Governance of Cyber Threat Information Sharing for Public-Private Partnerships: Comparative Analysis of National Cases

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently, national security efforts necessitated collaboration with the private sector to share cyber threat information(CTI) to respond to evolving cyber threats. However, most countries around the world do not have established cybersecurity public-private partnerships, and even in countries with cybersecurity governance, dysfunctions such as privacy breaches and conflicts in the legal system have arisen, making the role of the state even more important. To overcome these problems and successfully implement CTI-sharing with the private sector in the future, this study identifies four governance components: Organization, Legal basis, Institutional Management Measures, and Evaluation & Reward. Based on this analysis, we propose a model that can be used as a basis for developing a National framework CTI.

Original languageEnglish
Title of host publication2024 IEEE/ACIS 24th International Conference on Computer and Information Science, ICIS 2024 - Proceedings
EditorsBofeng Zhang, Bingchun Li, Jianxin Xue, Wen�an Tan, Shaojing Song
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages41-48
Number of pages8
ISBN (Electronic)9798350376647
DOIs
Publication statusPublished - 2024
Event24th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2024 - Shanghai, China
Duration: 2024 Sept 202024 Sept 22

Publication series

Name2024 IEEE/ACIS 24th International Conference on Computer and Information Science, ICIS 2024 - Proceedings

Conference

Conference24th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2024
Country/TerritoryChina
CityShanghai
Period24/9/2024/9/22

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Keywords

  • Cyber Threat Information Sharing
  • Governance
  • Public-Private Partnerships(PPP)

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'Governance of Cyber Threat Information Sharing for Public-Private Partnerships: Comparative Analysis of National Cases'. Together they form a unique fingerprint.

Cite this