Enter your keyword

2-s2.0-85099573707

[vc_empty_space][vc_empty_space]

A systematic literature review of cyber insurance challenges

Aziz B.a, Suhardia, Kurniaa

a Institut Teknologi Bandung, School of Electrical Engineering and Informatics, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2020 IEEE.This paper presents a systematic literature review of the challenges in cyber insurance. The study uses PRISMA to obtain transparent results. This review summarized sectors which risk a cyber incident and cyber insurance’s challenges and its solutions. The articles included in this study were collected from the search results on four digital libraries: ACM, IEEE Xplore, ScienceDirect, and Springer Link, published in 2016-2020. There are 46 out of 313 articles that meet the criteria. The sectors that risk a cyber incident are government, public, financial, professional, and technology. The cyber insurance challenges are divided into three categories based on contractual agreement status, namely before the contractual agreement, in the contractual agreement, and no contractual agreement. Challenges included in the condition before the contractual are organization eligibility and insurance contract design. The difficulties faced if the contractual exists, namely self-reporting, external security audit, and the insurer’s refusal to pay the claim. Finally, no contractual agreement leads to a general challenge in cyber insurers, namely cyber insurance awareness and cost-benefit aspects of cybersecurity investment. The proposed solutions to the challenges are unique. However, there are some similarities, namely proposals in the form of frameworks, models, or suggestions. Apart from these three things, the solutions can also be in the form of analysis to get optimal things.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Contractual agreements,Cost benefits,Cyber security,Insurance contracts,Security audit,Self-reporting,Systematic literature review,Three categories[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Challenge,Cyber insurance,Systematic literature review[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITSI50517.2020.9264966[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]