Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/42687
DC FieldValue
dc.titleCyber attacks: Does physical boundary matter?
dc.contributor.authorWang, Q.-H.
dc.contributor.authorKim, S.H.
dc.date.accessioned2013-07-11T10:15:38Z
dc.date.available2013-07-11T10:15:38Z
dc.date.issued2009
dc.identifier.citationWang, Q.-H.,Kim, S.H. (2009). Cyber attacks: Does physical boundary matter?. ICIS 2009 Proceedings - Thirtieth International Conference on Information Systems. ScholarBank@NUS Repository.
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/42687
dc.description.abstractInformation security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 countries during the period 2003-2007, we find little evidence on the spatial autocorrelation of cyber attacks at any week. However, after considering economic opportunity, IT infrastructure, international collaboration in enforcement and conventional crimes, we find strong evidence that cyber attacks were indeed spatially autocorrelated as they moved over time. The policy and managerial implication is that physical boundary should be an important factor in addressing strategic cyber attacks and their potential risks.
dc.sourceScopus
dc.subjectCyber attacks
dc.subjectInformation security
dc.subjectInterdependence
dc.subjectPhysical boundary
dc.typeConference Paper
dc.contributor.departmentINFORMATION SYSTEMS
dc.description.sourcetitleICIS 2009 Proceedings - Thirtieth International Conference on Information Systems
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.