Abstract
A pressing challenge facing the cybersecurity and privacy research community is transitioning technical R&D into commercial and marketplace ready products and services. Responding to the need to develop a better understanding of how Privacy and CyberSecurity (PACS) market needs and overall technology innovation best-practice can be harmonized more effectively the contribution of this paper is centred upon uncovering PACS stakeholders’ innovation practices, requirements, and challenges and in doing so highlighting scope for innovation intervention supports. The research outputs impacts and has implications at various levels, most notably in terms of framing both innovator and firm-level innovation requirements within the PACS domain, which has relevance to academic and policy making audiences also. Additionally, given that the research outputs form a pivotal component of the IPACSO project, they will actively contribute to ongoing debates and objectives around shaping support measures for PACS innovation awareness, competency building and innovation policy support developments in the domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
EC, Cyber Security Strategy of the European union: An Open Safe and Secure Cyberspace (2013)
Maughan, D., Baleson, D., Lindqvist, U., Tudor, Z.: Crossing the “valley of death”: transitioning cybersecurity research into practice. J. IEES Secur. Priv. 11(2), 14–23 (2013)
Tidd, J.: A Review of Innovation Models Discussion Paper 1, Science and Technology Policy Research Unit, Tanaka Business School, University of Sussex (2006)
Dooly, Z., Galvin, S., Power, J., Renard, B., Seldeslachts, U.: IPACSO: towards developing an innovation framework for ICT innovators in the privacy and cybersecurity markets. In: Cleary, F., Felici, M. (eds.) Cyber Security and Privacy. LNCS, vol. 470, pp. 148–158. Springer, Heidelberg (2014)
Garud, R., Kumaraswamy, A., Sambamurthy, V.: Emergent by design: performance and transformation at infosys technologies. Organ. Sci. 1(277), 277–286 (2006)
OSMOSIS, D2.1 Report on the Identified Security’s Market Potential/ D2.2 Report on Taxonomy Definition (2010). http://www.osmosisecurity.eu/system/files/OSMOSIS_D2.1%20and%20D2.2_integrated.pdf
Rothwell, R.: Towards the fifth-generation innovation process. Int. Mark. Rev. 11(1), 7–31 (1994)
Cormican, K., O’Sullivan, D.: Auditing Best Practice For Effective Product Innovation. Technovation 24(10), 819–829 (2004)
Jacobs, D., Snijders, H.: Innovation Routine: How Managers can Support Repeated Innovation. Stitching Management Studies, Van Gorcum, Assen (2008)
Tidd, J.: A review of innovation models discussion paper 1. Science and Technology Policy Research Unit, Tanaka Business School, University of Sussex (2006)
Eleveens, C.: Innovation Management: A Literature Review of Innovation Process Models and their Implications. Nijmegen, NL (2010)
Rothwell, R.: Towards the fifth-generation innovation process. Int. Mark. Rev. 11(1), 7–31 (1994)
Van de Ven, A., Angle, H., Poole, M.: Research on the Management of Innovation: The Minnesota studies. Harper & Row, New York (1989)
Cormican, K., O’Sullivan, D.: Auditing best practice for effective product innovation management. Technovation 24, 819–829 (2004)
Tidd, J., Bessant, J., Pavitt, K.: Managing Innovation – Integrating Technological, Market and Organizational Change. Wiley, New York (2005)
World Economic Forum (WEF), Enhancing Europes Competitiveness- Fostering Innovation Driven Entrepreneurship in Europe (2014). http://www3.weforum.org/docs/WEF_EuropeCompetitiveness_InnovationDrivenEntrepreneurship_Report_2014.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Dooly, Z., Doyle, K., Power, J. (2015). Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2015. Communications in Computer and Information Science, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-25360-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-25360-2_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25359-6
Online ISBN: 978-3-319-25360-2
eBook Packages: Computer ScienceComputer Science (R0)