Post-Incident Audits on Cyber Insurance Discounts
暂无分享,去创建一个
Aron Laszka | Andrew Fielder | Emmanouil Panaousis | Sakshyam Panda | Daniel W. Woods | Daniel W Woods | Aron Laszka | E. Panaousis | S. Panda | Andrew Fielder
[1] Marc Lelarge,et al. A New Perspective on Internet Security using Insurance , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[2] M. Angela Sasse,et al. The compliance budget: managing security behaviour in organisations , 2009, NSPW '08.
[3] Robert Gibbons,et al. A primer in game theory , 1992 .
[4] Rainer Böhme,et al. Models and Measures for Correlation in Cyber-Insurance , 2006, WEIS.
[5] Sasha Romanosky,et al. Examining the costs and causes of cyber incidents , 2016, J. Cybersecur..
[6] Levente Buttyán,et al. A Survey of Interdependent Information Security Games , 2014, ACM Comput. Surv..
[7] Elio Rossi,et al. Policy , 2007, Evidence-based Complementary and Alternative Medicine : eCAM.
[8] Daniel W. Woods,et al. Policy Measures and Cyber Insurance: A Framework , 2017 .
[9] H. Kunreuther,et al. Interdependent Security , 2003 .
[10] William Yurcik,et al. Cyber-insurance As A Market-Based Solution To The Problem Of Cybersecurity , 2005, WEIS.
[11] P. Picard,et al. Auditing claims in the insurance market with fraud: The credibility issue , 1996 .
[12] Rainer Böhme,et al. Modeling Cyber-Insurance: Towards a Unifying Framework , 2010, WEIS.
[13] Aron Laszka,et al. Estimating Systematic Risk in Real-World Networks , 2014, Financial Cryptography.
[14] Jean C. Walrand,et al. Competitive Cyber-Insurance and Internet Security , 2009, WEIS.
[15] Ulrik Franke,et al. The cyber insurance market in Sweden , 2017, Comput. Secur..
[16] Tyler Moore,et al. On the harms arising from the Equifax data breach of 2017 , 2017, Int. J. Crit. Infrastructure Prot..
[17] Walter S. Baer,et al. Cyberinsurance in IT Security Management , 2007, IEEE Security & Privacy.
[19] Rob Thoyts,et al. Insurance Theory and Practice , 2010 .
[20] Aron Laszka,et al. Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits , 2018, GameSec.
[21] Srinivasan Raghunathan,et al. Cyber Insurance and IT Security Investment: Impact of Interdependence Risk , 2005, WEIS.
[22] Andreas Kuehn,et al. Content Analysis of Cyber Insurance Policies: How Do Carriers Write Policies and Price Cyber Risk? , 2017 .
[23] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[24] Aron Laszka,et al. Should Cyber-Insurance Providers Invest in Software Security? , 2015, ESORICS.
[25] Andrew C. Simpson,et al. Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures , 2016, WEIS.
[26] Mingyan Liu,et al. Embracing and controlling risk dependency in cyber-insurance policy underwriting , 2019, J. Cybersecur..
[27] Sadie Creese,et al. Mapping the coverage of security controls in cyber insurance proposal forms , 2017, Journal of Internet Services and Applications.
[28] Tridib Bandyopadhyay,et al. Why IT managers don't go for cyber-insurance products , 2009, Commun. ACM.
[29] Daniel W. Woods,et al. Monte Carlo methods to investigate how aggregated cyber insurance claims data impacts security investments , 2018 .
[30] Jean C. Walrand,et al. Why cyber-insurance contracts fail to reflect cyber-risks , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[31] P. Picard,et al. Economic Analysis of Insurance Fraud , 2013 .