Determinants of the cyber-risks arise and realization

Authors

Keywords:

cyber-risk, cyber-attack, cyber-threat, cyber-incident.

Abstract

BackgroundOver the past decades, the development of the Internet has revolutionized the communication area, which has become a major factor in global economic growth, but has led to cyber-risk arise.
Analysis of recent research and publications. In modern scientific literature the small number of jobs is devoted to the economic aspects of cyber-risks and methods of managing them. The pace of research on this problem in developed countries leaves significantly behind the domestic developments. This gap, on the one hand, is explained by the level of development of the financial system and the degree of its dependence on information technology. On the other hand, the issue of cyber risk combines two different areas: financial and informational, requiring an interdisciplinary approach to its study.
Private institutions play a key role in the study of the essence of cyber-risks: consulting, insurance companies and information and software companies, such as AON, PricewaterhouseCoopers, Deloitte, Ernstand Young, Society of Actuaries, International Association, Allianz, and Geneva Association. With the growing of cyber risk and the negative financial implications of its implementation, state and commercial institutions, such as the Federal Bureau of Investigation in the USA, the Bank for International Settlements, are increasingly paying attention to this threat.
Among domestic scientists it is worth to highlight the works of V. Bratiuk, E. Semenova, and Yu. Kozhedub, that paid attention to insurance protection against cyber-risks, to problems of their management and analysis of documents on their management.
The aim of the article is to study the determinants of cyber-risk and their negative impact on world and national economies.
Materials and methods. The works of domestic and foreign scholars have become the theoretical and methodological basis of the article. The research was carried out using the methods of theoretical generalization, comparative analysis, analysis and synthesis.
Results. Based on the analysis of scientific literature and normative legal acts, the causal, sequential, and instrumental approaches to understanding the definition of cyber risk are identified. It is proposed to consider the concept of cyber-risk in a narrow and broad sense. In the narrow sense, cyber-risk is associated with operational threats to information and technology assets that adversely affect the confidentiality, availability and integrity of information or information systems. Cyber-risk is an operational risk, which is to obtain direct or indirect damage by economic agents as a result of their operation in cyberspace. In the broad sense, cyber-risks are the likelihood of a threat to interactive digital networks used to transmit, modify, and store information.
Conclusion. To prevent cyber-risk implementation, cyberspace should be governed by certain rules of behavior. National cyber-security agencies should receive timely and accurate cyber-crime reports from national economic agents. Cybersecurity standards should include the provision of internal cyber-risk data by financial institutions that will be automated.

Author Biographies

Svitlana VOLOSOVYCH, Kyiv National University of Trade and Economics

Doctor of Economics, Professor, Professor of the Finance Department

Liubov KLAPKIV, Kyiv National University of Trade and Economics

PhD in Economics, senior lecturer of the Finance Department

References

Global Economic Forum, The Global Risks Report 2017. 12th Edition. URL : http://wef.ch/risks2017.

Kopp E., Kaffenberger L., Wilson C. Cyber Risk, Market Failures, and Financial Stability. Working Paper, 2017. International Monetary Fund. URL : https://www.imf.org/~/media/Files/Publications/WP/2017/wp17185.ashx.

Peters Gereth W., Shevchenko P. V., Cohen D. R., Maurice D. Understanding Cyber Risk and Cyber Insurance, FinTech: Growth and Deregulation. URL : https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3065635.

Cebula J. J., Young L. R. A Taxonomy of Operational Cyber Security Risks, Carnegie Mellon University. URL : https://www.sei.cmu.edu/reports/10tn028.pdf.

Committee on Payments and Market Infrastructures and International Organization of Securities Commissions, Guidance on Cyber Resilience for Financial Market Infrastructures. June 2016. URL : https://www.bis.org/cpmi/publ/d146.htm.

Federal Bureau of Investigation, Internet Crime Report. 2016. URL : https://pdf.ic3.gov/2016_IC3Report.pdf

Eling M. What do we know about cyber risk and cyber risk insurance? The Journal of Risk Finance. 2017. Іss. 5. Р. 474–491.

