Open Access

Cyberattacks on critical infrastructure: An economic perspective


Cite

Bank of America Merrill Lynch. (2015). Global cybersecurity primer.Search in Google Scholar

Beasley, C., Venayagamoorthy, G. K., & Brooks, R. (2014). Cyber security evaluation of synchrophasors in a power system. IEEE Computer Society, 1-5.10.1109/PSC.2014.6808100Search in Google Scholar

Bernik, I., & Prislan, K. (2016). Measuring information security performance with 10 by 10 model for holistic state evaluation. PLOS ONE, 11(9), 1-33.10.1371/journal.pone.0163050Search in Google Scholar

Bojanc, R., & Jerman-Blažič, B. (2008). An economic modelling approach to information security risk management. International Journal of Information Management, 28(5), 413-422.10.1016/j.ijinfomgt.2008.02.002Open DOISearch in Google Scholar

Conti, M., Kumar, E. S., Lal, C., & Ruj, S. (2017). A survey on security and privacy issues of Bitcoin. IEEE Communications Surveys & Tutorials, 20(4), 3416-3452.10.1109/COMST.2018.2842460Open DOISearch in Google Scholar

Council of Economic Advisers. (2018). The cost of malicious cyber activity to the U.S. economy. Washington, DC: The White House. Retrieved from https://www.white-house.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdfSearch in Google Scholar

ENISA (2012). Introduction to return on security investment. Athens: European Union Agency for Network and Information Security.Search in Google Scholar

Evans, G. L. (2017). Disruptive technology and the board: The tip of the iceberg. Economics and Business Review, 3(1), 205-223.10.18559/ebr.2017.1.11Open DOISearch in Google Scholar

FireEye. (2013). The advanced cyber attack landscape. Milpitas, CA: FireEye, Inc.Search in Google Scholar

Flick, T., & Morehouse, J. (2010). Securing the smart grid: next generation power grid security. Burlington, MA: Elsevier.Search in Google Scholar

Fung, C. C., Roumani, M. A., & Wong, K. P. (2013). A proposed study on economic impacts due to cyber attacks in smart grid: A risk based assessment. IEEE Power and Energy Society General Meeting, 1-5.Search in Google Scholar

Gintis, H. (2005). Behavioral game theory and contemporary economic theory. Analyse & Kritik, 27(1), 48-72.10.1515/auk-2005-0102Search in Google Scholar

Goodin, D. (2011). PlayStation Network breach will cost Sony $171m. Retrieved from https://www.theregister.co.uk/2011/05/24/sony_playstation_breach_costs/Search in Google Scholar

Jentzsch, N. (2016). State-of-the-art of the economics of cyber-security and privacy. IPACSO Deliverable D, 4.10.2139/ssrn.2671291Search in Google Scholar

Klahr, R., Shah, J., Sheriffs, P., Rossington, T., Pestell, G., Button, M., & Wang, V. (2017). Cyber security breaches survey 2017. Main report. Retrieved from http://www.ipsosmori.com/termsSearch in Google Scholar

Kowalski, T. (2013). Globalization and transformation in Central European countries: the case of Poland. Poznan: University of Economics Press.Search in Google Scholar

Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, 41(10), 1027-1038.10.1016/j.telpol.2017.09.003Search in Google Scholar

Lloyd’s. (2015). Business blackout. Lloyd’s Emerging Risk Report–2015. Cambridge: University of Cambridge Judge Business School.Search in Google Scholar

Lockstep Consulting. (2004). A guide for government agencies calculating return on security investment. Version 2.0. New South Wales Department of Commerce, Government Chief Information Office, Sydney, Australia. Retrieved from http://nla.gov.au/nla.arc-111462Search in Google Scholar

Louis, M., Adrian, B., & Evangelos, R. (2016). Threat landscape 2015. Athens: European Union Agency for Network and Information Security (ENISA).Search in Google Scholar

Marotta, A., Martinelli, F., Nanni, S., Orlando, A., & Yautsiukhin, A. (2017). Cyber-insurance survey. Computer Science Review, 24, 35-61.10.1016/j.cosrev.2017.01.001Search in Google Scholar

Mendel, J. (2018). The economic perspective on smart grid cyber security. (Unpublished doctoral dissertation). Poznań: Wydawnictwo Uniwersytetu Ekonomicznego.Search in Google Scholar

