Showing 781 - 790 of 50,987
In a variety of settings, some payoff-relevant item spreads along a network of connected individuals. In some cases, the item will benefit those who receive it (for example, a music download, a stock tip, news about a new research funding source, etc.) while in other cases the impact may be...
Persistent link: https://www.econbiz.de/10013213485
Recent advances in computer technology have been aiding sexual predators, stalkers, child pornographers, child traffickers, and others with the intent of exploiting children. Internet bulletin boards, chat rooms, private websites, and peer-to-peer networks are being used daily by paedophiles to...
Persistent link: https://www.econbiz.de/10012772236
Persistent link: https://www.econbiz.de/10013071225
In this study an exploration of insurance risk transfer is undertaken for the cyber insurance industry in the United States of America, based on the leading industry dataset of cyber events provided by Advisen. We seek to address two core unresolved questions. First, what factors are the most...
Persistent link: https://www.econbiz.de/10013322184
The wonder of the Internet is incredibly capable computers connected with each other under the control of individuals. For all of the reasons that we think that decentralization is a powerful force we have applauded the ability of individual users to set up websites and make their ideas...
Persistent link: https://www.econbiz.de/10014069793
We investigate the relationship between security breaches and chief information officer (CIO) turnover. Because CIOs are directly responsible for IT performance, we argue that their turnover likelihood is higher when they fail to meet IT performance expectations, as reflected by security...
Persistent link: https://www.econbiz.de/10013237783
After a series of recent high-profile information security breach incidents, practitioners have engaged in heated debates about the role of the chief information officer (CIO), particularly his/her role in information security risk management. However, little is known in the academic literature...
Persistent link: https://www.econbiz.de/10013246451
Effective cyber risk management should include the use of insurance not only to transfer cyber risk but also to provide incentives for insured enterprises to invest in cyber self-protection. Research indicates that asymmetric information, correlated loss, and interdependent security issues make...
Persistent link: https://www.econbiz.de/10012927876
We study the association between firms' disclosures in Forms 10-K of the existence of trade secrets, and cyber theft of corporate data (which we refer to as “Breaches”). Prior academic research explaining occurrence of Breaches is scarce, and no prior study has focused specifically on...
Persistent link: https://www.econbiz.de/10012933173
The practice of the GATT/WTO is inconclusive on the issue of national security. From Nicaragua Embargo to China-Rare Earth, the key question of the security exceptions remains unanswered. The examination of Article XXI(b)(iii) in accordance with Articles 31 and 32 of the Vienna Convention on the...
Persistent link: https://www.econbiz.de/10012971290