Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

Scheduled Pinned Locked Moved Uncategorized
15 Posts 10 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • adamshostack@infosec.exchangeA This user is from outside of this forum
    adamshostack@infosec.exchangeA This user is from outside of this forum
    adamshostack@infosec.exchange
    wrote last edited by
    #1

    Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

    Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

    In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

    adamshostack@infosec.exchangeA walshman23@mastodon.socialW 0xd0ug@infosec.exchange0 darthnull@infosec.exchangeD itgrrl@infosec.exchangeI 5 Replies Last reply
    0
    • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

      Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

      Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

      In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

      adamshostack@infosec.exchangeA This user is from outside of this forum
      adamshostack@infosec.exchangeA This user is from outside of this forum
      adamshostack@infosec.exchange
      wrote last edited by
      #2

      Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

      petrillic@hachyderm.ioP wendynather@infosec.exchangeW paul_ipv6@infosec.exchangeP 3 Replies Last reply
      0
      • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

        Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

        petrillic@hachyderm.ioP This user is from outside of this forum
        petrillic@hachyderm.ioP This user is from outside of this forum
        petrillic@hachyderm.io
        wrote last edited by
        #3

        @adamshostack it seems an indication of a fundamental mistake in research. Which seems fundamental to the purpose of a dissertation. I might try and reach out to the author rather than the professor.

        And definitely subtoot

        brahms@chaos.socialB 1 Reply Last reply
        0
        • petrillic@hachyderm.ioP petrillic@hachyderm.io

          @adamshostack it seems an indication of a fundamental mistake in research. Which seems fundamental to the purpose of a dissertation. I might try and reach out to the author rather than the professor.

          And definitely subtoot

          brahms@chaos.socialB This user is from outside of this forum
          brahms@chaos.socialB This user is from outside of this forum
          brahms@chaos.social
          wrote last edited by
          #4

          @petrillic @adamshostack +1 on the author. Then again, this is something the professor should have definitely catched ...

          1 Reply Last reply
          0
          • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

            Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

            Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

            In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

            walshman23@mastodon.socialW This user is from outside of this forum
            walshman23@mastodon.socialW This user is from outside of this forum
            walshman23@mastodon.social
            wrote last edited by
            #5

            @adamshostack If the dissertation has been accepted, the cow is out of the barn. At MOST, I would collegially reach out to the author and inform them of the misinterpretation. If, as is often the case, they extend their research, they may have an opportunity to correct . Contacting anyone on their committee is the last thing I would do - the onus was on them to know whether the work they are supervising is correct in this regard. (I am NOT a Ph.D-haver, so...)

            adamshostack@infosec.exchangeA 1 Reply Last reply
            0
            • walshman23@mastodon.socialW walshman23@mastodon.social

              @adamshostack If the dissertation has been accepted, the cow is out of the barn. At MOST, I would collegially reach out to the author and inform them of the misinterpretation. If, as is often the case, they extend their research, they may have an opportunity to correct . Contacting anyone on their committee is the last thing I would do - the onus was on them to know whether the work they are supervising is correct in this regard. (I am NOT a Ph.D-haver, so...)

              adamshostack@infosec.exchangeA This user is from outside of this forum
              adamshostack@infosec.exchangeA This user is from outside of this forum
              adamshostack@infosec.exchange
              wrote last edited by
              #6

              @walshman23 right. It's both out of the bag, and represents a failure of the supervision process...

              It's not subtle either. What I say:

              Focusing on Assets
              It seems very natural to center your approach on assets, or things of value.
              After all, if a thing has no value, why worry about how someone might attack it? It turns out that focusing on assets is less useful than you may hope, and is therefore not the best approach to threat modeling.

              1 Reply Last reply
              0
              • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

                wendynather@infosec.exchangeW This user is from outside of this forum
                wendynather@infosec.exchangeW This user is from outside of this forum
                wendynather@infosec.exchange
                wrote last edited by
                #7

                @adamshostack Sounds kinda, idk, like an LLM wrote it

                adamshostack@infosec.exchangeA 1 Reply Last reply
                0
                • wendynather@infosec.exchangeW wendynather@infosec.exchange

                  @adamshostack Sounds kinda, idk, like an LLM wrote it

                  adamshostack@infosec.exchangeA This user is from outside of this forum
                  adamshostack@infosec.exchangeA This user is from outside of this forum
                  adamshostack@infosec.exchange
                  wrote last edited by
                  #8

                  @wendynather Couldn't be! My books predate LLMs!

                  adamshostack@infosec.exchangeA wendynather@infosec.exchangeW 2 Replies Last reply
                  0
                  • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                    @wendynather Couldn't be! My books predate LLMs!

                    adamshostack@infosec.exchangeA This user is from outside of this forum
                    adamshostack@infosec.exchangeA This user is from outside of this forum
                    adamshostack@infosec.exchange
                    wrote last edited by
                    #9

                    @wendynather πŸ˜‰

                    1 Reply Last reply
                    0
                    • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                      @wendynather Couldn't be! My books predate LLMs!

                      wendynather@infosec.exchangeW This user is from outside of this forum
                      wendynather@infosec.exchangeW This user is from outside of this forum
                      wendynather@infosec.exchange
                      wrote last edited by
                      #10

                      @adamshostack The dissertation, silly, not your magnum opus πŸ˜‚

                      1 Reply Last reply
                      0
                      • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                        Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

                        paul_ipv6@infosec.exchangeP This user is from outside of this forum
                        paul_ipv6@infosec.exchangeP This user is from outside of this forum
                        paul_ipv6@infosec.exchange
                        wrote last edited by
                        #11

                        @adamshostack

                        i'd say leave this to their thesis advisors. one of the advidor's jobs is to point out flawed starting assumptions and guide the PhD candidate into more solid footing.

                        1 Reply Last reply
                        0
                        • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                          Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

                          Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

                          In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

                          0xd0ug@infosec.exchange0 This user is from outside of this forum
                          0xd0ug@infosec.exchange0 This user is from outside of this forum
                          0xd0ug@infosec.exchange
                          wrote last edited by
                          #12

                          @adamshostack +1 on letting the author know first. I’d be honored by the contact and grateful for the correction.

                          1 Reply Last reply
                          0
                          • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                            Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

                            Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

                            In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

                            darthnull@infosec.exchangeD This user is from outside of this forum
                            darthnull@infosec.exchangeD This user is from outside of this forum
                            darthnull@infosec.exchange
                            wrote last edited by
                            #13

                            @adamshostack No reason you can’t do both. Better β€” phrase the subtweet as a poll for maximum engagement! πŸ™‚

                            xabean@infosec.exchangeX 1 Reply Last reply
                            0
                            • darthnull@infosec.exchangeD darthnull@infosec.exchange

                              @adamshostack No reason you can’t do both. Better β€” phrase the subtweet as a poll for maximum engagement! πŸ™‚

                              xabean@infosec.exchangeX This user is from outside of this forum
                              xabean@infosec.exchangeX This user is from outside of this forum
                              xabean@infosec.exchange
                              wrote last edited by
                              #14

                              @adamshostack @darthnull write the name down, put it in your phone's contacts, and 10 years from now when a special someone tries to interview for Shostack & Associates, have the thesis paper ready.

                              1 Reply Last reply
                              0
                              • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                                Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

                                Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

                                In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

                                itgrrl@infosec.exchangeI This user is from outside of this forum
                                itgrrl@infosec.exchangeI This user is from outside of this forum
                                itgrrl@infosec.exchange
                                wrote last edited by
                                #15

                                @adamshostack a subset of the population seems always determined to interpret cautionary tales as instruction manuals πŸ˜•

                                1 Reply Last reply
                                1
                                0
                                • R relay@relay.infosec.exchange shared this topic
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups