Accesso libero

The costs of cyberterrorism for the national economy: United States of America vs Egypt

INFORMAZIONI SU QUESTO ARTICOLO

Cita

Anghelache, C., Pagliacci, M. and Prodan, L. (2013). Model for Macroeconomic- Analyses Based on the Regression Function. Romanian Statistical Review, 1/2013, 5-17.Search in Google Scholar

Ashour, A.S. (2017, June). Egypt’s Cyber Dilemma: Technology, Threats and Freedoms. Retrieved from https://egyptianstreets.com/2017/06/04/egypts-cyber-dilemma-technology-threats-and-freedoms/.Search in Google Scholar

Breach Level Index (2018). Data breach database. A centralized, global database of data breaches with calculations of their severity based on multiple factors. Retrieved from https://breachlevelindex.com/data-breach-database.Search in Google Scholar

China Global Television Network (2018, May). Egypt Security: Government urged to increase security budget by $800 mln. Retrieved from https://news.cgtn.com/news/324d444f30454464776c6d636a4e6e62684a4856/share_p.html.Search in Google Scholar

Cybersecurity Awareness (no date). Common Cyber Threats: Indicators and Countermeasures. Retrieved from https://securityawareness.usalearning.gov/cybersecurity/data/pdf/Common_Cyber_Threats_Indicators_and_Countermeasures.pdf.Search in Google Scholar

Erez, M. (2018, June 22) Cyber attacks are shutting down countries, cities and companies. Here’s how to stop them. World Economic Forum, Retrieved from https://www.weforum.org/agenda/2018/06/how-organizations-should-prepare-for-cyber-attacks-noam-erez/.Search in Google Scholar

Whelan, R. (2009). A Review of: “Proceedings of the NATO Advanced Research Workshop on Responses to Cyber Terrorism, edited by Centre of Excellence”, Terrorism and Political Violence, 21(2), 347-349.10.1080/09546550902765797Search in Google Scholar

Brickey, J. (2012). Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace, in CTC Sentinel, Combating Terrorism Center at West Point, August, Vol 5, Issue 8, Retrieved from https://ctc.usma.edu/august-2012/.Search in Google Scholar

Constitution of The Arab Republic of Egypt (2014, January 18). Cairo. Retrieved from http://www.sis.gov.eg/Newvr/Dustor-en001.pdf.Search in Google Scholar

Ecofin Agency (2018, December 12). Egypt launches its 2017-2020 national cybersecurity strategy. Retrievedfrom https://www.ecofinagency.com/telecom/1212-39420-egypt-launches-its-2017-2020-national-cybersecurity-strategy.Search in Google Scholar

EG-CERT Report (2018). Summary of Incidents in the years 2015, 2016 and 2017. p.2 Retrieved from http://egcert.eg/wpcontent/uploads/2018/10/SummeryofIncidentsintheyears20152016and2017.pdf.Search in Google Scholar

Global Cybersecurity Index (2017). International Communication Index. Retrieved from https://www.itu.int/dms_pub/itu-d/opb/str/d-str-gci.01-2017-pdf-e.pdf .Search in Google Scholar

Knake, K.K. (2010, February). Cyberterrorism Hype v. Fact. Council on Foreign Relations, Retrieved from https://www.cfr.org/expert-brief/cyberterrorism-hype-v-factSearch in Google Scholar

McAfee Report (2018, February). Economic Impact of Cybercrime—No Slowing Down. p. 6. Retrieved from https://www.mcafee.com/enterprise/en-us/assets/executive-summaries/es-economic-impact-cybercrime.pdf.Search in Google Scholar

Mee, P., and Schuermann, T., (September 14, 2018 September 14). How a cyber attack could cause the next financial crisis. Harvard Business Review, Retrieved from https://hbr.org/2018/09/how-a-cyber-attack-could-cause-the-next-financial-crisisSearch in Google Scholar

Pitaksantayothin, J. (2014). Cyber Terrorism Laws in the United States, the United Kingdom and Thailand : A Comparative Study . Law Journal Faculty of Law Chulalongkorn University, 32 (2),169-185.Search in Google Scholar

The Council of Economic Advisers (2018, February). The Cost of Malicious Cyber Activity to the U.S. Economy. Retrieved from https://www.whitehouse.gov/wp-content/uploads/2018/03/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf.Search in Google Scholar

The Egyptian Supreme Cybersecurity Council, (2018). National Cybersecurity Strategy 2017-2021Arab. http://www.mcit.gov.eg/Publication/Publication_Summary/6132Search in Google Scholar

Staneiu, R.M., (2017, May). Impactul 9/11 asupra economiei mondiale. Qvorum Institute, Retrieved from http://qvorum.ro/impactul-911-asupra-economiei-mondiale/.Search in Google Scholar

Statista (2019). Number of internet users in Egypt from 2013 to 2019 (in millions). Retrieved from https://www.statista.com/statistics/462957/internet-users-egypt/Search in Google Scholar

Statista (2019). Proposed budget of the U.S. government for cyber security in FY 2017 to 2019 (in billion U.S. dollars). Retrieved from https://www.statista.com/statistics/675399/us-government-spending-cyber-security/.Search in Google Scholar

Verizon Enterprise (2017). Data Breach Investigations Report 10th Edition. Retrieved from https://www.ictsecuritymagazine.com/wp-content/uploads/2017-Data-Breach-Investigations-Report.pdf.Search in Google Scholar

eISSN:
2558-9652
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Business and Economics, Political Economics, other, Business Management, Industrial Chemistry, Energy Harvesting and Conversion