Cyberattacks: Does Physical Boundry Matter?

نویسندگان

  • Qiu-Hong Wang
  • Seung-Hyun Kim
چکیده

Information security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 countries during the period 2003-2007, we find little evidence on the spatial autocorrelation of cyber attacks at any week. However, after considering economic opportunity, IT infrastructure, international collaboration in enforcement and conventional crimes, we find strong evidence that cyber attacks were indeed spatially autocorrelated as they moved over time. The policy and managerial implication is that physical boundary should be an important factor in addressing strategic cyber attacks and their potential risks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Buckling optimization of elastic IPE and circular sections columns considering boundry condition effects

Abstract:   The theory of optimization has improved remarkably during the last four decades. The main part of optimizing investigations has been focused on enhancing buckling resistance which does not violate the economic feasibility of final design. The finite element analysis which is called ESO (Evolutionary Structural Optimization) is presented for optimum (or most ideal) design of c...

متن کامل

Deterrence theory in the cyber - century . Lessons from a state - of - the - art literature review

Cyberattacks from a variety of perpetrators are constantly rising. To achieve restraint from attacks, deterrence theory has long been considered a valuable concept. How do criticisms of classical deterrence apply in this relatively new domain, and how does cyberdeterrence differ? Can offensive cyber capabilities be effective in deterring adversaries or must kinetic retaliation be “on the table”...

متن کامل

Leveraging Strategic Defense Techniques for Smart Home Pricing Cyberattacks

Smart home, which controls the end use of the power grid, has become a critical component in the smart grid infrastructure. In a smart home system, the advanced metering infrastructure (AMI) is used to connect smart meters with the power system and the communication system of a smart grid. The electricity pricing information is transmitted from the utility to the local community, and then broad...

متن کامل

Vulnerabilities of Electric Vehicle Battery Packs to Cyberattacks on Auxiliary Components

Modern automobiles are entirely controlled by electronic circuits and programs which undoubtedly exposes them to the threat of cyberattacks. Alongside, there is a potential for massive growth in electric vehicle (EV) adoption. The cyber vulnerabilities are magnified with electric vehicles because of the unique and critical risks that entail most EV batteries. EV battery packs provide ‘limited d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009