A comprehensive model for cyber risk based on marked point processes and its application to insurance

After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes in...

Full description

Saved in:
Bibliographic Details
Published inEuropean actuarial journal Vol. 12; no. 1; pp. 33 - 85
Main Authors Zeller, Gabriela, Scherer, Matthias
Format Journal Article
LanguageEnglish
Published Berlin, Heidelberg Springer 01.06.2022
Springer Berlin Heidelberg
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes into account incidents from malicious untargeted and targeted attacks as well as accidents and failures. The resulting model is able to include the dynamic nature of cyber risk, while capturing accumulation risk in a realistic way. The model is studied with respect to its statistical properties and applied to the pricing of cyber insurance and risk measurement. The results are illustrated in a simulation study.
AbstractList Abstract After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes into account incidents from malicious untargeted and targeted attacks as well as accidents and failures. The resulting model is able to include the dynamic nature of cyber risk, while capturing accumulation risk in a realistic way. The model is studied with respect to its statistical properties and applied to the pricing of cyber insurance and risk measurement. The results are illustrated in a simulation study.
After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes into account incidents from malicious untargeted and targeted attacks as well as accidents and failures. The resulting model is able to include the dynamic nature of cyber risk, while capturing accumulation risk in a realistic way. The model is studied with respect to its statistical properties and applied to the pricing of cyber insurance and risk measurement. The results are illustrated in a simulation study.
Author Zeller, Gabriela
Scherer, Matthias
Author_xml – sequence: 1
  givenname: Gabriela
  surname: Zeller
  fullname: Zeller, Gabriela
– sequence: 2
  givenname: Matthias
  surname: Scherer
  fullname: Scherer, Matthias
BookMark eNp9UE1LJTEQDKLg5x8QhIDn0U7yMjM5iqy7guBFzyGT6Wj0vWRMz1vw3290hPXkqepQVd1Vh2w35YSMnQq4EADdJQmlet2AFA2ANNCIHXYgRSWmW4ndb3yfnRC9AIAwamVafcDwivu8mQo-Y6L4F_kmj7jmIRfu3wcsvER65YMjHHlOfOPKa2VTjmnmU8keiZC4SyOPc8VpWkfv5lilc-Yx0ba45PGY7QW3Jjz5wiP2ePPr4fpPc3f_-_b66q7xtcDcKN8OGtCrYWVC61D7MPpO9g4cBnAQgjaoAbTTIw66NYNR0EPXDi44vxrVETtfcutrb1uk2b7kbUn1pJVGgui6VvRVJReVL5moYLBTibXZuxVgPxa1y6K2Lmo_F7WimtRioipOT1j-R__oOltc6HOKZD-A5lys7Dste_UPdgWGRA
CitedBy_id crossref_primary_10_1007_s13385_023_00341_9
crossref_primary_10_1080_03461238_2023_2191869
crossref_primary_10_1016_j_procs_2023_01_320
crossref_primary_10_1051_mmnp_2022041
crossref_primary_10_1007_s13385_024_00381_9
crossref_primary_10_1111_jori_12450
crossref_primary_10_1007_s13385_023_00366_0
crossref_primary_10_1017_S1748499523000258
crossref_primary_10_2139_ssrn_4353098
crossref_primary_10_1057_s41288_022_00282_6
crossref_primary_10_1214_23_EJP979
crossref_primary_10_1057_s41288_023_00289_7
crossref_primary_10_1016_j_ejor_2023_05_003
crossref_primary_10_3233_JIFS_222308
Cites_doi 10.1111/jori.12059
10.1016/j.peva.2013.10.003
10.21314/JOP.2019.228
10.1007/978-3-540-88233-6
10.1093/cybsec/tyw003
10.1002/prs.11753
10.1201/9781315370279
10.1109/TIFS.2018.2834227
10.1140/epjb/e2015-60754-4
10.1016/j.dss.2013.04.004
10.1140/epjb/e2010-00120-8
10.1016/j.ejor.2018.07.021
10.1214/aoms/1177731235
10.1017/asb.2018.23
10.1080/02664763.2016.1257590
10.1016/j.insmatheco.2018.07.003
10.1007/s13385-020-00250-1
10.2307/253518
10.1057/jors.2016.37
10.1057/gpp.2014.19
10.1016/j.insmatheco.2017.05.008
10.1080/02664763.2018.1436701
10.1145/1592761.1592780
10.1080/15427951.2014.902407
10.1007/s10713-007-0004-2
10.1016/j.cosrev.2017.01.001
10.1080/10920277.2019.1566076
10.1093/oso/9780198536932.001.0001
10.1145/2566468.2566481
10.1109/INFOCOM.2008.259
10.1093/cybsec/tyz002
10.1109/Allerton.2013.6736604
10.1007/978-3-642-13869-0_23
10.1093/cybsec/tyy006
10.1145/1403027.1403037
10.12968/sece.2017.25.8
10.1109/INFOCOM.2014.6847944
10.2139/ssrn.1593137
10.1007/978-1-4419-6967-5_12
10.1109/INFCOM.2009.5062066
10.1109/WSC.2004.1371476
10.1016/S1353-4858(19)30032-7
10.5089/9781484360750.001
10.1108/JRF-09-2016-0122
ContentType Journal Article
Copyright The Author(s) 2021
The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2021
– notice: The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID OT2
C6C
AAYXX
CITATION
3V.
7WY
7WZ
7XB
87Z
8FK
8FL
ABUWG
AFKRA
BENPR
BEZIV
CCPQU
DWQXO
FRNLG
F~G
K60
K6~
L.-
M0C
PQBIZ
PQBZA
PQEST
PQQKQ
PQUKI
PYYUZ
Q9U
DOI 10.1007/s13385-021-00290-1
DatabaseName EconStor
SpringerOpen
CrossRef
ProQuest Central (Corporate)
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central
AUTh Library subscriptions: ProQuest Central
Business Premium Collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
ABI/INFORM Professional Advanced
ABI/INFORM Global
One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ABI/INFORM Collection China
ProQuest Central Basic
DatabaseTitle CrossRef
Business Premium Collection
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
ABI/INFORM Global
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ABI/INFORM China
ProQuest Business Collection
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest One Business (Alumni)
ProQuest One Academic
ABI/INFORM Complete (Alumni Edition)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList CrossRef


Business Premium Collection
Database_xml – sequence: 1
  dbid: C6C
  name: SpringerOpen
  url: http://www.springeropen.com/
  sourceTypes: Publisher
– sequence: 2
  dbid: BENPR
  name: AUTh Library subscriptions: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Business
Economics
Mathematics
EISSN 2190-9741
EndPage 85
ExternalDocumentID 10_1007_s13385_021_00290_1
287528
GeographicLocations United States--US
GeographicLocations_xml – name: United States--US
GrantInformation_xml – fundername: Technische Universität München (1025)
GroupedDBID -EM
.VR
0R~
0VY
203
2J2
2JN
2KM
2LR
2VQ
30V
4.4
406
408
409
7WY
8FL
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABJNI
ABJOX
ABKCH
ABKTR
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BAPOH
BDATZ
BENPR
BEZIV
BGNMA
CCPQU
CSCUP
DDRTE
DNIVK
DPUIP
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
HF~
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
IKXTQ
ITM
IWAJR
IZIGR
J-C
J0Z
J9A
JBSCW
JCJTX
JZLTJ
KOV
LLZTM
M0C
M4Y
N2Q
N9A
NPVJJ
NQJWS
NU0
O9-
O93
O9I
O9J
OT2
PF0
PQBIZ
PQBZA
PQQKQ
PT4
R9I
ROL
RSV
S27
S3B
SAP
SHX
SISQX
SJYHP
SMT
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z81
ZMTXR
AAFGU
AAPBV
AAYFA
ABFGW
ABKAS
ACBMV
ACBRV
ACBYP
ACIGE
ACIPQ
ACTTH
ACVWB
ACWMK
ADMDM
ADOXG
AEFTE
AESTI
AEVTX
AFNRJ
AGGBP
AIMYW
AJDOV
AKQUC
C6C
UNUBA
AAYXX
CITATION
3V.
7XB
8FK
K60
K6~
L.-
PQEST
PQUKI
Q9U
ID FETCH-LOGICAL-c385t-3c6b50ec3b49f6ae5cfdc728a0aef0a0ff59e5005a5deb569b9308076bafac4d3
IEDL.DBID BENPR
ISSN 2190-9741
2190-9733
IngestDate Thu Oct 10 22:03:45 EDT 2024
Wed Sep 11 13:28:17 EDT 2024
Sat Dec 16 12:08:01 EST 2023
Fri Oct 18 12:08:05 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Cyber insurance
Accumulation risk
Cyber risk
Marked point processes
Emerging risks
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c385t-3c6b50ec3b49f6ae5cfdc728a0aef0a0ff59e5005a5deb569b9308076bafac4d3
ORCID 0000-0003-4505-5753
OpenAccessLink https://proxy.k.utb.cz/login?url=http://link.springer.com/10.1007/s13385-021-00290-1
PQID 2920177618
PQPubID 2043916
PageCount 53
ParticipantIDs proquest_journals_2920177618
crossref_primary_10_1007_s13385_021_00290_1
springer_journals_10_1007_s13385_021_00290_1
econis_econstor_287528
PublicationCentury 2000
PublicationDate 2022-06-01
PublicationDateYYYYMMDD 2022-06-01
PublicationDate_xml – month: 06
  year: 2022
  text: 2022-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
– name: Berlin/Heidelberg
– name: Heidelberg
PublicationTitle European actuarial journal
PublicationTitleAbbrev Eur. Actuar. J
PublicationYear 2022
Publisher Springer
Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer
– name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References Agrafiotis, Nurse, Goldsmith, Creese, Upton (CR35) 2018; 4
Maillart, Sornette (CR53) 2010; 75
Xu, Schweitzer, Bateman, Xu (CR44) 2018; 13
Xu, Da, Xu (CR48) 2015; 11
Hofmann (CR18) 2007; 32
CR38
CR37
Peng, Xu, Xu, Hu (CR42) 2018; 45
Yang, Lui (CR32) 2014; 74
CR34
CR78
CR33
CR76
CR31
CR74
CR72
Edwards, Hofmeyr, Forrest (CR49) 2016; 2
CR70
Herath, Herath (CR40) 2011; 2
Peng, Xu, Xu, Hu (CR43) 2017; 44
MacKay (CR82) 2010
CR2
CR4
CR3
CR6
CR5
CR8
CR7
Hashemi, Ahmed, Khan (CR75) 2015; 34
CR9
Romanosky (CR55) 2016; 2
Eling (CR1) 2020; 10
Fahrenwaldt, Weber, Weske (CR46) 2018; 48
Daley, Vere-Jones (CR79) 2003
Baldwin, Gheyas, Ioannidis, Pym, Williams (CR45) 2017; 68
Mukhopadhyay, Chatterjee, Saha, Mahanti, Sadhukhan (CR41) 2013; 56
CR83
Blitzstein, Hwang (CR84) 2015
Marotta, Martinelli, Nanni, Orlando, Yautsiukhin (CR25) 2017; 24
Eling, Wirfs (CR56) 2019; 272
Zajdenweber (CR77) 1996; 63
Shim (CR30) 2012; 22
Wood (CR81) 2017
Romanosky, Ablon, Kuehn, Jones (CR15) 2019; 5
Daley, Vere-Jones (CR80) 2007
Cohen, Humphries, Veau, Francis (CR39) 2019; 14
Böhme, Laube, Riek (CR36) 2018; 11
Eling, Loperfido (CR50) 2017; 75
CR19
CR17
CR16
CR59
CR14
CR58
CR13
CR12
CR11
CR10
Andress (CR67) 2014
Boudreaux, Rao, Ferguson (CR73) 2013; 1
CR52
Biener, Eling, Wirfs (CR62) 2015; 40
Carfora, Martinelli, Mercaldo, Orlando (CR68) 2019; 14
Xu, Hua (CR47) 2019; 23
Mikosch (CR86) 2009
CR29
Chavez-Demoulin, Embrechts, Hofert (CR57) 2016; 83
CR28
Wald (CR85) 1944; 15
CR27
CR26
CR69
CR24
CR23
CR22
CR66
CR21
CR65
CR20
CR64
CR63
CR61
CR60
Wheatley, Maillart, Sornette (CR54) 2016; 89
Eling, Jung (CR51) 2018; 82
Bandyopadhyay, Mookerjee, Rao (CR71) 2009; 52
D Zajdenweber (290_CR77) 1996; 63
290_CR52
290_CR10
290_CR11
290_CR12
290_CR13
290_CR14
290_CR58
M Xu (290_CR47) 2019; 23
290_CR59
M Carfora (290_CR68) 2019; 14
290_CR16
290_CR17
C Peng (290_CR42) 2018; 45
SJ Hashemi (290_CR75) 2015; 34
H Herath (290_CR40) 2011; 2
290_CR19
D MacKay (290_CR82) 2010
M Eling (290_CR1) 2020; 10
T Maillart (290_CR53) 2010; 75
J Blitzstein (290_CR84) 2015
V Chavez-Demoulin (290_CR57) 2016; 83
S Romanosky (290_CR15) 2019; 5
290_CR60
290_CR61
290_CR2
290_CR3
290_CR63
290_CR4
290_CR20
M Eling (290_CR56) 2019; 272
290_CR64
290_CR21
290_CR65
290_CR22
290_CR66
290_CR23
290_CR24
M Xu (290_CR48) 2015; 11
290_CR69
290_CR26
290_CR27
290_CR28
290_CR29
M Eling (290_CR51) 2018; 82
S Wood (290_CR81) 2017
S Wheatley (290_CR54) 2016; 89
W Shim (290_CR30) 2012; 22
290_CR9
A Hofmann (290_CR18) 2007; 32
290_CR5
290_CR6
290_CR7
290_CR70
290_CR8
I Agrafiotis (290_CR35) 2018; 4
290_CR72
A Mukhopadhyay (290_CR41) 2013; 56
290_CR74
290_CR31
R Cohen (290_CR39) 2019; 14
290_CR76
290_CR33
290_CR34
290_CR78
S Romanosky (290_CR55) 2016; 2
290_CR37
290_CR38
B Edwards (290_CR49) 2016; 2
T Bandyopadhyay (290_CR71) 2009; 52
A Baldwin (290_CR45) 2017; 68
Z Yang (290_CR32) 2014; 74
DJ Daley (290_CR79) 2003
290_CR83
T Mikosch (290_CR86) 2009
D Boudreaux (290_CR73) 2013; 1
M Eling (290_CR50) 2017; 75
J Andress (290_CR67) 2014
M Xu (290_CR44) 2018; 13
R Böhme (290_CR36) 2018; 11
A Marotta (290_CR25) 2017; 24
M Fahrenwaldt (290_CR46) 2018; 48
C Biener (290_CR62) 2015; 40
A Wald (290_CR85) 1944; 15
DJ Daley (290_CR80) 2007
C Peng (290_CR43) 2017; 44
References_xml – volume: 2
  start-page: 121
  issue: 2
  year: 2016
  end-page: 135
  ident: CR55
  article-title: Examining the costs and causes of cyber incidents
  publication-title: J Cybersecur
  contributor:
    fullname: Romanosky
– ident: CR70
– ident: CR22
– volume: 83
  start-page: 735
  issue: 3
  year: 2016
  end-page: 776
  ident: CR57
  article-title: An extreme value approach for modeling operational risk losses depending on covariates
  publication-title: J Risk Insur
  doi: 10.1111/jori.12059
  contributor:
    fullname: Hofert
– ident: CR74
– volume: 74
  start-page: 1
  year: 2014
  end-page: 17
  ident: CR32
  article-title: Security adoption and influence of cyber-insurance markets in heterogeneous networks
  publication-title: Perform Eval
  doi: 10.1016/j.peva.2013.10.003
  contributor:
    fullname: Lui
– ident: CR4
– ident: CR16
– ident: CR12
– volume: 14
  start-page: 1
  issue: 3
  year: 2019
  end-page: 25
  ident: CR39
  article-title: An investigation of cyber loss data and its links to operational risk
  publication-title: J Oper Risk
  doi: 10.21314/JOP.2019.228
  contributor:
    fullname: Francis
– volume: 14
  start-page: 77
  issue: 4
  year: 2019
  end-page: 103
  ident: CR68
  article-title: Cyber risk management: an actuarial point of view
  publication-title: J Oper Risk
  contributor:
    fullname: Orlando
– year: 2009
  ident: CR86
  publication-title: Non-life insurance mathematics: an introduction with the Poisson process
  doi: 10.1007/978-3-540-88233-6
  contributor:
    fullname: Mikosch
– ident: CR29
– volume: 2
  start-page: 3
  issue: 1
  year: 2016
  end-page: 14
  ident: CR49
  article-title: Hype and heavy tails: a closer look at data breaches
  publication-title: J Cybersecur
  doi: 10.1093/cybsec/tyw003
  contributor:
    fullname: Forrest
– ident: CR61
– volume: 1
  start-page: 53
  issue: 1
  year: 2013
  end-page: 75
  ident: CR73
  article-title: Measuring losses for small business interruption claims
  publication-title: J Appl Risk Manag Insur
  contributor:
    fullname: Ferguson
– ident: CR8
– ident: CR58
– volume: 34
  start-page: 373
  issue: 4
  year: 2015
  end-page: 382
  ident: CR75
  article-title: Probabilistic modeling of business interruption and reputational losses for process facilities
  publication-title: Process Saf Prog
  doi: 10.1002/prs.11753
  contributor:
    fullname: Khan
– year: 2017
  ident: CR81
  publication-title: Generalized additive models: an introduction with R. Chapman & Hall/CRC texts in statistical science
  doi: 10.1201/9781315370279
  contributor:
    fullname: Wood
– ident: CR21
– ident: CR19
– volume: 13
  start-page: 2856
  issue: 11
  year: 2018
  end-page: 2871
  ident: CR44
  article-title: Modeling and predicting cyber hacking breaches
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2018.2834227
  contributor:
    fullname: Xu
– volume: 89
  start-page: 59
  issue: 1
  year: 2016
  ident: CR54
  article-title: The extreme risk of personal data breaches and the erosion of privacy
  publication-title: Eur Phys J B
  doi: 10.1140/epjb/e2015-60754-4
  contributor:
    fullname: Sornette
– volume: 56
  start-page: 11
  year: 2013
  end-page: 26
  ident: CR41
  article-title: Cyber-risk decision models: to insure it or not?
  publication-title: Decis Support Syst
  doi: 10.1016/j.dss.2013.04.004
  contributor:
    fullname: Sadhukhan
– year: 2010
  ident: CR82
  publication-title: Information theory, inference, and learning algorithms
  contributor:
    fullname: MacKay
– volume: 75
  start-page: 357
  issue: 3
  year: 2010
  end-page: 364
  ident: CR53
  article-title: Heavy-tailed distribution of cyber-risks
  publication-title: Eur Phys J B
  doi: 10.1140/epjb/e2010-00120-8
  contributor:
    fullname: Sornette
– volume: 272
  start-page: 1109
  issue: 3
  year: 2019
  end-page: 1119
  ident: CR56
  article-title: What are the actual costs of cyber risk events?
  publication-title: Eur J Oper Res
  doi: 10.1016/j.ejor.2018.07.021
  contributor:
    fullname: Wirfs
– volume: 15
  start-page: 283
  issue: 3
  year: 1944
  end-page: 296
  ident: CR85
  article-title: On cumulative sums of random variables
  publication-title: Ann Math Stat
  doi: 10.1214/aoms/1177731235
  contributor:
    fullname: Wald
– volume: 48
  start-page: 1175
  issue: 3
  year: 2018
  end-page: 1218
  ident: CR46
  article-title: Pricing of cyber insurance contracts in a network model
  publication-title: ASTIN Bull
  doi: 10.1017/asb.2018.23
  contributor:
    fullname: Weske
– year: 2003
  ident: CR79
  publication-title: An introduction to the theory of point processes: volume I: elementary theory and methods
  contributor:
    fullname: Vere-Jones
– year: 2014
  ident: CR67
  publication-title: The basics of information security: understanding the fundamentals of infosec in theory and practice
  contributor:
    fullname: Andress
– ident: CR11
– ident: CR9
– ident: CR60
– ident: CR78
– volume: 4
  start-page: tyy006
  issue: 1
  year: 2018
  ident: CR35
  article-title: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate
  publication-title: J Cybersecur
  contributor:
    fullname: Upton
– volume: 2
  start-page: 7
  issue: 1
  year: 2011
  end-page: 20
  ident: CR40
  article-title: Copula-based actuarial model for pricing cyber-insurance policies
  publication-title: Insur Mark Co
  contributor:
    fullname: Herath
– ident: CR5
– ident: CR64
– ident: CR26
– volume: 44
  start-page: 2534
  issue: 14
  year: 2017
  end-page: 2563
  ident: CR43
  article-title: Modeling and predicting extreme cyber attack rates via marked point processes
  publication-title: J Appl Stat
  doi: 10.1080/02664763.2016.1257590
  contributor:
    fullname: Hu
– volume: 82
  start-page: 167
  year: 2018
  end-page: 180
  ident: CR51
  article-title: Copula approaches for modeling cross-sectional dependence of data breach losses
  publication-title: Insur Math Econ
  doi: 10.1016/j.insmatheco.2018.07.003
  contributor:
    fullname: Jung
– volume: 10
  start-page: 303
  issue: 2
  year: 2020
  end-page: 333
  ident: CR1
  article-title: Cyber risk research in business and actuarial science
  publication-title: Eur Actuar J
  doi: 10.1007/s13385-020-00250-1
  contributor:
    fullname: Eling
– volume: 63
  start-page: 95
  issue: 1
  year: 1996
  ident: CR77
  article-title: Extreme values in business interruption insurance
  publication-title: J Risk Insur
  doi: 10.2307/253518
  contributor:
    fullname: Zajdenweber
– ident: CR66
– ident: CR72
– ident: CR14
– ident: CR2
– ident: CR37
– volume: 5
  start-page: 117
  issue: 1
  year: 2019
  ident: CR15
  article-title: Content analysis of cyber insurance policies: how do carriers price cyber risk?
  publication-title: J Cybersecur
  contributor:
    fullname: Jones
– ident: CR10
– ident: CR33
– volume: 68
  start-page: 780
  issue: 7
  year: 2017
  end-page: 791
  ident: CR45
  article-title: Contagion in cyber security attacks
  publication-title: J Oper Res Soc
  doi: 10.1057/jors.2016.37
  contributor:
    fullname: Williams
– ident: CR6
– volume: 40
  start-page: 131
  issue: 1
  year: 2015
  end-page: 158
  ident: CR62
  article-title: Insurability of cyber risk: an empirical analysis
  publication-title: Geneva Pap Risk Insur Issues Pract
  doi: 10.1057/gpp.2014.19
  contributor:
    fullname: Wirfs
– year: 2007
  ident: CR80
  publication-title: An introduction to the theory of point processes: volume II: general theory and structure. Probability and its applications
  contributor:
    fullname: Vere-Jones
– ident: CR63
– ident: CR27
– volume: 75
  start-page: 126
  year: 2017
  end-page: 136
  ident: CR50
  article-title: Data breaches: goodness of fit, pricing, and risk measurement
  publication-title: Insur Math Econ
  doi: 10.1016/j.insmatheco.2017.05.008
  contributor:
    fullname: Loperfido
– ident: CR23
– volume: 45
  start-page: 2718
  issue: 15
  year: 2018
  end-page: 2740
  ident: CR42
  article-title: Modeling multivariate cybersecurity risks
  publication-title: J Appl Stat
  doi: 10.1080/02664763.2018.1436701
  contributor:
    fullname: Hu
– volume: 52
  start-page: 68
  issue: 11
  year: 2009
  ident: CR71
  article-title: Why IT managers don’t go for cyber-insurance products
  publication-title: Commun ACM
  doi: 10.1145/1592761.1592780
  contributor:
    fullname: Rao
– volume: 11
  start-page: 62
  issue: 1
  year: 2015
  end-page: 92
  ident: CR48
  article-title: Cyber epidemic models with dependences
  publication-title: Internet Math
  doi: 10.1080/15427951.2014.902407
  contributor:
    fullname: Xu
– ident: CR69
– year: 2015
  ident: CR84
  publication-title: Introduction to probability. Texts in statistical science
  contributor:
    fullname: Hwang
– volume: 32
  start-page: 91
  issue: 1
  year: 2007
  end-page: 111
  ident: CR18
  article-title: Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks
  publication-title: Geneva Risk Insur Rev
  doi: 10.1007/s10713-007-0004-2
  contributor:
    fullname: Hofmann
– volume: 11
  start-page: 161
  issue: 2
  year: 2018
  end-page: 185
  ident: CR36
  article-title: A fundamental approach to cyber risk analysis
  publication-title: Variance
  contributor:
    fullname: Riek
– ident: CR65
– ident: CR3
– ident: CR38
– ident: CR52
– ident: CR17
– ident: CR31
– ident: CR13
– volume: 22
  start-page: 79
  issue: 1
  year: 2012
  end-page: 101
  ident: CR30
  article-title: An analysis of information security management strategies in the presence of interdependent security risk
  publication-title: Asia Pac J Inf Syst
  contributor:
    fullname: Shim
– ident: CR34
– volume: 24
  start-page: 35
  year: 2017
  end-page: 61
  ident: CR25
  article-title: Cyber-insurance survey
  publication-title: Comput Sci Rev
  doi: 10.1016/j.cosrev.2017.01.001
  contributor:
    fullname: Yautsiukhin
– ident: CR7
– ident: CR59
– ident: CR76
– ident: CR83
– ident: CR28
– ident: CR24
– ident: CR20
– volume: 23
  start-page: 220
  issue: 2
  year: 2019
  end-page: 249
  ident: CR47
  article-title: Cybersecurity insurance: modeling and pricing
  publication-title: N Am Actuar J
  doi: 10.1080/10920277.2019.1566076
  contributor:
    fullname: Hua
– ident: 290_CR33
– ident: 290_CR10
– ident: 290_CR14
– ident: 290_CR52
– ident: 290_CR83
  doi: 10.1093/oso/9780198536932.001.0001
– volume-title: Information theory, inference, and learning algorithms
  year: 2010
  ident: 290_CR82
  contributor:
    fullname: D MacKay
– ident: 290_CR20
– ident: 290_CR27
  doi: 10.1145/2566468.2566481
– volume: 52
  start-page: 68
  issue: 11
  year: 2009
  ident: 290_CR71
  publication-title: Commun ACM
  doi: 10.1145/1592761.1592780
  contributor:
    fullname: T Bandyopadhyay
– volume-title: Introduction to probability. Texts in statistical science
  year: 2015
  ident: 290_CR84
  contributor:
    fullname: J Blitzstein
– volume: 74
  start-page: 1
  year: 2014
  ident: 290_CR32
  publication-title: Perform Eval
  doi: 10.1016/j.peva.2013.10.003
  contributor:
    fullname: Z Yang
– ident: 290_CR7
– volume-title: An introduction to the theory of point processes: volume II: general theory and structure. Probability and its applications
  year: 2007
  ident: 290_CR80
  contributor:
    fullname: DJ Daley
– ident: 290_CR24
– volume: 11
  start-page: 62
  issue: 1
  year: 2015
  ident: 290_CR48
  publication-title: Internet Math
  doi: 10.1080/15427951.2014.902407
  contributor:
    fullname: M Xu
– ident: 290_CR17
  doi: 10.1109/INFOCOM.2008.259
– ident: 290_CR11
– ident: 290_CR78
– volume: 82
  start-page: 167
  year: 2018
  ident: 290_CR51
  publication-title: Insur Math Econ
  doi: 10.1016/j.insmatheco.2018.07.003
  contributor:
    fullname: M Eling
– volume: 44
  start-page: 2534
  issue: 14
  year: 2017
  ident: 290_CR43
  publication-title: J Appl Stat
  doi: 10.1080/02664763.2016.1257590
  contributor:
    fullname: C Peng
– volume: 5
  start-page: 117
  issue: 1
  year: 2019
  ident: 290_CR15
  publication-title: J Cybersecur
  doi: 10.1093/cybsec/tyz002
  contributor:
    fullname: S Romanosky
– volume: 13
  start-page: 2856
  issue: 11
  year: 2018
  ident: 290_CR44
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2018.2834227
  contributor:
    fullname: M Xu
– ident: 290_CR28
  doi: 10.1109/Allerton.2013.6736604
– ident: 290_CR70
– ident: 290_CR6
– ident: 290_CR22
  doi: 10.1007/978-3-642-13869-0_23
– volume-title: Non-life insurance mathematics: an introduction with the Poisson process
  year: 2009
  ident: 290_CR86
  doi: 10.1007/978-3-540-88233-6
  contributor:
    fullname: T Mikosch
– volume: 56
  start-page: 11
  year: 2013
  ident: 290_CR41
  publication-title: Decis Support Syst
  doi: 10.1016/j.dss.2013.04.004
  contributor:
    fullname: A Mukhopadhyay
– ident: 290_CR63
– volume: 4
  start-page: tyy006
  issue: 1
  year: 2018
  ident: 290_CR35
  publication-title: J Cybersecur
  doi: 10.1093/cybsec/tyy006
  contributor:
    fullname: I Agrafiotis
– volume: 40
  start-page: 131
  issue: 1
  year: 2015
  ident: 290_CR62
  publication-title: Geneva Pap Risk Insur Issues Pract
  doi: 10.1057/gpp.2014.19
  contributor:
    fullname: C Biener
– volume-title: Generalized additive models: an introduction with R. Chapman & Hall/CRC texts in statistical science
  year: 2017
  ident: 290_CR81
  doi: 10.1201/9781315370279
  contributor:
    fullname: S Wood
– volume: 10
  start-page: 303
  issue: 2
  year: 2020
  ident: 290_CR1
  publication-title: Eur Actuar J
  doi: 10.1007/s13385-020-00250-1
  contributor:
    fullname: M Eling
– ident: 290_CR21
  doi: 10.1145/1403027.1403037
– volume: 24
  start-page: 35
  year: 2017
  ident: 290_CR25
  publication-title: Comput Sci Rev
  doi: 10.1016/j.cosrev.2017.01.001
  contributor:
    fullname: A Marotta
– volume: 32
  start-page: 91
  issue: 1
  year: 2007
  ident: 290_CR18
  publication-title: Geneva Risk Insur Rev
  doi: 10.1007/s10713-007-0004-2
  contributor:
    fullname: A Hofmann
– ident: 290_CR31
– ident: 290_CR58
– volume: 14
  start-page: 77
  issue: 4
  year: 2019
  ident: 290_CR68
  publication-title: J Oper Risk
  contributor:
    fullname: M Carfora
– ident: 290_CR2
  doi: 10.12968/sece.2017.25.8
– ident: 290_CR34
  doi: 10.1109/INFOCOM.2014.6847944
– volume: 11
  start-page: 161
  issue: 2
  year: 2018
  ident: 290_CR36
  publication-title: Variance
  contributor:
    fullname: R Böhme
– ident: 290_CR26
  doi: 10.2139/ssrn.1593137
– volume-title: The basics of information security: understanding the fundamentals of infosec in theory and practice
  year: 2014
  ident: 290_CR67
  contributor:
    fullname: J Andress
– ident: 290_CR12
– volume: 22
  start-page: 79
  issue: 1
  year: 2012
  ident: 290_CR30
  publication-title: Asia Pac J Inf Syst
  contributor:
    fullname: W Shim
– ident: 290_CR16
– volume: 68
  start-page: 780
  issue: 7
  year: 2017
  ident: 290_CR45
  publication-title: J Oper Res Soc
  doi: 10.1057/jors.2016.37
  contributor:
    fullname: A Baldwin
– ident: 290_CR9
– ident: 290_CR5
– volume: 89
  start-page: 59
  issue: 1
  year: 2016
  ident: 290_CR54
  publication-title: Eur Phys J B
  doi: 10.1140/epjb/e2015-60754-4
  contributor:
    fullname: S Wheatley
– volume: 63
  start-page: 95
  issue: 1
  year: 1996
  ident: 290_CR77
  publication-title: J Risk Insur
  doi: 10.2307/253518
  contributor:
    fullname: D Zajdenweber
– ident: 290_CR29
  doi: 10.1007/978-1-4419-6967-5_12
– volume: 272
  start-page: 1109
  issue: 3
  year: 2019
  ident: 290_CR56
  publication-title: Eur J Oper Res
  doi: 10.1016/j.ejor.2018.07.021
  contributor:
    fullname: M Eling
– ident: 290_CR60
– volume: 48
  start-page: 1175
  issue: 3
  year: 2018
  ident: 290_CR46
  publication-title: ASTIN Bull
  doi: 10.1017/asb.2018.23
  contributor:
    fullname: M Fahrenwaldt
– ident: 290_CR64
– volume: 1
  start-page: 53
  issue: 1
  year: 2013
  ident: 290_CR73
  publication-title: J Appl Risk Manag Insur
  contributor:
    fullname: D Boudreaux
– ident: 290_CR19
  doi: 10.1109/INFCOM.2009.5062066
– volume: 83
  start-page: 735
  issue: 3
  year: 2016
  ident: 290_CR57
  publication-title: J Risk Insur
  doi: 10.1111/jori.12059
  contributor:
    fullname: V Chavez-Demoulin
– volume: 2
  start-page: 3
  issue: 1
  year: 2016
  ident: 290_CR49
  publication-title: J Cybersecur
  doi: 10.1093/cybsec/tyw003
  contributor:
    fullname: B Edwards
– volume: 75
  start-page: 357
  issue: 3
  year: 2010
  ident: 290_CR53
  publication-title: Eur Phys J B
  doi: 10.1140/epjb/e2010-00120-8
  contributor:
    fullname: T Maillart
– volume: 45
  start-page: 2718
  issue: 15
  year: 2018
  ident: 290_CR42
  publication-title: J Appl Stat
  doi: 10.1080/02664763.2018.1436701
  contributor:
    fullname: C Peng
– volume: 23
  start-page: 220
  issue: 2
  year: 2019
  ident: 290_CR47
  publication-title: N Am Actuar J
  doi: 10.1080/10920277.2019.1566076
  contributor:
    fullname: M Xu
– ident: 290_CR38
– ident: 290_CR76
– ident: 290_CR13
– ident: 290_CR59
– ident: 290_CR72
– volume: 15
  start-page: 283
  issue: 3
  year: 1944
  ident: 290_CR85
  publication-title: Ann Math Stat
  doi: 10.1214/aoms/1177731235
  contributor:
    fullname: A Wald
– ident: 290_CR74
  doi: 10.1109/WSC.2004.1371476
– volume: 2
  start-page: 121
  issue: 2
  year: 2016
  ident: 290_CR55
  publication-title: J Cybersecur
  contributor:
    fullname: S Romanosky
– ident: 290_CR69
– ident: 290_CR4
– volume: 2
  start-page: 7
  issue: 1
  year: 2011
  ident: 290_CR40
  publication-title: Insur Mark Co
  contributor:
    fullname: H Herath
– volume: 75
  start-page: 126
  year: 2017
  ident: 290_CR50
  publication-title: Insur Math Econ
  doi: 10.1016/j.insmatheco.2017.05.008
  contributor:
    fullname: M Eling
– volume: 34
  start-page: 373
  issue: 4
  year: 2015
  ident: 290_CR75
  publication-title: Process Saf Prog
  doi: 10.1002/prs.11753
  contributor:
    fullname: SJ Hashemi
– ident: 290_CR3
  doi: 10.1016/S1353-4858(19)30032-7
– ident: 290_CR8
– volume-title: An introduction to the theory of point processes: volume I: elementary theory and methods
  year: 2003
  ident: 290_CR79
  contributor:
    fullname: DJ Daley
– volume: 14
  start-page: 1
  issue: 3
  year: 2019
  ident: 290_CR39
  publication-title: J Oper Risk
  doi: 10.21314/JOP.2019.228
  contributor:
    fullname: R Cohen
– ident: 290_CR23
– ident: 290_CR37
  doi: 10.5089/9781484360750.001
– ident: 290_CR65
– ident: 290_CR66
  doi: 10.1108/JRF-09-2016-0122
– ident: 290_CR61
SSID ssj0001934965
Score 2.3945308
Snippet After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is...
Abstract After scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point...
SourceID proquest
crossref
springer
econis
SourceType Aggregation Database
Publisher
StartPage 33
SubjectTerms Accumulation risk
Actuarial science
Applications of Mathematics
Binomial distribution
Cyber insurance
Cyber risk
Data integrity
Economics
Emerging risks
Financial Services
Game Theory
Liability insurance
Literature reviews
Losses
Marked point processes
Mathematics
Mathematics and Statistics
Network security
Original Research Paper
Quantitative Finance
Risk management
Social and Behav. Sciences
Stochastic models
SummonAdditionalLinks – databaseName: SpringerLINK - Czech Republic Consortium
  dbid: AGYKE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTxsxEB6hpGrLgbYpiECofODWLtqHvRsfIwSNQPSUSHCy_Fo1QmyiZHNof31n9sGWPg45eSXvQ_bYOzOe75sBOI916Cy3IkDjlQdc2izQUmQBKkPUjvE4Eo7OO-6-pdM5v7kX9x2PuwK7txHJ6kfdcd3QmSIyMXq_YSzDAF2ePhFPRQ_6k68Pt78drcgqCzqVlSOitMySpKHL_PtFL1TSK_JDF5sXBucfMdJK9Vy_g1lL4KkRJ48X29Jc2J9_53PcZVTv4aAxRdmkXjsfYM8XA3jdIuEH8KYlLeP1_t1zetfNR_ATRlD0tf9ew99ZVU-Hof3L7A_j14wA64wUpGPLgj0RBMix1XJRlGxVMxP8hunCsUWJbRdDZ-WSETqeqn34Q5hfX80up0FTryGwOIgySGxqROhtYrjMU-2FzZ3N4rEOtc9DHea5kF7gttfCeSNSaWSCBmuWGp1ry11yBL1iWfhjYElkDEfbxeFTnHtnqIC7jHMrUJdq7obwuRWZWtVpOVSXgJnmVOGcqmpOVTSEo1qqihpCnSp0FEU8HsKolbJq9u5GUf2uKMvSCLu_tFLruv__mZPdbj-FtzFxKaojnRH0yvXWn6GFU5pPzYr-BbPd75Q
  priority: 102
  providerName: Springer Nature
Title A comprehensive model for cyber risk based on marked point processes and its application to insurance
URI https://www.econstor.eu/handle/10419/287528
https://link.springer.com/article/10.1007/s13385-021-00290-1
https://www.proquest.com/docview/2920177618
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1La9tAEB4au5ReQps2xE1q9tBbKiqtdiXvKTjGaWhIKCGG9LTsS8SHSK6tHPLvO6MHIoX2oj0ISWj2Md_MfrMfwBduYu-EkxGCVxEJ5fLIKJlH6AzRO_JZIj3lO65vssuV-HEv77uE266jVfZrYrNQ-8pRjvwbqSolOQbds7PN74hUo2h3tZPQ2IMxx0iBj2B8vrz5eTtkWVRzIDopzFHNtMrTtKucaevnMECjAmWMqGOO95MX3uk1haTr3Qvs-dd2aeOFLt7Bfgcf2bzt7_fwKpQH8KZnr3-AMGdEEt-Gh5aYzhqlG4bIlLlnG7aMqOSMXJdnVckeiZzj2aZalzXbtDUDYcdM6dm6xnbY3WZ1xYi3Tjoc4SOsLpZ3i8uoU1KIHP5gHaUuszIOLrVCFZkJ0hXe5XxmYhOK2MRFIVWQOCGN9MHKTFmVIpTMM2sK44RPD2FUVmU4ApYm1gpEFR6fEiJ4S9LqihdOopczwk_gtLeg3rQHZujhaGSyt0Z768beOpnAYWtkTQ3xQTWGcJLPJnDSG113s2qnhzEwga99Rwy3__2ZT_9_2zG85VTV0CRXTmBUb5_CZ8QatZ3CeP7919Vy2g2sKewtsgVeV3z-B7Vi0yc
link.rule.ids 315,783,787,21402,27938,27939,33758,41095,41134,41537,42164,42203,42606,43819,51590,52125,52248
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1JS-RAFH64DKMX0RnFdps6eHOCWaqSrpOoKO2ojYiCt6K2YB9M2u548N_7XhaCwniqQ5GEvFre9r33ARzGOnSWWxGg8coDLm0WaCmyAJUhasd4GAlH8Y7bcTp65P-exFMbcJu3sMruTqwvaldaipEfE6tSlKHTPTyZvgbEGkXZ1ZZCYxGWqVUV7urls4vx3X0fZZF1Q3RimKOaaZklSVs509TPoYNGBcroUYcxzkeftNMPckkn80-255d0aa2FLtdhrTUf2Wmz3huw4Itf8LNDr_8Gf8oIJD7zzw0wndVMNwwtU2bfjZ8xgpIzUl2OlQV7IXCOY9NyUlRs2tQM-DnThWOTCsc-u82qkhFunXg4_CY8Xl48nI-ClkkhsPiDVZDY1IjQ28RwmafaC5s7m8VDHWqfhzrMcyG9wAOphfNGpNLIBE3JLDU615a7ZAuWirLw28CSyBiOVoXDpzj3zhC1uoxzK1DLae4GcNRJUE2bhhmqb41M8lYob1XLW0UD2GqErGggPKhCF07EwwHsdUJX7amaq34PDOBvtxD99P8_s_P92_7Ayujh9kbdXI2vd2E1pgqHOtCyB0vV7M3vo91RmYN2c30AWqbSxw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3JTsMwELUQIJYDggKirD5wg4gsdlIfUaFiK-JAJW6Wt4geSKo2HPh7ZrIQiuDAyZGcRfbEmjf2ezOEnIbKt4YZ7gF4ZR4TJvGU4IkHzhC8Y9gLuMX9juFjfDNidy_85ZuKv2S7N0eSlaYBszRlxcXEphet8A0iK1QWQyjsh8L3IP5ZYkEQYfb8ftxvd1lEmRAdK8yhZlokUVQrZ35_zZx3WsaQdDybw54_jktLLzTYJBs1fKSXlb23yILLOmSlYa93yGojNIbr9eFXStbZNnGXFOnjU_daUdZpWQOHAmal5kO7KUWSOUWnZmme0Tek7Vg6ycdZQSeVmsDNqMosHRfQtufetMgpMtqxQofbIaPB9XP_xqtrLHgGhl54kYk1952JNBNprBw3qTVJ2FO-cqmv_DTlwnFYqopbp3kstIgAZCaxVqkyzEa7ZDHLM7dHaBRozQBvWHiKMWc1Fl0XYWo4-D_FbJecNXMrJ1UqDdkmTUZLSLCELC0hgy7ZraZfYoNMUQnBHQ97XXLYmEPW620mseZWkCRxAN3njYna7r8_s_-_20_IytPVQD7cPt4fkLUQpRDljswhWSym7-4IAEqhj8t_8BM1n9qj
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+comprehensive+model+for+cyber+risk+based+on+marked+point+processes+and+its+application+to+insurance&rft.jtitle=European+actuarial+journal&rft.au=Zeller%2C+Gabriela&rft.au=Scherer%2C+Matthias&rft.date=2022-06-01&rft.pub=Springer+Nature+B.V&rft.issn=2190-9733&rft.eissn=2190-9741&rft.volume=12&rft.issue=1&rft.spage=33&rft.epage=85&rft_id=info:doi/10.1007%2Fs13385-021-00290-1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2190-9741&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2190-9741&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2190-9741&client=summon