Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Nowadays, the number of sophisticated cyberattacks targeting critical infrastructure or banking systems is increasing. Cases of successful attacks are not uncommon, as statistics in Ukraine demonstrate, and they are becoming more frequent and advanced. This results in an increased risk for companies listed on the stock exchange. The article provides examples of cyberattacks in Ukraine, including those using ransomware, attempts to infiltrate energy systems, and attacks on government institutions. It is noted that the presence of cyber threats is strongly linked to the political and international situation of the country. Analyses conducted focus on the examination of cyber threat events in Ukraine and their impact on the WIG_UKRAIN stock index from 2015 to 2023. The evaluation includes the index’s return rates on the day of the cyber threat occurrence, the following day, and the average return rate within five sessions after the threat. An analogous study for the WIG index is adopted as a benchmark. Based on the obtained results, it can be said that before the year 2022, cyberattacks on Ukraine did not have a significant impact on the value of the Ukrainian company stock index. The situation changed after 2022, where each potentially economically harmful cyberattack contributed to the decrease in the value of Ukrainian-listed companies. Generally, the start of hostilities in 2022 significantly increased the volatility of the WIG_UKRAIN index quotations. This is to be expected, as markets react badly to uncertainty.
Czasopismo
Rocznik
Tom
Strony
185--203
Opis fizyczny
Bibliogr. 31 poz., tab., wykr.
Twórcy
- Department of Finance, Faculty of Economic Sciences, Koszalin University of Technology, Poland
Bibliografia
- [1] T. Johansmeyer. (2022). The cyber insurance market needs more money. Harvard Business Review. [Online]. Available: https://hbr.org/2022/03/the-cyberinsurance-market-needs-more-money. [Accessed: Dec. 27, 2023].
- [2] H. Korzeniowska, Edukacja dla bezpieczeństwa w systemie oświatowym Europy na przykładzie Polski i Słowacji. Cracow: EAS, 2004.
- [3] K. Chałubińska-Jentkiewicz, “Cyberbezpieczeństwo – Zagadnienia definicyjne,” Cybersecurity and Law, vol. 2, no. 2, pp. 7–23, 2019, doi: 10.35467/cal/133828.
- [4] J. Wasielewski, “Zarys definicyjny cyberprzestrzeni,” Przegląd Bezpieczeństwa Wewnętrznego, vol. 5, no. 5, pp. 225–234, 2013.
- [5] J. Kisielnicki, Systemy informatyczne zarządzania. Warsaw: Placet, 2009.
- [6] P. Sienkiewicz, “Terroryzm w cybernetycznej przestrzeni,” in Cyberterroryzm – nowe wyzwania XXI wieku, T. Jemioło, J. Kisielnicki, K. Rajchel, Eds., Warsaw: Wyższa Szkoła Informatyki, Zarządzania i Administracji, 2009.
- [7] A. Karmańska, M. Łada, “Ujawnianie obszarów i czynników ryzyka w sprawozdaniach z działalności spółek giełdowych – Obserwacje wobec zmian regulacji prawnych,” Zeszyty Teoretyczne Rachunkowości, vol. 103, no. 159, pp. 42–43, 2019, doi: 10.5604/01.3001.0013.3074.
- [8] M. Bochenek, “Ryzyko i niepewność w naukach ekonomicznych − Rozważania semantyczne,” Ekonomia (Economics), vol. 21, no. 4, pp. 46–63, 2012.
- [9] N. Iwaszczuk, Ryzyko w działalności gospodarczej: Definicje, klasyfikacje, zarządzanie. Cracow: IGSMiE PAN, 2021.
- [10] K. Marcinek, Ryzyko projektów inwestycyjnych. Katowice: University of Economics in Katowice, 2001.
- [11] C.L. Pritchanel, Zarządzanie ryzykiem w projektach. Warsaw: WIG-Press, 2002.
- [12] E. Haapamäki, J. Sihvonen, “Cybersecurity in accounting research,” Managerial Auditing Journal, vol. 34, no. 7, pp. 808‒834, 2019, doi: 10.1108/MAJ-09-2018-2004.
- [13] A. Refsdal, B. Solhaug, K. Stølen, Cyber-risk management. Series: Springer Briefs in Computer Science, Springer Cham, 2015.
- [14] NetDilgence. (2014). Netdiligence cyber claims study 2014, Technical report, NetDilligence. [Online]. Available: https://netdiligence.com/. [Accessed: Dec. 29, 2023].
- [15] D. Štrucl, “Russian aggression on Ukraine: Cyber operations and the influence of cyberspace on modern warfare,” Contemporary Military Challenges, vol. 24, no. 2, pp. 103–123, 2022. doi: 10.33179/BSV.99.SVI.11.CMC.24.2.6.
- [16] D. Svyrydenko, W. Możgin, “Hacktivism of the anonymous group as a fighting tool in the context of Russia’s war against Ukraine,” Future Human Image, vol. 17, pp. 39–46, 2022. doi: 10.29202/fhi/17/6.
- [17] M.C. Arcuri, M. Brogi, G. Gandolfi, “The effect of cyberattacks on stock returns,” Corporate Ownership & Control, vol. 15, no. 2, pp. 70–83, 2018, doi: 10.22495/cocv15i2art6.
- [18] R. Jamilov, H. Rey, A. Tahoun. (Jun. 03, 2021). The anatomy of cyber risk. Working paper 28906, National Bureau of Economic Research, Cambridge. [Online]. Available: http://www.nber.org/papers/w28906. [Accessed: Dec. 27, 2023].
- [19] M. Xu, Y. Zhang, “Data breach CAT bonds: Modeling and pricing,” North American Actuarial Journal, vol. 25, no. 4, pp. 543–561, 2021. doi: 10.1080/10920277.2021.1886948.
- [20] M.C. Arcuri, L. Gai, F. Ielasi, E. Ventisette, “Cyber attacks on hospitality sector: Stock market reaction,” Journal of Hospitality and Tourism Technology, vol. 11, no. 2, pp. 277–290, 2020, doi: 10.1108/JHTT-05-2019-0080.
- [21] S. Tweneboah-Kodua, F. Atsu, W. Buchanan, “Impact of cyberattacks on stock performance: A comparative study,” Information and Computer Security, vol. 26, no. 5, pp. 637–652, 2018, doi: 10.1108/ICS-05-2018-0060.
- [22] K.T. Smith, L.M. Smith, M. Burger, E.S. Boyle, “Cyber terrorism cases and stock market valuation effects,” Information and Computer Security, vol. 31, no. 4, pp. 385–403, 2023, doi: 10.1108/ICS-09-2022-0147.
- [23] Microsoft. (Jun. 22, 2022). Defending Ukraine: Early lessons from the cyber war. [Online]. Available: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE50KOK. [Accessed: Feb. 20, 2024].
- [24] S. Landau. (Sep. 30, 2022). Cyberwar in Ukraine: What you see is not what’s really there. Lawfare. [Online]. Available: https://www.lawfareblog.com/cyberwar-ukraine-what-you-see-not-whats-really-there. [Accessed: Feb. 20, 2024].
- [25] E. Schroeder, S. Dack. (Feb. 27, 2023). A parallel terrain: Public-private defense of the Ukrainian information environment. [Online]. Available: https://www.atlanticcouncil.org/in-depth-research-reports/report/a-parallel-terrainpublic-privatedefense-of-the-ukrainian-information-environment/. [Accessed: Feb. 20, 2024].
- [26] State Service of Special Communications and Information Protection of Ukraine. (Jan. 19, 2023). Ukraine has signed an agreement on accession to the NATO. Cooperative Cyber Defence Centre of Excellence. [Online]. Available: https://cip.gov.ua/en/news/ukrayina-pidpisala-ugodu-pro-priyednannya-do-obyednanogo-centru-peredovikh-tekhnologii-zkiberoboroni-nato. [Accessed: Feb. 20, 2024].
- [27] Microsoft. (Jun. 22, 2022). Defending Ukraine: Early lessons from the cyber war. [Online]. Available: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE50KOK. [Accessed: Feb. 20, 2024].
- [28] G. Corfield. (Jan. 7, 2023). Russian cyberattacks on Ukraine halved with help from Amazon and Microsoft. [Online]. Available at: https://www.telegraph.co.uk/business/2023/01/07/russian-cyberattacks-ukraine-halved-help-amazonmicrosoft/. [Accessed: Feb. 20, 2024].
- [29] S. Pell. (Dec. 1, 2022). Private-sector cyber defense in armed conflict. [Online]. Available: https://www.lawfareblog.com/private-sector-cyber-defense-armedconflict. [Accessed: Feb. 20, 2024].
- [30] I. Sánchez Cózar, J.I. Torreblanca. (Mar 7, 2023). Ukraine one year on: When tech companies go to war, European Council on Foreign Relations. [Online]. Available: https://ecfr.eu/article/ukraine-one-year-on-when-tech-companies-go-to-war/. [Accessed: Feb. 20, 2024].
- [31] J. McLaughlin. (Mar. 3, 2023). Russia bombards Ukraine with cyberattacks, but the impact appears limited. [Online]. Available: https://www.npr.org/2023/02/23/1159039051/russia-bombards-ukraine-with-cyberattacks-butthe-impact-appears-limited. [Accessed: Feb. 20, 2024].
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-cc72974a-30e3-4e07-a374-4ce7e5ec9b7f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.