IDEAS home Printed from https://ideas.repec.org/a/idt/journl/cs8105.html
   My bibliography  Save this article

Cybersecurity at European Level: The Role of Information Availability

Author

Listed:
  • Fabio BISOGNI

    (Fondazione FORMIT)

  • Simona CAVALLINI

    (Fondazione FORMIT)

  • Sara DI TROCCHIO

    (Fondazione FORMIT)

Abstract

This paper aims to analyse the cybersecurity issue, taking into account the investment behaviour of operators managing ICT infrastructures and providing ICT services and trying to investigate which kind of actions must be implemented to increase their security level. The main finding is that information availability plays a key role in the cyber-risk assessment for ICT operators and is also critical for improving the cybersecurity behaviour of other ICT stakeholders. From the ICT operator perspective, lack of information affects the real perception of cyber-threat occurrence, the vulnerability of his system and the potential loss in case of cyber-attack. As ICT systems have to be regarded as a network of different actor categories, regulation efforts at the European level should focus on spreading information among all ICT stakeholders in order to reduce failures of the cybersecurity market. Virtuous behaviour of other ICT stakeholders may increase the level of cybersecurity also by reducing the current lack of information on cyber-attacks of ICT operators and pushing their investments.

Suggested Citation

  • Fabio BISOGNI & Simona CAVALLINI & Sara DI TROCCHIO, 2011. "Cybersecurity at European Level: The Role of Information Availability," Communications & Strategies, IDATE, Com&Strat dept., vol. 1(81), pages 105-124, 1st quart.
  • Handle: RePEc:idt:journl:cs8105
    as

    Download full text from publisher

    File URL: http://repec.idate.org/RePEc/idt/journl/CS8105/CS81_CAVALLINI_et_al.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Caballero, Ricardo J, 1991. "On the Sign of the Investment-Uncertainty Relationship," American Economic Review, American Economic Association, vol. 81(1), pages 279-288, March.
    2. Mas-Colell, Andreu & Whinston, Michael D. & Green, Jerry R., 1995. "Microeconomic Theory," OUP Catalogue, Oxford University Press, number 9780195102680.
    3. Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
    4. Avinash K. Dixit & Robert S. Pindyck, 1994. "Investment under Uncertainty," Economics Books, Princeton University Press, edition 1, number 5474.
    5. Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
    6. Karthik Kannan & Rahul Telang, 2005. "Market for Software Vulnerabilities? Think Again," Management Science, INFORMS, vol. 51(5), pages 726-740, May.
    7. David J. Teece, 2003. "Information Sharing, Innovation, and Antitrust," World Scientific Book Chapters, in: Essays In Technology Management And Policy Selected Papers of David J Teece, chapter 12, pages 322-339, World Scientific Publishing Co. Pte. Ltd..
    8. Tilman Brück & Marie Karaisl & Friedrich Schneider, 2008. "A Survey of the Economics of Security," Economics of Security Working Paper Series 1, DIW Berlin, German Institute for Economic Research.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Sylvie Héroux & Anne Fortin, 2020. "Cybersecurity Disclosure by the Companies on the S&P/TSX 60 Index," Accounting Perspectives, John Wiley & Sons, vol. 19(2), pages 73-100, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    2. Chen Yu-Fu & Funke Michael, 2004. "Working Time and Employment Under Uncertainty," Studies in Nonlinear Dynamics & Econometrics, De Gruyter, vol. 8(3), pages 1-23, September.
    3. Nick Bloom & Stephen Bond & John Van Reenen, 2007. "Uncertainty and Investment Dynamics," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 74(2), pages 391-415.
    4. Hjalmar Böhm & Michael Funke & Nikolaus A. Siegfried, 1999. "Discovering the Link between Uncertainty and Investment - Microeconometric Evidence from Germany," Quantitative Macroeconomics Working Papers 19906, Hamburg University, Department of Economics.
    5. Campos, Nauro & Nugent, Jeffrey B, 2000. "Investment and Instability," CEPR Discussion Papers 2609, C.E.P.R. Discussion Papers.
    6. Miao, Jianjun & Wang, Neng, 2007. "Investment, consumption, and hedging under incomplete markets," Journal of Financial Economics, Elsevier, vol. 86(3), pages 608-642, December.
    7. Ferguson, Andrew & Hu, Wei & Lam, Peter, 2022. "Political uncertainty and deal structure: Evidence from Australian mining project acquisitions," Pacific-Basin Finance Journal, Elsevier, vol. 73(C).
    8. Gérard Gaudet & Pierre Lasserre & Ngo Van Long, 1995. "Real Investment Decisions Under Information Constraints," CIRANO Working Papers 95s-33, CIRANO.
    9. Kaido Kepp & Kadri Männasoo, 2021. "Investment irreversibility and cyclical adversity: Implications for the financial performance of European manufacturing companies," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 42(7), pages 1665-1678, October.
    10. Henriques, Irene & Sadorsky, Perry, 2011. "The effect of oil price volatility on strategic investment," Energy Economics, Elsevier, vol. 33(1), pages 79-87, January.
    11. Driver, Ciaran & Temple, Paul & Urga, Giovanni, 2008. "Real options -- delay vs. pre-emption: Do industrial characteristics matter?," International Journal of Industrial Organization, Elsevier, vol. 26(2), pages 532-545, March.
    12. Di Corato, Luca & Moretto, Michele & Vergalli, Sergio, 2014. "Long-run investment under uncertain demand," Economic Modelling, Elsevier, vol. 41(C), pages 80-89.
    13. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    14. Dong, Kaiqiang & Sun, Wei, 2022. "Would the market mechanism cause the formation of overcapacity?: Evidence from Chinese listed firms of manufacturing industry," International Review of Economics & Finance, Elsevier, vol. 79(C), pages 97-113.
    15. Gianluca Femminis, 2019. "Risk aversion heterogeneity and the investment–uncertainty relationship," Journal of Economics, Springer, vol. 127(3), pages 223-264, August.
    16. Hjalmar Boehm & Michael Funke, 2000. "Optimal Investment Strategies under Demand and Tax Policy Uncertainty," CESifo Working Paper Series 311, CESifo.
    17. Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
    18. Shibata, Takashi & Nishihara, Michi, 2011. "Interactions between investment timing and management effort under asymmetric information: Costs and benefits of privatized firms," European Journal of Operational Research, Elsevier, vol. 215(3), pages 688-696, December.
    19. Alessandra Guariglia & John Tsoukalas & Serafeim Tsoukas, 2010. "Investment, irreversibility, and financing constraints in transition economies," Discussion Papers 10/03, University of Nottingham, School of Economics.
    20. Shaukat, Mughees & Mirakhor, Abbas & Krichene, Noureddine, 2013. "Fragility Of Interest-Based Debt Financing: Is It Worth Sustaining A Regime Uncertainty?," MPRA Paper 56362, University Library of Munich, Germany.

    More about this item

    Keywords

    cybersecurity; information lacking; risk assessment; investment behaviour; European cybersecurity policy;
    All these keywords.

    JEL classification:

    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
    • H54 - Public Economics - - National Government Expenditures and Related Policies - - - Infrastructures
    • D82 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Asymmetric and Private Information; Mechanism Design
    • H56 - Public Economics - - National Government Expenditures and Related Policies - - - National Security and War
    • D78 - Microeconomics - - Analysis of Collective Decision-Making - - - Positive Analysis of Policy Formulation and Implementation

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:idt:journl:cs8105. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: BLAVIER Thomas (email available below). General contact details of provider: https://edirc.repec.org/data/idatefr.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.