2006
DOI: 10.1111/j.1539-6924.2006.00787.x
|View full text |Cite
|
Sign up to set email alerts
|

A Macro‐Economic Framework for Evaluation of Cyber Security Risks Related to Protection of Intellectual Property

Abstract: The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Conseq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(26 citation statements)
references
References 16 publications
0
26
0
Order By: Relevance
“…This basis is improved by correlating system survival times to the use of certain design enhancements and other threats countermeasures. In [1] a specific risk analysis is presented for the field intellectual property rights.…”
Section: Specifics Of Risk Management For Ismentioning
confidence: 99%
“…This basis is improved by correlating system survival times to the use of certain design enhancements and other threats countermeasures. In [1] a specific risk analysis is presented for the field intellectual property rights.…”
Section: Specifics Of Risk Management For Ismentioning
confidence: 99%
“…A 2005 study [38] on the losses due to piracy in the motion picture, sound recording, and publishing sectors could total $8.8 billion in the motion picture and sound recording sector and $21.4 billion in the publishing sector. The paper also discusses a cyber-attack of 1% loss in each sector of the U.S. economy.…”
Section: Cyber-related Disruptionsmentioning
confidence: 99%
“…The IIM, formulated in , describes how inoperability in each of n sectors, manifested in the vector q , is brought about by a demand perturbation c * and whose propagation is dictated by the interdependency matrix A *. A more detailed explanation of the IIM can be found in Reference 8, and some applications have included analyses of the 9/11 terrorist attacks, ( 9 ) the 2003 Northeast blackout, ( 10 ) and the effects of intellectual property theft, ( 11 ) among others. …”
Section: The Inventory Diim and Its Foundationsmentioning
confidence: 99%