Cyber Risk and Insurance Coverage: An Actuarial Multistate Approach
This paper suggests a possible alternative, original and supplementary (that is, it does not replace nor keep out those standard procedures which have become legal obligations) solution to the issue of network security, whatever the connection tool may be. The procedures regulating activities of prevention, analysis and management of any cyber-attack (known as cyber risk as well as, in more serious cases when individual is involved, cyber-crime) are increasingly numerous, both in privately-owned concerns and in public administration as well. Hereinafter, a terminal is referred to as any device that can be connected to the web via the Internet and/or Intranet. Therefore, this paper does not aim at suggesting a technological solution ¨C a specific task for antivirus programmer ¨C but at formulating the actuarial premises for coverage in case of cyber damage, also known as cyber-insurance. On the analogy of the coverage regarding health insurance and following an actuarial multistate approach, three levels of damage will be identified with regard to the functionality of the terminal. Two typologies of computer policies are hypothesized: ADC (Activities of Daily Cyber) and GCU (Good Cyber Use).
Volume (Year): 4 (2014)
Issue (Month): (Feburary)
|Contact details of provider:|| Postal: |
Web page: http://www.bapress.ca
|Order Information:|| Postal: 17 Alton Towers Circle, Unit 101 Toronto, ON, M1V3L8, Canada|
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Bacinello, Anna Rita & Millossovich, Pietro & Olivieri, Annamaria & Pitacco, Ermanno, 2011. "Variable annuities: A unifying valuation approach," Insurance: Mathematics and Economics, Elsevier, vol. 49(3), pages 285-297.
When requesting a correction, please mention this item's handle: RePEc:bap:journl:140105. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Carlson)
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.