\
 

Start Date

16-8-2018 12:00 AM

Description

With the advent of internet and online storing of records and information, cyber-attack has become a major concern. Theories on criminology explains the impact of a crime-conducive environment, typically in terms of corruption index or crimes committed. Prior works does not show much empirical research on factors affecting severity of cyber-attack, especially those like state-level socio-economic factors, or vulnerable data asset type and content, or source of attack. Our work uses past identity theft records in healthcare industry to (i) establish the importance of the form of target data and agent source, and (ii) explain the effect of the state-level factors like crime rate, population density, literacy rate, internet usage, and per-capita income. Our work will help security managers in policy making and taking countermeasures against cybercrimes. It will also encourage academicians to work on social factors and their interactions with individuals and technology in determining cyber-attack severity.

Share

COinS
 
Aug 16th, 12:00 AM

Framework to explain factors affecting severity of exposure of medical data breach: a statistical analysis

With the advent of internet and online storing of records and information, cyber-attack has become a major concern. Theories on criminology explains the impact of a crime-conducive environment, typically in terms of corruption index or crimes committed. Prior works does not show much empirical research on factors affecting severity of cyber-attack, especially those like state-level socio-economic factors, or vulnerable data asset type and content, or source of attack. Our work uses past identity theft records in healthcare industry to (i) establish the importance of the form of target data and agent source, and (ii) explain the effect of the state-level factors like crime rate, population density, literacy rate, internet usage, and per-capita income. Our work will help security managers in policy making and taking countermeasures against cybercrimes. It will also encourage academicians to work on social factors and their interactions with individuals and technology in determining cyber-attack severity.