Cyberinsurance policy : : rethinking risk for the Internet age / / Josephine Wolff.
"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--
Saved in:
Superior document: | Information policy series |
---|---|
VerfasserIn: | |
Place / Publishing House: | Cambridge, Massachusetts : : The MIT Press,, [2022] |
Year of Publication: | 2022 |
Edition: | 1st ed. |
Language: | English |
Series: | Information Policy
|
Physical Description: | 1 online resource (291 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993562960004498 |
---|---|
ctrlnum |
(CKB)5680000000039154 (MiAaPQ)EBC7069287 (Au-PeEL)EBL7069287 (OCoLC)1338838438 (oapen)https://directory.doabooks.org/handle/20.500.12854/93165 (OCoLC)1334725282 (OCoLC-P)1334725282 (MaCbMITP)13665 (EXLCZ)995680000000039154 |
collection |
bib_alma |
record_format |
marc |
spelling |
Wolff, Josephine, author. Cyberinsurance policy : rethinking risk for the Internet age / Josephine Wolff. 1st ed. Cambridge, Massachusetts : The MIT Press, [2022] 1 online resource (291 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Information policy series Intro -- Contents -- Series Editor's Introduction -- Acknowledgments -- 1. Introduction: A Market-Driven Approach to Cybersecurity -- I. History of Cyberinsurance -- 2. Breach on the Beach: Origins of Cyberinsurance -- The Development of Auto Insurance -- Flood Insurance: "A Tool That Should Be Used Expertly or Not at All" -- "An Irresistible Target for Financial Knaves and Buccaneers" -- Early Cyberinsurance Policies -- Data Breach Notification Laws -- SEC Guidance on Cyber Risks -- II. Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. Sony: Pandora's Box -- Innovak International Inc. and Indirect Publication -- Rosen Hotels & -- Resorts and Coverage for Breach Notification Costs -- 4. "The Point of No Return": Computer Fraud Insurance and Defining Cybercrime -- Intervening Events and Immediate Causes: Brightpoint v. Zurich -- Hacking, Unauthorized Access, and Pestmaster v. Travelers -- Phishing, Ambiguous Definitions, and American Tooling v. Travelers -- "Armed with a Computer Code": Medidata Solutions v. Federal Insurance Company -- Overlapping Coverage and National Bank of Blacksburg v. Everest -- 5. "Insurrection, Rebellion, Revolution, Riot": NotPetya, Property Insurance, and War Exclusions -- Property Insurance and Open-Peril Coverage -- "War in the Only Sense That Men Know and Understand It": War Exclusions and Pearl Harbor -- "A Most Unusual and Explicit Contract": Terrorism and Overlapping Coverage -- "The Special Meaning of War": The Legacy of Pan Am -- Mondelez, NotPetya, and Cyberwar -- No Claw Backs -- III. Cyber Coverage and Regulation -- 6. "The Big Kahuna": Stand-Alone Cyber Coverage -- Incomplete and Inconsistent Data -- Interconnected and Systemic Risks. Moral Hazard and Preventive Measures -- Cyber Risk Insurance Partnerships -- The Fallacy of the Stand-Alone Model -- 7. "What Is the Point of Collecting Data?": Global Growth of Cyberinsurance and the Role of Policymakers -- The Cybersecurity Policy Boom -- Cyberinsurance Policy Efforts in the United States -- Cyberinsurance in the European Union -- Cyberinsurance in China -- Emerging Cyberinsurance Markets: Brazil, India, and Singapore -- Policy Approaches to Cyberinsurance -- 8. Conclusion: Is Cyber Risk Different? -- Notes -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- References -- Index. English "Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"-- Provided by publisher. OCLC-licensed vendor bibliographic record. Computer insurance. Computer security Management. Cyberspace Security measures Management. Computer crimes Prevention. Risk management. 0-262-54418-0 Information Policy |
language |
English |
format |
eBook |
author |
Wolff, Josephine, |
spellingShingle |
Wolff, Josephine, Cyberinsurance policy : rethinking risk for the Internet age / Information policy series Intro -- Contents -- Series Editor's Introduction -- Acknowledgments -- 1. Introduction: A Market-Driven Approach to Cybersecurity -- I. History of Cyberinsurance -- 2. Breach on the Beach: Origins of Cyberinsurance -- The Development of Auto Insurance -- Flood Insurance: "A Tool That Should Be Used Expertly or Not at All" -- "An Irresistible Target for Financial Knaves and Buccaneers" -- Early Cyberinsurance Policies -- Data Breach Notification Laws -- SEC Guidance on Cyber Risks -- II. Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. Sony: Pandora's Box -- Innovak International Inc. and Indirect Publication -- Rosen Hotels & -- Resorts and Coverage for Breach Notification Costs -- 4. "The Point of No Return": Computer Fraud Insurance and Defining Cybercrime -- Intervening Events and Immediate Causes: Brightpoint v. Zurich -- Hacking, Unauthorized Access, and Pestmaster v. Travelers -- Phishing, Ambiguous Definitions, and American Tooling v. Travelers -- "Armed with a Computer Code": Medidata Solutions v. Federal Insurance Company -- Overlapping Coverage and National Bank of Blacksburg v. Everest -- 5. "Insurrection, Rebellion, Revolution, Riot": NotPetya, Property Insurance, and War Exclusions -- Property Insurance and Open-Peril Coverage -- "War in the Only Sense That Men Know and Understand It": War Exclusions and Pearl Harbor -- "A Most Unusual and Explicit Contract": Terrorism and Overlapping Coverage -- "The Special Meaning of War": The Legacy of Pan Am -- Mondelez, NotPetya, and Cyberwar -- No Claw Backs -- III. Cyber Coverage and Regulation -- 6. "The Big Kahuna": Stand-Alone Cyber Coverage -- Incomplete and Inconsistent Data -- Interconnected and Systemic Risks. Moral Hazard and Preventive Measures -- Cyber Risk Insurance Partnerships -- The Fallacy of the Stand-Alone Model -- 7. "What Is the Point of Collecting Data?": Global Growth of Cyberinsurance and the Role of Policymakers -- The Cybersecurity Policy Boom -- Cyberinsurance Policy Efforts in the United States -- Cyberinsurance in the European Union -- Cyberinsurance in China -- Emerging Cyberinsurance Markets: Brazil, India, and Singapore -- Policy Approaches to Cyberinsurance -- 8. Conclusion: Is Cyber Risk Different? -- Notes -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- References -- Index. |
author_facet |
Wolff, Josephine, |
author_variant |
j w jw |
author_role |
VerfasserIn |
author_sort |
Wolff, Josephine, |
title |
Cyberinsurance policy : rethinking risk for the Internet age / |
title_sub |
rethinking risk for the Internet age / |
title_full |
Cyberinsurance policy : rethinking risk for the Internet age / Josephine Wolff. |
title_fullStr |
Cyberinsurance policy : rethinking risk for the Internet age / Josephine Wolff. |
title_full_unstemmed |
Cyberinsurance policy : rethinking risk for the Internet age / Josephine Wolff. |
title_auth |
Cyberinsurance policy : rethinking risk for the Internet age / |
title_new |
Cyberinsurance policy : |
title_sort |
cyberinsurance policy : rethinking risk for the internet age / |
series |
Information policy series |
series2 |
Information policy series |
publisher |
The MIT Press, |
publishDate |
2022 |
physical |
1 online resource (291 pages) |
edition |
1st ed. |
contents |
Intro -- Contents -- Series Editor's Introduction -- Acknowledgments -- 1. Introduction: A Market-Driven Approach to Cybersecurity -- I. History of Cyberinsurance -- 2. Breach on the Beach: Origins of Cyberinsurance -- The Development of Auto Insurance -- Flood Insurance: "A Tool That Should Be Used Expertly or Not at All" -- "An Irresistible Target for Financial Knaves and Buccaneers" -- Early Cyberinsurance Policies -- Data Breach Notification Laws -- SEC Guidance on Cyber Risks -- II. Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. Sony: Pandora's Box -- Innovak International Inc. and Indirect Publication -- Rosen Hotels & -- Resorts and Coverage for Breach Notification Costs -- 4. "The Point of No Return": Computer Fraud Insurance and Defining Cybercrime -- Intervening Events and Immediate Causes: Brightpoint v. Zurich -- Hacking, Unauthorized Access, and Pestmaster v. Travelers -- Phishing, Ambiguous Definitions, and American Tooling v. Travelers -- "Armed with a Computer Code": Medidata Solutions v. Federal Insurance Company -- Overlapping Coverage and National Bank of Blacksburg v. Everest -- 5. "Insurrection, Rebellion, Revolution, Riot": NotPetya, Property Insurance, and War Exclusions -- Property Insurance and Open-Peril Coverage -- "War in the Only Sense That Men Know and Understand It": War Exclusions and Pearl Harbor -- "A Most Unusual and Explicit Contract": Terrorism and Overlapping Coverage -- "The Special Meaning of War": The Legacy of Pan Am -- Mondelez, NotPetya, and Cyberwar -- No Claw Backs -- III. Cyber Coverage and Regulation -- 6. "The Big Kahuna": Stand-Alone Cyber Coverage -- Incomplete and Inconsistent Data -- Interconnected and Systemic Risks. Moral Hazard and Preventive Measures -- Cyber Risk Insurance Partnerships -- The Fallacy of the Stand-Alone Model -- 7. "What Is the Point of Collecting Data?": Global Growth of Cyberinsurance and the Role of Policymakers -- The Cybersecurity Policy Boom -- Cyberinsurance Policy Efforts in the United States -- Cyberinsurance in the European Union -- Cyberinsurance in China -- Emerging Cyberinsurance Markets: Brazil, India, and Singapore -- Policy Approaches to Cyberinsurance -- 8. Conclusion: Is Cyber Risk Different? -- Notes -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- References -- Index. |
isbn |
0-262-37075-1 0-262-54418-0 |
callnumber-first |
H - Social Science |
callnumber-subject |
HG - Finance |
callnumber-label |
HG9963 |
callnumber-sort |
HG 49963.5 W65 42022EB |
illustrated |
Not Illustrated |
dewey-hundreds |
600 - Technology |
dewey-tens |
650 - Management & public relations |
dewey-ones |
658 - General management |
dewey-full |
658.4/78 |
dewey-sort |
3658.4 278 |
dewey-raw |
658.4/78 |
dewey-search |
658.4/78 |
oclc_num |
1338838438 1334725282 |
work_keys_str_mv |
AT wolffjosephine cyberinsurancepolicyrethinkingriskfortheinternetage |
status_str |
n |
ids_txt_mv |
(CKB)5680000000039154 (MiAaPQ)EBC7069287 (Au-PeEL)EBL7069287 (OCoLC)1338838438 (oapen)https://directory.doabooks.org/handle/20.500.12854/93165 (OCoLC)1334725282 (OCoLC-P)1334725282 (MaCbMITP)13665 (EXLCZ)995680000000039154 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Information policy series |
