Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

The anatomy of cyber risk

R Jamilov, H Rey, A Tahoun - 2021 - nber.org
We construct novel text-based measures of firm-level cyber risk exposure based on quarterly
earnings calls of 12,000+ firms from 85 countries over 20+ years. We categorize each …

Cybersecurity and financial stability

K Anand, C Duley, P Gai - 2022 - papers.ssrn.com
Cyber attacks can impair banks operations and precipitate bank runs. When digital
infrastructure is shared, banks defend themselves by investing in cybersecurity but can free …

City hall has been hacked! the financial costs of lax cybersecurity

F Curti, I Ivanov, M Macchiavelli… - The Financial Costs of …, 2023 - papers.ssrn.com
State and local governments are attractive cybercrime targets because of inadequate
cybersecurity and ample access to sensitive information. We show that external data …

[PDF][PDF] The propagation of cyberattacks through the financial system: Evidence from an actual event

A Kotidis, S Schreft - 2023 - bankingsupervision.europa.eu
This article uses confidential datasets to quantify the effects of a multiday cyberattack on a
shared technology service provider (TSP) to the banking sector. The TSP went offline—a …

Mitigating Knowledge Gaps in Cybersecurity, Privacy, and Resiliency Laws for European Union Banks

DTH Smith - 2024 - search.proquest.com
This study aimed to uncover weaknesses in securitization strategies for cybersecurity
protections in governments and financial institutions. The problem addressed in this study is …

[PDF][PDF] Reputation and the Provision of Data Security

M Perdikakis - 2024 - cresse.info
In a two-period model, a monopolist chooses unobserved data-security investments.
Consumers pay no access fee, but must share their personal data and suffer when data …

[引用][C] Cyber Threat Intelligence in Canada

S Davenport, D Macintyre, J Stelman - Intelligence, 2023