Bratjuk V. P. Sutnist' kiberryzykiv ta strahovyj zahyst vid kiberryzykiv v Ukrai'ni. Aktual'ni probl. ekonomiky. 2015. № 9 (171). C. 421–427.

Semenova E. D., Tarasova K. I. Stanovlenie novogo cifrovogo mira i problemy menedzhmenta kiber-riskov. Marketing і menedzhment іnnovacіj. 2017. № 3. S. 236–244.

Kozhedub Ju. Analiz dokumentiv z keruvannja ryzykom kiberbezpeky. Information Technology and Security. 2017. Vol. 5. № 1. S. 82–95.

Institute of Risk Management. URL : https://www.theirm.org/knowledge-andresources/thought-leadership/cyber-risk.

Olsen T. Cyber risk insurance. 18.06.2013. URL : https://www.pwc.dk/da/arrangementer/assets/cyber-tineolsen.pdf.

CRO Forum. The Cyber Risk Challenge and the Role of Insurance. December 2014. URL : http://www.thecroforum.org/cyber-resilience-cyber-risk-challenge-role-insurance.

Rajnovic D. Cyberspace – What is it? Cisco Blogs. July 2012. URL : https://blogs.cisco.com/security/cyberspace-what-is-it.

Eling M., Wirfs J. H. Cyber Risk: Too Big to Insure? Risk Transfer Options for a Mercurial Risk Class Institute of Insurance Economics Universitat St. Gallen. 2016, 174 р. URL : www.ivw.unisg.ch.

Lloyds Banking Group. Understanding the interactions between cyber-crime and fraud prevention. URL : https://www.cefpro.com/0506ri-understanding-the-interactions-betweencyber-crime-and-fraud-prevention.

FFIEC. Cybersecurity Assessment Tool Glossary. June 2015. URL : http://www.ffiec.gov/pdf/cybersecurity/FFIEC_CAT_App_C_Glossary_June_2015_PDF5.pdf.

Kiberprestuplenija oboshlis' mirovoj jekonomike v $450 milliardov v 2016 godu. URL : http://biz.censor.net.ua/news/3020281/kiberprestupleniya_oboshlis_mirovoyi_ekonomike_v_450_milliardov_v_2016_godu.

CEA Report: The Cost of Malicious Cyber Activity to the U.S. Economy. February 16, 2018. URL : https://www.whitehouse.gov/articles/cea-report-cost-malicious-cyberactivity-u-s-economy.

Rob Starr.7Types of Cyber Attacks Are Threatening Your Small Business Right Now. May 8, 2017. URL : https://smallbiztrends.com/2017/05/types-of-cyber-attackssmall-business.html.

Price water house Cooper. 2015 Information Security Breaches Survey. Department for Business, Innovation and Skills. URL : www.pwc.co.uk/services/audit-assurance/insights/2015-information-security-breaches-survey.html.

Hua J., Bapna S. The economic impact of cyber terrorism. The Journal of Strategic Information Systems. 2013. № 22 (2). P. 175–186.

Ponemon Institute LLC. Global Cyber Risk TransferComparison Report. 2017. URL : http://www.aon.com/risk-services/thought-leadership/2017-global-cyber-risk-transfercomparison-report.jsp.

Allianz Global Corporate and Speciality. A Guide to Cyber Risks. URL : https://www.agcs.allianz.com/assets/PDFs/risk%20bulletins/CyberRiskGuide.pdf.

Significant Cyber Incidents Since 2006: Сenter for Strategic&International Studies. URL : https://csis-prod.s3.amazonaws.com/s3fs-public/180308_Significant_Cyber_Events_List.pdf?Szs5ZuZShJAIfgcUXRsvB5T8C76PJR0y.

Lewis J. Economic Impact of Cybercrime No Slowing Down. URL : https://www.mcafee.com/us/resources/reports/restricted/economic-impact-cybercrime.pdf?utm_source=Press&utm_campaign=bb9303ae70-EMAIL_CAMPAIGN_2018_02_21&utm_medium=email&utm_term=0_7623d157be-b9303ae70.

Passeri P. Cyber Attacks Statistics. January 2018. Nextgen Network Monitor. URL : https://www.hackmageddon.com/2018/02/22/january-2018-cyber-attacks-statistics.

