On the anatomy of cyberattacks
Author
Abstract
Suggested Citation
DOI: 10.1016/j.econlet.2024.111676
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Bloch, Francis & Dutta, Bhaskar & Dziubiński, Marcin, 2020.
"A game of hide and seek in networks,"
Journal of Economic Theory, Elsevier, vol. 190(C).
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," The Warwick Economics Research Paper Series (TWERPS) 1226, University of Warwick, Department of Economics.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," Post-Print halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubi´nski, 2019. "A Game of Hide and Seek in Networks," Working Papers 21, Ashoka University, Department of Economics.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubinski, 2020. "A game of hide and seek in networks," Papers 2001.03132, arXiv.org.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," PSE-Ecole d'économie de Paris (Postprint) halshs-03230063, HAL.
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," CRETA Online Discussion Paper Series 53, Centre for Research in Economic Theory and its Applications CRETA.
- Rustam Jamilov & Hélène Rey & Ahmed Tahoun, 2021.
"The Anatomy of Cyber Risk,"
NBER Working Papers
28906, National Bureau of Economic Research, Inc.
- Rustam Jamilov & Helene Rey & Ahmed Tahoun, 2023. "The Anatomy of Cyber Risk," Working Papers Series inetwp206, Institute for New Economic Thinking.
- Rey, Hélène & Jamilov, Rustam & Tahoun, Ahmed, 2021. "The Anatomy of Cyber Risk," CEPR Discussion Papers 16217, C.E.P.R. Discussion Papers.
- Chris Florackis & Christodoulos Louca & Roni Michaely & Michael Weber, 2023.
"Cybersecurity Risk,"
The Review of Financial Studies, Society for Financial Studies, vol. 36(1), pages 351-407.
- Chris Florackis & Christodoulos Louca & Roni Michaely & Michael Weber & Michael Weber, 2020. "Cybersecurity Risk," CESifo Working Paper Series 8760, CESifo.
- Chris Florakis & Christodoulos Louca & Roni Michaely & Michael Weber, 2020. "Cybersecurity Risk," Working Papers 2020-178, Becker Friedman Institute for Research In Economics.
- Chris Florackis & Christodoulos Louca & Roni Michaely & Michael Weber, 2020. "Cybersecurity Risk," Swiss Finance Institute Research Paper Series 20-108, Swiss Finance Institute.
- Chris Florackis & Christodoulos Louca & Roni Michaely & Michael Weber, 2020. "Cybersecurity Risk," NBER Working Papers 28196, National Bureau of Economic Research, Inc.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2023.
"Attack and interception in networks,"
Theoretical Economics, Econometric Society, vol. 18(4), November.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," The Warwick Economics Research Paper Series (TWERPS) 1338, University of Warwick, Department of Economics.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," CRETA Online Discussion Paper Series 68, Centre for Research in Economic Theory and its Applications CRETA.
- Francis Bloch & Kalyan Chatterjee & Bhaskar Dutta, 2021. "Attack and Interception in Networks," Working Papers 57, Ashoka University, Department of Economics.
- Anil K. Kashyap & Anne Wetherilt, 2019.
"Some Principles for Regulating Cyber Risk,"
AEA Papers and Proceedings, American Economic Association, vol. 109, pages 482-487, May.
- Kashyap, Anil & Wetherilt, Anne, 2018. "Some Principles for Regulating Cyber Risk," CEPR Discussion Papers 13324, C.E.P.R. Discussion Papers.
- Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
- Aldasoro, Iñaki & Gambacorta, Leonardo & Giudici, Paolo & Leach, Thomas, 2022.
"The drivers of cyber risk,"
Journal of Financial Stability, Elsevier, vol. 60(C).
- Iñaki Aldasoro & Leonardo Gambacorta & Paolo Giudici & Thomas Leach, 2020. "The drivers of cyber risk," BIS Working Papers 865, Bank for International Settlements.
- Gambacorta, Leonardo & Aldasoro, Inaki & Giudici, Paolo & Leach, Thomas, 2020. "The drivers of cyber risk," CEPR Discussion Papers 14805, C.E.P.R. Discussion Papers.
- Antonis Kotidis & Stacey L. Schreft, 2022. "Cyberattacks and Financial Stability: Evidence from a Natural Experiment," Finance and Economics Discussion Series 2022-025, Board of Governors of the Federal Reserve System (U.S.).
- Kamiya, Shinichi & Kang, Jun-Koo & Kim, Jungmin & Milidonis, Andreas & Stulz, René M., 2021. "Risk management, firm reputation, and the impact of successful cyberattacks on target firms," Journal of Financial Economics, Elsevier, vol. 139(3), pages 719-749.
- Dziubiński, Marcin & Goyal, Sanjeev, 2013. "Network design and defence," Games and Economic Behavior, Elsevier, vol. 79(C), pages 30-43.
- Eisenbach, Thomas M. & Kovner, Anna & Lee, Michael Junho, 2022.
"Cyber risk and the U.S. financial system: A pre-mortem analysis,"
Journal of Financial Economics, Elsevier, vol. 145(3), pages 802-826.
- Thomas M. Eisenbach & Anna Kovner & Michael Junho Lee, 2020. "Cyber Risk and the U.S. Financial System: A Pre-Mortem Analysis," Staff Reports 909, Federal Reserve Bank of New York.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Crosignani, Matteo & Macchiavelli, Marco & Silva, André F., 2023.
