A comprehensive model for cyber risk based on marked point processes and its application to insurance
After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes in...
Saved in:
Published in | European actuarial journal Vol. 12; no. 1; pp. 33 - 85 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Berlin, Heidelberg
Springer
01.06.2022
Springer Berlin Heidelberg Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes into account incidents from malicious untargeted and targeted attacks as well as accidents and failures. The resulting model is able to include the dynamic nature of cyber risk, while capturing accumulation risk in a realistic way. The model is studied with respect to its statistical properties and applied to the pricing of cyber insurance and risk measurement. The results are illustrated in a simulation study. |
---|---|
AbstractList | Abstract After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes into account incidents from malicious untargeted and targeted attacks as well as accidents and failures. The resulting model is able to include the dynamic nature of cyber risk, while capturing accumulation risk in a realistic way. The model is studied with respect to its statistical properties and applied to the pricing of cyber insurance and risk measurement. The results are illustrated in a simulation study. After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes into account incidents from malicious untargeted and targeted attacks as well as accidents and failures. The resulting model is able to include the dynamic nature of cyber risk, while capturing accumulation risk in a realistic way. The model is studied with respect to its statistical properties and applied to the pricing of cyber insurance and risk measurement. The results are illustrated in a simulation study. |
Author | Zeller, Gabriela Scherer, Matthias |
Author_xml | – sequence: 1 givenname: Gabriela surname: Zeller fullname: Zeller, Gabriela – sequence: 2 givenname: Matthias surname: Scherer fullname: Scherer, Matthias |
BookMark | eNp9UE1LJTEQDKLg5x8QhIDn0U7yMjM5iqy7guBFzyGT6Wj0vWRMz1vw3290hPXkqepQVd1Vh2w35YSMnQq4EADdJQmlet2AFA2ANNCIHXYgRSWmW4ndb3yfnRC9AIAwamVafcDwivu8mQo-Y6L4F_kmj7jmIRfu3wcsvER65YMjHHlOfOPKa2VTjmnmU8keiZC4SyOPc8VpWkfv5lilc-Yx0ba45PGY7QW3Jjz5wiP2ePPr4fpPc3f_-_b66q7xtcDcKN8OGtCrYWVC61D7MPpO9g4cBnAQgjaoAbTTIw66NYNR0EPXDi44vxrVETtfcutrb1uk2b7kbUn1pJVGgui6VvRVJReVL5moYLBTibXZuxVgPxa1y6K2Lmo_F7WimtRioipOT1j-R__oOltc6HOKZD-A5lys7Dste_UPdgWGRA |
CitedBy_id | crossref_primary_10_1007_s13385_023_00341_9 crossref_primary_10_1080_03461238_2023_2191869 crossref_primary_10_1016_j_procs_2023_01_320 crossref_primary_10_1051_mmnp_2022041 crossref_primary_10_1007_s13385_024_00381_9 crossref_primary_10_1111_jori_12450 crossref_primary_10_1007_s13385_023_00366_0 crossref_primary_10_1017_S1748499523000258 crossref_primary_10_2139_ssrn_4353098 crossref_primary_10_1057_s41288_022_00282_6 crossref_primary_10_1214_23_EJP979 crossref_primary_10_1057_s41288_023_00289_7 crossref_primary_10_1016_j_ejor_2023_05_003 crossref_primary_10_3233_JIFS_222308 |
Cites_doi | 10.1111/jori.12059 10.1016/j.peva.2013.10.003 10.21314/JOP.2019.228 10.1007/978-3-540-88233-6 10.1093/cybsec/tyw003 10.1002/prs.11753 10.1201/9781315370279 10.1109/TIFS.2018.2834227 10.1140/epjb/e2015-60754-4 10.1016/j.dss.2013.04.004 10.1140/epjb/e2010-00120-8 10.1016/j.ejor.2018.07.021 10.1214/aoms/1177731235 10.1017/asb.2018.23 10.1080/02664763.2016.1257590 10.1016/j.insmatheco.2018.07.003 10.1007/s13385-020-00250-1 10.2307/253518 10.1057/jors.2016.37 10.1057/gpp.2014.19 10.1016/j.insmatheco.2017.05.008 10.1080/02664763.2018.1436701 10.1145/1592761.1592780 10.1080/15427951.2014.902407 10.1007/s10713-007-0004-2 10.1016/j.cosrev.2017.01.001 10.1080/10920277.2019.1566076 10.1093/oso/9780198536932.001.0001 10.1145/2566468.2566481 10.1109/INFOCOM.2008.259 10.1093/cybsec/tyz002 10.1109/Allerton.2013.6736604 10.1007/978-3-642-13869-0_23 10.1093/cybsec/tyy006 10.1145/1403027.1403037 10.12968/sece.2017.25.8 10.1109/INFOCOM.2014.6847944 10.2139/ssrn.1593137 10.1007/978-1-4419-6967-5_12 10.1109/INFCOM.2009.5062066 10.1109/WSC.2004.1371476 10.1016/S1353-4858(19)30032-7 10.5089/9781484360750.001 10.1108/JRF-09-2016-0122 |
ContentType | Journal Article |
Copyright | The Author(s) 2021 The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: The Author(s) 2021 – notice: The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | OT2 C6C AAYXX CITATION 3V. 7WY 7WZ 7XB 87Z 8FK 8FL ABUWG AFKRA BENPR BEZIV CCPQU DWQXO FRNLG F~G K60 K6~ L.- M0C PQBIZ PQBZA PQEST PQQKQ PQUKI PYYUZ Q9U |
DOI | 10.1007/s13385-021-00290-1 |
DatabaseName | EconStor SpringerOpen CrossRef ProQuest Central (Corporate) ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) ProQuest Central (Alumni) ProQuest Central AUTh Library subscriptions: ProQuest Central Business Premium Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest Business Collection ABI/INFORM Professional Advanced ABI/INFORM Global One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ABI/INFORM Collection China ProQuest Central Basic |
DatabaseTitle | CrossRef Business Premium Collection ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business ABI/INFORM Global ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ABI/INFORM China ProQuest Business Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest One Business (Alumni) ProQuest One Academic ABI/INFORM Complete (Alumni Edition) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | CrossRef Business Premium Collection |
Database_xml | – sequence: 1 dbid: C6C name: SpringerOpen url: http://www.springeropen.com/ sourceTypes: Publisher – sequence: 2 dbid: BENPR name: AUTh Library subscriptions: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Business Economics Mathematics |
EISSN | 2190-9741 |
EndPage | 85 |
ExternalDocumentID | 10_1007_s13385_021_00290_1 287528 |
GeographicLocations | United States--US |
GeographicLocations_xml | – name: United States--US |
GrantInformation_xml | – fundername: Technische Universität München (1025) |
GroupedDBID | -EM .VR 0R~ 0VY 203 2J2 2JN 2KM 2LR 2VQ 30V 4.4 406 408 409 7WY 8FL 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABJNI ABJOX ABKCH ABKTR ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BAPOH BDATZ BENPR BEZIV BGNMA CCPQU CSCUP DDRTE DNIVK DPUIP DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 HF~ HMJXF HQYDN HRMNR HVGLF HZ~ IKXTQ ITM IWAJR IZIGR J-C J0Z J9A JBSCW JCJTX JZLTJ KOV LLZTM M0C M4Y N2Q N9A NPVJJ NQJWS NU0 O9- O93 O9I O9J OT2 PF0 PQBIZ PQBZA PQQKQ PT4 R9I ROL RSV S27 S3B SAP SHX SISQX SJYHP SMT SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z81 ZMTXR AAFGU AAPBV AAYFA ABFGW ABKAS ACBMV ACBRV ACBYP ACIGE ACIPQ ACTTH ACVWB ACWMK ADMDM ADOXG AEFTE AESTI AEVTX AFNRJ AGGBP AIMYW AJDOV AKQUC C6C UNUBA AAYXX CITATION 3V. 7XB 8FK K60 K6~ L.- PQEST PQUKI Q9U |
ID | FETCH-LOGICAL-c385t-3c6b50ec3b49f6ae5cfdc728a0aef0a0ff59e5005a5deb569b9308076bafac4d3 |
IEDL.DBID | BENPR |
ISSN | 2190-9741 2190-9733 |
IngestDate | Thu Oct 10 22:03:45 EDT 2024 Wed Sep 11 13:28:17 EDT 2024 Sat Dec 16 12:08:01 EST 2023 Fri Oct 18 12:08:05 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Cyber insurance Accumulation risk Cyber risk Marked point processes Emerging risks |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c385t-3c6b50ec3b49f6ae5cfdc728a0aef0a0ff59e5005a5deb569b9308076bafac4d3 |
ORCID | 0000-0003-4505-5753 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=http://link.springer.com/10.1007/s13385-021-00290-1 |
PQID | 2920177618 |
PQPubID | 2043916 |
PageCount | 53 |
ParticipantIDs | proquest_journals_2920177618 crossref_primary_10_1007_s13385_021_00290_1 springer_journals_10_1007_s13385_021_00290_1 econis_econstor_287528 |
PublicationCentury | 2000 |
PublicationDate | 2022-06-01 |
PublicationDateYYYYMMDD | 2022-06-01 |
PublicationDate_xml | – month: 06 year: 2022 text: 2022-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Berlin, Heidelberg |
PublicationPlace_xml | – name: Berlin, Heidelberg – name: Berlin/Heidelberg – name: Heidelberg |
PublicationTitle | European actuarial journal |
PublicationTitleAbbrev | Eur. Actuar. J |
PublicationYear | 2022 |
Publisher | Springer Springer Berlin Heidelberg Springer Nature B.V |
Publisher_xml | – name: Springer – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
References | Agrafiotis, Nurse, Goldsmith, Creese, Upton (CR35) 2018; 4 Maillart, Sornette (CR53) 2010; 75 Xu, Schweitzer, Bateman, Xu (CR44) 2018; 13 Xu, Da, Xu (CR48) 2015; 11 Hofmann (CR18) 2007; 32 CR38 CR37 Peng, Xu, Xu, Hu (CR42) 2018; 45 Yang, Lui (CR32) 2014; 74 CR34 CR78 CR33 CR76 CR31 CR74 CR72 Edwards, Hofmeyr, Forrest (CR49) 2016; 2 CR70 Herath, Herath (CR40) 2011; 2 Peng, Xu, Xu, Hu (CR43) 2017; 44 MacKay (CR82) 2010 CR2 CR4 CR3 CR6 CR5 CR8 CR7 Hashemi, Ahmed, Khan (CR75) 2015; 34 CR9 Romanosky (CR55) 2016; 2 Eling (CR1) 2020; 10 Fahrenwaldt, Weber, Weske (CR46) 2018; 48 Daley, Vere-Jones (CR79) 2003 Baldwin, Gheyas, Ioannidis, Pym, Williams (CR45) 2017; 68 Mukhopadhyay, Chatterjee, Saha, Mahanti, Sadhukhan (CR41) 2013; 56 CR83 Blitzstein, Hwang (CR84) 2015 Marotta, Martinelli, Nanni, Orlando, Yautsiukhin (CR25) 2017; 24 Eling, Wirfs (CR56) 2019; 272 Zajdenweber (CR77) 1996; 63 Shim (CR30) 2012; 22 Wood (CR81) 2017 Romanosky, Ablon, Kuehn, Jones (CR15) 2019; 5 Daley, Vere-Jones (CR80) 2007 Cohen, Humphries, Veau, Francis (CR39) 2019; 14 Böhme, Laube, Riek (CR36) 2018; 11 Eling, Loperfido (CR50) 2017; 75 CR19 CR17 CR16 CR59 CR14 CR58 CR13 CR12 CR11 CR10 Andress (CR67) 2014 Boudreaux, Rao, Ferguson (CR73) 2013; 1 CR52 Biener, Eling, Wirfs (CR62) 2015; 40 Carfora, Martinelli, Mercaldo, Orlando (CR68) 2019; 14 Xu, Hua (CR47) 2019; 23 Mikosch (CR86) 2009 CR29 Chavez-Demoulin, Embrechts, Hofert (CR57) 2016; 83 CR28 Wald (CR85) 1944; 15 CR27 CR26 CR69 CR24 CR23 CR22 CR66 CR21 CR65 CR20 CR64 CR63 CR61 CR60 Wheatley, Maillart, Sornette (CR54) 2016; 89 Eling, Jung (CR51) 2018; 82 Bandyopadhyay, Mookerjee, Rao (CR71) 2009; 52 D Zajdenweber (290_CR77) 1996; 63 290_CR52 290_CR10 290_CR11 290_CR12 290_CR13 290_CR14 290_CR58 M Xu (290_CR47) 2019; 23 290_CR59 M Carfora (290_CR68) 2019; 14 290_CR16 290_CR17 C Peng (290_CR42) 2018; 45 SJ Hashemi (290_CR75) 2015; 34 H Herath (290_CR40) 2011; 2 290_CR19 D MacKay (290_CR82) 2010 M Eling (290_CR1) 2020; 10 T Maillart (290_CR53) 2010; 75 J Blitzstein (290_CR84) 2015 V Chavez-Demoulin (290_CR57) 2016; 83 S Romanosky (290_CR15) 2019; 5 290_CR60 290_CR61 290_CR2 290_CR3 290_CR63 290_CR4 290_CR20 M Eling (290_CR56) 2019; 272 290_CR64 290_CR21 290_CR65 290_CR22 290_CR66 290_CR23 290_CR24 M Xu (290_CR48) 2015; 11 290_CR69 290_CR26 290_CR27 290_CR28 290_CR29 M Eling (290_CR51) 2018; 82 S Wood (290_CR81) 2017 S Wheatley (290_CR54) 2016; 89 W Shim (290_CR30) 2012; 22 290_CR9 A Hofmann (290_CR18) 2007; 32 290_CR5 290_CR6 290_CR7 290_CR70 290_CR8 I Agrafiotis (290_CR35) 2018; 4 290_CR72 A Mukhopadhyay (290_CR41) 2013; 56 290_CR74 290_CR31 R Cohen (290_CR39) 2019; 14 290_CR76 290_CR33 290_CR34 290_CR78 S Romanosky (290_CR55) 2016; 2 290_CR37 290_CR38 B Edwards (290_CR49) 2016; 2 T Bandyopadhyay (290_CR71) 2009; 52 A Baldwin (290_CR45) 2017; 68 Z Yang (290_CR32) 2014; 74 DJ Daley (290_CR79) 2003 290_CR83 T Mikosch (290_CR86) 2009 D Boudreaux (290_CR73) 2013; 1 M Eling (290_CR50) 2017; 75 J Andress (290_CR67) 2014 M Xu (290_CR44) 2018; 13 R Böhme (290_CR36) 2018; 11 A Marotta (290_CR25) 2017; 24 M Fahrenwaldt (290_CR46) 2018; 48 C Biener (290_CR62) 2015; 40 A Wald (290_CR85) 1944; 15 DJ Daley (290_CR80) 2007 C Peng (290_CR43) 2017; 44 |
References_xml | – volume: 2 start-page: 121 issue: 2 year: 2016 end-page: 135 ident: CR55 article-title: Examining the costs and causes of cyber incidents publication-title: J Cybersecur contributor: fullname: Romanosky – ident: CR70 – ident: CR22 – volume: 83 start-page: 735 issue: 3 year: 2016 end-page: 776 ident: CR57 article-title: An extreme value approach for modeling operational risk losses depending on covariates publication-title: J Risk Insur doi: 10.1111/jori.12059 contributor: fullname: Hofert – ident: CR74 – volume: 74 start-page: 1 year: 2014 end-page: 17 ident: CR32 article-title: Security adoption and influence of cyber-insurance markets in heterogeneous networks publication-title: Perform Eval doi: 10.1016/j.peva.2013.10.003 contributor: fullname: Lui – ident: CR4 – ident: CR16 – ident: CR12 – volume: 14 start-page: 1 issue: 3 year: 2019 end-page: 25 ident: CR39 article-title: An investigation of cyber loss data and its links to operational risk publication-title: J Oper Risk doi: 10.21314/JOP.2019.228 contributor: fullname: Francis – volume: 14 start-page: 77 issue: 4 year: 2019 end-page: 103 ident: CR68 article-title: Cyber risk management: an actuarial point of view publication-title: J Oper Risk contributor: fullname: Orlando – year: 2009 ident: CR86 publication-title: Non-life insurance mathematics: an introduction with the Poisson process doi: 10.1007/978-3-540-88233-6 contributor: fullname: Mikosch – ident: CR29 – volume: 2 start-page: 3 issue: 1 year: 2016 end-page: 14 ident: CR49 article-title: Hype and heavy tails: a closer look at data breaches publication-title: J Cybersecur doi: 10.1093/cybsec/tyw003 contributor: fullname: Forrest – ident: CR61 – volume: 1 start-page: 53 issue: 1 year: 2013 end-page: 75 ident: CR73 article-title: Measuring losses for small business interruption claims publication-title: J Appl Risk Manag Insur contributor: fullname: Ferguson – ident: CR8 – ident: CR58 – volume: 34 start-page: 373 issue: 4 year: 2015 end-page: 382 ident: CR75 article-title: Probabilistic modeling of business interruption and reputational losses for process facilities publication-title: Process Saf Prog doi: 10.1002/prs.11753 contributor: fullname: Khan – year: 2017 ident: CR81 publication-title: Generalized additive models: an introduction with R. Chapman & Hall/CRC texts in statistical science doi: 10.1201/9781315370279 contributor: fullname: Wood – ident: CR21 – ident: CR19 – volume: 13 start-page: 2856 issue: 11 year: 2018 end-page: 2871 ident: CR44 article-title: Modeling and predicting cyber hacking breaches publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2018.2834227 contributor: fullname: Xu – volume: 89 start-page: 59 issue: 1 year: 2016 ident: CR54 article-title: The extreme risk of personal data breaches and the erosion of privacy publication-title: Eur Phys J B doi: 10.1140/epjb/e2015-60754-4 contributor: fullname: Sornette – volume: 56 start-page: 11 year: 2013 end-page: 26 ident: CR41 article-title: Cyber-risk decision models: to insure it or not? publication-title: Decis Support Syst doi: 10.1016/j.dss.2013.04.004 contributor: fullname: Sadhukhan – year: 2010 ident: CR82 publication-title: Information theory, inference, and learning algorithms contributor: fullname: MacKay – volume: 75 start-page: 357 issue: 3 year: 2010 end-page: 364 ident: CR53 article-title: Heavy-tailed distribution of cyber-risks publication-title: Eur Phys J B doi: 10.1140/epjb/e2010-00120-8 contributor: fullname: Sornette – volume: 272 start-page: 1109 issue: 3 year: 2019 end-page: 1119 ident: CR56 article-title: What are the actual costs of cyber risk events? publication-title: Eur J Oper Res doi: 10.1016/j.ejor.2018.07.021 contributor: fullname: Wirfs – volume: 15 start-page: 283 issue: 3 year: 1944 end-page: 296 ident: CR85 article-title: On cumulative sums of random variables publication-title: Ann Math Stat doi: 10.1214/aoms/1177731235 contributor: fullname: Wald – volume: 48 start-page: 1175 issue: 3 year: 2018 end-page: 1218 ident: CR46 article-title: Pricing of cyber insurance contracts in a network model publication-title: ASTIN Bull doi: 10.1017/asb.2018.23 contributor: fullname: Weske – year: 2003 ident: CR79 publication-title: An introduction to the theory of point processes: volume I: elementary theory and methods contributor: fullname: Vere-Jones – year: 2014 ident: CR67 publication-title: The basics of information security: understanding the fundamentals of infosec in theory and practice contributor: fullname: Andress – ident: CR11 – ident: CR9 – ident: CR60 – ident: CR78 – volume: 4 start-page: tyy006 issue: 1 year: 2018 ident: CR35 article-title: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate publication-title: J Cybersecur contributor: fullname: Upton – volume: 2 start-page: 7 issue: 1 year: 2011 end-page: 20 ident: CR40 article-title: Copula-based actuarial model for pricing cyber-insurance policies publication-title: Insur Mark Co contributor: fullname: Herath – ident: CR5 – ident: CR64 – ident: CR26 – volume: 44 start-page: 2534 issue: 14 year: 2017 end-page: 2563 ident: CR43 article-title: Modeling and predicting extreme cyber attack rates via marked point processes publication-title: J Appl Stat doi: 10.1080/02664763.2016.1257590 contributor: fullname: Hu – volume: 82 start-page: 167 year: 2018 end-page: 180 ident: CR51 article-title: Copula approaches for modeling cross-sectional dependence of data breach losses publication-title: Insur Math Econ doi: 10.1016/j.insmatheco.2018.07.003 contributor: fullname: Jung – volume: 10 start-page: 303 issue: 2 year: 2020 end-page: 333 ident: CR1 article-title: Cyber risk research in business and actuarial science publication-title: Eur Actuar J doi: 10.1007/s13385-020-00250-1 contributor: fullname: Eling – volume: 63 start-page: 95 issue: 1 year: 1996 ident: CR77 article-title: Extreme values in business interruption insurance publication-title: J Risk Insur doi: 10.2307/253518 contributor: fullname: Zajdenweber – ident: CR66 – ident: CR72 – ident: CR14 – ident: CR2 – ident: CR37 – volume: 5 start-page: 117 issue: 1 year: 2019 ident: CR15 article-title: Content analysis of cyber insurance policies: how do carriers price cyber risk? publication-title: J Cybersecur contributor: fullname: Jones – ident: CR10 – ident: CR33 – volume: 68 start-page: 780 issue: 7 year: 2017 end-page: 791 ident: CR45 article-title: Contagion in cyber security attacks publication-title: J Oper Res Soc doi: 10.1057/jors.2016.37 contributor: fullname: Williams – ident: CR6 – volume: 40 start-page: 131 issue: 1 year: 2015 end-page: 158 ident: CR62 article-title: Insurability of cyber risk: an empirical analysis publication-title: Geneva Pap Risk Insur Issues Pract doi: 10.1057/gpp.2014.19 contributor: fullname: Wirfs – year: 2007 ident: CR80 publication-title: An introduction to the theory of point processes: volume II: general theory and structure. Probability and its applications contributor: fullname: Vere-Jones – ident: CR63 – ident: CR27 – volume: 75 start-page: 126 year: 2017 end-page: 136 ident: CR50 article-title: Data breaches: goodness of fit, pricing, and risk measurement publication-title: Insur Math Econ doi: 10.1016/j.insmatheco.2017.05.008 contributor: fullname: Loperfido – ident: CR23 – volume: 45 start-page: 2718 issue: 15 year: 2018 end-page: 2740 ident: CR42 article-title: Modeling multivariate cybersecurity risks publication-title: J Appl Stat doi: 10.1080/02664763.2018.1436701 contributor: fullname: Hu – volume: 52 start-page: 68 issue: 11 year: 2009 ident: CR71 article-title: Why IT managers don’t go for cyber-insurance products publication-title: Commun ACM doi: 10.1145/1592761.1592780 contributor: fullname: Rao – volume: 11 start-page: 62 issue: 1 year: 2015 end-page: 92 ident: CR48 article-title: Cyber epidemic models with dependences publication-title: Internet Math doi: 10.1080/15427951.2014.902407 contributor: fullname: Xu – ident: CR69 – year: 2015 ident: CR84 publication-title: Introduction to probability. Texts in statistical science contributor: fullname: Hwang – volume: 32 start-page: 91 issue: 1 year: 2007 end-page: 111 ident: CR18 article-title: Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks publication-title: Geneva Risk Insur Rev doi: 10.1007/s10713-007-0004-2 contributor: fullname: Hofmann – volume: 11 start-page: 161 issue: 2 year: 2018 end-page: 185 ident: CR36 article-title: A fundamental approach to cyber risk analysis publication-title: Variance contributor: fullname: Riek – ident: CR65 – ident: CR3 – ident: CR38 – ident: CR52 – ident: CR17 – ident: CR31 – ident: CR13 – volume: 22 start-page: 79 issue: 1 year: 2012 end-page: 101 ident: CR30 article-title: An analysis of information security management strategies in the presence of interdependent security risk publication-title: Asia Pac J Inf Syst contributor: fullname: Shim – ident: CR34 – volume: 24 start-page: 35 year: 2017 end-page: 61 ident: CR25 article-title: Cyber-insurance survey publication-title: Comput Sci Rev doi: 10.1016/j.cosrev.2017.01.001 contributor: fullname: Yautsiukhin – ident: CR7 – ident: CR59 – ident: CR76 – ident: CR83 – ident: CR28 – ident: CR24 – ident: CR20 – volume: 23 start-page: 220 issue: 2 year: 2019 end-page: 249 ident: CR47 article-title: Cybersecurity insurance: modeling and pricing publication-title: N Am Actuar J doi: 10.1080/10920277.2019.1566076 contributor: fullname: Hua – ident: 290_CR33 – ident: 290_CR10 – ident: 290_CR14 – ident: 290_CR52 – ident: 290_CR83 doi: 10.1093/oso/9780198536932.001.0001 – volume-title: Information theory, inference, and learning algorithms year: 2010 ident: 290_CR82 contributor: fullname: D MacKay – ident: 290_CR20 – ident: 290_CR27 doi: 10.1145/2566468.2566481 – volume: 52 start-page: 68 issue: 11 year: 2009 ident: 290_CR71 publication-title: Commun ACM doi: 10.1145/1592761.1592780 contributor: fullname: T Bandyopadhyay – volume-title: Introduction to probability. Texts in statistical science year: 2015 ident: 290_CR84 contributor: fullname: J Blitzstein – volume: 74 start-page: 1 year: 2014 ident: 290_CR32 publication-title: Perform Eval doi: 10.1016/j.peva.2013.10.003 contributor: fullname: Z Yang – ident: 290_CR7 – volume-title: An introduction to the theory of point processes: volume II: general theory and structure. Probability and its applications year: 2007 ident: 290_CR80 contributor: fullname: DJ Daley – ident: 290_CR24 – volume: 11 start-page: 62 issue: 1 year: 2015 ident: 290_CR48 publication-title: Internet Math doi: 10.1080/15427951.2014.902407 contributor: fullname: M Xu – ident: 290_CR17 doi: 10.1109/INFOCOM.2008.259 – ident: 290_CR11 – ident: 290_CR78 – volume: 82 start-page: 167 year: 2018 ident: 290_CR51 publication-title: Insur Math Econ doi: 10.1016/j.insmatheco.2018.07.003 contributor: fullname: M Eling – volume: 44 start-page: 2534 issue: 14 year: 2017 ident: 290_CR43 publication-title: J Appl Stat doi: 10.1080/02664763.2016.1257590 contributor: fullname: C Peng – volume: 5 start-page: 117 issue: 1 year: 2019 ident: 290_CR15 publication-title: J Cybersecur doi: 10.1093/cybsec/tyz002 contributor: fullname: S Romanosky – volume: 13 start-page: 2856 issue: 11 year: 2018 ident: 290_CR44 publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2018.2834227 contributor: fullname: M Xu – ident: 290_CR28 doi: 10.1109/Allerton.2013.6736604 – ident: 290_CR70 – ident: 290_CR6 – ident: 290_CR22 doi: 10.1007/978-3-642-13869-0_23 – volume-title: Non-life insurance mathematics: an introduction with the Poisson process year: 2009 ident: 290_CR86 doi: 10.1007/978-3-540-88233-6 contributor: fullname: T Mikosch – volume: 56 start-page: 11 year: 2013 ident: 290_CR41 publication-title: Decis Support Syst doi: 10.1016/j.dss.2013.04.004 contributor: fullname: A Mukhopadhyay – ident: 290_CR63 – volume: 4 start-page: tyy006 issue: 1 year: 2018 ident: 290_CR35 publication-title: J Cybersecur doi: 10.1093/cybsec/tyy006 contributor: fullname: I Agrafiotis – volume: 40 start-page: 131 issue: 1 year: 2015 ident: 290_CR62 publication-title: Geneva Pap Risk Insur Issues Pract doi: 10.1057/gpp.2014.19 contributor: fullname: C Biener – volume-title: Generalized additive models: an introduction with R. Chapman & Hall/CRC texts in statistical science year: 2017 ident: 290_CR81 doi: 10.1201/9781315370279 contributor: fullname: S Wood – volume: 10 start-page: 303 issue: 2 year: 2020 ident: 290_CR1 publication-title: Eur Actuar J doi: 10.1007/s13385-020-00250-1 contributor: fullname: M Eling – ident: 290_CR21 doi: 10.1145/1403027.1403037 – volume: 24 start-page: 35 year: 2017 ident: 290_CR25 publication-title: Comput Sci Rev doi: 10.1016/j.cosrev.2017.01.001 contributor: fullname: A Marotta – volume: 32 start-page: 91 issue: 1 year: 2007 ident: 290_CR18 publication-title: Geneva Risk Insur Rev doi: 10.1007/s10713-007-0004-2 contributor: fullname: A Hofmann – ident: 290_CR31 – ident: 290_CR58 – volume: 14 start-page: 77 issue: 4 year: 2019 ident: 290_CR68 publication-title: J Oper Risk contributor: fullname: M Carfora – ident: 290_CR2 doi: 10.12968/sece.2017.25.8 – ident: 290_CR34 doi: 10.1109/INFOCOM.2014.6847944 – volume: 11 start-page: 161 issue: 2 year: 2018 ident: 290_CR36 publication-title: Variance contributor: fullname: R Böhme – ident: 290_CR26 doi: 10.2139/ssrn.1593137 – volume-title: The basics of information security: understanding the fundamentals of infosec in theory and practice year: 2014 ident: 290_CR67 contributor: fullname: J Andress – ident: 290_CR12 – volume: 22 start-page: 79 issue: 1 year: 2012 ident: 290_CR30 publication-title: Asia Pac J Inf Syst contributor: fullname: W Shim – ident: 290_CR16 – volume: 68 start-page: 780 issue: 7 year: 2017 ident: 290_CR45 publication-title: J Oper Res Soc doi: 10.1057/jors.2016.37 contributor: fullname: A Baldwin – ident: 290_CR9 – ident: 290_CR5 – volume: 89 start-page: 59 issue: 1 year: 2016 ident: 290_CR54 publication-title: Eur Phys J B doi: 10.1140/epjb/e2015-60754-4 contributor: fullname: S Wheatley – volume: 63 start-page: 95 issue: 1 year: 1996 ident: 290_CR77 publication-title: J Risk Insur doi: 10.2307/253518 contributor: fullname: D Zajdenweber – ident: 290_CR29 doi: 10.1007/978-1-4419-6967-5_12 – volume: 272 start-page: 1109 issue: 3 year: 2019 ident: 290_CR56 publication-title: Eur J Oper Res doi: 10.1016/j.ejor.2018.07.021 contributor: fullname: M Eling – ident: 290_CR60 – volume: 48 start-page: 1175 issue: 3 year: 2018 ident: 290_CR46 publication-title: ASTIN Bull doi: 10.1017/asb.2018.23 contributor: fullname: M Fahrenwaldt – ident: 290_CR64 – volume: 1 start-page: 53 issue: 1 year: 2013 ident: 290_CR73 publication-title: J Appl Risk Manag Insur contributor: fullname: D Boudreaux – ident: 290_CR19 doi: 10.1109/INFCOM.2009.5062066 – volume: 83 start-page: 735 issue: 3 year: 2016 ident: 290_CR57 publication-title: J Risk Insur doi: 10.1111/jori.12059 contributor: fullname: V Chavez-Demoulin – volume: 2 start-page: 3 issue: 1 year: 2016 ident: 290_CR49 publication-title: J Cybersecur doi: 10.1093/cybsec/tyw003 contributor: fullname: B Edwards – volume: 75 start-page: 357 issue: 3 year: 2010 ident: 290_CR53 publication-title: Eur Phys J B doi: 10.1140/epjb/e2010-00120-8 contributor: fullname: T Maillart – volume: 45 start-page: 2718 issue: 15 year: 2018 ident: 290_CR42 publication-title: J Appl Stat doi: 10.1080/02664763.2018.1436701 contributor: fullname: C Peng – volume: 23 start-page: 220 issue: 2 year: 2019 ident: 290_CR47 publication-title: N Am Actuar J doi: 10.1080/10920277.2019.1566076 contributor: fullname: M Xu – ident: 290_CR38 – ident: 290_CR76 – ident: 290_CR13 – ident: 290_CR59 – ident: 290_CR72 – volume: 15 start-page: 283 issue: 3 year: 1944 ident: 290_CR85 publication-title: Ann Math Stat doi: 10.1214/aoms/1177731235 contributor: fullname: A Wald – ident: 290_CR74 doi: 10.1109/WSC.2004.1371476 – volume: 2 start-page: 121 issue: 2 year: 2016 ident: 290_CR55 publication-title: J Cybersecur contributor: fullname: S Romanosky – ident: 290_CR69 – ident: 290_CR4 – volume: 2 start-page: 7 issue: 1 year: 2011 ident: 290_CR40 publication-title: Insur Mark Co contributor: fullname: H Herath – volume: 75 start-page: 126 year: 2017 ident: 290_CR50 publication-title: Insur Math Econ doi: 10.1016/j.insmatheco.2017.05.008 contributor: fullname: M Eling – volume: 34 start-page: 373 issue: 4 year: 2015 ident: 290_CR75 publication-title: Process Saf Prog doi: 10.1002/prs.11753 contributor: fullname: SJ Hashemi – ident: 290_CR3 doi: 10.1016/S1353-4858(19)30032-7 – ident: 290_CR8 – volume-title: An introduction to the theory of point processes: volume I: elementary theory and methods year: 2003 ident: 290_CR79 contributor: fullname: DJ Daley – volume: 14 start-page: 1 issue: 3 year: 2019 ident: 290_CR39 publication-title: J Oper Risk doi: 10.21314/JOP.2019.228 contributor: fullname: R Cohen – ident: 290_CR23 – ident: 290_CR37 doi: 10.5089/9781484360750.001 – ident: 290_CR65 – ident: 290_CR66 doi: 10.1108/JRF-09-2016-0122 – ident: 290_CR61 |
SSID | ssj0001934965 |
Score | 2.3945308 |
Snippet | After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is... Abstract After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point... |
SourceID | proquest crossref springer econis |
SourceType | Aggregation Database Publisher |
StartPage | 33 |
SubjectTerms | Accumulation risk Actuarial science Applications of Mathematics Binomial distribution Cyber insurance Cyber risk Data integrity Economics Emerging risks Financial Services Game Theory Liability insurance Literature reviews Losses Marked point processes Mathematics Mathematics and Statistics Network security Original Research Paper Quantitative Finance Risk management Social and Behav. Sciences Stochastic models |
SummonAdditionalLinks | – databaseName: SpringerLINK - Czech Republic Consortium dbid: AGYKE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTxsxEB6hpGrLgbYpiECofODWLtqHvRsfIwSNQPSUSHCy_Fo1QmyiZHNof31n9sGWPg45eSXvQ_bYOzOe75sBOI916Cy3IkDjlQdc2izQUmQBKkPUjvE4Eo7OO-6-pdM5v7kX9x2PuwK7txHJ6kfdcd3QmSIyMXq_YSzDAF2ePhFPRQ_6k68Pt78drcgqCzqVlSOitMySpKHL_PtFL1TSK_JDF5sXBucfMdJK9Vy_g1lL4KkRJ48X29Jc2J9_53PcZVTv4aAxRdmkXjsfYM8XA3jdIuEH8KYlLeP1_t1zetfNR_ATRlD0tf9ew99ZVU-Hof3L7A_j14wA64wUpGPLgj0RBMix1XJRlGxVMxP8hunCsUWJbRdDZ-WSETqeqn34Q5hfX80up0FTryGwOIgySGxqROhtYrjMU-2FzZ3N4rEOtc9DHea5kF7gttfCeSNSaWSCBmuWGp1ry11yBL1iWfhjYElkDEfbxeFTnHtnqIC7jHMrUJdq7obwuRWZWtVpOVSXgJnmVOGcqmpOVTSEo1qqihpCnSp0FEU8HsKolbJq9u5GUf2uKMvSCLu_tFLruv__mZPdbj-FtzFxKaojnRH0yvXWn6GFU5pPzYr-BbPd75Q priority: 102 providerName: Springer Nature |
Title | A comprehensive model for cyber risk based on marked point processes and its application to insurance |
URI | https://www.econstor.eu/handle/10419/287528 https://link.springer.com/article/10.1007/s13385-021-00290-1 https://www.proquest.com/docview/2920177618 |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1La9tAEB4au5ReQps2xE1q9tBbKiqtdiXvKTjGaWhIKCGG9LTsS8SHSK6tHPLvO6MHIoX2oj0ISWj2Md_MfrMfwBduYu-EkxGCVxEJ5fLIKJlH6AzRO_JZIj3lO65vssuV-HEv77uE266jVfZrYrNQ-8pRjvwbqSolOQbds7PN74hUo2h3tZPQ2IMxx0iBj2B8vrz5eTtkWVRzIDopzFHNtMrTtKucaevnMECjAmWMqGOO95MX3uk1haTr3Qvs-dd2aeOFLt7Bfgcf2bzt7_fwKpQH8KZnr3-AMGdEEt-Gh5aYzhqlG4bIlLlnG7aMqOSMXJdnVckeiZzj2aZalzXbtDUDYcdM6dm6xnbY3WZ1xYi3Tjoc4SOsLpZ3i8uoU1KIHP5gHaUuszIOLrVCFZkJ0hXe5XxmYhOK2MRFIVWQOCGN9MHKTFmVIpTMM2sK44RPD2FUVmU4ApYm1gpEFR6fEiJ4S9LqihdOopczwk_gtLeg3rQHZujhaGSyt0Z768beOpnAYWtkTQ3xQTWGcJLPJnDSG113s2qnhzEwga99Rwy3__2ZT_9_2zG85VTV0CRXTmBUb5_CZ8QatZ3CeP7919Vy2g2sKewtsgVeV3z-B7Vi0yc |
link.rule.ids | 315,783,787,21402,27938,27939,33758,41095,41134,41537,42164,42203,42606,43819,51590,52125,52248 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1JS-RAFH64DKMX0RnFdps6eHOCWaqSrpOoKO2ojYiCt6K2YB9M2u548N_7XhaCwniqQ5GEvFre9r33ARzGOnSWWxGg8coDLm0WaCmyAJUhasd4GAlH8Y7bcTp65P-exFMbcJu3sMruTqwvaldaipEfE6tSlKHTPTyZvgbEGkXZ1ZZCYxGWqVUV7urls4vx3X0fZZF1Q3RimKOaaZklSVs509TPoYNGBcroUYcxzkeftNMPckkn80-255d0aa2FLtdhrTUf2Wmz3huw4Itf8LNDr_8Gf8oIJD7zzw0wndVMNwwtU2bfjZ8xgpIzUl2OlQV7IXCOY9NyUlRs2tQM-DnThWOTCsc-u82qkhFunXg4_CY8Xl48nI-ClkkhsPiDVZDY1IjQ28RwmafaC5s7m8VDHWqfhzrMcyG9wAOphfNGpNLIBE3JLDU615a7ZAuWirLw28CSyBiOVoXDpzj3zhC1uoxzK1DLae4GcNRJUE2bhhmqb41M8lYob1XLW0UD2GqErGggPKhCF07EwwHsdUJX7amaq34PDOBvtxD99P8_s_P92_7Ayujh9kbdXI2vd2E1pgqHOtCyB0vV7M3vo91RmYN2c30AWqbSxw |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3JTsMwELUQIJYDggKirD5wg4gsdlIfUaFiK-JAJW6Wt4geSKo2HPh7ZrIQiuDAyZGcRfbEmjf2ezOEnIbKt4YZ7gF4ZR4TJvGU4IkHzhC8Y9gLuMX9juFjfDNidy_85ZuKv2S7N0eSlaYBszRlxcXEphet8A0iK1QWQyjsh8L3IP5ZYkEQYfb8ftxvd1lEmRAdK8yhZlokUVQrZ35_zZx3WsaQdDybw54_jktLLzTYJBs1fKSXlb23yILLOmSlYa93yGojNIbr9eFXStbZNnGXFOnjU_daUdZpWQOHAmal5kO7KUWSOUWnZmme0Tek7Vg6ycdZQSeVmsDNqMosHRfQtufetMgpMtqxQofbIaPB9XP_xqtrLHgGhl54kYk1952JNBNprBw3qTVJ2FO-cqmv_DTlwnFYqopbp3kstIgAZCaxVqkyzEa7ZDHLM7dHaBRozQBvWHiKMWc1Fl0XYWo4-D_FbJecNXMrJ1UqDdkmTUZLSLCELC0hgy7ZraZfYoNMUQnBHQ97XXLYmEPW620mseZWkCRxAN3njYna7r8_s_-_20_IytPVQD7cPt4fkLUQpRDljswhWSym7-4IAEqhj8t_8BM1n9qj |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+comprehensive+model+for+cyber+risk+based+on+marked+point+processes+and+its+application+to+insurance&rft.jtitle=European+actuarial+journal&rft.au=Zeller%2C+Gabriela&rft.au=Scherer%2C+Matthias&rft.date=2022-06-01&rft.pub=Springer+Nature+B.V&rft.issn=2190-9733&rft.eissn=2190-9741&rft.volume=12&rft.issue=1&rft.spage=33&rft.epage=85&rft_id=info:doi/10.1007%2Fs13385-021-00290-1 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2190-9741&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2190-9741&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2190-9741&client=summon |