The results could favour government agencies
over other vital service providers. Analysing only
NIS-organizations can ignore attack frequency with-
out consequence. Thus, “disruption bias” may af-
fect cyber threat landscape interpretation. Results are
based on incidents the reporting organisation consid-
ers reportable, which could cause disruption bias. Or-
ganisational reporting is autonomous. Second, inci-
dent taxonomies and data analysis are difficult. Con-
tent analysis was useful for studying IT incidents, but
the researcher’s subjective categorization hampered
the study. Researchers’ knowledge and interpretation
of events determine research results. A structured in-
cident classification could be beneficial, but this study
struggled to create a report taxonomy. An abstract
taxonomy is needed to classify IT-incident reports by
characteristics, including indirect impact.
AVOIDIT and Cyber Harm use high-level classi-
fiers to classify attacks, but the categories could be
too abstract and fail to distinguish attack character-
istics. The AVOIDIT taxonomy and categories may
be outdated since 2009. More could have been done
to represent relevant impact types. A weakness of this
study is that it classified impact within and outside the
cyberinfrastructure without measuring it. Although
disruption and economic impact are primary informa-
tional and indirect impacts, the study does not account
for total downtime or economic loss. Comparing cy-
berattack effectiveness is difficult.
6 CONCLUSION
The analysis of IT incident reports from Swedish ser-
vice providers to MSB indicates that denial-of-service
attacks and disruptions severely affect operations and
information. Many of the 254 cyberattacks studied
had no effect. Many social engineering attacks had
little direct impact. Social engineering for initial ac-
cess and user attacks is decreasing but still common.
Infection with malware is rare. Few malicious IT in-
cidents compromised critical service providers’ infor-
mation resources. The indirect impacts were mostly
economic. Supply chain incidents often impacted so-
ciety and the economy. By identifying cyberinfras-
tructure’s impact types on service providers and oth-
ers, this paper advances scientific understanding. This
study found that many critical service provider cyber-
attack reports show no impact.
RQ1 suggests many cyberattacks have no social
or organisational impact. This study supports pre-
vious findings on supply chain incidents and organ-
isational and societal impact.Cyberattack classifica-
tion and components could be studied. We lack in-
cident taxonomies by high-level characteristics and
affect. Methodological advances in cyberattack-
classification that focus on possibilities and limits
would benefit systematic analysis of cyber incidents
based on reports with varying levels of detail. Re-
search on incident severity using indirect impact in-
dicators is needed. It categorised incidents by com-
ponent. It would be important to study how DDoS
attacks prolong critical service downtime.
REFERENCES
Agrafiotis, I., Nurse, J. R., Goldsmith, M., Creese, S., &
Upton, D. (2018). A taxonomy of cyber-harms: Defin-
ing the impacts of cyber-attacks and understanding
how they propagate. Journal of Cybersecurity, 4(1),
tyy006.
Applegate, S. D., & Stavrou, A. (2013). Towards a cyber
conflict taxonomy. In 2013 5th International Confer-
ence on Cyber Conflict (CYCON 2013) (pp. 1-18).
IEEE.
Calderaro, Andrea and Blumfelde, Stella (2022) Artificial
intelligence and EU security: the false promise of
digital sovereignty, European Security, 31:3, 415-434,
DOI: 10.1080/09662839.2022.2101885
Braun, V., & Clarke, V. (2012). Thematic analysis. Ameri-
can Psychological Association.
Boin, A. (2019). The transboundary crisis: Why we are un-
prepared and the road ahead. Journal of Contingencies
and Crisis Management, 27(1), 94-99.
Caldarulo, M., Welch, E. W., & Feeney, M. K. (2022).
Determinants of cyber-incidents among small and
medium US cities. Government Information Quar-
terly, 39(3)
Derbyshire, R., Green, B., Prince, D., Mauthe, A., &
Hutchison, D. (2018). An analysis of cyber security at-
tack taxonomies. IEEE European Symposium on Se-
curity and Privacy Workshops (EuroS&PW) (pp. 153-
161). IEEE.
Harry, C., & Gallagher, N. (2018). Classifying cyber events.
Journal of Information Warfare, 17(3), 17-31.
Hsieh, H. F., & Shannon, S. E. (2005). Three approaches
to qualitative content analysis. Qualitative health re-
search, 15(9), 1277-1288.
Lallie, H. S., Shepherd, L. A., Nurse, J. R., Erola, A.,
Epiphaniou, G., Maple, C.,& Bellekens, X. (2021).
Cyber security in the age of COVID-19: A timeline
and analysis of cyber-crime and cyber-attacks during
the pandemic. Computers & security, 105, 102248.
Markopoulou, D., & Papakonstantinou, V. (2021). The reg-
ulatory framework for the protection of critical infras-
tructures against cyberthreats: Identifying shortcom-
ings and addressing future challenges: The case of the
health sector in particular. Computer law & security
review, 41, 105502.
Mancuso, V. F., Strang, A. J., Funke, G. J., & Finomore, V.
S. (2014). Human factors of cyber attacks: a frame-
work for human-centered research. In Proceedings
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
144