Barriers to Adoption of a Security-Minded Approach to Information Management
Create and release your Profile on Zintellect – Postdoctoral applicants must create an account and complete a profile in the on-line application system. Please note: your resume/CV may not exceed 3 pages.
Complete your application – Enter the rest of the information required for the IC Postdoc Program Research Opportunity. The application itself contains detailed instructions for each one of these components: availability, citizenship, transcripts, dissertation abstract, publication and presentation plan, and information about your Research Advisor co-applicant.
Additional information about the IC Postdoctoral Research Fellowship Program is available on the program website located at: https://orise.orau.gov/icpostdoc/index.html.
If you have questions, send an email to ICPostdoc@orau.org. Please include the reference code for this opportunity in your email.
Research Topic Description, including Problem Statement:
Adoption of digital engineering practices, e.g. design collaboration using cloud-based computer aided design (CAD) software has led to a dramatic increase in the volume of information and technical data shared between organizations. Alongside this there has been adoption of a culture of greater openness and sharing of organizations' information, e.g., adoption of policies such as presumed open. These developments potentially undermine good security practices by increasing the quantity and quality of data available to those conducting hostile reconnaissance or espionage.
This research seeks to explore the attitudes, awareness, and understanding of organizations and their managers regarding the risks inherent in data/information sharing. Aspects that could be investigated include:
- a. Understanding by organizations and individuals of risks arising from sharing data and information with third parties,
- b. Understanding by organizations and individuals of data aggregation and its potential to magnify data sharing risks,
- c. How organizations and individuals assess the sensitivity of data and information,
- d. The identification, understanding, adoption and use of methods or techniques to establish information needs,
- e. The assessment of the provenance of data and information.
Example Approaches:
Surveys and interviews of personnel employed in CNI sectors, e.g. water, energy, transport
Workshops to explore attendees understanding and use of security triage processes
Key Words: Data sharing, open data, data aggregation, data quality, provenance
Postdoc Eligibility
- U.S. citizens only
- Ph.D. in a relevant field must be completed before beginning the appointment and within five years of the appointment start date
- Proposal must be associated with an accredited U.S. university, college, or U.S. government laboratory
- Eligible candidates may only receive one award from the IC Postdoctoral Research Fellowship Program
Research Advisor Eligibility
- Must be an employee of an accredited U.S. university, college or U.S. government laboratory
- Are not required to be U.S. citizens
- Citizenship: U.S. Citizen Only
- Degree: Doctoral Degree.
-
Discipline(s):
- Chemistry and Materials Sciences (12 )
- Communications and Graphics Design (3 )
- Computer, Information, and Data Sciences (17 )
- Earth and Geosciences (21 )
- Engineering (27 )
- Environmental and Marine Sciences (14 )
- Life Health and Medical Sciences (45 )
- Mathematics and Statistics (11 )
- Other Non-Science & Engineering (2 )
- Physics (16 )
- Science & Engineering-related (1 )
- Social and Behavioral Sciences (30 )
The ORISE GO mobile app helps you stay engaged, connected and informed during your ORISE experience – from application, to offer, through your appointment and even as an ORISE alum!