Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/121012
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dhatterwal, Jagjit Singh | - |
dc.contributor.author | Kaswan, Kuldeep Singh | - |
dc.contributor.author | Khakhil, Sanjay Kumar | - |
dc.contributor.author | Sood, Kiran | - |
dc.contributor.author | Grima, Simon | - |
dc.date.accessioned | 2024-04-17T14:33:56Z | - |
dc.date.available | 2024-04-17T14:33:56Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Dhatterwal, J. S., Kaswan, K. S., Khakhil, S. K., Sood, K., & Grima, S. (2024). Cybersecurity in insurance. In J. P. Davim, C. Machado & H. Schaffers (Eds.), Management sciences and engineering (pp. 323-326). Denmark: River Publishers | en_GB |
dc.identifier.uri | https://www.um.edu.mt/library/oar/handle/123456789/121012 | - |
dc.description.abstract | It is a common assumption in policy discussions that the widespread adoption of cyber insurance would boost network security. However, this depends on potential applicants’ processes to get cyber insurance. Candidates often submit proposals with self-evaluations as part of the selection process. A review of cyber insurance claim forms is presented here. According to the evidence presented in our contributions, the insurance industry will promote best practices in cybersecurity. The risk-based and proposal-based approaches to incident prevention are presented as solutions to the problem of information asymmetry. In this last section, we discuss the factors that may have led to the gap between insurance practices and informationally strong cybersecurity procedures. In this chapter, the importance of information management economics is highlighted for comprehending insurance coverage. | en_GB |
dc.language.iso | en | en_GB |
dc.publisher | River Publishers | en_GB |
dc.rights | info:eu-repo/semantics/restrictedAccess | en_GB |
dc.subject | Insurance -- Data processing | en_GB |
dc.subject | Insurance -- Technological innovations | en_GB |
dc.subject | Computer networks -- Security measures | en_GB |
dc.subject | Cyberspace -- Security measures | en_GB |
dc.subject | Financial risk management | en_GB |
dc.subject | Insurance companies -- Risk management | en_GB |
dc.title | Cybersecurity in insurance | en_GB |
dc.title.alternative | Management sciences and engineering | en_GB |
dc.type | bookPart | en_GB |
dc.rights.holder | The copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder. | en_GB |
dc.description.reviewed | peer-reviewed | en_GB |
Appears in Collections: | Scholarly Works - FacEMAIns |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Cybersecurity_in_insurance.pdf Restricted Access | 37.08 kB | Adobe PDF | View/Open Request a copy |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.