Skip to main content
Top

2020 | OriginalPaper | Chapter

13. An Incentives-Based Mechanism for Corporate Cyber Governance Enforcement and Regulation

Authors : Shaen Corbet, Constantin Gurdgiev

Published in: Ecological, Societal, and Technological Risks and the Financial Sector

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A growing literature in finance examines the impact of cybercrime on equity markets and publicly traded corporations, with an emerging strand of this literature investigating the contagion channel from cybersecurity breaches against the publicly traded companies, to broader market volatility. The dominant responses by the corporations to these threats can be described as ‘test internally for internal vulnerabilities’, and the ‘insure and forget’ approach, both of which imply a lack of significant preventative actions by companies under the risk of an external cybersecurity attack. The evidence of growing adverse impact and risk of hacking events on firms’ market valuations is highlighted by (i) the rising cumulative abnormal returns impact of such events, (ii) the rising systemic contagion effects of hacks, and (iii) the lack of robust regulatory mechanisms for systematic prevention, mitigation, and enforcement of data security breaches. This supports our proposal that when acting under regulatory authority’s supervision from within a ring-fenced incentives system, ‘white knight’ hackers may provide the appropriate mechanism for discovery and deterrence of weak corporate cybersecurity practices and systems. This mechanism can help alleviate the systemic weaknesses in the existent mechanisms for cybersecurity oversight and enforcement in financial markets.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Evidence for the potential efficacy of such a mechanism may be presented in the attempted start-up of a hedge fund ‘TRO LLC’. This hedge fund idea was developed by Mr. Andrew Auernheimer (a hacker also known as ‘WEEV’). The main issue with this hedge fund idea is that at its core is the promotion of hacking or identity theft for financial gain. As a result, Mr. Auernheimer has proposed that the fund will not be directly for hack companies but will ‘probe the public surface of a company’ and ‘actually watch hackers’ (CNBC interview, 28 April 2014).
 
2
This view is broadly consistent with the existent literature and practices on the use of whistle-blowers (internal and external to the company) in detecting other potential breaches and violations, as discussed in Dahlgren (2015) and referenced by the RICO system, discussed below.
 
3
Data on the frequency of cybercrime on publicly traded companies covering the period from 2005 through early 2015 shows that one specific form of cybercrime becoming ever more prevalent is a breach of the company’s firewall to steal client data which can be used for a host of illegal activities.
 
4
While U.S. Security Agencies are reported to have engaged white knights and current hacktivists, these engagements are structured on selecting known hacktivists and using them as agents working for the agency. This is distinct from the mechanism we propose in a fundamental way. Our proposal involves voluntary self-selection of hacktivists to participate in a reward-for-breach testing ‘tournament’, as opposed to cooption of a selected hacktivist for cooperation with an agency. As a result, our mechanism is designed to address the core issue of economic agency problems that arise from direct or indirect employment of hacktivists by the contracting entity.
 
5
Notably, in a range of sectors, although not yet widely in finance, the use of ‘white hat’ or ‘white knight’ hackers is growing in both frequency and scope. Some industry-level examples are discussed in Kelly (2013). The lack of similar approaches in financial regulation was recently discussed in McKendry and Macheel (2015). Our proposal builds on this momentum and extends the system of cooperative engagement between regulators, companies, and white knighthacktivists to a mechanism that would create functional incentives for hacktivists’ participation in the regulatory prevention of the cybersecurity risks. Such a mechanism is currently lacking in the industry.
 
6
Those hackers or hacktivists possessing the best technological talent are more likely to be swayed by the financial returns of private practice. In simple terms, there is an argument in favour of a learning-by-doing second order effect of such a system of enforcement based on repeated interactions with leading experts in cybersecurity who represent the front end of the knowledge curve, as opposed to the past ‘dark hat’ hackers who may or may not be leaders in their field at the moment of their engagement by the firms and regulators as ‘red teams’ or white knights.
 
7
Corbet and Gurdgiev (2019) document the evidence on the negative abnormal returns experienced by the companies following cybersecurity breaches. This evidence is summarized below and in Fig. 13.1. Some examples of reputational damages sustained by companies following the attacks is discussed and summarized in Alva Group (2016), Tiedemann-Nkabinde and Davydoff (2019), and Spam Titan (2019), amongst others.
 
8
These tests will have to involve not only the best human hacktivist talent, but also preventative AI. Reactionary responses to cybersecurity breaches in the age of AI will be too little, too late to mitigate extensive damages that can be inflicted by information systems moving closer to the speeds of light, as opposed to human-led attacks by modern day hacktivists.
 
9
Another example of the lagging nature of legal and enforcement frameworks relating to cybercrime is presented by the relatively frequent hacking events involving cryptocurrencies exchanges. According to Chen and Yuji Nakamura (2016), lack of legal frameworks operating in the relation to cybersecurity is illustrated by the August 2016 attack on Hong Kong-based bitcoin exchange Bitfinex.
 
10
CAR methodology for assessing financial markets penalty for cybersecurity breach is consistent with that used in The Council of Economic Advisers (2018).
 
11
Data on other cyber-risk events, including accidental disclosure of data, and theft of data and devices is available in Corbet and Gurdgiev (2019).
 
12
The extent of markets development for transactions in illicit data is exemplified by the fact that today, data obtained from cybercrime activities represent a de facto self-sustained industry supported by back office and supply chain services, as described, for example in Levchenko et al. (2011) for the case of spam activities.
 
13
A substantive discussion of legal and enforcement challenges relating to development and implementation of cybercrime combatting legal frameworks and operational enforcement systems is discussed in Kramer et al. (2009) and Wilson (2014).
 
14
This mixed approach is consistent with the selection mechanisms currently used by the tax authorities in identifying target companies and individuals for conduct of audits.
 
16
See http://​www.​kmblegal.​com/​practice-areas/​whistleblower-law/​dodd-frank-act-whistleblower-incentives for some details on Dodd-Frank Act and associated whistleblower rewards system.
 
17
Dahlgren (2015) argument can be seen as supportive of the idea that regulatory and supervisory fines should apply more broadly to the cases of cybersecurity breaches. She states: ‘I fear that until we can assign financial consequences to cyber risks, and ensure staff are taking that into account when making decisions, we will not get the commitment needed from every level of the organization to adequately address the problem. As long as decisions are made and actions are taken without this type of assessment, we are going to see more and more of these weaknesses exposed.’
 
Literature
go back to reference Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eaton, M. J. G., Levi, M., Moore, T., & Savage, S. (2013). Measuring the cost of cybercrime. The Economics of Information Security and Privacy, 1(4), 265–300.CrossRef Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eaton, M. J. G., Levi, M., Moore, T., & Savage, S. (2013). Measuring the cost of cybercrime. The Economics of Information Security and Privacy, 1(4), 265–300.CrossRef
go back to reference Boes, S., & Leukfeldt, E. R. (2016). Fighting cybercrime: A joint effort. In R. M. Clark & S. Hakim (Eds.), Cyber-physical security: Protecting critical infrastructure at the state and local level. Springer. Boes, S., & Leukfeldt, E. R. (2016). Fighting cybercrime: A joint effort. In R. M. Clark & S. Hakim (Eds.), Cyber-physical security: Protecting critical infrastructure at the state and local level. Springer.
go back to reference Brown, C. (2015). White or black hat? An economic analysis of computer hacking (working paper). Retrieved from the Economics Department of Georgetown University. Brown, C. (2015). White or black hat? An economic analysis of computer hacking (working paper). Retrieved from the Economics Department of Georgetown University.
go back to reference Corbet, S., & Gurdgiev, C. (2017b). Financial disrupters: Is the rise of financial disruptors knocking traditional banks off their track? Journal of Terrorism and Cyber Insurance, 1(2), 58–62. Corbet, S., & Gurdgiev, C. (2017b). Financial disrupters: Is the rise of financial disruptors knocking traditional banks off their track? Journal of Terrorism and Cyber Insurance, 1(2), 58–62.
go back to reference Corbet, S., & Gurdgiev, C. (2019). What the hack: Systematic risk contagion from cyber event. International Review of Financial Analysis, 65, 101386. Corbet, S., & Gurdgiev, C. (2019). What the hack: Systematic risk contagion from cyber event. International Review of Financial Analysis, 65, 101386.
go back to reference Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets online: Products and market forces. Criminal Justice Studies: A Critical Journal of Crime, Law and Society, 23(1), 33–50.CrossRef Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets online: Products and market forces. Criminal Justice Studies: A Critical Journal of Crime, Law and Society, 23(1), 33–50.CrossRef
go back to reference Ionescu, L., Mirea, V., & Blăjan, A. (2011). Fraud, corruption and cybercrime in a global digital network. Economics, Management and Financial Markets, 6(2), 373–380. Ionescu, L., Mirea, V., & Blăjan, A. (2011). Fraud, corruption and cybercrime in a global digital network. Economics, Management and Financial Markets, 6(2), 373–380.
go back to reference Keplinger, K. (2018). Is quantum computing becoming relevant to cyber-security? Network Security, 2018(9), 16–19.CrossRef Keplinger, K. (2018). Is quantum computing becoming relevant to cyber-security? Network Security, 2018(9), 16–19.CrossRef
go back to reference Kraemer-Mbula, E., Tang, P., & Rush, H. (2013). The cybercrime ecosystem: Online innovation in the shadows? Technological Forecasting and Social Change, 80(3), 541–555.CrossRef Kraemer-Mbula, E., Tang, P., & Rush, H. (2013). The cybercrime ecosystem: Online innovation in the shadows? Technological Forecasting and Social Change, 80(3), 541–555.CrossRef
go back to reference Kremer, J. (2014). Policing cybercrime or militarizing cybersecurity? Security mind-sets and the regulation of threats from cyberspace. Information and Communications Technology Law, 23(3), 220–237.CrossRef Kremer, J. (2014). Policing cybercrime or militarizing cybersecurity? Security mind-sets and the regulation of threats from cyberspace. Information and Communications Technology Law, 23(3), 220–237.CrossRef
go back to reference MacKenzie, D. (2018). Material signals: A historical sociology of high-frequency trading. American Journal of Sociology, 123(6), 1635–1683.CrossRef MacKenzie, D. (2018). Material signals: A historical sociology of high-frequency trading. American Journal of Sociology, 123(6), 1635–1683.CrossRef
go back to reference Packin, N. G., & Aretz, Y. L. (2016). Big data and social netbanks: Are you ready to replace your bank? Houston Law Review, 53(5), May 11, 2016. Packin, N. G., & Aretz, Y. L. (2016). Big data and social netbanks: Are you ready to replace your bank? Houston Law Review, 53(5), May 11, 2016.
go back to reference Rollins, J., & Wilson, C. (2007). Terrorist capabilities for cyberattack: Overview and policy issues (Congressional Research Service (CRS) Report for Congress, Order Code RL33123), The Library of Congress, updated January 22, 2007, pp. 43–63. Rollins, J., & Wilson, C. (2007). Terrorist capabilities for cyberattack: Overview and policy issues (Congressional Research Service (CRS) Report for Congress, Order Code RL33123), The Library of Congress, updated January 22, 2007, pp. 43–63.
go back to reference Summers, S. (2015). EU criminal law and the regulation of information and communication technology. Bergen Journal of Criminal Law and Criminal Justice, 3(1), 48–60.CrossRef Summers, S. (2015). EU criminal law and the regulation of information and communication technology. Bergen Journal of Criminal Law and Criminal Justice, 3(1), 48–60.CrossRef
Metadata
Title
An Incentives-Based Mechanism for Corporate Cyber Governance Enforcement and Regulation
Authors
Shaen Corbet
Constantin Gurdgiev
Copyright Year
2020
Publisher
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-38858-4_13