{"title":"理解企业网络安全信息共享:一个理论模型和实证分析","authors":"Justin Z. Zhang, Lakshmi Goel, Steven Williamson","doi":"10.1080/17517575.2024.2310844","DOIUrl":null,"url":null,"abstract":"This research employs an analytical modelling approach, complemented by empirical analysis, to delve into enterprise cybersecurity information sharing strategies. Utilising a thorough cost-based an...","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":"22 1","pages":""},"PeriodicalIF":4.4000,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Understanding enterprise cybersecurity information sharing: a theoretical model and empirical analysis\",\"authors\":\"Justin Z. Zhang, Lakshmi Goel, Steven Williamson\",\"doi\":\"10.1080/17517575.2024.2310844\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This research employs an analytical modelling approach, complemented by empirical analysis, to delve into enterprise cybersecurity information sharing strategies. Utilising a thorough cost-based an...\",\"PeriodicalId\":11750,\"journal\":{\"name\":\"Enterprise Information Systems\",\"volume\":\"22 1\",\"pages\":\"\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2024-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Enterprise Information Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1080/17517575.2024.2310844\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Enterprise Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/17517575.2024.2310844","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Understanding enterprise cybersecurity information sharing: a theoretical model and empirical analysis
This research employs an analytical modelling approach, complemented by empirical analysis, to delve into enterprise cybersecurity information sharing strategies. Utilising a thorough cost-based an...
期刊介绍:
Enterprise Information Systems (EIS) focusses on both the technical and applications aspects of EIS technology, and the complex and cross-disciplinary problems of enterprise integration that arise in integrating extended enterprises in a contemporary global supply chain environment. Techniques developed in mathematical science, computer science, manufacturing engineering, and operations management used in the design or operation of EIS will also be considered.