{"id":"https://openalex.org/W3185440433","doi":"https://doi.org/10.23919/cycon51939.2021.9468291","title":"The Vulnerability of the Financial System to a Systemic Cyberattack","display_name":"The Vulnerability of the Financial System to a Systemic Cyberattack","publication_year":2021,"publication_date":"2021-05-25","ids":{"openalex":"https://openalex.org/W3185440433","doi":"https://doi.org/10.23919/cycon51939.2021.9468291","mag":"3185440433"},"language":"en","primary_location":{"id":"doi:10.23919/cycon51939.2021.9468291","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9468291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086335961","display_name":"Bobby Vedral","orcid":null},"institutions":[{"id":"https://openalex.org/I92864154","display_name":"University of Buckingham","ror":"https://ror.org/03kd28f18","country_code":"GB","type":"education","lineage":["https://openalex.org/I92864154"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Bobby Vedral","raw_affiliation_strings":["MacroEagle Capital, Buckingham University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"MacroEagle Capital, Buckingham University, United Kingdom","institution_ids":["https://openalex.org/I92864154"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5086335961"],"corresponding_institution_ids":["https://openalex.org/I92864154"],"apc_list":null,"apc_paid":null,"fwci":1.9279,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.88625296,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"95","last_page":"110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9103000164031982,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/systemic-risk","display_name":"Systemic risk","score":0.781231701374054},{"id":"https://openalex.org/keywords/argument","display_name":"Argument (complex analysis)","score":0.6057630181312561},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5227946639060974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4608689248561859},{"id":"https://openalex.org/keywords/financial-institution","display_name":"Financial institution","score":0.4443780481815338},{"id":"https://openalex.org/keywords/preparedness","display_name":"Preparedness","score":0.4263134300708771},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.394561767578125},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2896508574485779},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.2858913540840149},{"id":"https://openalex.org/keywords/financial-crisis","display_name":"Financial crisis","score":0.28069841861724854},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.27648845314979553},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.22232922911643982}],"concepts":[{"id":"https://openalex.org/C144587487","wikidata":"https://www.wikidata.org/wiki/Q1369234","display_name":"Systemic risk","level":3,"score":0.781231701374054},{"id":"https://openalex.org/C98184364","wikidata":"https://www.wikidata.org/wiki/Q1780131","display_name":"Argument (complex analysis)","level":2,"score":0.6057630181312561},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5227946639060974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4608689248561859},{"id":"https://openalex.org/C2779601481","wikidata":"https://www.wikidata.org/wiki/Q650241","display_name":"Financial institution","level":2,"score":0.4443780481815338},{"id":"https://openalex.org/C2777042776","wikidata":"https://www.wikidata.org/wiki/Q4583103","display_name":"Preparedness","level":2,"score":0.4263134300708771},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.394561767578125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2896508574485779},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.2858913540840149},{"id":"https://openalex.org/C2778300220","wikidata":"https://www.wikidata.org/wiki/Q114380","display_name":"Financial