{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:15:40Z","timestamp":1734153340817,"version":"3.30.2"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,20]]},"DOI":"10.1109\/icis61260.2024.10778364","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:06:09Z","timestamp":1734030369000},"page":"41-48","source":"Crossref","is-referenced-by-count":0,"title":["Governance of Cyber Threat Information Sharing for Public-Private Partnerships: Comparative Analysis of National Cases"],"prefix":"10.1109","author":[{"given":"SuHyeon","family":"Park","sequence":"first","affiliation":[{"name":"Korea University, School of Cybersecurity,Seoul,Korea"}]},{"given":"HunYeong","family":"Kwon","sequence":"additional","affiliation":[{"name":"Korea University, School of Cybersecurity,Seoul,Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.12700\/APH.18.3.2021.3.2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/9781003323426"},{"issue":"2","key":"ref3","first-page":"272","article-title":"National Security 2.0: The Cyber Security of Critical Infrastructure","volume":"26","author":"Daricili","year":"2022","journal-title":"PERCEPTIONS: Journal of International Affairs"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/computers9010018"},{"issue":"1","key":"ref5","first-page":"72","article-title":"Strengthening Public-Private Partnership in Cyber Defense: A Comparison with the Republic of Estonia","volume":"21","author":"Yoshihiro","year":"2019","journal-title":"NIDS Journal of Defense and Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.320"},{"volume-title":"Global Cybersecurity Index 2020","key":"ref7","first-page":"22"},{"volume-title":"Cybersecurity Information Sharing Incentives and Barriers","year":"2017","author":"Priscilla","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340528"},{"key":"ref10","first-page":"375","article-title":"The Privacy Issues presented by the Cybersecurity Information Sharing Act","volume":"91","author":"Heidenreich","year":"2015","journal-title":"North Dakota Law Review"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon49761.2020.9131721"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-021-00045-4"},{"key":"ref13","article-title":"Jekyll and Hyde: the importance and implementation of governance practices in information systems projects","volume-title":"International Business Conference 2018","author":"Erasmus","year":"2018"},{"volume-title":"Information Sharing","year":"2024","key":"ref14"},{"key":"ref15","article-title":"China as a \u201cCyber great power\u201d - Beijing\u2019s two voices in telecommunication","author":"Doshi","year":"2021","journal-title":"Foreign Policy at Brookings"},{"volume-title":"\u56fd\u5bb6\u8ba1\u7b97\u673a\u7f51\u7edc\u5e94\u6025\u6280\u672f\u5904\u7406\u534f\u8c03\u4e2d\u5fc3","year":"2024","key":"ref16"},{"volume-title":"J-CSIP & J-CRAT","year":"2024","key":"ref17"},{"journal-title":"National Cybersecurity Strategy","first-page":"14","year":"2023","key":"ref18"},{"volume-title":"\u4e2d\u534e\u4eba\u6c11\u5171\u548c\u56fd\u7f51\u7edc\u5b89\u5168\u6cd5","year":"2024","key":"ref19"},{"journal-title":"Government Cyber Security Strategy: Building a cyber resilient public sector","first-page":"10","year":"2022","key":"ref20"},{"volume-title":"\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u672c\u6cd5\u300d\u7b2c\u4e00\u6761(\u76ee\u7684)","year":"2024","key":"ref21"},{"journal-title":"Privacy and Civil Liberties Final Guidelines: Cybersecurity Information Sharing Act of 2015","year":"2021","key":"ref22"},{"volume-title":"Cyber-threat intelligence information sharing guide","year":"2021","key":"ref23"},{"volume-title":"CYBER-SECURITY INFORMATION SHARING PARTNERSHIP - Terms & Conditions v5.0","key":"ref24","first-page":"12"},{"first-page":"21","volume-title":"\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u4fc2\u308b\u884c\u52d5\u8a08","year":"2022","key":"ref25"},{"volume-title":"Coordinated Vulnerability Disclosure Process","year":"2024","key":"ref26"},{"volume-title":"CNVD \u7b80 \u4ecb","year":"2024","key":"ref27"},{"volume-title":"UK\u2019s CiSP: Delivering cyber resilience for a decade","year":"2023","key":"ref28"},{"volume-title":"Vulnerability Reporting Service","year":"2024","key":"ref29"},{"volume-title":"Vulnerability Countermeasure Information Database JVN iPedia Registration Status [2023 4th Quarter (Oct. Dec.)]","year":"2024","key":"ref30"},{"first-page":"62","volume-title":"\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u88ab\u5bb3\u306b\u4fc2\u308b\u60c5\u5831\u306e\u5171\u6709\u30fb\u516c\u8868\u30ac\u30a4\u30c0\u30f3\u30b9","year":"2023","key":"ref31"},{"volume-title":"About CISP","year":"2024","key":"ref32"},{"volume-title":"Information security awareness and promotion initiatives","year":"2024","key":"ref33"}],"event":{"name":"2024 IEEE\/ACIS 24th International Conference on Computer and Information Science (ICIS)","start":{"date-parts":[[2024,9,20]]},"location":"Shanghai, China","end":{"date-parts":[[2024,9,22]]}},"container-title":["2024 IEEE\/ACIS 24th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10778263\/10778307\/10778364.pdf?arnumber=10778364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:37:24Z","timestamp":1734071844000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10778364\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,20]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icis61260.2024.10778364","relation":{},"subject":[],"published":{"date-parts":[[2024,9,20]]}}}