Skip to main content

Showing 1–50 of 63 results for author: Ruohonen, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.00786  [pdf, ps, other

    cs.SE

    Snaps: Bloated and Outdated?

    Authors: Jukka Ruohonen, Qusai Ramadan

    Abstract: Snap is an alternative software packaging system developed by Canonical and provided by default in the Ubuntu Linux distribution. Given the heterogeneity of various Linux distributions and their various releases, Snap allows an interoperable delivery of software directly to users. However, concerns and criticism have also been frequently expressed. Regarding this criticism, the paper shows that cu… ▽ More

    Submitted 1 July, 2025; originally announced July 2025.

    Comments: Submitted as a "poster paper" to APSEC

  2. arXiv:2505.13641  [pdf, ps, other

    cs.CR cs.SE

    An Alignment Between the CRA's Essential Requirements and the ATT&CK's Mitigations

    Authors: Jukka Ruohonen, Eun-Young Kang, Qusai Ramadan

    Abstract: The paper presents an alignment evaluation between the mitigations present in the MITRE's ATT&CK framework and the essential cyber security requirements of the recently introduced Cyber Resilience Act (CRA) in the European Union. In overall, the two align well with each other. With respect to the CRA, there are notable gaps only in terms of data minimization, data erasure, and vulnerability coordi… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

    Comments: Submitted to ESPRE@RE

  3. arXiv:2505.04307  [pdf, other

    cs.SE cs.CR

    Tracing Vulnerability Propagation Across Open Source Software Ecosystems

    Authors: Jukka Ruohonen, Qusai Ramadan

    Abstract: The paper presents a traceability analysis of how over 84 thousand vulnerabilities have propagated across 28 open source software ecosystems. According to the results, the propagation sequences have been complex in general, although GitHub, Debian, and Ubuntu stand out. Furthermore, the associated propagation delays have been lengthy, and these do not correlate well with the number of ecosystems i… ▽ More

    Submitted 7 May, 2025; originally announced May 2025.

    Comments: Submitted to ICTSS

  4. arXiv:2504.15695  [pdf, other

    cs.CR cs.SE

    A Time Series Analysis of Malware Uploads to Programming Language Ecosystems

    Authors: Jukka Ruohonen, Mubashrah Saddiqa

    Abstract: Software ecosystems built around programming languages have greatly facilitated software development. At the same time, their security has increasingly been acknowledged as a problem. To this end, the paper examines the previously overlooked longitudinal aspects of software ecosystem security, focusing on malware uploaded to six popular programming language ecosystems. The dataset examined is base… ▽ More

    Submitted 22 April, 2025; originally announced April 2025.

    Comments: Submitted to TrustBus@ARES

  5. arXiv:2504.14220  [pdf, other

    cs.CR cs.CY

    From Cyber Security Incident Management to Cyber Security Crisis Management in the European Union

    Authors: Jukka Ruohonen, Kalle Rindell, Simone Busetti

    Abstract: Incident management is a classical topic in cyber security. Recently, the European Union (EU) has started to consider also the relation between cyber security incidents and cyber security crises. These considerations and preparations, including those specified in the EU's new cyber security laws, constitute the paper's topic. According to an analysis of the laws and associated policy documents, (i… ▽ More

    Submitted 19 April, 2025; originally announced April 2025.

    Comments: Submitted to COSE (VSI: Cybersecurity, Privacy, Trust and Regulation)

  6. arXiv:2503.01828  [pdf, ps, other

    cs.SE cs.CY

    A Scenario Analysis of Ethical Issues in Dark Patterns and Their Research

    Authors: Jukka Ruohonen, Jani Koskinen, Søren Harnow Klausen, Anne Gerdes

    Abstract: Context: Dark patterns are user interface or other software designs that deceive or manipulate users to do things they would not otherwise do. Even though dark patterns have been under active research for a long time, including particularly in computer science but recently also in other fields such as law, systematic applied ethical assessments have generally received only a little attention. Obje… ▽ More

    Submitted 3 March, 2025; originally announced March 2025.

    Comments: Submitted to IST

  7. arXiv:2503.01816  [pdf, other

    cs.SE cs.CR

    A Mapping Analysis of Requirements Between the CRA and the GDPR

    Authors: Jukka Ruohonen, Kalle Hjerppe, Eun-Young Kang

    Abstract: A new Cyber Resilience Act (CRA) was recently agreed upon in the European Union (EU). The paper examines and elaborates what new requirements the CRA entails by contrasting it with the older General Data Protection Regulation (GDPR). According to the results, there are overlaps in terms confidentiality, integrity, and availability guarantees, data minimization, traceability, data erasure, and secu… ▽ More

    Submitted 3 March, 2025; originally announced March 2025.

    Comments: Submitted to RE@Next!

  8. arXiv:2502.16670  [pdf, ps, other

    cs.SE cs.CR

    The Popularity Hypothesis in Software Security: A Large-Scale Replication with PHP Packages

    Authors: Jukka Ruohonen, Qusai Ramadan

    Abstract: There has been a long-standing hypothesis that a software's popularity is related to its security or insecurity in both research and popular discourse. There are also a few empirical studies that have examined the hypothesis, either explicitly or implicitly. The present work continues with and contributes to this research with a replication-motivated large-scale analysis of software written in the… ▽ More

    Submitted 11 June, 2025; v1 submitted 23 February, 2025; originally announced February 2025.

    Comments: Resubmitted

  9. arXiv:2501.03098  [pdf, other

    cs.CY

    Early Perspectives on the Digital Europe Programme

    Authors: Jukka Ruohonen, Paul Timmers

    Abstract: A new Digital Europe Programme (DEP), a funding instrument for development and innovation, was established in the European Union (EU) in 2021. The paper makes an empirical inquiry into the projects funded through the DEP. According to the results, the projects align well with the DEP's strategic focus on cyber security, artificial intelligence, high-performance computing, innovation hubs, small- a… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

    Comments: Submitted

  10. arXiv:2412.19465  [pdf, other

    cs.SE

    A Time Series Analysis of Assertions in the Linux Kernel

    Authors: Jukka Ruohonen

    Abstract: Assertions are a classical and typical software development technique. These are extensively used also in operating systems and their kernels, including the Linux kernel. The paper patches a gap in existing knowledge by empirically examining the longitudinal evolution of assertion use in the Linux kernel. According to the results, the use of assertions that cause a kernel panic has slightly but no… ▽ More

    Submitted 27 December, 2024; originally announced December 2024.

    Comments: Submitted

  11. SoK: The Design Paradigm of Safe and Secure Defaults

    Authors: Jukka Ruohonen

    Abstract: In security engineering, including software security engineering, there is a well-known design paradigm telling to prefer safe and secure defaults. The paper presents a systematization of knowledge (SoK) of this paradigm by the means of a systematic mapping study and a scoping review of relevant literature. According to the mapping and review, the paradigm has been extensively discussed, used, and… ▽ More

    Submitted 26 February, 2025; v1 submitted 23 December, 2024; originally announced December 2024.

    Comments: Journal of Information Security and Applications, 2025, vol. 90, pp. 103989

  12. arXiv:2412.08084  [pdf, other

    cs.CR cs.CY

    A Systematic Literature Review on the NIS2 Directive

    Authors: Jukka Ruohonen

    Abstract: A directive known as NIS2 was enacted in the European Union (EU) in late 2022. It deals particularly with European critical infrastructures, enlarging their scope substantially from an older directive that only considered the energy and transport sectors as critical. The directive's focus is on cyber security of critical infrastructures, although together with other new EU laws it expands to other… ▽ More

    Submitted 10 December, 2024; originally announced December 2024.

