In this paper, we investigate the role of incentives for Security Information Sharing (SIS) between human agents working in institutions. We present an incentive-based SIS system model that is empirically tested with an exclusive dataset. The data was collected with an online questionnaire addressed to all participants of a deployed Information Sharing and Analysis Center (ISAC) that operates in the context of critical infrastructure protection (N=262). SIS is measured with a multidimensional approach (intensity, frequency) and regressed on five specific predicators (reciprocity, value of information, institutional barriers, reputation, trust) that are measured with psychometric scales. We close an important research gap by providing, to th...
It has been repeatedly pointed out that security problems in multi-agent systems are a manifestation...
This article describes three collective intelligence dynamics observed on ThreatFox, a free platform...
A key challenge for researchers has been to affect change in user security behavior in organizations...
In this paper, we investigate the role of incentives for Security Information Sharing (SIS) between ...
Security information sharing (SIS) is an activity whereby individuals exchange information that is r...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Abstract. Assured information sharing among different organizations in a coalitional environment is ...
Technologies and procedures for effectively securing cyberspace exist, but are largely underdeployed...
Economic agents make rational cybersecurity investment decisions considering the costs and the benef...
Information security embodies the complex interaction between security policies, user perceptions of...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
Cybersecurity intelligence sharing (CIS) has gained significance as an organizational function to pr...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
The aim of the thesis is to investigate the relationship between human behaviour and effective secur...
It has been repeatedly pointed out that security problems in multi-agent systems are a manifestation...
This article describes three collective intelligence dynamics observed on ThreatFox, a free platform...
A key challenge for researchers has been to affect change in user security behavior in organizations...
In this paper, we investigate the role of incentives for Security Information Sharing (SIS) between ...
Security information sharing (SIS) is an activity whereby individuals exchange information that is r...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Abstract. Assured information sharing among different organizations in a coalitional environment is ...
Technologies and procedures for effectively securing cyberspace exist, but are largely underdeployed...
Economic agents make rational cybersecurity investment decisions considering the costs and the benef...
Information security embodies the complex interaction between security policies, user perceptions of...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
Cybersecurity intelligence sharing (CIS) has gained significance as an organizational function to pr...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
The aim of the thesis is to investigate the relationship between human behaviour and effective secur...
It has been repeatedly pointed out that security problems in multi-agent systems are a manifestation...
This article describes three collective intelligence dynamics observed on ThreatFox, a free platform...
A key challenge for researchers has been to affect change in user security behavior in organizations...