Cyber Insurance Premium Setting for Multi-Site Companies under Risk Correlation
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Rob Kaas & Marc Goovaerts & Jan Dhaene & Michel Denuit, 2008. "Modern Actuarial Risk Theory," Springer Books, Springer, edition 2, number 978-3-540-70998-5, April.
- Aven, Terje, 2010. "On how to define, understand and describe risk," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 623-631.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Da, Gaofeng & Xu, Maochao & Zhao, Peng, 2021. "Multivariate dependence among cyber risks based on L-hop propagation," Insurance: Mathematics and Economics, Elsevier, vol. 101(PB), pages 525-546.
- Nagurney, Anna & Shukla, Shivani, 2017. "Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability," European Journal of Operational Research, Elsevier, vol. 260(2), pages 588-600.
- Lu Xu & Yanhui Li & Jing Fu, 2019. "Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization," Mathematics, MDPI, vol. 7(7), pages 1-20, July.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Da, Gaofeng & Xu, Maochao & Zhao, Peng, 2021. "Multivariate dependence among cyber risks based on L-hop propagation," Insurance: Mathematics and Economics, Elsevier, vol. 101(PB), pages 525-546.
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
- Na Ren & Xin Zhang, 2024. "A novel k-generation propagation model for cyber risk and its application to cyber insurance," Papers 2408.14151, arXiv.org.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Kaur, Harpreet & Gupta, Mahima & Singh, Surya Prakash, 2024. "Integrated model to optimize supplier selection and investments for cyber resilience in digital supply chains," International Journal of Production Economics, Elsevier, vol. 275(C).
- Kume, Alfred & Hashorva, Enkelejd, 2012. "Calculation of Bayes premium for conditional elliptical risks," Insurance: Mathematics and Economics, Elsevier, vol. 51(3), pages 632-635.
- Castañer, A. & Claramunt, M.M. & Lefèvre, C., 2013. "Survival probabilities in bivariate risk models, with application to reinsurance," Insurance: Mathematics and Economics, Elsevier, vol. 53(3), pages 632-642.
- Hoy, Michael & Polborn, Mattias K., 2015.
"The value of technology improvements in games with externalities: A fresh look at offsetting behavior,"
Journal of Public Economics, Elsevier, vol. 131(C), pages 12-20.
- Michael Hoy & Mattias Polborn, 2014. "The Value of Technology Improvements in Games with Externalities: A Fresh Look at Offsetting Behavior," CESifo Working Paper Series 4798, CESifo.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
- Mohamed Amine Lkabous & Jean-François Renaud, 2018. "A VaR-Type Risk Measure Derived from Cumulative Parisian Ruin for the Classical Risk Model," Risks, MDPI, vol. 6(3), pages 1-11, August.
- Suyuan Luo & Tsan‐Ming Choi, 2022. "E‐commerce supply chains with considerations of cyber‐security: Should governments play a role?," Production and Operations Management, Production and Operations Management Society, vol. 31(5), pages 2107-2126, May.
- Geoffrey Heal & Howard Kunreuther, 2010. "Environment and Energy: Catastrophic Liabilities from Nuclear Power Plants," NBER Chapters, in: Measuring and Managing Federal Financial Risk, pages 235-257, National Bureau of Economic Research, Inc.
- Liying Mu & Milind Dawande & Xianjun Geng & Vijay Mookerjee, 2016. "Milking the Quality Test: Improving the Milk Supply Chain Under Competing Collection Intermediaries," Management Science, INFORMS, vol. 62(5), pages 1259-1277, May.
- Julien Trufin & Stéphane Loisel, 2013. "Ultimate ruin probability in discrete time with Bühlmann credibility premium adjustments," Post-Print hal-00426790, HAL.
- Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
- Yuanying Guan & Zhanyi Jiao & Ruodu Wang, 2022. "A reverse ES (CVaR) optimization formula," Papers 2203.02599, arXiv.org, revised May 2023.
- Konrad, Kai A. & Morath, Florian, 2023.
"How to preempt attacks in multi-front conflict with limited resources,"
European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
- Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
- Muhammad Mudassar Yamin & Mohib Ullah & Habib Ullah & Basel Katt & Mohammad Hijji & Khan Muhammad, 2022. "Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security," Mathematics, MDPI, vol. 10(12), pages 1-25, June.
- Terje Aven & Ortwin Renn, 2015. "An Evaluation of the Treatment of Risk and Uncertainties in the IPCC Reports on Climate Change," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 701-712, April.
More about this item
Keywords
cyber insurance; premium; risk management; risk correlation;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jrisks:v:11:y:2023:i:10:p:167-:d:1245787. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.