Have a personal or library account? Click to login
A Concept for Ontology-Based Value of Cybersecurity Knowledge Cover

A Concept for Ontology-Based Value of Cybersecurity Knowledge

Open Access
|Mar 2018

References

  1. Aviad, A.E., Węcel, K., Abramowicz, W. (2016), A semantic approach to modelling of cybersecurity domain, Journal of Information Warfare Vol. 15, No. 1, pp. 91-102. Available at: http://www.jstor.org/stable/10.5325/jinfopoli.1.2011.0001.
  2. Akerlof, G.A. (1970), The Market for “Lemons”: quality Uncertainty and the Market Mechanism, Quarterly Journal of Economics Vol. 84, No. 3, pp. 488-500.
  3. Aliya Sternstein. (2015), Obama’s New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with Agencies Nextgov Available at: http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cyber-counterterrorism-center/105051/ [Accessed May 22, 2016].
  4. Anderson, R., Anderson, R. (2001), Why Information Security is Hard, Annual Computer Security Applications Conference Available at: www.cl.cam.ac.uk/~rja14/#Econ.
  5. Barney, J. (1991), Firm resources and sustained competitive advantage, Journal of Management Vol. 17, No. 1, pp. 99-120. Available at: http://jom.sagepub.com/cgi/doi/10.1177/014920639101700108.
  6. Barnum, S. (2014), STIX Whitepaper. Available at: http://stixproject.github.io/getting-started/whitepaper [Accessed December 23, 2015].
  7. Ben Aissa, A., Abercrombie, R.K., Sheldon, F.T., Mili, A. (2010), Quantifying security threats and their potential impacts: a case study, Innovations in Systems and Software Engineering Vol. 6, No. 4, pp. 269-281.
  8. Berners-lee, T.I.M., Hendler, J., Lassila, O.R.A. (2001), The Semantic Web, Scientific American Vol. 284(May), pp. 1-4. Available at: http://www.nature.com/doifinder/10.1038/scientificamerican0501-34.
  9. Böhme, R. (2005), Vulnerability markets what is the economic value of a zero-day exploit? In Chaos Communication Congress (December), pp. 27-30. Available at: https://events.ccc.de/congress/2005/fahrplan/attachments/542-Boehme2005_22C3_VulnerabilityMarkets.pdf.
  10. David, P.A. (1990), The Dynamo and the Computer: an Historical Perspective on the Modern Productivity Paradox, American Economic Review
  11. Gordon, L., Loeb, M.P., Sohail, T. (2003), A Framework for using insurance for cyber-risk management, Communications of the ACM Vol. 46, No. 3, pp. 81-85.
  12. Hardin, J.G. (2006), The tragedy of the commons, Environmental Issues: Essential Primary Sources Vol. 162, December, pp. 64-68. Available at: http://find.galegroup.com/gic/infomark.do?&source=gale&idigest=0f0174f8fbc32fe7c817214d754d9f0e&prodId=GIC&userGroupName=c_gic&tabID=T0011&docId=CX3456400036&type=retrieve&contentSet=EBKS&version=1.0.
  13. Kramer, M.R., Pfitzer, M.W. (2016), The ecosystem of shared value, Harvard Business Review October, pp. 1-11. Available at: http://www.fsg.org/publications/ecosystem-shared-value?utm_source=fsg&utm_medium=email&utm_campaign=201609ecosystemofsharedvalue#download-area.
  14. Lusch, R.F. (2006), Service-dominant logic: reactions, reflections and refinements, Marketing Theory Vol. 6, No. 3, pp. 281-288.
  15. Magnusson, C., Molvidsson, J., Zetterqvist, S. (2007), Value creation and return on security investments (ROSI), IFIP International Federation for Information Processing Vol. 232, pp. 25-35.
  16. Miller, C. (2007), The Legitimate Vulnerability Market Inside the Secretive World of 0-day Exploit Sales. In Workshop on the Economics of Information Security, Pittsburgh, PA pp. 1-10. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.5718.
  17. Moitra, S. D., & Konda, S. L. (2000). A simulation model for managing survivability of networked information systems (No. CMU/SEI-2000-TR-021). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.
  18. Permanent Select Committee on Intelligence. (2012), Cyber Intelligence Sharing and Protection Act Report together with Minority Views to Accompany H.R. 3523 Available at: http://www.gpo.gov/fdsys/pkg/CRPT-112hrpt445/pdf/CRPT-112hrpt445.pdf.
  19. Porter, M.E., Kramer, M.R. (2006), Strategy & society, Harvard Business Review 84, December, pp. 78-92.
  20. Porter, M.E., Kramer, M.R. (2011), Creating shared value, Harvard Business Review Vol. 89, No. 1-2.
  21. Shadbolt, N., Berners-Lee, T., Hall, W. (2006), The semantic web revisited, IEEE Intelligent Systems Vol. 21, No. 3, pp. 96-101. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1637364.
  22. Shapiro, C., Varian, H. R., Becker, W. E. (1999). Information rules: a strategic guide to the network economy Journal of Economic Education, 30, 189-190.
  23. Soo Hoo, K., Sudbury, A.W., Jaquith, A.R. (2001), Tangible ROI through secure software engineering, Secure Business Quarterly Vol. 1, No. 2.
  24. The White House & Secretary, Office of the Press. (2015), Cyber Threat Intelligence Integration Center. Available at: https:// www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center [Accessed May 19, 2016].
  25. W3C. (n.d.), What is the Semantic Web. W3C Semantic Web Activity Available at: http://www.w3.org/2001/sw/[AccessedAugust 16, 2015].
  26. Wei, H., Frinke, D., Carter, O., Ritter, C. (2001), Cost-benefit analysis for network intrusion detection systems. In CSI 28th Annual Computer Security Conference pp. 29-31.
DOI: https://doi.org/10.2478/ijme-2018-0005 | Journal eISSN: 2543-5361 | Journal ISSN: 2299-9701
Language: English
Page range: 50 - 57
Submitted on: Jun 9, 2016
Accepted on: Feb 3, 2018
Published on: Mar 29, 2018
Published by: Warsaw School of Economics
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2018 Adiel Aviad, Krzysztof Węcel, Witold Abramowicz, published by Warsaw School of Economics
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.