نتایج جستجو برای: cyber insurance
تعداد نتایج: 67748 فیلتر نتایج به سال:
Previous research suggests that there are substantial interactions between the unemployment insurance (UI) and the sickness insurance (SI) in Sweden. Moral hazard arises in the interplay between these two social insurance systems, since by reporting sick an unemployed person can postpone the UI expiration date and sometimes also receive considerably higher benefits. This paper examines whether ...
On July 1, 1996, Employment Insurance (EI) replaced the Unemployment Insurance (UI) program.1 Although the two programs are broadly similar, there are some important differences, including the differential treatment of frequent and occasional claimants and the introduction of an income top-up for low-income recipients with children under EI. Overall, these reforms bring more restrictive benefit...
This paper examines the incentive effects caused by the interactions between unemployment insurance (UI) and sickness insurance (SI), two important components of Sweden’s social insurance system. There are two main topics of interest: how the sickness report rate and the length of the subsequent sick period among the unemployed are affected by (i) the limit of 300 workdays for UI benefits, and ...
This study applies Bayesian Inference to estimate flood risk for 53 dyke ring areas in the Netherlands, and focuses particularly on the data scarcity and extreme behaviour of catastrophe risk. The probability density curves of flood damage are estimated through Monte Carlo simulations. Based on these results, flood insurance premiums are estimated using two different practical methods that each...
The area of digital technologies is currently the subject many cyber threats, frequency which increasing. One areas security also creation models and estimates process threats their possible financial impacts. However, some studies show that cyber-threat assessment to identify potential impacts for organizations a very challenging process. A relatively large problem here detection scenarios exp...
Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glarin...
Open-access blockchains based on proof-of-work protocols have gained tremendous popularity for their capabilities of providing decentralized tamper-proof ledgers and platforms data-driven autonomous organization. Nevertheless, the consensus are vulnerable to cyber-attacks such as double-spending. In this paper, we propose a novel approach cyber risk management blockchain-based service. particul...
We study Disability Insurance (DI) application behavior in the US using matched SIPP and administrative data over 1989–1995. Certain state-contingent earnings projections and eligibility probabilities are central to the analysis. We find evidence for a small work disincentive effect of DI that seems to be restricted to a subset of the DI beneficiaries, including low earning groups such as blue ...
0
In this paper, we explain why existing cyber-insurance contracts condition their premiums only on a client’s general features (such as the number of employees, sales volume) but do not reflect the client’s security practices. Indeed, we show that even if a competitive insurer can monitor (and enforce) security requirements for a vast majority of his clients, with only a minor fraction of the cl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید