메뉴 건너뛰기




Volumn 5, Issue 3, 2007, Pages 50-56

Cyberinsurance in IT security management

Author keywords

[No Author keywords available]

Indexed keywords

CYBERINSURANCE; INFORMATION SECURITY BREACHES; SECURITY MANAGEMENT; VIRUS ATTACKS;

EID: 34250009730     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.57     Document Type: Article
Times cited : (61)

References (20)
  • 1
    • 32644486255 scopus 로고    scopus 로고
    • Computer Security: It's the Economics, Stupid
    • WEIS
    • B. Schneier, "Computer Security: It's the Economics, Stupid," Workshop on the Economics of Information Security (WEIS), 2002; www2.sims.berkeley.edu/resources/affiliates/workshops/econsecurity/econws/18. doc.
    • (2002) Workshop on the Economics of Information Security
    • Schneier, B.1
  • 3
    • 34249994635 scopus 로고    scopus 로고
    • Univ. of Ill. Law and Economics working paper no. 2, July
    • J. Kesan et al., "The Economic Case for Cyberinsurance," Univ. of Ill. Law and Economics working paper no. 2, July 2004; http://law.bepress. com/uiuclwps/papers/art2/.
    • (2004) The Economic Case for Cyberinsurance
    • Kesan, J.1
  • 4
    • 84900406382 scopus 로고    scopus 로고
    • Cyber-Insurance as a Market-Based Solution to the Problem of Cybersecurity
    • WEIS
    • J. Kesan et al., "Cyber-Insurance as a Market-Based Solution to the Problem of Cybersecurity," Workshop on the Economics of Information Security (WEIS), 2005; http://infosecon.net/workshop/pdf/42.pdf.
    • (2005) Workshop on the Economics of Information Security
    • Kesan, J.1
  • 5
    • 34249987969 scopus 로고    scopus 로고
    • D. Duffy, Safety at a Premium, CSO, Dec. 2002; www. csoonline.com/read/120902/safety.html.
    • D. Duffy, "Safety at a Premium," CSO, Dec. 2002; www. csoonline.com/read/120902/safety.html.
  • 6
    • 34249996018 scopus 로고    scopus 로고
    • CyberRisk Market Survey 2006
    • June
    • R.S. Betterley, "CyberRisk Market Survey 2006," The Betterley Report, June 2006; www.betterley.com/products.html.
    • (2006) The Betterley Report
    • Betterley, R.S.1
  • 8
    • 33847149105 scopus 로고    scopus 로고
    • Ernst & Young, Nov
    • Global Information Security Survey 2005, Ernst & Young, Nov. 2005; www.ey.com/global/download.nsf/Inter national/ Global_Information_Security_Survey_2005/ $file/ EY_Global_Information_Security_survey_2005.pdf.
    • (2005) Global Information Security Survey 2005
  • 9
    • 34249993829 scopus 로고    scopus 로고
    • R.P. Majuca, W. Yurcik, and J.P. Kesan, The Evolution of Cyberinsurance, ACM Computing Research Repository (CoRR), tech. report cs.CR/0601020, Jan. 2006; www.projects.ncassr.org/econsec/ cyberinsuranceTR06.pdf.
    • R.P. Majuca, W. Yurcik, and J.P. Kesan, "The Evolution of Cyberinsurance," ACM Computing Research Repository (CoRR), tech. report cs.CR/0601020, Jan. 2006; www.projects.ncassr.org/econsec/ cyberinsuranceTR06.pdf.
  • 10
    • 34249999217 scopus 로고    scopus 로고
    • Cyber Insecurity: The Cost of Monopoly, Computer and Comm
    • D. Geer, Cyber Insecurity: The Cost of Monopoly, Computer and Comm. Industry Assoc., 2003; www.ccianet.org/papers/cyberinsecurity.pdf.
    • (2003) Industry Assoc
    • Geer, D.1
  • 12
    • 0010275259 scopus 로고    scopus 로고
    • Interdependent Security: The Case of Identical Agents
    • working paper no. 8871, Nat'l Bureau of Economic Research
    • H. Kunreuther and G. Heal, "Interdependent Security: The Case of Identical Agents," working paper no. 8871, Nat'l Bureau of Economic Research, 2002.
    • (2002)
    • Kunreuther, H.1    Heal, G.2
  • 16
    • 34249977072 scopus 로고    scopus 로고
    • The World Catastrophe Reinsurance Market
    • Aug
    • G. Carpenter, "The World Catastrophe Reinsurance Market," Guy Carpenter & Co., Aug. 2006; www.guycarp.com/portal/extranet/insights/ reports.html?vid=22.
    • (2006) Guy Carpenter & Co
    • Carpenter, G.1
  • 17
    • 34249988548 scopus 로고    scopus 로고
    • Cyber Insurance Update
    • Dec
    • H. Oellrich, "Cyber Insurance Update," The CIP Report, Dec. 2003; http://cipp.gmu.edu/archive/cip_report_2.6.
    • (2003) The CIP Report
    • Oellrich, H.1
  • 18
    • 34249995479 scopus 로고    scopus 로고
    • US Dept. of Homeland Security, The Nat'l Strategy to Secure Cyberspace, Feb. 2003; www.whitehouse.gov/pcipb/cyberspace_srtategy.pdf.
    • US Dept. of Homeland Security, The Nat'l Strategy to Secure Cyberspace, Feb. 2003; www.whitehouse.gov/pcipb/cyberspace_srtategy.pdf.
  • 19
    • 34250029000 scopus 로고    scopus 로고
    • Liability for Net Vandalism Should Rest with Those That Can Best Manage the Risk,
    • 1 June, section C, p
    • H.R. Varian, "Liability for Net Vandalism Should Rest with Those That Can Best Manage the Risk," The New York Times, 1 June 2000, section C, p. 2; www.ischool.berkeley.edu/~hal/people/hal/NYTimes/2000-06-01. html.
    • (2000) The New York Times , pp. 2
    • Varian, H.R.1
  • 20
    • 34250006261 scopus 로고    scopus 로고
    • Should Vulnerability Be Actionable? Improving Critical Infrastructure Computer Security with Trade Practices Law
    • J. Winn, "Should Vulnerability Be Actionable? Improving Critical Infrastructure Computer Security with Trade Practices Law," George Mason Univ. Critical Infrastructure Protection Project Papers Vol. II, 2004; www.law.washington.edu/Faculty/Winn/Publications/Should_Vukierability.pdf.
    • (2004) George Mason Univ. Critical Infrastructure Protection Project Papers , vol.2
    • Winn, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.