Content analysis of cyber insurance policies: how do carriers price cyber risk?

被引:77
作者
Romanosky, Sasha [1 ]
Ablon, Lillian [1 ]
Kuehn, Andreas [1 ]
Jones, Therese [1 ]
机构
[1] RAND Corp, 1200 South Hayes St, Arlington, VA 22202 USA
来源
JOURNAL OF CYBERSECURITY | 2019年 / 5卷 / 01期
关键词
cyber insurance; cyber liability; pricing cyber risk; thematic analysis; purposive sampling; QUALITATIVE RESEARCH;
D O I
10.1093/cybsec/tyz002
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Data breaches and security incidents have become commonplace, with thousands occurring each year and some costing hundreds of millions of dollars. Consequently, the market for insuring against these losses has grown rapidly in the past decade. While there exists much theoretical literature about cyber insurance, very little practical information is publicly available about the actual content of the polices and how carriers price cyber insurance premiums. This lack of transparency is especially troubling because insurance carriers are often cited as having the best information about cyber risk, and know how to assess - and differentiate - these risks across firms. In this qualitative research, we examined cyber insurance policies filed with state insurance commissioners and performed thematic (content) analysis to determine (i) what losses are covered by cyber insurance policies, and which are excluded?; (ii) what questions do carriers pose to applicants in order to assess risk?; and (iii) how are cyber insurance premiums determined - that is, what factors about the firm and its cybersecurity practices are used to compute the premiums? By analyzing these policies, we provide the first-ever systematic qualitative analysis of the underwriting process for cyber insurance and uncover how insurance companies understand and price cyber risks.
引用
收藏
页数:19
相关论文
共 36 条
  • [1] Airmic, AIRM REV REC DEV CYB
  • [2] Allianz, 2015, GUID CYB RISK MAN IM
  • [3] [Anonymous], 2010, WEIS
  • [4] Aon Benfield, 2014, INS RISK STUD GROWTH
  • [5] Cyberinsurance in IT security management
    Baer, Walter S.
    Parkinson, Andrew
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (03) : 50 - 56
  • [6] Betterley R., BETTERLEY REPORT
  • [7] Towards Insurable Network Architectures
    Boehme, Rainer
    [J]. IT-INFORMATION TECHNOLOGY, 2010, 52 (05): : 290 - 293
  • [8] Bohme R., 2006, WEIS
  • [9] Böhme R, 2006, LECT NOTES COMPUT SC, V4083, P31
  • [10] Document Analysis as a Qualitative Research Method
    Bowen, Glenn A.
    [J]. QUALITATIVE RESEARCH JOURNAL, 2009, 9 (02) : 27 - +