2010
DOI: 10.2139/ssrn.1593137
|View full text |Cite
|
Sign up to set email alerts
|

Managing Interdependent Information Security Risks: A Study of Cyberinsurance, Managed Security Service and Risk Pooling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 41 publications
0
15
0
Order By: Relevance
“…A broader notion includes service providers who manage security investment decisions on behalf of the agents. If implementable, this can help to internalize negative externalities of interdependent security [ZXW09]. * This completes the definition of our framework.…”
Section: Security Service Providersmentioning
confidence: 69%
“…A broader notion includes service providers who manage security investment decisions on behalf of the agents. If implementable, this can help to internalize negative externalities of interdependent security [ZXW09]. * This completes the definition of our framework.…”
Section: Security Service Providersmentioning
confidence: 69%
“…A unifying framework is provided by Böhme et al [23], which draws a distinction between two aspects of the market. First of all, the focus on how security investments accrue benefits to all parties in a system, not just the investor-particularly, how these positive externalities can reduce the risk an insurer faces [24][25][26][27]. Secondly, there have been various considerations of systemic risk, in which many firms make claims arising from the same event because of the interdependency of networks [28][29][30].…”
Section: Related Workmentioning
confidence: 99%
“…Most models of interdependence are designed with the intention to find ways to internalize the externality. The design of different models of interdependence led to literature for different contexts, including secure outsourced computation with incentive (Belenkiy et al, 2008), and secure outsourcing with and without risk transfer (Rowe, 2007;Zhao, Xue, & Whinston, 2009). Also, the availability of security audits is assumed sometimes (Shetty, Schwartz, Felegyhazi, & Walrand, 2010).…”
Section: Incentive Mechanismsmentioning
confidence: 99%