Cooperation and Free Riding in Cyber Security Information-Sharing Programs

Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Silva, Austin, Aamir, Munaf, Naugle, Asmeret
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 324
container_issue
container_start_page 309
container_title
container_volume
creator Silva, Austin
Aamir, Munaf
Naugle, Asmeret
description Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information. Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
doi_str_mv 10.4018/978-1-5225-5634-3.ch018
format Book Chapter
fullrecord <record><control><sourceid>gale_igi_b</sourceid><recordid>TN_cdi_igi_books_10_4018_978-1-5225-5634-3_ch018</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>CX7570000027</galeid><sourcerecordid>CX7570000027</sourcerecordid><originalsourceid>FETCH-LOGICAL-g130t-622b1e83aaaafc33b898da8fa8f182ff604e481e9dcb47151afaf6e4b9ede10a3</originalsourceid><addsrcrecordid>eNplkM1OwzAQhI0QElD6AlzwC7isf5I4RxRRWlQJROFsOck6NbQxcgJS356khROjlVY7mtnDR8gNh5kCrm_zTDPOEiESlqRSMTmrNoN_Qi75aA5eok7JdIj93Uqek2nXvQMAz0UKKVyQxyKET4y296Gltq3pPCLSF1_7tqG-pcW-xEjXWH1F3-_psnUh7g5ptt7YOKaeY2ii3XVX5MzZbYfT3z0hb_P712LBVk8Py-JuxRouoWepECVHLe0gV0lZ6lzXVrthuBbOpaBQaY55XZUq4wm3zroUVZljjRysnBA4_vWNN2UIH53hYEYm5h8Tc2AyVK6PlcZu0XzHrcmSDEaJTP4AdqVcVA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>Cooperation and Free Riding in Cyber Security Information-Sharing Programs</title><source>Alma/SFX Local Collection</source><creator>Silva, Austin ; Aamir, Munaf ; Naugle, Asmeret</creator><creatorcontrib>Silva, Austin ; Aamir, Munaf ; Naugle, Asmeret</creatorcontrib><description>Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information. Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.</description><identifier>ISBN: 9781522556343</identifier><identifier>ISBN: 1522556346</identifier><identifier>EISBN: 1522556354</identifier><identifier>EISBN: 9781522556350</identifier><identifier>DOI: 10.4018/978-1-5225-5634-3.ch018</identifier><language>eng</language><publisher>IGI Global</publisher><subject>Computer Engineering ; Cyber and Network Security ; LCSH: Internet ; Prevention ; Security &amp; Forensics ; Security measures. | Computer crimes</subject><ispartof>Cyber Security and Threats : Methodologies, Tools, and Applications, 2018, p.309-324</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://www.igi-global.com/Images/Covers/9781522556343.png</thumbnail><link.rule.ids>127,146,779,780,784,793,25344,27916</link.rule.ids></links><search><creatorcontrib>Silva, Austin</creatorcontrib><creatorcontrib>Aamir, Munaf</creatorcontrib><creatorcontrib>Naugle, Asmeret</creatorcontrib><title>Cooperation and Free Riding in Cyber Security Information-Sharing Programs</title><title>Cyber Security and Threats : Methodologies, Tools, and Applications</title><description>Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information. Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.</description><subject>Computer Engineering</subject><subject>Cyber and Network Security</subject><subject>LCSH: Internet</subject><subject>Prevention</subject><subject>Security &amp; Forensics</subject><subject>Security measures. | Computer crimes</subject><isbn>9781522556343</isbn><isbn>1522556346</isbn><isbn>1522556354</isbn><isbn>9781522556350</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2018</creationdate><recordtype>book_chapter</recordtype><sourceid/><recordid>eNplkM1OwzAQhI0QElD6AlzwC7isf5I4RxRRWlQJROFsOck6NbQxcgJS356khROjlVY7mtnDR8gNh5kCrm_zTDPOEiESlqRSMTmrNoN_Qi75aA5eok7JdIj93Uqek2nXvQMAz0UKKVyQxyKET4y296Gltq3pPCLSF1_7tqG-pcW-xEjXWH1F3-_psnUh7g5ptt7YOKaeY2ii3XVX5MzZbYfT3z0hb_P712LBVk8Py-JuxRouoWepECVHLe0gV0lZ6lzXVrthuBbOpaBQaY55XZUq4wm3zroUVZljjRysnBA4_vWNN2UIH53hYEYm5h8Tc2AyVK6PlcZu0XzHrcmSDEaJTP4AdqVcVA</recordid><startdate>2018</startdate><enddate>2018</enddate><creator>Silva, Austin</creator><creator>Aamir, Munaf</creator><creator>Naugle, Asmeret</creator><general>IGI Global</general><scope/></search><sort><creationdate>2018</creationdate><title>Cooperation and Free Riding in Cyber Security Information-Sharing Programs</title><author>Silva, Austin ; Aamir, Munaf ; Naugle, Asmeret</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g130t-622b1e83aaaafc33b898da8fa8f182ff604e481e9dcb47151afaf6e4b9ede10a3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Engineering</topic><topic>Cyber and Network Security</topic><topic>LCSH: Internet</topic><topic>Prevention</topic><topic>Security &amp; Forensics</topic><topic>Security measures. | Computer crimes</topic><toplevel>online_resources</toplevel><creatorcontrib>Silva, Austin</creatorcontrib><creatorcontrib>Aamir, Munaf</creatorcontrib><creatorcontrib>Naugle, Asmeret</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Silva, Austin</au><au>Aamir, Munaf</au><au>Naugle, Asmeret</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Cooperation and Free Riding in Cyber Security Information-Sharing Programs</atitle><btitle>Cyber Security and Threats : Methodologies, Tools, and Applications</btitle><date>2018</date><risdate>2018</risdate><spage>309</spage><epage>324</epage><pages>309-324</pages><isbn>9781522556343</isbn><isbn>1522556346</isbn><eisbn>1522556354</eisbn><eisbn>9781522556350</eisbn><abstract>Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information. Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.</abstract><pub>IGI Global</pub><doi>10.4018/978-1-5225-5634-3.ch018</doi><tpages>16</tpages></addata></record>
fulltext fulltext
identifier ISBN: 9781522556343
ispartof Cyber Security and Threats : Methodologies, Tools, and Applications, 2018, p.309-324
issn
language eng
recordid cdi_igi_books_10_4018_978-1-5225-5634-3_ch018
source Alma/SFX Local Collection
subjects Computer Engineering
Cyber and Network Security
LCSH: Internet
Prevention
Security & Forensics
Security measures. | Computer crimes
title Cooperation and Free Riding in Cyber Security Information-Sharing Programs
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T21%3A35%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_igi_b&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Cooperation%20and%20Free%20Riding%20in%20Cyber%20Security%20Information-Sharing%20Programs&rft.btitle=Cyber%20Security%20and%20Threats%20:%20Methodologies,%20Tools,%20and%20Applications&rft.au=Silva,%20Austin&rft.date=2018&rft.spage=309&rft.epage=324&rft.pages=309-324&rft.isbn=9781522556343&rft.isbn_list=1522556346&rft_id=info:doi/10.4018/978-1-5225-5634-3.ch018&rft_dat=%3Cgale_igi_b%3ECX7570000027%3C/gale_igi_b%3E%3Curl%3E%3C/url%3E&rft.eisbn=1522556354&rft.eisbn_list=9781522556350&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_galeid=CX7570000027&rfr_iscdi=true