    Comments: Submitted

  13. arXiv:2412.06261  [pdf, other

    cs.CR cs.CY cs.SE

    Vulnerability Coordination Under the Cyber Resilience Act

    Authors: Jukka Ruohonen, Paul Timmers

    Abstract: A new Cyber Resilience Act (CRA) was recently agreed upon in the European Union (EU). It imposes many new cyber security requirements practically to all information technology products, whether hardware or software. The paper examines and elaborates the CRA's new requirements for vulnerability coordination, including vulnerability disclosure. Although these requirements are only a part of the CRA'… ▽ More

    Submitted 8 March, 2025; v1 submitted 9 December, 2024; originally announced December 2024.

    Comments: Re-submitted

  14. arXiv:2412.05887  [pdf, other

    cs.CR cs.CY cs.SE

    An Overview of Cyber Security Funding for Open Source Software

    Authors: Jukka Ruohonen, Gaurav Choudhary, Adam Alami

    Abstract: Context: Many open source software (OSS) projects need more human resources for maintenance, improvements, and sometimes even their survival. This need allegedly applies even to vital OSS projects that can be seen as being a part of the world's critical infrastructures. To address this resourcing problem, new funding instruments for OSS projects have been established in recent years. Objectives: T… ▽ More

    Submitted 29 April, 2025; v1 submitted 8 December, 2024; originally announced December 2024.

    Comments: Resubmitted

  15. arXiv:2411.08363  [pdf, ps, other

    cs.CY

    On Algorithmic Fairness and the EU Regulations

    Authors: Jukka Ruohonen

    Abstract: The short paper discusses algorithmic fairness by focusing on non-discrimination and a few important laws in the European Union (EU). In addition to the EU laws addressing discrimination explicitly, the discussion is based on the EU's recently enacted regulation for artificial intelligence (AI) and the older General Data Protection Regulation (GDPR). Through a theoretical scenario analysis, on one… ▽ More

    Submitted 21 December, 2024; v1 submitted 13 November, 2024; originally announced November 2024.

    Comments: Submitted

  16. arXiv:2411.02091  [pdf, other

    cs.SE

    Fast Fixes and Faulty Drivers: An Empirical Analysis of Regression Bug Fixing Times in the Linux Kernel

    Authors: Jukka Ruohonen, Adam Alami

    Abstract: Regression bugs refer to situations in which something that worked previously no longer works currently. Such bugs have been pronounced in the Linux kernel. The paper focuses on regression bug tracking in the kernel by considering the time required to fix regression bugs. The dataset examined is based on the regzbot automation framework for tracking regressions in the Linux kernel. According to th… ▽ More

    Submitted 4 November, 2024; originally announced November 2024.

    Comments: Submitted

  17. An Empirical Study of Vulnerability Handling Times in CPython

    Authors: Jukka Ruohonen

    Abstract: The paper examines the handling times of software vulnerabilities in CPython, the reference implementation and interpreter for the today's likely most popular programming language, Python. The background comes from the so-called vulnerability life cycle analysis, the literature on bug fixing times, and the recent research on security of Python software. Based on regression analysis, the associated… ▽ More

    Submitted 25 May, 2025; v1 submitted 1 November, 2024; originally announced November 2024.

    Comments: Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2025), Montreal, IEEE, pp. 891-896

  18. The Potential of Citizen Platforms for Requirements Engineering of Large Socio-Technical Software Systems

    Authors: Jukka Ruohonen, Kalle Hjerppe

    Abstract: Participatory citizen platforms are innovative solutions to digitally better engage citizens in policy-making and deliberative democracy in general. Although these platforms have been used also in an engineering context, thus far, there is no existing work for connecting the platforms to requirements engineering. The present paper fills this notable gap. In addition to discussing the platforms in… ▽ More

    Submitted 3 April, 2025; v1 submitted 4 October, 2024; originally announced October 2024.

