Abstract
The growing need for cyberdefense capabilities and the lack of specialists leave many organizations vulnerable to attacks. This chapter offers a comprehensive analysis of the cyberdefense capabilities of Swiss organizations active in cyberdefense. We also study the extent to which they exchange capabilities, and we produce a map of their informal networks. We find that the ecosystem as a whole is a scale-free network that hosts many capabilities, but they are distributed unevenly across organizations. Further, cooperation between these organizations is limited although opportunities to cooperate exist.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The full questionnaire is available on request from the corresponding author.
- 2.
- 3.
These comprised the Swiss Cyber Startup Map (https://cysecmap.swiss/), the Top 100 Startup Ranking (https://www.top100startups.swiss/) and the Startup Directory (https://www.startup.ch/startup-directory).
- 4.
For the SATW, see https://www.satw.ch/en/topics/cybersecurity; for the SIRA, see https://sira.swissinformatics.org/sira-members/.
References
Ahuja, G. (2000). Collaboration networks, structural holes, and innovation: A longitudinal study. Administrative Science Quarterly, 45(3), 425–455.
Albert, R., Jeong, H., & Barabási, A. L. (2000). Error and attack tolerance of complex networks. Nature, 406, 378–382.
Bonacich, P. (1987). Power and centrality: A family of measures. American Journal of Sociology, 92(5), 1170–1182.
Burrell, D. N. (2020). An exploration of the cybersecurity workforce shortage. In Information Resources Management Association (ed.), Cyber warfare and terrorism: Concepts, methodologies, tools, and applications (pp. 1072–1081). IGI Global.
Canadian Centre for Cybersecurity. (2020). Role-based framework. https://cyber.gc.ca/en/guidance/role-based-framework
CEN. (2019). ICT Professionalism and digital competences (CEN/TC 428). Brussels: European Committee for Standardization.
Coulter, R., Han, Q. L., Pan, L., Zhang, J., & Xiang, Y. (2019). Data-driven cyber security in perspective–Intelligent traffic analysis. IEEE Transactions on Cybernetics, 50(7), 3081–3093.
de Carvalho, L. S. (2019). Education and training towards innovation and capability building. In Gaycken, S. (Ed.) Cyber defense-policies, operations and capacity building 2018 (NATO science for peace and security series - E: Human and societal dynamics (Vol. 147, pp. 107–112). IOS Press.
ENISA. (2017). Stock taking of information security training needs in critical sectors. Brussels: European Union Agency for Cybersecurity.
Gillespie, C. S. (2014). Fitting heavy tailed distributions: The poweRlaw package. arXiv:1407.3492
Herjavec Group. (2017). Cybersecurity jobs report. Toronto: Herjavec Group.
Japanese Cross-Industry Cyber Security Study Group. (2016). Human resources definition. https://cyber-risk.or.jp/cric-csf/jinzai_reference_2016.html
Koka, B., & Prescott, J. E. (2008). Designing alliance networks: The influence of network position, environmental change, and strategy on firm performance. Strategic Management Journal, 29(6), 639–661.
Mariotti, F., & Delbridge, R. (2012). Overcoming network overload and redundancy in interorganizational networks: The roles of potential and latent ties. Organization Science, 23(2), 511–528.
Mentzas, G., Apostolou, D., Kafentzis, K., & Georgolios, P. (2006). Inter-organizational networks for knowledge sharing and trading. Information Technology and Management, 7(4), 259–276.
Mermoud, A., Keupp, M. M., Huguenin, K., Palmié, M., & Percia David, D. (2019). To share or not to share: A behavioral perspective on human participation in security information sharing. Journal of Cybersecurity, 5(1), tyz006.
Metzger, J. C., Parad, S., Ravizza, S., & Keupp, M. M. (2020). Vulnerability and resilience of national power grids: A graph-theoretical optimization approach and empirical simulation. In M. M. Keupp (Ed.), The Security of Critical Infrastructures (pp. 77–94). Cham: Springer.
Nai-Fovino, I., Neisse, R., Hernandez-Ramos, J. L., Polemi, N., Ruzzante, G., Figwer, M., & Lazari, A. (2019). A proposal for a European cybersecurity taxonomy. Joint Research Center Technical Report JRC118089. Luxembourg: Publications Office of the European Union.
NICE, (2021). Navy COOL and MilGears, U.S. Navy Credentialing Programs Naval Education and Training Command. Gaithersburg MD: National Institute of Standards and Technology.
Percia David, D., Keupp, M. M., & Mermoud, A. (2020). Knowledge absorption for cyber-security: The role of human beliefs. Computers in Human Behavior, 106, 106255.
Petersen, R., Santos, D., Smith, M. C., Wetzel, K. A., & Witte, G. (2020). Workforce framework for cybersecurity (NICE Framework). NIST Special Publication 800-181. Gathersburg MD: National Institute of Standards and Technology.
QS. (2021). QS World University Rankings by computer science and information technology. https://www.topuniversities.com/university-rankings
Rashid, A., Chivers, H., Danezis, G., Lupu, E., & Martin, A. (2019). CyBok: The cyber security body of knowledge. London: National Cyber Security Centre.
Sorenson, O., & Stuart, T. E. (2001). Syndication networks and the spatial distribution of venture capital investments. American Journal of Sociology, 106(6), 1546–1588.
SPARTA Project. (2021). Cybersecurity training and awareness. https://www.sparta.eu/training/
Teece, D. J. (2019). A capability theory of the firm: An economics and (strategic) management perspective. New Zealand Economic Papers, 53, 1–43.
Trkman, P., & Desouza, K. C. (2012). Knowledge risks in organizational networks: An exploratory framework. Journal of Strategic Information Systems, 21(1), 1–17.
Valente, T. W. (2005). Network models and methods for studying the diffusion of innovations. Models and Methods in Social Network Analysis, 28, 98–116.
Wang, H., Zhao, J., Li, Y., & Li, C. (2015). Network centrality, organizational innovation, and performance: A meta-analysis. Canadian Journal of Administrative Sciences/Revue Canadienne des Sciences de l’Administration, 32(3), 146–159.
Williams, R., & Leahy, A. (2020). U21 ranking of national higher education systems 2020. The Melbourne Institute of Applied Economic and Social Research: University of Melbourne.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
1 Electronic supplementary material
Below is the link to the electronic supplementary material.
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Aeschlimann, C., Cuche, K., Mermoud, A. (2023). Cybersecurity Ecosystems: A Network Study from Switzerland. In: Keupp, M.M. (eds) Cyberdefense. International Series in Operations Research & Management Science, vol 342. Springer, Cham. https://doi.org/10.1007/978-3-031-30191-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-30191-9_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30190-2
Online ISBN: 978-3-031-30191-9
eBook Packages: Business and ManagementBusiness and Management (R0)