<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Casper Almén</style></author><author><style face="normal" font="default" size="100%">Nicholas Hagström</style></author><author><style face="normal" font="default" size="100%">Jyri Rajamäki</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">early warning system</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO project</style></keyword><keyword><style  face="normal" font="default" size="100%">energy sector</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">11-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The purpose of this case study is to bring lessons learned from the ECHO project to the DYNAMO project in the energy sector. The main research question is how to understand the ECHO Early Warning System as a tool for the prevention of cybercrime as well as cyber incident coordination and response in the context of the energy sector. The applied sources of evidence are the DYNAMO project proposal, public ECHO deliverables, scientific publications available via the ECHO web pages, and other materials available via the ECHO web pages. The study shows that ECHO Early Warning System can be a very valuable tool, and it also finds examples of how to utilize E-EWS in practice. The main conclusion is that situation awareness, together with Early Warning Systems, is a powerful combination that can facilitate the fight against cybercrime.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jyri Rajamäki</style></author><author><style face="normal" font="default" size="100%">Vasilis Katos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">case study</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">early warning system</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing models</style></keyword><keyword><style  face="normal" font="default" size="100%">trust models</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">198-214</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">An Early Warning System (EWS) for cybersecurity intelligence will provide the capability to share information to provide up to date information to all constituents involved in the EWS. The development of EWSs will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain as well as models from other domains. This article is the result of a qualitative multiple-case study analysis. It consists of theory development by systematic reviews of academic articles, seven case studies, and cross-case conclusions, from which a set of system requirements and features were established to support a model that promotes information sharing among partners, while also meeting regulatory requirements. Moreover, the final analysis includes the requirements for information sharing within and between partners across organisational boundaries as derived from multi-sector analysis. The study consists of a comprehensive review of information sharing and trust models from within the cyber domain (n &gt; 50), as well as models from other domains, such as healthcare, maritime and critical infrastructure protection.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">198</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Andriy Volkoviy</style></author><author><style face="normal" font="default" size="100%">Ilya Tikhov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Use of Mobile Applications in Security and Safety Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">alarm receiving system.</style></keyword><keyword><style  face="normal" font="default" size="100%">early warning system</style></keyword><keyword><style  face="normal" font="default" size="100%">GPS</style></keyword><keyword><style  face="normal" font="default" size="100%">Mobile phone</style></keyword><keyword><style  face="normal" font="default" size="100%">RSS</style></keyword><keyword><style  face="normal" font="default" size="100%">smartphone</style></keyword><keyword><style  face="normal" font="default" size="100%">Web-service</style></keyword><keyword><style  face="normal" font="default" size="100%">XML</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">12</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">146-153</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents an analysis of the possibilities of using the mobile devices (especially smartphones) with specialized software as parts of distributed systems that perform security and/or safety functions. It provides an overview of mobile-based security and safety applications. Finally, it outlines a generalized model of security and safety systems based on Web-services or systems of mobile phone network operators.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>