Abstract
Cyber security and threat information sharing efforts involve a variety of groups of practicioners and stakeholders. This paper presents a methodology for analyzing information sharing efforts, to determine whether and how well the efforts will succeed. An effort to share information between two groups is represented by a directed graph. Each edge is characterized in terms of the detail of shared information products and the diversity of the work practices of the two groups. The result is mapped onto a Diversity/Detail tradespace, in which successful and unsuccessful efforts can be situated. The framework can be applied to sharing of information security and cyber threat information across different groups, to aid in determining what types of information products could usefully be shared.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have