Skip to main content
Erschienen in: Information Systems Frontiers 2/2019

18.03.2017

A model to analyze the challenge of using cyber insurance

verfasst von: Tridib Bandyopadhyay, Vijay Mookerjee

Erschienen in: Information Systems Frontiers | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This work analyzes and extends insurance dynamics in the context of cyber risk. Cyber insurance contracts, when used as a means to manage residual cyber risk, could behave differently from other traditional (e.g., property) insurance. One important difference arises from the complexity involved in the post-breach decision of whether and how a firm should optimally plan to claim indemnity in the event of a cyber breach. We define different types of cyber breaches leading to different claiming scenarios, whose roots lie in the impact of secondary loss caused by certain but not all types of breaches. We build a model to capture the impact of secondary loss in structuring the use of cyber insurance and then combine the backward analysis of myriad breach scenarios to derive the overall optimal decision to purchase cyber insurance. We demonstrate that the optimal purchase decision depends on the mix of the types of cyber breaches that a firm faces. Numerical experiments corroborate market observation of limited use of cyber insurance after 20 years from when these products became available.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
For some recent cyber insurance contract pricings (albeit without the deductibles, which are equally determining of the premium structure), please see the pertinent webpage of Data Breach Insurance Inc., USA (https://​databreachinsura​ncequote.​com/​cyber-insurance/​cyber-insurance-data-breach-insurance-premiums/​)
 
3
It is an understandable posture of the managers. For example, in the 2014 third quarter filing, Home Depot has shown a $15 million cyber insurance receivable (McLeod 2015), which obviously depicts that a severe breach was realized. Had the case been a non-required disclosure breach, the balance sheet or flow statement would have made it apparent to the stakeholders of the event of a breach.
 
4
Raviv extends Arrow”s work and shows that risk preferences do not necessarily determine the forms of an optimal insurance contract and that an optimal contract may feature both deductible and coinsurance. In this research we restrict ourselves with a simple, general deductible based cyber insurance contract
 
6
In practice, cyber insurance providers employ interviews, questionnaires and other instruments as well as technical audits to appraise themselves of the state of residual risk after the technological controls are in place. The insured firm must agree to these inquisitions before a cyber insurance contract is written by the insurer.
 
7
For example see www.​aig.​com, www.​chubb.​com etc. by visiting their cyber insurance product pages
 
8
While the other expressions including the premiums and the profit functions remain same as those in CARA, the utility function for the CRRA function is U = qpLn(W − P − x1) + q(1 − p)Ln(W − P − a) + (1 − q)pLn(W − P).
 
9
Cavusoglu et al. (2004) estimate secondary losses somewhat below 4% for the firms in their dataset.
 
10
Cyber insurance providers routinely assess the security health of a prospective firm before offering a contract.
 
11
More of the perpetrators of current computer crime are motivated by money, not bragging rights (CSI survey, 2007).
 
12
for some small scale analysis of indemnity payout in cyber insurance, please refer to the 2011 and 2012 reports from Netdiligence Inc. at http://​netdiligence.​com/​files/​CyberLiability-0711sh.​pdf and http://​www.​resultstechnolog​y.​com/​files/​2013/​05/​2012-10-Cyber-Claims-Study.​pdf
 
14
Based on our private communications on the value of cyber insurance with CIOs/CISOs.
 
Literatur
Zurück zum Zitat 2008 Annual Study: Cost of a Date Breach - Understanding Financial Impact, Customer Turnover and Preventive Solutions. Ponemon Institute, LLC. 2008 Annual Study: Cost of a Date Breach - Understanding Financial Impact, Customer Turnover and Preventive Solutions. Ponemon Institute, LLC.
Zurück zum Zitat Anderson, R., & Moore, T. (2007). The economics of information security: A survey and open questions. Proceedings of the Fourth bi-annual Conference on the Economics of the Software and Internet Industries. France: Toulouse. Anderson, R., & Moore, T. (2007). The economics of information security: A survey and open questions. Proceedings of the Fourth bi-annual Conference on the Economics of the Software and Internet Industries. France: Toulouse.
Zurück zum Zitat Arrow, K. J. (1971). Essays in the theory of risk bearing. Chicago, IL: Markham Publishing Co. Arrow, K. J. (1971). Essays in the theory of risk bearing. Chicago, IL: Markham Publishing Co.
Zurück zum Zitat Baer, W. S. (2004). Private sector incentives for managing security. In E. O. Goldman (Ed.), National Security in the information age. Routledge. Baer, W. S. (2004). Private sector incentives for managing security. In E. O. Goldman (Ed.), National Security in the information age. Routledge.
Zurück zum Zitat Baer, W. S., & Parkinson, A. (2007). Cyber insurance in IT security management. IEEE Security and Privacy, 5(3), 50–56.CrossRef Baer, W. S., & Parkinson, A. (2007). Cyber insurance in IT security management. IEEE Security and Privacy, 5(3), 50–56.CrossRef
Zurück zum Zitat Bandyopadhyay, T., Mookerjee, V. S., & Rao, R. C. (2009). Why IT managers don't go for cyber-insurance products. Communications of the ACM, 52(11), 68–73.CrossRef Bandyopadhyay, T., Mookerjee, V. S., & Rao, R. C. (2009). Why IT managers don't go for cyber-insurance products. Communications of the ACM, 52(11), 68–73.CrossRef
Zurück zum Zitat Bohme, R. (2005). Cyber insurance revisited. Boston, USA: Proceedings of the Workshop on the Economics of Information Security. Bohme, R. (2005). Cyber insurance revisited. Boston, USA: Proceedings of the Workshop on the Economics of Information Security.
Zurück zum Zitat Bohme, R., & Kataria, G. (2006). Models and measures for correlation in cyber insurance. Boston USA: Proceedings of the Workshop on the Economics of Information Security. Bohme, R., & Kataria, G. (2006). Models and measures for correlation in cyber insurance. Boston USA: Proceedings of the Workshop on the Economics of Information Security.
Zurück zum Zitat Bohme, R., & Schwartz, G. (2010). Modeling cyber-insurance: Towards a unifying framework. Cambridge USA: Proceedings of the Workshop on the Economics of Information Security. Bohme, R., & Schwartz, G. (2010). Modeling cyber-insurance: Towards a unifying framework. Cambridge USA: Proceedings of the Workshop on the Economics of Information Security.
Zurück zum Zitat Borch, K. (1960). The safety loading of reinsurance premiums. Skandinavisk Aktuarietidtidskrift, 43, 163–184. Borch, K. (1960). The safety loading of reinsurance premiums. Skandinavisk Aktuarietidtidskrift, 43, 163–184.
Zurück zum Zitat Bowers, N. L., Gerber, H. U., Hickman, J. C., Jones, D. A., & Nesbit, C. J. (1997). Actuarial mathematics (2nd ed.). Schaumburg, IL: Society of Actuaries. Bowers, N. L., Gerber, H. U., Hickman, J. C., Jones, D. A., & Nesbit, C. J. (1997). Actuarial mathematics (2nd ed.). Schaumburg, IL: Society of Actuaries.
Zurück zum Zitat Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: empirical evidence from the stock market. The Journal of Computer Security, 11(3), 431–448.CrossRef Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: empirical evidence from the stock market. The Journal of Computer Security, 11(3), 431–448.CrossRef
Zurück zum Zitat Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcement on market value: capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 70–104.CrossRef Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcement on market value: capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 70–104.CrossRef
Zurück zum Zitat Fang, F., Parameswaran, M., Zhao, X., & Whinston, A. B. (2014). An economic mechanism to manage operational security risks for inter-organizational information systems. Information Systems Frontiers, 16(3), 399–416.CrossRef Fang, F., Parameswaran, M., Zhao, X., & Whinston, A. B. (2014). An economic mechanism to manage operational security risks for inter-organizational information systems. Information Systems Frontiers, 16(3), 399–416.CrossRef
Zurück zum Zitat Fourth Annual US Cost of Data Breach Study. (2008). Ponemon Institute LLC. Fourth Annual US Cost of Data Breach Study. (2008). Ponemon Institute LLC.
