No Cover Image

Journal article 450 views 60 downloads

Drivers and barriers for secure hardware adoption across ecosystem stakeholders

Andrew Tomlinson, Simon Parkin Orcid Logo, Siraj Shaikh Orcid Logo

Journal of Cybersecurity, Volume: 8, Issue: 1

Swansea University Author: Siraj Shaikh Orcid Logo

  • 61037_VoR.pdf

    PDF | Version of Record

    Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License

    Download (351.71KB)

Check full text

DOI (Published version): 10.1093/cybsec/tyac009

Abstract

The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functi...

Full description

Published in: Journal of Cybersecurity
ISSN: 2057-2085 2057-2093
Published: Oxford University Press (OUP) 2022
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61037
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2022-10-07T15:26:06Z
last_indexed 2023-01-13T19:21:35Z
id cronfa61037
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2022-10-07T16:27:10.9288610</datestamp><bib-version>v2</bib-version><id>61037</id><entry>2022-09-05</entry><title>Drivers and barriers for secure hardware adoption across ecosystem stakeholders</title><swanseaauthors><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-09-05</date><deptcode>SCS</deptcode><abstract>The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy.</abstract><type>Journal Article</type><journal>Journal of Cybersecurity</journal><volume>8</volume><journalNumber>1</journalNumber><paginationStart/><paginationEnd/><publisher>Oxford University Press (OUP)</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>2057-2085</issnPrint><issnElectronic>2057-2093</issnElectronic><keywords>cybersecurity, secure hardware, hardware adoption, technology decision making</keywords><publishedDay>5</publishedDay><publishedMonth>8</publishedMonth><publishedYear>2022</publishedYear><publishedDate>2022-08-05</publishedDate><doi>10.1093/cybsec/tyac009</doi><url/><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders>This research is funded by Discribe, the Digital Security by Design Social Science Hub+ (https://www.discribehub.org) as a commissioned project on Economic and Consumer Chain Analysis of Secure Hardware Adoption. The Discribe Hub+ is funded by the UKRI through the Economic and Social Research Council (ESRC) grant no. ES/V003666/1.</funders><projectreference/><lastEdited>2022-10-07T16:27:10.9288610</lastEdited><Created>2022-09-05T22:29:39.1716002</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Andrew</firstname><surname>Tomlinson</surname><order>1</order></author><author><firstname>Simon</firstname><surname>Parkin</surname><orcid>0000-0002-6667-0440</orcid><order>2</order></author><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>3</order></author></authors><documents><document><filename>61037__25360__18e7e213baa744268ed0c34a0a0e3506.pdf</filename><originalFilename>61037_VoR.pdf</originalFilename><uploaded>2022-10-07T16:24:15.9726971</uploaded><type>Output</type><contentLength>360155</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>https://creativecommons.org/licenses/by/4.0/</licence></document></documents><OutputDurs/></rfc1807>
spelling 2022-10-07T16:27:10.9288610 v2 61037 2022-09-05 Drivers and barriers for secure hardware adoption across ecosystem stakeholders 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2022-09-05 SCS The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy. Journal Article Journal of Cybersecurity 8 1 Oxford University Press (OUP) 2057-2085 2057-2093 cybersecurity, secure hardware, hardware adoption, technology decision making 5 8 2022 2022-08-05 10.1093/cybsec/tyac009 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University This research is funded by Discribe, the Digital Security by Design Social Science Hub+ (https://www.discribehub.org) as a commissioned project on Economic and Consumer Chain Analysis of Secure Hardware Adoption. The Discribe Hub+ is funded by the UKRI through the Economic and Social Research Council (ESRC) grant no. ES/V003666/1. 2022-10-07T16:27:10.9288610 2022-09-05T22:29:39.1716002 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Andrew Tomlinson 1 Simon Parkin 0000-0002-6667-0440 2 Siraj Shaikh 0000-0002-0726-3319 3 61037__25360__18e7e213baa744268ed0c34a0a0e3506.pdf 61037_VoR.pdf 2022-10-07T16:24:15.9726971 Output 360155 application/pdf Version of Record true Copyright: The Author(s) 2022. This is an Open Access article distributed under the terms of the Creative Commons Attribution License true eng https://creativecommons.org/licenses/by/4.0/
title Drivers and barriers for secure hardware adoption across ecosystem stakeholders
spellingShingle Drivers and barriers for secure hardware adoption across ecosystem stakeholders
Siraj Shaikh
title_short Drivers and barriers for secure hardware adoption across ecosystem stakeholders
title_full Drivers and barriers for secure hardware adoption across ecosystem stakeholders
title_fullStr Drivers and barriers for secure hardware adoption across ecosystem stakeholders
title_full_unstemmed Drivers and barriers for secure hardware adoption across ecosystem stakeholders
title_sort Drivers and barriers for secure hardware adoption across ecosystem stakeholders
author_id_str_mv 50117e8faac2d0937989e14847105704
author_id_fullname_str_mv 50117e8faac2d0937989e14847105704_***_Siraj Shaikh
author Siraj Shaikh
author2 Andrew Tomlinson
Simon Parkin
Siraj Shaikh
format Journal article
container_title Journal of Cybersecurity
container_volume 8
container_issue 1
publishDate 2022
institution Swansea University
issn 2057-2085
2057-2093
doi_str_mv 10.1093/cybsec/tyac009
publisher Oxford University Press (OUP)
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 1
active_str 0
description The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed to have a role in devices across sectors, such as IoT devices, autonomous vehicle systems and critical infrastructure components. To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes and supply-chain roles. Our results consider the business propositional drivers, barriers and economic factors that influence the adoption decisions. Understanding these would help those seeking to influence the adoption process, whether as a business decision, or as a trade or national strategy.
published_date 2022-08-05T04:19:37Z
_version_ 1763754301519298560
score 11.012678