Cite

Aviad, A.E., Węcel, K., Abramowicz, W. (2016), A semantic approach to modelling of cybersecurity domain, Journal of Information Warfare Vol. 15, No. 1, pp. 91-102. Available at: http://www.jstor.org/stable/10.5325/jinfopoli.1.2011.0001.AviadA.E.WęcelK.AbramowiczW.2016A semantic approach to modelling of cybersecurity domainJournal of Information Warfare, Vol. 15, No. 1, pp. 91-102. Available at:http://www.jstor.org/stable/10.5325/jinfopoli.1.2011.0001.Search in Google Scholar

Akerlof, G.A. (1970), The Market for “Lemons”: quality Uncertainty and the Market Mechanism, Quarterly Journal of Economics Vol. 84, No. 3, pp. 488-500.AkerlofG.A.1970The Market for “Lemons”: quality Uncertainty and the Market MechanismQuarterly Journal of EconomicsVol84No.3pp48850010.2307/1879431Search in Google Scholar

Aliya Sternstein. (2015), Obama’s New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with Agencies Nextgov Available at: http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cyber-counterterrorism-center/105051/ [Accessed May 22, 2016].Aliya Sternstein2015Obama’s New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with AgenciesNextgov. Available at:http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cyber-counterterrorism-center/105051/[Accessed May 22, 2016].Search in Google Scholar

Anderson, R., Anderson, R. (2001), Why Information Security is Hard, Annual Computer Security Applications Conference Available at: www.cl.cam.ac.uk/~rja14/#Econ.AndersonR.AndersonR.2001Why Information Security is HardAnnual Computer Security Applications Conference. Available at:www.cl.cam.ac.uk/~rja14/#Econ.Search in Google Scholar

Barney, J. (1991), Firm resources and sustained competitive advantage, Journal of Management Vol. 17, No. 1, pp. 99-120. Available at: http://jom.sagepub.com/cgi/doi/10.1177/014920639101700108.BarneyJ.1991Firm resources and sustained competitive advantageJournal of Management, Vol. 17, No. 1, pp. 99-120. Available at:http://jom.sagepub.com/cgi/doi/10.1177/014920639101700108.Search in Google Scholar

Barnum, S. (2014), STIX Whitepaper. Available at: http://stixproject.github.io/getting-started/whitepaper [Accessed December 23, 2015].BarnumS.2014STIX Whitepaper. Available at:http://stixproject.github.io/getting-started/whitepaper[Accessed December 23, 2015].Search in Google Scholar

Ben Aissa, A., Abercrombie, R.K., Sheldon, F.T., Mili, A. (2010), Quantifying security threats and their potential impacts: a case study, Innovations in Systems and Software Engineering Vol. 6, No. 4, pp. 269-281.Ben AissaA.AbercrombieR.K.SheldonF.T.MiliA.2010Quantifying security threats and their potential impacts: a case studyInnovations in Systems and Software EngineeringVol6No.4pp26928110.1007/s11334-010-0123-2Search in Google Scholar

Berners-lee, T.I.M., Hendler, J., Lassila, O.R.A. (2001), The Semantic Web, Scientific American Vol. 284(May), pp. 1-4. Available at: http://www.nature.com/doifinder/10.1038/scientificamerican0501-34.Berners-leeT.I.M.HendlerJ.LassilaO.R.A.2001The Semantic WebScientific American, Vol. 284(May), pp. 1-4. Available at:http://www.nature.com/doifinder/10.1038/scientificamerican0501-34.Search in Google Scholar

Böhme, R. (2005), Vulnerability markets what is the economic value of a zero-day exploit? In Chaos Communication Congress (December), pp. 27-30. Available at: https://events.ccc.de/congress/2005/fahrplan/attachments/542-Boehme2005_22C3_VulnerabilityMarkets.pdf.BöhmeR.2005Vulnerability markets what is the economic value of a zero-day exploit? In Chaos Communication Congress(December), pp. 27-30. Available at:https://events.ccc.de/congress/2005/fahrplan/attachments/542-Boehme2005_22C3_VulnerabilityMarkets.pdf.Search in Google Scholar

David, P.A. (1990), The Dynamo and the Computer: an Historical Perspective on the Modern Productivity Paradox, American Economic ReviewDavidP.A.1990The Dynamo and the Computer: an Historical Perspective on the Modern Productivity ParadoxAmerican Economic ReviewSearch in Google Scholar

Gordon, L., Loeb, M.P., Sohail, T. (2003), A Framework for using insurance for cyber-risk management, Communications of the ACM Vol. 46, No. 3, pp. 81-85.GordonL.LoebM.P.SohailT.2003A Framework for using insurance for cyber-risk managementCommunications of the ACMVol46No.3pp818510.1145/636772.636774Search in Google Scholar

Hardin, J.G. (2006), The tragedy of the commons, Environmental Issues: Essential Primary Sources Vol. 162, December, pp. 64-68. Available at: http://find.galegroup.com/gic/infomark.do?&source=gale&idigest=0f0174f8fbc32fe7c817214d754d9f0e&prodId=GIC&userGroupName=c_gic&tabID=T0011&docId=CX3456400036&type=retrieve&contentSet=EBKS&version=1.0.HardinJ.G.2006The tragedy of the commonsEnvironmental Issues: Essential Primary Sources, Vol. 162, December, pp. 64-68. Available at:http://find.galegroup.com/gic/infomark.do?&source=gale&idigest=0f0174f8fbc32fe7c817214d754d9f0e&prodId=GIC&userGroupName=c_gic&tabID=T0011&docId=CX3456400036&type=retrieve&contentSet=EBKS&version=1.0.Search in Google Scholar

