2020
DOI: 10.2139/ssrn.3668228
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Model for Cyber Risk Based on Marked Point Processes and Its Application to Insurance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 47 publications
0
1
0
Order By: Relevance
“…For his part, proposes a modeling of the cybersecurity system for the rapid development of the computerization process and refers to a comprehensive model for cyber risk by proposing a new approach to model cyber risk using marked point processes [76]. By this, the key co-variable is identified, resulting in the ability to detect non-redirected and targeted malicious attacks, as well as accidents and failures.…”
Section: Rq3: What Kind Of It Security Policies Are Applied In the Bu...mentioning
confidence: 99%
“…For his part, proposes a modeling of the cybersecurity system for the rapid development of the computerization process and refers to a comprehensive model for cyber risk by proposing a new approach to model cyber risk using marked point processes [76]. By this, the key co-variable is identified, resulting in the ability to detect non-redirected and targeted malicious attacks, as well as accidents and failures.…”
Section: Rq3: What Kind Of It Security Policies Are Applied In the Bu...mentioning
confidence: 99%
“…Given the negative externality known from other real life situations, Öğüt et al (2011) show that this desired interaction in a “cybersecurity risk management” process breaks down under these conditions resulting in firms investing less than socially optimal in risk mitigation and insurance. Even after decades of calls for computer security to move beyond just technical measures (Madnick, 1978), the technical side still dominates the management aspect and lacks an economic view of information security (Alshaikh et al, 2014; Cannoy et al, 2006; Ganin et al, 2020; Siponen & Willison, 2007; Zeller & Scherer, 2020).…”
Section: Cyber Risk Management: Origins and Historical Developmentmentioning
confidence: 99%