Cyberinsurance Policy
Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks
dc.contributor.author | Wolff, Josephine | |
dc.date.accessioned | 2022-10-25T08:59:55Z | |
dc.date.available | 2022-10-25T08:59:55Z | |
dc.date.issued | 2022 | |
dc.identifier | ONIX_20221025_9780262370752_19 | |
dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/93165 | |
dc.description.abstract | Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management. As cybersecurity incidents—ranging from data breaches and denial-of-service attacks to computer fraud and ransomware—become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early “Internet Security Liability” policies in the late 1990s to the expansive coverage offered today. Drawing on legal records, government reports, cyberinsurance policies, and interviews with regulators and insurers, Wolff finds that cyberinsurance has not improved cybersecurity or reduced cyber risks. Wolff examines the development of cyberinsurance, comparing it to other insurance sectors, including car and flood insurance; explores legal disputes between insurers and policyholders about whether cyber-related losses were covered under policies designed for liability, crime, or property and casualty losses; and traces the trend toward standalone cyberinsurance policies and government efforts to regulate and promote the industry. Cyberinsurance, she argues, is ineffective at curbing cybersecurity losses because it normalizes the payment of online ransoms, whereas the goal of cybersecurity is the opposite—to disincentivize such payments to make ransomware less profitable. An industry built on modeling risk has found itself confronted by new technologies before the risks posed by those technologies can be fully understood. | |
dc.language | English | |
dc.relation.ispartofseries | Information Policy | |
dc.subject.classification | thema EDItEUR::K Economics, Finance, Business and Management::KF Finance and accounting::KFF Finance and the finance industry::KFFN Insurance and actuarial studies | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security | en_US |
dc.subject.classification | thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPR Regional, state and other local government::JPRB Regional, state and other local government policies | en_US |
dc.subject.other | Cybersecurity | |
dc.subject.other | cyberinsurance | |
dc.subject.other | cyber risk management | |
dc.subject.other | history of insurance | |
dc.subject.other | systemic risk | |
dc.subject.other | catastrophic risk | |
dc.subject.other | interconnected risk | |
dc.title | Cyberinsurance Policy | |
dc.title.alternative | Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks | |
dc.type | book | |
oapen.identifier.doi | 10.7551/mitpress/13665.001.0001 | |
oapen.relation.isPublishedBy | ae0cf962-f685-4933-93d1-916defa5123d | |
oapen.relation.isbn | 9780262370752 | |
oapen.relation.isbn | 9780262544184 | |
oapen.imprint | The MIT Press | |
oapen.pages | 296 | |
oapen.place.publication | Cambridge |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |