Journal article 653 views 103 downloads
Drivers and barriers for secure hardware adoption across ecosystem stakeholders
Journal of Cybersecurity, Volume: 8, Issue: 1
Swansea University Author: Siraj Shaikh
-
PDF | Version of Record
Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License
Download (351.71KB)
DOI (Published version): 10.1093/cybsec/tyac009
Abstract
The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functi...
Published in: | Journal of Cybersecurity |
---|---|
ISSN: | 2057-2085 2057-2093 |
Published: |
Oxford University Press (OUP)
2022
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa61037 |
first_indexed |
2022-10-07T15:26:06Z |
---|---|
last_indexed |
2024-11-14T12:18:26Z |
id |
cronfa61037 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2024-07-11T14:56:46.1257496</datestamp><bib-version>v2</bib-version><id>61037</id><entry>2022-09-05</entry><title>Drivers and barriers for secure hardware adoption across ecosystem stakeholders</title><swanseaauthors><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-09-05</date><deptcode>MACS</deptcode><abstract>The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy.</abstract><type>Journal Article</type><journal>Journal of Cybersecurity</journal><volume>8</volume><journalNumber>1</journalNumber><paginationStart/><paginationEnd/><publisher>Oxford University Press (OUP)</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>2057-2085</issnPrint><issnElectronic>2057-2093</issnElectronic><keywords>cybersecurity, secure hardware, hardware adoption, technology decision making</keywords><publishedDay>5</publishedDay><publishedMonth>8</publishedMonth><publishedYear>2022</publishedYear><publishedDate>2022-08-05</publishedDate><doi>10.1093/cybsec/tyac009</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders>This research is funded by Discribe, the Digital Security by Design Social Science Hub+ (https://www.discribehub.org) as a commissioned project on Economic and Consumer Chain Analysis of Secure Hardware Adoption. The Discribe Hub+ is funded by the UKRI through the Economic and Social Research Council (ESRC) grant no. ES/V003666/1.</funders><projectreference/><lastEdited>2024-07-11T14:56:46.1257496</lastEdited><Created>2022-09-05T22:29:39.1716002</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Andrew</firstname><surname>Tomlinson</surname><order>1</order></author><author><firstname>Simon</firstname><surname>Parkin</surname><orcid>0000-0002-6667-0440</orcid><order>2</order></author><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>3</order></author></authors><documents><document><filename>61037__25360__18e7e213baa744268ed0c34a0a0e3506.pdf</filename><originalFilename>61037_VoR.pdf</originalFilename><uploaded>2022-10-07T16:24:15.9726971</uploaded><type>Output</type><contentLength>360155</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>https://creativecommons.org/licenses/by/4.0/</licence></document></documents><OutputDurs/></rfc1807> |
spelling |
2024-07-11T14:56:46.1257496 v2 61037 2022-09-05 Drivers and barriers for secure hardware adoption across ecosystem stakeholders 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2022-09-05 MACS The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy. Journal Article Journal of Cybersecurity 8 1 Oxford University Press (OUP) 2057-2085 2057-2093 cybersecurity, secure hardware, hardware adoption, technology decision making 5 8 2022 2022-08-05 10.1093/cybsec/tyac009 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University This research is funded by Discribe, the Digital Security by Design Social Science Hub+ (https://www.discribehub.org) as a commissioned project on Economic and Consumer Chain Analysis of Secure Hardware Adoption. The Discribe Hub+ is funded by the UKRI through the Economic and Social Research Council (ESRC) grant no. ES/V003666/1. 2024-07-11T14:56:46.1257496 2022-09-05T22:29:39.1716002 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Andrew Tomlinson 1 Simon Parkin 0000-0002-6667-0440 2 Siraj Shaikh 0000-0002-0726-3319 3 61037__25360__18e7e213baa744268ed0c34a0a0e3506.pdf 61037_VoR.pdf 2022-10-07T16:24:15.9726971 Output 360155 application/pdf Version of Record true Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License true eng https://creativecommons.org/licenses/by/4.0/ |
title |
Drivers and barriers for secure hardware adoption across ecosystem stakeholders |
spellingShingle |
Drivers and barriers for secure hardware adoption across ecosystem stakeholders Siraj Shaikh |
title_short |
Drivers and barriers for secure hardware adoption across ecosystem stakeholders |
title_full |
Drivers and barriers for secure hardware adoption across ecosystem stakeholders |
title_fullStr |
Drivers and barriers for secure hardware adoption across ecosystem stakeholders |
title_full_unstemmed |
Drivers and barriers for secure hardware adoption across ecosystem stakeholders |
title_sort |
Drivers and barriers for secure hardware adoption across ecosystem stakeholders |
author_id_str_mv |
50117e8faac2d0937989e14847105704 |
author_id_fullname_str_mv |
50117e8faac2d0937989e14847105704_***_Siraj Shaikh |
author |
Siraj Shaikh |
author2 |
Andrew Tomlinson Simon Parkin Siraj Shaikh |
format |
Journal article |
container_title |
Journal of Cybersecurity |
container_volume |
8 |
container_issue |
1 |
publishDate |
2022 |
institution |
Swansea University |
issn |
2057-2085 2057-2093 |
doi_str_mv |
10.1093/cybsec/tyac009 |
publisher |
Oxford University Press (OUP) |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
document_store_str |
1 |
active_str |
0 |
description |
The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy. |
published_date |
2022-08-05T20:27:17Z |
_version_ |
1821438627394093056 |
score |
11.047609 |