13 research outputs found
A multi-level approach to understanding the impact of cyber crime on the financial sector
This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible and intangible factors, affect cyber crime cost and occur at different levels of society and value network. Specifically, shifts in financial companies’ strategic priorities, having the protection of customer trust and loyalty as a key objective, together with considerations related to market positioning vis-à-vis competitors are important factors in determining the cost of cyber crime. Most of these costs are not driven by the number of cyber crime incidents experienced by financial companies but rather by the way financial companies choose to go about in protecting their business interests and market positioning in the presence of cyber crime. Financial companies’ strategic behaviour as response to cyber crime, especially in regard to over-spending on defence measures and chronic under-reporting, has also an important consequence at overall sector and society levels, potentially driving the cost of cyber crime even further upwards. Unwanted consequences, such as weak policing, weak international frameworks for tackling cyber attacks and increases in the jurisdictional arbitrage opportunities for cyber criminals can all increase the cost of cyber crime, while inhibiting integrated and effective measures to address the problem
The UK border security continuum : virtual biopolitics and the simulation of the sovereign ban
This paper analyses the emergence of the UK's new border security doctrine. It argues that the vision of the UK border being put forward is not one that corresponds to conventional under-standings of what and where borders are in contemporary political life. Rather, the UK border is
increasingly projected overseas and across UK territory, ever more invisible, electronic, and mobile through the use of sophisticated identity management technologies and is based on principles of preemption. In search of critical resources appropriate to the analysis of these practices, I draw on the work of Michel Foucault, Giorgio Agamben, and Jean Baudrillard and argue that the UK case is symptomatic of broader attempts to simulate the effect of security in the West