    Comments: Proceedings of the 31st International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2025), Springer, pp. 295-303

  19. arXiv:2409.18530  [pdf, other

    cs.SE cs.CR

    A Static Analysis of Popular C Packages in Linux

    Authors: Jukka Ruohonen, Mubashrah Saddiqa, Krzysztof Sierszecki

    Abstract: Static analysis is a classical technique for improving software security and software quality in general. Fairly recently, a new static analyzer was implemented in the GNU Compiler Collection (GCC). The present paper uses the GCC's analyzer to empirically examine popular Linux packages. The dataset used is based on those packages in the Gentoo Linux distribution that are either written in C or con… ▽ More

    Submitted 27 September, 2024; originally announced September 2024.

    Comments: Submitted

  20. What Do We Know About the Psychology of Insider Threats?

    Authors: Jukka Ruohonen, Mubashrah Saddiqa

    Abstract: Insider threats refer to threats originating from people inside organizations. Although such threats are a classical research topic, the systematization of existing knowledge is still limited particularly with respect to non-technical research approaches. To this end, this paper presents a systematic literature review on the psychology of insider threats. According to the review results, the liter… ▽ More

    Submitted 24 May, 2025; v1 submitted 8 July, 2024; originally announced July 2024.

    Comments: Proceedings of the 15th EAI International Conference on Digital Forensics & Cyber Crime (EAI ICDF2C 2024), Dubrovnik, Springer, 2025, pp. 186-211

  21. arXiv:2406.01744  [pdf, other

    cs.CR cs.CY

    Crisis Communication in the Face of Data Breaches

    Authors: Jukka Ruohonen, Kalle Hjerppe, Katleena Kortesuo

    Abstract: Data breaches refer to unauthorized accesses to data. Typically but not always, data breaches are about cyber crime. An organization facing such a crime is often also in a crisis situation. Therefore, organizations should prepare also for data breaches in their crisis management procedures. These procedures should include also crisis communication plans. To this end, this paper examines data breac… ▽ More

    Submitted 3 October, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: Submitted

  22. The Incoherency Risk in the EU's New Cyber Security Policies

    Authors: Jukka Ruohonen

    Abstract: The European Union (EU) has been pursuing new cyber security policies in recent years. This paper presents a short reflection of four such policies. The focus is on potential incoherency, meaning a lack of integration, divergence between the member states, institutional dysfunction, and other related problems that should be at least partially avoidable by sound policy-making. According to the resu… ▽ More

    Submitted 27 September, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

    Comments: Proceedings of the 23rd IFIP Conference on e-Business, e-Services, and e-Society (I3E 2024), Heerlen, Springer, pp. 284-295

  23. An Exploratory Case Study on Data Breach Journalism

    Authors: Jukka Ruohonen, Kalle Hjerppe, Maximilian von Zastrow

    Abstract: This paper explores the novel topic of data breach journalism and data breach news through the case of databreaches.net, a news outlet dedicated to data breaches and related cyber crime. Motivated by the issues in traditional crime news and crime journalism, the case is explored by the means of text mining. According to the results, the outlet has kept a steady publishing pace, mainly focusing on… ▽ More

    Submitted 27 July, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: Proceedings of the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, ACM, pp. 1-9

  24. arXiv:2303.02863  [pdf, ps, other

    cs.CY

    A Note on the Proposed Law for Improving the Transparency of Political Advertising in the European Union

    Authors: Jukka Ruohonen

    Abstract: There is an increasing supply and demand for political advertising throughout the world. At the same time, societal threats, such as election interference by foreign governments and other bad actors, continues to be a pressing concern in many democracies. Furthermore, manipulation of electoral outcomes, whether by foreign or domestic forces, continues to be a concern of many citizens who are also… ▽ More

    Submitted 1 November, 2023; v1 submitted 5 March, 2023; originally announced March 2023.

