Legitimate firms or hackers - who is winning the global cyber war? Online publication date: Tue, 23-Apr-2019
by Robert F. Gary; Yorgos Marinakis; Mary Anne Majadillas; Reilly White; Steven T. Walsh
International Journal of Technology Intelligence and Planning (IJTIP), Vol. 12, No. 3, 2019
Abstract: In order to enable reliable service products, the internet of things (IoT) technology infrastructure must withstand global hacking events. How is the IoT faring in the cyber security war? Is it winning or is it losing? If the IoT is losing, there is cause for concern. If the IoT is winning, then there is cause for optimism. Yet there is a third possibility - stasis. What would this look like? Why would it occur? We seek to add to the growing body of literature on the IoT. We add to the IoT literature by applying learning curves to major global cyber-attacks to investigate whether the predators (hackers) or prey (firms) have developed a decided advantage in this arena. We provide finding from a variety of industrial ecosystems. Our theoretical contributions include the integration of this literature with the literature of technology innovation sequencing, business cycles and the nature of service products.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Technology Intelligence and Planning (IJTIP):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com