Knowledge absorption for cyber-security: The role of human beliefs

[1]  Andrew C. Simpson,et al.  Cyber Threat Information Sharing: Perceived Benefits and Barriers , 2019, ARES.

[2]  Alain Mermoud,et al.  To share or not to share: a behavioral perspective on human participation in security information sharing , 2019, J. Cybersecur..

[3]  Melissa A. Schilling Strategic management of technological innovation 6th Ed. , 2019 .

[4]  Lawrence A. Gordon,et al.  Cybersecurity insurance and risk-sharing , 2018, Journal of Accounting and Public Policy.

[5]  Ali E. Abdallah,et al.  A Novel Trust Taxonomy for Shared Cyber Threat Intelligence , 2018, Secur. Commun. Networks.

[6]  James X. Dempsey,et al.  Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs , 2018, ArXiv.

[7]  Wiem Tounsi,et al.  A survey on technical threat intelligence in the age of sophisticated cyber attacks , 2018, Comput. Secur..

[8]  Behrouz Tork Ladani,et al.  Information sharing vs. privacy: A game theoretic analysis , 2017, Expert Syst. Appl..

[9]  Rainer Böhme,et al.  Strategic Aspects of Cyber Risk Information Sharing , 2017, ACM Comput. Surv..

[10]  Seref Sagiroglu,et al.  Big data analytics for network anomaly detection from netflow data , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).

[11]  Pedro Casas,et al.  Network security and anomaly detection with Big-DAMA, a big data analytics framework , 2017, 2017 IEEE 6th International Conference on Cloud Networking (CloudNet).

[12]  A. Salter,et al.  Making a marriage of materials: The role of gatekeepers and shepherds in the absorption of external knowledge and innovation performance , 2017 .

[13]  Sachin Shetty,et al.  Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance , 2017, GAMENETS.

[14]  Jens Grossklags,et al.  Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs , 2016, J. Cybersecur..

[15]  Elkin Olaguer Pérez Sánchez,et al.  Measurement of potential absorption capacity in Colombia's innovative companies , 2017 .

[16]  Baojiang Cui,et al.  Anomaly Detection Model Based on Hadoop Platform and Weka Interface , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).

[17]  Han Zhang,et al.  Knowledge sharing in online health communities: A social exchange theory perspective , 2016, Inf. Manag..

[18]  Florian Skopik,et al.  A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..

[19]  Rossouw von Solms,et al.  An information security knowledge sharing model in organizations , 2016, Comput. Hum. Behav..

[20]  Lawrence A. Gordon,et al.  Investing in Cybersecurity: Insights from the Gordon-Loeb Model , 2016 .

[21]  Robert M. Davison,et al.  Using interactive systems for knowledge sharing: The impact of individual contextual preferences in China , 2016, Inf. Manag..

[22]  Kee-Young Kwahk,et al.  The effects of network sharing on knowledge-sharing activities and job performance in enterprise social media environments , 2016, Comput. Hum. Behav..

[23]  Vidal Díaz de Rada Igúzquiza,et al.  Internet, Phone, Mail and Mixed-Mode Surveys: The Tailored Design Method. Don A. Dillman, Jolene D. Smyth y Leah Melani Christian. (New Jersey, John Wiley and Sons, 2014) , 2016 .

[24]  Parinaz Naghizadeh Ardabili,et al.  Inter-temporal incentives in security information sharing agreements , 2016, 2016 Information Theory and Applications Workshop (ITA).

[25]  Saad Y. Sait,et al.  Multi-level anomaly detection: Relevance of big data analytics in networks , 2015, Sadhana.

[26]  Cleotilde Gonzalez,et al.  Effects of cyber security knowledge on attack detection , 2015, Comput. Hum. Behav..

[27]  Eric A. M. Luiijf,et al.  On the Sharing of Cyber Security Information , 2015, Critical Infrastructure Protection.

[28]  Frank Fransen,et al.  Cyber security information exchange to gain insight into the effects of cyber threats and incidents , 2015, Elektrotech. Informationstechnik.

[29]  Lei Zhou,et al.  Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model , 2015 .

[30]  Fabio Bisogni,et al.  Data Breaches and the Dilemmas in Notifying Customers , 2015, WEIS.

[31]  Wei-Tsong Wang,et al.  Motivations of employees' knowledge sharing behaviors: A self-determination perspective , 2015, Inf. Organ..

[32]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[33]  N. E. Weiss Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis [December 11, 2014] , 2014 .

[34]  Jing Liu,et al.  A Network Gene-Based Framework for Detecting Advanced Persistent Threats , 2014, 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[35]  Myriam Dunn Cavelty Cybersecurity in Switzerland , 2014, SpringerBriefs in Cybersecurity.

[36]  Frank T. Piller,et al.  Opening the Black Box of “Not Invented Here”: Attitudes, Decision Biases, and Behavioral Consequences , 2014 .

[37]  Chris Hankin,et al.  Game Theory Meets Information Security Management , 2014, SEC.

[38]  Vala Ali Rohani,et al.  Evaluation model for knowledge sharing in information security professional virtual community , 2014, Comput. Secur..

[39]  Malcolm Robert Pattinson,et al.  Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..

[40]  Tariq Mahmood,et al.  Security Analytics: Big Data Analytics for cybersecurity: A review of trends, techniques and tools , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[41]  Alvaro A. Cárdenas,et al.  Big Data Analytics for Security , 2013, IEEE Security & Privacy.

[42]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[43]  Shih-Ming Pi,et al.  A study of Facebook Groups members' knowledge sharing , 2013, Comput. Hum. Behav..

[44]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[45]  Stefan Fenz,et al.  Toward web-based information security knowledge sharing , 2013, Inf. Secur. Tech. Rep..

[46]  M. Goh,et al.  Knowledge sharing in collaborative supply chains: twin effects of trust and power , 2013 .

[47]  M. Nene,et al.  A Survey on Machine Learning Techniques for Intrusion Detection Systems , 2013 .

[48]  Nipun Bansal,et al.  Peer to Peer Networking and Applications , 2013 .

[49]  Veda C. Storey,et al.  Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..

[50]  Nathan L. Clarke,et al.  Power to the people? The evolving recognition of human aspects of security , 2012, Comput. Secur..

[51]  Sarah Brown,et al.  Conceptual framework for cyber defense information sharing within trust relationships , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).

[52]  Peter S. Fader,et al.  Introduction to the Special Issue on the Emergence and Impact of User-Generated Content , 2012, Mark. Sci..

[53]  Chei Sian Lee,et al.  News sharing in social media: The effect of gratifications and prior experience , 2012, Comput. Hum. Behav..

[54]  Gerald C. Kane,et al.  Network Characteristics and the Value of Collaborative User-Generated Content , 2011, Mark. Sci..

[55]  T. Pedersen,et al.  Why a Central Network Position Isn't Enough: The Role of Motivation and Ability for Knowledge Sharing in Employee Networks , 2011 .

[56]  Annette Hofmann,et al.  Interdependent risk networks: the threat of cyber attack , 2011 .

[57]  Gabriel Jakobson,et al.  Mission cyber security situation assessment using impact dependency graphs , 2011, 14th International Conference on Information Fusion.

[58]  N. Foss,et al.  Managing Joint Production Motivation: The Role of Goal Framing and Governance Mechanisms , 2011 .

[59]  Joon Koh,et al.  An Integrative Model for Knowledge Sharing in Communities-of-Practice , 2011, J. Knowl. Manag..

[60]  Tyler Moore,et al.  The Impact of Public Information on Phishing Attack and Defense , 2011 .

[61]  B. Park Knowledge transfer capacity of multinational enterprises and technology acquisition in international joint ventures , 2011 .

[62]  Jiahai Yang,et al.  A study on key strategies in P2P file sharing systems and ISPs’ P2P traffic management , 2011, Peer-to-Peer Netw. Appl..

[63]  Amitai Etzioni Cybersecurity in the Private Sector , 2011 .

[64]  Hsin Hsin Chang,et al.  Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator , 2011, Inf. Manag..

[65]  César Camisón,et al.  Knowledge absorptive capacity: New insights for its conceptualization and measurement☆ , 2010 .

[66]  R. Noe,et al.  Knowledge sharing: A review and directions for future research , 2010 .

[67]  Dipankar Dasgupta,et al.  Game theory for cyber security , 2010, CSIIRW '10.

[68]  Colin Camerer,et al.  Neural evidence for inequality-averse social preferences , 2010, Nature.

[69]  Tyler Moore,et al.  The Phish-Market Protocol: Securely Sharing Attack Data between Competitors , 2010, Financial Cryptography.

[70]  Johannes M. Bauer,et al.  Cybersecurity: Stakeholder incentives, externalities, and policy options , 2009 .

[71]  Z. Zhao,et al.  A multilevel perspective on knowledge transfer: evidence from the Chinese automotive industry , 2009 .

[72]  Ross J. Anderson,et al.  Security Economics and Critical National Infrastructure , 2009, WEIS.

[73]  W. S. Chow,et al.  Social network, social trust and shared goals in organizational knowledge sharing , 2008, Inf. Manag..

[74]  Kevin W. Hamlen,et al.  Flow-based identification of botnet traffic by mining multiple log files , 2008, 2008 First International Conference on Distributed Framework and Applications.

[75]  Huseyin Cavusoglu,et al.  Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment , 2008, J. Manag. Inf. Syst..

[76]  Bruce Tether,et al.  Beyond industry–university links: Sourcing knowledge for innovation from consultants, private research organisations and the public science-base , 2008 .

[77]  D. Collard,et al.  Handbook of the Economics of Giving, Altruism and Reciprocity. Volume 1, Foundations: Volume 2, Applications, Handbooks in Economics, Serge-Christophe Kolm and Jean Mercier Ythier (eds). North Holland, 2006, xxv, xxii + 1588 pages , 2008, Economics and Philosophy.

[78]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.

[79]  Anthony J. Nyberg,et al.  Keeping Your Headcount When All About You Are Losing Theirs: Downsizing, Voluntary Turnover Rates, and The Moderating Role of HR Practices , 2008 .

[80]  K. Hausken Information sharing among firms and cyber attacks , 2007 .

[81]  Chih-Chiang Chen,et al.  Knowledge sharing, absorptive capacity, and innovation capability: an empirical study of Taiwan's knowledge-intensive industries , 2007, J. Inf. Sci..

[82]  Ulrich Lichtenthaler,et al.  Developing reputation to overcome the imperfections in the markets for knowledge , 2007 .

[83]  Xianggui Qu,et al.  Multivariate Data Analysis , 2007, Technometrics.

[84]  Morten T. Hansen,et al.  Knowledge Transfer in Intraorganizational Networks : Effects of Network Position and Absorptive Capacity on Business Unit Innovation and Performance , 2007 .

[85]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[86]  William J. Kettinger,et al.  An Evolutionary Information-Processing Theory of Knowledge Creation , 2006, J. Assoc. Inf. Syst..

[87]  Ulrich Lichtenthaler,et al.  Attitudes to Externally Organising Knowledge Management Tasks: A Review, Reconsideration and Extension of the NIH Syndrome , 2006 .

[88]  David I. Laibson,et al.  Costly Information Acquisition: Experimental Analysis of a Boundedly Rational Model , 2006 .

[89]  Serge-Christophe Kolm,et al.  Handbook of the Economics of Giving, Altruism and Reciprocity , 2006 .

[90]  Tobias Schmidt,et al.  Absorptive Capacity: One Size Fits All? Firm-level Analysis of Absorptive Capacity for Different Kinds of Knowledge , 2005 .

[91]  Giovanni Peri,et al.  Determinants of Knowledge Flows and Their Effect on Innovation , 2005, Review of Economics and Statistics.

[92]  Anindya Ghose,et al.  The Economic Incentives for Sharing Security Information , 2004, Inf. Syst. Res..

[93]  James B. Rebitzer,et al.  The Sociology of Groups and the Economics of Incentives: Theory and Evidence on Compensation Systems , 1997, SSRN Electronic Journal.

[94]  Jack A. Nickerson,et al.  A Knowledge-based Theory of the Firm - A Problem-solving Perspective , 2004, Organ. Sci..

[95]  Dario Forte The “Art” of log correlation , 2004 .

[96]  Dario Forte Log correlation: Part 2 , 2004 .

[97]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[98]  Melissa A. Schilling Strategic Management of Technological Innovation , 2004 .

[99]  Dario Forte The “ART” of log correlation: part 1 , 2004 .

[100]  Lawrence A. Gordon,et al.  Sharing Information on Computer Systems Security: An Economic Analysis , 2003 .

[101]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[102]  S. Brosnan,et al.  Monkeys reject unequal pay , 2003, Nature.

[103]  H. Scarbrough Knowledge management, HRM and the innovation process , 2003 .

[104]  Stephen J. Redding,et al.  R&D and Absorptive Capacity: Theory and Empirical Evidence* , 2003 .

[105]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[106]  Peter W. Liesch,et al.  Information internalisation in internationalising the firm , 2002 .

[107]  Ulrich Flegel Pseudonymizing Unix Log Files , 2002, InfraSec.

[108]  K. M. Bartol,et al.  Encouraging Knowledge Sharing: The Role of Organizational Reward Systems , 2002 .

[109]  T. Davenport,et al.  Just-in-time delivery comes to knowledge management. , 2002, Harvard business review.

[110]  Young-Gul Kim,et al.  Breaking the Myths of Rewards: An Exploratory Study of Attitudes about Knowledge Sharing , 2002, Inf. Resour. Manag. J..

[111]  James B. Rebitzer,et al.  Monitoring, Motivation and Management: The Determinants of Opportunistic Behavior in a Field Experiment , 2002 .

[112]  E. Fehr,et al.  Altruistic punishment in humans , 2002, Nature.

[113]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[114]  S. Zahra,et al.  The effects of alliance portfolio characteristics and absorptive capacity on performance A study of biotechnology firms , 2001 .

