Skip to main content

Network Externalities in Cybersecurity Information Sharing Ecosystems

  • Conference paper
  • First Online:
Book cover Economics of Grids, Clouds, Systems, and Services (GECON 2018)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 11113))

Abstract

The utilization of cybersecurity information for improving security posture of an organization resulted in the evolution of cybersecurity information sharing ecosystems. In this study, we consider three stakeholders i.e. cybersecurity solution providers, information providers, and end users, who have different values. Their values depend on interrelationship among them and are also based on several value parameters. We identified six value parameters and analyzed their impacts on the values of stakeholders. A simulation model has been developed using system dynamics to analyze the impact of value parameters on the values of stakeholders. The results show that end users are the main source of value in cybersecurity information sharing ecosystems, implying an effect of demand side economies of scale. The cybersecurity solution and information providers are majorly benefiting from a growing number of end users. The value of end users is mainly affected by quality of services, quality of information and the size of trusted communities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Skopik, F., Settanni, G., Fiedler, R.: A problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 60, 154–176 (2016)

    Article  Google Scholar 

  2. Praditya, D., Janssen, M.: Benefits and challenges in information sharing between the public and private sectors. In: Proceedings of 15th European Conference on eGovernment, Portsmouth. UK (2015)

    Google Scholar 

  3. Robb, D.: Eight Top Threat Intelligence Companies (2017). https://www.esecurityplanet.com/products/top-threat-intelligence-companies.html. Accessed 01 June 2018

  4. Haile, N., Altmann, J.: Value creation in IT service platforms through two-sided network effects. In: Vanmechelen, K., Altmann, J., Rana, O.F. (eds.) GECON 2012. LNCS, vol. 7714, pp. 139–153. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35194-5_11

    Chapter  Google Scholar 

  5. Haile, N., Altmann, J.: Value creation in software service platforms. Future Gener. Comput. Syst. 55, 495–509 (2016)

    Article  Google Scholar 

  6. Sauerwein, C., Sillaber, C., Mussmann, A., Breu, R.: Threat intelligence sharing platforms: an exploratory study of software vendors and research perspectives. In: Proceedings of 13th International Conference on Wirtschaftsinformatik, Switzerland, pp. 837–851 (2017)

    Google Scholar 

  7. Appala, S., Cam-Winget, N., McGrew, D., Verma, J.: An actionable threat intelligence system using a publish-subscribe communications model. In: Proceedings of 2nd Workshop on Information Sharing and Collaborative Security, pp. 61–70. ACM (2015)

    Google Scholar 

  8. Fransen, F., Smulders, A., Kerkdijk, R.: Cyber security information exchange to gain insight into the effects of cyber threats and incidents. e & i Elektrotechnik und Informationstechnik 132(2), 106–112 (2015)

    Article  Google Scholar 

  9. Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Data quality challenges and future research directions in threat intelligence sharing practice. In: Proceedings of 2016 Workshop on Information Sharing and Collaborative Security, pp. 65–70. ACM (2016)

    Google Scholar 

  10. Brown, S., Gommers, J., Serrano, O.: From cyber security information sharing to threat management. In: Proceedings of 2nd Workshop on Information Sharing and Collaborative Security, pp. 43–49. ACM (2015)

    Google Scholar 

  11. Katz, M.L., Shapiro, C.: Technology adoption in the presence of network externalities. J. Polit. Econ. 94(4), 822–841 (1986)

    Article  Google Scholar 

  12. Wagner, C., Dulaunoy, A., Wagener, G., Iklody, A.: Misp: the design and implementation of a collaborative threat intelligence sharing platform. In: Proceedings of 2016 Workshop on Information Sharing and Collaborative Security, pp. 49–56. ACM (2016)

    Google Scholar 

  13. ThreatConnect: https://www.threatconnect.com/tag/community/. Accessed 15 June 2018

  14. Katz, M.L., Shapiro, C.: Network externalities, competition, and compatibility. Am. Econ. Rev. 75(3), 424–440 (1985)

    Google Scholar 

  15. Demirkan, H., Kauffman, R.J., Vayghan, J.A., Fill, H.G., Karagiannis, D., Maglio, P.P.: Service-oriented technology and management: perspectives on research and practice for the coming decade. Electron. Commer. Res. Appl. 7(4), 356–376 (2008)

    Article  Google Scholar 

  16. Rysman, M.: The economics of two-sided markets. J. Econ. Perspect. 23(3), 125–143 (2009)

    Article  Google Scholar 

  17. Rochet, J.C., Tirole, J.: Two-sided markets: a progress report. RAND J. Econ. 37(3), 645–667 (2006)

    Article  Google Scholar 

  18. Goodwin, C., Nicholas, J.P.: A framework for cybersecurity information sharing and risk reduction. Technical Report, Microsoft (2015)

    Google Scholar 

  19. Ventana Systems: Vensim Software Windows Version 7.2 a (2015). http://vensim.com/ Accessed 01 Apr 2018

  20. Soto-Acosta, P., MeroñO-Cerdan, A.L.: Analyzing e-business value creation from a resource-based perspective. Int. J. Inf. Manage. 28(1), 49–60 (2008)

    Article  Google Scholar 

  21. Dey, D., Lahiri, A., Zhang, G.: Quality competition and market segmentation in the security software market. Mis Q. 38(2) (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zahid Rashid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rashid, Z., Noor, U., Altmann, J. (2019). Network Externalities in Cybersecurity Information Sharing Ecosystems. In: Coppola, M., Carlini, E., D’Agostino, D., Altmann, J., Bañares, J. (eds) Economics of Grids, Clouds, Systems, and Services. GECON 2018. Lecture Notes in Computer Science(), vol 11113. Springer, Cham. https://doi.org/10.1007/978-3-030-13342-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-13342-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-13341-2

  • Online ISBN: 978-3-030-13342-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics