Cyber-insurance survey

A Marotta, F Martinelli, S Nanni, A Orlando… - Computer Science …, 2017 - Elsevier
Cyber insurance is a rapidly developing area which draws more and more attention of
practitioners and researchers. Insurance, an alternative way to deal with residual risks, was …

[PDF][PDF] Modeling cyber-insurance: towards a unifying framework.

R Böhme, G Schwartz - WEIS, 2010 - infosecon.net
We propose a comprehensive formal framework to classify all market models of cyber-
insurance we are aware of. The framework features a common terminology and deals with …

Inter-organisational information security: A systematic literature review

F Karlsson, E Kolkowska, F Prenkert - Information & Computer …, 2016 - emerald.com
Purpose The purpose of this paper is to survey existing inter-organisational information
security research to scrutinise the kind of knowledge that is currently available and the way …

A coalitional cyber-insurance framework for a common platform

I Vakilinia, S Sengupta - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Despite the benefits of cyber-insurance, organizations are reluctant to enroll in such policies
mainly because of their limitation and high price. On the other hand, insurers are confronting …

Risk-based confidentiality requirements specification for outsourced it systems

A Morali, R Wieringa - 2010 18th IEEE International …, 2010 - ieeexplore.ieee.org
Today, companies are required to be in control of their IT assets, and to provide proof of this
in the form of independent IT audit reports. However, many companies have outsourced …

Effect of information technology outsourcing on the performance of banks in Kenya: Application of the balanced scorecard

VW Mungai - 2015 - erepository.uonbi.ac.ke
Purpose: The study sought to look at Information Technology Outsourcing (ITO) practices in
the Kenyan banking sector and the effect it had on performance. Balance Scorecard was …

Modeling privacy insurance contracts and their utilization in risk management for ICT firms

AN Yannacopoulos, C Lambrinoudakis… - … Security-ESORICS 2008 …, 2008 - Springer
The rapid expansion of Internet based services has created opportunities for ICT firms to
collect and use, in an unauthorized way, information about individuals (eg customers …

A roadmap towards improving managed security services from a privacy perspective

N Ulltveit-Moe - Ethics and information technology, 2014 - Springer
This paper proposes a roadmap for how privacy leakages from outsourced managed
security services using intrusion detection systems can be controlled. The paper first …

Valuing data security and privacy using cyber insurance

A Shah, S Dahake - ACM SIGCAS Computers and Society, 2015 - dl.acm.org
What should be the minimum value of data security or privacy to a customer? We reason that
at a minimum this value should be equal to the premium charged by an insurer for cyber …

Measuring privacy leakage for IDS rules

N Ulltveit-Moe, V Oleshchuk - arXiv preprint arXiv:1308.5421, 2013 - arxiv.org
This paper proposes a measurement approach for estimating the privacy leakage from
Intrusion Detection System (IDS) alarms. Quantitative information flow analysis is used to …