    Comments: A continuously updated deliberative working paper

  25. Reflections on the Data Governance Act

    Authors: Jukka Ruohonen, Sini Mickelsson

    Abstract: The European Union (EU) has been pursuing a new strategy under the umbrella label of digital sovereignty. Data is an important element in this strategy. To this end, a specific Data Governance Act was enacted in 2022. This new regulation builds upon two ideas: reuse of data held by public sector bodies and voluntary sharing of data under the label of data altruism. This short commentary reviews th… ▽ More

    Submitted 29 March, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: Digital Society, vol. 2, no. 1, pp. 1-10

  26. arXiv:2302.09942  [pdf, other

    cs.CY cs.CR

    Recent Trends in Cross-Border Data Access by Law Enforcement Agencies

    Authors: Jukka Ruohonen

    Abstract: Access to online data has long been important for law enforcement agencies in their collection of electronic evidence and investigation of crimes. These activities have also long involved cross-border investigations and international cooperation between agencies and jurisdictions. However, technological advances such as cloud computing have complicated the investigations and cooperation arrangemen… ▽ More

    Submitted 20 September, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: Withdrawn from peer review due to lack of time

  27. arXiv:2302.09939  [pdf, other

    cs.CY

    A Text Mining Analysis of Data Protection Politics: The Case of Plenary Sessions of the European Parliament

    Authors: Jukka Ruohonen

    Abstract: Data protection laws and policies have been studied extensively in recent years, but little is known about the parliamentary politics of data protection. This imitation applies even to the European Union (EU) that has taken the global lead in data protection and privacy regulation. For patching this notable gap in existing research, this paper explores the data protection questions raised by the M… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: Submitted

  28. Mysterious and Manipulative Black Boxes: A Qualitative Analysis of Perceptions on Recommender Systems

    Authors: Jukka Ruohonen

    Abstract: Recommender systems are used to provide relevant suggestions on various matters. Although these systems are a classical research topic, knowledge is still limited regarding the public opinion about these systems. Public opinion is also important because the systems are known to cause various problems. To this end, this paper presents a qualitative analysis of the perceptions of ordinary citizens,… ▽ More

    Submitted 13 June, 2024; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: First Monday, vol. 29, no. 6

  29. A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI

    Authors: Jukka Ruohonen, Kalle Hjerppe, Kalle Rindell

    Abstract: Different security issues are a common problem for open source packages archived to and delivered through software ecosystems. These often manifest themselves as software weaknesses that may lead to concrete software vulnerabilities. This paper examines various security issues in Python packages with static analysis. The dataset is based on a snapshot of all packages stored to the Python Package I… ▽ More

    Submitted 26 December, 2021; v1 submitted 27 July, 2021; originally announced July 2021.

    Comments: Proceedings of the 18th Annual International Conference on Privacy, Security and Trust (PST 2021), Auckland (online), IEEE, pp. 1-10

  30. Digital Divides and Online Media

    Authors: Jukka Ruohonen, Anne-Marie Tuikka

    Abstract: Digital divide has been a common concern during the past two or three decades; traditionally, it refers to a gap between developed and developing countries in the adoption and use of digital technologies. Given the importance of the topic, digital divide has been also extensively studied, although, hitherto, there is no previous research that would have linked the concept to online media. Given th… ▽ More

    Submitted 26 December, 2021; v1 submitted 25 June, 2021; originally announced June 2021.

    Comments: Proceedings of the 5th International Conference on E-Society, E-Education and E-Technology (ICSET 2021), Taipei (online), ACM, pp. 157-163

  31. Crossing Cross-Domain Paths in the Current Web

    Authors: Jukka Ruohonen, Joonas Salovaara, Ville Leppänen

    Abstract: The loading of resources from third-parties has evoked new security and privacy concerns about the current world wide web. Building on the concepts of forced and implicit trust, this paper examines cross-domain transmission control protocol (TCP) connections that are initiated to domains other than the domain queried with a web browser. The dataset covers nearly ten thousand domains and over three… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: Proceedings of the 16th Annual Conference on Privacy, Security and Trust (PST 2018), Belfast, IEEE, pp. 1-5

