Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3598469.3598480acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article
Open access

Policy guidelines to facilitate collective action towards quantum-safety: Recommended policy guidelines to aid and facilitate collective action in migration towards quantum-safe public key infrastructure systems

Published: 11 July 2023 Publication History

Abstract

As the development of quantum computers advances, actors relying on public key infrastructures (PKI) for secure information exchange are becoming aware of the disruptive implications. Currently, governments and businesses employ PKI for many core processes that may become insecure or unavailable when quantum computers break the cryptographic algorithms foundational to PKI. While standardization institutes are currently testing quantum safe cryptographic algorithms, there are no globally agreed-upon cryptographic solutions available. Actors looking to prepare for the implementation of quantum safe cryptographic algorithms lack methods that allow for collective planning and action across organizations, sectors, and nations. The goal of this policy paper is to elicit requirements for a serious game on QS PKI, and derive policy guidelines that actors can use to prepare and formulate governance arrangements. We followed a two-step approach, drawing on technology threat avoidance theory and collective action theory, followed by empirical grounding through a focus group. The results from the literature confirm that a serious game could be a suitable governance mechanism for QS PKI. The focus group results discussed 12 requirements and the requirement's relation to the theoretical background. From this, the findings section arrived at four policy guidelines derived from the requirements that can function as focus areas for further requirement development and as input for policy makers. The policy guidelines concluded are (1) prioritize increasing collective awareness through emphasizing social networks, (2) acknowledge the interdependencies in migrating towards QS PKI, (3) create an understanding of the technical standards in the field and their issuers, and (4) being highly realistic with both negative and positive scenarios to center the players’ understanding of real-world impact.

References

[1]
Arachchilage, N.A.G. and Hameed, M.A. 2017. Integrating self-efficacy into a gamified approach to thwart phishing attacks. arXiv.
[2]
Backlund, P. 2008. Designing for Self-Efficacy in a Game Based Simulator: An Experimental Study and Its Implications for Serious Games Design. 2008 International Conference Visualisation (Jul. 2008), 106–113.
[3]
Blasko-Drabik, H. 2013. Investigating the Impact of Self-Efficacy in Learning Disaster Strategies in an On-Line Serious Game. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 57, 1 (Sep. 2013), 1455–1459.
[4]
Bourazeri, A. and Pitt, J. 2014. Collective Awareness for Collective Action in Socio-technical Systems. 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops (Sep. 2014), 90–95.
[5]
Chittaro, L. and Sioni, R. 2015. Serious games for emergency preparedness: Evaluation of an interactive vs. a non-interactive simulation of a terror attack. Computers in Human Behavior. 50, (Sep. 2015), 508–519.
[6]
Dejean, S. 2010. Olson's Paradox Revisited: An Empirical Analysis of incentives to contribute in P2P File-Sharing Communities. SSRN Electronic Journal. (2010).
[7]
Duke, R.D. and Geurts, J.L.A. 2004. Policy games for strategic management: pathways into the unknown. Dutch University Press.
[8]
Grimes, R.A. 2019. Cryptography apocalypse: preparing for the day when quantum computing breaks today's crypto. John Wiley & Sons Inc.
[9]
Joseph, D. 2022. Transitioning organizations to post-quantum cryptography. Nature. 605, 7909 (May 2022), 237–243.
[10]
Kong, I. 2022. Challenges in the Transition towards a Quantum-safe Government. DG.O 2022: The 23rd Annual International Conference on Digital Government Research (Virtual Event Republic of Korea, Jun. 2022), 282–292.
[11]
Liang and Xue 2009. Avoidance of Information Technology Threats: A Theoretical Perspective. MIS Quarterly. 33, 1 (2009), 71.
[12]
Managing the Commons- Eight Principles to Self-Govern: https://serve-learn-sustain.gatech.edu/managing-commons-eight-principles-self-govern. Accessed: 2023-01-12.
[13]
Mashatan, A. and Heintzman, D. 2021. The complex path to quantum resistance. Communications of the ACM. 64, 9 (Sep. 2021), 46–53.
[14]
Meinzen-Dick, R. 2016. Games for groundwater governance: field experiments in Andhra Pradesh, India. Ecology and Society. 21, 3 (2016), art38.
[15]
Mota, F. 2016. Serious Games as a Tool to Change People Attitudes: An Analysis based on the Discourse of Collective Subject. Literacy Information and Computer Education Journal. 7, (Dec. 2016).
[16]
Ostrom, E. 2009. Collective Action Theory. The Oxford Handbook of Comparative Politics. C. Boix and S.C. Stokes, eds. Oxford University Press. 0.
[17]
Coker. President Biden Signs Quantum Cybersecurity Preparedness Act into Law: 2022. https://www.infosecurity-magazine.com/news/biden-quantum-cybersecurity-law/. Accessed: 2023-01-31.
[18]
Riar, M. How game features give rise to altruism and collective action? Implications for cultivating cooperation by gamification.
[19]
Shackelford, S.J. ed. 2020. Managing Cyber Attacks as a Global Collective Action Problem. Governing New Frontiers in the Information Age: Toward Cyber Peace. Cambridge University Press. 87–172.

Cited By

View all
  • (2024)Navigating Through the Unknowns-Organizational Readiness Assessment Model for Quantum-Safe TransitionElectronic Government10.1007/978-3-031-70274-7_27(438-453)Online publication date: 21-Aug-2024
  • (2023)Framework for understanding quantum computing use cases from a multidisciplinary perspective and future research directionsFutures10.1016/j.futures.2023.103277154(103277)Online publication date: Dec-2023

Index Terms

  1. Policy guidelines to facilitate collective action towards quantum-safety: Recommended policy guidelines to aid and facilitate collective action in migration towards quantum-safe public key infrastructure systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    dg.o '23: Proceedings of the 24th Annual International Conference on Digital Government Research
    July 2023
    711 pages
    ISBN:9798400708374
    DOI:10.1145/3598469
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 July 2023

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • NWO

    Conference

    dg.o 2023
    dg.o 2023: Digital government and solidarity
    July 11 - 14, 2023
    Gda?sk, Poland

    Acceptance Rates

    Overall Acceptance Rate 150 of 271 submissions, 55%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)152
    • Downloads (Last 6 weeks)18
    Reflects downloads up to 29 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Navigating Through the Unknowns-Organizational Readiness Assessment Model for Quantum-Safe TransitionElectronic Government10.1007/978-3-031-70274-7_27(438-453)Online publication date: 21-Aug-2024
    • (2023)Framework for understanding quantum computing use cases from a multidisciplinary perspective and future research directionsFutures10.1016/j.futures.2023.103277154(103277)Online publication date: Dec-2023

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media