2023 (20), №1

Conceptual-Analytical Approaches to Threats in the Digital Economy

For citation: 

Krishtanosov, V. B. & Brovko, N. A. (2023). Conceptual-Analytical Approaches to Threats in the Digital Economy. AlterEconomics, 20(1), 216–245. https://doi.org/10.31063/AlterEconomics/2023.20-1.11

Abstract:

The study’s relevance is determined by the significant impact that digitalization has on the economic and social activities of modern states, which engenders new risks and threats to the functioning of va­rious systems and institutions. Based on the evolutionary-institutional analysis and systems analysis methods, the study identifies the threats of digitalization and the associated macroeconomic risks and describes the current approaches to digital risk management. The evolution in the understanding of risk and contemporary approaches to risk assessment is traced in relation to business, social, economic, investment, military, and political threats. Among the critical risks of digitalization, an important place is occupied by cyber risks, which are part of the strategic risks of enterprises, credit risks and regulatory risks. These risks affect markets and create a systemic risk stemming from the possible damage to elements of the infrastructure and market. Technology-driven risks have a systemic character as they may affect more than one country, economic sector, as well as a wide range of natural, technological, and social systems. The study offers an analysis of digitalization risk assessment methods (STRIDE, CIA, OCTAVE) and provides an overview of the qualitative and quantitative methods used to assess digital threats. Modern approaches to cyber risk management include modeling threats and vulnerabilities. These methods may prove especially useful to identify, classify and prioritize threats and to develop selective risk reduction measures. The concepts of FinTech and Central Bank Digital Currency (CBDC) are discussed in relation to the associated risks to the stability of national and international financial systems. The study also considers the concept of e-government, the stages of the evolution of e-government characterized by different risks to systems of public administration.

PDF full
Downloaded: 110

Vitaly B. Krishtanosov— Cand. Sci. (Econ.), Doctoral Student, Belarusian State Technological University; https://orcid.org/0000-0002-1146-368X (13a, Sverdlova St., Minsk, 220006, Republic of Belarus; e-mail: Krishtanosov@mail.ru).

Natalya A. Brovko— Dr. Sci. (Econ.), Dean, Professor, Kyrgyz-Russian Slavic University named after the first president of Russian Federation B. N. Yeltsin; https://orcid.org/0000-0003-4376-9103 (44, Kievskaya St., Bishkek, Kyrgyz Republic; e-mail: nbrovko@list.ru).

Acin, V. (2019). Making sense of the dark web. Computer Fraud & Security, 17–19. DOI:10.1016/s1361-3723(19)30075-2

Ali, M. A., Azad, M. A., Parreno Centeno, M., Hao, F. & van Morsel, A. (2019). Consumer-facing technology fraud: Economics, attack methods and potential solutions.  Future Generation Computer Systems, 100,  408–427. https://doi.org/10.1016/j.future.2019.03.041

Aminzade, M. (2018). Confidentiality, integrity and availability — finding a balanced IT framework.  Network Security, 5,  9–11. https://doi.org/10.1016/S1353-4858(18)30043-6

Bank for International Settlements (2020).  Central bank digital currencies: foundational principles and core features.  Retrieved from: https://www.bis.org/publ/othp33.pdf (Date of access: 07.01.2022).

Baur, D., Hong, K. & Lee, A. (2017). Bitcoin: Medium of Exchange or Speculative Assets?  Journal of International Financial Markets, Institutions & Money, 54, 177–189. https://doi.org/10.1016/j.intfin.2017.12.004

Bindseil, U. (2020). Tiered CBDC and the financial system.  European Central Bank Working Paper Series, 2351,  41. https://doi.org/10.2866/134524. Retrieved from: https://www.ecb.europa.eu/pub/pdf/scpwps/ecb.wp2351~c8c18bbd60.en.pdf (Date of access: 27.08.2021).

Brookson, C., Cadzow, S. et al. (2015).  Definition of Cybersecurity. Gaps and overlaps in standardisation. V1.0.  https://doi.org/10.2824/4069.

Chainalysis (2022). The Crypto Crime Report. Retrieved from: https://go.chainalysis.com/rs/503-FAP-074/images/Crypto-Crime-Report-2022.pdf (Date of access: 03.04.2022).

