Skip to content
Longterm Wiki

Examining the Costs and Causes of Cyber Incidents

web

Credibility Rating

5/5
Gold(5)

Gold standard. Rigorous peer review, high editorial standards, and strong institutional reputation.

Rating inherited from publication venue: Oxford Academic

This peer-reviewed article empirically analyzes the costs and causes of cyber incidents using real-world data, providing quantitative grounding for cybersecurity risk assessment — relevant to AI safety insofar as understanding cyber risk informs governance and deployment security considerations.

Metadata

Importance: 35/100journal articleanalysis

Summary

Published in the Journal of Cybersecurity (2016), this RAND Corporation study by Sasha Romanosky empirically examines the financial costs and root causes of cyber incidents using large-scale data. It provides quantitative analysis to help organizations and policymakers better understand the economic impact of cybersecurity failures. The findings inform risk management and policy decisions around cybersecurity investment.

Key Points

  • Empirically analyzes costs and causes of cyber incidents using real-world incident data.
  • Published by RAND Corporation researcher, lending policy-relevant credibility to findings.
  • Provides quantitative estimates of financial harm from different categories of cyber incidents.
  • Findings are relevant to cybersecurity governance, risk management, and policy design.
  • Open access article in Oxford's Journal of Cybersecurity, Volume 2, Issue 2, December 2016.

Cited by 2 pages

Cached Content Preview

HTTP 200Fetched May 4, 202698 KB
Examining the costs and causes of cyber incidents | Journal of Cybersecurity | Oxford Academic
 
 

 

 

 

 

 
 
 
 

 

 

 

 

 

 

 
 

 

 

 

 

 

 
 
 
 

 Mar
 APR
 May
 

 
 

 
 26
 
 

 
 

 2025
 2026
 2027
 

 
 
 

 

 

 
 
success

 
fail

 
 
 
 
 
 
 
 
 
 
 

 

 
 
 
 
 
 
 
 
 

 

 About this capture
 

 

 

 

 

 

 
COLLECTED BY

 

 

 
 
Collection: Save Page Now Outlinks

 

 

 

 

 
TIMESTAMPS

 

 

 

 

 

 

The Wayback Machine - https://web.archive.org/web/20260426104023/https://academic.oup.com/cybersecurity/article/2/2/121/2525524

 

 

 

 
 
 
 

 

 

 

 

 
 
 
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 

 

 

 

 
 
 
 Skip to Main Content

 

 

 
 
 

 

 

 

 

 

 

 

 

 

 
 

 
Advertisement

 

 
 

 

 

 

 
 
 

 

 
 

 
 Search Menu
 
 

 

 
 AI Discovery Assistant
 

 

 

 
 
 
 

 

 
 
 
 

 
 

 
 Menu
 
 

 

 

 
 
 
 

 

 
 
 
 

 

 

 

 
 Sign in through your institution
 

 
 

 
 Remember my
institution
 

 

 
 

 

 

 

 

 

 

 

 

 
 

 

 
 

 
 Navbar Search Filter
 
 

Journal of CybersecurityThis issue
 
Computer ScienceComputer SecurityIT and Communications LawBooksJournalsOxford Academic 
 

 
 Mobile Enter search term
 
 

 
 Search
 

 

 

 

 

 
 

 
 

 
 Issues
 
 
 

 

 
 More Content
 
 
 
 
 

 
 Editor's Choice
 
 
 

 

 

 

 
 Submit
 
 
 
 
 

 
 Author Guidelines
 
 
 

 

 
 Submission Site
 
 
 

 

 
 Open Access
 
 
 

 

 

 

 
 Alerts
 
 
 

 

 
 About
 
 
 
 
 

 
 About Journal of Cybersecurity
 
 
 

 

 
 Editorial Board
 
 
 

 

 
 Advertising and Corporate Services
 
 
 

 

 
 Journals Career Network
 
 
 

 

 
 Self-Archiving Policy
 
 
 

 

 

 
 

 

 

 
 
 

 

 
 
 

 

 

 

 
 

 
 Issues
 
 
 

 

 
 More Content
 
 
 
 
 

 
 Editor's Choice
 
 
 

 

 

 

 
 Submit
 
 
 
 
 

 
 Author Guidelines
 
 
 

 

 
 Submission Site
 
 
 

 

 
 Open Access
 
 
 

 

 

 

 
 Alerts
 
 
 

 

 
 About
 
 
 
 
 

 
 About Journal of Cybersecurity
 
 
 

 

 
 Editorial Board
 
 
 

 

 
 Advertising and Corporate Services
 
 
 

 

 
 Journals Career Network
 
 
 

 

 
 Self-Archiving Policy
 
 
 

 

 

 
 
 

 

 Close

 
 

 
 Navbar Search Filter
 
 

Journal of CybersecurityThis issue
 
Computer ScienceComputer SecurityIT and Communications LawBooksJournalsOxford Academic 
 

 
 Enter search term
 
 

 
 Search
 

 

 

 
Advanced Search

 

 
 
Search Menu

 

 
 
 
 AI Discovery Assistant
 
 
 

 

 Discover the most relevant content quickly with our AI Discovery Assistant
 

 
 

 

 

 

 
 
 
 
 
 
 
 
 
 
 

 

 

 
 

 

 

 

 

 

 

 Article Navigation
 

 

 
 Close mobile search navigation
 
 
Article Navigation

 

 

 

 
 
 

 
 

 

 

 
Volume 2

 
Issue 2

 

 

December 2016 

 
 

 

 
 

 

 

 

Article Contents

 

 

 Abstract
 

 

 

 

 Introduction
 

 

 

 

 Data
 

 

 

 

 Limitations
 

 

 

 

 Conclusion
 

 

 

 

 Appendix
 

 

 

 

 Acknowledgements
 

 

 

 

 References
 



... (truncated, 98 KB total)
Resource ID: 4d92485f5e3f9076 | Stable ID: sid_3jAd5Rew2w