Skip to main content

Communication, Communication, Communication

  • Chapter
  • First Online:
Navigating New Cyber Risks
  • 947 Accesses

Abstract

In this chapter we analyze how information about threats, vulnerabilities, and risks in cyberspaces are communicated within and between businesses. We identify major problems and barriers in risk communication and consider information sharing failures in detail. We show how behavioral science methodology can help alleviate or even eliminate these problems and barriers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 37.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See https://www.darkreading.com/endpoint/91--of-cyberattacks-start-with-a-phishing-email/d/d-id/1327704 for more detail.

References

  1. Aviram, A., & Tor, A. (2003). Overcoming impediments to information sharing. Alabama Law Review, 55, 231.

    Google Scholar 

  2. Dressler, J., Bowen, C. L., Moody, W., & Koepke, J. (2014). Operational data classes for establishing situational awareness in cyberspace. In 2014 6th International Conference on Cyber Conflict (CyCon 2014), (pp. 175–186). IEEE.

    Google Scholar 

  3. Koepke, P. (2017). Cybersecurity information sharing incentives and barriers (MIT, Working Paper CISL# 2017-13). http://web.mit.edu/smadnick/www/wp/2017-13.pdf.

  4. Kadobayashi, Y. (2010). Cybersecurity information exchange framework. Computer Communication Review, 40(5), 59–64.

    Google Scholar 

  5. Cooper, P. (2016). Cognitive active cyber defence: Finding value through hacking human nature (MSc dissertation). Cranfield University.

    Google Scholar 

  6. Kharlamov, A., Jaiswal, A., Parry, G., & Pogrebna, G. (2018a). A cyber domain–specific risk attitudes scale to address security issues in the digital space (British Academy of Management Award-Winning Paper). https://bit.ly/2P9o990.

  7. Kharlamov, A., Jaiswal, A., Parry, G., & Pogrebna, G. (2018b). Heavy regulation and excessive information about cybersecurity makes people risk taking in cyberspace (Alan Turing Institute Working Paper).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ganna Pogrebna .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pogrebna, G., Skilton, M. (2019). Communication, Communication, Communication. In: Navigating New Cyber Risks. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-13527-0_7

Download citation

Publish with us

Policies and ethics