Kramer, M.R., Pfitzer, M.W. (2016), The ecosystem of shared value, Harvard Business Review October, pp. 1-11. Available at: http://www.fsg.org/publications/ecosystem-shared-value?utm_source=fsg&utm_medium=email&utm_campaign=201609ecosystemofsharedvalue#download-area.KramerM.R.PfitzerM.W.2016The ecosystem of shared valueHarvard Business Review, October, pp. 1-11. Available at:http://www.fsg.org/publications/ecosystem-shared-value?utm_source=fsg&utm_medium=email&utm_campaign=201609ecosystemofsharedvalue#download-area.Search in Google Scholar

Lusch, R.F. (2006), Service-dominant logic: reactions, reflections and refinements, Marketing Theory Vol. 6, No. 3, pp. 281-288.LuschR.F.2006Service-dominant logic: reactionsreflections and refinements, Marketing TheoryVol6No.3pp281288Search in Google Scholar

Magnusson, C., Molvidsson, J., Zetterqvist, S. (2007), Value creation and return on security investments (ROSI), IFIP International Federation for Information Processing Vol. 232, pp. 25-35.MagnussonC.MolvidssonJ.ZetterqvistS.2007Value creation and return on security investments (ROSI)IFIP International Federation for Information ProcessingVol232pp253510.1007/978-0-387-72367-9_3Search in Google Scholar

Miller, C. (2007), The Legitimate Vulnerability Market Inside the Secretive World of 0-day Exploit Sales. In Workshop on the Economics of Information Security, Pittsburgh, PA pp. 1-10. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.5718.MillerC.2007The Legitimate Vulnerability Market Inside the Secretive World of 0-day Exploit Sales. In Workshop on the Economics of Information SecurityPittsburgh, PA. pp. 1-10. Available at:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.5718.Search in Google Scholar

Moitra, S. D., & Konda, S. L. (2000). A simulation model for managing survivability of networked information systems (No. CMU/SEI-2000-TR-021). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.MoitraS. D.&KondaS. L.2000A simulation model for managing survivability of networked information systems(No. CMU/SEI-2000-TR-021). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST10.21236/ADA387453Search in Google Scholar

Permanent Select Committee on Intelligence. (2012), Cyber Intelligence Sharing and Protection Act Report together with Minority Views to Accompany H.R. 3523 Available at: http://www.gpo.gov/fdsys/pkg/CRPT-112hrpt445/pdf/CRPT-112hrpt445.pdf.Permanent Select Committee on Intelligence2012Cyber Intelligence Sharing and Protection Act Report together with Minority Views to Accompany H.R. 3523Available at:http://www.gpo.gov/fdsys/pkg/CRPT-112hrpt445/pdf/CRPT-112hrpt445.pdf.Search in Google Scholar

Porter, M.E., Kramer, M.R. (2006), Strategy & society, Harvard Business Review 84, December, pp. 78-92.PorterM.E.KramerM.R.2006Strategy & societyHarvard Business Review84December, pp.7892Search in Google Scholar

Porter, M.E., Kramer, M.R. (2011), Creating shared value, Harvard Business Review Vol. 89, No. 1-2.PorterM.E.KramerM.R.2011Creating shared valueHarvard Business ReviewVol89No1210.1007/978-94-024-1144-7_16Search in Google Scholar

Shadbolt, N., Berners-Lee, T., Hall, W. (2006), The semantic web revisited, IEEE Intelligent Systems Vol. 21, No. 3, pp. 96-101. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1637364.ShadboltN.Berners-LeeT.HallW.2006The semantic web revisitedIEEE Intelligent Systems, Vol. 21, No. 3, pp. 96-101. Available at:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1637364.Search in Google Scholar

Shapiro, C., Varian, H. R., Becker, W. E. (1999). Information rules: a strategic guide to the network economy Journal of Economic Education, 30, 189-190.ShapiroC.VarianH. R.BeckerW. E.1999Information rules: a strategic guide to the network economyJournal of Economic Education3018919010.2307/1183273Search in Google Scholar

Soo Hoo, K., Sudbury, A.W., Jaquith, A.R. (2001), Tangible ROI through secure software engineering, Secure Business Quarterly Vol. 1, No. 2.Soo HooK.SudburyA.W.JaquithA.R.2001Tangible ROI through secure software engineeringSecure Business QuarterlyVol1No2Search in Google Scholar

The White House & Secretary, Office of the Press. (2015), Cyber Threat Intelligence Integration Center. Available at: https:// www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center<http://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center> [Accessed May 19, 2016].The White House & Secretary, Office of the Press2015Cyber Threat Intelligence Integration CenterAvailable athttps://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center<http://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center>[Accessed May 19, 2016].Search in Google Scholar

W3C. (n.d.), What is the Semantic Web. W3C Semantic Web Activity Available at: http://www.w3.org/2001/sw/[AccessedAugust 16, 2015].W3C. (n.d.), What is the Semantic WebW3C Semantic Web ActivityAvailable athttp://www.w3.org/2001/sw/[AccessedAugust16, 2015].Search in Google Scholar

Wei, H., Frinke, D., Carter, O., Ritter, C. (2001), Cost-benefit analysis for network intrusion detection systems. In CSI 28th Annual Computer Security Conference pp. 29-31.WeiH.FrinkeD.CarterO.RitterC.2001Cost-benefit analysis for network intrusion detection systemsInCSI 28th Annual Computer Security Conferencepp2931Search in Google Scholar