{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:01:32Z","timestamp":1755838892478},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899697","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T23:18:43Z","timestamp":1574723923000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Towards Better Understanding of Cyber Security Information Sharing"],"prefix":"10.1109","author":[{"given":"Adam","family":"Zibak","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Simpson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Scalable security Cyber threat information sharing in the internet age","year":"2014","author":"gilbert","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2201033"},{"journal-title":"Security of Network and Information Systems (the NIS Directive)","year":"2009","key":"ref10"},{"journal-title":"Cyber Security Information Sharing An Overview of Regulatory and Non-regulatory Approaches","year":"2015","author":"bedrijfsrevisoren","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-150"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.99"},{"journal-title":"Program Evaluation and Performance Measurement","year":"2012","author":"mcdavid","key":"ref14"},{"journal-title":"How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts","year":"2014","author":"jackson","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.7249\/CT425"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2663876.2663882"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140300"},{"journal-title":"Standardizing Cyber Threat Intelligence Information with the Structured Threat Information EXpression (STIX)","year":"2014","author":"barnum","key":"ref19"},{"key":"ref28","article-title":"Cybersecurity information sharing: A framework for information security management in UK SME supply chains","author":"lewis","year":"2014","journal-title":"ECIS 2014 Proceedings-22nd European Conference on Information Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2016.7503292"},{"journal-title":"ISAOS","article-title":"Introduction to Information Sharing","year":"2016","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2994539.2994546"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.04.003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_8"},{"key":"ref5","first-page":"1409","article-title":"Towards a Maturity Model for Inter-Organizational Cyber Threat Intelligence Sharing: A Case Study of Stakeholders' Expectations and Willingness to Share","author":"sillaber","year":"2018","journal-title":"Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI"},{"journal-title":"The role of private industry and government in critical infrastructure assurance","year":"1998","author":"ghosh","key":"ref8"},{"journal-title":"United States President's Commission on Critical Infrastructure Protection","article-title":"Critical foundations: Protecting America's infrastructure","year":"1997","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2007.10.001"},{"key":"ref9","article-title":"Can We Evaluate the Effectiveness of Cyber Security Information Sharing Efforts?","author":"zibak","year":"0","journal-title":"2018 International Conference On Cyber Situational Awareness Data Analytics And Assessment (CyberSA) IEEE"},{"key":"ref1","first-page":"837","article-title":"Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives","author":"sauerwein","year":"2017","journal-title":"Proceedings of the 13th International Conference on Wirtschaftsinformatik - WI 2017"},{"journal-title":"Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices","year":"2015","author":"oltsik","key":"ref20"},{"journal-title":"UK Standard Industrial Classification of Economic Activities 2007","year":"2007","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/2808128.2808133","article-title":"From Cyber Security Information Sharing to Threat Management","author":"brown","year":"2015","journal-title":"Proceedings of the 2Nd ACM Workshop on Information Sharing and Collaborative Security ser WISCS '15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20508"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2418357"},{"key":"ref26","article-title":"C2 systems and information sharing in a cross cultural context: willing and able?","author":"wortel","year":"2007","journal-title":"Proceedings of the 12th International Command and Control Research and Technology Symposium"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.5465\/AME.2000.3979820"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, United Kingdom","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899697.pdf?arnumber=8899697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:55:34Z","timestamp":1658094934000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899697","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}