Вы находитесь на странице: 1из 6

Stasis Grid

Author Info

Source Type

Categorical

Definitional

Causal

Evaluation

Action

Jurisdiction

Up to three names,
write them all; 4+,
write first name et
al. (i.e., Smith et
al.)

(popular, scholarly,
trade, government)

Does X exist?

Is X a Y?

Does X cause Y?
Is Y a result of X?

Is it good or bad?
Fair or unfair?
Harmful or
beneficial?

What should be
done about X?

Who is responsible?

1. Barton,
Michael James
(co-founder of a
cybersecurity
company)

Popular

The policy
governing
computer
access in an
organization is
critical.

2. Bejtlich,
Richard
(researcher)

Popular

Employees are
the target of
professional
hackers.
Accurate and
timely threat
intelligence is
often
unavailable.

Cybersecurity
training is
now a priority.

Threat
intelligence
does not
contain
personal
information of
American
citizens.

Private sector
organizations
should
improve their
own defenses
first.
Government
should
promote threat
intelligence
sharing
between the
private and
public sector.

Stasis Grid
3. Bucci, Steven
P., Paul
Rosenzweig,
and David
Inserra
(scholars)

Scholarly

Current
cybersecurity
legislation does
not work.

4. Densham,
Ben
(scholar)

Scholarly

Companies
must assume
that their
systems will be
compromised.

5. Dutton, Gail
(scholar)

Scholarly

6. Elazari, Keren Popular


(expert)

Layers of
security are no
longer enough
to protect
systems.
Cybersecurity
is no longer an
IT problem;
non-IT
employees also
have to be
concerned.
Hackers wield
considerable
influence.
Hackers are an
exceptional
force for
change in the
current era.

Agencies are at
risk because
their chief
information
officers have
technical
weaknesses.

Government
has to allow
offensive
measures for
cybersecurity.
Companies can
reduce the impact
of a breach if it
takes a proactive
approach.

By providing
training,
employees are
more aware of
potential
cybersecurity
attacks.
Hackers want
attention to
bring to light
issues and
bring people
together.

Companies
need to plan a
response when
the breach
comes in order
to mitigate it.

Non-IT
employees
need to be
trained to
detect cyber
threats.
Sometimes
hackers do
wrong, but they
find the hidden
threats and force
us to fix them.
To blindly fight
hackers is to go
against an
uncontrollable

Stasis Grid
power at the cost
of innovation and
knowledge.

7. Garfinkel,
Simson L.
(scholar)

Scholarly

Cybersecurity
systems seem
to be getting
worse.
Education in
the STEM
fields is not as
emphasized.
Most
companies are
not properly
equipped to
stop
cyberattacks.
Categorical

Author Info

Source Type

Up to three names,
write them all; 4+,
write first name et
al. (i.e., Smith et
al.)

(popular, scholarly,
trade, government)

Does X exist?

8. Glenny,
Misha
(journalist)

Popular

The Internet
has modernized
an old dilemma
pitting security
and freedom
against each
other.

Information
security is seen
as a cost rather
than an
enabling
technology.

Definitional

Causal

Evaluation

Action

Jurisdiction

Is X a Y?

Does X cause Y?
Is Y a result of X?

Is it good or bad?
Fair or unfair?
Harmful or
beneficial?

What should be
done about X?

Who is responsible?

Certain
disabilities can
manifest
themselves in
the computing
world as
incredible
skills.

Relying on the
criminal
justice system
is asking for
trouble.
Hackers need
to be hired and
be given
guidance.

Stasis Grid

9. Largent,
Steve, Rick
Boucher
(experts)

Popular

Attempts to
breach
networks
happens tens of
thousands of
times a day.

10. Libicki,
Martin C.,
David Senty,
Julia Pollak
(scholar)

Scholarly

Very few
people can find
and identify
threats and
vulnerabilities
in the systems.

11. Lino,
Christine
(researcher)

Scholarly

Security
protocols
cannot keep up
with the
technology,
rendering them
obsolete.
Despite
pressing
measures,
cybersecurity
still has not
improved.

All these
technological
solutions
require
money, but no
one has
considered
talking to
hackers.
Information
sharing should
be
implemented
to counter
cyberattacks.

Digital privacy
cannot exist
without
cybersecurity.

The influx of
cybersecurity
professionals in
the future may
saturate the job
market.

Cybersecurity
concentrations
in schools
across the
nations are
more
prevalent.
The majority
believe that
the
government
should have a
role in
implementing
cybersecurity
measures for
the private
sector.

Stasis Grid
12. Ortiz, Javier
(expert)

13. Knake,

Popular

Popular

Robert

(advisor, expert)

14. Kopstein,
Joshua
(journalist)

Popular

The
government
spends billions
of dollars but
cant keep
personal data
safe.
The
government has
been warned
that a
cyberattack of
such high
magnitude
could occur for
years.
Liability for
sharing
information is
not the
problem; the
issue is the
confidentiality
and integrity of
the information
sharing
networks.
Cybersecurity
is the
protection we
need.

Congressional
action is badly
needed.

Cybersecurity
is a partnership
between the
private and
public sector.

A secure
network to
share
information
needs to be
established.

Information
breaches take
place because
of the
carelessness of
the victim.

The
government
should
improve
security
infrastructure
rather than
implement
information

Stasis Grid
sharing.
15. Kshetri, Nir
(scholar)

Scholarly

The Obama
administration
recently
implemented
orders to
strengthen US
cybersecurity
policy.
Cybersecurity
policy needs to
be revamped.
There is a
shortage of
cybersecurity
professionals.

Timely
information
sharing would
help understand
previous
cyberattacks to
anticipate future
ones.

Businesses
need to take
initiative
implementing
cybersecurity
measures.