A framework for incorporating insurance in critical infrastructure cyber risk strategies

[1]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[2]  B. Obama Executive Order 13691: Promoting Private Sector Cybersecurity Information Sharing , 2015 .

[3]  S. Shankar Sastry,et al.  Cyber-insurance framework for large scale interdependent networks , 2014, HiCoNS.

[4]  Tyler Moore,et al.  Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis , 2013, Int. J. Crit. Infrastructure Prot..

[5]  Barack Obama,et al.  Executive Order 13636: Improving Critical Infrastructure Cybersecurity , 2013 .

[6]  Thomas Nowey,et al.  A Closer Look at Information Security Costs , 2012, WEIS.

[7]  Mason Rice,et al.  Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines , 2010, Critical Infrastructure Protection.

[8]  Tridib Bandyopadhyay,et al.  Why IT managers don't go for cyber-insurance products , 2009, Commun. ACM.

[9]  Marc Lelarge,et al.  Economic Incentives to Increase Security in the Internet: The Case for Insurance , 2009, IEEE INFOCOM 2009.

[10]  Anupam Chander,et al.  Securing Privacy in the Internet Age , 2008 .

[11]  Borka Jerman-Blazic,et al.  An economic modelling approach to information security risk management , 2008, Int. J. Inf. Manag..

[12]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.

[13]  Marc Lelarge,et al.  A New Perspective on Internet Security using Insurance , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[14]  J. Bolot Cyber Insurance as an Incentive for Internet Security , 2008 .

[15]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[16]  Xiaomeng Su,et al.  An Overview of Economic Approaches to Information Security Management , 2006 .

[17]  William Yurcik,et al.  The Evolution of Cyberinsurance , 2006, ArXiv.

[18]  Miles A. McQueen,et al.  Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[19]  Rainer Böhme,et al.  Models and Measures for Correlation in Cyber-Insurance , 2006, WEIS.

[20]  Burkhard Pedell,et al.  Terrorism Risk Coverage in the Post-9/11 Era: A Comparison of New Public–Private Partnerships in France, Germany and the U.S. , 2005 .

[21]  Rainer Böhme,et al.  Cyber-Insurance Revisited , 2005, WEIS.

[22]  Ruperto P. Majuca,et al.  Three Economic Arguments for Cyberinsurance , 2004 .

[23]  Rahul Telang,et al.  An ounce of prevention vs. a pound of cure: How can we measure the value of IT security solutions? , 2004 .

[24]  Lawrence A. Gordon,et al.  A framework for using insurance for cyber-risk management , 2003, Commun. ACM.

[25]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[26]  Michael M. May,et al.  How much is enough? A risk management approach to computer security , 2000 .

[27]  G. Skogh Development Risks, Strict Liability, and the Insurability of Industrial Hazards , 1998 .

[28]  R. Scadden Economics of Insurance . By K. Borch, K. Aase and A. Sandmo. (Elsevier Science Publishing Co. Inc., New York & Amsterdam.) , 1990 .

[29]  Michael J. McNamara,et al.  Principles of risk management and insurance , 1978 .

[30]  L. Sutherland,et al.  The Sun Insurance Office, 1710-1960 : the history of two and a half centuries of British insurance , 1962 .

[31]  C. Kulp The Rate-Making Process in Property and Casualty Insurance—Goals, Technics, and Limits , 1950 .