Cyberinsurance Policy Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks
Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management. As cybersecurity incidents-ranging from data breaches and denial-of-service attacks to computer fraud and ransomware-become more common, a cyberinsurance industry...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Cambridge
The MIT Press
2022
|
Series: | Information Policy
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_93165 | ||
005 | 20221025 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20221025s2022 xx |||||o ||| 0|eng d | ||
020 | |a mitpress/13665.001.0001 | ||
020 | |a 9780262370752 | ||
020 | |a 9780262544184 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7551/mitpress/13665.001.0001 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KFFN |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a JPRB |2 bicssc | |
100 | 1 | |a Wolff, Josephine |4 auth | |
245 | 1 | 0 | |a Cyberinsurance Policy |b Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks |
260 | |a Cambridge |b The MIT Press |c 2022 | ||
300 | |a 1 electronic resource (296 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Information Policy | |
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management. As cybersecurity incidents-ranging from data breaches and denial-of-service attacks to computer fraud and ransomware-become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early "Internet Security Liability" policies in the late 1990s to the expansive coverage offered today. Drawing on legal records, government reports, cyberinsurance policies, and interviews with regulators and insurers, Wolff finds that cyberinsurance has not improved cybersecurity or reduced cyber risks. Wolff examines the development of cyberinsurance, comparing it to other insurance sectors, including car and flood insurance; explores legal disputes between insurers and policyholders about whether cyber-related losses were covered under policies designed for liability, crime, or property and casualty losses; and traces the trend toward standalone cyberinsurance policies and government efforts to regulate and promote the industry. Cyberinsurance, she argues, is ineffective at curbing cybersecurity losses because it normalizes the payment of online ransoms, whereas the goal of cybersecurity is the opposite-to disincentivize such payments to make ransomware less profitable. An industry built on modeling risk has found itself confronted by new technologies before the risks posed by those technologies can be fully understood. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc-nd/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Insurance & actuarial studies |2 bicssc | |
650 | 7 | |a Network security |2 bicssc | |
650 | 7 | |a Regional government policies |2 bicssc | |
653 | |a Cybersecurity | ||
653 | |a cyberinsurance | ||
653 | |a cyber risk management | ||
653 | |a history of insurance | ||
653 | |a systemic risk | ||
653 | |a catastrophic risk | ||
653 | |a interconnected risk | ||
856 | 4 | 0 | |a www.oapen.org |u https://doi.org/10.7551/mitpress/13665.001.0001 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/93165 |7 0 |z DOAB: description of the publication |