No Cover Image

Journal article 653 views 103 downloads

Drivers and barriers for secure hardware adoption across ecosystem stakeholders

Andrew Tomlinson, Simon Parkin Orcid Logo, Siraj Shaikh Orcid Logo

Journal of Cybersecurity, Volume: 8, Issue: 1

Swansea University Author: Siraj Shaikh Orcid Logo

  • 61037_VoR.pdf

    PDF | Version of Record

    Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License

    Download (351.71KB)

Check full text

DOI (Published version): 10.1093/cybsec/tyac009

Abstract

The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functi...

Full description

Published in: Journal of Cybersecurity
ISSN: 2057-2085 2057-2093
Published: Oxford University Press (OUP) 2022
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61037
first_indexed 2022-10-07T15:26:06Z
last_indexed 2024-11-14T12:18:26Z
id cronfa61037
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2024-07-11T14:56:46.1257496</datestamp><bib-version>v2</bib-version><id>61037</id><entry>2022-09-05</entry><title>Drivers and barriers for secure hardware adoption across ecosystem stakeholders</title><swanseaauthors><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-09-05</date><deptcode>MACS</deptcode><abstract>The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy.</abstract><type>Journal Article</type><journal>Journal of Cybersecurity</journal><volume>8</volume><journalNumber>1</journalNumber><paginationStart/><paginationEnd/><publisher>Oxford University Press (OUP)</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>2057-2085</issnPrint><issnElectronic>2057-2093</issnElectronic><keywords>cybersecurity, secure hardware, hardware adoption, technology decision making</keywords><publishedDay>5</publishedDay><publishedMonth>8</publishedMonth><publishedYear>2022</publishedYear><publishedDate>2022-08-05</publishedDate><doi>10.1093/cybsec/tyac009</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders>This research is funded by Discribe, the Digital Security by Design Social Science Hub+ (https://www.discribehub.org) as a commissioned project on Economic and Consumer Chain Analysis of Secure Hardware Adoption. The Discribe Hub+ is funded by the UKRI through the Economic and Social Research Council (ESRC) grant no. ES/V003666/1.</funders><projectreference/><lastEdited>2024-07-11T14:56:46.1257496</lastEdited><Created>2022-09-05T22:29:39.1716002</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Andrew</firstname><surname>Tomlinson</surname><order>1</order></author><author><firstname>Simon</firstname><surname>Parkin</surname><orcid>0000-0002-6667-0440</orcid><order>2</order></author><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>3</order></author></authors><documents><document><filename>61037__25360__18e7e213baa744268ed0c34a0a0e3506.pdf</filename><originalFilename>61037_VoR.pdf</originalFilename><uploaded>2022-10-07T16:24:15.9726971</uploaded><type>Output</type><contentLength>360155</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>https://creativecommons.org/licenses/by/4.0/</licence></document></documents><OutputDurs/></rfc1807>
spelling 2024-07-11T14:56:46.1257496 v2 61037 2022-09-05 Drivers and barriers for secure hardware adoption across ecosystem stakeholders 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2022-09-05 MACS The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy. Journal Article Journal of Cybersecurity 8 1 Oxford University Press (OUP) 2057-2085 2057-2093 cybersecurity, secure hardware, hardware adoption, technology decision making 5 8 2022 2022-08-05 10.1093/cybsec/tyac009 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University This research is funded by Discribe, the Digital Security by Design Social Science Hub+ (https://www.discribehub.org) as a commissioned project on Economic and Consumer Chain Analysis of Secure Hardware Adoption. The Discribe Hub+ is funded by the UKRI through the Economic and Social Research Council (ESRC) grant no. ES/V003666/1. 2024-07-11T14:56:46.1257496 2022-09-05T22:29:39.1716002 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Andrew Tomlinson 1 Simon Parkin 0000-0002-6667-0440 2 Siraj Shaikh 0000-0002-0726-3319 3 61037__25360__18e7e213baa744268ed0c34a0a0e3506.pdf 61037_VoR.pdf 2022-10-07T16:24:15.9726971 Output 360155 application/pdf Version of Record true Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License true eng https://creativecommons.org/licenses/by/4.0/
title Drivers and barriers for secure hardware adoption across ecosystem stakeholders
spellingShingle Drivers and barriers for secure hardware adoption across ecosystem stakeholders
Siraj Shaikh
title_short Drivers and barriers for secure hardware adoption across ecosystem stakeholders
title_full Drivers and barriers for secure hardware adoption across ecosystem stakeholders
title_fullStr Drivers and barriers for secure hardware adoption across ecosystem stakeholders
title_full_unstemmed Drivers and barriers for secure hardware adoption across ecosystem stakeholders
title_sort Drivers and barriers for secure hardware adoption across ecosystem stakeholders
author_id_str_mv 50117e8faac2d0937989e14847105704
author_id_fullname_str_mv 50117e8faac2d0937989e14847105704_***_Siraj Shaikh
author Siraj Shaikh
author2 Andrew Tomlinson
Simon Parkin
Siraj Shaikh
format Journal article
container_title Journal of Cybersecurity
container_volume 8
container_issue 1
publishDate 2022
institution Swansea University
issn 2057-2085
2057-2093
doi_str_mv 10.1093/cybsec/tyac009
publisher Oxford University Press (OUP)
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 1
active_str 0
description The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy.
published_date 2022-08-05T20:27:17Z
_version_ 1821438627394093056
score 11.047609