WannaCry Ransomware – A Wake-Up Call for Cybersecurity and Data Management. URL: http://en.finance.sia-partners.com/20170609/wannacry-ransomware-wake-callcybersecurity-and-data-management.

Virus petya.a vrazyv merezhi u 60 krai'nah svitu. Reuters. URL : https://www.5.ua/svit/virus-petyaa-vrazyv-merezhi-u-60-krainakh-svitu-reuters-149124.html.

Personal details of almost 700,000 Britons hacked in cyber-attack https://www.theguardian.com/technology/2017/oct/11/personal-details-of-almost700000-britons-hacked-in-cyber-attack.

Surane J. Equifax Is Haunted By Its Costly Cyber Attack. URL : https://www.bloomberg.com/news/articles/2017-11-09/equifax-haunted-by-cyberattack-as-costs-jump-lawsuits-abound.

Deloitte hit by cyber-attack revealing clients’ secret email. URL : https://www.theguardian.com/business/2017/sep/25/deloitte-hit-by-cyber-attackrevealing-clients-secret-emails.

The Biggest Cybersecurity Threats of 2017: The Need to Prepare. 24.10.2017. URL : http://en.finance.sia-partners.com/20171024/biggest-cybersecurity-threats-2017-needprepare.

Volosovych S. Derzhavne reguljuvannja rynku kryptovaljut: zarubizhnyj dosvid. Zovnishnja torgivlja: ekonomika, finansy, pravo. 2018. № 1. S. 97–108.

UK national risk assessment of money laundering and terrorist financing. URL : https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/655198/National_risk_assessment_of_money_laundering_and_terrorist_financing_2017_pdf_web.pdf.

Reagan J., Raghavan A., Thomas A. Quantifying risk: What can cyber risk management learn from the financial services industry?. Deloitte Review. Iss. 19. July 25, 2016. URL : https://www2.deloitte.com/insights/us/en/deloitte-review/issue19/quantifying-risk-lessons-from-financial-services-industry.html.

Snyder C. How Attackers Can Disrupt the Global Internet, Why it Matters, And What We Can Do About It. Harvard University Belfer Center for Science and International Affairs. May 2017. URL : https://www.belfercenter.org/publication/too-connected-fail.

Zetter K. Inside the cunning, unprecedented hack on Ukraine’s power grid. March 3, 2016. URL : https://www.wired.com/2016/03/inside-cunning-unprecedented-hackukraines-power-grid.

ways to make global e-commerce easier for everyone. December, 2017. URL : https://www.weforum.org/agenda/2017/12/ecommerce-trade-wto-growth-opportunity.

Bahar M., Satnick T. Cyber Kinks in the Global Supply Chain. URL : http://www.globaltrademag.com/global-trade-daily/commentary/cyber-kinks-globalsupply-chain.

Payment cybersecurity: Be prepared. Be protected. London: Worldpay 2017. URL : http://offers.worldpayglobal.com/rs/850-JOA-856/images/Worldpay_Security_Whitepaper_v10.1.pdf?mkt_tok=eyJpIjoiTXpsa05EZ3hOR1F3TlRRNSIsInQiOiJGWlVjTDVDZjdGOUVTa1BwNHlWYXExNUl4WXJQVTlpM2NHRmtNOU5vZDJJcGlTWWlTRDZGcFBibUkwakxpNVpTZ2VScFF0MllEclV0b2FBOUtMQ21qdHhacU1MXC9VYVMyQ01zdWQrUm9PWlFzT0k3T21YUXQ0R01OWlIyQ2todDAifQ%3D%3D.

Willis Towers Watson. Cyber Risk Survey Report 2017. URL : https://www.willistowerswatson.com/en/insights/2017/06/2017-cyber-risk-survey-report.

Published

2018-06-14

How to Cite

VOLOSOVYCH С., & KLAPKIV Л. (2018). Determinants of the cyber-risks arise and realization. oreign rade: onomics, inance, aw, 98(3), 101–115. etrieved from https://journals.knute.edu.ua/foreign-trade/article/view/476

Issue

Section

FINANCES, TAXATION, AUDIT