File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1111/jori.12504
- Scopus: eid_2-s2.0-105003269299
- Find via

Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Cyber risk assessment for capital management
| Title | Cyber risk assessment for capital management |
|---|---|
| Authors | |
| Keywords | cascade model cyber capital management cyber risk assessment cybersecurity investment insurance coverage and reserve |
| Issue Date | 2025 |
| Citation | Journal of Risk and Insurance, 2025, v. 92, n. 2, p. 424-471 How to Cite? |
| Abstract | This paper introduces a two-pillar cyber risk management framework to address the pervasive challenges in managing cyber risk. The first pillar, cyber risk assessment, combines insurance frequency-severity models with cybersecurity cascade models to capture the unique nature of cyber risk. The second pillar, cyber capital management, facilitates informed allocation of capital for a balanced cyber risk management strategy, including cybersecurity investments, insurance coverage, and reserves. A case study, based on historical cyber incident data and realistic assumptions, demonstrates the necessity of comprehensive cost–benefit analysis for budget-constrained companies with competing objectives in cyber risk management. In addition, sensitivity analysis highlights the dependence of the optimal strategy on factors such as the price of cybersecurity controls and their effectiveness. The framework's implementation across a diverse range of companies yields general insights on cyber risk management. |
| Persistent Identifier | http://hdl.handle.net/10722/363018 |
| ISSN | 2023 Impact Factor: 2.1 2023 SCImago Journal Rankings: 1.203 |
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Chong, Wing Fung | - |
| dc.contributor.author | Feng, Runhuan | - |
| dc.contributor.author | Hu, Hins | - |
| dc.contributor.author | Zhang, Linfeng | - |
| dc.date.accessioned | 2025-10-10T07:44:05Z | - |
| dc.date.available | 2025-10-10T07:44:05Z | - |
| dc.date.issued | 2025 | - |
| dc.identifier.citation | Journal of Risk and Insurance, 2025, v. 92, n. 2, p. 424-471 | - |
| dc.identifier.issn | 0022-4367 | - |
| dc.identifier.uri | http://hdl.handle.net/10722/363018 | - |
| dc.description.abstract | This paper introduces a two-pillar cyber risk management framework to address the pervasive challenges in managing cyber risk. The first pillar, cyber risk assessment, combines insurance frequency-severity models with cybersecurity cascade models to capture the unique nature of cyber risk. The second pillar, cyber capital management, facilitates informed allocation of capital for a balanced cyber risk management strategy, including cybersecurity investments, insurance coverage, and reserves. A case study, based on historical cyber incident data and realistic assumptions, demonstrates the necessity of comprehensive cost–benefit analysis for budget-constrained companies with competing objectives in cyber risk management. In addition, sensitivity analysis highlights the dependence of the optimal strategy on factors such as the price of cybersecurity controls and their effectiveness. The framework's implementation across a diverse range of companies yields general insights on cyber risk management. | - |
| dc.language | eng | - |
| dc.relation.ispartof | Journal of Risk and Insurance | - |
| dc.subject | cascade model | - |
| dc.subject | cyber capital management | - |
| dc.subject | cyber risk assessment | - |
| dc.subject | cybersecurity investment | - |
| dc.subject | insurance coverage and reserve | - |
| dc.title | Cyber risk assessment for capital management | - |
| dc.type | Article | - |
| dc.description.nature | link_to_subscribed_fulltext | - |
| dc.identifier.doi | 10.1111/jori.12504 | - |
| dc.identifier.scopus | eid_2-s2.0-105003269299 | - |
| dc.identifier.volume | 92 | - |
| dc.identifier.issue | 2 | - |
| dc.identifier.spage | 424 | - |
| dc.identifier.epage | 471 | - |
| dc.identifier.eissn | 1539-6975 | - |
