Mapping the coverage of security controls in cyber insurance proposal forms
暂无分享,去创建一个
[1] Fabio Martinelli,et al. Cyber-insurance survey , 2017, Comput. Sci. Rev..
[2] Nathan Manworren,et al. Why you should care about the Target data breach , 2016 .
[3] Jason R. C. Nurse,et al. Exploring a Controls-Based Assessment of Infrastructure Vulnerability , 2015, CRiSIS.
[4] Martin Eling,et al. Insurability of Cyber Risk: An Empirical Analysis , 2014, The Geneva Papers on Risk and Insurance - Issues and Practice.
[5] Jan Hendrik Wirfs,et al. Insurability of Cyber Risk: An Empirical Analysis , 2014, The Geneva Papers on Risk and Insurance - Issues and Practice.
[6] Andrew B. Whinston,et al. Managing Interdependent Information Security Risks: A Study of Cyberinsurance, Managed Security Service and Risk Pooling , 2009, ICIS.
[7] Tridib Bandyopadhyay,et al. Why IT managers don't go for cyber-insurance products , 2009, Commun. ACM.
[8] Mikko T. Siponen,et al. Information security management standards: Problems and solutions , 2009, Inf. Manag..
[9] Marc Lelarge,et al. A New Perspective on Internet Security using Insurance , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Helvi Kyngäs,et al. The qualitative content analysis process. , 2008, Journal of advanced nursing.
[11] David Ahmad,et al. The Contemporary Software Security Landscape , 2007, IEEE Security & Privacy.
[12] Walter S. Baer,et al. Cyberinsurance in IT Security Management , 2007, IEEE Security & Privacy.
[13] William Yurcik,et al. The Evolution of Cyberinsurance , 2006, ArXiv.
[14] Roger Frost,et al. International Organization for Standardization (ISO) , 2004 .
[15] Dan Geer,et al. Risk Management Is Still Where the Money Is , 2003, Computer.
[16] Walter S. Baer,et al. Rewarding IT Security in the Marketplace , 2003 .
[17] Lawrence A. Gordon,et al. A framework for using insurance for cyber-risk management , 2003, Commun. ACM.
[18] Carol A. Siegel,et al. Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security , 2002, Inf. Secur. J. A Glob. Perspect..
[19] Torsten Grzebiela,et al. Insurability of electronic commerce risks , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[20] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[21] Bruce Schneier,et al. Insurance and the computer industry , 2001, CACM.
[22] B. Lampson,et al. Protection 1 , 2022 .
[23] R P Lederman,et al. Content Analysis of Word Texts , 1991, MCN. The American journal of maternal child nursing.
[24] C. Toregas,et al. Insurance for Cyber Attacks: The Issue of Setting Premiums in Context , 2014 .
[25] J. Walrand,et al. Cyber-Insurance: Missing Market Driven by User Heterogeneity , 2010 .
[26] Rainer Böhme,et al. Modeling Cyber-Insurance: Towards a Unifying Framework , 2010, WEIS.
[27] Jean C. Walrand,et al. Competitive Cyber-Insurance and Internet Security , 2009, WEIS.
[28] Hemantha S. B. Herath,et al. Cyber-Insurance: Copula Pricing Framework and Implication for Risk Management , 2007, WEIS.
[29] Rainer Böhme,et al. Models and Measures for Correlation in Cyber-Insurance , 2006, WEIS.
[30] Srinivasan Raghunathan,et al. Cyber Insurance and IT Security Investment: Impact of Interdependence Risk , 2005, WEIS.
[31] Rainer Böhme,et al. Cyber-Insurance Revisited , 2005, WEIS.
[32] H. Kunreuther,et al. Interdependent Security , 2003 .
[33] Matthew Crane,et al. International Liability in Cyberspace , 2001 .
[34] B Downe-Wamboldt,et al. Content analysis: method, applications, and issues. , 1992, Health care for women international.