Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.5.1167

Factors that Affect Sharing Cyber Threat Information in South Korea  

Kim, Ha-Young (Cyberone Inc.)
Kim, Tae-Sung (Chungbuk National University)
Abstract
The purpose of this study is to investigate the factors affecting cyber threat information provision in order to activate cyber threat information sharing in Korea. In particular, we looked at the intention to provide simple information and important information according to the importance of information. The research method was conducted on the information security practitioners' online survey in terms of users of information sharing system. And empirical analysis was conducted. As a result of the study, only the CEO's attitude influenced the intention to provide simple information. On the other hand, important information was influenced not only by the CEO's attitude but also by the information evaluation system, privatization, and mitigating legal penalties. The results of this study can identify the problems of the cyber threat information sharing system in Korea. And we can confirm the priority of improvement and the change of information providing intention before and after improvement of information sharing system.
Keywords
Information Sharing; Cyber Threat; Intent to Provide Information;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 A. Aviram and A. Tor, "Overcoming impediments to information sharing," Alabama Law Review, 55, 231, 2004.
2 Boannews, "Truth and falsity of information sharing for malicious code and security vulnerability," 25 Apr. 2015.
3 Oh-jun Yoon, Chang-seob Cho, Jeong-keun Park, Hyung-jun Seo and Yong-tae Shin, "A study on the improvement model for invigorating cyber threat information sharing," Convergence Security Journal, 16(4), 25-34, 2016.
4 Ae-chan Kim and Dong-hoon Lee, "A study on the priority of requirements for establishing effective cyber-threat information sharing system," Review of Korea Institute of Information Security and Cryptology, 26(1), 61-67. 2016.
5 Hong-jong Jang, In-jae Park and Jung-hyun Lee, "A study on implementation of information sharing and analysis center for e-government," Proceeding of The 2001 Fall Conference of the Korea Information Processing Society, 2001.
6 Seong-hun Go, "A study on factors motivating cyber security information sharing for responding preemptively to cyber terror threat of national organizations," Doctoral Dissertation, Soongsil University, 2015.
7 You-joong Kwon, "Study on North Korea's cyber warfare capability and response strategy of South Korea," Master Dissertation, Korea University, 2014.
8 L. Dandurand and O.S. Serrano, "Towards improved cyber security information sharing," Proceedings of International Conference on Cyber Conflict, IEEE, 2013.
9 D. Tosh, S. Sengupta, C. Kamhoua, K. Kwiat and A. Martin, "An evolutionary game-theoretic framework for cyber-threat information sharing," Proceedings of IEEE International Conference on Communications, 2015.
10 Boannews, "Sharing Security Threat Information ISAC, What is the most urgent reason for the medical field?", 11 Sep. 2016.
11 Dong-wook Kim and Kun Yoon, "A study on information sharing: focusing on creative commons license," Journal of Koran Association for Regional information Society, 13(4), 53-74, 2010.
12 Duke-hoon Jeong and Hyoung-seop Shim, "A study on information sharing system for information application on the public institutions," Journal of Finance & Knowledge Studies, 3(1), 223-235, 2005.
13 Gu Kim, "A study on weights of intentions to share information among officials by AHP," Korean Society of Public Administration, 15(3), 207-228, 2004.
14 Sang-yun Han and Hyun-min Kang, "Enhancing information sharing activities in local government," The Korea Local Administration Review, 21(1), 97-122, 2007.
15 L. Caffrey, Information Sharing between & within Governments, The International Council for Technology in Government Administration, London, 1998.
16 S.S. Dawes and L. Prefontaine, "Understanding new models of collaboration for delivering government services," Communications of the ACM, 46(1), 40-42, 2003.
17 HelloT Advanced News, "Pay attention to the fourth industrial revolution platform, 'security'", 30 Sep. 2016.
18 Information Sharing Analysis Center, http://www.isac.or.kr/.
19 KISA(Korea Internet & Security Agency), "Conference on information sharing of cyber incidents," 2014.
20 KISA(Korea Internet & Security Agency), "Conference on information sharing of cyber incidents," 2015.
21 ISMS / PIMS / G-ISMS certification, http://isms.kisa.or.kr/.
22 Ministry of Science, ICT and Future Planning, Key Policies for Information Protection, 2016.
23 Jae-eun Lee and Gyum-hun Kim, "An analysis of the information sharing determinants in the NDMS," Modern Society and Administration, 17(1), 155-185, 2007.
24 J.R. Gil-Garcia, C. Schneider, T.A. Pardo and A.M. Cresswell, "Interorganizational information integration in the criminal justice enterprise: preliminary lessons from state and county initiatives," Proceedings of Hawaii International Conference on System Sciences, IEEE, 2005.
25 R.M. Grant, "Toward a knowledge-based theory of the firm," Strategic Management Review, 17(52), 109-122, 1996.
26 Cheol-u Lee, Proposal for Cyber Threat Information Sharing Act, 2015.
27 R-CISC, https://r-cisc.org/.
28 Ministry of Government Administration and Home Affairs, Understanding the Personal Information Protection Act: Focusing on What is Different from the Present, 2011.
29 National Council of ISACs, http://www.nationalisacs.org/.
30 US-CERT(AIS), http://www.us-cert.gov/ais/.
31 Telecom-ISAC Japan, https://www.telecom-isac.jp/.
32 IPA, Cyber Information Sharing Initiative (J-CSIP) FY 2012 Activity Report, 2013.
33 IPA, Cyber Information Sharing Initiative (J-CSIP) Operational Status [July-September 2016], 2016.
34 Jung-wook Moon, "Factors of success and failure of information sharing in the public sector: Focused on cognition survey of public officials," Korea Information Society Development Institute, 19(6), 1-17, 2007.
35 Eun-jeong Kim, "Analyzing the determining factors of electronic information sharing in korean government using the structural equation model," Korean Public Administration Review, 38(4), 125-145, 2004.
36 S. Ransbotham, S. Mitra and J. Ramsey, "Are markets for vulnerabilities effective?," MIS Quarterly, 36(1), 43-64, 2012.
37 NIST, Guide to Cyber Threat Information Sharing, 2014.
38 HSAC, Info-sharing Final Report, 2005.
39 Min-ho Kim, "A study on entrusting public service to private sector and privatization of public corporations," Korean Public Land Law Association, 25(1), 267-285, 2005.
40 W. Zhao and G. White, "Designing a formal model facilitating collaborative information sharing for community cyber security," Proceedings of Hawaii International Conference on System Sciences. IEEE, 2014.
41 ENISA(European Network and Information Security Agency), Cyber Security Information Sharing: An Overview of Regulatory and Non-regulatory Approaches," 2015.
42 I. Ajzen, "The theory of planned behavior," Organizational Behavior and Human Decision Processes, 50(2), 179-211, 1991.   DOI
43 MNE7(Multi-national Experiment 7), "Information sharing framework outcome 3," Cyber Domain Objective, 2013.
44 S. Li and B. Lin, "Accessing information sharing and information quality in supply chain management," Decision Support Systems, 42(3), 1641-1656, 2006.   DOI
45 R.E. Walton, Up and Running: Integrating Information Technology and the Organization, Boston, MA: Harvard Business School Press, 1989.
46 I. Ajzen, From Intentions to Actions: A theory of Planned Behavior, Berlin Heidelberg: Springer, 1985.
47 Byeong-seon Choi, "Government-led economic and social administration and administrative ethics," Korean Journal of Public Administration, 39(4), 81-111, 2001.
48 Etnews, "Cyber threat information 'Need to secure reliability''," 30 Nov. 2015.
49 W.W. Chin, "The partial least squares approach to structural equation modeling," Modern Methods for Business Research, 295(2), 295-336, 1998.
50 Pal-sul Kim, Kwan-soo Hong and Byoung-chan Lee, "Antecedents and relationship effectiveness of information sharing within supply chains," Journal of Business Research, 19(4), 273-307, 2004.
51 C. Fornell and D.F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, 18(1), 39-50, 1981.   DOI
52 Jin-chun Lee, "Structural equation modelling for small samples: component- based SEM vs. covariance-based SEM," Journal of Decision Science, 16(1), 77-95, 2008.
53 D. Gefen, D.W. Straub and M.C. Boudreau, "Structural equation modeling and regression : Guidelines for research practice," Communications of the AIS, 4(7), 1-79, 2000.
54 C. Fornell and F.L. Bookstein, "Two structural equation models: LISREL and PLS applied to consumer exit-voice theory," Journal of Marketing Research, 19(4), 440-452, 1982.   DOI
55 D. Barclay, C. Higgins and R. Thompson, "The Partial Least Squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration," Technology Studies, 2(2), 285-309, 1995.
