Cyber insurance: state of the art, trends and future directions

A Tsohou, V Diamantopoulou, S Gritzalis… - International Journal of …, 2023 - Springer
Society has become increasingly dependent on IT infrastructure and services. Additionally,
the pandemic of COVID-19 forced the transition of the traditional way of working (ie, physical …

Cyberspace and personal cyber insurance: a systematic review

R McGregor, C Reaiche, S Boyle… - Journal of Computer …, 2024 - Taylor & Francis
As individuals become increasingly digitally dependent, cyber threats and cyber insurance
to mitigate them gain relevance. This literature review conceptualizes a framework for siting …

SoK: Quantifying cyber risk

DW Woods, R Böhme - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
This paper introduces a causal model inspired by structural equation modeling that explains
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …

Applications and services using vehicular exteroceptive sensors: A survey

FM Ortiz, M Sammarco, LHMK Costa… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Modern vehicles are equipped with a myriad of sensors. Proprioceptive sensors monitor the
vehicle status and operation, whereas exteroceptive ones sense the external environment …

Lessons lost: Incident response in the age of cyber insurance and breach attorneys

DW Woods, R Böhme, J Wolff, D Schwarcz - 32nd USENIX Security …, 2023 - usenix.org
Incident Response (IR) allows victim firms to detect, contain, and recover from security
incidents. It should also help the wider community avoid similar attacks in the future. In …

The data that drives cyber insurance: A study into the underwriting and claims processes

JRC Nurse, L Axon, A Erola, I Agrafiotis… - … conference on cyber …, 2020 - ieeexplore.ieee.org
Cyber insurance is a key component in risk management, intended to transfer risks and
support business recovery in the event of a cyber incident. As cyber insurance is still a new …

Do i really need all this work to find vulnerabilities? an empirical case study comparing vulnerability detection techniques on a java application

S Elder, N Zahan, R Shu, M Metro, V Kozarev… - Empirical Software …, 2022 - Springer
Context: Applying vulnerability detection techniques is one of many tasks using the limited
resources of a software project. Objective: The goal of this research is to assist managers …

Optimisation of cyber insurance coverage with selection of cost effective security controls.

G Uuganbayar, A Yautsiukhin, F Martinelli… - Computers & …, 2021 - Elsevier
Nowadays, cyber threats are considered among the most dangerous risks by top
management of enterprises. One way to deal with these risks is to insure them, but cyber …

Ts-perf: General performance measurement of trusted execution environment and rich execution environment on intel sgx, arm trustzone, and risc-v keystone

K Suzaki, K Nakajima, T Oi, A Tsukamoto - IEEE Access, 2021 - ieeexplore.ieee.org
A trusted execution environment (TEE) is a new hardware security feature that is isolated
from a normal OS (ie, rich execution environment (REE)). The TEE enables us to run a …

How cyber insurance shapes incident response: A mixed methods study

DW Woods, R Böhme - The 20th Annual Workshop on the …, 2021 - research.ed.ac.uk
Cyber insurance policies commonly indemnify the cost of incident response services. This
creates a multi-layered economic problem in that the policyholder hiring external firms incurs …