Vis enkel innførsel

dc.contributor.authorNweke, Livinus Obiora
dc.contributor.authorWolthusen, Stephen
dc.date.accessioned2020-08-25T07:58:57Z
dc.date.available2020-08-25T07:58:57Z
dc.date.created2020-03-02T08:48:34Z
dc.date.issued2020
dc.identifier.issn2325-5366
dc.identifier.urihttps://hdl.handle.net/11250/2673794
dc.description.abstractThe menace of cyber attacks has become a concern for both the public and private sectors. Several approaches have been proposed to tackle the challenge, but an approach that has received widespread acceptance among cyber security professionals in both public and private sectors is cyber threat information (CTI) sharing. CTI refers to any information that can help an organisation identify, assess, monitor and respond to cyber threats. It includes indicators of compromise; tactics, techniques and procedures used by threat actors; suggested actions to detect, contain, or prevent attacks; and the findings from the analyses of incidents. Sharing CTI has been proposed as an efficient and effective way of improving overall cyber intelligence and defence. However, there are sources of liability that may dissuade private entities from participating in such sharing. The most cited source of liability is privacy and data protection law; although antitrust law, tort of negligence law and intellectual property law are also cited as potential sources of liability. In this study, we review the extent to which the provisions of privacy and data protection law support or refute the sharing of CTI. This will provide guidance and incentives for private entities willing to participate in CTI sharing, especially for critical infrastructure protection.en_US
dc.language.isoengen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.titleLegal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protectionen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.source.journalInternational Conference on Cyber Conflict, CYCONen_US
dc.identifier.doi10.23919/CyCon49761.2020.9131721
dc.identifier.cristin1798807
dc.description.localcode© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.fulltextoriginal
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel