Abstract

ABSTRACT This research employs an analytical modelling approach, complemented by empirical analysis, to delve into enterprise cybersecurity information sharing strategies. Utilising a thorough cost-based analysis, we scrutinise the cybersecurity costs and security levels within enterprises, leading to the identification of three core cybersecurity strategies – risk acceptance, risk balance, and risk reduction. Additionally, we delineate four distinct information-sharing strategies: selective, balanced, extensive, and futile sharing. Supported by empirical evidence gathered from a cybersecurity forum, this investigation not only enriches scholarly discussions but also provides valuable insights. Its academic significance is accentuated by offering nuanced guidance for practitioners, facilitating the implementation of effective cybersecurity information-sharing practices.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call