This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.
Aviad, A.E., Węcel, K., Abramowicz, W. (2016), A semantic approach to modelling of cybersecurity domain, Journal of Information Warfare Vol. 15, No. 1, pp. 91-102. Available at: http://www.jstor.org/stable/10.5325/jinfopoli.1.2011.0001.AviadA.E.WęcelK.AbramowiczW.2016A semantic approach to modelling of cybersecurity domainJournal of Information Warfare, Vol. 15, No. 1, pp. 91-102. Available at:http://www.jstor.org/stable/10.5325/jinfopoli.1.2011.0001.Search in Google Scholar
Akerlof, G.A. (1970), The Market for “Lemons”: quality Uncertainty and the Market Mechanism, Quarterly Journal of Economics Vol. 84, No. 3, pp. 488-500.AkerlofG.A.1970The Market for “Lemons”: quality Uncertainty and the Market MechanismQuarterly Journal of EconomicsVol84No.3pp488–50010.2307/1879431Search in Google Scholar
Aliya Sternstein. (2015), Obama’s New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with Agencies Nextgov Available at: http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cyber-counterterrorism-center/105051/ [Accessed May 22, 2016].Aliya Sternstein2015Obama’s New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with AgenciesNextgov. Available at:http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cyber-counterterrorism-center/105051/[Accessed May 22, 2016].Search in Google Scholar
Anderson, R., Anderson, R. (2001), Why Information Security is Hard, Annual Computer Security Applications Conference Available at: www.cl.cam.ac.uk/~rja14/#Econ.AndersonR.AndersonR.2001Why Information Security is HardAnnual Computer Security Applications Conference. Available at:www.cl.cam.ac.uk/~rja14/#Econ.Search in Google Scholar
Barney, J. (1991), Firm resources and sustained competitive advantage, Journal of Management Vol. 17, No. 1, pp. 99-120. Available at: http://jom.sagepub.com/cgi/doi/10.1177/014920639101700108.BarneyJ.1991Firm resources and sustained competitive advantageJournal of Management, Vol. 17, No. 1, pp. 99-120. Available at:http://jom.sagepub.com/cgi/doi/10.1177/014920639101700108.10.1177/014920639101700108Search in Google Scholar
Barnum, S. (2014), STIX Whitepaper. Available at: http://stixproject.github.io/getting-started/whitepaper [Accessed December 23, 2015].BarnumS.2014STIX Whitepaper. Available at:http://stixproject.github.io/getting-started/whitepaper[Accessed December 23, 2015].Search in Google Scholar
Ben Aissa, A., Abercrombie, R.K., Sheldon, F.T., Mili, A. (2010), Quantifying security threats and their potential impacts: a case study, Innovations in Systems and Software Engineering Vol. 6, No. 4, pp. 269-281.Ben AissaA.AbercrombieR.K.SheldonF.T.MiliA.2010Quantifying security threats and their potential impacts: a case studyInnovations in Systems and Software EngineeringVol6No.4pp269–28110.1007/s11334-010-0123-2Search in Google Scholar
Berners-lee, T.I.M., Hendler, J., Lassila, O.R.A. (2001), The Semantic Web, Scientific American Vol. 284(May), pp. 1-4. Available at: http://www.nature.com/doifinder/10.1038/scientificamerican0501-34.Berners-leeT.I.M.HendlerJ.LassilaO.R.A.2001The Semantic WebScientific American, Vol. 284(May), pp. 1-4. Available at:http://www.nature.com/doifinder/10.1038/scientificamerican0501-34.10.1038/scientificamerican0501-34Search in Google Scholar
Böhme, R. (2005), Vulnerability markets what is the economic value of a zero-day exploit? In Chaos Communication Congress (December), pp. 27-30. Available at: https://events.ccc.de/congress/2005/fahrplan/attachments/542-Boehme2005_22C3_VulnerabilityMarkets.pdf.BöhmeR.2005Vulnerability markets what is the economic value of a zero-day exploit? In Chaos Communication Congress(December), pp. 27-30. Available at:https://events.ccc.de/congress/2005/fahrplan/attachments/542-Boehme2005_22C3_VulnerabilityMarkets.pdf.Search in Google Scholar
David, P.A. (1990), The Dynamo and the Computer: an Historical Perspective on the Modern Productivity Paradox, American Economic ReviewDavidP.A.1990The Dynamo and the Computer: an Historical Perspective on the Modern Productivity ParadoxAmerican Economic ReviewSearch in Google Scholar
Gordon, L., Loeb, M.P., Sohail, T. (2003), A Framework for using insurance for cyber-risk management, Communications of the ACM Vol. 46, No. 3, pp. 81-85.GordonL.LoebM.P.SohailT.2003A Framework for using insurance for cyber-risk managementCommunications of the ACMVol46No.3pp81–8510.1145/636772.636774Search in Google Scholar
Hardin, J.G. (2006), The tragedy of the commons, Environmental Issues: Essential Primary Sources Vol. 162, December, pp. 64-68. Available at: http://find.galegroup.com/gic/infomark.do?&source=gale&idigest=0f0174f8fbc32fe7c817214d754d9f0e&prodId=GIC&userGroupName=c_gic&tabID=T0011&docId=CX3456400036&type=retrieve&contentSet=EBKS&version=1.0.HardinJ.G.2006The tragedy of the commonsEnvironmental Issues: Essential Primary Sources, Vol. 162, December, pp. 64-68. Available at:http://find.galegroup.com/gic/infomark.do?&source=gale&idigest=0f0174f8fbc32fe7c817214d754d9f0e&prodId=GIC&userGroupName=c_gic&tabID=T0011&docId=CX3456400036&type=retrieve&contentSet=EBKS&version=1.0.Search in Google Scholar
Kramer, M.R., Pfitzer, M.W. (2016), The ecosystem of shared value, Harvard Business Review October, pp. 1-11. Available at: http://www.fsg.org/publications/ecosystem-shared-value?utm_source=fsg&utm_medium=email&utm_campaign=201609ecosystemofsharedvalue#download-area.KramerM.R.PfitzerM.W.2016The ecosystem of shared valueHarvard Business Review, October, pp. 1-11. Available at:http://www.fsg.org/publications/ecosystem-shared-value?utm_source=fsg&utm_medium=email&utm_campaign=201609ecosystemofsharedvalue#download-area.Search in Google Scholar
Lusch, R.F. (2006), Service-dominant logic: reactions, reflections and refinements, Marketing Theory Vol. 6, No. 3, pp. 281-288.LuschR.F.2006Service-dominant logic: reactionsreflections and refinements, Marketing TheoryVol6No.3pp281–28810.1177/1470593106066781Search in Google Scholar
Magnusson, C., Molvidsson, J., Zetterqvist, S. (2007), Value creation and return on security investments (ROSI), IFIP International Federation for Information Processing Vol. 232, pp. 25-35.MagnussonC.MolvidssonJ.ZetterqvistS.2007Value creation and return on security investments (ROSI)IFIP International Federation for Information ProcessingVol232pp25–3510.1007/978-0-387-72367-9_3Search in Google Scholar
Miller, C. (2007), The Legitimate Vulnerability Market Inside the Secretive World of 0-day Exploit Sales. In Workshop on the Economics of Information Security, Pittsburgh, PA pp. 1-10. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.5718.MillerC.2007The Legitimate Vulnerability Market Inside the Secretive World of 0-day Exploit Sales. In Workshop on the Economics of Information SecurityPittsburgh, PA. pp. 1-10. Available at:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.5718.Search in Google Scholar
Moitra, S. D., & Konda, S. L. (2000). A simulation model for managing survivability of networked information systems (No. CMU/SEI-2000-TR-021). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.MoitraS. D.&KondaS. L.2000A simulation model for managing survivability of networked information systems(No. CMU/SEI-2000-TR-021). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST10.21236/ADA387453Search in Google Scholar
Permanent Select Committee on Intelligence. (2012), Cyber Intelligence Sharing and Protection Act Report together with Minority Views to Accompany H.R. 3523 Available at: http://www.gpo.gov/fdsys/pkg/CRPT-112hrpt445/pdf/CRPT-112hrpt445.pdf.Permanent Select Committee on Intelligence2012Cyber Intelligence Sharing and Protection Act Report together with Minority Views to Accompany H.R. 3523Available at:http://www.gpo.gov/fdsys/pkg/CRPT-112hrpt445/pdf/CRPT-112hrpt445.pdf.Search in Google Scholar
Porter, M.E., Kramer, M.R. (2006), Strategy & society, Harvard Business Review 84, December, pp. 78-92.PorterM.E.KramerM.R.2006Strategy & societyHarvard Business Review84December, pp.78–92Search in Google Scholar
Porter, M.E., Kramer, M.R. (2011), Creating shared value, Harvard Business Review Vol. 89, No. 1-2.PorterM.E.KramerM.R.2011Creating shared valueHarvard Business ReviewVol89No1–210.1007/978-94-024-1144-7_16Search in Google Scholar
Shadbolt, N., Berners-Lee, T., Hall, W. (2006), The semantic web revisited, IEEE Intelligent Systems Vol. 21, No. 3, pp. 96-101. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1637364.ShadboltN.Berners-LeeT.HallW.2006The semantic web revisitedIEEE Intelligent Systems, Vol. 21, No. 3, pp. 96-101. Available at:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1637364.10.1109/MIS.2006.62Search in Google Scholar
Shapiro, C., Varian, H. R., Becker, W. E. (1999). Information rules: a strategic guide to the network economy Journal of Economic Education, 30, 189-190.ShapiroC.VarianH. R.BeckerW. E.1999Information rules: a strategic guide to the network economyJournal of Economic Education30189–19010.2307/1183273Search in Google Scholar
Soo Hoo, K., Sudbury, A.W., Jaquith, A.R. (2001), Tangible ROI through secure software engineering, Secure Business Quarterly Vol. 1, No. 2.Soo HooK.SudburyA.W.JaquithA.R.2001Tangible ROI through secure software engineeringSecure Business QuarterlyVol1No2Search in Google Scholar
The White House & Secretary, Office of the Press. (2015), Cyber Threat Intelligence Integration Center. Available at: https:// www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center<http://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center> [Accessed May 19, 2016].The White House & Secretary, Office of the Press2015Cyber Threat Intelligence Integration CenterAvailable athttps://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center<http://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center>[Accessed May 19, 2016].Search in Google Scholar
W3C. (n.d.), What is the Semantic Web. W3C Semantic Web Activity Available at: http://www.w3.org/2001/sw/[AccessedAugust 16, 2015].W3C. (n.d.), What is the Semantic WebW3C Semantic Web ActivityAvailable athttp://www.w3.org/2001/sw/[AccessedAugust16, 2015].Search in Google Scholar
Wei, H., Frinke, D., Carter, O., Ritter, C. (2001), Cost-benefit analysis for network intrusion detection systems. In CSI 28th Annual Computer Security Conference pp. 29-31.WeiH.FrinkeD.CarterO.RitterC.2001Cost-benefit analysis for network intrusion detection systemsInCSI 28th Annual Computer Security Conferencepp29–31Search in Google Scholar