Cyber Insurance and Post-Breach Services: A Normative Analysis

Author:

Hui Wendy1ORCID,Hui Kai-Lung2ORCID,Yue Wei T.3ORCID

Affiliation:

1. Singapore Institute of Technology, Singapore 138683;

2. Department of Information Systems, Business Statistics, and Operations Management, School of Business and Management, Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong;

3. Department of Information Systems, College of Business, City University of Hong Kong, Kowloon Tong, Hong Kong

Abstract

Cyber insurance is becoming an essential tool for managing cybersecurity risks. In this study, we analyze how having the option to subscribe to cyber insurance services affects firms’ risk prevention and mitigation decisions. We model the scenario where the firm purchases cyber insurance in a competitive insurance market and compare it against the case when it does not purchase cyber insurance. When there is a breach, cyber insurance can help cover mitigation expenses and breach losses. Consistent with the prior literature, we find that in most cases cyber insurance exacerbates ex ante moral hazard by decreasing expected risk prevention. However, it enhances ex post efforts by increasing expected risk mitigation, which can lead to more positive outcomes for the insured firm. The mechanism involves designing the contract with a delicate calibration of the coverage of breach losses and the coinsurance rate. Moreover, the findings highlight the importance of a healthy risk mitigation service market in managing cybersecurity risks. Funding: This research was supported in part by the Hong Kong SAR General Research Fund project [16502417]. Supplemental Material: The e-companion is available at https://doi.org/10.1287/serv.2021.0120 .

Publisher

Institute for Operations Research and the Management Sciences (INFORMS)

Reference47 articles.

1. Why IT managers don't go for cyber-insurance products

2. Cybersecurity insurance and risk-sharing

3. Bogetic Z, Heffley D (1993) Reforming healthcare: A case for stay well health insurance. Policy Research working papers no. WPS 1181. World Bank, Washington, DC.

4. The Value of Intrusion Detection Systems in Information Technology Security Architecture

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3