BazEkon - Biblioteka Główna Uniwersytetu Ekonomicznego w Krakowie

BazEkon home page

Meny główne

Autor
Aviad Adiel (Poznan University of Economics, Poland), Węcel Krzysztof (Poznań University of Economics, Poland), Abramowicz Witold (Poznań University of Economics, Poland)
Tytuł
A Concept for Ontology-Based Value of Cybersecurity Knowledge
Źródło
International Journal of Management and Economics, 2018, vol. 54, nr 1, s. 50-57, bibliogr. 26 poz.
Zeszyty Naukowe / Szkoła Główna Handlowa. Kolegium Gospodarki Światowej
Słowa kluczowe
Sieć semantyczna, Technologie informacyjne i telekomunikacyjne, Cyberbezpieczeństwo
Semantic Web Service (SWS), Information and Communication Technology (ICT), Cybersecurity
Uwagi
Klasyfikacja JEL: D46, D62, D89
summ.
Abstrakt
This paper focuses on cybersecurity knowledge, claiming that this knowledge may have a value of its own, and suggests a market mechanism to foster the creation of this kind of value. The goal is to elaborate the value of cybersecurity knowledge and propose a semantic approach with an example model to enable better handling of the relevant body of knowledge and its value. The problem of attributing value to cybersecurity should be perceived as analogous to that in information technology. We have examined the relevant body of knowledge with a focus on its characteristics from the viewpoint of different types of market players and their interests. By applying our model, it is possible to increase the accessibility of knowledge and observe externalities from sharing thereof.(original abstract)
Dostępne w
Biblioteka SGH im. Profesora Andrzeja Grodka
Pełny tekst
Pokaż
Bibliografia
Pokaż
  1. Aviad A.E., Węcel K., Abramowicz W. (2016), A semantic approach to modelling of cybersecurity domain, "Journal of Information Warfare", Vol. 15, No. 1, pp. 91-102. Available at: http://www.jstor.org/stable/10.5325/jinfopoli.1.2011.0001.
  2. Akerlof G.A. (1970), The Market for "Lemons": quality Uncertainty and the Market Mechanism, "Quarterly Journal of Economics", Vol. 84, No. 3, pp. 488-500.
  3. Aliya Sternstein. (2015), Obama's New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with Agencies, Nextgov. Available at: http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cybercounterterrorism-center/105051/ [Accessed May 22, 2016].
  4. Anderson R., Anderson R. (2001), Why Information Security is Hard, Annual Computer Security Applications Conference. Available at: www.cl.cam.ac.uk/~rja14/#Econ.
  5. Barney J. (1991), Firm resources and sustained competitive advantage, "Journal of Management", Vol. 17, No. 1, pp. 99-120. Available at: http://jom.sagepub.com/cgi/doi/10.1177/014920639101700108.
  6. Barnum S. (2014), STIX Whitepaper. Available at: http://stixproject.github.io/getting-started/whitepaper [Accessed December 23, 2015].
  7. Ben Aissa A., Abercrombie R.K., Sheldon F.T., Mili A. (2010), Quantifying security threats and their potential impacts: a case study, "Innovations in Systems and Software Engineering", Vol. 6, No. 4, pp. 269-281.
  8. Berners-lee T.I.M., Hendler J., Lassila O.R.A. (2001), The Semantic Web, Scientific American, Vol. 284(May), pp. 1-4. Available at: http://www.nature.com/doifinder/10.1038/scientificamerican0501-34.
  9. Böhme R. (2005), Vulnerability markets what is the economic value of a zero-day exploit? In Chaos Communication Congress, (December), pp. 27-30. Available at: https://events.ccc.de/congress/2005/fahrplan/attachments/542- Boehme2005_22C3_VulnerabilityMarkets.pdf.
  10. David P.A. (1990), The Dynamo and the Computer: an Historical Perspective on the Modern Productivity Paradox, "American Economic Review".
  11. Gordon L., Loeb M.P., Sohail T. (2003), A Framework for using insurance for cyber-risk management, "Communications of the ACM", Vol. 46, No. 3, pp. 81-85.
  12. Hardin J.G. (2006), The tragedy of the commons, Environmental Issues: Essential Primary Sources, Vol. 162, December, pp. 64-68. Available at: http://find.galegroup.com/gic/infomark.do?&source=gale&idigest=0f0174f8fbc32fe7c817214d75 4d9f0e&prodId=GIC&userGroupName=c_gic&tabID=T0011&docId=CX3456400036&type=retrieve&contentSet=EBKS&version=1.0.
  13. Kramer M.R., Pfitzer M.W. (2016), The ecosystem of shared value, "Harvard Business Review", October, pp. 1-11. Available at: http://www.fsg.org/publications/ecosystem-shared-value?utm_source=fsg&utm_medium=email&utm_campaign=2016 09ecosystemofsharedvalue#download-area.
  14. Lusch R.F. (2006), Service-dominant logic: reactions, reflections and refinements, "Marketing Theory", Vol. 6, No. 3, pp. 281-288.
  15. Magnusson, C., Molvidsson, J., Zetterqvist, S. (2007), Value creation and return on security investments (ROSI), "IFIP International Federation for Information Processing", Vol. 232, pp. 25-35.
  16. Miller C. (2007), The Legitimate Vulnerability Market Inside the Secretive World of 0-day Exploit Sales. In Workshop on the Economics of Information Security, Pittsburgh, PA. pp. 1-10. Available at: http://citeseerx.ist.psu.edu/viewdoc/ summary?doi=10.1.1.139.5718.
  17. Moitra S. D., & Konda S. L. (2000). A simulation model for managing survivability of networked information systems (No. CMU/SEI-2000-TR-021). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.
  18. Permanent Select Committee on Intelligence. (2012), Cyber Intelligence Sharing and Protection Act Report together with Minority Views to Accompany H.R. 3523, Available at: http://www.gpo.gov/fdsys/pkg/CRPT-112hrpt445/pdf/CRPT-112hrpt445.pdf.
  19. Porter M.E., Kramer M.R. (2006), Strategy & society, "Harvard Business Review", 84, December, pp. 78-92.
  20. Porter, M.E., Kramer, M.R. (2011), Creating shared value, Harvard Business Review, Vol. 89, No. 1-2.
  21. Shadbolt N., Berners-Lee T., Hall W. (2006), The semantic web revisited, "IEEE Intelligent Systems", Vol. 21, No. 3, pp. 96-101. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1637364.
  22. Shapiro C., Varian H. R., Becker W. E. (1999). Information rules: a strategic guide to the network economy. "Journal of Economic Education", 30, 189-190.
  23. Soo Hoo K., Sudbury A.W., Jaquith A.R. (2001), Tangible ROI through secure software engineering, "Secure Business Quarterly", Vol. 1, No. 2.
  24. The White House & Secretary, Office of the Press. (2015), Cyber Threat Intelligence Integration Center. Available at: https:// www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center [Accessed May 19,2016].
  25. W3C. (n.d.), What is the Semantic Web. W3C Semantic Web Activity. Available at: http://www.w3.org/2001/sw/[Accessed August 16, 2015].
  26. Wei H., Frinke D., Carter O., Ritter C. (2001), Cost-benefit analysis for network intrusion detection systems. In CSI 28th Annual Computer Security Conference. pp. 29-31.
Cytowane przez
Pokaż
ISSN
2299-9701
Język
eng
Udostępnij na Facebooku Udostępnij na Twitterze Udostępnij na Google+ Udostępnij na Pinterest Udostępnij na LinkedIn Wyślij znajomemu