Cyberinsurance policy : : rethinking risk for the Internet age / / Josephine Wolff.

"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--

Saved in:
Bibliographic Details
Superior document:Information policy series
VerfasserIn:
Place / Publishing House:Cambridge, Massachusetts : : The MIT Press,, [2022]
Year of Publication:2022
Edition:1st ed.
Language:English
Series:Information Policy
Physical Description:1 online resource (291 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993562960004498
ctrlnum (CKB)5680000000039154
(MiAaPQ)EBC7069287
(Au-PeEL)EBL7069287
(OCoLC)1338838438
(oapen)https://directory.doabooks.org/handle/20.500.12854/93165
(OCoLC)1334725282
(OCoLC-P)1334725282
(MaCbMITP)13665
(EXLCZ)995680000000039154
collection bib_alma
record_format marc
spelling Wolff, Josephine, author.
Cyberinsurance policy : rethinking risk for the Internet age / Josephine Wolff.
1st ed.
Cambridge, Massachusetts : The MIT Press, [2022]
1 online resource (291 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Information policy series
Intro -- Contents -- Series Editor's Introduction -- Acknowledgments -- 1. Introduction: A Market-Driven Approach to Cybersecurity -- I. History of Cyberinsurance -- 2. Breach on the Beach: Origins of Cyberinsurance -- The Development of Auto Insurance -- Flood Insurance: "A Tool That Should Be Used Expertly or Not at All" -- "An Irresistible Target for Financial Knaves and Buccaneers" -- Early Cyberinsurance Policies -- Data Breach Notification Laws -- SEC Guidance on Cyber Risks -- II. Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. Sony: Pandora's Box -- Innovak International Inc. and Indirect Publication -- Rosen Hotels &amp -- Resorts and Coverage for Breach Notification Costs -- 4. "The Point of No Return": Computer Fraud Insurance and Defining Cybercrime -- Intervening Events and Immediate Causes: Brightpoint v. Zurich -- Hacking, Unauthorized Access, and Pestmaster v. Travelers -- Phishing, Ambiguous Definitions, and American Tooling v. Travelers -- "Armed with a Computer Code": Medidata Solutions v. Federal Insurance Company -- Overlapping Coverage and National Bank of Blacksburg v. Everest -- 5. "Insurrection, Rebellion, Revolution, Riot": NotPetya, Property Insurance, and War Exclusions -- Property Insurance and Open-Peril Coverage -- "War in the Only Sense That Men Know and Understand It": War Exclusions and Pearl Harbor -- "A Most Unusual and Explicit Contract": Terrorism and Overlapping Coverage -- "The Special Meaning of War": The Legacy of Pan Am -- Mondelez, NotPetya, and Cyberwar -- No Claw Backs -- III. Cyber Coverage and Regulation -- 6. "The Big Kahuna": Stand-Alone Cyber Coverage -- Incomplete and Inconsistent Data -- Interconnected and Systemic Risks.
Moral Hazard and Preventive Measures -- Cyber Risk Insurance Partnerships -- The Fallacy of the Stand-Alone Model -- 7. "What Is the Point of Collecting Data?": Global Growth of Cyberinsurance and the Role of Policymakers -- The Cybersecurity Policy Boom -- Cyberinsurance Policy Efforts in the United States -- Cyberinsurance in the European Union -- Cyberinsurance in China -- Emerging Cyberinsurance Markets: Brazil, India, and Singapore -- Policy Approaches to Cyberinsurance -- 8. Conclusion: Is Cyber Risk Different? -- Notes -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- References -- Index.
English
"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"-- Provided by publisher.
OCLC-licensed vendor bibliographic record.
Computer insurance.
Computer security Management.
Cyberspace Security measures Management.
Computer crimes Prevention.
Risk management.
0-262-54418-0
Information Policy
language English
format eBook
author Wolff, Josephine,
spellingShingle Wolff, Josephine,
Cyberinsurance policy : rethinking risk for the Internet age /
Information policy series
Intro -- Contents -- Series Editor's Introduction -- Acknowledgments -- 1. Introduction: A Market-Driven Approach to Cybersecurity -- I. History of Cyberinsurance -- 2. Breach on the Beach: Origins of Cyberinsurance -- The Development of Auto Insurance -- Flood Insurance: "A Tool That Should Be Used Expertly or Not at All" -- "An Irresistible Target for Financial Knaves and Buccaneers" -- Early Cyberinsurance Policies -- Data Breach Notification Laws -- SEC Guidance on Cyber Risks -- II. Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. Sony: Pandora's Box -- Innovak International Inc. and Indirect Publication -- Rosen Hotels &amp -- Resorts and Coverage for Breach Notification Costs -- 4. "The Point of No Return": Computer Fraud Insurance and Defining Cybercrime -- Intervening Events and Immediate Causes: Brightpoint v. Zurich -- Hacking, Unauthorized Access, and Pestmaster v. Travelers -- Phishing, Ambiguous Definitions, and American Tooling v. Travelers -- "Armed with a Computer Code": Medidata Solutions v. Federal Insurance Company -- Overlapping Coverage and National Bank of Blacksburg v. Everest -- 5. "Insurrection, Rebellion, Revolution, Riot": NotPetya, Property Insurance, and War Exclusions -- Property Insurance and Open-Peril Coverage -- "War in the Only Sense That Men Know and Understand It": War Exclusions and Pearl Harbor -- "A Most Unusual and Explicit Contract": Terrorism and Overlapping Coverage -- "The Special Meaning of War": The Legacy of Pan Am -- Mondelez, NotPetya, and Cyberwar -- No Claw Backs -- III. Cyber Coverage and Regulation -- 6. "The Big Kahuna": Stand-Alone Cyber Coverage -- Incomplete and Inconsistent Data -- Interconnected and Systemic Risks.
Moral Hazard and Preventive Measures -- Cyber Risk Insurance Partnerships -- The Fallacy of the Stand-Alone Model -- 7. "What Is the Point of Collecting Data?": Global Growth of Cyberinsurance and the Role of Policymakers -- The Cybersecurity Policy Boom -- Cyberinsurance Policy Efforts in the United States -- Cyberinsurance in the European Union -- Cyberinsurance in China -- Emerging Cyberinsurance Markets: Brazil, India, and Singapore -- Policy Approaches to Cyberinsurance -- 8. Conclusion: Is Cyber Risk Different? -- Notes -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- References -- Index.
author_facet Wolff, Josephine,
author_variant j w jw
author_role VerfasserIn
author_sort Wolff, Josephine,
title Cyberinsurance policy : rethinking risk for the Internet age /
title_sub rethinking risk for the Internet age /
title_full Cyberinsurance policy : rethinking risk for the Internet age / Josephine Wolff.
title_fullStr Cyberinsurance policy : rethinking risk for the Internet age / Josephine Wolff.
title_full_unstemmed Cyberinsurance policy : rethinking risk for the Internet age / Josephine Wolff.
title_auth Cyberinsurance policy : rethinking risk for the Internet age /
title_new Cyberinsurance policy :
title_sort cyberinsurance policy : rethinking risk for the internet age /
series Information policy series
series2 Information policy series
publisher The MIT Press,
publishDate 2022
physical 1 online resource (291 pages)
edition 1st ed.
contents Intro -- Contents -- Series Editor's Introduction -- Acknowledgments -- 1. Introduction: A Market-Driven Approach to Cybersecurity -- I. History of Cyberinsurance -- 2. Breach on the Beach: Origins of Cyberinsurance -- The Development of Auto Insurance -- Flood Insurance: "A Tool That Should Be Used Expertly or Not at All" -- "An Irresistible Target for Financial Knaves and Buccaneers" -- Early Cyberinsurance Policies -- Data Breach Notification Laws -- SEC Guidance on Cyber Risks -- II. Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. Sony: Pandora's Box -- Innovak International Inc. and Indirect Publication -- Rosen Hotels &amp -- Resorts and Coverage for Breach Notification Costs -- 4. "The Point of No Return": Computer Fraud Insurance and Defining Cybercrime -- Intervening Events and Immediate Causes: Brightpoint v. Zurich -- Hacking, Unauthorized Access, and Pestmaster v. Travelers -- Phishing, Ambiguous Definitions, and American Tooling v. Travelers -- "Armed with a Computer Code": Medidata Solutions v. Federal Insurance Company -- Overlapping Coverage and National Bank of Blacksburg v. Everest -- 5. "Insurrection, Rebellion, Revolution, Riot": NotPetya, Property Insurance, and War Exclusions -- Property Insurance and Open-Peril Coverage -- "War in the Only Sense That Men Know and Understand It": War Exclusions and Pearl Harbor -- "A Most Unusual and Explicit Contract": Terrorism and Overlapping Coverage -- "The Special Meaning of War": The Legacy of Pan Am -- Mondelez, NotPetya, and Cyberwar -- No Claw Backs -- III. Cyber Coverage and Regulation -- 6. "The Big Kahuna": Stand-Alone Cyber Coverage -- Incomplete and Inconsistent Data -- Interconnected and Systemic Risks.
Moral Hazard and Preventive Measures -- Cyber Risk Insurance Partnerships -- The Fallacy of the Stand-Alone Model -- 7. "What Is the Point of Collecting Data?": Global Growth of Cyberinsurance and the Role of Policymakers -- The Cybersecurity Policy Boom -- Cyberinsurance Policy Efforts in the United States -- Cyberinsurance in the European Union -- Cyberinsurance in China -- Emerging Cyberinsurance Markets: Brazil, India, and Singapore -- Policy Approaches to Cyberinsurance -- 8. Conclusion: Is Cyber Risk Different? -- Notes -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- References -- Index.
isbn 0-262-37075-1
0-262-54418-0
callnumber-first H - Social Science
callnumber-subject HG - Finance
callnumber-label HG9963
callnumber-sort HG 49963.5 W65 42022EB
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 650 - Management & public relations
dewey-ones 658 - General management
dewey-full 658.4/78
dewey-sort 3658.4 278
dewey-raw 658.4/78
dewey-search 658.4/78
oclc_num 1338838438
1334725282
work_keys_str_mv AT wolffjosephine cyberinsurancepolicyrethinkingriskfortheinternetage
status_str n
ids_txt_mv (CKB)5680000000039154
(MiAaPQ)EBC7069287
(Au-PeEL)EBL7069287
(OCoLC)1338838438
(oapen)https://directory.doabooks.org/handle/20.500.12854/93165
(OCoLC)1334725282
(OCoLC-P)1334725282
(MaCbMITP)13665
(EXLCZ)995680000000039154
carrierType_str_mv cr
hierarchy_parent_title Information policy series
is_hierarchy_title Cyberinsurance policy : rethinking risk for the Internet age /
container_title Information policy series
_version_ 1787548684778471424
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04373nam a2200505Ii 4500</leader><controlfield tag="001">993562960004498</controlfield><controlfield tag="005">20231110211743.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">220708s2022 mau ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-262-37075-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5680000000039154</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC7069287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL7069287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1338838438</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/93165</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1334725282</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)1334725282</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MaCbMITP)13665</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995680000000039154</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OCoLC-P</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">OCoLC-P</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HG9963.5</subfield><subfield code="b">.W65 2022eb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">658.4/78</subfield><subfield code="2">23/eng/20220708</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wolff, Josephine,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberinsurance policy :</subfield><subfield code="b">rethinking risk for the Internet age /</subfield><subfield code="c">Josephine Wolff.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Massachusetts :</subfield><subfield code="b">The MIT Press,</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (291 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Information policy series</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Contents -- Series Editor's Introduction -- Acknowledgments -- 1. Introduction: A Market-Driven Approach to Cybersecurity -- I. History of Cyberinsurance -- 2. Breach on the Beach: Origins of Cyberinsurance -- The Development of Auto Insurance -- Flood Insurance: "A Tool That Should Be Used Expertly or Not at All" -- "An Irresistible Target for Financial Knaves and Buccaneers" -- Early Cyberinsurance Policies -- Data Breach Notification Laws -- SEC Guidance on Cyber Risks -- II. Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. Sony: Pandora's Box -- Innovak International Inc. and Indirect Publication -- Rosen Hotels &amp;amp -- Resorts and Coverage for Breach Notification Costs -- 4. "The Point of No Return": Computer Fraud Insurance and Defining Cybercrime -- Intervening Events and Immediate Causes: Brightpoint v. Zurich -- Hacking, Unauthorized Access, and Pestmaster v. Travelers -- Phishing, Ambiguous Definitions, and American Tooling v. Travelers -- "Armed with a Computer Code": Medidata Solutions v. Federal Insurance Company -- Overlapping Coverage and National Bank of Blacksburg v. Everest -- 5. "Insurrection, Rebellion, Revolution, Riot": NotPetya, Property Insurance, and War Exclusions -- Property Insurance and Open-Peril Coverage -- "War in the Only Sense That Men Know and Understand It": War Exclusions and Pearl Harbor -- "A Most Unusual and Explicit Contract": Terrorism and Overlapping Coverage -- "The Special Meaning of War": The Legacy of Pan Am -- Mondelez, NotPetya, and Cyberwar -- No Claw Backs -- III. Cyber Coverage and Regulation -- 6. "The Big Kahuna": Stand-Alone Cyber Coverage -- Incomplete and Inconsistent Data -- Interconnected and Systemic Risks.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Moral Hazard and Preventive Measures -- Cyber Risk Insurance Partnerships -- The Fallacy of the Stand-Alone Model -- 7. "What Is the Point of Collecting Data?": Global Growth of Cyberinsurance and the Role of Policymakers -- The Cybersecurity Policy Boom -- Cyberinsurance Policy Efforts in the United States -- Cyberinsurance in the European Union -- Cyberinsurance in China -- Emerging Cyberinsurance Markets: Brazil, India, and Singapore -- Policy Approaches to Cyberinsurance -- 8. Conclusion: Is Cyber Risk Different? -- Notes -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- References -- Index.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">OCLC-licensed vendor bibliographic record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer insurance.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-262-54418-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Information Policy </subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-11-11 04:48:34 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-05-29 08:26:04 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5340567610004498&amp;Force_direct=true</subfield><subfield code="Z">5340567610004498</subfield><subfield code="b">Available</subfield><subfield code="8">5340567610004498</subfield></datafield></record></collection>