Publikace UTB
Repozitář publikační činnosti UTB

Designing model for calculating the amount of cyber risk insurance

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Designing model for calculating the amount of cyber risk insurance en
dc.contributor.author Piromsopa, Krerk
dc.contributor.author Klíma, Tomáš
dc.contributor.author Pavlík, Lukáš
dc.relation.ispartof Proceedings - 2017 4th International Conference on Mathematics and Computers in Sciences and in Industry, MCSI 2017
dc.identifier.isbn 978-1-5386-2820-1
dc.date.issued 2018
utb.relation.volume 2018-January
dc.citation.spage 196
dc.citation.epage 200
dc.event.title 4th International Conference on Mathematics and Computers in Sciences and in Industry, MCSI 2017
dc.event.location Corfu Island
utb.event.state-en Greece
utb.event.state-cs Řecko
dc.event.sdate 2017-08-24
dc.event.edate 2017-08-27
dc.type conferenceObject
dc.language.iso en
dc.publisher Institute of Electrical and Electronics Engineers Inc.
dc.identifier.doi 10.1109/MCSI.2017.41
dc.relation.uri https://ieeexplore.ieee.org/document/8326840/
dc.subject security en
dc.subject insurance en
dc.subject risk management en
dc.subject information system en
dc.subject cyber risk en
dc.description.abstract In the last few years, rising sophistication and impact of cyberattacks has led companies to reassessment of their approach to risk management. Many of them admitted that they are not able to successfully prevent these attacks and they tried to find other ways to mitigate the risk. One of the possible solutions can be a cybersecurity insurance that enables companies to transfer the risk connected with a security breach to an insurance company. Basic problem is then how the cost of insurance should be calculated and how to assess the level of client's IT security controls and related risk. Unlike traditional insurance that derives the premium from target value and statistical models, the cyber insurance should take into account other factors. In this article, authors propose scoring model for cyber insurance that is based on the results of internal and external audits and compliance with mandatory and voluntary standards. © 2017 IEEE. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1008156
utb.identifier.obdid 43877650
utb.identifier.scopus 2-s2.0-85050336797
utb.identifier.wok 000452189900035
utb.source d-scopus
dc.date.accessioned 2018-08-29T08:26:57Z
dc.date.available 2018-08-29T08:26:57Z
dc.description.sponsorship TBU IGA project: Design methodology for determination of prices also of the information system organization in terms of cyber risks [IGA/FAI/2017/008]
utb.contributor.internalauthor Pavlík, Lukáš
utb.fulltext.affiliation Krerk Piromsopa Department of Computer Engineering Chulalongkorn University Bangkok, Thailand krerk@cp.eng.chula.ac.th Tomas Klima Department of System Analysis University of Economics Prague, Czech republic the.book@seznam.cz Lukas Pavlik Department of Safety Engineering Tomas Bata University in Zlin Zlin, Czech republic lpavlik@fai.utb.cz
utb.fulltext.dates -
utb.fulltext.references [1] Check Point. Check Point 2013 security report. Israel, 2013. [2] Verizon. 2013 Data breach investigations report. New York, 2013. [3] Verizon. 2015 Data breach investigations report. New York, 2015. [4] Naghizadeh, P.; Mingyan Liu, "Closing the price of anarchy gap in the interdependent security game," Information Theory and Applications Workshop (ITA), 2014, vol., no., pp.1,8, 9-14 Feb. 2014 [5] Johnson, B.; Laszka, A.; Grossklags, J., "The Complexity of Estimating Systematic Risk in Networks," Computer Security Foundations Symposium (CSF), 2014 IEEE 27th, vol., no., pp.325, 336, 19-22 July 2014 [6] Pal, R.; Golubchik, L.; Psounis, K.; Pan Hui, "On a way to improve cyber-insurer profits when a security vendor becomes the cyber-insurer," IFIP Networking Conference, 2013, vol., no., pp.1,9, 22-24 May 2013 [7] Schwartz, G.; Shetty, N.; Walrand, J., "Why cyber-insurance contracts fail to reflect cyber-risks,", 2013 51st Annual Allerton Conference on Communication, Control, and Computing, vol., no., pp.781,787, 2-4 Oct. 2013 [8] Sadhukhan, S.K., "Insuring Big Losses Due to Security Breaches through Insurance: A Business Model," System Sciences, 2007. 40th Annual Hawaii International Conference on System Sciences (HICSS'07), vol., no., pp.158a,158a, Jan. 2007 [9] Pandey, P.; Snekkenes, E.A., "Applicability of Prediction Markets in Information Security Risk Management", 2014 25th International Workshop on Database and Expert Systems Applications (DEXA), vol., no., pp.296,300, 1-5 Sept. 2014
utb.fulltext.sponsorship This paper was supported by the TBU IGA project: Design methodology for determination of prices also of the information system organization in terms of cyber risks, registred under IGA/FAI/2017/008.
utb.wos.affiliation [Piromsopa, Krerk] Chulalongkorn Univ, Dept Comp Engn, Bangkok, Thailand; [Klima, Tomas] Univ Econ, Dept Syst Anal, Prague, Czech Republic; [Pavlik, Lukas] Tomas Bata Univ Zlin, Dept Safety Engn, Zlin, Czech Republic
utb.scopus.affiliation Department of Computer Engineering, Chulalongkorn University, Bangkok, Thailand; Department of System Analysis, University of Economics, Prague, Czech Republic; Department of Safety Engineering, Tomas Bata University in Zlin, Zlin, Czech Republic
utb.fulltext.projects IGA/FAI/2017/008
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam