An experimental study of countermeasures against threats: real-world effects meet treatment effects
Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjec...
Ausführliche Beschreibung
Autor*in: |
Chytilek, Roman [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2022 |
---|
Schlagwörter: |
---|
Anmerkung: |
© The Author(s), under exclusive licence to Springer Nature B.V. 2022 |
---|
Übergeordnetes Werk: |
Enthalten in: Quality & quantity - Springer Netherlands, 1967, 56(2022), 6 vom: 22. Feb., Seite 4825-4840 |
---|---|
Übergeordnetes Werk: |
volume:56 ; year:2022 ; number:6 ; day:22 ; month:02 ; pages:4825-4840 |
Links: |
---|
DOI / URN: |
10.1007/s11135-022-01354-4 |
---|
Katalog-ID: |
OLC2079820540 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2079820540 | ||
003 | DE-627 | ||
005 | 20230506080440.0 | ||
007 | tu | ||
008 | 230131s2022 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11135-022-01354-4 |2 doi | |
035 | |a (DE-627)OLC2079820540 | ||
035 | |a (DE-He213)s11135-022-01354-4-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 050 |q VZ |
084 | |a 3,4 |2 ssgn | ||
100 | 1 | |a Chytilek, Roman |e verfasserin |0 (orcid)0000-0002-2900-7746 |4 aut | |
245 | 1 | 0 | |a An experimental study of countermeasures against threats: real-world effects meet treatment effects |
264 | 1 | |c 2022 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © The Author(s), under exclusive licence to Springer Nature B.V. 2022 | ||
520 | |a Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments. | ||
650 | 4 | |a Security | |
650 | 4 | |a Experiments | |
650 | 4 | |a Contamination | |
650 | 4 | |a Pre-treatment | |
650 | 4 | |a Treatment effect | |
700 | 1 | |a Mareš, Miroslav |0 (orcid)0000-0002-7102-3205 |4 aut | |
700 | 1 | |a Drmola, Jakub |0 (orcid)0000-0003-4275-2115 |4 aut | |
700 | 1 | |a Hrbková, Lenka |0 (orcid)0000-0003-3755-3322 |4 aut | |
700 | 1 | |a Mlejnková, Petra |0 (orcid)0000-0002-4430-6269 |4 aut | |
700 | 1 | |a Špačková, Zuzana |0 (orcid)0000-0001-8349-5106 |4 aut | |
700 | 1 | |a Tóth, Michal |0 (orcid)0000-0002-9026-1313 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Quality & quantity |d Springer Netherlands, 1967 |g 56(2022), 6 vom: 22. Feb., Seite 4825-4840 |w (DE-627)129084328 |w (DE-600)4140-3 |w (DE-576)014417715 |x 0033-5177 |7 nnns |
773 | 1 | 8 | |g volume:56 |g year:2022 |g number:6 |g day:22 |g month:02 |g pages:4825-4840 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11135-022-01354-4 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-SOW | ||
912 | |a GBV_ILN_4027 | ||
951 | |a AR | ||
952 | |d 56 |j 2022 |e 6 |b 22 |c 02 |h 4825-4840 |
author_variant |
r c rc m m mm j d jd l h lh p m pm z š zš m t mt |
---|---|
matchkey_str |
article:00335177:2022----::nxeietltdocutresrsgistraselolef |
hierarchy_sort_str |
2022 |
publishDate |
2022 |
allfields |
10.1007/s11135-022-01354-4 doi (DE-627)OLC2079820540 (DE-He213)s11135-022-01354-4-p DE-627 ger DE-627 rakwb eng 050 VZ 3,4 ssgn Chytilek, Roman verfasserin (orcid)0000-0002-2900-7746 aut An experimental study of countermeasures against threats: real-world effects meet treatment effects 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Nature B.V. 2022 Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments. Security Experiments Contamination Pre-treatment Treatment effect Mareš, Miroslav (orcid)0000-0002-7102-3205 aut Drmola, Jakub (orcid)0000-0003-4275-2115 aut Hrbková, Lenka (orcid)0000-0003-3755-3322 aut Mlejnková, Petra (orcid)0000-0002-4430-6269 aut Špačková, Zuzana (orcid)0000-0001-8349-5106 aut Tóth, Michal (orcid)0000-0002-9026-1313 aut Enthalten in Quality & quantity Springer Netherlands, 1967 56(2022), 6 vom: 22. Feb., Seite 4825-4840 (DE-627)129084328 (DE-600)4140-3 (DE-576)014417715 0033-5177 nnns volume:56 year:2022 number:6 day:22 month:02 pages:4825-4840 https://doi.org/10.1007/s11135-022-01354-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-SOW GBV_ILN_4027 AR 56 2022 6 22 02 4825-4840 |
spelling |
10.1007/s11135-022-01354-4 doi (DE-627)OLC2079820540 (DE-He213)s11135-022-01354-4-p DE-627 ger DE-627 rakwb eng 050 VZ 3,4 ssgn Chytilek, Roman verfasserin (orcid)0000-0002-2900-7746 aut An experimental study of countermeasures against threats: real-world effects meet treatment effects 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Nature B.V. 2022 Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments. Security Experiments Contamination Pre-treatment Treatment effect Mareš, Miroslav (orcid)0000-0002-7102-3205 aut Drmola, Jakub (orcid)0000-0003-4275-2115 aut Hrbková, Lenka (orcid)0000-0003-3755-3322 aut Mlejnková, Petra (orcid)0000-0002-4430-6269 aut Špačková, Zuzana (orcid)0000-0001-8349-5106 aut Tóth, Michal (orcid)0000-0002-9026-1313 aut Enthalten in Quality & quantity Springer Netherlands, 1967 56(2022), 6 vom: 22. Feb., Seite 4825-4840 (DE-627)129084328 (DE-600)4140-3 (DE-576)014417715 0033-5177 nnns volume:56 year:2022 number:6 day:22 month:02 pages:4825-4840 https://doi.org/10.1007/s11135-022-01354-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-SOW GBV_ILN_4027 AR 56 2022 6 22 02 4825-4840 |
allfields_unstemmed |
10.1007/s11135-022-01354-4 doi (DE-627)OLC2079820540 (DE-He213)s11135-022-01354-4-p DE-627 ger DE-627 rakwb eng 050 VZ 3,4 ssgn Chytilek, Roman verfasserin (orcid)0000-0002-2900-7746 aut An experimental study of countermeasures against threats: real-world effects meet treatment effects 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Nature B.V. 2022 Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments. Security Experiments Contamination Pre-treatment Treatment effect Mareš, Miroslav (orcid)0000-0002-7102-3205 aut Drmola, Jakub (orcid)0000-0003-4275-2115 aut Hrbková, Lenka (orcid)0000-0003-3755-3322 aut Mlejnková, Petra (orcid)0000-0002-4430-6269 aut Špačková, Zuzana (orcid)0000-0001-8349-5106 aut Tóth, Michal (orcid)0000-0002-9026-1313 aut Enthalten in Quality & quantity Springer Netherlands, 1967 56(2022), 6 vom: 22. Feb., Seite 4825-4840 (DE-627)129084328 (DE-600)4140-3 (DE-576)014417715 0033-5177 nnns volume:56 year:2022 number:6 day:22 month:02 pages:4825-4840 https://doi.org/10.1007/s11135-022-01354-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-SOW GBV_ILN_4027 AR 56 2022 6 22 02 4825-4840 |
allfieldsGer |
10.1007/s11135-022-01354-4 doi (DE-627)OLC2079820540 (DE-He213)s11135-022-01354-4-p DE-627 ger DE-627 rakwb eng 050 VZ 3,4 ssgn Chytilek, Roman verfasserin (orcid)0000-0002-2900-7746 aut An experimental study of countermeasures against threats: real-world effects meet treatment effects 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Nature B.V. 2022 Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments. Security Experiments Contamination Pre-treatment Treatment effect Mareš, Miroslav (orcid)0000-0002-7102-3205 aut Drmola, Jakub (orcid)0000-0003-4275-2115 aut Hrbková, Lenka (orcid)0000-0003-3755-3322 aut Mlejnková, Petra (orcid)0000-0002-4430-6269 aut Špačková, Zuzana (orcid)0000-0001-8349-5106 aut Tóth, Michal (orcid)0000-0002-9026-1313 aut Enthalten in Quality & quantity Springer Netherlands, 1967 56(2022), 6 vom: 22. Feb., Seite 4825-4840 (DE-627)129084328 (DE-600)4140-3 (DE-576)014417715 0033-5177 nnns volume:56 year:2022 number:6 day:22 month:02 pages:4825-4840 https://doi.org/10.1007/s11135-022-01354-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-SOW GBV_ILN_4027 AR 56 2022 6 22 02 4825-4840 |
allfieldsSound |
10.1007/s11135-022-01354-4 doi (DE-627)OLC2079820540 (DE-He213)s11135-022-01354-4-p DE-627 ger DE-627 rakwb eng 050 VZ 3,4 ssgn Chytilek, Roman verfasserin (orcid)0000-0002-2900-7746 aut An experimental study of countermeasures against threats: real-world effects meet treatment effects 2022 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Nature B.V. 2022 Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments. Security Experiments Contamination Pre-treatment Treatment effect Mareš, Miroslav (orcid)0000-0002-7102-3205 aut Drmola, Jakub (orcid)0000-0003-4275-2115 aut Hrbková, Lenka (orcid)0000-0003-3755-3322 aut Mlejnková, Petra (orcid)0000-0002-4430-6269 aut Špačková, Zuzana (orcid)0000-0001-8349-5106 aut Tóth, Michal (orcid)0000-0002-9026-1313 aut Enthalten in Quality & quantity Springer Netherlands, 1967 56(2022), 6 vom: 22. Feb., Seite 4825-4840 (DE-627)129084328 (DE-600)4140-3 (DE-576)014417715 0033-5177 nnns volume:56 year:2022 number:6 day:22 month:02 pages:4825-4840 https://doi.org/10.1007/s11135-022-01354-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-SOW GBV_ILN_4027 AR 56 2022 6 22 02 4825-4840 |
language |
English |
source |
Enthalten in Quality & quantity 56(2022), 6 vom: 22. Feb., Seite 4825-4840 volume:56 year:2022 number:6 day:22 month:02 pages:4825-4840 |
sourceStr |
Enthalten in Quality & quantity 56(2022), 6 vom: 22. Feb., Seite 4825-4840 volume:56 year:2022 number:6 day:22 month:02 pages:4825-4840 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Security Experiments Contamination Pre-treatment Treatment effect |
dewey-raw |
050 |
isfreeaccess_bool |
false |
container_title |
Quality & quantity |
authorswithroles_txt_mv |
Chytilek, Roman @@aut@@ Mareš, Miroslav @@aut@@ Drmola, Jakub @@aut@@ Hrbková, Lenka @@aut@@ Mlejnková, Petra @@aut@@ Špačková, Zuzana @@aut@@ Tóth, Michal @@aut@@ |
publishDateDaySort_date |
2022-02-22T00:00:00Z |
hierarchy_top_id |
129084328 |
dewey-sort |
250 |
id |
OLC2079820540 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2079820540</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230506080440.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">230131s2022 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11135-022-01354-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2079820540</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11135-022-01354-4-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">050</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">3,4</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chytilek, Roman</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-2900-7746</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">An experimental study of countermeasures against threats: real-world effects meet treatment effects</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s), under exclusive licence to Springer Nature B.V. 2022</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Experiments</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Contamination</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pre-treatment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Treatment effect</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mareš, Miroslav</subfield><subfield code="0">(orcid)0000-0002-7102-3205</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Drmola, Jakub</subfield><subfield code="0">(orcid)0000-0003-4275-2115</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hrbková, Lenka</subfield><subfield code="0">(orcid)0000-0003-3755-3322</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mlejnková, Petra</subfield><subfield code="0">(orcid)0000-0002-4430-6269</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Špačková, Zuzana</subfield><subfield code="0">(orcid)0000-0001-8349-5106</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tóth, Michal</subfield><subfield code="0">(orcid)0000-0002-9026-1313</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Quality & quantity</subfield><subfield code="d">Springer Netherlands, 1967</subfield><subfield code="g">56(2022), 6 vom: 22. Feb., Seite 4825-4840</subfield><subfield code="w">(DE-627)129084328</subfield><subfield code="w">(DE-600)4140-3</subfield><subfield code="w">(DE-576)014417715</subfield><subfield code="x">0033-5177</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:56</subfield><subfield code="g">year:2022</subfield><subfield code="g">number:6</subfield><subfield code="g">day:22</subfield><subfield code="g">month:02</subfield><subfield code="g">pages:4825-4840</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11135-022-01354-4</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-SOW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4027</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">56</subfield><subfield code="j">2022</subfield><subfield code="e">6</subfield><subfield code="b">22</subfield><subfield code="c">02</subfield><subfield code="h">4825-4840</subfield></datafield></record></collection>
|
author |
Chytilek, Roman |
spellingShingle |
Chytilek, Roman ddc 050 ssgn 3,4 misc Security misc Experiments misc Contamination misc Pre-treatment misc Treatment effect An experimental study of countermeasures against threats: real-world effects meet treatment effects |
authorStr |
Chytilek, Roman |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)129084328 |
format |
Article |
dewey-ones |
050 - General serial publications |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0033-5177 |
topic_title |
050 VZ 3,4 ssgn An experimental study of countermeasures against threats: real-world effects meet treatment effects Security Experiments Contamination Pre-treatment Treatment effect |
topic |
ddc 050 ssgn 3,4 misc Security misc Experiments misc Contamination misc Pre-treatment misc Treatment effect |
topic_unstemmed |
ddc 050 ssgn 3,4 misc Security misc Experiments misc Contamination misc Pre-treatment misc Treatment effect |
topic_browse |
ddc 050 ssgn 3,4 misc Security misc Experiments misc Contamination misc Pre-treatment misc Treatment effect |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Quality & quantity |
hierarchy_parent_id |
129084328 |
dewey-tens |
050 - Magazines, journals & serials |
hierarchy_top_title |
Quality & quantity |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)129084328 (DE-600)4140-3 (DE-576)014417715 |
title |
An experimental study of countermeasures against threats: real-world effects meet treatment effects |
ctrlnum |
(DE-627)OLC2079820540 (DE-He213)s11135-022-01354-4-p |
title_full |
An experimental study of countermeasures against threats: real-world effects meet treatment effects |
author_sort |
Chytilek, Roman |
journal |
Quality & quantity |
journalStr |
Quality & quantity |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2022 |
contenttype_str_mv |
txt |
container_start_page |
4825 |
author_browse |
Chytilek, Roman Mareš, Miroslav Drmola, Jakub Hrbková, Lenka Mlejnková, Petra Špačková, Zuzana Tóth, Michal |
container_volume |
56 |
class |
050 VZ 3,4 ssgn |
format_se |
Aufsätze |
author-letter |
Chytilek, Roman |
doi_str_mv |
10.1007/s11135-022-01354-4 |
normlink |
(ORCID)0000-0002-2900-7746 (ORCID)0000-0002-7102-3205 (ORCID)0000-0003-4275-2115 (ORCID)0000-0003-3755-3322 (ORCID)0000-0002-4430-6269 (ORCID)0000-0001-8349-5106 (ORCID)0000-0002-9026-1313 |
normlink_prefix_str_mv |
(orcid)0000-0002-2900-7746 (orcid)0000-0002-7102-3205 (orcid)0000-0003-4275-2115 (orcid)0000-0003-3755-3322 (orcid)0000-0002-4430-6269 (orcid)0000-0001-8349-5106 (orcid)0000-0002-9026-1313 |
dewey-full |
050 |
title_sort |
an experimental study of countermeasures against threats: real-world effects meet treatment effects |
title_auth |
An experimental study of countermeasures against threats: real-world effects meet treatment effects |
abstract |
Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments. © The Author(s), under exclusive licence to Springer Nature B.V. 2022 |
abstractGer |
Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments. © The Author(s), under exclusive licence to Springer Nature B.V. 2022 |
abstract_unstemmed |
Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments. © The Author(s), under exclusive licence to Springer Nature B.V. 2022 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-SOW GBV_ILN_4027 |
container_issue |
6 |
title_short |
An experimental study of countermeasures against threats: real-world effects meet treatment effects |
url |
https://doi.org/10.1007/s11135-022-01354-4 |
remote_bool |
false |
author2 |
Mareš, Miroslav Drmola, Jakub Hrbková, Lenka Mlejnková, Petra Špačková, Zuzana Tóth, Michal |
author2Str |
Mareš, Miroslav Drmola, Jakub Hrbková, Lenka Mlejnková, Petra Špačková, Zuzana Tóth, Michal |
ppnlink |
129084328 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11135-022-01354-4 |
up_date |
2024-07-04T02:07:53.607Z |
_version_ |
1803612453451333632 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2079820540</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230506080440.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">230131s2022 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11135-022-01354-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2079820540</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11135-022-01354-4-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">050</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">3,4</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chytilek, Roman</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-2900-7746</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">An experimental study of countermeasures against threats: real-world effects meet treatment effects</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s), under exclusive licence to Springer Nature B.V. 2022</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Experiments</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Contamination</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pre-treatment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Treatment effect</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mareš, Miroslav</subfield><subfield code="0">(orcid)0000-0002-7102-3205</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Drmola, Jakub</subfield><subfield code="0">(orcid)0000-0003-4275-2115</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hrbková, Lenka</subfield><subfield code="0">(orcid)0000-0003-3755-3322</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mlejnková, Petra</subfield><subfield code="0">(orcid)0000-0002-4430-6269</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Špačková, Zuzana</subfield><subfield code="0">(orcid)0000-0001-8349-5106</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tóth, Michal</subfield><subfield code="0">(orcid)0000-0002-9026-1313</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Quality & quantity</subfield><subfield code="d">Springer Netherlands, 1967</subfield><subfield code="g">56(2022), 6 vom: 22. Feb., Seite 4825-4840</subfield><subfield code="w">(DE-627)129084328</subfield><subfield code="w">(DE-600)4140-3</subfield><subfield code="w">(DE-576)014417715</subfield><subfield code="x">0033-5177</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:56</subfield><subfield code="g">year:2022</subfield><subfield code="g">number:6</subfield><subfield code="g">day:22</subfield><subfield code="g">month:02</subfield><subfield code="g">pages:4825-4840</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11135-022-01354-4</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-SOW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4027</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">56</subfield><subfield code="j">2022</subfield><subfield code="e">6</subfield><subfield code="b">22</subfield><subfield code="c">02</subfield><subfield code="h">4825-4840</subfield></datafield></record></collection>
|
score |
7.401704 |