Challenges and vulnerabilities of analysing cybercrime costs
Recent studies have underlined a limited scope of research published with regard to the impact of cybercrimes, which is investigated by applying the scientific literature analysis and surveys. This paper focuses on in-depth research on cybercrime costs by analysing the information from selected online materials in order to reveal a research gap. To support the contributions of the research in the field, two methods, namely, literature review and statistical analysis were employed. The findings reveal that several interested parties such as independent IT companies, governmental and non-governmental institutions have conducted various surveys to identify the impact of cyberattacks. The main challenges and vulnerabilities of analysing cybercrime costs can be overcome by further investigations.
BOSSLER, A. M. and HOLT, T. 2009. On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400-420.
CARDENAS, A., AMIN, S. SINOPOLI, B., GIANI, A., PERRIG, A. and SASTRY, S. (2009, July). Challenges for securing cyber physical systems. In Workshop on future directions in cyber-physical systems security (Vol. 5).
CASHELL, B, JACKSON, W.D., JICKILNG, M. and WEBEL, B. 2004. The economic impact of cyber-attacks. Congressional Research Service Documents. Washington DC. [Online] Available at: http://www.au.af.mil/au/awc/awcgate/crs/rl32331.pdf [Accessed 30 October, 2017].
CAVUSOGLU, H., MISHRA, B. and RAGHUNATHAN, S. 2004. The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9.1: 70-104.
CENTER OF STRATEGIC AND INTERNATIONAL STUDIES. 2014. Net Losses: Estimating the Global Cost of Cybercrime [Online] Available at: https://www.scribd.com/document/228803026/Rp-Economic-Impact-Cybercrime2 [Accessed: 17 October, 2017].
DATA BREACHES. 2012. Statement from ESingles about MilitarySingles.com. [Online]. Available at: https://www.databreaches.net/update-statement-from-esingles-about-militarysingles-com/ [Accessed: 30 October, 2017]
DE WERRA, J. and STUDER, E. 2017. Regulating cyber security: what civil liability of cyber attacks? Expert Focus, 17(8): 511-517.
FINDLAY, V. 2015. Cyber-Threat versus Cyber-Risk: Performing Adequate Analysis. [Online] Available at: https://www.researchgate.net/publication/276284211_Cyber-Threat_versus_Cyber-Risk_Performing_Adequate_Analysis [Accessed: 1 November, 2017]
FLETCHER, N. 2007. Challenges for regulating financial fraud in cyberspace. Journal of financial crime, 14(2), 190-207.
FURNELL, S., EMM, D. and PAPADAKI, M. 2015. The challenge of measuring cyber-dependent crime. Computer Fraud & Security, 10: 5-10
GARBER, L. 1999. Melissa virus creates a new type of threats. Computer, 32(6): 16-19.
GOL, M., ABUR, A. 2013. Identifying vulnerabilities of state estimators against cyber-attacks. [Online] Available at: http://ieeexplore.ieee.org/abstract/document/6652124/ [Accessed: 1 November, 2017].
HILLS, M. and BATCHELOR, G. Culturing defensive immunity: hardening psychological targets against cyber attack. In European Conference on Cyberwarfare and Security, July 2015: 95.
JARDINE, E. 2015. Global cyberspace is safer than you think: real trends in cybercrime [Online] Available at: http://boletines.prisadigital.com/SSRN-id2634590.pdf [Accessed: 29 October, 2017].
KAWANAKA, T., MATSUMARU, M., and ROKUGAWA, S. 2014. Software measure in cyber-attacks on production control system. Computers & Industrial Engineering, 76: 378-386. DOI: https://doi.org/10.1016/j.cie.2014.08.008.
KIM, W., JEONG, O.R., Kim, C. and SO, J. 2011. The dark side of the Internet: Attacks, costs and responses. Information Systems, 36(3): 675-705. DOI: https://doi.org/10.1016/j.is.2010.11.003Get rights and content.
KLEINER, A., NICHOLAS, P., SULLIVAN, K. 2013. Linking cybersecurity policy and performance. Microsoft Trustworthy Computing. [Online] Available at: http://www.ilsole24ore.com/pdf2010/SoleOnLine5/_Oggetti_Correlati/Documenti/Tecnologie/2013/02/SIR-Special-Edition-Security-Atlas-whitepaper.pdf [Accessed: 30 October, 2017].
KOVACS, E. 2012. CSS Corp Site Hacked by LulzSec, Database Leaked. [Online], Available at: http://news.softpedia.com/news/CSS-Corp-Site-Hacked-by-LulzSec-Database-Leaked-261041.shtml [Accessed: 30 October, 2017].
KOX, H. L. M. 2013. Cybersecurity in the perspective of Internet traffic growth. [Online] Available at: https://mpra.ub.uni-muenchen.de/47883/ [Accessed: 30 October, 2017]
LEEUW, F. L. and LEEUW, B. 2012. Cyber society and digital policies: Challenges to evaluation? Evaluation, 18(1): 111-127.
LEVI, M. and LEIGHTON WILLIAMS, M. 2013. Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space. Information Management & Computer Security, 21(5): 420-443.
LUO, X. and LIAO, O. 2009. Ransomware: a new cyber hijacking threat to enterprises. Handbook of Research on Information Security and Assurance. IGI Global, 1-6.
MCGUIRE, G. and KRIBS, B. 2002. Attack on the Internet Called the Largest Ever. [Online] Available at: https:www.crime-research.org/news/2002/10/Mess2402.html. [Accessed: 28 October, 2017].
MIAO, L., and LI, S. 2017. Cyber security based on mean field game model of the defender: Attackerstrategies. International Journal of Distributer Sensor Networks, 13(10): 1-8.
MUSMAN, S., TEMIN, A., TANNER, M., FOX, D. & PRIDEMORE, B. 2010. Evaluating the impact of cyber attacks on missions. In International Conference on Cyber Warfare and Security (p. 446). Academic Conferences International Limited.
NATO. 2013. The history of cyber attacks – a timeline. [Online]. Available at: https://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm [Accessed: 30 October, 2017].
PONEMON INSTITUTE. 2016. Cost of Cyber Crime Study & the Risk of Business Innovation. [Online] Available at: https://saas.hpe.com/sites/default/files/assets/4AA6-8392ENW.pdf [Accessed: 30 September, 2017].
REYNS, B.W. 2010. A Situational Crime Prevention Approach of Cyberstalking Victimization: Preventive Tactics for Internet Users and Online Place Managers. In Crime Prevention and Community Safety, 12: 99–118.
ROGERS, M. K. 2006. A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital investigation, 3(2): 97–102. DOI: https://doi.org/10.1016/j.diin.2006.03.001.
ROVE, N.C. 2008. Ethics of Cyber War Attacks.In Cyber Warfare and Cyber Terorrism.
SAXENA, N., CHUKWUKA, V. XIONG, L. and GRIJALVA, S. 2017. CPSA: A Cyber-Physical Security Assessment Tool for Situational Awereness in Smart Grid. In ACM CCS Workshop (CPS-SPC), 30 October-3 Novermber, 2017, Dallas, USA [In Press].
SMITH, K. T., SMITH, M. L. and SMITH, J. L. 2011. Case studies of cybercrime and its impact on marketing activity and shareholder value. Academy of Marketing Studies Journal, 15(2): 67-81.
SZOLDRA, P. 2015. The 9 worst cyber attacks in 2015. [Online]. Available at: http://www.businessinsider.com/cyberattacks-2015-12/#hackers-breached-the-systems-of-the-health-insurer-anthem-inc-exposing-nearly-80-million-personal-records-1 [Accessed: 31 October, 2017].
VAN NIEKERK, B. Suppression of cyber-defences. In IST Africa Week Conference, 2016, IEEE, p. 1-12.
VENTRE, D. 2013. Cyberconflict. In Cyberwar and Information Warfare, John Wiley & Sons, Inc, Hoboken, NJ, USA.
WOOLRIDGE, J. M. 2006. Cluster-Sample Methods in Applied Econometrics: An Extended Analysis [Online] Available at: http://econ.ucsb.edu/~doug/245a/Paper/Cluster%20Sample%20Methods%20in%20Applied%20Econometrics.pdf [Accessed: 17 October, 2017].
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
It is allowed to reuse and remix the journal content in accordance with a CC BY-SA license (free to Share — copy and redistribute the material in any medium or format and Adapt — remix, transform, and build upon the material for any purpose, even commercially). The license lets others remix, tweak, and build upon your work even for commercial purposes, as long as they credit you and license their new creations under the identical terms. All new works based on yours will carry the same license, so any derivatives will also allow commercial use.
European Journal of Business Science and Technology by https://www.ejobsat.cz/ is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
EJOBSAT allows author/s to retain rights to copyright, and other proprietary rights relating to the publication - such as patent rights, the right to use the substance of the publication in future own works (including lectures and books), the right to reproduce the publication for own purposes (not for sale) and the right to self-archive the publication.