dc.contributor.author | Simola, Jussi | |
dc.date.accessioned | 2022-09-29T10:12:16Z | |
dc.date.available | 2022-09-29T10:12:16Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Simola, J. (2021). Literature Review of Scientific Articles about Cyber Information Sharing. <i>Journal of Information Warfare</i>, <i>20</i>(3), 44-59. <a href="https://www.jinfowar.com/subscribers/journal/volume-20-issue-3/literature-review-scientific-articles-about-cyber-information-sharing" target="_blank">https://www.jinfowar.com/subscribers/journal/volume-20-issue-3/literature-review-scientific-articles-about-cyber-information-sharing</a> | |
dc.identifier.other | CONVID_156792849 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/83376 | |
dc.description.abstract | This literature review presents a review of cyber information sharing based on systematic queries in four scientific databases. Hundreds of articles were handled and clustered. Relevant publications concerning cyber information sharing are succinctly described in the paper. The findings are discussed from the perspective of how to develop a cybersecurity information sharing system and what possible features might be included in the system. The literature review will comprise a new database for the Echo Early Warning System (E-EWS) concept. E-EWS aims at delivering a security operations support tool, enabling the members of the ECHO network to coordinate and share information in near real-time. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Peregrine Technical Solutions | |
dc.relation.ispartofseries | Journal of Information Warfare | |
dc.relation.uri | https://www.jinfowar.com/subscribers/journal/volume-20-issue-3/literature-review-scientific-articles-about-cyber-information-sharing | |
dc.rights | In Copyright | |
dc.subject.other | CIP, cyber-ecosystem | |
dc.subject.other | emergency response, E-EWS, cyber information sharing | |
dc.title | Literature Review of Scientific Articles about Cyber Information Sharing | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202209294729 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_dcae04bc | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 44-59 | |
dc.relation.issn | 1445-3312 | |
dc.relation.numberinseries | 3 | |
dc.relation.volume | 20 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2022 Journal of Information Warfare | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | tiedonhaku | |
dc.subject.yso | kirjallisuuskatsaukset | |
dc.subject.yso | toimintavalmius (organisaatiot) | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | infrastruktuurit | |
dc.subject.yso | tiedonkulku | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2964 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7595 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p39509 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17539 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p869 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A2 | |