Abstract

ABSTRACT This research employs an analytical modelling approach, complemented by empirical analysis, to delve into enterprise cybersecurity information sharing strategies. Utilising a thorough cost-based analysis, we scrutinise the cybersecurity costs and security levels within enterprises, leading to the identification of three core cybersecurity strategies – risk acceptance, risk balance, and risk reduction. Additionally, we delineate four distinct information-sharing strategies: selective, balanced, extensive, and futile sharing. Supported by empirical evidence gathered from a cybersecurity forum, this investigation not only enriches scholarly discussions but also provides valuable insights. Its academic significance is accentuated by offering nuanced guidance for practitioners, facilitating the implementation of effective cybersecurity information-sharing practices.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.