Access the full text.
Sign up today, get DeepDyve free for 14 days.
Nina Popović (2009)
Biomimicry-innovation inspired by nature
L. Leydesdorff, H. Etzkowitz (1998)
The Triple Helix as a model for innovation studiesScience and Public Policy, 25
John Croall (1988)
Computer virusesBritish Medical Journal, 297
D. Bradley, A. Tyrrell (2001)
The architecture for a hardware immune systemProceedings Third NASA/DoD Workshop on Evolvable Hardware. EH-2001
F.B. Cohen
A Short Course on Computer Viruses
J. Kephart (1994)
A biologically inspired immune system for computersArtificial Life
S. Bekker
Appearance of Exploit Code means time is running out to apply critical windows patch
Peter Szor (2005)
The Art of Computer Virus Research and Defense
Biomimicry Guild
Evolving biomimicry methodology
Stelios Sidiroglou, A. Keromytis (2005)
Countering network worms through automatic patch generationIEEE Security & Privacy Magazine, 3
Keld Laursen, A. Salter (2006)
Open for innovation: the role of openness in explaining innovation performance among U.K. manufacturing firmsSouthern Medical Journal, 27
S. Forrest, S. Hofmeyr, Anil Somayaji (1997)
Computer immunologyImmunological Reviews, 216
Justin Balthrop, S. Forrest, M. Newman, Matthew Williamson (2004)
Technological Networks and the Spread of Computer VirusesScience, 304
Thomas Chen, J. Robert (2004)
Worm epidemics in high-speed networksComputer, 37
K. Pavitt (2003)
The Process of InnovationResearch Papers in Economics
J.O. Kephart, W.C. Arnold
Automatic extraction of computer virus signatures
J. Goldenberg, Y. Shavitt, Eran Shir, S. Solomon (2005)
Distributive immunization of networks against viruses using the ‘honey-pot’ architectureNature Physics, 1
D. Ferbrache (1991)
A pathology of computer viruses
J. Kephart, G. Sorkin, Morton Swimmer, Steve White (1999)
Blueprint for a Computer Immune System
E. Spafford (1994)
Computer Viruses as Artificial LifeArtificial Life, 1
Paul Harmer, Paul Williams, G. Gunsch, G. Lamont (2002)
An artificial immune system architecture for computer security applicationsIEEE Trans. Evol. Comput., 6
Anil Somayaji, S. Hofmeyr, S. Forrest (1998)
Principles of a computer immune system
F.B. Cohen
Computer viruses: theory and practice
V. Skormin, J. Delgado-Frías, D. McGee, J. Giordano, L. Popyack, V. Gorodetski, A. Tarakanov (2001)
BASIS: A Biological Approach to System Information Security
W. Merkl
Self defending networks
J. Kephart, G. Sorkin, William Arnold, D. Chess, G. Tesauro, Steve White (1995)
Biologically Inspired Defenses Against Computer Viruses
Biomimicry Guild
Biomimicry: an introduction
R. King, Aric Lambert, S. Russ, D. Reese (1999)
The Biological Basis of the Immune System as a Model for Intelligent Agents
R. Rothwell (1992)
Successful industrial innovation: critical factors for the 1990sR & D Management, 22
L. Hoffman (1990)
Rogue programs: viruses, worms and Trojan horses
P. Doherty
Sir John Eccles Centenary Lecture
R. McAdam
A multi‐level theory of innovation implementation: normative evaluation, legitimisation and conflict
Microsoft Corporation
Network access protection
S. Hariri, Guangzhi Qu, Tushneem Dharmagadda, Modukuri Ramkishore, C. Raghavendra (2003)
Impact Analysis of Faults and Attacks in Large-Scale NetworksIEEE Secur. Priv., 1
R. McAdam (2005)
A multi‐level theory of innovation implementationEuropean Journal of Innovation Management, 8
S. Goel, S. Bush (2004)
Biological Models of Security for Virus Propagation in Computer Networkslogin Usenix Mag., 29
Cisco Systems
Network admission control
D. Dasgupta (2007)
Immuno-inspired autonomic system for cyber defenseInf. Secur. Tech. Rep., 12
M.A. Ludwig
The Little Black Book of Computer Viruses
Purpose – A strong and fast‐cycle innovation system has been developed to counter the ongoing threat of computer viruses within computer systems employing vulnerable operating systems. Generally, however, the innovative applications that develop in response to each generation of computer virus can be seen as a reactive, rather than proactive, critical response. The paper seeks to present a critique of the innovation system that has emerged to combat computer viruses by comparing it with its natural system namesake, the human anti‐viral immune system. It is proposed that the relevance of this analogy extends beyond this case to innovation systems more generally. Design/methodology/approach – This paper discusses the biological theory related to the human body's immune system and how immune systems might be mimicked in the development of security systems and anti‐virus software. The paper then outlines the biomimicry framework that can be used for scoping the development and features of the security systems and software, including the population of the framework segments. The implications of biomimetic approaches in the wider innovation management literature are discussed. Findings – Some commercial security products that are undergoing evolutionary development and current research and development activities are used to augment the biomimetic development framework and explicate its use in practice. The paper has implications for the manner in which the objectives of innovation systems are defined. There is implicit criticism of linear models of innovation, that by their nature ignore the recursive and/or adaptive processes evident in natural systems. Originality/value – This is the first paper, to the best of the authors' knowledge, that discusses the application of natural systems and biomimetics to broaden the scope of innovation process design, and link its findings back to the wider innovation literature.
European Journal of Innovation Management – Emerald Publishing
Published: May 1, 2007
Keywords: Information systems; Data security; Computer viruses; Software tools; Innovation
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.