{"id":365,"date":"2025-11-25T17:04:44","date_gmt":"2025-11-25T17:04:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ankaya\/?page_id=365"},"modified":"2025-11-25T17:05:53","modified_gmt":"2025-11-25T17:05:53","slug":"article-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ankaya\/article-2\/","title":{"rendered":"Article 2"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Promoting Research on Cyber Threat Intelligence Sharing in Ecosystems<\/h1>\n\n\n\n<p><br><br>Introduction<br>The article by Abraham, B\u00e9langer, and Daultrey, (2025) focuses at the technological, social,<br>and psychological aspects that influence what companies interact with Cyber Threat<br>Intelligence (CTI). Based on interviews with forty cybersecurity experts, the report<br>pinpoints eleven key elements that influence the results of CTI sharing. A conceptual<br>framework that broadens the study of trust, reciprocity, and governance in cybersecurity<br>ecosystems is put forth by the authors.<br>Relation to Social Science Principles<br>Social sciences&#8217; behavioral, ethical, and social interaction concepts are closely related to this<br>subject. It investigates how digital security choices are influenced by human trust, risk<br>perception, and teamwork. The essay also incorporates ideas from sociological (inter-<br>organizational networks), ethics (balancing openness and privacy), and behavior in<br>organizations (group collaboration and information exchange). It illustrates how social<br>dynamics\u2014like reciprocity, trust, and fear of retaliation\u2014have a direct impact on<br>interactions that take place on technology.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Research Question \/ Hypothesis \/ Independent &amp; Dependent Variables<br>Research Questions: What factors influence an organization&#8217;s decision to disclose or keep<br>cyber threat intelligence private? What technological and psychological variables influence<br>the sharing of CTIs?<br>Theorem: Social and behavioral elements like reciprocity, trust, and governance maturity,<br>in addition to technology, restrict CTI sharing.<br>The independent variables: It includes trust (in people and technology), reciprocity, and<br>organizational maturity.<br>The dependent variables: It includes effectiveness and frequency of CTI sharing among<br>organizations.<br>Methods Used<br>Based mostly on structured and semi-structured interviews with cybersecurity specialists<br>from national authorities, Fortune 500 firms, academia, and law enforcement, the study<br>employed a mixed-methods qualitative design. Additionally, the writers thematically<br>analyzed the interview data and incorporated the results with previously published works.<br>Data and Analysis<br>Expert interviews, secondary reports, and pre-existing CTI frameworks were among the<br>data sources. To find key themes including actionability, reciprocity, and fear of retaliation,<br>the authors used qualitative coding. They then combined the data into a conceptual study<br>framework that linked organizational behavior to CTI efficacy.<br>Connection to Class Concepts<br>Cyber ethics, human-centered cybersecurity, digital trust, and risk management are among<br>the themes covered in class that have connections to the study. It supports the notion that<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>cybersecurity has psychological and social components in addition to technical ones.<br>The emphasis on Zero Trust (ZT) and collaborative ecosystems is consistent with lessons on<br>how human behavior and technology interact to produce safe systems.<br>Marginalized Groups<br>While the essay does not specifically address underrepresented populations, its<br>implications extend to global participation in cybersecurity ecosystems. Fair access to<br>information across countries and businesses is necessary for effective CTI sharing.<br>Participation restrictions are frequently encountered by smaller or less-resourced<br>organizations, underscoring the necessity of regulations that support equity, accessibility,<br>and diversity in cybersecurity cooperation.<br>Societal Contributions \/ Conclusion<br>By encouraging group cybersecurity protection via trust-based intelligence sharing, this<br>study benefits society. It pushes organizations and legislators to improve cooperation,<br>openness, and inclusivity in cyber ecosystems. By defining CTI as both a human and<br>technological issue, it promotes social science-informed cybersecurity strategies that<br>safeguard not only systems but also the people who use them.<br>Citation<br>Abraham, C., B\u00e9langer, F., &amp; Daultrey, S. (2025). Promoting research on cyber threat<br>intelligence sharing in ecosystems. Journal of Cybersecurity, 11(1), tyaf016.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>https:\/\/doi.org\/10.1093\/cybsec\/tyaf016<br>Article Link: https:\/\/academic.oup.com\/cybersecurity\/article\/11\/1\/tyaf016\/8244123<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Promoting Research on Cyber Threat Intelligence Sharing in Ecosystems IntroductionThe article by Abraham, B\u00e9langer, and Daultrey, (2025) focuses at the technological, social,and psychological aspects that influence what companies interact with Cyber ThreatIntelligence (CTI). Based on interviews with forty cybersecurity experts, the reportpinpoints eleven key elements that influence the results of CTI sharing. A conceptualframework that&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ankaya\/article-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31204,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/pages\/365"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/users\/31204"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/pages\/365\/revisions"}],"predecessor-version":[{"id":367,"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/pages\/365\/revisions\/367"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/media?parent=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}