Show simple item record

dc.contributor.authorSimola, Jussi
dc.date.accessioned2022-09-29T10:12:16Z
dc.date.available2022-09-29T10:12:16Z
dc.date.issued2021
dc.identifier.citationSimola, J. (2021). Literature Review of Scientific Articles about Cyber Information Sharing. <i>Journal of Information Warfare</i>, <i>20</i>(3), 44-59. <a href="https://www.jinfowar.com/subscribers/journal/volume-20-issue-3/literature-review-scientific-articles-about-cyber-information-sharing" target="_blank">https://www.jinfowar.com/subscribers/journal/volume-20-issue-3/literature-review-scientific-articles-about-cyber-information-sharing</a>
dc.identifier.otherCONVID_156792849
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/83376
dc.description.abstractThis literature review presents a review of cyber information sharing based on systematic queries in four scientific databases. Hundreds of articles were handled and clustered. Relevant publications concerning cyber information sharing are succinctly described in the paper. The findings are discussed from the perspective of how to develop a cybersecurity information sharing system and what possible features might be included in the system. The literature review will comprise a new database for the Echo Early Warning System (E-EWS) concept. E-EWS aims at delivering a security operations support tool, enabling the members of the ECHO network to coordinate and share information in near real-time.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherPeregrine Technical Solutions
dc.relation.ispartofseriesJournal of Information Warfare
dc.relation.urihttps://www.jinfowar.com/subscribers/journal/volume-20-issue-3/literature-review-scientific-articles-about-cyber-information-sharing
dc.rightsIn Copyright
dc.subject.otherCIP, cyber-ecosystem
dc.subject.otheremergency response, E-EWS, cyber information sharing
dc.titleLiterature Review of Scientific Articles about Cyber Information Sharing
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202209294729
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_dcae04bc
dc.description.reviewstatuspeerReviewed
dc.format.pagerange44-59
dc.relation.issn1445-3312
dc.relation.numberinseries3
dc.relation.volume20
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 Journal of Information Warfare
dc.rights.accesslevelopenAccessfi
dc.subject.ysotiedonhaku
dc.subject.ysokirjallisuuskatsaukset
dc.subject.ysotoimintavalmius (organisaatiot)
dc.subject.ysotietojärjestelmät
dc.subject.ysokyberturvallisuus
dc.subject.ysoinfrastruktuurit
dc.subject.ysotiedonkulku
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p2964
jyx.subject.urihttp://www.yso.fi/onto/yso/p7595
jyx.subject.urihttp://www.yso.fi/onto/yso/p39509
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p17539
jyx.subject.urihttp://www.yso.fi/onto/yso/p869
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA2


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright