No Cover Image

Journal article 648 views 102 downloads

Drivers and barriers for secure hardware adoption across ecosystem stakeholders

Andrew Tomlinson, Simon Parkin Orcid Logo, Siraj Shaikh Orcid Logo

Journal of Cybersecurity, Volume: 8, Issue: 1

Swansea University Author: Siraj Shaikh Orcid Logo

  • 61037_VoR.pdf

    PDF | Version of Record

    Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License

    Download (351.71KB)

Check full text

DOI (Published version): 10.1093/cybsec/tyac009

Abstract

The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functi...

Full description

Published in: Journal of Cybersecurity
ISSN: 2057-2085 2057-2093
Published: Oxford University Press (OUP) 2022
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61037
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract: The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy.
Keywords: cybersecurity, secure hardware, hardware adoption, technology decision making
College: Faculty of Science and Engineering
Funders: This research is funded by Discribe, the Digital Security by Design Social Science Hub+ (https://www.discribehub.org) as a commissioned project on Economic and Consumer Chain Analysis of Secure Hardware Adoption. The Discribe Hub+ is funded by the UKRI through the Economic and Social Research Council (ESRC) grant no. ES/V003666/1.
Issue: 1