NIST. (2017). Proposed updates to the framework for improving critical infrastructure cybersecurity. Gaithesburg, MD: National Institute of Standards and Technology.Search in Google Scholar

O’Dell, J. (2011, January 29). How much does identity theft cost?. Mashable. Retrieved from https://mashable.com/2011/01/28/identity-theft-infographic/Search in Google Scholar

OECD. (2009a). Computer viruses and other malicious software. a threat to the internet economy. Paris: OECD Publishing. Retrieved from https://doi.org/10.1787/9789264056510-en10.1787/9789264056510-enOpen DOISearch in Google Scholar

OECD. (2009b). Malware: why should we be concerned?. In Computer viruses and other malicious software: A threat to the Internet economy. Paris: OECD Publishing. Retrieved from https://doi.org/10.1787/9789264056510-5-en10.1787/9789264056510-5-enOpen DOISearch in Google Scholar

OECD. (2013). Exploring the economics of personal data. OECD Digital Economy Papers, (220), 40.Search in Google Scholar

OECD. (2015). OECD digital economy outlook 2015. Paris: OECD Publishing. Retrieved from https://www.oecd.org/internet/oecd-digital-economy-outlook-2015-9789264232440-en.htm10.1787/9789264232440-enSearch in Google Scholar

Ponemon Institute LLC. (2015). The cost of malware containment. Traverse City, MI: Ponemon Institute Research Report.Search in Google Scholar

Ponemon Institute LLC. (2019). Cybersecurity in operational technology: 7 insights you need to know. Traverse City, MI: Ponemon Institute Research Report.Search in Google Scholar

Rebecca, S., & Rob, B. (2019, January 10). America’s electric grid has a vulnerable back door and Russia walked through it. The Wall Street Journal. Retrieved from https://www.wsj.com/articles/americas-electric-grid-has-a-vulnerable-back-doorand-russia-walked-through-it-11547137112Search in Google Scholar

Rogers, M., & Henderson, K. (2019, April 10). How blockchain can help the utility industry develop clean power. Sustainability blog. McKinsey & Company. Retrieved from https://www.mckinsey.com/business-functions/sustainability/our-insights/sustainability-blog/how-blockchain-can-help-the-utility-industry-develop-clean-powerSearch in Google Scholar

Sikorski, J. J., Haughton, J., & Kraft, M. (2017). Blockchain technology in the chemical industry: Machine-to-machine electricity market. Applied Energy, (195), 234-246.10.1016/j.apenergy.2017.03.039Search in Google Scholar

Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. New York, NY: Oxford University Press.Search in Google Scholar

Sobers, R. (2019). 60 must-know cybersecurity statistics for 2019. Inside Out Security Blog. New York, NY: Varonis. Retrieved from https://www.varonis.com/blog/cybersecurity-statistics/Search in Google Scholar

Smith, B. (2018, Novemebr 18). Government and business must fight the cyber threat. The Financial Times.Search in Google Scholar

Su, X. (2006). An overview of economic approaches to information security management. Technical Report TR-CTIT-06-30. Retrieved from http://www.ub.utwente.nl/webdocs/ctit/1/00000177.pdfSearch in Google Scholar

US Homeland Security NCCIC. (2015). Seven strategies to defend ICSs. Washington, DC: US Department of Homeland Security. Retrieved from https://ics-cert.us-cert.gov/sites/default/files/documents/Seven%20Steps%20to%20Effectively%20Defend%20Industrial%20Control%20Systems_S508C.pdfSearch in Google Scholar

Vijay, S., Hoikka, H., & Kenneth, B. (2015). Ukraine 2015 power grid cyberattack. ELEC-E7470 Cybersecurity L-Case Study. Aalto: Aalto University. Retrieved from https://mycourses.aalto.fi/pluginfile.php/457047/mod_folder/content/0/Cyber%20Warriors.pdf?forcedownload=1Search in Google Scholar

Wakefield, M. (2012). Guidebook for cost/benefit analysis of smart grid demonstration projects. Palo Alto, CA: Electric Power Research Institute. Retrieved from https://www.smartgrid.gov/files/Guidebook-Cost-Benefit-Analysis-Smart-Grid-Demonstration-Projects.pdfSearch in Google Scholar

eISSN:
2450-0097
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Business and Economics, Political Economics, other, Finance, Mathematics and Statistics for Economists, Econometrics