{"id":"https://openalex.org/W7125431933","doi":"https://doi.org/10.1007/s10207-025-01165-2","title":"Share and benefit: incentives for cyber threat intelligence sharing","display_name":"Share and benefit: incentives for cyber threat intelligence sharing","publication_year":2026,"publication_date":"2026-01-22","ids":{"openalex":"https://openalex.org/W7125431933","doi":"https://doi.org/10.1007/s10207-025-01165-2"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01165-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01165-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01165-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01165-2.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055772239","display_name":"Tobias Reittinger","orcid":"https://orcid.org/0000-0001-7458-9928"},"institutions":[{"id":"https://openalex.org/I60668342","display_name":"University of Regensburg","ror":"https://ror.org/01eezs655","country_code":"DE","type":"education","lineage":["https://openalex.org/I60668342"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Tobias Reittinger","raw_affiliation_strings":["University of Regensburg, Universit\u00e4tsstr. 31, Regensburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Regensburg, Universit\u00e4tsstr. 31, Regensburg, Germany","institution_ids":["https://openalex.org/I60668342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123575750","display_name":"Johannes Grill","orcid":null},"institutions":[{"id":"https://openalex.org/I60668342","display_name":"University of Regensburg","ror":"https://ror.org/01eezs655","country_code":"DE","type":"education","lineage":["https://openalex.org/I60668342"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Johannes Grill","raw_affiliation_strings":["University of Regensburg, Universit\u00e4tsstr. 31, Regensburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Regensburg, Universit\u00e4tsstr. 31, Regensburg, Germany","institution_ids":["https://openalex.org/I60668342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105690222","display_name":"G\u00fcnther Pernul","orcid":null},"institutions":[{"id":"https://openalex.org/I60668342","display_name":"University of Regensburg","ror":"https://ror.org/01eezs655","country_code":"DE","type":"education","lineage":["https://openalex.org/I60668342"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"G\u00fcnther Pernul","raw_affiliation_strings":["University of Regensburg, Universit\u00e4tsstr. 31, Regensburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Regensburg, Universit\u00e4tsstr. 31, Regensburg, Germany","institution_ids":["https://openalex.org/I60668342"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055772239"],"corresponding_institution_ids":["https://openalex.org/I60668342"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23234862,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3605000078678131,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3605000078678131,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.17790000140666962,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13204","display_name":"Competitive and Knowledge Intelligence","score":0.07660000026226044,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.8862000107765198},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.7554000020027161},{"id":"https://openalex.org/keywords/compensation","display_name":"Compensation (psychology)","score":0.46219998598098755},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35850000381469727},{"id":"https://openalex.org/keywords/knowledge-sharing","display_name":"Knowledge sharing","score":0.350600004196167},{"id":"https://openalex.org/keywords/skepticism","display_name":"Skepticism","score":0.3431999981403351}],"concepts":[{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.8862000107765198},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.7554000020027161},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5720999836921692},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5418000221252441},{"id":"https://openalex.org/C2780023022","wikidata":"https://www.wikidata.org/wiki/Q1338171","display_name":"Compensation (psychology)","level":2,"score":0.46219998598098755},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.382999986410141},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3625999987125397},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35850000381469727},{"id":"https://openalex.org/C2776604539","wikidata":"https://www.wikidata.org/wiki/Q6423395","display_name":"Knowledge sharing","level":2,"score":0.350600004196167},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.3467999994754791},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.34360000491142273},{"id":"https://openalex.org/C18296254","wikidata":"https://www.wikidata.org/wiki/Q1395219","display_name":"Skepticism","level":2,"score":0.3431999981403351},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.32170000672340393},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.28060001134872437},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.2775999903678894},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.2775000035762787},{"id":"https://openalex.org/C33199155","wikidata":"https://www.wikidata.org/wiki/Q2277143","display_name":"Sharing economy","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.2549999952316284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-01165-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01165-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01165-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01165-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01165-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01165-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125431933.pdf","grobid_xml":"https://content.openalex.org/works/W7125431933.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1592720958","https://openalex.org/W2045661289","https://openalex.org/W2159424130","https://openalex.org/W2407300725","https://openalex.org/W2506299962","https://openalex.org/W2517839752","https://openalex.org/W2533698187","https://openalex.org/W2538865281","https://openalex.org/W2617664835","https://openalex.org/W2760313715","https://openalex.org/W2884325794","https://openalex.org/W2895484796","https://openalex.org/W2897842237","https://openalex.org/W2964522977","https://openalex.org/W2973601119","https://openalex.org/W2989768959","https://openalex.org/W3005980542","https://openalex.org/W3009066821","https://openalex.org/W3010829176","https://openalex.org/W3036588308","https://openalex.org/W3040131533","https://openalex.org/W3112196969","https://openalex.org/W3123282572","https://openalex.org/W3215828174","https://openalex.org/W4312751513","https://openalex.org/W4385692197","https://openalex.org/W4388857646","https://openalex.org/W4391725254","https://openalex.org/W4396993846","https://openalex.org/W4404779237","https://openalex.org/W4407208114","https://openalex.org/W4411580157"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Cyber":[1],"threat":[2,10],"intelligence":[3],"(CTI)":[4],"provides":[5],"actionable":[6],"insights":[7],"into":[8],"the":[9,32,111],"landscape,":[11],"helping":[12],"organizations":[13,67,173],"strengthen":[14],"their":[15,41,148],"defenses.":[16],"Because":[17],"commercial":[18],"CTI":[19,38,71,125],"is":[20,108],"costly,":[21],"inter-organizational":[22],"sharing":[23,39,45],"can":[24,167,174],"reduce":[25],"expenses,":[26],"yet":[27],"adoption":[28],"remains":[29,47],"limited.":[30],"Still,":[31],"design":[33,62],"of":[34,114],"effective":[35],"incentives":[36,141,166],"for":[37,123],"and":[40,61,78,95,126,136,146,176],"embedding":[42],"in":[43,142,150],"a":[44,92,105,127,143],"platform":[46,144],"underexplored.":[48],"We":[49,64,138],"conducted":[50],"15":[51],"semi-structured":[52],"interviews":[53],"with":[54,72,154],"security":[55,155],"professionals":[56],"to":[57,69,75,98,134,161],"elicit":[58],"incentive":[59],"requirements":[60],"options.":[63],"find":[65],"that":[66,86,130,164],"prefer":[68],"share":[70,175],"known":[73],"recipients":[74],"build":[76],"trust":[77],"support":[79],"GDPR":[80],"compliance.":[81],"They":[82],"also":[83],"value":[84],"mechanisms":[85],"lower":[87],"coordination":[88],"costs,":[89],"such":[90],"as":[91],"reputation":[93],"system":[94],"price":[96],"guidance":[97],"help":[99],"prioritize":[100],"scarce":[101],"analyst":[102],"time.":[103],"Further,":[104],"major":[106],"barrier":[107],"skepticism":[109],"about":[110],"net":[112],"benefits":[113],"sharing.":[115],"To":[116],"address":[117],"this,":[118],"we":[119],"propose":[120],"financial":[121],"compensation":[122],"contributed":[124],"marketing":[128],"label":[129],"signals":[131],"proactive":[132],"cybersecurity":[133],"partners":[135],"customers.":[137],"implemented":[139],"these":[140],"prototype":[145],"assessed":[147],"effects":[149],"14":[151],"hands-on":[152],"sessions":[153],"experts.":[156],"Participants":[157],"reported":[158],"increased":[159],"willingness":[160],"share,":[162],"suggesting":[163],"well-designed":[165],"catalyze":[168],"CTI-sharing":[169],"ecosystems.":[170],"Put":[171],"simply,":[172],"benefit.":[177]},"counts_by_year":[],"updated_date":"2026-03-10T14:07:55.174380","created_date":"2026-01-23T00:00:00"}
