E-viri
Recenzirano
Odprti dostop
-
Rashid, Zahid; Noor, Umara; Altmann, Jörn
Future generation computer systems, November 2021, 2021-11-00, Letnik: 124Journal Article
Based on a comprehensive literature survey, the constructs of the cybersecurity information sharing ecosystem have been defined in detail. Using this ecosystem, the interrelationships among the stakeholders with respect to cybersecurity information sharing are analyzed, the value parameters are determined, the value functions are defined, and the values obtained by the stakeholders through simulation are calculated. Furthermore, it is investigated whether the stakeholders involved in this ecosystem can create sufficient value to sustain in the market. The outcome of this research includes an economic model for evaluating the value creation and distribution among the stakeholders. This model is a critical step forward to better align the values (i.e., utilities and profits) of stakeholders. The simulation results of the model show that end users are the main source of value generation. Cybersecurity solution providers and cybersecurity information providers get benefits from a growing installed base of end users. However, in saturated markets, there is a risk of un-sustainability of the ecosystem, as the cost of cybersecurity solutions and cybersecurity information cannot be recovered through their fees. The simulation model and the findings of this study can help business managers to make better decisions related to business strategies, sustainability, and pricing schemes for cybersecurity solution and cybersecurity information. Moreover, a working cybersecurity information sharing ecosystem is essential for the adoption of cloud computing and, especially, edge computing. It allows capturing, disseminating, and aggregating cybersecurity information from a large number of computing devices and computing providers reliably and accurately. •Cybersecurity information sharing ecosystem was defined based on literature survey.•Distribution of value from cybersecurity information sharing was analyzed.•Simulation results specified the conditions for the sustainability of the ecosystem.•Discrepancy between information sharing and business sustainability was identified.•Security information sharing is needed for wide adoption of cloud and edge computing.
![loading ... loading ...](themes/default/img/ajax-loading.gif)
Vnos na polico
Trajna povezava
- URL:
Faktor vpliva
Dostop do baze podatkov JCR je dovoljen samo uporabnikom iz Slovenije. Vaš trenutni IP-naslov ni na seznamu dovoljenih za dostop, zato je potrebna avtentikacija z ustreznim računom AAI.
Leto | Faktor vpliva | Izdaja | Kategorija | Razvrstitev | ||||
---|---|---|---|---|---|---|---|---|
JCR | SNIP | JCR | SNIP | JCR | SNIP | JCR | SNIP |
Baze podatkov, v katerih je revija indeksirana
Ime baze podatkov | Področje | Leto |
---|
Povezave do osebnih bibliografij avtorjev | Povezave do podatkov o raziskovalcih v sistemu SICRIS |
---|
Vir: Osebne bibliografije
in: SICRIS
To gradivo vam je dostopno v celotnem besedilu. Če kljub temu želite naročiti gradivo, kliknite gumb Nadaljuj.