is_hierarchy_title |
Cyberinsurance policy : rethinking risk for the Internet age / |
container_title |
Information policy series |
_version_ |
1787548684778471424 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04373nam a2200505Ii 4500</leader><controlfield tag="001">993562960004498</controlfield><controlfield tag="005">20231110211743.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">220708s2022 mau ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-262-37075-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5680000000039154</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC7069287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL7069287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1338838438</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/93165</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1334725282</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)1334725282</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MaCbMITP)13665</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995680000000039154</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OCoLC-P</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">OCoLC-P</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HG9963.5</subfield><subfield code="b">.W65 2022eb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">658.4/78</subfield><subfield code="2">23/eng/20220708</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wolff, Josephine,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberinsurance policy :</subfield><subfield code="b">rethinking risk for the Internet age /</subfield><subfield code="c">Josephine Wolff.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Massachusetts :</subfield><subfield code="b">The MIT Press,</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (291 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Information policy series</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Contents -- Series Editor's Introduction -- Acknowledgments -- 1. Introduction: A Market-Driven Approach to Cybersecurity -- I. History of Cyberinsurance -- 2. Breach on the Beach: Origins of Cyberinsurance -- The Development of Auto Insurance -- Flood Insurance: "A Tool That Should Be Used Expertly or Not at All" -- "An Irresistible Target for Financial Knaves and Buccaneers" -- Early Cyberinsurance Policies -- Data Breach Notification Laws -- SEC Guidance on Cyber Risks -- II. Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. Sony: Pandora's Box -- Innovak International Inc. and Indirect Publication -- Rosen Hotels &amp -- Resorts and Coverage for Breach Notification Costs -- 4. "The Point of No Return": Computer Fraud Insurance and Defining Cybercrime -- Intervening Events and Immediate Causes: Brightpoint v. Zurich -- Hacking, Unauthorized Access, and Pestmaster v. Travelers -- Phishing, Ambiguous Definitions, and American Tooling v. Travelers -- "Armed with a Computer Code": Medidata Solutions v. Federal Insurance Company -- Overlapping Coverage and National Bank of Blacksburg v. Everest -- 5. "Insurrection, Rebellion, Revolution, Riot": NotPetya, Property Insurance, and War Exclusions -- Property Insurance and Open-Peril Coverage -- "War in the Only Sense That Men Know and Understand It": War Exclusions and Pearl Harbor -- "A Most Unusual and Explicit Contract": Terrorism and Overlapping Coverage -- "The Special Meaning of War": The Legacy of Pan Am -- Mondelez, NotPetya, and Cyberwar -- No Claw Backs -- III. Cyber Coverage and Regulation -- 6. "The Big Kahuna": Stand-Alone Cyber Coverage -- Incomplete and Inconsistent Data -- Interconnected and Systemic Risks.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Moral Hazard and Preventive Measures -- Cyber Risk Insurance Partnerships -- The Fallacy of the Stand-Alone Model -- 7. "What Is the Point of Collecting Data?": Global Growth of Cyberinsurance and the Role of Policymakers -- The Cybersecurity Policy Boom -- Cyberinsurance Policy Efforts in the United States -- Cyberinsurance in the European Union -- Cyberinsurance in China -- Emerging Cyberinsurance Markets: Brazil, India, and Singapore -- Policy Approaches to Cyberinsurance -- 8. Conclusion: Is Cyber Risk Different? -- Notes -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- References -- Index.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">OCLC-licensed vendor bibliographic record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer insurance.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-262-54418-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Information Policy </subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-11-11 04:48:34 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-05-29 08:26:04 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5340567610004498&Force_direct=true</subfield><subfield code="Z">5340567610004498</subfield><subfield code="b">Available</subfield><subfield code="8">5340567610004498</subfield></datafield></record></collection> |