crisis","level":2,"score":0.28069841861724854},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.27648845314979553},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.22232922911643982},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon51939.2021.9468291","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9468291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W613889982","https://openalex.org/W2892044735","https://openalex.org/W2347071282","https://openalex.org/W348488691","https://openalex.org/W1614903263","https://openalex.org/W3124024577","https://openalex.org/W2490509416","https://openalex.org/W3214496781","https://openalex.org/W3124524163","https://openalex.org/W1654462966"],"abstract_inverted_index":{"The":[0,97,103,128,268],"financial":[1,115,122,145,242,306],"industry":[2],"is":[3,105,130,158,202,272,281],"a":[4,47,109,113,136,199,207,223,249],"prime":[5],"target":[6],"of":[7,15,31,57,75,108,135,162,173,198,210,277],"cybercriminal":[8],"activity,":[9],"mainly":[10],"due":[11],"to":[12,92,141,176,205,270],"the":[13,21,29,51,67,79,106,120,131,143,149,155,190,196,241,275,295,305],"nature":[14],"its":[16,72,217],"underlying":[17],"business":[18],"(`that's":[19],"where":[20],"money":[22],"is')":[23],"<sup":[24],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[25],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">.</sup>":[26],"This":[27,187],"was":[28],"reply":[30],"1930s":[32],"US":[33],"bank":[34],"robber":[35],"Willie":[36],"Sutton":[37],"when":[38],"asked":[39],"why":[40],"he":[41],"robbed":[42],"banks.":[43],"He":[44],"later":[45],"coauthored":[46],"book":[48],"titled":[49],"Where":[50],"Money":[52],"Was.":[53],"See":[54],"FBI":[55],"History":[56],"Famous":[58],"Cases":[59],"&":[60],"Criminals,":[61],"https://www.fbi.gov/history/famous-cases":[62],"[accessed":[63],"1":[64],"March":[65],"2021].,":[66],"sector's":[68],"global":[69],"interconnectedness,":[70],"and":[71,88,147,193,213,294],"high":[73],"level":[74],"digitalization.":[76],"In":[77,152],"response,":[78],"private":[80],"sector":[81],"has":[82,164],"invested":[83],"vast":[84],"sums":[85],"into":[86,119],"cybersecurity,":[87],"regulators":[89],"have":[90],"started":[91],"worry":[93],"about":[94],"systemic":[95,137,174,200],"risk.":[96],"latter":[98],"comes":[99],"in":[100,240,304],"two":[101,230],"forms.":[102],"first":[104],"risk":[107,290],"successful":[110],"cyberattack":[111,138,201],"against":[112],"specific":[114],"institution":[116],"`spilling":[117],"over'":[118],"broader":[121],"system,":[123],"hence":[124],"unintentionally":[125],"becoming":[126],"systemic.":[127],"second":[129],"national":[132],"security":[133],"concern":[134],"launched":[139],"specifically":[140],"disrupt":[142],"target's":[144],"ecosystem":[146,243],"therefore":[148],"real":[150],"economy.":[151],"both":[153,271],"cases,":[154],"historic":[156],"evidence":[157],"clear:":[159],"neither":[160],"type":[161],"event":[163],"been":[165],"recorded":[166],"thus":[167],"far.":[168],"Those":[169],"who":[170],"consider":[171],"warnings":[172],"cyberattacks":[175],"be":[177,246],"little":[178],"more":[179],"than":[180],"threat":[181],"inflation":[182],"see":[183,260],"that":[184,195,226,244,258],"as":[185,300],"vindication.":[186],"paper":[188,221],"takes":[189],"opposite":[191],"view":[192],"argues":[194],"probability":[197],"significant":[203],"enough":[204],"warrant":[206],"higher":[208],"degree":[209],"crossdisciplinary":[211],"research":[212],"preparedness.":[214],"To":[215],"support":[216],"main":[218],"argument,":[219],"this":[220,279],"proposes":[222],"conceptual":[224],"framework":[225],"focuses":[227],"on":[228,285],"answering":[229],"key":[231],"questions.":[232],"First,":[233],"are":[234,254],"there":[235,255],"sufficient":[236],"known":[237],"structural":[238],"vulnerabilities":[239],"could":[245,259],"exploited":[247],"by":[248],"willing":[250],"adversary?":[251],"And":[252],"second,":[253],"plausible":[256],"scenarios":[257],"an":[261,266,301],"adversarial":[262],"nation-state":[263],"launch":[264],"such":[265],"attack?":[267],"answer":[269],"positive.":[273],"Given":[274],"lack":[276],"data,":[278],"analysis":[280],"largely":[282],"qualitative,":[283],"based":[284],"discussions":[286],"with":[287],"regulators,":[288],"chief":[289],"officers,":[291],"academic":[292],"experts,":[293],"author's":[296],"own":[297],"multi-decade":[298],"experience":[299],"active":[302],"participant":[303],"market.":[307]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
