Cyber Risk
Businesses and governments around the globe now recognize cyber insecurity as one of the top risks facing their organizations and their civil and economic infrastructures. The risk that critical information may be stolen or corrupted, public and private assets may be compromised or destroyed, and a cyber attack may bring overall loss of confidence in economic and governmental activity are real and prevalent threats. In collaboration with the NYU Center for Cybersecurity and other faculty, the Volatility and Risk Institute is focusing on cyber threats and their interplay with political, societal and economic risks. VRI’s ongoing analysis of the evolving nature of cyber risks will inform business risk management and protocols as well as government policies and actions.
Measuring and assessing the origins and consequences of cyber risks are essential first steps. We intend to explore and develop metrics for assessing and managing cyber and operational risk, and to share them with business and policy decisionmakers via VLAB.
Our latest research on Cyber Risk
- Arcelus, Almudena, Brian Ellman, and Randal S. Milch. "How Much is Data Security Worth?" Scitech Lawyer 15.3 (2019): 10-15.
- Amoroso, Edward, Cyber Attacks: Protecting National Infrastructure. Elsevier, 2012.
- Bakos, Yannis and Halaburda, Hanna, "Platform Competition with Multi-homing on Both Sides: Subsidize or Not?", Management Science, forthcoming
- Berner, Richard, “How to Focus Cybersecurity Efforts on Financial Stability,” February 15, 2017, OFR Blog.
- Germano, Judith, “Cybersecurity Risk & Responsibility in the Water Sector,” American Water Works Association, 2019.
- Germano, Judith, “Third-Party Cyber Risk & Corporate Responsibility,” Center for Cybersecurity, 2017.
- Germano, Judith, and Zachary Goldman. "After the Breach: Cybersecurity Liability Risk." The Center on Law and Security, New York University School of Law (2014).
- Germano, Judith. "Cybersecurity Partnerships: A New Era of Public-Private Collaboration" NYU Center on Law and Security (2014).
- Halaburda, Hanna, Guillaume Haeringer, Joshua S. Gans, and Neil Gandal. The Microeconomics of Cryptocurrencies. No. w27477. National Bureau of Economic Research, 2020.
- Halaburda, Hanna and Jullien, Bruno and Yehezkel, Yaron, Dynamic Competition with Network Externalities: Why History Matters (August 2, 2016). RAND Journal of Economics, 2020
-
Halaburda, Hanna, with Joshua S. Gans. "Zero Cost'' Majority Attacks on Permissionless Blockchains. July 2023, August 2023.
-
Halaburda, Hanna, and David Yermack. Bitcoin mining meets Wall Street: A study of publicly traded crypto mining companies. No. w30923. National Bureau of Economic Research, 2023.
-
Halaburda, Hanna, and Daniel Obermeier. "Limits to Orchestration in Decentralized Platforms: Exploring the Effect of Ethereum’s Transaction Verification Mechanism on dApp Heterogeneity." (2023).
- Memon, Nasir, with Yaqub, Waheeb, Otari Kakhidze, Morgan L. Brockman, and Sameer Patil. "Effects of Credibility Indicators on Social Media News Sharing Intent." In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-14. 2020.
-
Memon, Nasir with Mirko Marris, Paweł Korus, and Anubhav Jain. "Dictionary Attacks on Speaker Verification." IEEE Transactions on Information Forensics and Security 18 (2022): 773-788.
-
Memon, Nasir with Saffet Vatansever and Ahmet Emir Dirik. "The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter." IEEE Transactions on Information Forensics and Security 18 (2022): 248-260.
- Memon, Nasir, and Hossein Siadati, “Detecting Structurally Anomalous Logins Within Enterprise Networks,” CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, p. 1273-1284.