Cyber Risk and Security Investment
Author
Abstract
Suggested Citation
Download full text from publisher
As the access to this document is restricted, you may want to look for a different version below or search for a different version of it.
Other versions of this item:
- Toni Ahnert & Michael Brolley & David Cimon & Ryan Riordan, 2022. "Cyber Risk and Security Investment," Staff Working Papers 22-32, Bank of Canada.
References listed on IDEAS
- Britta Hoyer & Kris De Jaegher, 2016.
"Strategic Network Disruption and Defense,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 18(5), pages 802-830, October.
- K.J.M. De Jaegher & B. Hoyer, 2010. "Strategic Network Disruption and Defense," Working Papers 10-13, Utrecht School of Economics.
- Gary S. Becker, 1974.
"Crime and Punishment: An Economic Approach,"
NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 1-54,
National Bureau of Economic Research, Inc.
- Gary S. Becker, 1968. "Crime and Punishment: An Economic Approach," Journal of Political Economy, University of Chicago Press, vol. 76(2), pages 169-169.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016.
"Network security and contagion,"
Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
- Daron Acemoglu & Azarakhsh Malekian & Asuman Ozdaglar, 2013. "Network Security and Contagion," NBER Working Papers 19174, National Bureau of Economic Research, Inc.
- Daron Acemoglu & Azarakhsh Malekian & Asuman E. Ozdaglar, 2013. "Network Security and Contagion," Levine's Working Paper Archive 786969000000000797, David K. Levine.
- Terrence August & Tunay I. Tunca, 2006. "Network Software Security and User Incentives," Management Science, INFORMS, vol. 52(11), pages 1703-1720, November.
- Moore, Tyler, 2010. "The economics of cybersecurity: Principles and policy options," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 103-117.
- Antonis Kotidis & Stacey L. Schreft, 2022. "Cyberattacks and Financial Stability: Evidence from a Natural Experiment," Finance and Economics Discussion Series 2022-025, Board of Governors of the Federal Reserve System (U.S.).
- Kamiya, Shinichi & Kang, Jun-Koo & Kim, Jungmin & Milidonis, Andreas & Stulz, René M., 2021. "Risk management, firm reputation, and the impact of successful cyberattacks on target firms," Journal of Financial Economics, Elsevier, vol. 139(3), pages 719-749.
- Claudia Biancotti, 2017. "The price of cyber (in)security: evidence from the Italian private sector," Questioni di Economia e Finanza (Occasional Papers) 407, Bank of Italy, Economic Research and International Relations Area.
- Dziubiński, Marcin & Goyal, Sanjeev, 2013. "Network design and defence," Games and Economic Behavior, Elsevier, vol. 79(C), pages 30-43.
- Sean Foley & Jonathan R Karlsen & Tālis J Putniņš, 2019. "Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed through Cryptocurrencies?," The Review of Financial Studies, Society for Financial Studies, vol. 32(5), pages 1798-1853.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Anna Cartwright & Edward Cartwright & Jamie MacColl & Gareth Mott & Sarah Turner & James Sullivan & Jason R. C. Nurse, 2023. "How cyber insurance influences the ransomware payment decision: theory and evidence," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 48(2), pages 300-331, April.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022.
"Network defense and behavioral biases: an experimental study,"
Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
- Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
- Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017.
"Optimal design and defense of networks under link attacks,"
Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers 1519, Groupe d'Analyse et de Théorie Economique Lyon St-Étienne (GATE Lyon St-Étienne), Université de Lyon.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2017. "Optimal Design and Defense of Networks Under Link Attacks," Post-Print hal-01384998, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2016. "Optimal design and defense of networks under link attacks," Post-Print halshs-01411520, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers halshs-01176928, HAL.
- Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.
- Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016.
"Network security and contagion,"
Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
- Daron Acemoglu & Azarakhsh Malekian & Asuman Ozdaglar, 2013. "Network Security and Contagion," NBER Working Papers 19174, National Bureau of Economic Research, Inc.
- Daron Acemoglu & Azarakhsh Malekian & Asuman E. Ozdaglar, 2013. "Network Security and Contagion," Levine's Working Paper Archive 786969000000000797, David K. Levine.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
- McBride, Michael & Hewitt, David, 2013.
"The enemy you can’t see: An investigation of the disruption of dark networks,"
Journal of Economic Behavior & Organization, Elsevier, vol. 93(C), pages 32-50.
- Michael McBride & David Hewitt, 2012. "The Enemy You Can't See: An Investigation of the Disruption of Dark Networks," Working Papers 121307, University of California-Irvine, Department of Economics.
- Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
- Chang, Jin-Wook & Jayachandran, Kartik & Ramírez, Carlos A. & Tintera, Ali, 2024. "On the anatomy of cyberattacks," Economics Letters, Elsevier, vol. 238(C).
- Manxi Wu & Saurabh Amin, 2019. "Securing Infrastructure Facilities: When Does Proactive Defense Help?," Dynamic Games and Applications, Springer, vol. 9(4), pages 984-1025, December.
- Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
- Lars Hornuf & Paul P. Momtaz & Rachel J. Nam & Ye Yuan, 2023. "Cybercrime on the Ethereum Blockchain," CESifo Working Paper Series 10598, CESifo.
- Billand, Pascal & Bravard, Christophe & Iyengar, Sitharama S. & Kumar, Rajnish & Sarangi, Sudipta, 2016.
"Network connectivity under node failure,"
Economics Letters, Elsevier, vol. 149(C), pages 164-167.
- Pascal Billand & Christophe Bravard & Sitharama S. Iyengar & Rajnish Kumar & Sudipta Sarangi, 2016. "Network connectivity under node failure," Post-Print hal-01404559, HAL.
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Haller, Hans & Hoyer, Britta, 2019. "The common enemy effect under strategic network formation and disruption," Journal of Economic Behavior & Organization, Elsevier, vol. 162(C), pages 146-163.
- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017.
"What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan,"
Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What Have We Learned? Assessing the Effectiveness of Counterterrorism Strategies in Pakistan," MPRA Paper 77015, University Library of Munich, Germany, revised 20 Feb 2017.
- Nora, Vladyslav & Uno, Hiroshi, 2014.
"Saddle functions and robust sets of equilibria,"
Journal of Economic Theory, Elsevier, vol. 150(C), pages 866-877.
- NORA, Vladyslav & UNO, Hiroshi, 2012. "Saddle functions and robust sets of equilibria," LIDAM Discussion Papers CORE 2012050, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
More about this item
Keywords
Cyber risk; Cyber security; ransomware; cyber security ratings; Regulation; Consumer protection;All these keywords.
JEL classification:
- G10 - Financial Economics - - General Financial Markets - - - General (includes Measurement and Data)
- G28 - Financial Economics - - Financial Institutions and Services - - - Government Policy and Regulation
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:cpr:ceprdp:17403. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: the person in charge (email available below). General contact details of provider: https://www.cepr.org .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.