Zurück zum Zitat Gollier, C. (1996). Optimal insurance of approximate losses. The Journal of Risk and Insurance, 63(3), 369–380.CrossRef Gollier, C. (1996). Optimal insurance of approximate losses. The Journal of Risk and Insurance, 63(3), 369–380.CrossRef
Zurück zum Zitat Gollier, C., & Pratt, J. W. (1996). Risk vulnerability and the tempering effect of background risk. Econometrica, 64(5), 1109–1123.CrossRef Gollier, C., & Pratt, J. W. (1996). Risk vulnerability and the tempering effect of background risk. Econometrica, 64(5), 1109–1123.CrossRef
Zurück zum Zitat Gordon, L. A., Loeb, P. M., & Sohail, T. (2003). A framework for using insurance for cyber risk management. Communications of the ACM, 46(3), 81–85.CrossRef Gordon, L. A., Loeb, P. M., & Sohail, T. (2003). A framework for using insurance for cyber risk management. Communications of the ACM, 46(3), 81–85.CrossRef
Zurück zum Zitat Hartwig, R. P., & Wilkinson, C. (2014). Cyber risks, the growing threat. USA: Insurance Information Institute. Hartwig, R. P., & Wilkinson, C. (2014). Cyber risks, the growing threat. USA: Insurance Information Institute.
Zurück zum Zitat Johnson, T. A. (2014). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. USA: CRC Press. Johnson, T. A. (2014). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. USA: CRC Press.
Zurück zum Zitat Kovacs, P., Markham, M., Sweeting, R. (2004). Cyber incident risk in Canada and the role of cyber insurance. Institute for Catastrophic Loss Reduction. ICLR Research Paper Series - No. 38. Kovacs, P., Markham, M., Sweeting, R. (2004). Cyber incident risk in Canada and the role of cyber insurance. Institute for Catastrophic Loss Reduction. ICLR Research Paper Series - No. 38.
Zurück zum Zitat Meland, P. H., Inger, A. T., & Solhaug, B. (2015). Mitigating risk with cyber insurance. IEEE Security and Privacy, 6, 38–43.CrossRef Meland, P. H., Inger, A. T., & Solhaug, B. (2015). Mitigating risk with cyber insurance. IEEE Security and Privacy, 6, 38–43.CrossRef
Zurück zum Zitat Moore, T. (2005). Countering hidden-action attacks on networked systems. Proceedings of the Workshop on the Economics of Information Security. Cambridge: USA. Moore, T. (2005). Countering hidden-action attacks on networked systems. Proceedings of the Workshop on the Economics of Information Security. Cambridge: USA.
Zurück zum Zitat Mossin, J., & Smith, T. (1968). Aspects of rational insurance purchasing. Journal of Political Economy, 76, 533–568.CrossRef Mossin, J., & Smith, T. (1968). Aspects of rational insurance purchasing. Journal of Political Economy, 76, 533–568.CrossRef
Zurück zum Zitat Ogut, H., Raghunathan, S., & Menon, N. (2005). Cyber insurance and IT security investment: Impact of interdependent risk. Cambridge, USA: Proceedings of the Workshop on the Economics of Information Security. Ogut, H., Raghunathan, S., & Menon, N. (2005). Cyber insurance and IT security investment: Impact of interdependent risk. Cambridge, USA: Proceedings of the Workshop on the Economics of Information Security.
Zurück zum Zitat Pols, J., Parker, D. 2008. The great debate: security spending. Information Systems Security Association Journal, 6(4) ,21-25. Pols, J., Parker, D. 2008. The great debate: security spending. Information Systems Security Association Journal, 6(4) ,21-25.
Zurück zum Zitat Raviv, A. (1979). The design of an optimal insurance policy. American Economic Review, 69, 84–96. Raviv, A. (1979). The design of an optimal insurance policy. American Economic Review, 69, 84–96.
Zurück zum Zitat Schlesinger, H. (1981). The optimal level of deductibility in insurance contracts. The Journal of Risk and Insurance, 48(3), 465–481.CrossRef Schlesinger, H. (1981). The optimal level of deductibility in insurance contracts. The Journal of Risk and Insurance, 48(3), 465–481.CrossRef
Zurück zum Zitat Schwartz, G., Shetty, N., & Warland, J. (2010). Cyber-insurance: Missing market driven by user heterogeneity. Cambridge, USA: Proceedings of the Workshop on the Economics of Information Security. Schwartz, G., Shetty, N., & Warland, J. (2010). Cyber-insurance: Missing market driven by user heterogeneity. Cambridge, USA: Proceedings of the Workshop on the Economics of Information Security.
Zurück zum Zitat Siegel, C. A., Ty, R. S., & Serritella, P. (2002). Cyber-risk management: technical and insurance controls for enterprise-level security. Information Systems Security, 11(4), 33–49.CrossRef Siegel, C. A., Ty, R. S., & Serritella, P. (2002). Cyber-risk management: technical and insurance controls for enterprise-level security. Information Systems Security, 11(4), 33–49.CrossRef
Metadaten
Titel
A model to analyze the challenge of using cyber insurance
verfasst von
Tridib Bandyopadhyay
Vijay Mookerjee
Publikationsdatum
18.03.2017
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 2/2019
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-017-9737-3

Weitere Artikel der Ausgabe 2/2019

Information Systems Frontiers 2/2019 Zur Ausgabe