Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms
Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms
dc.contributor.author | Sauerwein, Clemens | |
dc.contributor.author | Wenzl, Christina | |
dc.contributor.author | Breu, Ruth | |
dc.date.accessioned | 2023-12-26T18:37:47Z | |
dc.date.available | 2023-12-26T18:37:47Z | |
dc.date.issued | 2024-01-03 | |
dc.identifier.isbn | 978-0-9981331-7-1 | |
dc.identifier.other | d9fdf517-452e-4e25-abd9-a8abda75e8a5 | |
dc.identifier.uri | https://hdl.handle.net/10125/106619 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 57th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Cybersecurity and Privacy in Government | |
dc.subject | critical resources | |
dc.subject | influencing factors | |
dc.subject | systematic literature review | |
dc.subject | threat intelligence sharing | |
dc.title | Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms | |
dc.type | Conference Paper | |
dc.type.dcmi | Text | |
dcterms.abstract | Threat intelligence sharing is an effective security control to develop situational awareness of the rapidly growing number of new, increasingly sophisticated and targeted cyber threats. This collaborative practice involves the sharing of valuable data, information and knowledge about emerging threats, vulnerabilities and attack patterns between organisations and authorities to strengthen overall security. Although this is a promising solution, there has been limited research focused on understanding the critical resources and factors that influence the use of threat intelligence sharing platforms. To address this research gap, we conducted a systematic literature review by analysing 34 papers. In doing so, we identified 9 benefits and 14 challenges regarding the use of threat intelligence sharing platforms. Based on them we derived three critical resources and four influential factors on the use of threat intelligence sharing and discussed their relationships. | |
dcterms.extent | 10 pages | |
prism.startingpage | 1921 |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 0188.pdf
- Size:
- 528.09 KB
- Format:
- Adobe Portable Document Format
- Description: