3,024
Views
0
CrossRef citations to date
0
Altmetric
Reviews

Cyberspace and Personal Cyber Insurance: A Systematic Review

, , &

References

  • Carter DM. Cyberspace and Cyberculture. In: Kobayashi A, editor. International encyclopedia of human geography. 2nd ed. Elsevier: Oxford; 2020. p. 143–47.
  • Shanker AK, Usha G. Cyber threat landscape in cyber space. 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA); 2017; Coimbatore, India. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICECA.2017.8203709.
  • Dobie GEA. 2021 Allianz Risk Barometer. Germany: ALLIANZ Global Corporate and Specialty SE; 2021. https://www.agcs.allianz.com/news-and-insights/news/allianz-risk-barometer-2021.html.
  • Willi F, Bundt M. Personal cyber insurance: protecting our digital lives. Zurich, Switzerland: Swiss Reinsurance Company Ltd; 2019. https://www.swissre.com/dam/jcr:68e4d8fb-509c-4182-a219-c803f7d23af1/ZRH-18-00632-P1_Personal_cyber_insurance_Publication_WEB.pdf.
  • Li Y, Liu Q. A comprehensive review study of cyber attacks and cyber security; emerging trends and recent developments. Energy Rep. 2021;7:8176–86. doi:10.1016/j.egyr.2021.08.126.
  • Lallie HS, Shepherd LA, Nurse JRC, Erola A, Epiphaniou G, Maple C, Bellekens X. Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput Secur. 2021;105:102248. doi:10.1016/j.cose.2021.102248.
  • Agrafiotis I, Nurse JRC, Goldsmith M, Creese S, Upton D. A taxonomy of cyber-harms: defining the impacts of cyber attacks and understanding how they propogate. J Cybersecur (Oxford). 2018;4(1):4. doi:10.1093/cybsec/tyy006.
  • Süzen AA. A risk assessment of cyber attacks and defense strategies in industry 4.0 ecosystem. Int J Comput Netw Inf Secur. 2020;1(1):1–12. doi:10.5815/ijcnis.2020.01.01.
  • Khaliligarekani M. Incentive Mechanisms for Managing and Controlling Cyber Risks: The Role of Cyber Insurance and Resource Pooling. USA: University of Michigan; 2020. https://deepblue.lib.umich.edu/bitstream/handle/2027.42/155236/khalili_1.pdf?sequence=1&isAllowed=y
  • Kalinich K, Foord-Kelcey L. Global Cyber Market Overview (AON): Uncovering the Hidden Opportunities. Chicargo, USA: AON Inpoint; 2017. https://www.aon.com.au/australia/insights/reports-and-whitepapers/2017/global-cyber-market-overview-inpoint-report.pdf.
  • Parrant M. Cyber Insurance Market Insights Q3 2018. Australia: AON; 2018 https://aoninsights.com.au/cyber-insurance-market-insights-q3-2018/.
  • Kreuzer M, von Dem Knesebeck A. MunichRE Global Cyber Risk and Insurance Survey 2022. Germany: Münchner Rückversicherungs-Gesellschaft; 2022.
  • Strupczewski G. Current State of the Cyber Insurance Market. 10th Economics & Finance Conference; 2018; Rome, Italy.
  • (ENISA), E.N.a.I.S.A., R. N, and R. Europe. Incentives and barriers of the cyber insurance market in Europe. Resilience and CIIP Program. Greece: European Network and Information Security Agency (ENISA); 2016.
  • Tøndel I, Seehusen F, Gjære EA, Moe ME. Differentiating cyber risk of insurance customers: the insurance company perspective. International Conference on Availability, Reliability, and Security; 2016; Salzburg, Austria. p. 175–90.
  • Dambra S, Bilge L, Balzarotti D. SoK: cyber insurance - technical challenges and a system security roadmap. In: IEEE Symposium on Security and Privacy (SP) San Francisco, CA, USA; 2020. p. 1367–83. doi:10.1109/SP40000.2020.00019.
  • Granato A, Polacek A. The growth and challenges of cyber insurance. In: Essays on issues. Chicago, USA: The Federal Reserve Bank of Chicago; 2019. p. 1–6.
  • Friedman S, Thomas A. Demystifying cyber insurance coverage. In: Demystifying cyber insurance coverage. USA: Deloitte Touche Tohmatsu Limited; 2017. p. 2-17.
  • Meland PH, Tøndel IA, Solhaug B. Mitigating risk with cyberinsurance. IEEE Secur Privacy. 2015;13(6):38–43. doi:10.1109/MSP.2015.137.
  • Sarkis-Onofre R, Catalá-López F, Aromataris E, Lockwood C. How to properly use the PRISMA statement. Syst Rev. 2021;10(1). doi:10.1186/s13643-021-01671-z.
  • Denyer D, Tranfield D. Chapter 39: Producing a systematic review. In: Buchanon D, Bryman A, editors. The SAGE handbook of organizational research methods. United Kingdom: SAGE Publishing; 2009. p. 671–89.
  • Crossan MM, Apaydin M. A multi-dimensional framework of organizational innovation: a systematic review of the literature. J Manage Stud. 2010;47(6):1154–91. doi:10.1111/j.1467-6486.2009.00880.x.
  • Ping W. The inter-rater reliability in scoring composition. Engl Lang Teach. 2009;2(3):39–43. doi:10.5539/elt.v2n3p39.
  • Orduña‑malea E, Costas R. Link-based approach to study scientific software usage: the case of VOSViewer. Scientometrics. 2021;126(9):8153–86. doi:10.1007/s11192-021-04082-y.
  • Eling M, Lehmann M. The impact of digitalization on the insurance value chain and the insurability of risks. Geneva Pap Risk Insur. 2017;43(3):359–96. doi:10.1057/s41288-017-0073-0.
  • Tøndel IA, Meland PH, Omerovic A, Gjære EA, Solhaug B. Using cyber insurance as a risk management strategy: knowledge gaps and recommendations for further research. Norway: SINTEF Digital; 2015.
  • Medeiros BP, Goldoni LRF. The fundamental conceptual trinity of cyberspace. Contexto Int. 2020;42(1):31–54. doi:10.1590/s0102-8529.2019420100002.
  • Eggenschwiler J. Accountability challenges confronting cyberspace governance. Internet Policy Rev. 2017;6(3). doi:10.14763/2017.3.712.
  • Eling M, Hendrick Wirfs J. Cyber risk: too big to insure? Risk transfer options for a mercurial risk class. Switzerland: University of St. Gallen; 2016. p. 1–174. 978-3-7297-2006-0.
  • Mareši NC. Information in cyberspace - actuality and challenges. Strategic Impact. 2020;76:76–88.
  • Defence, U.S.D.o. United States department of defence dictionary of military and associated terms. 2021. p. 360.
  • Gao C, Guo Q, Jiang D, Wang Z, Fang C, Hao M. Theoretical basis and technical methods of cyberspace geography. J Geogr Sci. 2019;29(12):1949–64. doi:10.1007/s11442-019-1698-7.
  • Lambach D. The territorialization of cyberspace. Inter Stud Rev. 2020;22(3):482–502. doi:10.1093/isr/viz022.
  • Clark D. Characterising cyberspace: past, present and future. USA: MIT CSAIL: MIT; 2010. p. 2016–28.
  • Bolpagni M. Cyber risk index: a socio-technical composite index for assessing risk of cyber attacks with negative outcome. Qual Quant. 2022;56(3):1643–59. doi:10.1007/s11135-021-01199-3.
  • Gandhi R, Sousan W, Laplante PA. Dimensions of cyber attacks: cultural, social, economic and political. IEEE Technol Soc Mag. 2011;2011(1):28–38. Spring doi:10.1109/MTS.2011.940293.
  • Bendovschi A. Cyber-attacks – trends, patterns and security countermeasures. 7th International Conference on Financial Criminology 2015; 2015; Oxford, United Kingdom. p. 24–31.
  • Aldasoro I, Gambacorta L, Giudici P, Leach T. The drivers of cyber risk. J Financ Stab. 2022;60:100989. doi:10.1016/j.jfs.2022.100989.
  • Singh A, Sharma VK, Chauhan S. 5th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud). A hybrid model for cyberspace security; 2021; Palladam, India. doi: 10.1109/I-SMAC52330.2021.9640951.
  • Kostyuk N, Wayne C. The microfoundations of state cybersecurity: cyber risk perceptions and the mass public. J Global Secur Stud. 2021;6(2). doi:10.1093/jogss/ogz077.
  • Craigen D, Diakun-Thibault N, Purse R. Defining cybersecurity. Technol Innovation Manage Rev. 2014;4(10):13–21. doi:10.22215/timreview/835.
  • Etschmaier MM. A purposeful systems design approach for cybersecurity. EPiC Ser Comput. 2019;63:90–100.
  • Etschmaier MM. Critical issues of cybersecurity: solutions beyond the technical. Inter J Comput Appl. 2019;26:140–53.
  • Pollini A, Callari TC, Tedeschi A, Ruscio D, Save L, Chiarugi F, Guerri D. Leveraging human factors in cybersecurity: an integrated methodological approach. Cognit Technol Work. 2022;24(2):371–90. doi:10.1007/s10111-021-00683-y.
  • Mouton F, Leenen L, Venter HS. Social engineering attack examples, templates and scenarios. Comput Secur. 2016;59:186–209. doi:10.1016/j.cose.2016.03.004.
  • Corradini I. Refining the approach to cybersecurity. In: Kacprzyk J, editor. Building a cybersecurity culture in organizations Switzerland: Springer Nature AG; 2020. p. 49–62. doi:10.1007/978-3-030-43999-6_3.
  • Gallegos-Segovia PL, Bravo-Torres JF, Larios-Rosillo VM, Vintimilla-Tapia PE, Yuquilima-Albarado IF, Jara-Saltos JD. Social engineering as an attack vector for ransomware. 2017 Chilean Conference on Electrical, Electronics Engineering, Information and Communication Technologies; 2017; Pucon, Chile.
  • Al-Darwish AI, Choe P. A framework of information security integrated with human factors. International Conference on Human-Computer Interaction; 2019; Orlando, USA. doi:10.1007/978-3-030-22351-9_15.
  • Wrede D, Stegen T, Graf von der Schulenburg JM. Affirmative and silent cyber coverage in traditional insurance policies: qualitative content analysis of selected insurance products from the German insurance market. Geneva Pap Risk Insur. 2020;45(4):657–89. doi:10.1057/s41288-020-00183-6.
  • Falco G, Eling M, Jablanski D, Weber M, Miller V, Gordon LA, Wang SS, Schmit J, Thomas R, Elvedi M, et al. Cyber risk research impeded by disciplinary Barriers. Science. 2019;366(6469):1066–69. doi:10.1126/science.aaz4795.
  • Merah Y, Kenaza T. Ontology-based cyber risk monitoring using cyber threat intelligence. The 16th International Conference on Availability, Reliability and Security (ARES 2021); 2021; Vienna, Austria. doi:10.1145/3465481.3470024.
  • Batra A. Cyber security management: creating governance, risk and compliance framework. J Software Eng. 2020;14(4):27–33. doi:10.26634/jse.14.4.17403.
  • Wheatley S, Hofmann A, Sornette D. Addressing insurance of data breach cyber risks in the catastrophe framework. Geneva Pap Risk Insur. 2020;46(1):53–78. doi:10.1057/s41288-020-00163-w.
  • Eling M, Wirfs J. What are tHe actual costs of cyber risk events? Eur J Oper Res. 2018;272(3):1109–19. doi:10.1016/j.ejor.2018.07.021.
  • Kovačević A, Putnik N, Tošković O. Factors related to cyber security behavior. IEEE Access. 2020;8:125140–48. doi:10.1109/ACCESS.2020.3007867.
  • Parsons K, McCormac A, Butavicius M, Pattinson M, Jerram C. Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Comput Secur. 2014;42:165–76. doi:10.1016/j.cose.2013.12.003.
  • Alqahtani MA. Factors affecting cybersecurity awareness among university students. Appl Sci. 2022;12(5):2589. doi:10.3390/app12052589.
  • Cox EB, Zhu Q, Balcetis E. Stuck on a phishing lure: differential use of base rates in self and social judgments of susceptibility to cyber risk. Compr Results Social Psychol. 2020;4(1):25–52. doi:10.1080/23743603.2020.1756240.
  • Rejeb A, Suhaiza Z, Rejeb K, Seuring S, Treiblmaier H. The internet of things and the circular economy: a systematic literature review and research agenda. J Clean Prod. 2022;350:131439. doi:10.1016/j.jclepro.2022.131439.
  • Pavel T, Gafni R. The invisible hole of cybersecurity insurance services. Online J Appl Knowl Manage (IIAKM). 2020;8(2):1–16. doi:10.36965/OJAKM.2020.8(2)1-16.
  • Grotto AJ, Makridis CA. Perception of digital risks: evidence from 54 countries. 2022.
  • Kesan JP, Majuca RP, Yurcik WJ. The evolution of cyberinsurance. In: National Center for Supercomputing Applications (NCSA) editor. Department of economics. Illinois (USA): University of Illinois at Urbana-Champaign; 2005. p. 1–16.
  • Khalili MM, Naghizadeh P, Mingyan L. Designing cyber insurance policies: the role of pre-screening and security interdependence. IEEE Trans Inf Forensics Secur. 2018;13(9):2226–39. doi:10.1109/TIFS.2018.2812205.
  • Dou W, Tang W, Wu X, Qi L, Xu X, Zhang X, Hu C. An insurance theory based optimal cyber insurance contract against moral hazard. Inf Sci. 2020;527:576–89. doi:10.1016/j.ins.2018.12.051.
  • Kjartan P, Gudmundsson S, Shetty S. Analysis of the impact of cyber events for cyber insurance. Geneva Pap Risk Insur. 2020;45(4):564–79. doi:10.1057/s41288-020-00171-w.
  • Liu Y, Sarabi A, Zhang J, Naghizadeh P, Karir M, Bailey M, Liu M. Cloudy with a chance of breach: forecasting cyber security incidents. In: 24th USENIX Security Symposium Washington (USA): USENIX The Advanced Computing Systems Association; 2015.
  • Allodi L, Massacci F. Security events and vulnerability data for cybersecurity risk estimation. Risk Anal. 2017;37(8):1606–27. doi:10.1111/risa.12864.
  • Mishina R, Tanimoto S, Goromaru H, Sato H, Kanai A. Risk management of silent cyber risks in consideration of emerging risks. In: 10th International Congress on Advanced Applied Informatics (IIAI-AAI). Niigata (Japan): Institute of Electrical and Electronics Engineers Inc.; 2021. doi:10.1109/IIAI-AAI53430.2021.00126.
  • Cain AA, Edwards ME, Still JD. An exploratory study of cyber hygiene behaviors and knowledge. J Inf Secur Appl. 2018;42:36–45. doi:10.1016/j.jisa.2018.08.002.
  • Papatsaroucha D, Nikoloudakis Y, Kefaloukos I, Pallis E, Markakis EK. A survey on human and personality vulnerability assessment in cybersecurity: challenges: approaches, and open issues. ACM Comput. Surv. 2021;1–39.
  • Dodel M, Mesch G. An integrated model for assessing cyber-safety behaviors: how cognitive, socioeconomic and digital determinants affect diverse safety practices. Comput Secur. 2019;86:75–91. doi:10.1016/j.cose.2019.05.023.
  • Kevelighan S, Lynch J, McGregor J, Pieffer D. Helping customer understand the value of cyber insurance. New York (USA): Insurance Information Institute (III); 2018.
  • Pal R, Golubchik L, Psounis K. Improving cyber security via profitable insurance markets. Perform Eval Rev. 2018;45(4):7–15. doi:10.1145/3273996.3273999.
  • Falk R, Brown AL. Underwritten or oversold? How cyber insurance can hinder (or help) cyber security in Australia. Australia: Cyber Security Cooperative Research Centre; 2021.
  • Toregas C, Zahn N. Insurance for cyber attacks: the issue of setting premiums in context. United States: The George Washington University; 2014. p. 1–20.
  • Sun N, Li C-T, Chan H, Islam MZ, Islam MR, Armstrong W. How do organizations seek cyber assurance? Investigations on the adoption of the common criteria and beyond. Comput Sci. 2022;10:71749–63. doi:10.1109/ACCESS.2022.3187211.
  • Analytics HI. 2021 Norton cyber security safety insights report global results. 2021.
  • Manap NA, Abdul Rahim A, Taji H. Cyberspace identity theft: an overview. Mediterr J Social Sci. 2015;6:290–99.
  • Acharya S, Mieth R, Konstantinou C, Karri R, Dvorkin Y. Cyber insurance against cyberattacks on electric vehicle charging stations. IEEE Trans Smart Grid. 2022;13(2):1529–41. doi:10.1109/TSG.2021.3133536.
  • Hodges D. Cyber-enabled burglary of smart homes. Comput Secur. 2021;110:102418. doi:10.1016/j.cose.2021.102418.
  • Parkinson S, Ward P, Wilson K, Miller J. Cyber threats facing autonomous and connected vehicles: future challenges. IEEE Trans Intell Transp Syst. 2017;18(11):2898–915. doi:10.1109/TITS.2017.2665968.
  • Flaco GEA. A research agenda for cyber risk and cyber insurance. In: The 2019 Workshop on the Economics of Information Security (WEIS). Boston (USA): Stanford Center for International Security and Cooperation; 2019. https://cisac.fsi.stanford.edu/publication/research-agenda-cyber-risk-and-cyber-insurance-0.
  • Khan A, Krishnan S, Dhir A. Electronic government and corruption: systematic literature review, framework and agenda for future research. Technol Forecasting Social Change. 2021;167:120737. doi:10.1016/j.techfore.2021.120737.
  • Guckenbiehl P, Corral de Zubielqui G, Lindsay N. Knowledge and innovation in start-up ventures: a systematic literature review and research agenda. Technol Forecasting Social Change. 2021;172:121026. doi:10.1016/j.techfore.2021.121026.
  • Bandyopadhyay T, Mookerjee VS, Rao RC. Why IT managers don’t go for cyber insurance products. Commun ACM. 2009;52(11):68–73. doi:10.1145/1592761.1592780.
  • Organisation for Economic Co-Operation. Enhancing the role of insurance in cyber risk management. Paris (France): Organisation for Economic Co-Operation, Development (OECD) Publishing; 2017. Report Number: 978-92-64-28214-8. doi:10.1787/9789264282148-en.
  • Waters M. The current state of cyber insurance as a risk transference option. Nashville (USA): Lipscomb University; 2015.
  • Nieuwesteeg B, Visscher L, de Waard B. The law and economics of cyber insurance contracts: a case study. Eur Rev Private Law. 2021;26(3):371–420. doi:10.54648/ERPL2018027.
  • Bohme R, Schwartz G. Modeling cyber-insurance: towards a unifying framework. In: Workshop on the Economics of Information Security (WEIS). USA: Harvard; 2010.
  • Bahsi H, Franke U, Langfeldt Friberg E. The cyber insurance market in norway. Inf Comput Secur. 2019;28(1):54–67. doi:10.1108/ICS-01-2019-0012.
  • Eling M, Schnell W. What do we know about cyber risk and cyber risk insurance? J Risk Finance. 2016;17(5):474–91. doi:10.1108/JRF-09-2016-0122.