CipherTrace (2019).  Cryptocurrency anti-money laundering report, 2019 Q4.  Retrieved from: https://ciphertrace.com/q4-2019-cryptocurrency-anti-money-laundering-report/ (Date of access: 25.07.2020).

Digital Monetary Institute (2020).  The Future of Payments.  Retrieved from: https://www.omfif.org/wp-content/uploads/2020/12/The-Future-of-Payments.pdf (Date of access: 11.11.2020).

Dobrodeev, А. Yu. (2021). Kiberbezopasnost’ v Rossiyskoy Federatsii. Modnyy termin ili prioritetnoe tekhnologicheskoe napravlenie obespecheniya natsional’noy i mezhdunarodnoy bezopasnosti XXI veka [Cybersecurity in Russian Federation. A trendy term or the priority technologic area of enhancing national and international security of the XXI century]. Voprosy kiberbezopasnosti [Cybersecurity issues], 4 (44), 61–72. DOI:10.21681/2311-3456-2021-4-61-72. (In Russ.)

Federal Reserve Policy on Payment System Risk (2021). Retrieved from: https://www.federalreserve.gov/paymentsystems/files/psr_policy.pdf (Date of access: 03.02.2022).

Financial Stability Board (2017).  Financial stability implications from FinTech.  Retrieved from: http://www.fsb.org/wp-content/uploads/R270617.pdf (Date of access: 02.03.2020).

Financial Stability Board (2022).  Assessment of Risks to Financial Stability from Crypto-assets,  26. Retrieved from: https://www.fsb.org/wp-content/uploads/P160222.pdf (Date of access: 15.05.2022).

Frey, C. B. & Osborne, M. A. (2017). The future of employment: how susceptible are jobs to computerization? Technological Forecasting and Social Change, 114, 254–280. https://doi.org/10.1016/j.techfore.2016.08.019.

Fuster, G. G. & Jasmontaite, L. (2020). Cybersecurity Regulation in the European Union: The Digital, the Critical and Fundamental Rights.  The Ethics of Cybersecurity. The International Library of Ethics, Law and Technology, vol 21. Cham, Switzerland: Springer, 97–115. https://doi.org/10.1007/978-3-030-29053-5_5.

Hunton, P. (2012). Data attack of the cybercriminal: Investigating the digital currency of cybercrime.  Computer Law & Security Review, 28 (2), 201–207. https://doi.org/10.1016/j.clsr.2012.01.007

Introduction to Threat Modeling. Microsoft (2020). Retrieved from: https://download.microsoft.com/download/9/3/5/935520EC-D9E2-413E-BEA7-0B865A79B18C/Introduction_to_Threat_Modeling.ppsx (Date of access: 10.01.2020).

Kryshtanosau, V. B. (2021). Metodologiya oczenki i upravleniya czifrovymi riskami [Methodology for assessment and management of digital risks].  Trudy BGTU [Proceedings of BSTU, issue 5, Economics and Management], 2 (250), 15–36. (In Russ.)

Lund, S., Madgavkar, A. et al. (2021).  The postpandemic economy. The Future of Work after COVID 19.  McKinsey Global Institute, 152.

Manyika, J., Lund, S., Chui, M. et al. (2017).  Jobs lost, jobs gained: Workforce transitions in a time of automation.  Retrieved from: https://www.mckinsey.com/~/media/mckinsey/industries/public%20and%20social%20sector/our%20insights/what%20the%20future%20of%20work%20will%20mean%20for%20jobs%20skills%20and%20wages/mgi-jobs-lost-jobs-gained-executive-summary-december-6-2017.pdf (Date of access: 26.04.2018).

Nauck, F., Usher, O. & Weiss, L. (2020). The disaster you could have stopped: Preparing for extraordinary risks. Retrieved from: https://www.mckinsey.com/business-functions/risk/our-insights/the-disaster-you-could-have-stopped-preparing-for-extraordinary-risks?cid=other-eml-nsl-mip-mck&hlkid=061d027268294196b455863b2fa7bbd6&hctky=11708326&hdpid=89044107-4811-4e7a-a384-9ca7c398bac6 (Date of access: 13.03.2020).

NIST (2012). Guide for Conducting Risk Assessments. Washington DC: Special Publication 800–30 Rev, 195. Retrieved from: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf (Date of access: 01.03.2020).

NIST (2020).  Security and Privacy Controls for Federal Information Systems and Organizations.  NIST Special Publication 800–53, Rev. 5, 492. https://doi.org/10.6028/NIST.SP.800-53r5

Nosov, S. (2021). Sistema kiberbezopasnosti v Kitae [China’s Cybersecurity system]. Zarubezhnoe voennoe obozrenie [Foreign military review], 2,  17–24. Retrieved from: http://factmil.com/publ/strana/kitaj/sistema_kiberbezopasnosti_v_kitae_2021/59-1-0-1833 (Date of access 03.03.2022) (In Russ.)

Novikova, I. & Krishtanosov, V., (2021). Czifrovye valyuty czentralnykh bankov: sovremennye tendenczii i vozmozhnosti implementaczii v Respublike Belarus [Digital Currencies of Central Banks: Modern Trends and Possibilities of Implementation in the Republic of Belarus].  Bankovskij vestnik [Bank Bulletin Journal], 4 (693), 13–20. (In Russ.)

Pavlov, К. V. (2009). Ekonomicheskie “chernaya dyra” i ekstremal’nyy uroven’ neopredelennosti proizvodstvennykh protsessov i ekonomicheskoy sredy [Economic “Black Hole” and Extreme Uncertainty Level of Manufacture and Economic Environment].  Natsional’nye interesy: prioritety i bezopasnost’ [National Interests: Priorities and Security], 11 (44), 28–36. (In Russ.)

Pursiainen, C. (2018). Critical infrastructure resilience: A Nordic model in the making? International Journal of Disaster Risk Reduction, 27, 632–641. https://doi.org/10.1016/j.ijdrr.2017.08.006

Putilov, A. V., Bugaenko, M. V. & Timokhin, D. V. (2018). Development of Russian labor market in the context of informatization and computerization of the economy. Procedia Computer Science, 145 (6), 169–176. https://doi.org/10.1016/j.procs.2018.11.035

Ramezani, J. & Camarinha-Matos, L. (2020). Approaches for resilience and antifragility in collaborative business ecosystems. Technological Forecasting & Social Change, 151, 119846. https://doi.org/10.1016/j.techfore.2019.119846.

Risk and Responsibility in a Hyperconnected World: Pathways to Global Cyber Resilience (2012). Cologny, Switzerland: World Economic Forum, 48. Retrieved from: https://www3.weforum.org/docs/WEF_IT_PathwaysToGlobalCyberResilience_Report_2012.pdf (Date of access: 09.02.2019).

Ruan, K. (2019). Сyber Risk Management: A New Era of Enterprise Risk Management.  Digital Asset Valuation and Cyber Risk Measurement: Principles of Cybernomics.  Cambridge: Elsevier Inc, 49–73. DOI: 10.1016/B978-0-12-812158-0.00003-X.

Sahay, R., Čihák, M. et al. (2015). Financial Inclusion: Can It Meet Multiple Macroeconomic Goals?  SDN/15/17,  33. Retrieved from: https://www.imf.org/external/pubs/ft/sdn/2015/sdn1517.pdf (Date of access: 20.12.2019).

Scardovi, C. (2017). Digital Transformation in Financial Services. Cham, Switzerland: Springer International Publishing AG, 236. https://doi.org/10.1007/978-3-319-66945-8

World Economic Forum (2020).  The Future of Jobs. Report.  Retrieved from: http://www3.weforum.org/docs/WEF_Future_of_Jobs_2020.pdf (Date of access: 13.05.2021).

World Economic Forum (2021).  The Global Risks Report 2021, 16th Edition.  Retrieved from: http://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2021.pdf (Date of access: 03.02.2022).

World Economic Forum (2022).  The Global Risks Report 2022, 17th Edition.  Retrieved from: https://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2022.pdf (Date of access: 19.01.2022).

Wray, P., Schneuwly, A., Chan, S., Ahuja, M. & Choy, D. (2021).  Technology Risk and Regulatory Compliance. Impact During COVID-19.  Boston Consulting Group. Retrieved from: https://web-assets.bcg.com/e4/46/273331fd49cd888586ac90921291/technology-risk-and-regulatory-compliance-impact-during-covid-19.pdf (Date of access: 13.10.2021).