2008
DOI: 10.1007/978-3-540-88313-5_14
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…A typical period of non-life insurance is one year [80,111,112]. Thus, in case of life insurance, it is enough to consider only the probability of occurrence (e.g., pr i ), while for non-life insurance it is required to nd a rate of occurrences RO i , i.e., a number of incident occurrences in a considered period of time t. Although, cyber-insurance is clearly a non-life insurance the available state of the art literature on the topic considers only a single event in an observed period, i.e., using pr i instead of RO i (with few exceptions, e.g., [113,114,115]). Instead, for complete non-life insurance fair premium estimation the following formula should be used:…”
Section: Life Vs Non-life Insurancementioning
confidence: 99%
See 1 more Smart Citation
“…A typical period of non-life insurance is one year [80,111,112]. Thus, in case of life insurance, it is enough to consider only the probability of occurrence (e.g., pr i ), while for non-life insurance it is required to nd a rate of occurrences RO i , i.e., a number of incident occurrences in a considered period of time t. Although, cyber-insurance is clearly a non-life insurance the available state of the art literature on the topic considers only a single event in an observed period, i.e., using pr i instead of RO i (with few exceptions, e.g., [113,114,115]). Instead, for complete non-life insurance fair premium estimation the following formula should be used:…”
Section: Life Vs Non-life Insurancementioning
confidence: 99%
“…The main problem studied was the optimal allocation of expenditures by the customer to secure or/and insure arrived packets. A. Yannacopoulos et al,[115] used the random utility model for assessing the possible claimed compensation of one individual and several models for estimating the number of claims (using Poisson distribution, renewal process, mixed Poisson distribution, etc.). The union of these models allowed the authors to compute how much would an individual claim as compensation.…”
mentioning
confidence: 99%
“…SMTP (25), FTP commands (21) and FTP responses (22) all have relatively high entropy. The reason for this may be that compressed binaries or email attachments influence the data.…”
Section: Methodsmentioning
confidence: 99%
“…A third possibility is to manually define opinions about privacy sensitivity based on expert knowledge. Other potential indicators may be based on actuarial risk models for evaluating the economical risk involved in privacy leakages that can be transformed into Subjective Logic based privacy risk opinions [25]. Subjective Logic based opinions could also be derived from legal requirements or evidential reasoning [10].…”
Section: A Brief Introduction To Subjective Logicmentioning
confidence: 99%
“…For instance, Gordon et al (Gordon, Loeb, & Sohail, 2003) and Wang (Wang, 2017) provide frameworks for cyber risk management, where insurance is one of the means for risk reduction. Yannacopoulos et al (Yannacopoulos, Lambrinoudakis, Gritzalis, Xanthopoulos, & Katsikas, 2008) discuss the level of coverage a firm should consider for privacy breaches given that the premium levels are set. Grossklags et al (Grossklags, Christin, & Chuang, 2008) use gametheoretic models for shifting between investments in protection and selfinsurance.…”
Section: Introductionmentioning
confidence: 99%