Challenges and vulnerabilities of analysing cybercrime costs

Keywords: cyber attack, cybercrime cots, OLS regressions

Abstract

Recent studies have underlined a limited scope of research published with regard to the impact of cybercrimes, which is investigated by applying the scientific literature analysis and surveys. This paper focuses on in-depth research on cybercrime costs by analysing the information from selected online materials in order to reveal a research gap. To support the contributions of the research in the field, two methods, namely, literature review and statistical analysis were employed. The findings reveal that several interested parties such as independent IT companies, governmental and non-governmental institutions have conducted various surveys to identify the impact of cyberattacks. The main challenges and vulnerabilities of analysing cybercrime costs can be overcome by further investigations.

Author Biography

Jūratė Kuklytė, Vytautas Magnus University
PhD student at Department of Management, Faculty of Economics and Management

References

BOLLEN, K. A. and STINE, R. 1990. Direct and indirect effects: Classical and bootstrap estimates of variability. Sociological methodology, 115-140.

BOSSLER, A. M. and HOLT, T. 2009. On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400-420.

CARDENAS, A., AMIN, S. SINOPOLI, B., GIANI, A., PERRIG, A. and SASTRY, S. (2009, July). Challenges for securing cyber physical systems. In Workshop on future directions in cyber-physical systems security (Vol. 5).

CASHELL, B, JACKSON, W.D., JICKILNG, M. and WEBEL, B. 2004. The economic impact of cyber-attacks. Congressional Research Service Documents. Washington DC. [Online] Available at: http://www.au.af.mil/au/awc/awcgate/crs/rl32331.pdf [Accessed 30 October, 2017].

CAVUSOGLU, H., MISHRA, B. and RAGHUNATHAN, S. 2004. The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9.1: 70-104.

CENTER OF STRATEGIC AND INTERNATIONAL STUDIES. 2014. Net Losses: Estimating the Global Cost of Cybercrime [Online] Available at: https://www.scribd.com/document/228803026/Rp-Economic-Impact-Cybercrime2 [Accessed: 17 October, 2017].

DATA BREACHES. 2012. Statement from ESingles about MilitarySingles.com. [Online]. Available at: https://www.databreaches.net/update-statement-from-esingles-about-militarysingles-com/ [Accessed: 30 October, 2017]

DE WERRA, J. and STUDER, E. 2017. Regulating cyber security: what civil liability of cyber attacks? Expert Focus, 17(8): 511-517.

FINDLAY, V. 2015. Cyber-Threat versus Cyber-Risk: Performing Adequate Analysis. [Online] Available at: https://www.researchgate.net/publication/276284211_Cyber-Threat_versus_Cyber-Risk_Performing_Adequate_Analysis [Accessed: 1 November, 2017]

FLETCHER, N. 2007. Challenges for regulating financial fraud in cyberspace. Journal of financial crime, 14(2), 190-207.

FURNELL, S., EMM, D. and PAPADAKI, M. 2015. The challenge of measuring cyber-dependent crime. Computer Fraud & Security, 10: 5-10
GARBER, L. 1999. Melissa virus creates a new type of threats. Computer, 32(6): 16-19.

GOL, M., ABUR, A. 2013. Identifying vulnerabilities of state estimators against cyber-attacks. [Online] Available at: http://ieeexplore.ieee.org/abstract/document/6652124/ [Accessed: 1 November, 2017].

HILLS, M. and BATCHELOR, G. Culturing defensive immunity: hardening psychological targets against cyber attack. In European Conference on Cyberwarfare and Security, July 2015: 95.

JARDINE, E. 2015. Global cyberspace is safer than you think: real trends in cybercrime [Online] Available at: http://boletines.prisadigital.com/SSRN-id2634590.pdf [Accessed: 29 October, 2017].

KAWANAKA, T., MATSUMARU, M., and ROKUGAWA, S. 2014. Software measure in cyber-attacks on production control system. Computers & Industrial Engineering, 76: 378-386. DOI: https://doi.org/10.1016/j.cie.2014.08.008.

KIM, W., JEONG, O.R., Kim, C. and SO, J. 2011. The dark side of the Internet: Attacks, costs and responses. Information Systems, 36(3): 675-705. DOI: https://doi.org/10.1016/j.is.2010.11.003Get rights and content.

KLEINER, A., NICHOLAS, P., SULLIVAN, K. 2013. Linking cybersecurity policy and performance. Microsoft Trustworthy Computing. [Online] Available at: http://www.ilsole24ore.com/pdf2010/SoleOnLine5/_Oggetti_Correlati/Documenti/Tecnologie/2013/02/SIR-Special-Edition-Security-Atlas-whitepaper.pdf [Accessed: 30 October, 2017].

KOVACS, E. 2012. CSS Corp Site Hacked by LulzSec, Database Leaked. [Online], Available at: http://news.softpedia.com/news/CSS-Corp-Site-Hacked-by-LulzSec-Database-Leaked-261041.shtml [Accessed: 30 October, 2017].

KOX, H. L. M. 2013. Cybersecurity in the perspective of Internet traffic growth. [Online] Available at: https://mpra.ub.uni-muenchen.de/47883/ [Accessed: 30 October, 2017]

LEEUW, F. L. and LEEUW, B. 2012. Cyber society and digital policies: Challenges to evaluation? Evaluation, 18(1): 111-127.

LEVI, M. and LEIGHTON WILLIAMS, M. 2013. Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space. Information Management & Computer Security, 21(5): 420-443.

LUO, X. and LIAO, O. 2009. Ransomware: a new cyber hijacking threat to enterprises. Handbook of Research on Information Security and Assurance. IGI Global, 1-6.

MCGUIRE, G. and KRIBS, B. 2002. Attack on the Internet Called the Largest Ever. [Online] Available at: https:www.crime-research.org/news/2002/10/Mess2402.html. [Accessed: 28 October, 2017].

MIAO, L., and LI, S. 2017. Cyber security based on mean field game model of the defender: Attackerstrategies. International Journal of Distributer Sensor Networks, 13(10): 1-8.

MUSMAN, S., TEMIN, A., TANNER, M., FOX, D. & PRIDEMORE, B. 2010. Evaluating the impact of cyber attacks on missions. In International Conference on Cyber Warfare and Security (p. 446). Academic Conferences International Limited.

NATO. 2013. The history of cyber attacks – a timeline. [Online]. Available at: https://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm [Accessed: 30 October, 2017].

PONEMON INSTITUTE. 2016. Cost of Cyber Crime Study & the Risk of Business Innovation. [Online] Available at: https://saas.hpe.com/sites/default/files/assets/4AA6-8392ENW.pdf [Accessed: 30 September, 2017].

REYNS, B.W. 2010. A Situational Crime Prevention Approach of Cyberstalking Victimization: Preventive Tactics for Internet Users and Online Place Managers. In Crime Prevention and Community Safety, 12: 99–118.

ROGERS, M. K. 2006. A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital investigation, 3(2): 97–102. DOI: https://doi.org/10.1016/j.diin.2006.03.001.

ROVE, N.C. 2008. Ethics of Cyber War Attacks.In Cyber Warfare and Cyber Terorrism.

SAXENA, N., CHUKWUKA, V. XIONG, L. and GRIJALVA, S. 2017. CPSA: A Cyber-Physical Security Assessment Tool for Situational Awereness in Smart Grid. In ACM CCS Workshop (CPS-SPC), 30 October-3 Novermber, 2017, Dallas, USA [In Press].

SMITH, K. T., SMITH, M. L. and SMITH, J. L. 2011. Case studies of cybercrime and its impact on marketing activity and shareholder value. Academy of Marketing Studies Journal, 15(2): 67-81.

SZOLDRA, P. 2015. The 9 worst cyber attacks in 2015. [Online]. Available at: http://www.businessinsider.com/cyberattacks-2015-12/#hackers-breached-the-systems-of-the-health-insurer-anthem-inc-exposing-nearly-80-million-personal-records-1 [Accessed: 31 October, 2017].

VAN NIEKERK, B. Suppression of cyber-defences. In IST Africa Week Conference, 2016, IEEE, p. 1-12.

VENTRE, D. 2013. Cyberconflict. In Cyberwar and Information Warfare, John Wiley & Sons, Inc, Hoboken, NJ, USA.

WOOLRIDGE, J. M. 2006. Cluster-Sample Methods in Applied Econometrics: An Extended Analysis [Online] Available at: http://econ.ucsb.edu/~doug/245a/Paper/Cluster%20Sample%20Methods%20in%20Applied%20Econometrics.pdf [Accessed: 17 October, 2017].
Published
2017-12-31
Section
Articles