Criminals and Cyber Attacks: The Missing Link between Attribution and Deterrence

被引:0
|
作者
Guitton, Clement [1 ]
机构
[1] Kings Coll London, London, England
来源
基金
英国工程与自然科学研究理事会;
关键词
attribution; deterrence; cyber-crime; cyber-attacks; policy;
D O I
暂无
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
This paper revisits the claim that the state capacity of attribution works as a deterrent for criminals to launch cyber attacks. Motivated by other empirical evidence for other types of crimes that do not support the claim, this research designed two quantitative analyses to test it. The first experiment looked at macro-level variables at the unit of the state and found that attribution can act as a deterrent. However, a second experiment looking at individual cases distinguished between three types of population and identified only one population for which the attribution-deterrence nexus is valid. Grounded in control theory, the claim is valid for individuals with a sufficient knowledge about the attribution process, who act rationally, and who are concerned about the socio-economic cost of the punishment. Enhancing attribution mechanisms is unlikely to result in any change of behaviours for criminals who act without knowledge or only with a limited perception of the attribution mechanisms, or for individuals who do not fear punishments as society praises their technological skills despite their anti-social and unethical behaviours.
引用
收藏
页码:1030 / 1043
页数:14
相关论文
共 50 条
  • [1] Cyber deterrence with imperfect attribution and unverifiable signaling
    Welburn, Jonathan
    Grana, Justin
    Schwindt, Karen
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2023, 306 (03) : 1399 - 1416
  • [2] The Attribution Problem and Cyber Armed Attacks
    Finlay, Lorraine
    Payne, Christian
    AJIL UNBOUND, 2019, 113 : 202 - 206
  • [3] The missing link in general deterrence research
    Kleck, G
    Sever, B
    Li, S
    Gertz, M
    CRIMINOLOGY, 2005, 43 (03) : 623 - 659
  • [4] Deterrence by Norms to Stop Interstate Cyber Attacks
    Taddeo, Mariarosaria
    MINDS AND MACHINES, 2017, 27 (03) : 387 - 392
  • [5] Deterrence by Norms to Stop Interstate Cyber Attacks
    Mariarosaria Taddeo
    Minds and Machines, 2017, 27 : 387 - 392
  • [6] A Taxonomy of Technical Attribution Techniques for Cyber Attacks
    Nicholson, Andrew
    Watson, Tim
    Norris, Peter
    Duffy, Alistair
    Isbell, Roy
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 188 - 197
  • [8] ATTRIBUTION OF CYBER ATTACKS ON PROCESS CONTROL SYSTEMS
    Hunker, Jeffrey
    Hutchinson, Robert
    Margulies, Jonathan
    CRITICAL INFRASTRUCTURE PROTECTION II, 2008, 290 : 87 - +
  • [9] Cyber attacks, self-defence and the problem of attribution
    Tsagourias, Nicholas
    JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 229 - 244
  • [10] Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks
    Sharma, Munish
    STRATEGIC ANALYSIS, 2021, 45 (01) : 18 - 37