Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl

PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2018 | 54 | nr 1 | 50-57
Tytuł artykułu

A Concept for Ontology-Based Value of Cybersecurity Knowledge

Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper focuses on cybersecurity knowledge, claiming that this knowledge may have a value of its own, and suggests a market mechanism to foster the creation of this kind of value. The goal is to elaborate the value of cybersecurity knowledge and propose a semantic approach with an example model to enable better handling of the relevant body of knowledge and its value. The problem of attributing value to cybersecurity should be perceived as analogous to that in information technology. We have examined the relevant body of knowledge with a focus on its characteristics from the viewpoint of different types of market players and their interests. By applying our model, it is possible to increase the accessibility of knowledge and observe externalities from sharing thereof.(original abstract)
Rocznik
Tom
54
Numer
Strony
50-57
Opis fizyczny
Twórcy
autor
  • Poznan University of Economics, Poland
  • Poznań University of Economics, Poland
  • Poznań University of Economics, Poland
Bibliografia
  • Aviad A.E., Węcel K., Abramowicz W. (2016), A semantic approach to modelling of cybersecurity domain, "Journal of Information Warfare", Vol. 15, No. 1, pp. 91-102. Available at: http://www.jstor.org/stable/10.5325/jinfopoli.1.2011.0001.
  • Akerlof G.A. (1970), The Market for "Lemons": quality Uncertainty and the Market Mechanism, "Quarterly Journal of Economics", Vol. 84, No. 3, pp. 488-500.
  • Aliya Sternstein. (2015), Obama's New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with Agencies, Nextgov. Available at: http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cybercounterterrorism-center/105051/ [Accessed May 22, 2016].
  • Anderson R., Anderson R. (2001), Why Information Security is Hard, Annual Computer Security Applications Conference. Available at: www.cl.cam.ac.uk/~rja14/
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171522405
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.