"Pirates without borders: The propagation of cyberattacks through firms’ supply chains,"
Journal of Financial Economics, Elsevier, vol. 147(2), pages 432-448.
- Matteo Crosignani & Marco Macchiavelli & André F. Silva, 2020. "Pirates without Borders: The Propagation of Cyberattacks through Firms’ Supply Chains," Staff Reports 937, Federal Reserve Bank of New York.
- Anand, Kartik & Duley, Chanelle & Gai, Prasanna, 2022. "Cybersecurity and financial stability," Discussion Papers 08/2022, Deutsche Bundesbank.
- Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022.
"Network defense and behavioral biases: an experimental study,"
Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
- Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
- Daniel Celeny & Loic Mar'echal, 2024. "Cyber risk and the cross-section of stock returns," Papers 2402.04775, arXiv.org, revised Mar 2024.
- Aldasoro, Iñaki & Gambacorta, Leonardo & Giudici, Paolo & Leach, Thomas, 2022.
"The drivers of cyber risk,"
Journal of Financial Stability, Elsevier, vol. 60(C).
- Iñaki Aldasoro & Leonardo Gambacorta & Paolo Giudici & Thomas Leach, 2020. "The drivers of cyber risk," BIS Working Papers 865, Bank for International Settlements.
- Gambacorta, Leonardo & Aldasoro, Inaki & Giudici, Paolo & Leach, Thomas, 2020. "The drivers of cyber risk," CEPR Discussion Papers 14805, C.E.P.R. Discussion Papers.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2023.
"Attack and interception in networks,"
Theoretical Economics, Econometric Society, vol. 18(4), November.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," CRETA Online Discussion Paper Series 68, Centre for Research in Economic Theory and its Applications CRETA.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," The Warwick Economics Research Paper Series (TWERPS) 1338, University of Warwick, Department of Economics.
- Francis Bloch & Kalyan Chatterjee & Bhaskar Dutta, 2021. "Attack and Interception in Networks," Working Papers 57, Ashoka University, Department of Economics.
- Ahnert, Toni & Brolley, Michael & Cimon, David & Riordan, Ryan, 2022.
"Cyber Risk and Security Investment,"
CEPR Discussion Papers
17403, C.E.P.R. Discussion Papers.
- Toni Ahnert & Michael Brolley & David Cimon & Ryan Riordan, 2022. "Cyber Risk and Security Investment," Staff Working Papers 22-32, Bank of Canada.
- Martin Boyer & Martin Eling, 2023. "New advances on cyber risk and cyber insurance," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 48(2), pages 267-274, April.
- José Ramón Martínez Resano, 2022. "Digital resilience and financial stability. The quest for policy tools in the financial sector," Financial Stability Review, Banco de España, issue Autumn.
- Bloch, Francis & Dutta, Bhaskar & Dziubiński, Marcin, 2020.
"A game of hide and seek in networks,"
Journal of Economic Theory, Elsevier, vol. 190(C).
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," CRETA Online Discussion Paper Series 53, Centre for Research in Economic Theory and its Applications CRETA.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubinski, 2020. "A game of hide and seek in networks," Papers 2001.03132, arXiv.org.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," Post-Print halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," PSE-Ecole d'économie de Paris (Postprint) halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubi´nski, 2019. "A Game of Hide and Seek in Networks," Working Papers 21, Ashoka University, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," The Warwick Economics Research Paper Series (TWERPS) 1226, University of Warwick, Department of Economics.
- Daniel Celeny & Loic Mar'echal & Evgueni Rousselot & Alain Mermoud & Mathias Humbert, 2024. "Prioritizing Investments in Cybersecurity: Empirical Evidence from an Event Study on the Determinants of Cyberattack Costs," Papers 2402.04773, arXiv.org.
- Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.
- Konrad, Kai A. & Morath, Florian, 2023.
"How to preempt attacks in multi-front conflict with limited resources,"
European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
- Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
- Zängerle, Daniel & Schiereck, Dirk, 2022. "Modelling and predicting enterprise‑level cyber risks in the context of sparse data availability," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 136276, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
- Belhaj, Mohamed & Deroïan, Frédéric, 2018.
"Targeting the key player: An incentive-based approach,"
Journal of Mathematical Economics, Elsevier, vol. 79(C), pages 57-64.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the Key Player: An Incentive-Based Approach," AMSE Working Papers 1804, Aix-Marseille School of Economics, France.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the Key Player: An Incentive-Based Approach," Working Papers halshs-01699849, HAL.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the key player: An incentive-based approach," Post-Print hal-01981885, HAL.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Matteo Malavasi & Gareth W. Peters & Stefan Treuck & Pavel V. Shevchenko & Jiwook Jang & Georgy Sofronov, 2024. "Cyber Risk Taxonomies: Statistical Analysis of Cybersecurity Risk Classifications," Papers 2410.05297, arXiv.org.
- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Boot, Arnoud & Hoffmann, Peter & Laeven, Luc & Ratnovski, Lev, 2021. "Fintech: what’s old, what’s new?," Journal of Financial Stability, Elsevier, vol. 53(C).
More about this item
Keywords
Cyberattacks; Cybersecurity; Hacks; Cyber risk;All these keywords.
JEL classification:
- D39 - Microeconomics - - Distribution - - - Other
- D22 - Microeconomics - - Production and Organizations - - - Firm Behavior: Empirical Analysis
- M15 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Business Administration - - - IT Management
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ecolet:v:238:y:2024:i:c:s0165176524001599. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/ecolet .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.