  32. A Comparative Study of Online Disinformation and Offline Protests

    Authors: Jukka Ruohonen

    Abstract: In early 2021 the United States Capitol in Washington was stormed during a riot and violent attack. A similar storming occurred in Brazil in 2023. Although both attacks were instances in longer sequences of events, these have provided a testimony for many observers who had claimed that online actions, including the propagation of disinformation, have offline consequences. Soon after, a number of… ▽ More

    Submitted 7 December, 2024; v1 submitted 21 June, 2021; originally announced June 2021.

    Comments: Note that there is a divergence between this pre-print and the publisher's definite version available via the DOI. The pre-print will be updated once the publisher's embargo period is over

    Journal ref: SN Social Sciences, 2024, vol. 4, pp. 1-18

  33. arXiv:2106.10427  [pdf, other

    cs.CY

    Reassessing Measures for Press Freedom

    Authors: Jukka Ruohonen

    Abstract: There has been an increasing interest in press freedom in the face of various global scandals, transformation of media, technological change, obstacles to deliberative democracy, and other factors. Press freedom is frequently used also as an explanatory factor in comparative empirical research. However, validations of existing measurement instruments on press freedom have been far and few between.… ▽ More

    Submitted 19 September, 2023; v1 submitted 19 June, 2021; originally announced June 2021.

    Comments: Withdrawn from peer review due to lack of time

  34. arXiv:2104.04389  [pdf, other

    cs.CY

    A Few Observations About State-Centric Online Propaganda

    Authors: Jukka Ruohonen

    Abstract: This paper presents a few observations about pro-Kremlin propaganda between 2015 and early 2021 with a dataset from the East Stratcom Task Force (ESTF), which is affiliated with the European Union (EU) but working independently from it. Instead of focusing on misinformation and disinformation, the observations are motivated by classical propaganda research and the ongoing transformation of media s… ▽ More

    Submitted 9 April, 2021; originally announced April 2021.

    Comments: Submitted

  35. Assessing the Readability of Policy Documents on the Digital Single Market of the European Union

    Authors: Jukka Ruohonen

    Abstract: Today, literature skills are necessary. Engineering and other technical professions are not an exception from this requirement. Traditionally, technical reading and writing have been framed with a limited scope, containing documentation, specifications, standards, and related text types. Nowadays, however, the scope covers also other text types, including legal, policy, and related documents. Give… ▽ More

    Submitted 15 September, 2021; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: Proceedings of the Eighth International Conference on eDemocracy & eGovernment (ICEDEG 2021), Quito (online), IEEE, pp. 205-209

  36. A Review of Product Safety Regulations in the European Union

    Authors: Jukka Ruohonen

    Abstract: Product safety has been a concern in Europe ever since the early 1960s. Despite the long and relatively stable historical lineage of product safety regulations, new technologies, changes in the world economy, and other major transformations have in recent years brought product safety again to the forefront of policy debates. As reforms are also underway, there is a motivation to review the complex… ▽ More

    Submitted 19 June, 2022; v1 submitted 6 February, 2021; originally announced February 2021.

    Comments: International Cybersecurity Law Review

  37. The Treachery of Images in the Digital Sovereignty Debate

    Authors: Jukka Ruohonen

    Abstract: This short theoretical and argumentative essay contributes to the ongoing deliberation about the so-called digital sovereignty, as pursued particularly in the European Union (EU). Drawing from classical political science literature, the essay approaches the debate through paradoxes that arise from applying classical notions of sovereignty to the digital domain. With these paradoxes and a focus on… ▽ More

    Submitted 27 July, 2021; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: Minds and Machines, published online in July 2021, pp. 1-18

  38. arXiv:2011.07212  [pdf, other

    cs.CY

    Do Cyber Capabilities and Cyber Power Incentivize International Cooperation?

    Authors: Jukka Ruohonen

    Abstract: This paper explores a research question about whether defensive and offensive cyber security power and the capabilities to exercise the power influence the incentives of nation-states to participate in bilateral and multilateral cooperation (BMC) through formal and informal agreements, alliances, and norms. Drawing from international relations in general and structural realism in particular, three… ▽ More

    Submitted 13 November, 2020; originally announced November 2020.

    Comments: Submitted

  39. The GDPR Enforcement Fines at Glance

    Authors: Jukka Ruohonen, Kalle Hjerppe

    Abstract: The General Data Protection Regulation (GDPR) came into force in 2018. After this enforcement, many fines have already been imposed by national data protection authorities in Europe. This paper examines the individual GDPR articles referenced in the enforcement decisions, as well as predicts the amount of enforcement fines with available meta-data and text mining features extracted from the enforc… ▽ More

    Submitted 1 September, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Information Systems, published online in August 2021, pp. 1-11. Substantial overlap expected with arXiv:2003.05151; accepted by venue (i.e., extended conference paper)

  40. arXiv:2011.00751  [pdf, other

    cs.CY

    A Critical Correspondence on Humpty Dumpty's Funding for European Journalism

    Authors: Jukka Ruohonen

    Abstract: This short critical correspondence discusses the Digital News Innovation (DNI) fund orchestrated by Humpty Dumpty -- a.k.a. Google -- for helping European journalism to innovate and renew itself. Based on topic modeling and critical discourse analysis, the results indicate that the innovative projects mostly mimic the old business model of Humpty Dumpty. With these results and the accompanying cri… ▽ More

    Submitted 14 June, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Revised

  41. A Case Study on Software Vulnerability Coordination

    Authors: Jukka Ruohonen, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen

    Abstract: Context: Coordination is a fundamental tenet of software engineering. Coordination is required also for identifying discovered and disclosed software vulnerabilities with Common Vulnerabilities and Exposures (CVEs). Motivated by recent practical challenges, this paper examines the coordination of CVEs for open source projects through a public mailing list. Objective: The paper observes the histori… ▽ More

    Submitted 24 July, 2020; originally announced July 2020.

    Journal ref: Information and Software Technology, 2018, vol. 103, pp. 239-257

  42. Extracting Layered Privacy Language Purposes from Web Services

    Authors: Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen

    Abstract: Web services are important in the processing of personal data in the World Wide Web. In light of recent data protection regulations, this processing raises a question about consent or other basis of legal processing. While a consent must be informed, many web services fail to provide enough information for users to make informed decisions. Privacy policies and privacy languages are one way for add… ▽ More

    Submitted 30 April, 2020; originally announced April 2020.

    Comments: 2020 International Workshop on Privacy Engineering - IWPE'20

  43. Annotation-Based Static Analysis for Personal Data Protection

    Authors: Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen

    Abstract: This paper elaborates the use of static source code analysis in the context of data protection. The topic is important for software engineering in order for software developers to improve the protection of personal data during software development. To this end, the paper proposes a design of annotating classes and functions that process personal data. The design serves two primary purposes: on one… ▽ More

    Submitted 22 March, 2020; originally announced March 2020.

    Journal ref: Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19--23, 2019, Revised Selected Papers, pp 343--358

  44. arXiv:2003.05151  [pdf, other

    cs.CY

    Predicting the Amount of GDPR Fines

    Authors: Jukka Ruohonen, Kalle Hjerppe

    Abstract: The General Data Protection Regulation (GDPR) was enforced in 2018. After this enforcement, many fines have already been imposed by national data protection authorities in the European Union (EU). This paper examines the individual GDPR articles referenced in the enforcement decisions, as well as predicts the amount of enforcement fines with available meta-data and text mining features extracted f… ▽ More

    Submitted 2 November, 2020; v1 submitted 11 March, 2020; originally announced March 2020.

