C-R-P-M-I: A Framework to Model Cyber-Risk from Phishing and Mitigation through Cyber Insurance Emergent Research Forum (ERF)

被引:0
作者
Mukhopadhyay, Arunabha [1 ]
Biswas, Baidyanath [1 ]
Pal, Shounak [1 ]
机构
[1] IIM Lucknow, Lucknow, Uttar Pradesh, India
来源
AMCIS 2018 PROCEEDINGS | 2018年
关键词
Phishing; IT risk; cyber-insurance; cyber-risk mitigation; SECURITY INVESTMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Increasing cyber-attacks and breaches lead to financial losses in organizations. Throughout this research-in-progress study, we propose the C-R-P-M-I framework to analyze the following - (i) likelihood of an expert hacker, (ii) likelihood of phishing attack on the firm, given that it has sufficiently invested in the preventive measures, (iii) likelihood of successful detection by the firm, and (iv) procure cyber insurance from 3rd party based on the possible risk-attitude of the organization- risk-averse, risk-neutral, and constant-risk. We assume that a firm with insurance enjoys more utility than the one without it. Additionally, we consider three separate function forms to represent the risk-attitudes-linear, quadratic, and logarithmic. In this manner, we outline a novel study in information security that computes the insurance premium to be paid by the firm depending on the intensity as well as the likelihood of attack, which was ignored by extant literature.
引用
收藏
页数:5
相关论文
共 22 条
[1]  
[Anonymous], 2019, Information Systems Frontiers, DOI [DOI 10.1007/S10796-017-9808-5, 10.1007/s10796-017-9808-5]
[2]  
[Anonymous], 2005, WEIS
[3]  
Biswas, 2018, P 51 HAW INT C SYST
[4]  
Biswas A, 2017, INT CONF SPACE OPT S, P23, DOI 10.1109/ICSOS.2017.8357206
[5]  
Biswas B., 2016, P 22 AM C INF SYST
[6]   G-RAM framework for software risk assessment and mitigation strategies in organisations [J].
Biswas, Baidyanath ;
Mukhopadhyay, Arunabha .
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2018, 31 (02) :276-299
[7]   The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2004, 9 (01) :69-104
[8]  
Crume J., 2001, COMPUTER SECURITY J
[9]   Decision support approaches for cyber security investment [J].
Fielder, Andrew ;
Panaousis, Emmanouil ;
Malacaria, Pasquale ;
Hankin, Chris ;
Smeraldi, Fabrizio .
DECISION SUPPORT SYSTEMS, 2016, 86 :13-23
[10]   A game-theoretic analysis of information sharing and security investment for complementary firms [J].
Gao, Xing ;
Zhong, Weijun ;
Mei, Shue .
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (11) :1682-1691