2023
DOI: 10.1016/j.ejor.2022.07.033
|View full text |Cite
|
Sign up to set email alerts
|

Structural models for fog computing based internet of things architectures with insurance and risk management applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Aggregate loss. The aggregate loss can be expressed using the loss resulting from a single attack by conditioning on the number of attacks, which is a critical component in the frequency-severity approach as the industry standard for pricing insurance risks [19,44,46]. Similarly, the loss resulting from a single attack can be expressed using the local cost c by conditioning on the cluster size S. Using also that the number of attacks is Poisson distributed, we obtain the following result.…”
Section: Resultsmentioning
confidence: 97%
“…Aggregate loss. The aggregate loss can be expressed using the loss resulting from a single attack by conditioning on the number of attacks, which is a critical component in the frequency-severity approach as the industry standard for pricing insurance risks [19,44,46]. Similarly, the loss resulting from a single attack can be expressed using the local cost c by conditioning on the cluster size S. Using also that the number of attacks is Poisson distributed, we obtain the following result.…”
Section: Resultsmentioning
confidence: 97%
“…10.11113/mjfas.v19n3.2906 One could say that Fog computing is the foundation upon which the cloud rests. The following is a summary of the features that define Fog computing, as described in [31,38] :…”
Section: Fog Computing Characteristicsmentioning
confidence: 99%
“…Thus, managing cyber risk comprises many forms such as the utilization of cybersecurity protection for vulnerability mitigation (Bokan & Santos, 2021;Ranganayaki et al, 2021), understanding cyber risk losses on a network (see, e.g., Acemoglu et al, 2016;Santos et al, 2007), cyber-insurance for minimizing the consequential financial risk (Federal Financial Institutions Examination Council, 2018; X. Zhang et al, 2023), and the use of risk management frameworks for risk identification and assessment (Meszaros & Buchalcevova, 2017;Millar, 2016;Paté-Cornell et al, 2018;Rios Insua et al, 2021). Cybersecurity protection strategies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…And so, according to The Institute of Risk Management (2018), cyber risk is defined as “any risk of financial loss, disruption or damage to the reputation of an organization from some sort of failure of its information technology systems” (The Institute of Risk Management, 2018). Thus, managing cyber risk comprises many forms such as the utilization of cybersecurity protection for vulnerability mitigation (Bokan & Santos, 2021; Ranganayaki et al., 2021), understanding cyber risk losses on a network (see, e.g., Acemoglu et al., 2016; Santos et al., 2007), cyber‐insurance for minimizing the consequential financial risk (Federal Financial Institutions Examination Council, 2018; X. Zhang et al., 2023), and the use of risk management frameworks for risk identification and assessment (Meszaros & Buchalcevova, 2017; Millar, 2016; Paté‐Cornell et al., 2018; Rios Insua et al., 2021).…”
Section: Introductionmentioning
confidence: 99%