Current cybersecurity policy emphasizes increasing the sharing of threat and vulnerability information. Legal reform is seen as crucial to enabling this exchange, both within the public and private sectors and between them. Information sharing is due for some skepticism though, and this Essay (part of a symposium entitled Privacy in a Data Collection Society) attempts to provide it. Not only are there few real legal barriers to data exchange, but greater sharing will generate little benefit and will create significant privacy risks. This Essay creates a typography of vertical and horizontal information sharing, and argues that while top-down communication could be useful, it faces important practical impediments. The present focus on s...
Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in w...
Data sharing presents many opportunities in terms of stimulating innovation and creating a level pla...
The literature on cyber security information sharing enumerates an extensive list of potential benef...
Current cybersecurity policy emphasizes increasing the sharing of threat and vulnerability informati...
While considerable debate exists with regard to the best strategies for protecting America’s various...
As cybercriminals scale up their operations to increase their profits or inflict greater harm, we ar...
This article focuses on the importance of information sharing practices for capacity building compet...
For many years the importance of sharing information on cybersecurity risks, vulnerabilities, and in...
Information sharing has become a central concern for security agencies since 9/11. Previous research...
There is an increased recognition of the importance of information sharing within cyber security. Ne...
The menace of cyber attacks has become a concern for both the public and private sectors. Several ap...
The failure of a national critical infrastructure may seriously impact the health and well-being of ...
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
Cross-organizational sharing of network traffics data has the potential to provide researchers and n...
This paper revisits the Doctrine of Public Cybersecurity in order to shed light on debates about inf...
Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in w...
Data sharing presents many opportunities in terms of stimulating innovation and creating a level pla...
The literature on cyber security information sharing enumerates an extensive list of potential benef...
Current cybersecurity policy emphasizes increasing the sharing of threat and vulnerability informati...
While considerable debate exists with regard to the best strategies for protecting America’s various...
As cybercriminals scale up their operations to increase their profits or inflict greater harm, we ar...
This article focuses on the importance of information sharing practices for capacity building compet...
For many years the importance of sharing information on cybersecurity risks, vulnerabilities, and in...
Information sharing has become a central concern for security agencies since 9/11. Previous research...
There is an increased recognition of the importance of information sharing within cyber security. Ne...
The menace of cyber attacks has become a concern for both the public and private sectors. Several ap...
The failure of a national critical infrastructure may seriously impact the health and well-being of ...
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
Cross-organizational sharing of network traffics data has the potential to provide researchers and n...
This paper revisits the Doctrine of Public Cybersecurity in order to shed light on debates about inf...
Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in w...
Data sharing presents many opportunities in terms of stimulating innovation and creating a level pla...
The literature on cyber security information sharing enumerates an extensive list of potential benef...