Pattern of global cyber war and crime: A conceptual framework
The flourishing synergy arising between organized crimes and the Internet has increased the insecurity of the digital world. How hackers frame their actions? What factors encourage and energize their behavior? These are very important but highly underresearched questions. We draw upon literatures on psychology, economics, international relation and warfare to propose a framework that addresses these questions. We found that countries across the world differ in terms of regulative, normative and cognitive legitimacy to different types of web attacks. Cyber wars and crimes are also functions of the stocks of hacking skills relative to the availability of economic opportunities. An attacking unit's selection criteria for the target network include symbolic significance and criticalness, degree of digitization of values and weakness in defense mechanisms. Managerial and policy implications are discussed and directions for future research are suggested.
If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.
Volume (Year): 11 (2005)
Issue (Month): 4 (December)
|Contact details of provider:|| Web page: http://www.elsevier.com/wps/find/journaldescription.cws_home/601266/description#description|
|Order Information:|| Postal: http://www.elsevier.com/wps/find/journaldescription.cws_home/601266/bibliographic|
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Edward L. Glaeser & Bruce Sacerdote, 1996.
"Why is There More Crime in Cities?,"
Harvard Institute of Economic Research Working Papers
1746, Harvard - Institute of Economic Research.
- SALMON, Pierre, 1993.
"Nations Conspiring against Themselves : an Interpretation of European Integration,"
LATEC - Document de travail - Economie (1991-2003)
1993-02, LATEC, Laboratoire d'Analyse et des Techniques EConomiques, CNRS UMR 5118, Université de Bourgogne.
- Pierre Salmon, 1995. "Nations conspiring against themselves: an interpretation of European integration," Post-Print hal-00445593, HAL.
- Jack Hirshleifer, 1999.
"The bioeconomic causes of war,"
Managerial and Decision Economics,
John Wiley & Sons, Ltd., vol. 19(7-8), pages 457-466.
- Geoffrey M. Hodgson, 2003. "The hidden persuaders: institutions and individuals in economic theory," Cambridge Journal of Economics, Oxford University Press, vol. 27(2), pages 159-175, March.
- Lindenberg, Siegwart, 2001. "Intrinsic Motivation in a New Light," Kyklos, Wiley Blackwell, vol. 54(2-3), pages 317-42.
- Georg Götz, 1999.
"Monopolistic Competition and the Diffusion of New Technology,"
RAND Journal of Economics,
The RAND Corporation, vol. 30(4), pages 679-693, Winter.
- Georg GÖTZ, 1996. "Monopolistic Competition and the Diffusion of New Technology," Vienna Economics Papers vie9610, University of Vienna, Department of Economics.
- Gary S. Becker, 1995. "The economics of crime," Cross Sections, Federal Reserve Bank of Richmond, issue Fall, pages 8-15.
- George Balabanis & Adamantios Diamantopoulos & Rene Dentiste Mueller & T C Melewar, 2001. "The Impact of Nationalism, Patriotism and Internationalism on Consumer Ethnocentric Tendencies," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 32(1), pages 157-175, March.
- Joanne E Oxley & Bernard Yeung, 2001. "E-Commerce Readiness: Institutional Environment and International Competitiveness," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 32(4), pages 705-723, December.
When requesting a correction, please mention this item's handle: RePEc:eee:intman:v:11:y:2005:i:4:p:541-562. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Shamier, Wendy)
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.