메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Managing interdependent information security risks: A study of cyber insurance, managed security service and risk pooling

Author keywords

Cyberinsurance; Economics of information systems; Information security; Managed security service; Risk management; Risk pooling

Indexed keywords

CYBERINSURANCE; ECONOMICS OF INFORMATION; MANAGED SECURITY; MONOPOLY MARKETS; NEGATIVE EXTERNALITIES; NETWORK EXTERNALITY; RISK POOLING; SECURITY INVESTMENTS;

EID: 84870958312     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (45)
  • 2
    • 33750440197 scopus 로고    scopus 로고
    • The Economics of Information Security
    • Anderson R., Moore, T. The Economics of Information Security. Science (314), 2006, pp. 610-613.
    • (2006) Science , vol.314 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 4
    • 0040679785 scopus 로고    scopus 로고
    • Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack
    • Ayres, I. and Levitt, S. Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack, The Quarterly Journal of Economics (113:1), 1998, pp. 43-77.
    • (1998) The Quarterly Journal of Economics , vol.113 , Issue.1 , pp. 43-77
    • Ayres, I.1    Levitt, S.2
  • 6
    • 18944385964 scopus 로고    scopus 로고
    • The Value of Intrusion Detection Systems in Information Technology Security Architecture
    • Cavusoglu, H., Mishra, B., Raghunathan, S. The Value of Intrusion Detection Systems in Information Technology Security Architecture, Information Systems Research (16:1), 2005, pp. 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 7
    • 0033363329 scopus 로고    scopus 로고
    • Organizational Form and Efficiency: The Coexistence of Stock and Mutual Property-Liability Insurers
    • Cummins, J. D., Weiss, M. A. Organizational Form and Efficiency: The Coexistence of Stock and Mutual Property-Liability Insurers, Management Science (45:9), 1999, pp.1254-1270.
    • (1999) Management Science , vol.45 , Issue.9 , pp. 1254-1270
    • Cummins, J.D.1    Weiss, M.A.2
  • 9
    • 84870969872 scopus 로고    scopus 로고
    • Economics of Internet Security Outsourcing: Simulation Results Based on the Schneier Model
    • The Workshop on the Economics of Securing the Information Infrastructure (WESII), Washington D.C., October 23-24, 2006
    • Ding, W., Yurcik, W. Economics of Internet Security Outsourcing: Simulation Results Based on the Schneier Model," The Workshop on the Economics of Securing the Information Infrastructure (WESII), Washington D.C., October 23-24, 2006.
    • Ding, W.1    Yurcik, W.2
  • 11
    • 21144466432 scopus 로고
    • Insurance with Undiversifiable Risk: Contract Structure and Organizational Form of Insurance Firms
    • Doherty, N. A., Dionne, G. Insurance with Undiversifiable Risk: Contract Structure and Organizational Form of Insurance Firms, Journal of Risk and Uncertainty (6), 1993, pp.187-203.
    • (1993) Journal of Risk and Uncertainty , vol.6 , pp. 187-203
    • Doherty, N.A.1    Dionne, G.2
  • 12
    • 30344462995 scopus 로고    scopus 로고
    • The Economic Incentives for Sharing Security Information
    • Gal-Or, E., Ghose, A. The Economic Incentives for Sharing Security Information, Information Systems Research (16:2), 2005, pp. 186-208
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 13
    • 0036602405 scopus 로고    scopus 로고
    • Privacy Protection of Binary Confidential Data against Deterministic, Stochastic, and Insider Threat
    • Garfinkel, R., Gopal, R., Goes, P. Privacy Protection of Binary Confidential Data against Deterministic, Stochastic, and Insider Threat, Management Science (48:6), 2002, pp.749-764.
    • (2002) Management Science , vol.48 , Issue.6 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.2    Goes, P.3
  • 14
    • 0005766289 scopus 로고    scopus 로고
    • Morality and Computers: Attitudes and Differences in Moral Judgments
    • Gattiker, U. E., Kelley, H. Morality and Computers: Attitudes and Differences in Moral Judgments, Information Systems Research (10:3), 1999, pp. 233-255.
    • (1999) Information Systems Research , vol.10 , Issue.3 , pp. 233-255
    • Gattiker, U.E.1    Kelley, H.2
  • 17
    • 33745210521 scopus 로고    scopus 로고
    • Budgeting Process for Information Security Expenditure
    • Gordon, L. A., Loeb, M. P. Budgeting Process for Information Security Expenditure, Communications of the ACM (49:1), 2006, pp. 121-125
    • (2006) Communications of the ACM , vol.49 , Issue.1 , pp. 121-125
    • Gordon, L.A.1    Loeb, M.P.2
  • 18
    • 4243121902 scopus 로고    scopus 로고
    • A Framework for Using Insurance for Cyber-risk Management
    • Gordon, L. A., Loeb, M. P., Sohail, T. A Framework for Using Insurance for Cyber-risk Management, Communication of ACM (46:3), 2003, pp. 81-85
    • (2003) Communication of ACM , vol.46 , Issue.3 , pp. 81-85
    • Gordon, L.A.1    Loeb, M.P.2    Sohail, T.3
  • 19
    • 0344899914 scopus 로고    scopus 로고
    • Sharing Information on Computer System Security: An Economic Analysis
    • Gordon, L. A., Lucyshyn, W. Sharing Information on Computer System Security: An Economic Analysis, Journal of Accounting and Public Policy (22), 2003, pp. 461-485
    • (2003) Journal of Accounting and Public Policy , vol.22 , pp. 461-485
    • Gordon, L.A.1    Lucyshyn, W.2
  • 21
    • 0000139690 scopus 로고
    • Moral Hazard in Teams
    • Holmstrom, B. Moral Hazard in Teams, Bell Journal of Economics (13:2), 1982, pp. 324-340.
    • (1982) Bell Journal of Economics , vol.13 , Issue.2 , pp. 324-340
    • Holmstrom, B.1
  • 22
    • 84870043039 scopus 로고    scopus 로고
    • Infonetics Research, Infornetics Report
    • Infonetics Research. Security and Encrypted VPN Services. Infornetics Report, 2008.
    • (2008) Security and Encrypted VPN Services
  • 23
    • 20944441343 scopus 로고    scopus 로고
    • Market for Software Vulnerabilities? Think Again
    • Kannan, K., Telang, R. Market for Software Vulnerabilities? Think Again, Management Science (51:5), 2005, pp. 726-740.
    • (2005) Management Science , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 26
    • 0039145725 scopus 로고    scopus 로고
    • Moral Hazard in Risk Pooling Arrangements
    • Lee, W., Ligon, J. A. Moral Hazard in Risk Pooling Arrangements, Journal of Risk and Insurance (68:1), 2001, pp. 175-190.
    • (2001) Journal of Risk and Insurance , vol.68 , Issue.1 , pp. 175-190
    • Lee, W.1    Ligon, J.A.2
  • 27
    • 21144458956 scopus 로고    scopus 로고
    • The Formation of Mutual Insurers in Markets with Adverse Selection
    • Ligon, J. A., Thistle, P. D. The Formation of Mutual Insurers in Markets with Adverse Selection, Journal of Business (78:2), 2005, pp. 529-555.
    • (2005) Journal of Business , vol.78 , Issue.2 , pp. 529-555
    • Ligon, J.A.1    Thistle, P.D.2
  • 28
    • 0000133760 scopus 로고
    • Threats to Information Systems: Today's Reality, Yesterday's Understanding
    • Loch K. D., Carr, H. H., Warkentin, M. E. Threats to Information Systems: Today's Reality, Yesterday's Understanding, MIS Quarterly (16:2), 1992, pp. 173-186h.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 29
    • 84985854729 scopus 로고
    • Insurance Theory: Reserves versus Mutuality
    • Marshall, J. M. Insurance Theory: Reserves versus Mutuality, Economic Inquiry (12), 1974, pp. 476-492.
    • (1974) Economic Inquiry , vol.12 , pp. 476-492
    • Marshall, J.M.1
  • 30
    • 84934562851 scopus 로고
    • Ownership Structure across Lines of Property-Causality Insurance
    • Mayers, D. Ownership Structure across Lines of Property-Causality Insurance, Journal of Law and Economics (31), 1988, pp. 351-378.
    • (1988) Journal of Law and Economics , vol.31 , pp. 351-378
    • Mayers, D.1
  • 31
    • 0001689706 scopus 로고
    • Contractual Provisions, Organizational Structure and Conflict in Insurance Markets
    • Mayers, D., Smith, C. W. Contractual Provisions, Organizational Structure and Conflict in Insurance Markets, Journal of Business (54), 1981, pp. 407-434.
    • (1981) Journal of Business , vol.54 , pp. 407-434
    • Mayers, D.1    Smith, C.W.2
  • 32
    • 84883156489 scopus 로고    scopus 로고
    • How to Work With a Managed Security Service Provider?
    • Harold F. Tipton, Micki Krause (eds.) CRC Press
    • McQuillan, L. H. How to Work with a Managed Security Service Provider? Harold F. Tipton, Micki Krause (eds.) Information Security Management Handbook. CRC Press. 2007, pp. 631-642.
    • (2007) Information Security Management Handbook , pp. 631-642
    • McQuillan, L.H.1
  • 33
    • 0033207750 scopus 로고    scopus 로고
    • A General Additive Data Perturbation Method for Database Security
    • Muralidhar, K., Parsa, R., Sarathy, R. A General Additive Data Perturbation Method for Database Security, Management Science (45:10), 1999, pp. 1399-1416.
    • (1999) Management Science , vol.45 , Issue.10 , pp. 1399-1416
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 35
    • 33847617478 scopus 로고    scopus 로고
    • Reengineering the Internet for Better Security
    • Parameswaran, M., Zhao, X., Whinston, A.B. and Fang F. Reengineering the Internet for Better Security, IEEE Computer, (40:1), 2007, pp. 40-44.
    • (2007) IEEE Computer , vol.40 , Issue.1 , pp. 40-44
    • Parameswaran, M.1    Zhao, X.2    Whinston, A.B.3    Fang, F.4
  • 39
    • 0036909696 scopus 로고    scopus 로고
    • The Security of Confidential Numerical Data in Databases
    • Sarathy, R., Muralidhar, K. The Security of Confidential Numerical Data in Databases, Information Systems Research (13:4), 2002, pp. 389-403.
    • (2002) Information Systems Research , vol.13 , Issue.4 , pp. 389-403
    • Sarathy, R.1    Muralidhar, K.2
  • 40
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security Planning Models for Managerial Decision Making
    • Straub, D. W., Welke R. J. Coping with Systems Risk: Security Planning Models for Managerial Decision Making, MIS Quarterly (22:4), 1998, pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 41
    • 84870009327 scopus 로고    scopus 로고
    • The Picture of ART
    • Swiss Re, Copyright Swiss Re
    • Swiss Re. The Picture of ART, Sigma, No.1 2003. Copyright Swiss Re.
    • (2003) Sigma , pp. 1
  • 42
    • 84870970717 scopus 로고    scopus 로고
    • Symantec, Report published by Symantec, February 2007
    • Symantec. IT Risk Management Report-Trend through December 2006, Volume 1. Report published by Symantec, February 2007. http://www.symantec.com/riskreport/
    • IT Risk Management Report-Trend Through December 2006 , vol.1
  • 43
    • 12144285368 scopus 로고    scopus 로고
    • Vulnerability and Information Security Investment: An Empirical Analysis of E-local Government in Japan
    • Tanaka, H., Matsuura, K., Sudoh, O. Vulnerability and Information Security Investment: An Empirical Analysis of E-local Government in Japan, Journal of Accounting and Public Policy (24), 2005, pp. 37-59.
    • (2005) Journal of Accounting and Public Policy , vol.24 , pp. 37-59
    • Tanaka, H.1    Matsuura, K.2    Sudoh, O.3
  • 45
    • 53349109106 scopus 로고    scopus 로고
    • An Economic Mechanism for Better Internet Security
    • Zhao, X., Fang, F. and Whinston, A.B. An Economic Mechanism for Better Internet Security, Decision Support Systems, (45:4), 2008, pp. 811-821.
    • (2008) Decision Support Systems , vol.45 , Issue.4 , pp. 811-821
    • Zhao, X.1    Fang, F.2    Whinston, A.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.