2013
DOI: 10.1007/s10669-013-9479-9
|View full text |Cite
|
Sign up to set email alerts
|

Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Due to the large scope of the electronics industry, and the increasing interconnectedness of the global supply chain, there are many different economic sectors and stakeholders that have the potential to be harmed. For instance, if a microprocessor is corrupted, then any number of economic sectors could be at risk, including energy, retail, or finance …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the large scope of the electronics industry, and the increasing interconnectedness of the global supply chain, there are many different economic sectors and stakeholders that have the potential to be harmed. For instance, if a microprocessor is corrupted, then any number of economic sectors could be at risk, including energy, retail, or finance …”
Section: Introductionmentioning
confidence: 99%
“…For instance, if a microprocessor is corrupted, then any number of economic sectors could be at risk, including energy, retail, or finance. (5) Most critically, counterfeit electronics carry national security implications. (4) In fact, it has been found that counterfeit electronic parts misrepresented as military grade can be easily purchased on the Internet (6) and that counterfeits have been found in U.S. Department of Defense (DoD) supply chains, including counterfeit memory devices in the mission computers of missile systems.…”
Section: Introductionmentioning
confidence: 99%
“…As part of this component of the model, markets are assumed to return to equilibrium after a shock. REMI is one of just a few models that includes both the computable general equilibrium and input‐output modeling logic (Kelic et al., ).…”
Section: Methodological Approachmentioning
confidence: 99%
“…Pawlak and Wendling (2013) then explore the existing and future trends in governmental policies related to cybersecurity and identify gaps and potential paths forward. Next, Kelic et al (2013) describe an agent-based decision framework for modeling the macroeconomic impacts of cyber attacks on vulnerable industry sectors, such as the oil and gas industry. Finally, Vaishnav et al (2013) outline a novel framework connecting cybersecurity and international relations as a single system and comment on the properties of such a system.…”
Section: Cognitive Domainmentioning
confidence: 99%