Showing 81 - 90 of 6,507
The interplay between big data and cloud computing is without doubt simultaneously promising, challenging and puzzling. The current technological landscape is not without paradoxes and risks, which under certain circumstances may raise liability issues for market operators. In this article we...
Persistent link: https://www.econbiz.de/10014112404
Almost everyone recognizes the emergence of a new challenge in the cyber domain, namely increased threats to the security of the Internet and its various uses. Seldom does a day go by without dire reports and hair raising narratives about unauthorized intrusions, access to content, or damage to...
Persistent link: https://www.econbiz.de/10012998691
This paper examines the impact of cybercrime and hacking events on equity market volatility across publicly traded corporations. The volatility influence of these cybercrime events is shown to be dependent on the number of clients exposed across all sectors and the type of the cyber security...
Persistent link: https://www.econbiz.de/10012964812
Are military strikes ever a justifiable response to a cyber security attack? Does the certainty of attribution matter? Or the nature of the attack itself a better determinants of attitudes about retaliation? We answer these questions with an original survey experiment that uncovers the public's...
Persistent link: https://www.econbiz.de/10012965494
The scale and intensity of digital financial criminality has become more apparent and audacious over the past fifteen years. To counteract this escalating threat, financial technology (FinTech) and monetary and financial institutions (MFI) have attempted to upgrade their internal technological...
Persistent link: https://www.econbiz.de/10012966515
When someone improperly accesses or discloses an individual's personal information, the subject of that data breach is often at an increased risk of identity theft. One way for an affected data subject to guard against this risk is to subscribe to a credit-monitoring service. Recently, potential...
Persistent link: https://www.econbiz.de/10012966679
Tort law is the best vehicle for allocating the risks and spreading the costs of database intrusion. It can incentivize database possessors ("possessors") and data subjects to minimize the harm associated with breaches of database security while also balancing each party's interests. Life is...
Persistent link: https://www.econbiz.de/10012966694
In today's technologically dependent world, concerns about cybersecurity, data breaches, and compromised personal information infiltrate the news almost daily. The Securities and Exchange Commission (“SEC”) has recently emerged as a regulator that is keenly focused on cybersecurity,...
Persistent link: https://www.econbiz.de/10012968883
This presentation advances upon recent world leading Cybersecurity-CyberFinance Computational Risk Analytics Research selected for 30 SSRN Top-10 Research Ranking Awards and invited for presentation at the 2015 Princeton Quantitative Trading Conference. The primary focus of the presentation is...
Persistent link: https://www.econbiz.de/10012969088
Cyber risk, a type of operational risk, is today considered a key component in the enterprise risk management framework. Under BASEL regulations, a bank could recognize the risk mitigating impact of the Cyber Liability Insurance (CLI) contract while calculating the minimum operational risk...
Persistent link: https://www.econbiz.de/10012969307