This paper shows that firms significantly increase cash holdings after they have experienced a cybersecurity attack, and this behavior persists for years. A cyberattack increases cash holdings from a ...base level of 23% of assets to 26.87%. Similar firms, defined by industry and geographical proximity also increase their cash holdings. Suppliers of attacked firms are also affected. Overall, the results of this study indicate that the detrimental effects of a cybersecurity breach are not isolated to the attacked firms, and peer firms are quick to follow in taking precaution.
Transparantie over cybersecurity neemt toe Eimers, Peter; Shahim, Abbas; Kornelisse, Peter
MAB ('s-Gravenhage. Online),
12/2023, Volume:
97, Issue:
9/10
Journal Article
Peer reviewed
Open access
Cybersecurity is een randvoorwaarde voor organisaties en de samenleving om cyberrisico’s te beheersen. Deze cyberrisico’s kunnen zowel lokaal als wereldwijd stabiliteit en veiligheid in gevaar ...brengen. Het groeiend aantal cyberaanvallen, de toenemende complexiteit en de inzet van steeds meer geavanceerde digitale middelen zijn een punt van grote zorg voor alle belanghebbenden. De publieke transparantie omtrent de wijze waarop de steeds ernstiger wordende cyberrisico’s worden beheerst, is dan ook van groot belang en ook steeds vaker een vereiste. Dit komt onder andere tot uiting in de risicoparagraaf van het bestuursverslag en de ontwikkelende regelgeving, zoals die van de Cybersecurity Act en de SEC over cyber disclosures.
For the past 20 years, the word ’cyberterrorism’ has been used to describe online practices considered to be acts of terror. Yet, so far, experts and lawmakers have been unable to recognise and agree ...on what actually constitutes cyberterror. This paper retraces the origin of the term to show that the label of cyberterrorism is part of a discursive framework that aims to deter the development of cyberprotest and cyberactivism. The main argument is that while socio-political protest occurs in the digital sphere, cyberterrorism does not, and will not, happen in the near future. As such, it is critical that the word be excluded from contemporary debates about activism and digital networks.
Much of the talk centered on the concept of cyber conflict and the changing dynamic of future conflict is founded on the study of spectacular flights of imagination of what could be. This book enters ...into the debate to push discussion of the issue toward realistic evaluation of the tactic in modern international interactions. This book’s investigation exhaustively examines information on all cyber incidents and disputes in the last decade in order to delineate the patterns of cyber conflict as reflected by evidence. The goal of this book is to develop a theory of cyber conflict, analyze the empirical patterns of cyber conflict between antagonists, investigate the impact of cyber conflict on foreign policy interactions, delve deeper with a close examination of some recent and popular cyber incidents, and finally, develop a set of policy recommendations that deal with the emerging threat. The book argues that restraint is the norm in cyberspace and suggests that there is evidence this norm can influence how the tactic is used in the future.