International audienceIn this paper, we investigate the role of incentives for Security Information Sharing (SIS) between human agents working in institutions. We present an incentive-based SIS system model that is empirically tested with an exclusive dataset. The data was collected with an online questionnaire addressed to all participants of a deployed Information Sharing and Analysis Center (ISAC) that operates in the context of critical infrastructure protection (N=262). SIS is measured with a multidimensional approach (intensity, frequency) and regressed on five specific predicators (reciprocity, value of information, institutional barriers, reputation, trust) that are measured with psychometric scales. We close an important research g...
The research area in question in this thesis is an analysis of success factors in information sharin...
Cyber security information sharing is increasingly playing an important role in improving the organi...
Information sharing has become a central concern for security agencies since 9/11. Previous research...
International audienceIn this paper, we investigate the role of incentives for Security Information ...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
Abstract. Assured information sharing among different organizations in a coalitional environment is ...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Economic agents make rational cybersecurity investment decisions considering the costs and the benef...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
This article describes three collective intelligence dynamics observed on ThreatFox, a free platform...
Information security embodies the complex interaction between security policies, user perceptions of...
Knowledge sharing plays an important role in the domain of information security, due to its positive...
Technologies and procedures for effectively securing cyberspace exist, but are largely underdeployed...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
The research area in question in this thesis is an analysis of success factors in information sharin...
Cyber security information sharing is increasingly playing an important role in improving the organi...
Information sharing has become a central concern for security agencies since 9/11. Previous research...
International audienceIn this paper, we investigate the role of incentives for Security Information ...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
Abstract. Assured information sharing among different organizations in a coalitional environment is ...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Economic agents make rational cybersecurity investment decisions considering the costs and the benef...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
This article describes three collective intelligence dynamics observed on ThreatFox, a free platform...
Information security embodies the complex interaction between security policies, user perceptions of...
Knowledge sharing plays an important role in the domain of information security, due to its positive...
Technologies and procedures for effectively securing cyberspace exist, but are largely underdeployed...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
The research area in question in this thesis is an analysis of success factors in information sharin...
Cyber security information sharing is increasingly playing an important role in improving the organi...
Information sharing has become a central concern for security agencies since 9/11. Previous research...