    Journal ref: Proceedings of the First International Workshop "CAiSE for Legal Documents" (COUrT 2020), Grenoble (online), CEUR-WS, pp. 3-14, http://ceur-ws.org/Vol-2690/COUrT-paper1.pdf

  45. arXiv:2002.10731  [pdf, other

    cs.NI

    Measuring Basic Load-Balancing and Fail-Over Setups for Email Delivery via DNS MX Records

    Authors: Jukka Ruohonen

    Abstract: The domain name system (DNS) has long provided means to assure basic load-balancing and fail-over (BLBFO) for email delivery. A traditional method uses multiple mail exchanger (MX) records to distribute the load across multiple email servers. Round-robin DNS is the common alternative to this MX-based balancing. Despite the classical nature of these two solutions, neither one has received particula… ▽ More

    Submitted 24 July, 2020; v1 submitted 25 February, 2020; originally announced February 2020.

    Journal ref: Proceedings of the Global Internet Symposium (GIS 2020), IFIP Networking Conference (Networking 2020), Paris (online), IEEE, pp. 815-820, https://ieeexplore.ieee.org/document/9142814

  46. A Dip Into a Deep Well: Online Political Advertisements, Valence, and European Electoral Campaigning

    Authors: Jukka Ruohonen

    Abstract: Online political advertisements have become an important element in electoral campaigning throughout the world. At the same time, concepts such as disinformation and manipulation have emerged as a global concern. Although these concepts are distinct from online political ads and data-driven electoral campaigning, they tend to share a similar trait related to valence, the intrinsic attractiveness o… ▽ More

    Submitted 2 November, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

    Journal ref: Proceedings of the 2nd Multidisciplinary International Symposium on Disinformation in Open Online Media (MISDOOM 2020), Leiden (online), Springer, pp. 37-51

  47. Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and Development

    Authors: Jukka Ruohonen, Kalle Rindell

    Abstract: Fuzzing has been studied and applied ever since the 1990s. Automated and continuous fuzzing has recently been applied also to open source software projects, including the Linux and BSD kernels. This paper concentrates on the practical aspects of continuous kernel fuzzing in four open source kernels. According to the results, there are over 800 unresolved crashes reported for the four kernels by th… ▽ More

    Submitted 5 September, 2019; originally announced September 2019.

    Comments: The 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA), 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Berlin, IEEE

  48. arXiv:1907.07498  [pdf, other

    cs.SE cs.CR cs.CY

    The General Data Protection Regulation: Requirements, Architectures, and Constraints

    Authors: Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen

    Abstract: The General Data Protection Regulation (GDPR) in the European Union is the most famous recently enacted privacy regulation. Despite of the regulation's legal, political, and technological ramifications, relatively little research has been carried out for better understanding the GDPR's practical implications for requirements engineering and software architectures. Building on a grounded theory app… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

    Comments: Forthcoming in the 27th IEEE International Requirements Engineering Conference (RE'19), Jeju Island, IEEE

  49. Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity

    Authors: Jukka Ruohonen, Kai Kimppa

    Abstract: This paper analyzes a recent debate on regulating cyber weapons through multilateral export controls. The background relates to the amending of the international Wassenaar Arrangement with offensive cyber security technologies known as intrusion software. Implicitly, such software is related to previously unregulated software vulnerabilities and exploits, which also make the ongoing debate particu… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

    Comments: Journal of Information Technology & Politics (published online in May 2019)

  50. arXiv:1906.01883  [pdf, ps, other

    cs.CY

    David and Goliath: Privacy Lobbying in the European Union

    Authors: Jukka Ruohonen

    Abstract: The paper examines a question of how much more resources do organized business interests have when compared to resources of civil society groups in the context of privacy lobbying in the European Union (EU). To answer to the question, the paper draws from classical literature on power resources and pluralism. The empirical material comes from a lobbying register maintained by the EU. According to… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

    Comments: Submitted