Cooperation and Free Riding in Cyber Security Information-Sharing Programs
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 324 |
---|---|
container_issue | |
container_start_page | 309 |
container_title | |
container_volume | |
creator | Silva, Austin Aamir, Munaf Naugle, Asmeret |
description | Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information. |
doi_str_mv | 10.4018/978-1-5225-5634-3.ch018 |
format | Book Chapter |
fullrecord | <record><control><sourceid>gale_igi_b</sourceid><recordid>TN_cdi_igi_books_10_4018_978-1-5225-5634-3_ch018</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>CX7570000027</galeid><sourcerecordid>CX7570000027</sourcerecordid><originalsourceid>FETCH-LOGICAL-g130t-622b1e83aaaafc33b898da8fa8f182ff604e481e9dcb47151afaf6e4b9ede10a3</originalsourceid><addsrcrecordid>eNplkM1OwzAQhI0QElD6AlzwC7isf5I4RxRRWlQJROFsOck6NbQxcgJS356khROjlVY7mtnDR8gNh5kCrm_zTDPOEiESlqRSMTmrNoN_Qi75aA5eok7JdIj93Uqek2nXvQMAz0UKKVyQxyKET4y296Gltq3pPCLSF1_7tqG-pcW-xEjXWH1F3-_psnUh7g5ptt7YOKaeY2ii3XVX5MzZbYfT3z0hb_P712LBVk8Py-JuxRouoWepECVHLe0gV0lZ6lzXVrthuBbOpaBQaY55XZUq4wm3zroUVZljjRysnBA4_vWNN2UIH53hYEYm5h8Tc2AyVK6PlcZu0XzHrcmSDEaJTP4AdqVcVA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>Cooperation and Free Riding in Cyber Security Information-Sharing Programs</title><source>Alma/SFX Local Collection</source><creator>Silva, Austin ; Aamir, Munaf ; Naugle, Asmeret</creator><creatorcontrib>Silva, Austin ; Aamir, Munaf ; Naugle, Asmeret</creatorcontrib><description>Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.</description><identifier>ISBN: 9781522556343</identifier><identifier>ISBN: 1522556346</identifier><identifier>EISBN: 1522556354</identifier><identifier>EISBN: 9781522556350</identifier><identifier>DOI: 10.4018/978-1-5225-5634-3.ch018</identifier><language>eng</language><publisher>IGI Global</publisher><subject>Computer Engineering ; Cyber and Network Security ; LCSH: Internet ; Prevention ; Security & Forensics ; Security measures. | Computer crimes</subject><ispartof>Cyber Security and Threats : Methodologies, Tools, and Applications, 2018, p.309-324</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://www.igi-global.com/Images/Covers/9781522556343.png</thumbnail><link.rule.ids>127,146,779,780,784,793,25344,27916</link.rule.ids></links><search><creatorcontrib>Silva, Austin</creatorcontrib><creatorcontrib>Aamir, Munaf</creatorcontrib><creatorcontrib>Naugle, Asmeret</creatorcontrib><title>Cooperation and Free Riding in Cyber Security Information-Sharing Programs</title><title>Cyber Security and Threats : Methodologies, Tools, and Applications</title><description>Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.</description><subject>Computer Engineering</subject><subject>Cyber and Network Security</subject><subject>LCSH: Internet</subject><subject>Prevention</subject><subject>Security & Forensics</subject><subject>Security measures. | Computer crimes</subject><isbn>9781522556343</isbn><isbn>1522556346</isbn><isbn>1522556354</isbn><isbn>9781522556350</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2018</creationdate><recordtype>book_chapter</recordtype><sourceid/><recordid>eNplkM1OwzAQhI0QElD6AlzwC7isf5I4RxRRWlQJROFsOck6NbQxcgJS356khROjlVY7mtnDR8gNh5kCrm_zTDPOEiESlqRSMTmrNoN_Qi75aA5eok7JdIj93Uqek2nXvQMAz0UKKVyQxyKET4y296Gltq3pPCLSF1_7tqG-pcW-xEjXWH1F3-_psnUh7g5ptt7YOKaeY2ii3XVX5MzZbYfT3z0hb_P712LBVk8Py-JuxRouoWepECVHLe0gV0lZ6lzXVrthuBbOpaBQaY55XZUq4wm3zroUVZljjRysnBA4_vWNN2UIH53hYEYm5h8Tc2AyVK6PlcZu0XzHrcmSDEaJTP4AdqVcVA</recordid><startdate>2018</startdate><enddate>2018</enddate><creator>Silva, Austin</creator><creator>Aamir, Munaf</creator><creator>Naugle, Asmeret</creator><general>IGI Global</general><scope/></search><sort><creationdate>2018</creationdate><title>Cooperation and Free Riding in Cyber Security Information-Sharing Programs</title><author>Silva, Austin ; Aamir, Munaf ; Naugle, Asmeret</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g130t-622b1e83aaaafc33b898da8fa8f182ff604e481e9dcb47151afaf6e4b9ede10a3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Engineering</topic><topic>Cyber and Network Security</topic><topic>LCSH: Internet</topic><topic>Prevention</topic><topic>Security & Forensics</topic><topic>Security measures. | Computer crimes</topic><toplevel>online_resources</toplevel><creatorcontrib>Silva, Austin</creatorcontrib><creatorcontrib>Aamir, Munaf</creatorcontrib><creatorcontrib>Naugle, Asmeret</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Silva, Austin</au><au>Aamir, Munaf</au><au>Naugle, Asmeret</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Cooperation and Free Riding in Cyber Security Information-Sharing Programs</atitle><btitle>Cyber Security and Threats : Methodologies, Tools, and Applications</btitle><date>2018</date><risdate>2018</risdate><spage>309</spage><epage>324</epage><pages>309-324</pages><isbn>9781522556343</isbn><isbn>1522556346</isbn><eisbn>1522556354</eisbn><eisbn>9781522556350</eisbn><abstract>Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.</abstract><pub>IGI Global</pub><doi>10.4018/978-1-5225-5634-3.ch018</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext |
identifier | ISBN: 9781522556343 |
ispartof | Cyber Security and Threats : Methodologies, Tools, and Applications, 2018, p.309-324 |
issn | |
language | eng |
recordid | cdi_igi_books_10_4018_978-1-5225-5634-3_ch018 |
source | Alma/SFX Local Collection |
subjects | Computer Engineering Cyber and Network Security LCSH: Internet Prevention Security & Forensics Security measures. | Computer crimes |
title | Cooperation and Free Riding in Cyber Security Information-Sharing Programs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T21%3A35%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_igi_b&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Cooperation%20and%20Free%20Riding%20in%20Cyber%20Security%20Information-Sharing%20Programs&rft.btitle=Cyber%20Security%20and%20Threats%20:%20Methodologies,%20Tools,%20and%20Applications&rft.au=Silva,%20Austin&rft.date=2018&rft.spage=309&rft.epage=324&rft.pages=309-324&rft.isbn=9781522556343&rft.isbn_list=1522556346&rft_id=info:doi/10.4018/978-1-5225-5634-3.ch018&rft_dat=%3Cgale_igi_b%3ECX7570000027%3C/gale_igi_b%3E%3Curl%3E%3C/url%3E&rft.eisbn=1522556354&rft.eisbn_list=9781522556350&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_galeid=CX7570000027&rfr_iscdi=true |