Examining the Costs and Causes of Cyber Incidents
webCredibility Rating
Gold standard. Rigorous peer review, high editorial standards, and strong institutional reputation.
Rating inherited from publication venue: Oxford Academic
This peer-reviewed article empirically analyzes the costs and causes of cyber incidents using real-world data, providing quantitative grounding for cybersecurity risk assessment — relevant to AI safety insofar as understanding cyber risk informs governance and deployment security considerations.
Metadata
Summary
Published in the Journal of Cybersecurity (2016), this RAND Corporation study by Sasha Romanosky empirically examines the financial costs and root causes of cyber incidents using large-scale data. It provides quantitative analysis to help organizations and policymakers better understand the economic impact of cybersecurity failures. The findings inform risk management and policy decisions around cybersecurity investment.
Key Points
- •Empirically analyzes costs and causes of cyber incidents using real-world incident data.
- •Published by RAND Corporation researcher, lending policy-relevant credibility to findings.
- •Provides quantitative estimates of financial harm from different categories of cyber incidents.
- •Findings are relevant to cybersecurity governance, risk management, and policy design.
- •Open access article in Oxford's Journal of Cybersecurity, Volume 2, Issue 2, December 2016.
Cited by 2 pages
| Page | Type | Quality |
|---|---|---|
| AI Cyber Damage: Bounding the Tail | Analysis | -- |
| AI Cyber Damage Estimates | Analysis | -- |
Cached Content Preview
Examining the costs and causes of cyber incidents | Journal of Cybersecurity | Oxford Academic
Mar
APR
May
26
2025
2026
2027
success
fail
About this capture
COLLECTED BY
Collection: Save Page Now Outlinks
TIMESTAMPS
The Wayback Machine - https://web.archive.org/web/20260426104023/https://academic.oup.com/cybersecurity/article/2/2/121/2525524
Skip to Main Content
Advertisement
Search Menu
AI Discovery Assistant
Menu
Sign in through your institution
Remember my
institution
Navbar Search Filter
Journal of CybersecurityThis issue
Computer ScienceComputer SecurityIT and Communications LawBooksJournalsOxford Academic
Mobile Enter search term
Search
Issues
More Content
Editor's Choice
Submit
Author Guidelines
Submission Site
Open Access
Alerts
About
About Journal of Cybersecurity
Editorial Board
Advertising and Corporate Services
Journals Career Network
Self-Archiving Policy
Issues
More Content
Editor's Choice
Submit
Author Guidelines
Submission Site
Open Access
Alerts
About
About Journal of Cybersecurity
Editorial Board
Advertising and Corporate Services
Journals Career Network
Self-Archiving Policy
Close
Navbar Search Filter
Journal of CybersecurityThis issue
Computer ScienceComputer SecurityIT and Communications LawBooksJournalsOxford Academic
Enter search term
Search
Advanced Search
Search Menu
AI Discovery Assistant
Discover the most relevant content quickly with our AI Discovery Assistant
Article Navigation
Close mobile search navigation
Article Navigation
Volume 2
Issue 2
December 2016
Article Contents
Abstract
Introduction
Data
Limitations
Conclusion
Appendix
Acknowledgements
References
... (truncated, 98 KB total)4d92485f5e3f9076 | Stable ID: sid_3jAd5Rew2w