Economic Aspects of Cyber Security: Socio-Financial Consequences of Cyber Attacks
DOI:
https://doi.org/10.18485/fb_ijcss.2025.1.1.11Keywords:
cybersecurity, economy, consequences, finance, cyberattacksAbstract
Conceptualising the economic aspects of cybersecurity, this research's analytical framework reveals the cause-and-effect relationship between risk and threat in cyberspace, as well as the materialisation of damage outside the digital framework. It includes vulnerability and exposure factors, as well as security measures that influence the observed phenomenon and cyberspace. A systematic analysis of the costs caused by the same financial damage, as well as the economic and social consequences that arose from them, was carried out on a relevant sample of cyber attacks in the time interval from 2009 to 2024 and concerns natural and legal persons, state administration bodies and individual countries of the world, international companies, large, medium and small enterprises, financial institutions and critical infrastructure. Proactive cybersecurity measures, effective incident response planning, cyber insurance, and integration of cyber risk into corporate governance are crucial to mitigating the impact of cyber attacks on all business entities, both in the public and private sectors of the economy, at the national, international, and global levels.
Downloads
References
1. Agrafiotis, I., Nurse, J. R., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1).
2. Bederna, Z. and Szádeczky, T. (2023) ‘Managing the financial impact of cybersecurity incidents’, Security and Defence Quarterly, 41(1). Retrieved from: doi: 10.35467/sdq/159625.
3. Cashell, B., Jackson, W. D., Jickling, M., & Webel, B. (2004). The economic impact of cyber-attacks. Congressional Research Service documents, CRS RL32331 (Washington DC), 2.
4. Chin, K. (2024). The Impact of Cybercrime on the Economy, UpGuard, Retrieved from: https://www.upguard.com/blog/the-impact-of-cybercrime-on-the-economy.
5. Cobos, E.V. (2024). Cybersecurity economics for Emerging Markets. Washington, DC: World Bank. Retrieved from: doi:10.1596/978-1-4648- 2120-2.
6. Cobos, V., Belen., E., Selcen, C. (2024). A Review of the Economic Costs of Cyber Incidents. Washington, D.C.: World Bank Group. Retrieved from: http://documents.worldbank.org.
7. Cvetković, V., Sudar, S., Ivanov, A. (2024). Harmonisation of Soft Power and Institutional Skills: Montenegro's Path to Accession to the European Union in the Environmental Sector. International Journal of Disaster Risk Management, 6(1), 41–74.
8. Dhillon, G. (2015). What to do before and after a cybersecurity breach. American University, Washington, DC, Kogod Cybersecurity Governance Center.
9. Fielder, A., König, S., Panaousis, E., Schauer, S., & Rass, S. (2018). Risk assessment uncertainties in cybersecurity investments. Games, 9(2), 34.
10. Fotis, F. (2024). Economic Impact of Cyber Attacks and Effective Cyber Risk Management Strategies: A light literature review and case study analysis. Procedia Computer Science, 251, 471-478.
11. George, A. S., Baskar, T., & Srikaanth, P. B. (2024). Cyber threats to critical infrastructure: assessing vulnerabilities across key sectors. Partners Universal International Innovation Journal, 2(1), 51-75. Retrieved from: https://doi.org/10.5281/zenodo.10639463.
12. IBM Corporation (2024). Cost of a Data Breach Report. Retrieved from: https://www.ibm.com/downloads/documents/us-en/107a02e94948f4ec.
13. Internation Monetary Fund (2024). Global Financial Stability Report, The Last Mile: Financial Vulnerabilities and Risks.
14. International Chamber of Commerce (2024). Protecting the cybersecurity of critical infrastructure and their supply chains.
15. International Telecommunication Union (2024). Global Cybersecurity Index 2024, 5th Edition. Telecommunication Development Bureau, Switzerland. Retrieved from: https://www.itu.int/dms_pub/itu-d/opb/hdb/d-hdb-gci.01-2024-pdf-e.pdf.
16. Ismail, M. (2017). Sony Pictures and the U.S. Federal Government: A Case Study Analysis of the Sony Pictures Entertainment Hack Crisis Using Normal Accidents Theory, University of Southern Mississippi. Retrieved from: https://aquila.usm.edu.
17. Issayevaa, G. K., Zhussipovaa, E. E., Aitymbetovaa, A. N., Kuralbayevab, A. S., & Abdykulovaa, D. B. (2023). The Impact of Cybersecurity Breaches on Firm’s Market Value: The Case of the USA. Retrieved from: https://doi.org/10.51176/1997-9967-2023-4-200-219.
18. Jeimy, J., Cano, M. (2023). Flexi-a conceptual model for enterprise cyber resilience. Procedia Computer Science, 219, 11-19.
19. Jimmy, F. (2024). Assessing the Effects of Cyber Attacks on Financial Markets . Journal of Artificial Intelligence General Science (JAIGS) ISSN:3006-4023, 6(1), 288–305. Retrieved from: https://doi.org/10.60087/jaigs.v6i1.254.
20. Jørgensen, E. U. (2018). The stakeholder attributions of corporate crisis responsibility following a cyber attack. Retrieved from: https://research-api.cbs.dk/ws/portalfiles/portal/59754091/427671_Elisabeth_Jorgensen_digital.pdf
21. Kamiya, S., Kang, J.K., Kim, J. Milidonis, A. Stulz, R. (2018). What is the Impact of Successful Cyberattacks on Target Firms?, NBER Working Papers 24409, National Bureau of Economic Research, Inc.
22. Kuzior, A., Brożek, P., Kuzmenko, O., Yarovenko, H., & Vasilyeva, T. (2022). Countering cybercrime risks in financial institutions: Forecasting information trends. Journal of Risk and Financial Management, 15(12), 613.
23. Kuzior, A., Tiutiunyk, I., Zielińska, A., & Kelemen, R. (2024). Cybersecurity and cybercrime: Current trends and threats. Journal of International Studies, 17(2), 220 239. Retrieved from: doi:10.14254/2071-8330.2024/17-2/12.
24. Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659-671. Retrieved from: https://doi.org/10.1016/j.bushor.2021.02.022.
25. Lis, P., Mendel, J. (2019). Cyberattacks on critical infrastructure: An economic perspective. Economics and Business Review, Vol. 5 (19), No. 2, 2019: 24-47. Retrieved from: DOI: 10.18559/ebr.2019.2.2.
26. Onunka, O., Alabi, A. M., Okafor, C. M., Obiki-Osafiele, A. N., Onunka, T., Daraojimba, C. (2023). Cybersecurity in US and Nigeria banking and financial institutions: review and assessing risks and economic impacts. Acta Informatica Malaysia, 7(1): 54-62. Cybersecurity Risk Assessment in Smart City. Retrieved from: DOI: http://doi.org/10.26480/aim.01.2023.54.62.
27. Putnik, N. (2022). Cyber War and Cyber Peace, Belgrade: Akademska misao: University, Faculty of Security.
28. Putnik, N., Milošević, M., Cvetković, V. (2022). Ransomware as a security threat – social and criminal law aspects. Sociological Review, vol. LVI (2022), no. 1, pp. 328–353.
29. Ryan, E., Soderber, M. (2024). A Victim or Not? A quantitative experimental study of a cyber attack crisis’ effect on public attitudes toward an organization and the organization’s reputation. Department of Strategic Communication, Lund University Libraries, Sweden. Retrieved from: http://lup.lub.lu.se/student-papers/record/9154741.
30. Saeed, S., Altamimi, S. A., Alkayyal, N. A., Alshehri, E., & Alabbad, D. A. (2023). Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors, 23(15), 6666. Retrieved from: https://doi.org/10.3390/s23156666
31. Schwarz, M., Marx, M., & Federrath, H. (2021). A structured analysis of information security incidents in the maritime sector. arXiv preprint arXiv:2112.06545.
32. Seng, Y. J., Cen, T. Y., bin Mohd Raslan, M. A. H., Subramaniam, M. R., Xin, L. Y., Kin, S. J., Long, M. S., Sindiramutty, S. R. (2024). In-Depth Analysis and Countermeasures for Ransomware Attacks: Case Studies and Recommendations. Retrieved from: doi: 10.20944/preprints202408.2261.v1.
33. Sherr, I., Wingfield, N. (2011). Play by play: Sony’s struggles on breach. Wall Street Journal. Retrieved from: https://www.wsj.com.
34. Slavković, A., Slavković, N., Zajić, G., Kostić, S. (2023). Digital transformation, artificial intelligence and internet of things as a support for new insurance industry systems. Challenges and insurance market’s responses to the economic crisis, Belgrade : University of Belgrade, Faculty of economics and business, Publishing centre, 419-438.
35. Steinberg, S., Stepan, A., Neary, K. (2021). NotPetya: A Columbia University Case Study, Columbia University: Columbia’s School of International and Public Affairs (SIPA) Picer Center Digital Education Group.
36. Sunny, A. (2024). A study on financial cyber-crimes, trends, patterns, and its effects in the economy. Addict Criminol. 7(1):186.
37. Tarter, A. (2017). Importance of cyber security. Community Policing-A European Perspective: Strategies, Best Practices and Guidelines, 213-230.
38. Thakur, M. (2024). Cyber security threats and countermeasures in the digital age. Journal of Applied Science and Education (JASE), 4(1), 1-20.
39. ThankGod, J. (2024). Cyber Heists and Trade Turmoil: Uncovering the Economic Impact of Cybersecurity Breaches on Global Commerce. Retrieved from: http://dx.doi.org/10.2139/ssrn.4858710
40. Valackienė, A., Odejayi, R. O. (2024). The impact of cyber security management on the digital economy: multiple case study analysis. Intellectual Economics, 18(2), 261-283. Retrieved from: doi10.13165/IE-24-18-2-02.
41. Vidović, N., Beriša, H. & Cvetković, M. V. (2024). Optimising Disaster Resilience Through Advanced Risk Management and Financial Analysis of Critical Infrastructure in the Serbian Defence Industry, International Journal of Disaster Risk Management, Vol. 6 (2024) No. 2, Article 12 (p. 183–199), Retrieved from: https://doi.org/10.18485/ijdrm.2024.6.2.12
42. Weng, Y., Wu, J. (2024). Fortifying the global data fortress: a multidimensional examination of cyber security indexes and data protection measures across 193 nations. International Journal of Frontiers in Engineering Technology, 6(2), 13-28.
43. World Economic Forum (2024). Global Cybersecurity Outlook 2024, Insight report. Retrieved from: https://www3.weforum.org.
44. World Economic Forum (2025). Global Cybersecurity Outlook 2025, Insight report. Retrieved from: https://reports.weforum.org.
45. Zadorozhnyi, Z. M., Muravskyi, V., Shevchuk, O., & Bryk, M. (2021). Innovative accounting methodology of ensuring the interaction of economic and cybersecurity of enterprises.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Nikola Vidović, Hatidža Beriša (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
By submitting a manuscript to the International Journal of Contemporary Security Studies, authors acknowledge and agree to the following copyright terms and conditions:
-
Author Rights and Ownership
- Authors retain the copyright to their submitted work. However, by submitting their manuscript, authors grant the International Journal of Contemporary Security Studies a non-exclusive right to publish, distribute, and archive the work in any format (print, digital, or electronic).
- Authors are free to share, reproduce, and distribute their published work, provided proper credit is given to the original publication in this journal.
-
Licensing and Open Access Policy
- The journal publishes under the [insert applicable license, e.g., Creative Commons Attribution License (CC BY)], which allows others to share and adapt the work with appropriate attribution.
- Authors are responsible for ensuring that their submission complies with the journal's licensing terms and does not violate any third-party rights.
-
Originality and Permissions
- The submitted work must be original and not previously published or under consideration elsewhere.
- If the manuscript includes copyrighted materials (e.g., figures, tables, excerpts), authors must obtain the necessary permissions for reproduction and provide appropriate attribution.
-
Author Warranties
- By submitting, authors confirm that their work does not infringe on any intellectual property rights, is free from plagiarism, and adheres to ethical publishing standards.
- The journal is not responsible for any legal disputes arising from copyright infringement, misrepresentation, or unauthorized use of third-party materials.
-
Editorial and Publication Rights
- The International Journal of Contemporary Security Studies reserves the right to make editorial modifications to ensure clarity, consistency, and compliance with journal standards.
- If accepted, the manuscript will be published online and made publicly available according to the journal’s open-access policy.
By proceeding with submission, authors confirm that they have read and agreed to the terms outlined in this Copyright Notice.