Artificial Intelligence for Cybersecurity: Towards Taxonomy-based Archetypes and Decision Support

Research output: Contribution to conferencePaperResearchpeer review

Authors

View graph of relations

Details

Original languageEnglish
Number of pages17
Publication statusPublished - 2022
EventInternational Conference on Information Systems 2022 - Copenhagen, Denmark
Duration: 9 Dec 202214 Dec 2022

Conference

ConferenceInternational Conference on Information Systems 2022
Abbreviated titleICIS 2022
Country/TerritoryDenmark
CityCopenhagen
Period9 Dec 202214 Dec 2022

Abstract

Cybersecurity is a critical success factor for more resilient companies, organizations, and societies against cyberattacks. Artificial intelligence (AI)-driven cybersecurity solutions have the ability to detect and respond to cyber threats and attacks and other malicious activities. For this purpose, the most important resource is security-relevant data from networks, cloud systems, clients, e-mails, and previous cyberattacks. AI, the key technology, can automatically detect, for example, anomalies and malicious behavior. Consequently, the market for AI-driven cybersecurity solutions is growing significantly. We develop a taxonomy of AI-driven cybersecurity business models by classifying 229 real-world services. Building on that, we derive four specific archetypes using a cluster analysis toward a comprehensive academic knowledge base of business model elements. To reduce complexity and simplify the results of the taxonomy and archetypes, we propose DETRAICS, a decision tree for AI-driven cybersecurity services. Practitioners, decision-makers, and researchers benefit from DETRAICS to select the most suitable AI- driven service.

Cite this

Artificial Intelligence for Cybersecurity: Towards Taxonomy-based Archetypes and Decision Support. / Gerlach, Jana; Werth, Oliver; Breitner, Michael H.
2022. Paper presented at International Conference on Information Systems 2022, Copenhagen, Denmark.

Research output: Contribution to conferencePaperResearchpeer review

Gerlach, J, Werth, O & Breitner, MH 2022, 'Artificial Intelligence for Cybersecurity: Towards Taxonomy-based Archetypes and Decision Support', Paper presented at International Conference on Information Systems 2022, Copenhagen, Denmark, 9 Dec 2022 - 14 Dec 2022. <https://www.iwi.uni-hannover.de/fileadmin/iwi/Publikationen/5-t-2022.pdf>
Gerlach, J., Werth, O., & Breitner, M. H. (2022). Artificial Intelligence for Cybersecurity: Towards Taxonomy-based Archetypes and Decision Support. Paper presented at International Conference on Information Systems 2022, Copenhagen, Denmark. https://www.iwi.uni-hannover.de/fileadmin/iwi/Publikationen/5-t-2022.pdf
Gerlach J, Werth O, Breitner MH. Artificial Intelligence for Cybersecurity: Towards Taxonomy-based Archetypes and Decision Support. 2022. Paper presented at International Conference on Information Systems 2022, Copenhagen, Denmark.
Gerlach, Jana ; Werth, Oliver ; Breitner, Michael H. / Artificial Intelligence for Cybersecurity : Towards Taxonomy-based Archetypes and Decision Support. Paper presented at International Conference on Information Systems 2022, Copenhagen, Denmark.17 p.
Download
@conference{0caaa6bee3d3403aaab220ff0defa683,
title = "Artificial Intelligence for Cybersecurity: Towards Taxonomy-based Archetypes and Decision Support",
abstract = " Cybersecurity is a critical success factor for more resilient companies, organizations, and societies against cyberattacks. Artificial intelligence (AI)-driven cybersecurity solutions have the ability to detect and respond to cyber threats and attacks and other malicious activities. For this purpose, the most important resource is security-relevant data from networks, cloud systems, clients, e-mails, and previous cyberattacks. AI, the key technology, can automatically detect, for example, anomalies and malicious behavior. Consequently, the market for AI-driven cybersecurity solutions is growing significantly. We develop a taxonomy of AI-driven cybersecurity business models by classifying 229 real-world services. Building on that, we derive four specific archetypes using a cluster analysis toward a comprehensive academic knowledge base of business model elements. To reduce complexity and simplify the results of the taxonomy and archetypes, we propose DETRAICS, a decision tree for AI-driven cybersecurity services. Practitioners, decision-makers, and researchers benefit from DETRAICS to select the most suitable AI- driven service.",
author = "Jana Gerlach and Oliver Werth and Breitner, {Michael H.}",
note = "DBLP's bibliographic metadata records provided through http://dblp.org/search/publ/api are distributed under a Creative Commons CC0 1.0 Universal Public Domain Dedication. Although the bibliographic metadata records are provided consistent with CC0 1.0 Dedication, the content described by the metadata records is not. Content may be subject to copyright, rights of privacy, rights of publicity and other restrictions.; International Conference on Information Systems 2022, ICIS 2022 ; Conference date: 09-12-2022 Through 14-12-2022",
year = "2022",
language = "English",

}

Download

TY - CONF

T1 - Artificial Intelligence for Cybersecurity

T2 - International Conference on Information Systems 2022

AU - Gerlach, Jana

AU - Werth, Oliver

AU - Breitner, Michael H.

N1 - DBLP's bibliographic metadata records provided through http://dblp.org/search/publ/api are distributed under a Creative Commons CC0 1.0 Universal Public Domain Dedication. Although the bibliographic metadata records are provided consistent with CC0 1.0 Dedication, the content described by the metadata records is not. Content may be subject to copyright, rights of privacy, rights of publicity and other restrictions.

PY - 2022

Y1 - 2022

N2 - Cybersecurity is a critical success factor for more resilient companies, organizations, and societies against cyberattacks. Artificial intelligence (AI)-driven cybersecurity solutions have the ability to detect and respond to cyber threats and attacks and other malicious activities. For this purpose, the most important resource is security-relevant data from networks, cloud systems, clients, e-mails, and previous cyberattacks. AI, the key technology, can automatically detect, for example, anomalies and malicious behavior. Consequently, the market for AI-driven cybersecurity solutions is growing significantly. We develop a taxonomy of AI-driven cybersecurity business models by classifying 229 real-world services. Building on that, we derive four specific archetypes using a cluster analysis toward a comprehensive academic knowledge base of business model elements. To reduce complexity and simplify the results of the taxonomy and archetypes, we propose DETRAICS, a decision tree for AI-driven cybersecurity services. Practitioners, decision-makers, and researchers benefit from DETRAICS to select the most suitable AI- driven service.

AB - Cybersecurity is a critical success factor for more resilient companies, organizations, and societies against cyberattacks. Artificial intelligence (AI)-driven cybersecurity solutions have the ability to detect and respond to cyber threats and attacks and other malicious activities. For this purpose, the most important resource is security-relevant data from networks, cloud systems, clients, e-mails, and previous cyberattacks. AI, the key technology, can automatically detect, for example, anomalies and malicious behavior. Consequently, the market for AI-driven cybersecurity solutions is growing significantly. We develop a taxonomy of AI-driven cybersecurity business models by classifying 229 real-world services. Building on that, we derive four specific archetypes using a cluster analysis toward a comprehensive academic knowledge base of business model elements. To reduce complexity and simplify the results of the taxonomy and archetypes, we propose DETRAICS, a decision tree for AI-driven cybersecurity services. Practitioners, decision-makers, and researchers benefit from DETRAICS to select the most suitable AI- driven service.

UR - http://www.scopus.com/inward/record.url?scp=85184800013&partnerID=8YFLogxK

M3 - Paper

Y2 - 9 December 2022 through 14 December 2022

ER -

By the same author(s)