Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) 2006
DOI: 10.1109/hicss.2006.138
|View full text |Cite
|
Sign up to set email alerts
|

e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
13
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 6 publications
2
13
0
Order By: Relevance
“…15 Discuss the development of the market for cyber insurance, finding that the evolution of internet security risk and increasing compliance requirements significantly drive demand. 16 Mukhopadhyay et al (2006) Introduce an approach to estimate cyber risk probabilities based on Bayesian belief networks as a basis to determine cyber insurance premiums. 17 Böhme (2005) Discusses the formation of a proper cyber insurance market and problems by correlated losses; also the conditions under which coverage of cyber risk is possible are evaluated.…”
Section: Hofmann and Ramajmentioning
confidence: 99%
“…15 Discuss the development of the market for cyber insurance, finding that the evolution of internet security risk and increasing compliance requirements significantly drive demand. 16 Mukhopadhyay et al (2006) Introduce an approach to estimate cyber risk probabilities based on Bayesian belief networks as a basis to determine cyber insurance premiums. 17 Böhme (2005) Discusses the formation of a proper cyber insurance market and problems by correlated losses; also the conditions under which coverage of cyber risk is possible are evaluated.…”
Section: Hofmann and Ramajmentioning
confidence: 99%
“…Another type of signaling could be a certification of the data security following ISO standards; in general, there is a lack of exchange of best practices in cyber risk management that inhibits identification of dominant strategies for tackling cyber risk (see ENISA, 2012). 68 Mukhopadhyay et al (2005Mukhopadhyay et al ( , 2006 apply the collective risk model in conjunction with expected utility theory to make judgments about the theoretical value of cyber insurance to firms with different levels of risk aversion. They find that with increasing risk aversion, firms will accept fairly priced cyber insurance over no insurance.…”
Section: Market Criteria (6) Insurance Premiummentioning
confidence: 99%
“…Event Study(ES) methodology has been used determine the stock market impact of a cyber breach [29,30]. [20] VAR (2008) [19] Smith Lim Approach (1984) [17] LRAM (1987) [16,17] SPAN (1990) [16,17] Copula aided BBN (2006) [21] Cognitive Fuzzy Logic(2000) [22] Hidden Markov Model (2006) Fuzzy AHP (2009) ANN for phishing (2011) [27] Fuzzy sets & GA (2011) [26] Gametheoretic approach (2004) [18] Parker's Computer Security program (1981) [16,17] CRAMM (1991) [16,17] CORAS (2002) [16,17] OCTAVE (2003) [16,17] ISRAM (2005) [16,17] RISKPAC (1988) [16,17] Gompertz Diffusion Model (2003) [11] GLM(Logit) (2009) [16] …”
Section: Techniques For Is Risk Assessmentmentioning
confidence: 99%