A New Framework to Quantifying the Economic Impacts of Cyberattacks on Aviation Systems: A Korean Game-Theoretic Interregional Economic Model
- 413 Downloads
This study suggests a framework quantifying a cyberattack on the Korean airport security system. Recent cyberattacks on nuclear power plants in South Korea and a serious cyberattack on Sony Pictures in the USA indicate possible invasion to an airport electronic system because the invasion would not have any border or entry point. Korea governments must consider this complex process that may cause turmoil once occurred. This complicated situation highlights the need for improved intergovernmental collaboration within the Korean territory. First, to avoid cyberterrorist threats, it is essential to coordinate intergovernmental network closely. Designing this network should consider delivering both a competitive game between attackers and defenders and a cooperative game between governments. Second, because an airport shutdown that is only located in a certain area would cause ripple impacts throughout other domestic (and international) economies, the Korean interregional input–output model should be combined to capture this type of ripple impacts. A new framework suggested as the Korean game-theoretic interregional economic model contributes to understanding strategies in cyberterror security and identifying the probabilistic economic costs on a South Korean airport closure by place of event and by type of industry. Using the identified equilibrium strategies for the Korean airport protection, a general guideline to evaluate resource allocation can be passed onto the South Korean government agencies.
KeywordsCyberattack Airport security Game theory Interregional input–output model The Korean game-theoretic interregional economic model
- AFP. 2010. Airliners fly in face of cyber attack scares: What would happen if all those screens tracking all those flights suddenly went blank? November 3, 2010. Available at http://news.discovery.com/tech/cyber-attack-air-traffic.html . Accessed Dec 2012.
- Benkler, Y. 2011a. The penguin and the leviathan: The Triumph of cooperation over self-interest. New York: Crown Business.Google Scholar
- Benkler, Y. 2011b. The unselfish gene. Harvard Business Review 89(7–8): 76–85.Google Scholar
- Chenery, H.B. 1953. Regional analysis. In The structure and growth of the Italian economy, ed. H.B. Chenery, P.G. Clark, and V.C. Pinna, 98–139. Rome: US Mutual Security Agency.Google Scholar
- Doglow, M. 2012. Cyberwars reach a new frontier: The airport, August 15, 2012. Available at http://www.businessweek.com/articles/2012-08-15/cyber-wars-reach-a-new-frontier-the-airport . Aaccessed Dec 2012.
- Federal Emergency Management Agency (FEMA). 1997. HAZUS®99 earthquake loss estimation methodology: User’s Manual.Google Scholar
- Gordon, P., J.E. Moore II, J.Y. Park, and H.W. Richardson. 2009. The economic costs of border closure: A state-by-state analysis. In Global business and the terrorist threat, ed. H.W. Richardson, P. Gordon, and J.E. Moore II, 341–374. Cheltenham: Edward Elgar.Google Scholar
- Ignelzi, L. 2012. Hackers manipulated railway computers. TSA memo says. http://www.nextgov.com/cybersecurity/2012/01/hackers-manipulated-railway-computers-tsa-memo-says/50498/. Accessed 10 June 2012.
- Isard, W. 1960. Methods of regional analysis: An introduction to regional science. Cambridge, MA: The MIT Press.Google Scholar
- Jack Faucett Associates, INC. 1983. The multiregional input–output accounts, 1977: Introduction and summary, Vol. I (Final Report). prepared for the US Department of Health and Human Services, Washington.Google Scholar
- Kakkar, M. 2011. CBI believes cyber attack led to IGI airport’s technical problems in June. September 25, 2011. Available at http://www.zdnet.com/blog/india/cbi-believes-cyber-attack-led-to-igi-airports-technical-problems-in-june/710. Accessed Dec 2012.
- Koscher, K., A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. 2011. Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy, eds. D. Evans and G. Vigna. IEEE Computer Society, May 2010.Google Scholar
- MOLIT. 2014. 2013 Status of urban planning statistics. Ministry of Land Infrastructure and Transport (MOLIT) (in Korean).Google Scholar
- Moses, L.N. 1955. The stability of interregional trading patterns and input–output analysis. American Economic Review 45: 803–832.Google Scholar
- Nowak, M., and R. Highfield. 2011. SuperCooperators: Altruism, evolution, and why we need each other to succeed. New York: Free Press.Google Scholar
- Oxford Economics. 2008. Aviation: The real world wide web. Available at http://www.oxfordeconomics.com/my-oxford/projects/128832. Accessed 8 July 2016.
- Park, J.Y. 2008. The economic impacts of a dirty- bomb attack on the Los Angeles and Long Beach port: Applying supply-driven NIEMO (National Interstate Economic Model). Journal of Homeland Security and Emergency Management 5(1). doi: 10.2202/1547-7355.1312.
- Park, J.Y. 2009. Application of a price-sensitive supply-side input–output model to an examination of the economic impacts of hurricane Katrina and Rita disruptions of the US oil-industry, presented at the 46th annual meeting of Southern regional science association. Charleston, South Carolina, March 29–31.Google Scholar
- Park, J.Y. 2015. Preparedness of risk society in catastrophic disasters. Monthly territory 8, KRIHS, 6–13 (in Korean).Google Scholar
- Park, J.Y., P. Gordon, J.E. Moore II, H.W. Richardson, and L. Wang. 2007. Simulating the state-by-state effects of terrorist attacks on three major US Ports: Applying NIEMO (national interstate economic model). In The economic costs and consequences of terrorism, ed. H.W. Richardson, P. Gordon, and J.E. Moore II, 208–234. Cheltenham: Edward Elgar.Google Scholar
- Park, J.Y., P. Gordon, J.E. Moore II, H.W. Richardson, S. Kim, and Y. Kim. 2008b. Estimating the state-by-state economic impacts of hurricane Katrina. In Natural disaster analysis after hurricane Katrina, ed. H.W. Richardson, P. Gordon, and J.E. Moore II, 147–186. Cheltenham: Edward Elgar.Google Scholar
- Park, J.Y., P. Gordon, E. Jun, J.E. Moore II, and H.W. Richardson. 2009. Identifying the regional economic impacts of 9/11. Peace Economics, Peace Science and Public Policy 15(2). doi: 10.2202/1554-8597.1162.
- Park, J.Y., P. Gordon, Y.K. Kim, J.E. Moore II, and H.W. Richardson. 2016. The temporal regional economic impacts of a hurricane disaster on oil refinery operations: A flexNIEMO approach. In Improving homeland security decisions, Forthcoming, eds. A. Abbas, M. Tambe, and D. von Winterfeldt. New York: Cambridge University Press.Google Scholar
- Polenske, Karen R. 1980. The US multiregional input–output accounts and model. Lexington: DC Health.Google Scholar
- Poole, R.W. 2007. Airport security: Time for a new model. In The economic costs and consequences of terrorism, ed. H.W. Richardson, P. Gordon, and J.E. Moore II, 67–97. Cheltenham: Edward Elgar.Google Scholar
- Richardson, H.W., P. Gordon, and J.E. Moore II (eds.). 2007. The economic costs and consequences of terrorism. Cheltenham: Edward Elgar.Google Scholar
- Richardson, H.W., J.Y. Park, J.E. Moore II, and Q. Pan (eds.). 2014. National economic impact analysis of terrorist and natural disasters. Cheltenham: Edward Elgar.Google Scholar
- Richardson, H.W., Q. Pan, J.Y. Park, and J.E. Moore II (eds.). 2015. Regional economic impacts of terrorist attacks, natural disasters and metropolitan policies (advances in spatial science). Cham: Springer.Google Scholar
- Rose, A., G. Oladosu, B. Lee, and G.B. Asay. 2009. The economic impacts of the september 11 terrorist attacks: A computable general equilibrium analysis. Peace Economics, Peace Science and Public Policy 15(2). doi: 10.2202/1554-8597.1161.
- Sandler, T. and D.G. Arce M. 2003. Pure public goods versus commons: Benefit-cost duality. Land Economics, University of Wisconsin Press 79(3):355–368.Google Scholar
- Tafoya, W.L. 2011. Cyber terror. FBI law enforcement bulletin, November. Available at http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/november-2011/cyber-terror . Accessed Dec 2012.