Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

Scheduled Pinned Locked Moved Uncategorized
15 Posts 10 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

    Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

    Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

    In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

    adamshostack@infosec.exchangeA This user is from outside of this forum
    adamshostack@infosec.exchangeA This user is from outside of this forum
    adamshostack@infosec.exchange
    wrote last edited by
    #2

    Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

    petrillic@hachyderm.ioP wendynather@infosec.exchangeW paul_ipv6@infosec.exchangeP 3 Replies Last reply
    0
    • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

      Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

      petrillic@hachyderm.ioP This user is from outside of this forum
      petrillic@hachyderm.ioP This user is from outside of this forum
      petrillic@hachyderm.io
      wrote last edited by
      #3

      @adamshostack it seems an indication of a fundamental mistake in research. Which seems fundamental to the purpose of a dissertation. I might try and reach out to the author rather than the professor.

      And definitely subtoot

      brahms@chaos.socialB 1 Reply Last reply
      0
      • petrillic@hachyderm.ioP petrillic@hachyderm.io

        @adamshostack it seems an indication of a fundamental mistake in research. Which seems fundamental to the purpose of a dissertation. I might try and reach out to the author rather than the professor.

        And definitely subtoot

        brahms@chaos.socialB This user is from outside of this forum
        brahms@chaos.socialB This user is from outside of this forum
        brahms@chaos.social
        wrote last edited by
        #4

        @petrillic @adamshostack +1 on the author. Then again, this is something the professor should have definitely catched ...

        1 Reply Last reply
        0
        • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

          Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

          Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

          In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

          walshman23@mastodon.socialW This user is from outside of this forum
          walshman23@mastodon.socialW This user is from outside of this forum
          walshman23@mastodon.social
          wrote last edited by
          #5

          @adamshostack If the dissertation has been accepted, the cow is out of the barn. At MOST, I would collegially reach out to the author and inform them of the misinterpretation. If, as is often the case, they extend their research, they may have an opportunity to correct . Contacting anyone on their committee is the last thing I would do - the onus was on them to know whether the work they are supervising is correct in this regard. (I am NOT a Ph.D-haver, so...)

          adamshostack@infosec.exchangeA 1 Reply Last reply
          0
          • walshman23@mastodon.socialW walshman23@mastodon.social

            @adamshostack If the dissertation has been accepted, the cow is out of the barn. At MOST, I would collegially reach out to the author and inform them of the misinterpretation. If, as is often the case, they extend their research, they may have an opportunity to correct . Contacting anyone on their committee is the last thing I would do - the onus was on them to know whether the work they are supervising is correct in this regard. (I am NOT a Ph.D-haver, so...)

            adamshostack@infosec.exchangeA This user is from outside of this forum
            adamshostack@infosec.exchangeA This user is from outside of this forum
            adamshostack@infosec.exchange
            wrote last edited by
            #6

            @walshman23 right. It's both out of the bag, and represents a failure of the supervision process...

            It's not subtle either. What I say:

            Focusing on Assets
            It seems very natural to center your approach on assets, or things of value.
            After all, if a thing has no value, why worry about how someone might attack it? It turns out that focusing on assets is less useful than you may hope, and is therefore not the best approach to threat modeling.

            1 Reply Last reply
            0
            • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

              Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

              wendynather@infosec.exchangeW This user is from outside of this forum
              wendynather@infosec.exchangeW This user is from outside of this forum
              wendynather@infosec.exchange
              wrote last edited by
              #7

              @adamshostack Sounds kinda, idk, like an LLM wrote it

              adamshostack@infosec.exchangeA 1 Reply Last reply
              0
              • wendynather@infosec.exchangeW wendynather@infosec.exchange

                @adamshostack Sounds kinda, idk, like an LLM wrote it

                adamshostack@infosec.exchangeA This user is from outside of this forum
                adamshostack@infosec.exchangeA This user is from outside of this forum
                adamshostack@infosec.exchange
                wrote last edited by
                #8

                @wendynather Couldn't be! My books predate LLMs!

                adamshostack@infosec.exchangeA wendynather@infosec.exchangeW 2 Replies Last reply
                0
                • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                  @wendynather Couldn't be! My books predate LLMs!

                  adamshostack@infosec.exchangeA This user is from outside of this forum
                  adamshostack@infosec.exchangeA This user is from outside of this forum
                  adamshostack@infosec.exchange
                  wrote last edited by
                  #9

                  @wendynather ๐Ÿ˜‰

                  1 Reply Last reply
                  0
                  • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                    @wendynather Couldn't be! My books predate LLMs!

                    wendynather@infosec.exchangeW This user is from outside of this forum
                    wendynather@infosec.exchangeW This user is from outside of this forum
                    wendynather@infosec.exchange
                    wrote last edited by
                    #10

                    @adamshostack The dissertation, silly, not your magnum opus ๐Ÿ˜‚

                    1 Reply Last reply
                    0
                    • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                      Generally I just ignore misunderstandings of my work, but here it's mis-used at the very start of section 1 to frame a research problem in a way that's the opposite of what I say.

                      paul_ipv6@infosec.exchangeP This user is from outside of this forum
                      paul_ipv6@infosec.exchangeP This user is from outside of this forum
                      paul_ipv6@infosec.exchange
                      wrote last edited by
                      #11

                      @adamshostack

                      i'd say leave this to their thesis advisors. one of the advidor's jobs is to point out flawed starting assumptions and guide the PhD candidate into more solid footing.

                      1 Reply Last reply
                      0
                      • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                        Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

                        Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

                        In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

                        0xd0ug@infosec.exchange0 This user is from outside of this forum
                        0xd0ug@infosec.exchange0 This user is from outside of this forum
                        0xd0ug@infosec.exchange
                        wrote last edited by
                        #12

                        @adamshostack +1 on letting the author know first. Iโ€™d be honored by the contact and grateful for the correction.

                        1 Reply Last reply
                        0
                        • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                          Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

                          Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

                          In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

                          darthnull@infosec.exchangeD This user is from outside of this forum
                          darthnull@infosec.exchangeD This user is from outside of this forum
                          darthnull@infosec.exchange
                          wrote last edited by
                          #13

                          @adamshostack No reason you canโ€™t do both. Better โ€” phrase the subtweet as a poll for maximum engagement! ๐Ÿ™‚

                          xabean@infosec.exchangeX 1 Reply Last reply
                          0
                          • darthnull@infosec.exchangeD darthnull@infosec.exchange

                            @adamshostack No reason you canโ€™t do both. Better โ€” phrase the subtweet as a poll for maximum engagement! ๐Ÿ™‚

                            xabean@infosec.exchangeX This user is from outside of this forum
                            xabean@infosec.exchangeX This user is from outside of this forum
                            xabean@infosec.exchange
                            wrote last edited by
                            #14

                            @adamshostack @darthnull write the name down, put it in your phone's contacts, and 10 years from now when a special someone tries to interview for Shostack & Associates, have the thesis paper ready.

                            1 Reply Last reply
                            0
                            • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                              Academic friends, if a PhD thesis starts with a factually wrong representation of your work, do you

                              Thesis: "Asset-based modelling in particular has been shown to be advantageous in a number of respects (Shostack (2014)), including its capacity for conducting automated reasoning over a threat knowledge base."

                              In fact, I say something on the order of: "This is presented to explain why you shouldn't do it."

                              itgrrl@infosec.exchangeI This user is from outside of this forum
                              itgrrl@infosec.exchangeI This user is from outside of this forum
                              itgrrl@infosec.exchange
                              wrote last edited by
                              #15

                              @adamshostack a subset of the population seems always determined to interpret cautionary tales as instruction manuals ๐Ÿ˜•

                              1 Reply Last reply
                              1
                              0
                              • R relay@relay.infosec.exchange shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups