[PDF][PDF] A game theory method to cyber-threat information sharing in cloud computing technology

M Amini, Z Bozorgasl - International Journal of Information System …, 2023 - papers.ssrn.com
Cybersecurity is a top priority in industry, academia, and government, and information
sharing about cyber-threats between different organizations has the potential to maximize …

Information sharing in cybersecurity: A review

A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …

Systematically understanding cybersecurity economics: A survey

M Kianpour, SJ Kowalski, H Øverby - Sustainability, 2021 - mdpi.com
Insights in the field of cybersecurity economics empower decision makers to make informed
decisions that improve their evaluation and management of situations that may lead to …

A systematic literature review of cyber insurance challenges

B Aziz - … Conference on Information Technology Systems and …, 2020 - ieeexplore.ieee.org
This paper presents a systematic literature review of the challenges in cyber insurance. The
study uses PRISMA to obtain transparent results. This review summarized sectors which risk …

[HTML][HTML] Knowledge absorption for cyber-security: The role of human beliefs

DP David, MM Keupp, A Mermoud - Computers in Human Behavior, 2020 - Elsevier
We investigate how human beliefs are associated with the absorption of specialist
knowledge that is required to produce cyber-security. We ground our theorizing in the …

[LIBRO][B] Cybercrimes: Critical issues in a global context

A Lavorgna - 2020 - books.google.com
This new textbook offers a systematic introduction to a wide array of cybercrimes, exploring
their diversity and the range of possible responses to them. Combining coverage of …

Affirmative and silent cyber coverage in traditional insurance policies: Qualitative content analysis of selected insurance products from the German insurance market

D Wrede, T Stegen… - The Geneva Papers on …, 2020 - Springer
This paper examines the design of affirmative and silent coverage in view of the cyber risks
in traditional insurance policies for select product lines on the German market. Given the …

Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments

J Dykstra, LA Gordon, MP Loeb… - Journal of …, 2023 - academic.oup.com
The primary objective of the current study is to analytically examine the economic benefits
an organization can obtain by receiving and processing cyber threat intelligence (CTI) …

[HTML][HTML] Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime

C Barreto, O Reinert, T Wiesinger, U Franke - Computers & Security, 2023 - Elsevier
We study the impact of data sharing policies on cyber insurance markets. These policies
have been proposed to address the scarcity of data about cyber threats, which is essential to …

A web platform for integrated vulnerability assessment and cyber risk management

P Russo, A Caponi, M Leuti, G Bianchi - Information, 2019 - mdpi.com
Cyber risk management is a very important problem for every company connected to the
internet. Usually, risk management is done considering only Risk Analysis without …