Abstract
Governments need reliable data on crime in order to both devise adequate policies, and allocate the correct revenues so that the measures are cost-effective, i.e., the money spent in prevention, detection, and handling of security incidents is balanced with a decrease in losses from offenses. The availability of multiple contrasting figures on cyber-attacks checks the accurate assessment of the cost-effectiveness of current and future policies for cyber space. What factors contribute to the costing equation is not clearly understood with wide variation in methodologies used. The most relevant literature in this field is reviewed and analysed against quantitative insights provided by the CyberROAD survey to stakeholders. Research gaps are highlighted to determine the issues that need addressing to provide a solid ground for future legislative and regulatory actions at national and international levels.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Google search on 13/02/15.
- 2.
- 3.
- 4.
Estimate of average - range is up to 0.9 % of GDP - high-income countries incur higher losses.
- 5.
Based on share to EU GDP. Figures on GDP are available on the IMF website.
- 6.
CyberDefcon estimate which if only allowing for inflation & not increase is revenues.
- 7.
References
Levi, M., Innes, M., Reuter, P., Gundur, R.V.: The economic, financial & social impacts of organised crime in the European Union. Publication Office of the European Parliament (2013)
FBI: Uniform Crime Reports (2011). http://www.fbi.gov/about-us/cjis/ucr/ucr. Accessed Oct 2014
The Economist: Whats in a number? Estimating the cost of cybercrime. http://www.economistinsights.com/technology-innovation/analysis/measuring-cost-cybercrime/custom. Accessed Mar 2015
Center for Strategic Studies (CSIS): Cyber Threats and Information Security. Publisher CSIS report (2001)
Horn, P.: It’s Time to Arrest Cyber Crime. Bloomberg Business (2006)
Anderson, R., Barton, C., Bohme, R., Clayton, R., Van Eeten, M., Levi, M., Moore, T., Savage, S.: Measuring the Cost of Cybercrime (2013). http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf
Anderson, R.: Debunking cybercrime myths, University of Cambridge Computer Laboratory (2012). https://www.lightbluetouchpaper.org/2012/06/18/debunking-cybercrime-myths/. Accessed Mar 2015
Detica Ltd.: The Cost of Cyber Crime (2012). https://www.gov.uk/government/news/report-released-into-the-cost-of-cyber-crime
Ponemon Institute: Ponemon Institute Research Finding (2014). http://www.ponemon.org/. Accessed Mar 2015
McAfee and CSIS: Economic Impact Cybercrime 2 (2014)
East West Institute. http://www.ewi.info/
Rauscher, K.F., Cox, E.N.: East West Institute - Measuring the CyberSecurity Problem (2013). http://www.ewi.info/. Accessed Mar 2015
Neustar: UK Annual DDOS Report (2014). https://www.neustar.biz/ddos-attacks-report. Accessed Mar 2015
McAfee and CSIS: Stopping Cybercrime can positively impact world economies, 6 June 2014. http://www.mcafee.com/uk/about/news/2014/q2/20140609-01.aspx. Accessed 13 Oct 2014
McAfee and CSIS: Economic Impact Cybercrime 2 (2014). http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf. Accessed 13 Oct 2014
Group-IB: Group-IB (2011). http://www.group-ib.com/. Accessed Oct 2014
IDC: Security Products and Services. http://www.idc.com/prodserv/maps/securityproducts.jsp. Accessed Oct 2014
Internet Live Stats. http://www.internetlivestats.com/internet-users/. Accessed Mar 2015
The Radicati Group, Inc: Email Statistics report, 2015-2019 Executive Summary (2015). http://www.radicati.com/?p=10644
RIPE Network Co-ordination Centre. https://www.ripe.net/internet-coordination/press-centre/understanding-ip-addressing. Accessed 20 March 2015
International Telecommunications Union: The World in 2014: ICT Facts and Figures (2014). http://www.itu.int/en/ITU-D/Statistics/Pages/facts/default.aspx. Accessed Mar 2015
Bots vs Browsers. http://www.botsvsbrowsers.com/. Accessed Mar 2015
Barracuda Central: Spam Data. www.barracudacentral.org/data/spam. Accessed Apr 2015
Barracuda Central: Web Data. http://www.barracudacentral.org/data/web. Accessed Apr 2015
Spamhaus: Spamhaus Block List. www.spamhaus.org. Accessed Oct 2014
AV-TEST: Malware. http://www.av-test.org/en/statistics/malware/. Accessed Apr 2015
Akaimai: Real-time Web Monitor. http://www.akamai.com/html/technology/dataviz1.html. Accessed Oct 2014
Squid Blacklist. www.squidblacklist.org/downloads.html. Accessed Oct 2014
Ponemon Institute: 2014 Global Report on the Cost of Cyber Crime. http://www.ponemon.org/. Accessed Oct 2014
Shadowserver: Malware. https://www.shadowserver.org/wiki/. Accessed Oct 2014
Acquisti, A., Taylor, C., Wagman, L.: The economics of privacy. J. Econ. Lit. (2015, in press)
Acknowledgement
The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) as the CyberROAD project (Development of the Cybercrime and Cyber-terrorism Research Roadmap) under grant agreement no 607642. Davide Ariu & Giorgio Giacinto of UNICA contributed to an early version of the document.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Armin, J., Thompson, B., Kijewski, P. (2016). Cybercrime Economic Costs: No Measure No Solution. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-38930-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38929-5
Online ISBN: 978-3-319-38930-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)