2019
DOI: 10.1016/j.cose.2019.101593
|View full text |Cite
|
Sign up to set email alerts
|

Post-incident audits on cyber insurance discounts

Abstract: We introduce a game-theoretic model to investigate the strategic interaction between a cyber insurance policyholder whose premium depends on her self-reported security level and an insurer with the power to audit the security level upon receiving an indemnity claim. Audits can reveal fraudulent (or simply careless) policyholders not following reported security procedures, in which case the insurer can refuse to indemnify the policyholder. However, the insurer has to bear an audit cost even when the policyholde… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…It is evident from the results that the risk to occupants increases with an increase in several smart devices in the home. Such insights on the level of risk could assist cyber insurers inappropriately profiling home occupants and designing custom insurance policy packages [36]- [38] with premium discounts [39]. To understand the impact of knowledge and time required to implement controls on a user group, we extend our analysis by considering the budget required to improve a level of time or knowledge i.e, from low to medium and medium to a high level.…”
Section: Discussionmentioning
confidence: 99%
“…It is evident from the results that the risk to occupants increases with an increase in several smart devices in the home. Such insights on the level of risk could assist cyber insurers inappropriately profiling home occupants and designing custom insurance policy packages [36]- [38] with premium discounts [39]. To understand the impact of knowledge and time required to implement controls on a user group, we extend our analysis by considering the budget required to improve a level of time or knowledge i.e, from low to medium and medium to a high level.…”
Section: Discussionmentioning
confidence: 99%
“…Existing work on cyber risk management has covered specific aspects such as cyber security culture, awareness and training [28,38], the impact and mitigation of cyber-attacks [7,25,33] and the cyber risk management process [5,32]. Organisations must implement effective cyber risk management practices aligned with their business objectives through protection [4,6,24,29,36], mitigation [7,16,28] and insurance [5,26,30] to contain the cyber risk and exposure. Risk management is a continuous process that must acknowledge the changing internal and external environment of the organisation.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, one of the most pressing issues that organizations face nowadays is to manage cyber risks, which involves protection [2,3,11,17,27,34], mitigation [4,12,26,30] and insurance [10,24,28]. The most common reason that hinders this process is the limited budget.…”
Section: Introductionmentioning
confidence: 99%