Mapping the coverage of security controls in cyber insurance proposal forms

[1]  Fabio Martinelli,et al.  Cyber-insurance survey , 2017, Comput. Sci. Rev..

[2]  Nathan Manworren,et al.  Why you should care about the Target data breach , 2016 .

[3]  Jason R. C. Nurse,et al.  Exploring a Controls-Based Assessment of Infrastructure Vulnerability , 2015, CRiSIS.

[4]  Martin Eling,et al.  Insurability of Cyber Risk: An Empirical Analysis , 2014, The Geneva Papers on Risk and Insurance - Issues and Practice.

[5]  Jan Hendrik Wirfs,et al.  Insurability of Cyber Risk: An Empirical Analysis , 2014, The Geneva Papers on Risk and Insurance - Issues and Practice.

[6]  Andrew B. Whinston,et al.  Managing Interdependent Information Security Risks: A Study of Cyberinsurance, Managed Security Service and Risk Pooling , 2009, ICIS.

[7]  Tridib Bandyopadhyay,et al.  Why IT managers don't go for cyber-insurance products , 2009, Commun. ACM.

[8]  Mikko T. Siponen,et al.  Information security management standards: Problems and solutions , 2009, Inf. Manag..

[9]  Marc Lelarge,et al.  A New Perspective on Internet Security using Insurance , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  Helvi Kyngäs,et al.  The qualitative content analysis process. , 2008, Journal of advanced nursing.

[11]  David Ahmad,et al.  The Contemporary Software Security Landscape , 2007, IEEE Security & Privacy.

[12]  Walter S. Baer,et al.  Cyberinsurance in IT Security Management , 2007, IEEE Security & Privacy.

[13]  William Yurcik,et al.  The Evolution of Cyberinsurance , 2006, ArXiv.

[14]  Roger Frost,et al.  International Organization for Standardization (ISO) , 2004 .

[15]  Dan Geer,et al.  Risk Management Is Still Where the Money Is , 2003, Computer.

[16]  Walter S. Baer,et al.  Rewarding IT Security in the Marketplace , 2003 .

[17]  Lawrence A. Gordon,et al.  A framework for using insurance for cyber-risk management , 2003, Commun. ACM.

[18]  Carol A. Siegel,et al.  Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security , 2002, Inf. Secur. J. A Glob. Perspect..

[19]  Torsten Grzebiela,et al.  Insurability of electronic commerce risks , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[20]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[21]  Bruce Schneier,et al.  Insurance and the computer industry , 2001, CACM.

[22]  B. Lampson,et al.  Protection 1 , 2022 .

[23]  R P Lederman,et al.  Content Analysis of Word Texts , 1991, MCN. The American journal of maternal child nursing.

[24]  C. Toregas,et al.  Insurance for Cyber Attacks: The Issue of Setting Premiums in Context , 2014 .

[25]  J. Walrand,et al.  Cyber-Insurance: Missing Market Driven by User Heterogeneity , 2010 .

[26]  Rainer Böhme,et al.  Modeling Cyber-Insurance: Towards a Unifying Framework , 2010, WEIS.

[27]  Jean C. Walrand,et al.  Competitive Cyber-Insurance and Internet Security , 2009, WEIS.

[28]  Hemantha S. B. Herath,et al.  Cyber-Insurance: Copula Pricing Framework and Implication for Risk Management , 2007, WEIS.

[29]  Rainer Böhme,et al.  Models and Measures for Correlation in Cyber-Insurance , 2006, WEIS.

[30]  Srinivasan Raghunathan,et al.  Cyber Insurance and IT Security Investment: Impact of Interdependence Risk , 2005, WEIS.

[31]  Rainer Böhme,et al.  Cyber-Insurance Revisited , 2005, WEIS.

[32]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[33]  Matthew Crane,et al.  International Liability in Cyberspace , 2001 .

[34]  B Downe-Wamboldt,et al.  Content analysis: method, applications, and issues. , 1992, Health care for women international.