Vis enkel innførsel

dc.contributor.authorPandey, Pankaj
dc.contributor.authorSnekkenes, Einar
dc.date.accessioned2020-03-06T13:11:06Z
dc.date.available2020-03-06T13:11:06Z
dc.date.created2016-05-26T14:59:26Z
dc.date.issued2016
dc.identifier.citationFuture Internet. 2016, 8 (2), .nb_NO
dc.identifier.issn1999-5903
dc.identifier.urihttp://hdl.handle.net/11250/2645842
dc.description.abstractFor many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem of information asymmetry, lack of product diversity, illiquidity, high transaction cost, and so on. On the other hand, in theory, capital market-based financial instruments can provide a risk transfer mechanism with the ability to absorb the adverse impact of an information security event. Thus, this article addresses the limitations in the cyber-(re)insurance markets with a set of capital market-based financial instruments. This article presents a set of information security derivatives, namely options, vanilla options, swap, and futures that can be traded at an information security prediction market. Furthermore, this article demonstrates the usefulness of information security derivatives in a given scenario and presents an evaluation of the same in comparison with cyber-insurance. In our analysis, we found that the information security derivatives can at least be a partial solution to the problems in the cyber-insurance markets. The information security derivatives can be used as an effective tool for information elicitation and aggregation, cyber risk pricing, risk hedging, and strategic decision making for information security risk management.nb_NO
dc.language.isoengnb_NO
dc.publisherMDPInb_NO
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleUsing Financial Instruments to Transfer the Information Security Risksnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber62nb_NO
dc.source.volume8nb_NO
dc.source.journalFuture Internetnb_NO
dc.source.issue2nb_NO
dc.identifier.doi10.3390/fi8020020
dc.identifier.cristin1357791
dc.description.localcodec 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal