Skip to main content

Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO

  • Conference paper
  • First Online:
Book cover Cyber Security and Privacy (CSP 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 530))

Included in the following conference series:

  • 826 Accesses

Abstract

A pressing challenge facing the cybersecurity and privacy research community is transitioning technical R&D into commercial and marketplace ready products and services. Responding to the need to develop a better understanding of how Privacy and CyberSecurity (PACS) market needs and overall technology innovation best-practice can be harmonized more effectively the contribution of this paper is centred upon uncovering PACS stakeholders’ innovation practices, requirements, and challenges and in doing so highlighting scope for innovation intervention supports. The research outputs impacts and has implications at various levels, most notably in terms of framing both innovator and firm-level innovation requirements within the PACS domain, which has relevance to academic and policy making audiences also. Additionally, given that the research outputs form a pivotal component of the IPACSO project, they will actively contribute to ongoing debates and objectives around shaping support measures for PACS innovation awareness, competency building and innovation policy support developments in the domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. EC, Cyber Security Strategy of the European union: An Open Safe and Secure Cyberspace (2013)

    Google Scholar 

  2. Maughan, D., Baleson, D., Lindqvist, U., Tudor, Z.: Crossing the “valley of death”: transitioning cybersecurity research into practice. J. IEES Secur. Priv. 11(2), 14–23 (2013)

    Article  Google Scholar 

  3. Tidd, J.: A Review of Innovation Models Discussion Paper 1, Science and Technology Policy Research Unit, Tanaka Business School, University of Sussex (2006)

    Google Scholar 

  4. Dooly, Z., Galvin, S., Power, J., Renard, B., Seldeslachts, U.: IPACSO: towards developing an innovation framework for ICT innovators in the privacy and cybersecurity markets. In: Cleary, F., Felici, M. (eds.) Cyber Security and Privacy. LNCS, vol. 470, pp. 148–158. Springer, Heidelberg (2014)

    Google Scholar 

  5. Garud, R., Kumaraswamy, A., Sambamurthy, V.: Emergent by design: performance and transformation at infosys technologies. Organ. Sci. 1(277), 277–286 (2006)

    Article  Google Scholar 

  6. OSMOSIS, D2.1 Report on the Identified Security’s Market Potential/ D2.2 Report on Taxonomy Definition (2010). http://www.osmosisecurity.eu/system/files/OSMOSIS_D2.1%20and%20D2.2_integrated.pdf

  7. Rothwell, R.: Towards the fifth-generation innovation process. Int. Mark. Rev. 11(1), 7–31 (1994)

    Article  Google Scholar 

  8. Cormican, K., O’Sullivan, D.: Auditing Best Practice For Effective Product Innovation. Technovation 24(10), 819–829 (2004)

    Article  Google Scholar 

  9. Jacobs, D., Snijders, H.: Innovation Routine: How Managers can Support Repeated Innovation. Stitching Management Studies, Van Gorcum, Assen (2008)

    Google Scholar 

  10. Tidd, J.: A review of innovation models discussion paper 1. Science and Technology Policy Research Unit, Tanaka Business School, University of Sussex (2006)

    Google Scholar 

  11. Eleveens, C.: Innovation Management: A Literature Review of Innovation Process Models and their Implications. Nijmegen, NL (2010)

    Google Scholar 

  12. Rothwell, R.: Towards the fifth-generation innovation process. Int. Mark. Rev. 11(1), 7–31 (1994)

    Article  Google Scholar 

  13. Van de Ven, A., Angle, H., Poole, M.: Research on the Management of Innovation: The Minnesota studies. Harper & Row, New York (1989)

    Google Scholar 

  14. Cormican, K., O’Sullivan, D.: Auditing best practice for effective product innovation management. Technovation 24, 819–829 (2004)

    Article  Google Scholar 

  15. Tidd, J., Bessant, J., Pavitt, K.: Managing Innovation – Integrating Technological, Market and Organizational Change. Wiley, New York (2005)

    Google Scholar 

  16. World Economic Forum (WEF), Enhancing Europes Competitiveness- Fostering Innovation Driven Entrepreneurship in Europe (2014). http://www3.weforum.org/docs/WEF_EuropeCompetitiveness_InnovationDrivenEntrepreneurship_Report_2014.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jamie Power .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Dooly, Z., Doyle, K., Power, J. (2015). Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2015. Communications in Computer and Information Science, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-25360-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25360-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25359-6

  • Online ISBN: 978-3-319-25360-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics