On Differentiating Cyber-Insurance Contracts A Topological Perspective

被引:0
|
作者
Pal, Ranjan [1 ]
Hui, Pan [2 ]
机构
[1] Univ Southern Calif, Los Angeles, CA 90089 USA
[2] HKUST & Deutsch Telekom Labs, New York, NY USA
关键词
cyber-insurance; contract discrimination; centrality;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent literature on cyber-insurance has stressed the importance of discriminating network users on insurance contracts for the following reasons: (i) preventing adverse selection, (ii) partly internalizing the negative externalities of interdependent security, (iii) achieving maximum social welfare, (iv) helping a risk-averse insurer to distribute costs of holding safety capital among its clients, and (v) insurers sustaining a fixed amount of profit per contract. Thus, an important problem is studying ways to appropriately execute the user discrimination process. In this paper we take a network topological perspective and propose a technique (mechanism) to pertinently contract discriminate insured network users. We mathematically show that the Bonacich/Eigenvector centralities of network users is an appropriate parameter for differentiating insurance clients.
引用
收藏
页码:836 / 839
页数:4
相关论文
共 50 条
  • [21] Expanding the Gordon-Loeb model to cyber-insurance
    Skeoch, Henry R. K.
    [J]. COMPUTERS & SECURITY, 2022, 112
  • [22] Navigating the cyber-insurance landscape to protect MSPs and their clients
    Mittel M.
    [J]. Computer Fraud and Security, 2020, 2020 (01): : 12 - 14
  • [23] Why IT Managers Don't Go for Cyber-Insurance Products
    Opadhyay, Tridib Bandy
    Mookerjee, Vijay S.
    Rao, Ram C.
    [J]. COMMUNICATIONS OF THE ACM, 2009, 52 (11) : 68 - 73
  • [24] Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
    Tosh, Deepak K.
    Shetty, Sachin
    Sengupta, Shamik
    Kesan, Jay P.
    Kamhoua, Charles A.
    [J]. GAME THEORY FOR NETWORKS (GAMENETS 2017), 2017, 212 : 154 - 164
  • [25] A Coalitional Cyber-Insurance Design Considering Power System Reliability and Cyber Vulnerability
    Lau, Pikkin
    Wang, Lingfeng
    Liu, Zhaoxi
    Wei, Wei
    Ten, Chee-Wooi
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2021, 36 (06) : 5512 - 5524
  • [26] An insurance theory based optimal cyber-insurance contract against moral hazard
    Dou, Wanchun
    Tang, Wenda
    Wu, Xiaotong
    Qi, Lianyong
    Xu, Xiaolong
    Zhang, Xuyun
    Hu, Chunhua
    [J]. INFORMATION SCIENCES, 2020, 527 : 576 - 589
  • [27] Optimal model design for the cyber-insurance contract with asymmetric information
    Yang, Yunxue
    Yang, Qin
    Yang, Zhenqi
    Xue, Shengjun
    [J]. 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 513 - 518
  • [28] Security adoption and influence of cyber-insurance markets in heterogeneous networks
    Yang, Zichao
    Lui, John C. S.
    [J]. PERFORMANCE EVALUATION, 2014, 74 : 1 - 17
  • [29] An expansion formula for Hawkes processes and application to cyber-insurance derivatives
    Hillairet, Caroline
    Reveillac, Anthony
    Rosenbaum, Mathieu
    [J]. STOCHASTIC PROCESSES AND THEIR APPLICATIONS, 2023, 160 : 89 - 119
  • [30] Embracing and controlling risk dependency in cyber-insurance policy underwriting
    Khalili, Mohammad Mahdi
    Liu, Mingyan
    Romanosky, Sasha
    [J]. JOURNAL OF CYBERSECURITY, 2019, 5 (01):