4.7 Article

A framework for cyber-risk insurance against ransomware: A mixed-method approach

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Cyber-risk Management Framework for Online Gaming Firms: an Artificial Neural Network Approach

Kalpit Sharma et al.

Summary: Hackers use DDoS attacks to overwhelm a firm's cyber-resources, disrupting access and causing financial and reputational damage. Our FNN-CRAM model assesses, quantifies, and mitigates cyber-risks, utilizing neural networks and probability distributions. The model helps prioritize and address the risks associated with DDoS attacks.

INFORMATION SYSTEMS FRONTIERS (2023)

Editorial Material Information Science & Library Science

Cross-sectional research: A critical perspective, use cases, and recommendations for IS research

Christian Maier et al.

Summary: This editorial reviews cross-sectional studies, discusses their strengths and limitations, and provides recommendations for the appropriate use of such data. The authors raise concerns about establishing causal relationships without temporal order in cross-sectional methods. They emphasize the importance of reporting research in detail, ensuring appropriate sampling, taking configurational perspectives, and integrating cross-sectional data into mixed-method designs.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2023)

Article Computer Science, Information Systems

WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES

Wilson Weixun Li et al.

Summary: Data breaches pose significant risks to an organization's reputation and customer trust, making continuous investment in security measures necessary. However, the effectiveness of such investments has been questioned. Through an eight-year panel study of 311 U.S.-listed firms, we demonstrate the bidirectional relationship between IT investment, data breaches, and the level of threat and countermeasure security awareness. We find that threat awareness expands firms' focus on data breach issues, leading to higher IT investment compared to security investment, while countermeasure awareness enables effective implementation of IT for more comprehensive protection. Our findings suggest the need for a proactive approach that emphasizes both threat and countermeasure awareness to address underlying IT system vulnerabilities causing data breaches.

MIS QUARTERLY (2023)

Article Information Science & Library Science

How commitment and platform adoption drive the e-commerce performance of SMEs: A mixed-method inquiry into e-commerce affordances

Jacopo Ballerini et al.

Summary: In order to adapt to the digital transition amplified by the COVID-19 pandemic, managers of manufacturing SMEs need to adopt innovative practices known as transformational entrepreneurship practices. Digital platforms are becoming more influential than traditional e-commerce channels, providing manufacturing SMEs with opportunities for digital transformation. This research investigates the relationship between e-commerce commitment, digital platform adoption, and the actualization of e-commerce affordances through a mixed method approach, finding that different e-commerce approaches and degrees of e-commerce commitment can lead to the realization of various e-commerce affordances.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2023)

Article Computer Science, Artificial Intelligence

A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks

Baidyanath Biswas et al.

DECISION SUPPORT SYSTEMS (2023)

Article Computer Science, Information Systems

CAN CYBER RISK OF HEALTH CARE FIRMS BE INSURED? A MULTINOMIAL LOGISTIC REGRESSION MODEL

Swati Jain et al.

Summary: In this study, we propose an H-CRAM model that computes the risk of a cyber-attack in the healthcare sector based on the Protection Motivation Theory (PMT). We suggest that training healthcare staff, implementing IT governance, and using technology can reduce the probability of a cyber threat. The CIO of a healthcare firm should invest in encryption, SIEM, and SOAR tools to reduce cyber-risk and transfer the remaining risk to a cyber insurer.

JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2023)

Article Computer Science, Theory & Methods

A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions

Harun Oz et al.

Summary: This paper presents a comprehensive survey on ransomware and ransomware defense research with respect to PCs/workstations, mobile devices, and IoT/CPS platforms. It covers 137 studies from 1990 to 2020, providing a detailed overview of ransomware evolution, key building blocks, notable ransomware families, and defense research. The paper also identifies open issues for future research, aiming to motivate further research in the field of ransomware.

ACM COMPUTING SURVEYS (2022)

Article Oncology

How to Respond to a Ransomware Attack? One Radiation Oncology Department's Response to a Cyber-Attack on Their Record and Verify System

Amy S. Harrison et al.

Summary: The digitization of healthcare has brought convenience to patient safety and efficiency, but it has also increased the possibility of cyberattacks. This article summarizes the response to a ransomware attack, including the innovative use of direct DICOM transfer and paper charts to continue patient treatments. The lessons learned from this event provide valuable information for cyber-attack preparedness in radiation oncology departments.

PRACTICAL RADIATION ONCOLOGY (2022)

Review Computer Science, Information Systems

Antecedents and consequences of data breaches: A systematic review

Frederic Schlackl et al.

Summary: Research on data breaches is diverse and encompasses various disciplines and methodologies. This study reviewed 43 articles on the causes and 83 articles on the consequences of data breaches, identifying eight categories for each. The majority of the research employs an empirical-quantitative approach and focuses on organizational units as the analytical framework. Theoretical perspectives range from viewing data breaches as organizational crises to adoption of criminological and privacy-specific theories. This review provides a synthesis of existing research and highlights future implications for the data breach literature.

INFORMATION & MANAGEMENT (2022)

Article Computer Science, Information Systems

An exploratory study of organizational cyber resilience, its precursors and outcomes

Elinor Tsen et al.

Summary: This paper analyzes the cyber resilience of organizations and its impact on the outcomes of cyber attacks. The study finds that organizations that have suffered cyber attacks tend to have lower levels of cyber resilience, reflected in factors such as lower frequency of cybersecurity roles, low reliance on cybersecurity frameworks, and weaker prevention, detection, and recovery controls. Cyber resilience is influenced by factors such as sector, size, and digital intensity.

JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2022)

Article Computer Science, Information Systems

Does privacy breach affect firm performance? An analysis incorporating event-induced changes and event clustering

Manas Tripathi et al.

Summary: Previous studies mainly focused on the impact of cybersecurity breaches on firm performance, while the impact of privacy breaches on firm performance has been less explored. This study used an advanced market model (AMM) to observe the impact of privacy breaches on stock returns and found that they have a negative effect on abnormal returns. The study also considered event clustering and used seemingly unrelated regression (SUR) for evaluation.

INFORMATION & MANAGEMENT (2022)

Article Information Science & Library Science

Security breaches and organization response strategy: Exploring consumers' threat and coping appraisals

Carol Xiaojuan Ou et al.

Summary: This study addresses a gap in the Information Management literature by examining the relationships among security breaches, organization response strategies, and consumers' threat and coping appraisals. The findings suggest that the response strategies adopted by organizations after a security breach significantly impact consumers' reactions. This research has important implications for both theory and practice.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2022)

Article Information Science & Library Science

The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities

Lai-Wan Wong et al.

Summary: This paper investigates the impact of general cybersecurity and cybersecurity policy awareness on the supply chain cyber resilience reactive capabilities of Small and Medium Enterprises (SMEs), emphasizing the importance of preventive measures and employee cyber hygiene.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2022)

Article Computer Science, Information Systems

COMBINING CROWD AND MACHINE INTELLIGENCE TO DETECT FALSE NEWS ON SOCIAL MEDIA

Xuan Wei et al.

Summary: The rapid spread of false news on social media has had a significant impact on various areas such as news ecosystems, politics, economics, and public trust. Machine intelligence has limitations in detecting and curbing false news, and human knowledge and intelligence have great potential to complement machine-based methods. This research proposes a novel framework called CAND, which combines scalable crowd judgments with machine intelligence to address the false news crisis. Evaluation results demonstrate the effectiveness of crowd intelligence and the superior performance of the proposed framework, providing valuable insights on the complementary value of human and machine intelligence, early detection using human intelligence, and robustness to intentional manipulation.

MIS QUARTERLY (2022)

Article Computer Science, Information Systems

Sarima-Based Cyber-Risk Assessment and Mitigation Model for A Smart City's Traffic Management Systems (Scram)

Kalpit Sharma et al.

Summary: This study proposes a time series-based model for risk assessment and mitigation in smart cities, utilizing the protection-motivation theory. The model enables smart city administrators to assess cyber risks and implement corresponding measures for risk mitigation.

JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2022)

Review Computer Science, Theory & Methods

Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions

Timothy McIntosh et al.

Summary: Although ransomware has evolved aggressively over the years, there is a lack of up-to-date and comprehensive studies evaluating its mitigation techniques. This survey examines the current concept of ransomware, reveals the inadequacies in current research, proposes unified metrics, and evaluates 118 studies to compare their strengths and weaknesses. Future trends and research directions are also forecasted to address the ongoing evolution of ransomware.

ACM COMPUTING SURVEYS (2022)

Article Business

The impact of CIO characteristics on data breaches

Thomas Smith et al.

Summary: This study explores the role of Chief Information Officers (CIOs) in cybersecurity risk exposure, finding that firms disclosing the presence of a CIO are more likely to be breached. The research also reveals the impact of human and structural capital characteristics of CIOs on cybersecurity risk.

INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS (2021)

Editorial Material Radiology, Nuclear Medicine & Medical Imaging

Ransomware Recovery and Imaging Operations: Lessons Learned and Planning Considerations

Po-Hao Chen et al.

Summary: This article discusses the critical lessons learned from ransomware recovery and proposes a four-phase recovery planning framework. It emphasizes focusing on acute patient care, incident communication, and emergency imaging operations in the initial phase, transitioning to long-term analog workflows in the next phase. The infrastructure recovery and reconciliation phases highlight rebuilding a ransomware-free environment and reconciling data accrued during extended downtime.

JOURNAL OF DIGITAL IMAGING (2021)

Article Information Science & Library Science

Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy

Yogesh K. Dwivedi et al.

Summary: The development of artificial intelligence technology has the potential to significantly impact various industries and society as a whole. Industries ranging from finance to healthcare may be disrupted by AI technologies, and it is important to recognize the societal and industrial influence on the pace and direction of AI development.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2021)

Article Business, Finance

Risk management, firm reputation, and the impact of successful cyberattacks on target firms

Shinichi Kamiya et al.

Summary: In the developed model, a firm optimizes its exposure to cyber risk. Successful cyberattacks have little impact on financially unconstrained firms' reputation and policies, but result in significant shareholder wealth loss when personal financial information is compromised. Additionally, attacks decrease a firm's risk appetite, leading to increased risk management and decreased risk-taking incentives for management.

JOURNAL OF FINANCIAL ECONOMICS (2021)

Article Computer Science, Information Systems

TRAJECTORIES OF REPEATED READMISSIONS OF CHRONIC DISEASE PATIENTS: RISK STRATIFICATION, PROFILING, AND PREDICTION

Ofir Ben-Assuli et al.

MIS QUARTERLY (2020)

Article Chemistry, Multidisciplinary

A Multi-Tier Streaming Analytics Model of 0-Day Ransomware Detection Using Machine Learning

Hiba Zuhair et al.

APPLIED SCIENCES-BASEL (2020)

Article Computer Science, Artificial Intelligence

A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

Baidyanath Biswas et al.

DECISION SUPPORT SYSTEMS (2020)

Article Social Sciences, Interdisciplinary

An empirical study of ransomware attacks on organizations: an assessment of severity and salient factors affecting vulnerability

Lena Yuryna Connolly et al.

JOURNAL OF CYBERSECURITY (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

The Growing Influence of Ransomware

Matthew A. Mos et al.

2020 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT) (2020)

Article Computer Science, Information Systems

Centralized IT Decision Making and Cybersecurity Breaches: Evidence from US Higher Education Institutions

Che-Wei Liu et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2020)

Article Computer Science, Information Systems

Understanding Security Vulnerability Awareness, Firm Incentives, and ICT Development in Pan-Asia

Yunhui Zhuang et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2020)

Article Computer Science, Information Systems

IS CYBERSECURITY A TEAM SPORT? A MULTILEVEL EXAMINATION OF WORKGROUP INFORMATION SECURITY EFFECTIVENESS

Chul Woo Yoo et al.

MIS QUARTERLY (2020)

Article Information Science & Library Science

Stakeholder perceptions of information security policy: Analyzing personal constructs

Spyridon Samonas et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)

Article Information Science & Library Science

Theory building with big data-driven research - Moving away from the What towards the Why

Arpan Kumar Kar et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)

Article Computer Science, Information Systems

A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs

Saini Das et al.

INFORMATION SYSTEMS FRONTIERS (2019)

Article Computer Science, Information Systems

Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance

Arunabha Mukhopadhyay et al.

INFORMATION SYSTEMS FRONTIERS (2019)

Article Computer Science, Information Systems

The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures

Lena Y. Connolly et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Theory & Methods

Classification of ransomware families with machine learning based on N-gram of opcodes

Hanqi Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Digital transformation strategy making in pre-digital organizations: The case of a financial services provider

Simon Chanias et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2019)

Article Computer Science, Information Systems

A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware

Ahmad O. Almashhadani et al.

IEEE ACCESS (2019)

Article Information Science & Library Science

How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information?

Seung Hyun Kim et al.

INFORMATION SYSTEMS RESEARCH (2019)

Article Business

Big data analytics and firm performance: Findings from a mixed-method approach

Patrick Mikalef et al.

JOURNAL OF BUSINESS RESEARCH (2019)

Article Computer Science, Information Systems

A Cyber-Kill-Chain based taxonomy of crypto-ransomware features

Tooska Dargahi et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2019)

Article Computer Science, Information Systems

ADOPTION OF SUSTAINABLE TECHNOLOGIES: A MIXED-METHODS STUDY OF GERMAN HOUSEHOLDS

Philipp Wunderlich et al.

MIS QUARTERLY (2019)

Article Information Science & Library Science

Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior

Ling Li et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2019)

Article Computer Science, Artificial Intelligence

Cyber-analytics: Modeling factors associated with healthcare data breaches

Alexander McLeod et al.

DECISION SUPPORT SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory

Aviad Cohen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Information Systems

On the economic significance of ransomware campaigns: A Bitcoin transactions perspective

Mauro Conti et al.

COMPUTERS & SECURITY (2018)

Article Engineering, Multidisciplinary

Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection

Bander Ali Saleh Al-rimy et al.

INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING (2018)

Review Computer Science, Information Systems

Evolution of ransomware

Philip O'Kane et al.

IET NETWORKS (2018)

Article Computer Science, Information Systems

Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications

Jingguo Wang et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

HEALTHCARE PREDICTIVE ANALYTICS FOR RISK PROFILING IN CHRONIC CARE: A BAYESIAN MULTITASK LEARNING APPROACH

Yu-Kai Lin et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

A TREE-BASED APPROACH FOR ADDRESSING SELF-SELECTION IN IMPACT STUDIES WITH BIG DATA

Inbal Yahav et al.

MIS QUARTERLY (2016)

Review Green & Sustainable Science & Technology

On the definition of cyber-physical resilience in power systems

Reza Arghandeh et al.

RENEWABLE & SUSTAINABLE ENERGY REVIEWS (2016)

Proceedings Paper Business, Finance

Information Security: Risk, Governance and Implementation Setback

M. R. Fazlida et al.

7TH INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015, 7TH ICFC 2015 (2015)

Article Computer Science, Artificial Intelligence

Cyber-risk decision models: To insure IT or not?

Arunabha Mukhopadhyay et al.

DECISION SUPPORT SYSTEMS (2013)

Article Computer Science, Information Systems

DIGITAL BUSINESS STRATEGY: TOWARD A NEXT GENERATION OF INSIGHTS

Anandhi Bharadwaj et al.

MIS QUARTERLY (2013)

Article Political Science

Revenue Diversification in Nonprofit Organizations: Does it Lead to Financial Stability?

Deborah A. Carroll et al.

JOURNAL OF PUBLIC ADMINISTRATION RESEARCH AND THEORY (2009)

Article Information Science & Library Science

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements

Sandip C. Patel et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2008)

Article Business, Finance

Interdependent security

H Kunreuther et al.

JOURNAL OF RISK AND UNCERTAINTY (2003)

Article Computer Science, Hardware & Architecture

A framework for using insurance for cyber-risk management

LA Gordon et al.

COMMUNICATIONS OF THE ACM (2003)