Cyber Attacks: Cross-Country Interdependence and Enforcement
نویسندگان
چکیده
This study empirically characterizes the interdependence in cyber attacks and examines the impact from the first international treaty against cybercrimes (Convention on Cybercrimes: Europe Treaty Series No. 185). With the data covering 62 countries over the period from year 2003 to 2007, we find that, international cooperation in enforcement as measured by the indicator of joining the Convention on Cybercrimes, deterred cyber attacks originating from any particular country by 15.81% ~ 24.77% (in 95% confidence interval). Second, joining the Convention also affected the interdependence in cyber attacks from two angels. First, for any pair of country, closer status in joining or not joining the Convention was associated with less negative or more positive correlation. Second, joining the Convention or joining it earlier was associated with lower correlation between countries over time. We discuss the policy implications from our findings to public authorities, cyber insurance companies and organizational users.
منابع مشابه
Cyberattacks: Does Physical Boundry Matter?
Information security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 c...
متن کاملAnalysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic
The COVID-19 pandemic was a remarkable and unprecedented event that changed the lives of billions of citizens around the world and resulted in what is known as a new term in terms of social norms and lifestyles. In addition to the tremendous impact on society and business in general, the epidemic created a unique set of cybercrime circumstances that also affected society and business. Increased...
متن کاملA Blueprint for a Pan-European Cyber Incident Analysis System
Today’s Industrial Control Systems (ICSs) operating in critical infrastructures (CIs) are becoming more and more complex, moreover they are extensively interconnected with corporate information systems for monitoring, management and maintenance. This increasingly exposes ICSs to modern advanced cyber threats. Existing security solutions try to prevent, detect, and react to cyber threats by empl...
متن کاملThe Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
We present two methodologies that adapt the event study from research in finance and economics to study the impact of enforcement on information security attacks. One uses linear regression with the number of attacks as the dependent variable and indicators of enforcement events as independent variables. The other measures the impact of enforcement by the difference between the actual and predi...
متن کاملA Review on Cyberspace Security: Lessons for Islamic Republic of Iran
Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...
متن کامل