PL EN


2017 | 1(10) | 251-271
Article title

Ryzyko cybernetyczne jako wyzwanie dla branży ubezpieczeń w Polsce i na świecie

Selected contents from this journal
Title variants
Languages of publication
PL
Abstracts
EN
The problem of cyberattacks may seem distant in Poland. Although most entrepreneurs operating in Poland are aware of the existence of such threats, few of them undertake actions aimed at managing cyber risk, also through the purchase of specialist cyber insurance. Cybercrime can be described as the most serious challenge the insurance industry has faced in the last half-century. It reminds systemic risk, the source of which is the use of information technology and electronic data processing. Among the factors driving the development of the cyber-insurance market are the growing need for privacy in global society, large-scale cyber-attacks, legal regulations that impose high financial fines for data breaches, strive to minimize financial consequences of cyber attacks, potential damage to reputation resulting from cyber incident. The purpose of this article is to identify cyber risk, assess the degree of cyber threat, and analyze the degree of development of the cyber insurance market. The most serious difficulties in operating cyber insurance from the point of view of insurance companies have been indicated.
Year
Issue
Pages
251-271
Physical description
Contributors
  • Uniwersytet Ekonomiczny w Krakowie
References
  • Allianz, A guide to cyber risk. Managing the impact of increasing interconnectivity, 2015, www.agcs.allianz.com (data dostępu 12.11.2015).
  • AON, Exploring the latest cyber risk trends in EMEA, 2014, www.aon.com (data dostępu 14.11.2015).
  • Berliner, B., Limits of insurability of risks, Prentice-Hall, Englewood Cliffs 1982.
  • Böhme, R., Kataria, G., Models and measures for correlation in cyber-insurance, Working Paper, Workshop on the Economics of Information Security (WEIS), University of Cambridge, 2006, http://www.econinfosec.org/archive/weis2006/docs/16.pdf (data dostępu 12.04.2016).
  • Cebula, J.J., Young, L.R., A taxonomy of operational cyber security risks, Technical Note CMU/SEI-2010-TN-028, Software Engineering Institute, Carnegie Mellon University, 2010.
  • CERT, Raport o stanie bezpieczeństwa cyberprzestrzeni RP w roku 2014, Rządowy Zespół Reagowania na Incydenty Komputerowe, marzec 2015, http://www.cert.gov.pl/cer/publikacje/raporty-o-stanie-bezpi/738,Raport-o-stanie-bezpieczenstwacyberprzestrzeni-RP-w-2014-roku.html (data dostępu 11.01.2016).
  • Dyrektywa 95/49/WE Parlamentu Europejskiego i Rady z dnia 24 października 1995 r. w sprawie ochrony osób fizycznych w zakresie przetwarzania danych osobowych i swobodnego przepływu tych danych (Dz.U. UE L 281/31 z 23.11.1995).
  • Dyrektywa 2009/140/WE Parlamentu Europejskiego i Rady z dnia 25 listopada 2009 r. (Dz.U. UE L 337/37 z 18.12.2009).
  • Eling, M., Wirfs, J.H., Cyber risk: Too big to insure?, University of St. Gallen, 2016, http://www.ivw.unisg.ch/~/media/internet/content/dateien/instituteundcenters/ivw/studien/cyberrisk2016.pdf (data dostępu 15.04.2016).
  • ENISA, Incentives and barriers of the cyber insurance market in Europe, Europejska Agencja ds. Bezpieczeństwa Sieci I Informacji, 2012, www.enisa.europa.eu (data dostępu 10.11.2015).
  • Fitch, Fitch: Rapid Growth in Cyber Insurance Would Be Credit-Negative, Fitch Ratings, 21.03.2016, https://www.fitchratings.com/site/fitch-home/pressrelease?id=1001233 (data dostępu 31.03.2016).
  • Glascott, M.T., Aisen, A.J., The emperor’s new clothes and cyber insurance, Federation of Defense & Corporate Counsel Quarterly, wiosna 2013, http://www.thefederation.org/documents/22.The%20Emperors%20New%20Clothes.pdf (3.05.2016).
  • Gordon, L.A., Loeb, M.P., Sohail, T., A framework for using insurance for cyber-risk management, “Communications of the ACM” 2013, 44(9).
  • III, Cyber risk: Threat and opportunity, Insurance Information Institute, październik 2015, http://www.iii.org/sites/default/files/docs/pdf/cyber_risk_wp_final_102015.pdf (data dostępu 22.02.2016).
  • ITRC, ITRC data breach reports December 31, 2015, Identity Theft Resource Center, kwiecień 2016, http://techorchard.com/wp-content/uploads/2016/04/DataBreachReports_2015.pdf (data dostępu 2.05.2016).
  • Kesan, J.P., Majuca, R.P., Yurcik, W., Cyber insurance as a market-based solution to the problem of cybersecurity – case study, Proceedings of Workshop on the Economics of Information Security, Harvard, MA, czerwiec 2005.
  • Lloyd’s, Managing digital risk. Trends, issues and implications for business, 2010, www.lloyds.com (data dostępu 8.11.2015).
  • Marsh, (2015a), European 2015 cyber risk survey report, październik 2015, http://uk.marsh.com/Portals/18/Documents/European%202015%20Cyber%20Risk%20Survey%20Report-10-2015.pdf (data dostępu 11.04.2016).
  • Marsh, (2015b), UK cyber security. The role of insurance in managing and mitigating the risk, 2015, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/415354/UK_Cyber_Security_Report_Final.pdf (data dostępu 12.01.2016).
  • McAfee, McAfee Labs threats report, marzec 2016, http://www.mcafee.com/us/resources/reports/rp-quarterly-threats-mar-2016.pdf (data dostępu 24.04.2016).
  • Mukhopadhyay, A., Chatterjee, S., Saha, D., Mahanti, A., Sadhukhan, S., Cyber-risk decision models: To insure IT or not?, Decision Support Systems, kwiecień 2013,http://dx.doi.org/10.1016/j.dss.2013.04.004.
  • NAIC, Cybersecurity, National Association of Insurance Commissioners, 25.01.2016, http://www.naic.org/cipr_topics/topic_cyber_risk.htm (data dostępu 22.05.2016).
  • Newman, G., Cyber Market Overview: Product, Pricing & Positioning, CFC Underwriting, 14.04.2016, London.
  • Ögűt, H., Raghunathan, S., Menon, N., Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection, Risk Analysis 2011, 31(3), doi: 10.1111/j.1539-6924.2010.01478.x.
  • Podolak, G.D., Insurance for Cyber Risks: A Comprehensive Analysis of the Evolving Exposure, Today’s Litigation, and Tomorrow ’s Challenges, Quinnipiac Law Review 2015, t. 33.
  • Ponemon & AON, 2015 Global Cyber Impact Report, kwiecień 2015, http://www.aon.com/attachments/risk-services/2015-Global-Cyber-Impact-Report-Final.pdf (data dostępu 12.12.2015).
Document Type
Publication order reference
Identifiers
YADDA identifier
bwmeta1.element.mhp-3bea61fb-9d66-44a3-8a15-f99fa3b53384
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.