Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/42687
DC Field | Value | |
---|---|---|
dc.title | Cyber attacks: Does physical boundary matter? | |
dc.contributor.author | Wang, Q.-H. | |
dc.contributor.author | Kim, S.H. | |
dc.date.accessioned | 2013-07-11T10:15:38Z | |
dc.date.available | 2013-07-11T10:15:38Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Wang, Q.-H.,Kim, S.H. (2009). Cyber attacks: Does physical boundary matter?. ICIS 2009 Proceedings - Thirtieth International Conference on Information Systems. ScholarBank@NUS Repository. | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/42687 | |
dc.description.abstract | Information security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 countries during the period 2003-2007, we find little evidence on the spatial autocorrelation of cyber attacks at any week. However, after considering economic opportunity, IT infrastructure, international collaboration in enforcement and conventional crimes, we find strong evidence that cyber attacks were indeed spatially autocorrelated as they moved over time. The policy and managerial implication is that physical boundary should be an important factor in addressing strategic cyber attacks and their potential risks. | |
dc.source | Scopus | |
dc.subject | Cyber attacks | |
dc.subject | Information security | |
dc.subject | Interdependence | |
dc.subject | Physical boundary | |
dc.type | Conference Paper | |
dc.contributor.department | INFORMATION SYSTEMS | |
dc.description.sourcetitle | ICIS 2009 Proceedings - Thirtieth International Conference on Information Systems | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.