The market for information security products is plagued by information asymmetry, dysfunctional brand reputation and principal-agent problems. Mechanisms to address the resulting market for lemons include certification schemes, liability laws, and information disclosure. Unfortunately there has been limited success thus far. An emerging form of risk transfer, cyber warranties, could address the market failure. We analyse 15 warranties to identify what is covered and what is excluded. The results suggest cyber warranties do not transfer much risk at present. However, they do force transparency regarding the limitations of information security products
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
Insurers currently constrict coverage for losses involving electronic information in traditional ins...
Cyber risks are one of the top global risks that permeate every aspect of business and society. Yet ...
Consumers struggle to distinguish between the quality of different enterprise security products. Eva...
Risk transfer plays an increasing role in information security risk management as organisations purc...
It is argued that before customers will purchase and use new, expansive, and ubiquitous computing pr...
Cyber risks are some of the most dangerous risks of the twenty-first century. Many types of business...
Abstract—Recent work in security has illustrated that solutions aimed at detection and elimination o...
Abstract—Recent work in security has illustrated that solutions aimed at detection and elimination o...
Nowadays the product warranty plays increasingly important role in any business transaction. It is a...
Current research on cyber-insurance has mainly been about studying the market success of an insuranc...
Risk transfer can be an economically favorable way of handling security and privacy issues, but choo...
Recent work in security has illustrated that solutions aimed at detection and elimination of securit...
Cyberattacks can significantly affect brand reputation, but companies can take measures to repair th...
For many individuals and organizations, cyber-insurance is the most practical and only way of handli...
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
Insurers currently constrict coverage for losses involving electronic information in traditional ins...
Cyber risks are one of the top global risks that permeate every aspect of business and society. Yet ...
Consumers struggle to distinguish between the quality of different enterprise security products. Eva...
Risk transfer plays an increasing role in information security risk management as organisations purc...
It is argued that before customers will purchase and use new, expansive, and ubiquitous computing pr...
Cyber risks are some of the most dangerous risks of the twenty-first century. Many types of business...
Abstract—Recent work in security has illustrated that solutions aimed at detection and elimination o...
Abstract—Recent work in security has illustrated that solutions aimed at detection and elimination o...
Nowadays the product warranty plays increasingly important role in any business transaction. It is a...
Current research on cyber-insurance has mainly been about studying the market success of an insuranc...
Risk transfer can be an economically favorable way of handling security and privacy issues, but choo...
Recent work in security has illustrated that solutions aimed at detection and elimination of securit...
Cyberattacks can significantly affect brand reputation, but companies can take measures to repair th...
For many individuals and organizations, cyber-insurance is the most practical and only way of handli...
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
Insurers currently constrict coverage for losses involving electronic information in traditional ins...
Cyber risks are one of the top global risks that permeate every aspect of business and society. Yet ...