Communication, Communication, Communication
In this chapter we analyze how information about threats, vulnerabilities, and risks in cyberspaces are communicated within and between businesses. We identify major problems and barriers in risk communication and consider information sharing failures in detail. We show how behavioral science methodology can help alleviate or even eliminate these problems and barriers.
- 1.Aviram, A., & Tor, A. (2003). Overcoming impediments to information sharing. Alabama Law Review, 55, 231.Google Scholar
- 2.Dressler, J., Bowen, C. L., Moody, W., & Koepke, J. (2014). Operational data classes for establishing situational awareness in cyberspace. In 2014 6th International Conference on Cyber Conflict (CyCon 2014), (pp. 175–186). IEEE.Google Scholar
- 3.Koepke, P. (2017). Cybersecurity information sharing incentives and barriers (MIT, Working Paper CISL# 2017-13). http://web.mit.edu/smadnick/www/wp/2017-13.pdf.
- 4.Kadobayashi, Y. (2010). Cybersecurity information exchange framework. Computer Communication Review, 40(5), 59–64.Google Scholar
- 5.Cooper, P. (2016). Cognitive active cyber defence: Finding value through hacking human nature (MSc dissertation). Cranfield University.Google Scholar
- 6.Kharlamov, A., Jaiswal, A., Parry, G., & Pogrebna, G. (2018a). A cyber domain–specific risk attitudes scale to address security issues in the digital space (British Academy of Management Award-Winning Paper). https://bit.ly/2P9o990.
- 7.Kharlamov, A., Jaiswal, A., Parry, G., & Pogrebna, G. (2018b). Heavy regulation and excessive information about cybersecurity makes people risk taking in cyberspace (Alan Turing Institute Working Paper).Google Scholar