefits but also entails challenges, in particular with respect to 'black box' machine learning algorithms. Therefore, questions of transparency and explainability in these systems receive much attention. However, most organizations do not build their software from scratch, but rather procure it from others. Thus, it becomes imperative to consider not only requirements on but also procurement of explainable algorithms and decision support systems. This article offers a first systematic literature review of this area. Following construction of appropriate search queries, 503 unique items from Scopus, ACM Digital Library, and IEEE Xplore were screened for relevance. 37 items remained in the final analysis. An overview and a synthesis of the literature is offered, and it is concluded that more research is needed, in particular on procurement, human-computer interaction aspects, and different purposes of explainability.

Place, publisher, year, edition, pages
Springer Nature, 2024
Series
Advances in Intelligent Systems and Computing, ISSN 2194-5357
Keywords
Requirements, Procurement, Explainable Artificial Intelligence (XAI), Transparency, Explainability
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-356047 (URN)10.1007/978-3-031-66635-3_4 (DOI)001323544600004 ()
Conference
4th International Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence (DITTET), JUL 03-05, 2024, Salamanca, SPAIN
Note

QC 20241111

Part of ISBN 978-3-031-66634-6; 978-3-031-66635-3

Available from: 2024-11-11 Created: 2024-11-11 Last updated: 2024-11-11Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-2017-7914

Search in DiVA

Show all publications