2017
DOI: 10.25300/misq/2017/41.2.08
|View full text |Cite
|
Sign up to set email alerts
|

Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(28 citation statements)
references
References 32 publications
0
28
0
Order By: Relevance
“…Research has examined how corruption and political stability/sovereignty influence national preparedness toward cybersecurity (Hui et al, 2017). Another study investigates how electronic government implementation reduces corruption in institutions (Srivastava, Teo, & Devaraj, 2016).…”
Section: Socio-political Contextmentioning
confidence: 99%
“…Research has examined how corruption and political stability/sovereignty influence national preparedness toward cybersecurity (Hui et al, 2017). Another study investigates how electronic government implementation reduces corruption in institutions (Srivastava, Teo, & Devaraj, 2016).…”
Section: Socio-political Contextmentioning
confidence: 99%
“…Research also suggests that attackers in cyberspace are not only rational and motivated by economic incentives, but also act strategically in identifying targets and approaches [8]-"The good guys are getting better, but the bad guys are getting badder faster" [9]. Perhaps there was a time a decade ago when cybersecurity was only a matter of "if" an organization was going to be compromised, but today it has become a question of "when," and "at what level.…”
Section: Introductionmentioning
confidence: 99%
“…This setting enables us to observe organizations' natural reactions to our treatment and to collect data for empirical analyses. Similar to Hui et al (2017), we adopt an international perspective and perform a quasi-experiment on multiple countries, extending the existing empirical studies on information security that consider only US organizations (e.g., He et al 2016, Romanosky et al 2011). The existing literature on security-related public policies focuses on information sharing and disclosure, whereas we focus on reputational sanctions, particularly in the form of a top-10 list, which has been shown to significantly influence consumer preferences Zhang 2016, Adomavicius et al 2013).…”
Section: Resultsmentioning
confidence: 99%
“…Lastly, our work contributes to public policies on information security that target organizations that knowingly leave vulnerabilities unresolved. The prior work on security-related public policies has focused on the behavior of software vendors (Arora et al 2005, August and Tunca 2011, Kim et al 2011, Telang and Wattal 2007, attackers (Arora et al 2006, Hui et al 2017, Mitra and Ransbotham 2015, Ransbotham et al 2012, and consumers (Romanosky et al 2011). The organizations with security vulnerabilities are the important middlemen between attackers and victims.…”
Section: Resultsmentioning
confidence: 99%