2020 IEEE International Conference on Big Data (Big Data) 2020
DOI: 10.1109/bigdata50022.2020.9378014
|View full text |Cite
|
Sign up to set email alerts
|

Resolving the cybersecurity Data Sharing Paradox to scale up cybersecurity via a co-production approach towards data sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Finally, our approach has the potential to address the so-called “cybersecurity data sharing paradox” (Atapour-Abarghouei et al , 2020) by which public and private interests clash when it comes to sharing data to combat cyber-crime. By effectively repurposing existing survey data, we reduce the number of “data requests” to organisations, a significant move in a context of data scarcity and resistance to sharing.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, our approach has the potential to address the so-called “cybersecurity data sharing paradox” (Atapour-Abarghouei et al , 2020) by which public and private interests clash when it comes to sharing data to combat cyber-crime. By effectively repurposing existing survey data, we reduce the number of “data requests” to organisations, a significant move in a context of data scarcity and resistance to sharing.…”
Section: Discussionmentioning
confidence: 99%
“…We tested our mechanism by repurposing data gathered from a survey of 156 large Italian businesses (249 or more employees). Our study contributes to both theory and practice in information security governance: as for the former, our quantification mechanism (and the underlying approach to data repurposing) can be utilised by other researchers who face data scarcity around information security (Atapour-Abarghouei, McGough, & Wall, 2020); as for the latter, organisational leaders can employ our mechanism to determine what their peers consider essential information security governance measures. Finally, our study offers directions for researchers willing to increase the sustainability of their research practices and maximise the efficiency of their research activities, by repurposing an existing dataset on information security.…”
Section: Introductionmentioning
confidence: 99%
“…Atapour-Abarghouei et al (2020) discussed, in the context of cyber-security, this data-sharing paradox. They argue that, because all parties have differing incentives, it is difficult to obtain effective data sharing.…”
Section: Summary Of the Main Prior Knowledge Areasmentioning
confidence: 99%
“…Given these capabilities, ReFS presents a promising foundation for developing tools aimed at mitigating the ransomware threat. However, the potential of ReFS in the context of ransomware resilience remains largely untapped, with most current security solutions continuing to rely on conventional detection and prevention techniques [13]. This gap in the cybersecurity landscape motivates the development of RanAway, an Operating System (OS) add-on designed to harness the advanced features of ReFS for ransomware detection and prevention.…”
Section: Introductionmentioning
confidence: 99%