[115]  George P. Huber,et al.  Transfer of knowledge in knowledge management systems: unexplored issues and suggested studies , 2001, Eur. J. Inf. Syst..

[116]  Steven E. Phelan,et al.  ARRIVING AT A STRATEGIC THEORY OF THE FIRM , 2000 .

[117]  Paul A. McDermott,et al.  Preschool peer interactions and readiness to learn: Relationships between classroom peer play and learning behaviors and conduct. , 2000 .

[118]  Gary E. Bolton,et al.  ERC: A Theory of Equity, Reciprocity, and Competition , 2000 .

[119]  B. Kogut The network as knowledge : Generative rules and the emergence of structure , 2000 .

[120]  E. Fehr,et al.  Fairness and Retaliation: The Economics of Reciprocity , 2000, SSRN Electronic Journal.

[121]  Thomas H. Davenport,et al.  Book review:Working knowledge: How organizations manage what they know. Thomas H. Davenport and Laurence Prusak. Harvard Business School Press, 1998. $29.95US. ISBN 0‐87584‐655‐6 , 1998 .

[122]  E. Deci,et al.  Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions. , 2000, Contemporary educational psychology.

[123]  Henk W. Volberda,et al.  Co-evolution of Firm Absorptive Capacity and Knowledge Environment: Organizational Forms and Combinative Capabilities , 1999 .

[124]  C. Antonelli Localized technological change, new information technology and the knowledge-based economy: The European evidence , 1998 .

[125]  Dale Neef,et al.  The Economic Impact of Knowledge , 1998 .

[126]  R. Grant Toward a Knowledge-Based Theory of the Firm,” Strategic Management Journal (17), pp. , 1996 .

[127]  J. Spender Making knowledge the basis of a dynamic theory of the firm , 1996 .

[128]  Nicolai J. Foss,et al.  More Critical Comments on Knowledge-Based Theories of the Firm , 1996 .

[129]  R. Grant,et al.  Environments: Organizational Capability as Knowledge Integration , 2022 .

[130]  M. Crossan The Knowledge-Creating Company: How Japanese Companies Create the Dynamics of Innovation , 1996 .

[131]  M. Gordon,et al.  PUBLICATION RECORDS AND TENURE DECISIONS IN THE FIELD OF STRATEGIC MANAGEMENT , 1996 .

[132]  J. Andreoni Cooperation in Public-Goods Experiments: Kindness or Confusion? , 1995 .

[133]  I. Nonaka,et al.  How Japanese Companies Create the Dynamics of Innovation , 1995 .

[134]  B. Kogut,et al.  Knowledge of the Firm and the Evolutionary Theory of the Multinational Corporation , 1993 .

[135]  J. Barney Firm Resources and Sustained Competitive Advantage , 1991 .

[136]  H. Simon,et al.  Bounded Rationality and Organizational Learning , 1991 .

[137]  J. March Exploration and exploitation in organizational learning , 1991, STUDI ORGANIZZATIVI.

[138]  Daniel A. Levinthal,et al.  Innovation and Learning: The Two Faces of R&D , 1989 .

[139]  P. M. Podsakoff,et al.  Self-Reports in Organizational Research: Problems and Prospects , 1986 .

[140]  J. Hiebert,et al.  Conceptual and Procedural Knowledge in Mathematics: An Introductory Analysis , 1986 .

[141]  John T. Cacioppo,et al.  The Elaboration Likelihood Model of Persuasion , 1986, Advances in Experimental Social Psychology.

[142]  Peter J. Buckley,et al.  The Growth of International Business. , 1983 .

[143]  R. Katz,et al.  Investigating the Not Invented Here (NIH) syndrome: A look at the performance, tenure, and communication patterns of 50 R & D Project Groups , 1982 .

[144]  O. Williamson The Economics of Organization: The Transaction Cost Approach , 1981, American Journal of Sociology.

[145]  J. March,et al.  Information in Organizations as Signal and Symbol. , 1981 .

[146]  D. Teece Technology Transfer by Multinational Firms: The Resource Cost of Transferring Technological Know-How , 1977 .

[147]  Arne L. Kalleberg,et al.  Work Values and Job Rewards: A Theory of Job Satisfaction. , 1977 .

[148]  Jacob Cohen,et al.  Applied multiple regression/correlation analysis for the behavioral sciences , 1979 .

[149]  David Hume A Treatise of Human Nature: Being an Attempt to introduce the experimental Method of Reasoning into Moral Subjects , 1972 .

[150]  R. Centers,et al.  Intrinsic and extrinsic job motivations among different segments of the working population. , 1966, The Journal of applied psychology.

[151]  M. Polanyi,et al.  Tacit Knowing: Its Bearing on Some Problems of Philosophy , 1962 .

[152]  David Hume A Treatise Of Human Nature Volume Two , 1949 .