Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,876,911 papers from all fields of science
Search
Sign In
Create Free Account
Cyber-Insurance
Known as:
Cyber Liability
Cyber-insurance is an insurance product used to protect businesses and individual users from Internet-based risks, and more generally from risks…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Anti-spam techniques
Antivirus software
Computer security
Computer virus
Expand
Broader (1)
Internet security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Cyber Liability: Data Breach in Europe
Elena Jelmini Cellerini
,
C. Lang
2018
Corpus ID: 159881516
2018
2018
Cyber Risk Management with Risk Aware Cyber-Insurance in Blockchain Networks
Shaohan Feng
,
Zehui Xiong
,
D. Niyato
,
Ping Wang
,
S. S. Wang
,
Yang Zhang
Global Communications Conference
2018
Corpus ID: 67865802
Benefit from the capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous…
Expand
2017
2017
iTenant: How the Law Should Treat Rental Relationships in the Sharing Economy
Matthew Rosendahl
2017
Corpus ID: 169192152
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732 I. THE RISE OF AIRBNB AND THE ROOM…
Expand
2016
2016
Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security
Aron Laszka
,
G. Schwartz
Decision and Game Theory for Security
2016
Corpus ID: 28301170
We study users' incentives to become cybercriminals when network security is interdependent. We present a game-theoretic model in…
Expand
2016
2016
Protecting the Good, the Bad, and the Ugly: “Exposure” Data Breaches and Suggestions for Coping with Them
Yasmine Agelidis
2016
Corpus ID: 157672879
Samuel Warren and Justice Louis Brandeis recognized the right to be “let alone” in their famous article The Right to Privacy over…
Expand
2011
2011
Pricing and Investments in Internet Security: A Cyber-Insurance Perspective
R. Pal
,
L. Golubchik
arXiv.org
2011
Corpus ID: 9346251
Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses…
Expand
2009
2009
An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents
Frank Innerhofer-Oberperfler
,
R. Breu
ARES
2009
Corpus ID: 14945598
In this paper we focus on the losses related to information and IT security incidents. The loss dimension in terms of business…
Expand
2007
2007
A critical examination of the advantages and disadvantages of the E — Insurance and how they explain its small penetration in the Greek Market
Despina C. Anargiridou
,
S. Anargiridis
,
D. Papadopoulos
Operational Research
2007
Corpus ID: 3020278
E-insurance covers the web-based enterprises from attacks; it offers data protection, coverage for loss of intellectual property…
Expand
2006
2006
On the Limits of Cyber-Insurance
Rainer Böhme
,
G. Kataria
Trust and Privacy in Digital Business
2006
Corpus ID: 35683350
It has been argued that cyber-insurance will create the right kind of security atmosphere on the Internet. It will provide…
Expand
1984
1984
Dirks v. SEC: New Guidelines for Tippee Liability under Rule 10b-5
Kathleen Donelli
Pace Law Review
1984
Corpus ID: 159443515
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE