Preprint Article Version 2 Preserved in Portico This version is not peer-reviewed

Cyber Risk Contagion

Version 1 : Received: 14 August 2023 / Approved: 14 August 2023 / Online: 14 August 2023 (10:56:32 CEST)
Version 2 : Received: 22 August 2023 / Approved: 22 August 2023 / Online: 23 August 2023 (07:56:09 CEST)

A peer-reviewed article of this Preprint also exists.

Agosto, A.; Giudici, P. Cyber Risk Contagion. Risks 2023, 11, 165. Agosto, A.; Giudici, P. Cyber Risk Contagion. Risks 2023, 11, 165.

Abstract

Financial technologies, stemming from the application of artificial intelligence to big data in finance, are continuously expanding, across different markets and financial services. While financial technologies bring many opportunities, such as reduced costs and extended inclusion, they also bring risks, among which cyber risks, which are constantly increasing and are difficult to measure. Among the difficulties in measurement lies the existence of interdependence among different cyber risks. The study of interdependence and possible contagion channels between cyber attacks to different institutions and economic sectors is indeed increasingly important to ensure economic and financial sustainability. Against this backdrop, this paper proposes a multivariate model for count time series of cyber risk events, in which the time-varying intensity parameter determining the probability that a cyber attack occurs evolves according to general autoregressive score models, taking both time and sectorial dependence into account. The model is particularly suitable for studying how the behaviors of different markets or sectors are interconnected and it constitutes a new approach to the multivariate analysis of count time series of cyber loss events.

Keywords

cyber risk; contagion; autoregressive models

Subject

Computer Science and Mathematics, Probability and Statistics

Comments (1)

Comment 1
Received: 23 August 2023
Commenter: Arianna Agosto
Commenter's Conflict of Interests: Author
Comment: Correction in data description
+ Respond to this comment

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 1
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.