2,335
Views
43
CrossRef citations to date
0
Altmetric
Feature Articles

Cybersecurity Insurance: Modeling and Pricing

& ORCID Icon

References

  • Barrat, A., M. Barthlemy, and A. Vespignani. 2008. Dynamical processes on complex networks. Cambridge: Cambridge University Press.
  • Betterley., R. S. 2016. Cyber / privacy insurance market survey: A tough market for larger insureds, but smaller insureds finding eager insurers. Betterley Report, June.
  • Böhme, R., and G. Kataria. 2006. “Models and measures for correlation in cyber-insurance.” In Fifth workshop on the economics of information security. University of Cambridge, England.
  • Böhme, R., and G. Schwartz. 2010. “Modeling cyber-insurance: Towards a unifying framework.” In Nineth workshop on the economics of information security. Harvard University, USA.
  • Cator, E., R. Bovenkamp, and P. V. Mieghem. 2013. Susceptible-infected-susceptible epidemics on networks with general infection and cure times. Physical Review E 87(6):062816.
  • Cator, E., and P. V. Mieghem. 2014. Nodal infection in markovian susceptible-infected-susceptible and susceptible-infected-removed epidemics on networks are non-negatively correlated. Physical Review E 89(5):052802.
  • Chapanond, A., M. S. Krishnamoorthy, and B. Yener. 2005. Graph theoretic and spectral analysis of Enron email data. Computational & Mathematical Organization Theory 11: 265–281.
  • Coddington, E. A. 2012. An introduction to ordinary differential equations. Indianapolis: Courier Corporation.
  • Department of Homeland Security (DHS). Cybersecurity insurance. www.dhs.gov/publication/cybersecurity-insurance.
  • Doerr, C., N. Blenn, and P. V. Mieghem. 2013. Lognormal infection times of online information spread. PloS ONE 8(5):e64349.
  • Eling, M., and W. Schnell. 2016. What do we know about cyber risk and cyber risk insurance? Journal of Risk Finance 17: 474–491.
  • Gordon, L. A., M. P. Loeb, and T. Sohail. 2003. A framework for using insurance for cyber-risk management. Communications of the ACM 46: 81–85.
  • Herath, V. S. B., and T. C. Herath. 2011. Copula-based actuarial model for pricing cyber-insurance policies. Insurance Markets and Companies: Analyses and Actuarial Computations 2: 7–20.
  • Joe, H. 2014. Dependence modeling with copulas. CRC Press. Boca Raton, FL.
  • Karlin., S. 2014. A first course in stochastic processes. New Pork: Academic Press.
  • Kosub, T. 2015. Components and challenges of integrated cyber risk management. Zeitschrift für die gesamte Versicherungswissenschaft 104: 615–634.
  • Martens, M., H. Asghari, H., M. Eeten, and P. V. Mieghem. 2016. A time-dependent SIS-model for long-term computer worm evolution. In IEEE Conference on Communications and network security (CNS), 207–215.
  • Mieghem, P. V. 2014. Performance analysis of complex networks and systems. Cambridge: Cambridge University Press.
  • Mieghem, P. V., and R. V. Bovenkamp. 2013. Non-Markovian infection spread dramatically alters the susceptible-infected-susceptible epidemic threshold in networks. Physical Review Letters 110(10):108701-1–108701-5.
  • Mieghem, P. V., and E. Cator. 2012. Epidemics in networks with nodal self-infection and the epidemic threshold. Physical Review E 86(1):016116-1–016116-10.
  • Mukhopadhyay, A., S. Chatterjee, D. Saha, A. Mahanti, and S.K. Sadhukhan. 2006. e-risk management with insurance: A framework using copula aided bayesian belief networks. In Proceedings of the 39th annual Hawaii international conference on system sciences (HICSS’06), 6, 126.
  • Nelsen, R. B. 2013. An introduction to copulas, vol. 139. New York: Springer Science & Business Media (New York: IEEE).
  • Pastor-Satorras, R., C. Castellano, P. V. Mieghem, and A. Vespignani. 2015. Epidemic processes in complex networks. Reviews of Modern Physics 87: 925–979.
  • Peng, C., M. Xu, S. Xu, and T. Hu. 2017. Modeling multivariate cybersecurity risks. Journal of Applied Statistics 14: 2534–2563.
  • Pratt, J. W. 1992. Risk aversion in the small and in the large. In Foundations of insurance economics, ed. P. Diamond and M. Rothschild, 83–98. Springer.
  • Ross, S. 1996. Stochastic processes. New York: Wiley and Sons.
  • Schwartz, G. A. and S. S. Sastry. 2014. Cyber-insurance framework for large scale interdependent networks. In Proceedings of the 3rd international conference on high confidence networked systems, 145–154.
  • Sklar, A. 1959. Fonctions de répartition à n dimensions et leurs marges. Publications de l’Institut de statistique de l’Université de Paris 8: 229–231.
  • Xu, M., G. Da, and S. Xu. 2015. Cyber epidemic models with dependences. Internet Mathematics 11: 62–92.
  • Xu, M., and S. Xu. 2012. An extended stochastic model for quantitative security analysis of networked systems. Internet Mathematics 8: 288–320.
  • Yang, Z., and J. Lui. 2014. Security adoption and influence of cyber-insurance markets in heterogeneous networks. Performance Evaluation 74: 1–17.
  • Zhang, C., S. Zhou, and B. M. Chain. 2015. Hybrid epidemics: A case study on computer worm Conficker. PloS ONE 10(5): e0127478.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.