56 I.H. Bernstein and J.C. Nunnally, Psychometric Theory, New York: McGraw-Hill, 1994.
57 Seo-il Chae, Social Science Research Methodology, B&M Books, 2005.
58 ITWorld Korea, "CSO wants to share cyber threat information, but does not want law," 24 Sep. 2015.
59 W.W. Chin and A. Gopal, "Adoption intention in GSS: Relative importance of beliefs," ACM SigMIS Database, 26(2-3), 42-64, 1995.   DOI
60 R.F. Falk and N.B. Miller, A Primer for Soft Modeling, University of Akron Press, 1992.
61 G.W. Bock, R.W. Zmud, Y.G. Kim and J.N. Lee, "Behavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate," MIS Quarterly, 29(1), 87-111, 2005.   DOI
62 Tong-hee Park and Young-ran Hyun, "Sharing and utilization of knowledge and information among nonprofit organizations through public web portal: case study of culture portal of national knowledge information system," Modern Society and Administration, 21(3), 1-33, 2011.
63 D. Liu, Y. Ji and V. Mookerjee, "Knowledge sharing and investment decisions in information security," Decision Support Systems, 52(1), 95-107, 2011.   DOI
64 G.W. Bock and Y.G. Kim, "Breaking the myths of rewards: An exploratory study of attitudes about knowledge sharing," Proceedings of Pacific Asia Conference on Information Systems, 2001.
65 H.F. Lin, "Effects of extrinsic and intrinsic motivation on employee knowledge sharing intentions," Journal of Information Science, 33(2), 135-149, 2007.   DOI
66 S.S. Chen, Y.W. Chuang and P.Y. Chen, "Behavioral intention formation in knowledge sharing: examining the roles of KMS quality, KMS self-efficacy, and organizational climate," Knowledge-Based Systems, 31(1), 106-118, 2012.   DOI
67 H.F. Lin, "Knowledge sharing and firm innovation capability: an empirical study," International Journal of Manpower, 28(3/4), 315-332, 2007.   DOI
68 K.M. Bartol and A. Srivastava, "Encouraging knowledge sharing: The role of organizational reward systems," Journal of Leadership & Organizational Studies, 9(1), 64-76, 2002.   DOI
69 L.A. Gordon, M.P. Loeb and W. Lucyshyn, "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, 22(6), 461-485, 2003.   DOI
70 G.B. White and D.J. DiCenso, "Information sharing needs for national security," Proceedings of Hawaii International Conference on System Sciences, IEEE, 2005.
71 E. Gal-Or and A. Ghose, "The economic consequences of sharing security information," In Economics of Information Security, 95-104, Springer US, 2004.
72 E. Gal-Or and A. Ghose, "The economic incentives for sharing security information," Information Systems Research, 16(2), 186-208, 2005.   DOI
73 Chul-soo Lee, "National security system for countering information incidents," Review of Korea Institute of Information Security and Cryptology, 15(1), 33-40, 2005.
74 Dong-jin Kim and Sung-je Cho, "An analysis of domestic and foreign security vulnerability management systems based on a national vulnerability databases," Internet and Information Security, 1(2), 130-147, 2010.
75 Oh-jun Yoon, Kwang-yong Bae, Jae-hong Kim, Hyung-jun Seo and Yong-tae Shin, "A study on measures for strengthening cybersecurity through analysis of cyberattack response," Convergence Security Journal, 15(4), 71-78, 2015.
76 Sang-oh Kim and Sun-hee Youn, "A study on the effects of preceding factor of information sharing, information sharing and risk information sharing on supply chain performance," Journal of The Korean Production and Operations Management Society, 18(4), 117-146, 2007.
77 Jae-sun Wang and Jung-wook Moon, "The attitude on information sharing between public agencies: Focusing on the perception of civil servants in central government," Journal of Korean Association for Regional Information Society, 16(1), 1-34, 2013.
78 D.F. Vazquez, O.P. Acosta, C. Spirito, S. Brown, and E. Reid, "Conceptual framework for cyber defense information sharing within trust relationships," Proceedings of International Conference on Cyber Conflict, IEEE, 2012.
79 Boannews, "Just talk about a lot of information, why it is not working properly", 20 June 2016.
80 Dong-man Lee and Hyun-sun Park, "The effects of individual psychological and social motivation factors on information sharing intention through social media," The Journal of Internet Electronic Commerce Research, 11(2), 1-21, 2011.   DOI
81 Jang-gwen Song and Gwang-suk Kim, "The performance formation model through information sharing: The effect of asset specificity and information sharing on SCM(Supply Chain Management) performance," Journal of The Korean Production and Operations Management Society, 21(1), 101-121, 2010.
82 Moon-jung Kim and Gee-Hwan Kwon, "The effect of transactive memory system, knowledge sharing and knowledge application on performance," Korean Corporation Management Review, 63(1), 249-267, 2015.
83 M.H.M. Javadi, N.D. Zadeh, M. Zandi and J. Yavarian, "Effect of motivation and trust on knowledge sharing and effect of knowledge sharing on employee's performance," International Journal of Human Resource Studies, 2(1), 210-221. 2012.   DOI