Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

Scheduled Pinned Locked Moved Uncategorized
15 Posts 10 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

    Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

    petrillic@hachyderm.ioP This user is from outside of this forum
    petrillic@hachyderm.ioP This user is from outside of this forum
    petrillic@hachyderm.io
    wrote last edited by
    #3

    @adamshostack it seems an indication of a fundamental mistake in research. Which seems fundamental to the purpose of a dissertation. I might try and reach out to the author rather than the professor.

    And definitely subtoot

    brahms@chaos.socialB 1 Reply Last reply
    0
    • petrillic@hachyderm.ioP petrillic@hachyderm.io

      @adamshostack it seems an indication of a fundamental mistake in research. Which seems fundamental to the purpose of a dissertation. I might try and reach out to the author rather than the professor.

      And definitely subtoot

      brahms@chaos.socialB This user is from outside of this forum
      brahms@chaos.socialB This user is from outside of this forum
      brahms@chaos.social
      wrote last edited by
      #4

      @petrillic @adamshostack +1 on the author. Then again, this is something the professor should have definitely catched ...

      1 Reply Last reply
      0
      • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

        Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

        Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

        In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

        walshman23@mastodon.socialW This user is from outside of this forum
        walshman23@mastodon.socialW This user is from outside of this forum
        walshman23@mastodon.social
        wrote last edited by
        #5

        @adamshostack If the dissertation has been accepted, the cow is out of the barn. At MOST, I would collegially reach out to the author and inform them of the misinterpretation. If, as is often the case, they extend their research, they may have an opportunity to correct . Contacting anyone on their committee is the last thing I would do - the onus was on them to know whether the work they are supervising is correct in this regard. (I am NOT a Ph.D-haver, so...)

        adamshostack@infosec.exchangeA 1 Reply Last reply
        0
        • walshman23@mastodon.socialW walshman23@mastodon.social

          @adamshostack If the dissertation has been accepted, the cow is out of the barn. At MOST, I would collegially reach out to the author and inform them of the misinterpretation. If, as is often the case, they extend their research, they may have an opportunity to correct . Contacting anyone on their committee is the last thing I would do - the onus was on them to know whether the work they are supervising is correct in this regard. (I am NOT a Ph.D-haver, so...)

          adamshostack@infosec.exchangeA This user is from outside of this forum
          adamshostack@infosec.exchangeA This user is from outside of this forum
          adamshostack@infosec.exchange
          wrote last edited by
          #6

          @walshman23 right. It's both out of the bag, and represents a failure of the supervision process...

          It's not subtle either. What I say:

          Focusing on Assets
          It seems very natural to center your approach on assets, or things of value.
          After all, if a thing has no value, why worry about how someone might attack it? It turns out that focusing on assets is less useful than you may hope, and is therefore not the best approach to threat modeling.

          1 Reply Last reply
          0
          • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

            Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

            wendynather@infosec.exchangeW This user is from outside of this forum
            wendynather@infosec.exchangeW This user is from outside of this forum
            wendynather@infosec.exchange
            wrote last edited by
            #7

            @adamshostack Sounds kinda, idk, like an LLM wrote it

            adamshostack@infosec.exchangeA 1 Reply Last reply
            0
            • wendynather@infosec.exchangeW wendynather@infosec.exchange

              @adamshostack Sounds kinda, idk, like an LLM wrote it

              adamshostack@infosec.exchangeA This user is from outside of this forum
              adamshostack@infosec.exchangeA This user is from outside of this forum
              adamshostack@infosec.exchange
              wrote last edited by
              #8

              @wendynather Couldn't be! My books predate LLMs!

              adamshostack@infosec.exchangeA wendynather@infosec.exchangeW 2 Replies Last reply
              0
              • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                @wendynather Couldn't be! My books predate LLMs!

                adamshostack@infosec.exchangeA This user is from outside of this forum
                adamshostack@infosec.exchangeA This user is from outside of this forum
                adamshostack@infosec.exchange
                wrote last edited by
                #9

                @wendynather 😉

                1 Reply Last reply
                0
                • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                  @wendynather Couldn't be! My books predate LLMs!

                  wendynather@infosec.exchangeW This user is from outside of this forum
                  wendynather@infosec.exchangeW This user is from outside of this forum
                  wendynather@infosec.exchange
                  wrote last edited by
                  #10

                  @adamshostack The dissertation, silly, not your magnum opus 😂

                  1 Reply Last reply
                  0
                  • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                    Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

                    paul_ipv6@infosec.exchangeP This user is from outside of this forum
                    paul_ipv6@infosec.exchangeP This user is from outside of this forum
                    paul_ipv6@infosec.exchange
                    wrote last edited by
                    #11

                    @adamshostack

                    i'd say leave this to their thesis advisors. one of the advidor's jobs is to point out flawed starting assumptions and guide the PhD candidate into more solid footing.

                    1 Reply Last reply
                    0
                    • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                      Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

                      Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

                      In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

                      0xd0ug@infosec.exchange0 This user is from outside of this forum
                      0xd0ug@infosec.exchange0 This user is from outside of this forum
                      0xd0ug@infosec.exchange
                      wrote last edited by
                      #12

                      @adamshostack +1 on letting the author know first. I’d be honored by the contact and grateful for the correction.

                      1 Reply Last reply
                      0
                      • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                        Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

                        Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

                        In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

                        darthnull@infosec.exchangeD This user is from outside of this forum
                        darthnull@infosec.exchangeD This user is from outside of this forum
                        darthnull@infosec.exchange
                        wrote last edited by
                        #13

                        @adamshostack No reason you can’t do both. Better — phrase the subtweet as a poll for maximum engagement! 🙂

                        xabean@infosec.exchangeX 1 Reply Last reply
                        0
                        • darthnull@infosec.exchangeD darthnull@infosec.exchange

                          @adamshostack No reason you can’t do both. Better — phrase the subtweet as a poll for maximum engagement! 🙂

                          xabean@infosec.exchangeX This user is from outside of this forum
                          xabean@infosec.exchangeX This user is from outside of this forum
                          xabean@infosec.exchange
                          wrote last edited by
                          #14

                          @adamshostack @darthnull write the name down, put it in your phone's contacts, and 10 years from now when a special someone tries to interview for Shostack & Associates, have the thesis paper ready.

                          1 Reply Last reply
                          0
                          • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                            Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

                            Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

                            In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

                            itgrrl@infosec.exchangeI This user is from outside of this forum
                            itgrrl@infosec.exchangeI This user is from outside of this forum
                            itgrrl@infosec.exchange
                            wrote last edited by
                            #15

                            @adamshostack a subset of the population seems always determined to interpret cautionary tales as instruction manuals 😕

                            1 Reply Last reply
                            1
                            0
                            • R relay@relay.infosec.exchange shared this topic
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups