Optimal Cyber Security Investment in a Mixed Risk Management Framework: Examining the Role of Cyber Insurance and Expenditure Analysis

被引:1
|
作者
Mazzoccoli, Alessandro [1 ]
机构
[1] Roma Tre Univ, Dept Econ, Via Silvio DAmico 77, I-00146 Rome, Italy
关键词
cyber insurance; breach probability function; cyber security; risk management; MODEL; MARKET; COSTS;
D O I
10.3390/risks11090154
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
Cyber security importance has escalated globally, driven by its pivotal role in shaping daily life, encompassing both personal and non-personal aspects. Cyber security breach probability functions play a crucial role in comprehending how cyber security investments affect vulnerability to cyber attacks. These functions employ mathematical models to guide decision making in cyber risk management. Thus, studying and improving them is useful in this context. In particular, using these models, this article explores the effectiveness of an integrated risk management strategy that merges insurance and security investments, aiming to minimize overall security expenses. Within this strategy, security investments contribute to reducing the insurance premium. This research investigates the optimal investment for this blended approach under total insurance coverage. When the integrated risk management strategy combining insurance and security investments is deemed the optimal choice, this paper reveals that the insurance premium tends to be the dominant component in the overall security expense in the majority of cases. This implies that the cost of insurance outweighs the cost of security investments.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] A framework for incorporating insurance in critical infrastructure cyber risk strategies
    Young, Derek
    Lopez, Juan, Jr.
    Rice, Mason
    Ramsey, Benjamin
    McTasney, Robert
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2016, 14 : 43 - 57
  • [32] Cyber security of railway cyber-physical system (CPS) - A risk management methodology
    Wang, Zezhou
    Liu, Xiang
    COMMUNICATIONS IN TRANSPORTATION RESEARCH, 2022, 2
  • [33] Interplay between cyber supply chain risk management practices and cyber security performance
    Gani, Anisha Banu Dawood
    Fernando, Yudi
    Lan, Shulin
    Lim, Ming K.
    Tseng, Ming-Lang
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2023, 123 (03) : 843 - 861
  • [34] Content analysis of cyber insurance policies: how do carriers price cyber risk?
    Romanosky, Sasha
    Ablon, Lillian
    Kuehn, Andreas
    Jones, Therese
    JOURNAL OF CYBERSECURITY, 2019, 5 (01):
  • [35] Will Cyber-Insurance Improve Network Security? A Market Analysis
    Pal, Ranjan
    Golubchik, Leana
    Psounis, Konstantinos
    Hui, Pan
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 235 - 243
  • [36] WhatsApp: Cyber Security Risk Management, Governance and Control
    Khan, Rida
    Barakat, Salma
    AlAbduljabbar, Lulwah
    AlTayash, Yara
    AlMussa, Nofe
    AlQattan, Maryam
    Jamail, Nor Shahida Mohd
    2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 160 - 165
  • [37] A game theoretic approach to cyber security risk management
    Musman, Scott
    Turner, Andrew
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02): : 127 - 145
  • [38] Critical Infrastructure Cyber-Security Risk Management
    Spyridopoulos, Theodoros
    Maraslis, Konstantinos
    Tryfonas, Theo
    Oikonomou, George
    TERRORISTS' USE OF THE INTERNET: ASSESSMENT AND RESPONSE, 2017, 136 : 59 - 76
  • [39] Management's role in information security in a cyber economy
    Dutta, A
    McCrohan, K
    CALIFORNIA MANAGEMENT REVIEW, 2002, 45 (01) : 67 - +
  • [40] The Role of User Behaviour in Improving Cyber Security Management
    Moustafa, Ahmed A.
    Bello, Abubakar
    Maurushat, Alana
    FRONTIERS IN PSYCHOLOGY, 2021, 12