CYBER INSURANCE
Abstract
Keywords
Full Text:
PDF (Cрпски)References
Agrawal, T., Henry, D. & Finkle, J. (2014, October 2). JP Morgan hack exposed data of 83 million, among biggest breaches in history. Reuters. Retrieved from http://www.reuters.com/article/us-jpmorgan-cybersecurity-idUSKCN0HR23T20141003.
Allianz Global Corporate & Specialty SE. (2015). A Guide to Cyber Risk. Munich: Allianz Global Corporate & Specialty SE.
Association of British Insurers. (2015). Cyber insurance to become a business essential within the next decade. Retrieved from https://www.abi.org.uk/News/News-releases/2015/05/Cyber-insurance-to-become-a-business-essential-within-the-next-decade.
Beck, D., Siemens, R. (2012). Cyber Insurance – Mitigating Loss from Cyber Attacks. Perspectives on Insurance Recovery Newsletter. New York: Pillsbury Winthrop Shaw Pittman LLP. Retrieved from http://www.pillsburylaw.com/publications/cyber-insurancemitigating-loss-from-cyber-attacks.
Bolton, D. (2016, May 16). Hackers and Government surveillance are making people abandon the Internet, survey finds. Independent. Retrieved from http://www.independent.co.uk/life-style/gadgets-and-tech/news/hacking-cybersecurity-cyberattack-surveillance-nsa-cia-gchq-internet-use-effect-a7031926.html.
CRO Forum. (2014). Cyber resilience: The cyber risk challenge and the role of insurance. Amsterdam: CRO Forum & KPMG Advisory N.V.
Cumming, L. (2011, July 17). Art Theft and the Case of the Stolen Turners by Sandy Nairne – review. The Guardian. Retrieved from https://www.theguardian.com/books/2011/jul/17/art-theft-case-stolen-turners-review.
Cyber-attack. (2016, April 17). In Wikipedia, the free encyclopedia. Retrieved May 20, 2016, from https://en.wikipedia.org/wiki/Cyber-attack.
European Commission. (2013, Ferbuary 7). Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions – Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN(2013) 1 final. Brussels: European Commission.
European Cybersecurity Industry Leaders. (2016). Recommendations on Cybersecurity for Europe. Forum International de la Cybersécurité. Lille: European Cybersecurity Industry Leaders.
Griffin, A. (2016a, May 4). Instagram hacked by 10-year-old, who wins $10,000 prize for finding way to delete comments. Independent. Retrieved from http://www.independent.co.uk/life-style/gadgets-and-tech/news/instagram-hacked-by-10-year-old-who-gets-10000-prize-for-finding-way-to-delete-users-comments-a7012496.html.
Griffin, A. (2016b, May 10). iPhone app tells users if phones have been hacked into or secretly jailbroken. Independent. Retrieved from http://www.independent.co.uk/life-style/gadgets-and-tech/news/iphone-app-tells-users-if-phones-have-been-hacked-into-or-secretly-jailbroken-a7022236.html.
Hiscox PLC. (2015). Cyber and data Policy wording, WD-PIP-UK-CD(2) 13388 05/15.
HM Government & Marsh Ltd. (2015). UK Cyber Security: The Role of Insurance in Managing and Mitigating the Risk. London: Marsh Ltd.
Insurance Information Institute. (2014). Cyber Risks: The Growing Threat. New York: Insurance Information Institute.
Кривични законик [Criminal Code], Службени гласник РС. Бр. (85/2005), 88/2005, 107/2005, 72/2009, 111/2009, 121/2012, 104/2013 и 108/2014.
Lemos, R. (2014, September 19). Home Depot estimates data on 56 million cards stolen by cybercriminals. Ars Technica. Retrieved from http://arstechnica.com/security/2014/09/home-depot-estimates-data-on-56-million-cards-stolen-by-cybercrimnals/.
Lloyd’s Cyber Core Data Requirements. (n.d.). Retrieved from http://www.lloyds.com/
news-and-insight/risk-insight/emerging-risks-team/cyber-core-data-requirements, May 26, 2016.
Malicious Software (Malware). (n. d.). In Techopedia. Retrieved May 26, 2016, from https://www.techopedia.com/definition/4015/malicious-software-malware.
Nakashima, E. (2011, August 3). Report on ‘Operation Shady RAT’ identifies widespread cyber-spying. The Washington Post. Retrieved from https://www.washingtonpost.com/national/national-security/report-identifies-widespread-cyber-spying/2011/07/29/gIQAoTUmqI_story.html.
QBE Insurance (Europe) Limited. (n. d.). QBE Cyber Response: Cyber and Data Security Insurance Policy, PCYB020414 QBE Cyber Response (QBE PI 14 CR).
Rawlings, P. (2015). Cyber Risk: Insuring the Digital Age. Legal Studies Research Paper No. 189/2015. London: Queen Mary University of London, School of Law.
Securities and Exchange Commission. (2011). CF Disclosure Guidance: Topic No. 2 – Cybersecurity. Retrieved from http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm.
The Institute of Risk Management. (2014). IRM Cyber Risk: Executive Summary. London: The Institute of Risk Management.
Trautman, L. (2016, March 25). Is Cyberattack the Next Pearl Harbor? North Carolina Journal of Law and Technology, Vol. 18, 2017 Forthcoming. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2711059, May 27, 2016.
UK Department for Culture, Media & Sport and Ed Vaizey MP. (2016). Two thirds of large UK businesses hit by cyber breach or attack in past year. London: UK Department for Culture, Media & Sport and Ed Vaizey MP. Retrieved from https://www.gov.uk/government/news/two-thirds-of-large-uk-businesses-hit-by-cyber-breach-or-attack-in-past-year.
Закон о електронским комуникацијама [Electronic Communications Act], Службени гласник РС. бр. (45/2010).
DOI: https://doi.org/10.22190/TEME1703823J
Refbacks
- There are currently no refbacks.
© University of Niš, Serbia
Creative Commons licence CC BY-NC-ND
Print ISSN: 0353-7919
Online ISSN: 1820-7804