论文标题
中小企业对安全信息共享的机密问题
SMEs' Confidentiality Concerns for Security Information Sharing
论文作者
论文摘要
但是,中小型企业被认为是欧盟经济的重要组成部分,但是极易受到网络攻击的影响。中小企业具有特定的特征,可以将它们与大公司分开,并影响他们对良好网络安全实践的采用。为了减轻中小型企业的网络安全采用问题并提高他们对网络威胁的认识,我们设计了一种自定进度的安全评估和能力改进方法Cysec。 CYSEC是一种安全意识和培训方法,它利用自我报告的问卷收集公司有关网络安全意识,实践和脆弱性的信息,以生成自动化的建议。但是,关于网络安全信息的保密问题会影响公司分享其信息的意愿。安全信息共享降低了事件的风险,并增加了用户在安全意识计划中的自我效能。本文为中小企业的七名首席信息安全官提供了半结构化访谈的结果,以评估在线同意交流对信息共享动机的影响。根据自我确定理论分析了结果。研究结果表明,在线同意有多种选择,以指示适当的协议改进信息共享的动机。这使许多中小企业可以参与安全信息共享活动,并支持安全专家更好地概述常见漏洞。最终出版物可在Springer通过https://doi.org/10.1007/978-3-3-030-57404-8_22获得
Small and medium-sized enterprises are considered an essential part of the EU economy, however, highly vulnerable to cyberattacks. SMEs have specific characteristics which separate them from large companies and influence their adoption of good cybersecurity practices. To mitigate the SMEs' cybersecurity adoption issues and raise their awareness of cyber threats, we have designed a self-paced security assessment and capability improvement method, CYSEC. CYSEC is a security awareness and training method that utilises self-reporting questionnaires to collect companies' information about cybersecurity awareness, practices, and vulnerabilities to generate automated recommendations for counselling. However, confidentiality concerns about cybersecurity information have an impact on companies' willingness to share their information. Security information sharing decreases the risk of incidents and increases users' self-efficacy in security awareness programs. This paper presents the results of semi-structured interviews with seven chief information security officers of SMEs to evaluate the impact of online consent communication on motivation for information sharing. The results were analysed in respect of the Self Determination Theory. The findings demonstrate that online consent with multiple options for indicating a suitable level of agreement improved motivation for information sharing. This allows many SMEs to participate in security information sharing activities and supports security experts to have a better overview of common vulnerabilities. The final publication is available at Springer via https://doi.org/10.1007/978-3-030-57404-8_22