Article Review: Security Information Sharing

  1. how the topic relates to the principles of the social sciences
  2. the study’s research questions or hypotheses
  3. the types of research methods used
  4. the types of data and analysis done
  5. how concepts discussed in class relate to the article
  6. how the topic relates to the challenges, concerns, and
    contributions of marginalized groups
  7. the overall contributions of the studies to society.

To share or not to share: a behavioral perspective on human participation in security information sharing discusses the issue regarding human participation in security information sharing (SIS). Information sharing can help society protect itself from hackers. From security hygiene to software, organizations can know what to do and what not to do when going online. With security being breached, companies need a way to protect themselves, and what better way to help them than other company sharing their security information? The research had a total of 9 hypotheses regarding perspective and emotions. They make a hypothesis based on previous research and create new claims based on previous research. The theory includes attitude, reciprocity, execution cost, reputation, trust, and interaction effects. Each of these relates to information sharing. They collect information based on interactions and surveys. The people are free to communicate, and only the essential parts of the conversation are recorded. Any private information was recorded but not listed for information. The researchers had an ethical neutrality and objectivism view to observe the interaction fully. They made variables that can affect the overall conversation. The researchers discovered that some of their hypothesis was fully supported while most were partially supported. The research was the first study to “associates the self-reported sharing of sensitive information among real individuals.” In conclusion, the research help researcher understands the interaction and behavior between two individuals who share security information.

Link to Paper: https://academic.oup.com/cybersecurity/article/5/1/tyz006/5554880

Leave a Reply

Your email address will not be published. Required fields are marked *