{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:21:13Z","timestamp":1761582073294,"version":"3.41.2"},"reference-count":18,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T00:00:00Z","timestamp":1615334400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,11,12]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This paper aims to introduce the concept of cybersecurity footprint.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Characteristics of cybersecurity footprint are presented based on documented cases, and the domino effect of cybersecurity is illustrated. Organizational and individual cybersecurity footprints are outlined. Active and passive \u2013 digital vs cybersecurity footprints are then reviewed. Taxonomy of aware\/unaware vs active\/passive cybersecurity footprints are presented, followed by brief discussion of the implications for future research.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The concept of cybersecurity footprint is defined, and the evidence from prior cyber incidents is shown to emphasize the concept. Smaller organizations may have a large cybersecurity footprint, whereas larger organizations may have smaller one. Cyberattacks are focusing on the individuals or small organizations that are in the supply chain of larger organizations causing the domino effect.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>Implications of cybersecurity footprint to individuals, organizations, societies and governments are discussed. The authors present organizations with ways to lower cybersecurity footprint along with recommendations for future research.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Social implications<\/jats:title>\n<jats:p>Cybersecurity has a significant social implication worldwide, as the world is becoming cyber dependent. With the authors\u2019 introduction of the cybersecurity footprint concept and call to further understand how organizations can measure and reduce it, the authors envision it as another perspective of assessing cyber risk and further help mitigate future cyber incidents.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper extends the existing information and computer security body of knowledge on the concept of cybersecurity footprint with illustrated cases.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-04-2020-0054","type":"journal-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T08:36:51Z","timestamp":1616575011000},"page":"724-736","source":"Crossref","is-referenced-by-count":11,"title":["Introducing the concept of cybersecurity footprint"],"prefix":"10.1108","volume":"29","author":[{"given":"Yair","family":"Levy","sequence":"first","affiliation":[]},{"given":"Ruti","family":"Gafni","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,3,10]]},"reference":[{"key":"key2021111012415098000_ref001","unstructured":"Burley, D.L., Bishop, M., Buck, S., Ekstrom, J.J., Futcher, L. and Gibson, D. et al. (2017), \u201cCybersecurity curricula 2017\u201d, Version 1.0 Report, available at: www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/csec2017.pdf (accessed 16 April 2020)."},{"key":"key2021111012415098000_ref002","unstructured":"FBI (2018), \u201cBusiness e-mail compromise: the 12 billion dollar scam\u201d, available at: www.ic3.gov\/media\/2018\/180712.aspx (accessed 22 January 2020)."},{"key":"key2021111012415098000_ref003","unstructured":"FBI (2019), \u201cChina: the risk to corporate America\u201d, available at: www.fbi.gov\/file-repository\/china-risk-to-corporate-america-2019.pdf (accessed 12 April 2020)."},{"key":"key2021111012415098000_ref004","unstructured":"FBI (2020), \u201cFBI sees rise in fraud schemes related to the coronavirus (COVID-19) pandemic\u201d, available at: www.ic3.gov\/media\/2020\/200320.aspx (accessed 16 April 2020)."},{"issue":"1","key":"key2021111012415098000_ref005","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1108\/JCRPP-07-2018-0021","article-title":"Cyber crime: a portrait of the landscape","volume":"5","year":"2019","journal-title":"Journal of Criminological Research, Policy and Practice"},{"issue":"7","key":"key2021111012415098000_ref006","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1361-3723(19)30074-0","article-title":"Fifteen years of phishing: Can technology save us?","volume":"2019","year":"2019","journal-title":"Computer Fraud and Security"},{"issue":"6","key":"key2021111012415098000_ref007","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/2184319.2184330","article-title":"The cybersecurity risk","volume":"55","year":"2012","journal-title":"Communications of the ACM"},{"issue":"4","key":"key2021111012415098000_ref008","first-page":"78","article-title":"Digital footprinting: uncovering tourists with user-generated content","volume":"7","year":"2008","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"key2021111012415098000_ref009","doi-asserted-by":"publisher","first-page":"24","DOI":"10.4236\/jis.2015.61003","article-title":"Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model","volume":"6","year":"2015","journal-title":"Journal of Information Security"},{"issue":"11","key":"key2021111012415098000_ref010","doi-asserted-by":"publisher","first-page":"e0207112","DOI":"10.1371\/journal.pone.0207112","article-title":"What demographic attributes do our digital footprints reveal? A systematic review","volume":"13","year":"2018","journal-title":"PloS One"},{"key":"key2021111012415098000_ref011","first-page":"893","article-title":"The ripple effect of an information security breach event: a stakeholder analysis","volume":"34","year":"2014","journal-title":"Communications of the Association for Information Systems"},{"key":"key2021111012415098000_ref012","unstructured":"Madden, M., Fox, S., Smith, A. and Vitak, J. (2007), \u201cDigital footprints. The nature of personal information is changing in the age of web 2.0\u201d, Pew Research Center, available at: www.pewinternet.org\/2007\/12\/16\/digital-footprints\/ (accessed 10 January 2020)."},{"key":"key2021111012415098000_ref013","unstructured":"Marriott (2020), \u201cMarriott international notifies guests of property system incident\u201d, available at: https:\/\/news.marriott.com\/news\/2020\/03\/31\/marriott-international-notifies-guests-of-property-system-incident (accessed 12 April 2020)."},{"key":"key2021111012415098000_ref014","unstructured":"Rushe, D. (2014), \u201cJP Morgan chase reveals massive data breach affecting 76m households\u201d, available at: www.theguardian.com\/business\/2014\/oct\/02\/jp-morgan-76m-households-affected-data-breach (accessed 12 April 2020)."},{"article-title":"Cyber breach at target","volume-title":"Harvard Business School Case 117-027, July 2016","year":"2016","key":"key2021111012415098000_ref015"},{"key":"key2021111012415098000_ref016","doi-asserted-by":"publisher","first-page":"13160","DOI":"10.1016\/j.dss.2019.113160","article-title":"Cyber hygiene: the concept, its measure, and its initial tests","volume":"128","year":"2020","journal-title":"Decision Support Systems"},{"issue":"3","key":"key2021111012415098000_ref017","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1111\/j.1931-0846.2007.tb00509.x","article-title":"Constructing, visualizing, and analyzing a digital footprint","volume":"97","year":"2007","journal-title":"Geographical Review"},{"volume-title":"Principles of Information Security (6th ed.)","year":"2018","key":"key2021111012415098000_ref018"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2020-0054\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2020-0054\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:52Z","timestamp":1753406572000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/5\/724-736\/105841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,10]]},"references-count":18,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2021,3,10]]},"published-print":{"date-parts":[[2021,11,12]]}},"alternative-id":["10.1108\/ICS-04-2020-0054"],"URL":"https:\/\/doi.org\/10.1108\/ics-04-2020-0054","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"},{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2021,3,10]]}}}