Please use this identifier to cite or link to this item: https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1320
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPal, Ranjan
dc.contributor.authorPsounis, Konstantinos
dc.contributor.authorCrowcroft, Jon A.
dc.contributor.authorKelly, Frank
dc.contributor.authorHui, Pan
dc.contributor.authorTarkoma, Sasu
dc.contributor.authorKumar, Abhishek
dc.contributor.authorKelly, John
dc.contributor.authorChatterjee, Aritra
dc.contributor.authorGolubchik, Leana
dc.contributor.authorSastry, Nishanth R.
dc.contributor.authorNag, Bodhibrata
dc.date.accessioned2021-08-26T06:05:25Z-
dc.date.available2021-08-26T06:05:25Z-
dc.date.issued2020
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85090469868&doi=10.1145%2f3386159&partnerID=40&md5=b3f9c710ee2e4f415bcb1d77e3cbe11a
dc.identifier.urihttps://ir.iimcal.ac.in:8443/jspui/handle/123456789/1320-
dc.descriptionRanjan Pal, Computer Laboratory, University of Cambridge, Cambridge, CB3 OFD, United Kingdom; Konstantinos Psounis, Department of Computer Science and Electrical Engineering, University of Southern California, Los Angeles, CA 90089, United States; Jon A. Crowcroft, Computer Laboratory, University of Cambridge, Cambridge, CB3 OFD, United Kingdom; Frank Kelly, University of Cambridge, Cambridge, CB3 OFD, United Kingdom; Pan Hui, Department of Computer Science, University of Helsinki, Yliopistonkatu 4, Helsinki, 00100, Finland; Sasu Tarkoma, Department of Computer Science, University of Helsinki, Yliopistonkatu 4, Helsinki, 00100, Finland; Abhishek Kumar, Department of Computer Science, University of Helsinki, Yliopistonkatu 4, Helsinki, 00100, Finland; John Kelly, Envelop Risk, Washington, D.C., United States; Aritra Chatterjee, Envelop Risk, Bermuda, Bermuda; Leana Golubchik, Department of Computer Science and Electrical Engineering, University of Southern California, Los Angeles, CA 90089, United States, Envelop Risk, Washington, D.C., United States; Nishanth R. Sastry, King's College London, London, WC2R 2LS, United Kingdom; Bodhibrata Nag, Indian Institute of Management Calcutta, Calcutta, 700104, India
dc.descriptionISSN/ISBN - 2158656X
dc.descriptionDOI - 10.1145/3386159
dc.description.abstractService liability interconnections among globally networked IT- and IoT-driven service organizations create potential channels for cascading service disruptions worth billions of dollars, due to modern cyber-crimes such as DDoS, APT, and ransomware attacks. A natural question that arises in this context is: What is the likelihood of a cyber-blackout?, where the latter term is defined as the probability that all (or a major subset of) organizations in a service chain become dysfunctional in a certain manner due to a cyber-attack at some or all points in the chain. The answer to this question has major implications to risk management businesses such as cyber-insurance when it comes to designing policies by risk-averse insurers for providing coverage to clients in the aftermath of such catastrophic network events. In this article, we investigate this question in general as a function of service chain networks and different cyber-loss distribution types. We show somewhat surprisingly (and discuss the potential practical implications) that, following a cyber-attack, the effect of (a) a network interconnection topology and (b) a wide range of loss distributions on the probability of a cyber-blackout and the increase in total service-related monetary losses across all organizations are mostly very small. The primary rationale behind these results are attributed to degrees of heterogeneity in the revenue base among organizations and the Increasing Failure Rate property of popular (i.i.d/non-i.i.d) loss distributions, i.e., log-concave cyber-loss distributions. The result will enable risk-averse cyber-risk managers to safely infer the impact of cyber-attacks in a worst-case network and distribution oblivious setting.
dc.publisherSCOPUS
dc.publisherACM Transactions on Management Information Systems
dc.publisherAssociation for Computing Machinery
dc.relation.ispartofseries11(2)
dc.subjectCyber-blackout
dc.subjectService network
dc.subjectSystemic risk
dc.titleWhen Are Cyber Blackouts in Modern Service Networks Likely?
dc.typeArticle
Appears in Collections:Operations Management

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.