نتایج جستجو برای: cyber insurance

تعداد نتایج: 67748  

2014
Yue Li Siying Liu

This paper proposes that the decline in federal disability insurance (DI) screening stringency raises the incentive of being uninsured. To support it, we provide a theoretical model and empirical evidence. JEL classification: I13, I18, H31, H51, H55

2005
Rainer Böhme

Cyber-insurance is considered as appropriate means to absorb financial losses caused by computer security breaches. Since insurance markets at the same time create incentives to construct more secure systems, they are regarded as particularly desirable tools. However, this paper argues that the typical market structure in IT businesses may thwart the formation of a proper insurance market for c...

2014
Viktor Prasanna Minlan Yu Ramesh Govindan Sergey Lototsky Felix Wong Antonios Michaloliakos Vlad Balan Ananthakrishnan Jagadeesan Bochun Wang Kai Song Michael Hung Sung-Han Lin

In recent years, security researchers have well established the fact that technical security solutions alone will not result in a robust cyberspace due to several issues jointly related to the economics and technology of computer security. In this regard some of them proposed cyber-insurance as a suitable risk management technique that has the potential to jointly align with the various incenti...

Journal: :Muma Case Review 2016

Journal: :Geneva Papers on Risk and Insurance-issues and Practice 2022

Abstract Selling insurance gives insurers an incentive to manage insured risks. The “insurance-as-governance” literature demonstrates that often make conditional on ex ante risk reduction or mitigation. But governs in support of enterprise, not security for its own sake. Tight underwriting inhibits enterprise—not only businesses but also the business insurance. This paper highlights post loss a...

Journal: :Future Internet 2016
Alexander Kosenkov

In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of ...

Journal: :Sivas Soft Bilisim Proje Danismanlik Egitim Sanayi ve Ticaret Limited Sirketi 2021

Journal: :Journal of Mathematical Finance 2022

Cybersecurity breaches may be correlated due to geography, similar infrastructure, or use of a third-party contractor. We show how logistic regression used estimate the probability an attack where among firms up and down supply chain. also Poisson number records breached. Losses arising from cybersecurity have unknown distribution. propose stock price reaction breach as objective measure loss i...

2010
Radha Iyengar Giovanni Mastrobuoni

The dramatic rise in the disability insurance (DI) roles in the last 20 years has been the subject of much controversy in both popular and academic circles. While, the relationship between DI and labor force participation has been the subject of a growing literature, the mechanism of this transition from employment to DI remains unclear. We hypothesize that one mechanism is the state-level admi...

2014
Deborah J. Bodeau Richard D. Graubart Ellen R. Laderman

With the growing capability, expertise and intent of advanced cyber adversaries, it is no longer realistic to assume that one can successfully keep all adversaries out of a system infrastructure. Therefore, architecture and systems engineering must be based on the assumption that systems or components have been or can be compromised, and that missions and business functions must continue to ope...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید