{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:31:51Z","timestamp":1771698711485,"version":"3.50.1"},"reference-count":19,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T00:00:00Z","timestamp":1731715200000},"content-version":"vor","delay-in-days":320,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1016\/j.procs.2024.11.135","type":"journal-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T12:17:52Z","timestamp":1733487472000},"page":"471-478","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["Economic Impact of Cyber Attacks and Effective Cyber Risk Management Strategies: A light literature review and case study analysis"],"prefix":"10.1016","volume":"251","author":[{"given":"Friederikos","family":"Fotis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2024.11.135_bib0001","unstructured":"Accenture. (2019). NINTH ANNUAL COST OF CYBERCRIME STUDY. https:\/\/iapp.org\/resources\/article\/the-cost-of-cybercrime-annual-study-by-accenture\/"},{"issue":"4","key":"10.1016\/j.procs.2024.11.135_bib0002","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1111\/ijmr.12102","article-title":"Shades of Grey: Guidelines for Working with the Grey Literature in Systematic Reviews for Management and Organizational Studies","volume":"19","author":"Adams","year":"2017","journal-title":"International Journal of Management Reviews"},{"key":"10.1016\/j.procs.2024.11.135_bib0003","unstructured":"Anderson, R., Barton, C., Bohme, R., Clayton, R., Ga\u00f1\u00e1n, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the changing cost of cybercrime."},{"key":"10.1016\/j.procs.2024.11.135_bib0004","doi-asserted-by":"crossref","unstructured":"Anderson, R., Barton, C., B\u00f6hme, R., Clayton, R., van Eeten, M. J. G., Levi, M., Moore, T., & Savage, S. (2013). Measuring the Cost of Cybercrime. In R. B\u00f6hme (Ed.), The Economics of Information Security and Privacy (pp. 265\u2013300). Springer. https:\/\/doi.org\/10.1007\/978-3-642-39498-0_12","DOI":"10.1007\/978-3-642-39498-0_12"},{"key":"10.1016\/j.procs.2024.11.135_bib0005","article-title":"Hackers hit Norsk Hydro with ransomware. The company responded with transparency","author":"Briggs","year":"2019","journal-title":"Hackers Hit Norsk Hydro with Ransomware. The Company Responded with Transparency"},{"key":"10.1016\/j.procs.2024.11.135_bib0006","article-title":"ENISA Threat Landscape 2023 [Report\/Study]","year":"2023","journal-title":"ENISA"},{"key":"10.1016\/j.procs.2024.11.135_bib0007","unstructured":"European Central Bank. (2018). Cyber resilience oversight expectations for financial market infrastructures."},{"key":"10.1016\/j.procs.2024.11.135_bib0008","unstructured":"Hydro. (2024, May 15). Cyber-attack on Hydro. https:\/\/www.hydro.com\/en\/global\/media\/on-the-agenda\/cyber-attack\/"},{"key":"10.1016\/j.procs.2024.11.135_bib0009","unstructured":"IBM Security. (2023). Cost of a Data Breach Report 2023. https:\/\/www.ibm.com\/reports\/data-breach"},{"issue":"6","key":"10.1016\/j.procs.2024.11.135_bib0010","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MITP.2018.2874210","article-title":"The Economics of Cyber-Insurance","volume":"20","author":"Kshetri","year":"2018","journal-title":"IT Professional"},{"key":"10.1016\/j.procs.2024.11.135_bib0011","series-title":"Where is the evidence: Realising the value of grey literature for public policy and practice","author":"Lawrence","year":"2014"},{"key":"10.1016\/j.procs.2024.11.135_bib0012","unstructured":"Marks, G. (2019, April 11). Owners must protect their businesses from ransomware before it's too late. The Guardian. https:\/\/www.theguardian.com\/business\/2019\/apr\/11\/small-business-ransomware-attacks-precautions-prevent"},{"key":"10.1016\/j.procs.2024.11.135_bib0013","article-title":"Cybersecurity in a digital era","year":"2021","journal-title":"Risk & Resilience | McKinsey & Company"},{"key":"10.1016\/j.procs.2024.11.135_bib0014","article-title":"2021 Global Digital Trust Insights","year":"2021","journal-title":"PwC"},{"key":"10.1016\/j.procs.2024.11.135_bib0015","article-title":"2022 Ponemon Cost of Insider Threats Global Report","year":"2022","journal-title":"Proofpoint"},{"key":"10.1016\/j.procs.2024.11.135_bib0016","unstructured":"Slowik, J. (2020). SPYWARE STEALER LOCKER WIPER: LOCKERGOGA REVISITED."},{"key":"10.1016\/j.procs.2024.11.135_bib0017","unstructured":"SOPHOS. (2021). The State of Ransomware 2021. https:\/\/assets.sophos.com\/X24WTUEQ\/at\/k4qjqs73jk9256hffhqsmf\/sophos-state-of-ransomware-2021-wp.pdf?cmp=120469"},{"key":"10.1016\/j.procs.2024.11.135_bib0018","article-title":"How a ransomware attack cost one firm \u00a345m","author":"Tidy","year":"2019","journal-title":"How a Ransomware Attack Cost One Firm \u00a345m"},{"key":"10.1016\/j.procs.2024.11.135_bib0019","unstructured":"World Economic Forum. (2020). Global Risk Report 2020. https:\/\/www.weforum.org\/publications\/the-global-risks-report-2020\/"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050924033696?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050924033696?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T18:00:02Z","timestamp":1734026402000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050924033696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":19,"alternative-id":["S1877050924033696"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2024.11.135","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Economic Impact of Cyber Attacks and Effective Cyber Risk Management Strategies: A light literature review and case study analysis","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2024.11.135","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}