This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.
Aviad, A.E., Węcel, K., Abramowicz, W. (2016), A semantic approach to modelling of cybersecurity domain, Journal of Information Warfare Vol. 15, No. 1, pp. 91-102. Available at: http://www.jstor.org/stable/10.5325/jinfopoli.1.2011.0001.AviadA.E.WęcelK.AbramowiczW.2016Journal of Information Warfare, Vol. 15, No. 1, pp. 91-102. Available at:http://www.jstor.org/stable/10.5325/jinfopoli.1.2011.0001.Search in Google Scholar
Akerlof, G.A. (1970), The Market for “Lemons”: quality Uncertainty and the Market Mechanism, Quarterly Journal of Economics Vol. 84, No. 3, pp. 488-500.AkerlofG.A.1970The Market for “Lemons”: quality Uncertainty and the Market MechanismVol84No.3pp488–50010.2307/1879431Search in Google Scholar
Aliya Sternstein. (2015), Obama’s New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with Agencies Nextgov Available at: http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cyber-counterterrorism-center/105051/ [Accessed May 22, 2016].Aliya Sternstein2015Nextgov. Available at:http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cyber-counterterrorism-center/105051/[Accessed May 22, 2016].Search in Google Scholar
Anderson, R., Anderson, R. (2001), Why Information Security is Hard, Annual Computer Security Applications Conference Available at: www.cl.cam.ac.uk/~rja14/#Econ.AndersonR.AndersonR.2001Annual Computer Security Applications Conference. Available at:www.cl.cam.ac.uk/~rja14/#Econ.Search in Google Scholar
Barney, J. (1991), Firm resources and sustained competitive advantage, Journal of Management Vol. 17, No. 1, pp. 99-120. Available at: http://jom.sagepub.com/cgi/doi/10.1177/014920639101700108.BarneyJ.1991Journal of Management, Vol. 17, No. 1, pp. 99-120. Available at:http://jom.sagepub.com/cgi/doi/10.1177/014920639101700108.10.1177/014920639101700108Search in Google Scholar
Barnum, S. (2014), STIX Whitepaper. Available at: http://stixproject.github.io/getting-started/whitepaper [Accessed December 23, 2015].BarnumS.2014http://stixproject.github.io/getting-started/whitepaper[Accessed December 23, 2015].Search in Google Scholar
Ben Aissa, A., Abercrombie, R.K., Sheldon, F.T., Mili, A. (2010), Quantifying security threats and their potential impacts: a case study, Innovations in Systems and Software Engineering Vol. 6, No. 4, pp. 269-281.Ben AissaA.AbercrombieR.K.SheldonF.T.MiliA.2010Quantifying security threats and their potential impacts: a case studyVol6No.4pp269–28110.1007/s11334-010-0123-2Search in Google Scholar
Berners-lee, T.I.M., Hendler, J., Lassila, O.R.A. (2001), The Semantic Web, Scientific American Vol. 284(May), pp. 1-4. Available at: http://www.nature.com/doifinder/10.1038/scientificamerican0501-34.Berners-leeT.I.M.HendlerJ.LassilaO.R.A.2001Scientific American, Vol. 284(May), pp. 1-4. Available at:http://www.nature.com/doifinder/10.1038/scientificamerican0501-34.10.1038/scientificamerican0501-34Search in Google Scholar
Böhme, R. (2005), Vulnerability markets what is the economic value of a zero-day exploit? In Chaos Communication Congress (December), pp. 27-30. Available at: https://events.ccc.de/congress/2005/fahrplan/attachments/542-Boehme2005_22C3_VulnerabilityMarkets.pdf.BöhmeR.2005(December), pp. 27-30. Available at:https://events.ccc.de/congress/2005/fahrplan/attachments/542-Boehme2005_22C3_VulnerabilityMarkets.pdf.Search in Google Scholar
David, P.A. (1990), The Dynamo and the Computer: an Historical Perspective on the Modern Productivity Paradox, American Economic ReviewDavidP.A.1990The Dynamo and the Computer: an Historical Perspective on the Modern Productivity ParadoxSearch in Google Scholar
Gordon, L., Loeb, M.P., Sohail, T. (2003), A Framework for using insurance for cyber-risk management, Communications of the ACM Vol. 46, No. 3, pp. 81-85.GordonL.LoebM.P.SohailT.2003A Framework for using insurance for cyber-risk managementVol46No.3pp81–8510.1145/636772.636774Search in Google Scholar
Hardin, J.G. (2006), The tragedy of the commons, Environmental Issues: Essential Primary Sources Vol. 162, December, pp. 64-68. Available at: http://find.galegroup.com/gic/infomark.do?&source=gale&idigest=0f0174f8fbc32fe7c817214d754d9f0e&prodId=GIC&userGroupName=c_gic&tabID=T0011&docId=CX3456400036&type=retrieve&contentSet=EBKS&version=1.0.HardinJ.G.2006Environmental Issues: Essential Primary Sources, Vol. 162, December, pp. 64-68. Available at:http://find.galegroup.com/gic/infomark.do?&source=gale&idigest=0f0174f8fbc32fe7c817214d754d9f0e&prodId=GIC&userGroupName=c_gic&tabID=T0011&docId=CX3456400036&type=retrieve&contentSet=EBKS&version=1.0.Search in Google Scholar
Kramer, M.R., Pfitzer, M.W. (2016), The ecosystem of shared value, Harvard Business Review October, pp. 1-11. Available at: http://www.fsg.org/publications/ecosystem-shared-value?utm_source=fsg&utm_medium=email&utm_campaign=201609ecosystemofsharedvalue#download-area.KramerM.R.PfitzerM.W.2016Harvard Business Review, October, pp. 1-11. Available at:http://www.fsg.org/publications/ecosystem-shared-value?utm_source=fsg&utm_medium=email&utm_campaign=201609ecosystemofsharedvalue#download-area.Search in Google Scholar
Lusch, R.F. (2006), Service-dominant logic: reactions, reflections and refinements, Marketing Theory Vol. 6, No. 3, pp. 281-288.LuschR.F.2006Service-dominant logic: reactionsVol6No.3pp281–28810.1177/1470593106066781Search in Google Scholar
Magnusson, C., Molvidsson, J., Zetterqvist, S. (2007), Value creation and return on security investments (ROSI), IFIP International Federation for Information Processing Vol. 232, pp. 25-35.MagnussonC.MolvidssonJ.ZetterqvistS.2007Value creation and return on security investments (ROSI)Vol232pp25–3510.1007/978-0-387-72367-9_3Search in Google Scholar
Miller, C. (2007), The Legitimate Vulnerability Market Inside the Secretive World of 0-day Exploit Sales. In Workshop on the Economics of Information Security, Pittsburgh, PA pp. 1-10. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.5718.MillerC.2007Pittsburgh, PA. pp. 1-10. Available at:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.5718.Search in Google Scholar
Moitra, S. D., & Konda, S. L. (2000). A simulation model for managing survivability of networked information systems (No. CMU/SEI-2000-TR-021). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.MoitraS. D.&KondaS. L.2000(No. CMU/SEI-2000-TR-021). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST10.21236/ADA387453Search in Google Scholar
Permanent Select Committee on Intelligence. (2012), Cyber Intelligence Sharing and Protection Act Report together with Minority Views to Accompany H.R. 3523 Available at: http://www.gpo.gov/fdsys/pkg/CRPT-112hrpt445/pdf/CRPT-112hrpt445.pdf.Permanent Select Committee on Intelligence2012Available at:http://www.gpo.gov/fdsys/pkg/CRPT-112hrpt445/pdf/CRPT-112hrpt445.pdf.Search in Google Scholar
Porter, M.E., Kramer, M.R. (2006), Strategy & society, Harvard Business Review 84, December, pp. 78-92.PorterM.E.KramerM.R.2006Strategy & society84December, pp.78–92Search in Google Scholar
Porter, M.E., Kramer, M.R. (2011), Creating shared value, Harvard Business Review Vol. 89, No. 1-2.PorterM.E.KramerM.R.2011Creating shared valueVol89No1–210.1007/978-94-024-1144-7_16Search in Google Scholar
Shadbolt, N., Berners-Lee, T., Hall, W. (2006), The semantic web revisited, IEEE Intelligent Systems Vol. 21, No. 3, pp. 96-101. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1637364.ShadboltN.Berners-LeeT.HallW.2006IEEE Intelligent Systems, Vol. 21, No. 3, pp. 96-101. Available at:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1637364.10.1109/MIS.2006.62Search in Google Scholar
Shapiro, C., Varian, H. R., Becker, W. E. (1999). Information rules: a strategic guide to the network economy Journal of Economic Education, 30, 189-190.ShapiroC.VarianH. R.BeckerW. E.1999Information rules: a strategic guide to the network economy30189–19010.2307/1183273Search in Google Scholar
Soo Hoo, K., Sudbury, A.W., Jaquith, A.R. (2001), Tangible ROI through secure software engineering, Secure Business Quarterly Vol. 1, No. 2.Soo HooK.SudburyA.W.JaquithA.R.2001Tangible ROI through secure software engineeringVol1No2Search in Google Scholar
The White House & Secretary, Office of the Press. (2015), Cyber Threat Intelligence Integration Center. Available at: https:// www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center<http://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center> [Accessed May 19, 2016].The White House & Secretary, Office of the Press2015Available athttps://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center<http://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center>[Accessed May 19, 2016].Search in Google Scholar
W3C. (n.d.), What is the Semantic Web. W3C Semantic Web Activity Available at: http://www.w3.org/2001/sw/[AccessedAugust 16, 2015].W3C. (n.d.), What is the Semantic WebAvailable athttp://www.w3.org/2001/sw/[AccessedAugust16, 2015].Search in Google Scholar
Wei, H., Frinke, D., Carter, O., Ritter, C. (2001), Cost-benefit analysis for network intrusion detection systems. In CSI 28th Annual Computer Security Conference pp. 29-31.WeiH.FrinkeD.CarterO.RitterC.2001Cost-benefit analysis for network intrusion detection systemsInpp29–31Search in Google Scholar