This HTML5 document contains 42 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
n11https://kar.kent.ac.uk/id/eprint/69076#
wdrshttp://www.w3.org/2007/05/powder-s#
n18doi:10.1093/cybsec/
n19http://purl.org/ontology/bibo/status/
dchttp://purl.org/dc/elements/1.1/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n4https://kar.kent.ac.uk/id/subject/
n21https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n13http://eprints.org/ontology/
bibohttp://purl.org/ontology/bibo/
n5https://kar.kent.ac.uk/id/publication/
n14https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n7https://kar.kent.ac.uk/69076/
n9https://kar.kent.ac.uk/id/document/
n20https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n16https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n12https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:69076
rdf:type
bibo:Article bibo:AcademicArticle n13:EPrint n13:ArticleEPrint
rdfs:seeAlso
n7:
owl:sameAs
n18:tyy006
n13:hasAccepted
n9:3060783
n13:hasDocument
n9:3150104 n9:3150105 n9:3140954 n9:3150106 n9:3150107 n9:3066139 n9:3066140 n9:3066141 n9:3066142 n9:3140949 n9:3060783 n9:3060784
n13:hasPublished
n9:3140949
dc:hasVersion
n9:3140949 n9:3060783
dcterms:title
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
wdrs:describedby
n16:export_kar_RDFN3.n3 n21:export_kar_RDFN3.n3
dcterms:date
2018-10-16
dcterms:creator
n12:ext-043861db1f7aff10369bb18d2c53b61d n12:ext-9f24430d77571a456bec0f45a312ba65 n12:ext-e6115217be1718e66ea726a6c161ec7b n12:ext-aeab708f718649c453afcc0222e05d4d n12:ext-j.r.c.nurse@kent.ac.uk
bibo:status
n19:peerReviewed n19:published
dcterms:publisher
n14:ext-ffae441f908983694f410e3721f2491d
bibo:abstract
Technological advances have resulted in organisations digitalizing many parts of their operations. The threat landscape of cyber-attacks is rapidly changing and the potential impact of such attacks is uncertain, because there is a lack of effective metrics, tools and frameworks to understand and assess the harm organisations face from cyber-attacks. In this paper, we reflect on the literature on harm, and how it has been conceptualised in disciplines such as criminology and economics, and investigate how other notions such as risk and impact relate to harm. Based on an extensive literature survey and on reviewing news articles and databases reporting cyber-incidents, cybercrimes, hacks and other attacks, we identify various types of harm and create a taxonomy of cyber-harms encountered by organisations. This taxonomy comprises five broad themes: physical or digital harm; economic harm; psychological harm; reputational harm; and social and societal harm. In each of these themes we present several cyber-harms that can result from cyber-attacks. To provide initial indications about how these different types of harm are connected and how cyber-harm in general may propagate, this article also analyses and draws insight from four real-world case studies, involving Sony (2011 and 2014), JPMorgan and Ashley Madison. We conclude by arguing for the need for analytical tools for organisational cyber-harm, which can be based on a taxonomy such as the one we propose here. These would allow organisations to identify corporate assets, link these to different types of cyber-harm, measure those harms and, finally, consider the security controls needed for the treatment of harm.
dcterms:isPartOf
n5:ext-20572085 n20:repository
dcterms:subject
n4:QA75 n4:H n4:BF41 n4:T
bibo:authorList
n11:authors