바로가기메뉴

본문 바로가기 주메뉴 바로가기

logo

Cyber Insurance and Distribution Channels

The Journal of Distribution Science / The Journal of Distribution Science, (P)1738-3110; (E)2093-7717
2018, v.16 no.5, pp.61-70
https://doi.org/https://doi.org/10.15722/jds.16.5.201805.61
Kwak, Young-Arm
Cho, Young-Sang
  • Downloaded
  • Viewed

Abstract

Purpose - These days, an individual user, private entity, hears everyday news of hacking and personal information leakage in the era of a most-connected society. This study investigates cyber attack, cyber insurance and distribution channels for insurance goods in South Korea by analyzing various cases of cyber attacks in domestic and overseas case. Research design, data and methodology - This study adopted various study cases instead of the one large case for deep quality analysis, and focused on various cases of domestic and overseas cyber attacks with insurance. Result - As a result of analyzing the cases that were hacked, types of massive losses and damages arising out of internet blackout due to cyber risks are paralyzation of public and private website and portal, electronic administrative system, public infrastructure, and consequently a normal operation of nation is impossible. These losses and damages however can be coverable under cyber insurance. Conclusions - This paper suggests insurance carriers, as suppliers, should provide multiple channels to sell to the customer and should expand the strategy of advertisement and promotion in order for them to change their mind and compare the price and value of the information of individual users and private entity in view of cost savings.

keywords
Internet of Things, Internet Blackout, Cyber Risk, Information Leakage, Distribution Channel

Reference

1.

Abdo, H., Kaouk, M., Flaus, J. M., & Masse, F. (2018). A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie – Combining new version of attack tree with bowtie analysis. Computers & security, 72(1), 175-195.

2.

Adeleke, L. A., Ibiwoye, A., & Olowokudejo, F. F. (2011). Cyber Risk Exposure and Prospects for Cyber Insurance. International Journal of Management Business, 1(4), 221-230.

3.

Chinomona, R. (2012). The Role of Dealers’ Non-Mediated Power in Fostering SME Manufacturers’ Cooperation: SME Manufacturers’ Perspective. Journal of Industrial Distribution & Business, 3(2), 5-16.

4.

Choi, S. S., Kim, P. J., & Lee, S. Y. (2011). A Research on Private apparel Brand’ Product Strategy in Discounted Stores. Journal of Industrial Distribution & Business, 2(2), 25-38.

5.

Crawford, S., & Piesse, D. (2014). Cyber insurance, security and data integrity, Part 1: Insights into cyber security and risk-2014, Ernst & Young LLP, 2(2), 7-9.

6.

Faga, H. P. (2017). The Implications Of Transnational Cyber Threats In International Humanitarian Law: Analysing The Distinction Between Cybercrime, Cyber Attack, And Cyber Warfare In The 21St Century. Baltic Journal of Law & Politics, 10(1), 1-34.

7.

Guerrero-Higueras, A. M., DeCastro-Garcia, N., & Matellan, V. (2018). Detection of Cyber-attacks to indoor real time localization systems for autonomous robots. Robotics and Autonomous Systems, 99(1), 75–83.

8.

Haicheng, S. (2012). Study on Contribution Rate of Essential Factor Market of nsurance Development to Economic Growth: Demonstration Analysis based on Chongqing in China. East Asian Journal of Business Management, 2(2), 27-33.

9.

Halloran, C. O., Robinson, T. G., & NeilBrock. (2017). Verifying cyber attack properties. Science of Computer Programming, 148(1), 3–25.

10.

Hayward, R. J. (2017). Evaluating The “Imminence” of A Cyber Attack For Purposes of Anticipatory Self-Defense. Columbia Law Review, 117(399), 399-434.

11.

Hong, J. H. (2013). Legal Issues of Insurance on Liability from Electronic Commerce. Dong-a Law Review, 59(2), 325-329.

12.

Hongxu, Y., Rui, X., & Fenfei, L. (2015). Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack. Journal of Power and Energy Engineering, 3(1), 77-84.

13.

Hwang, Y. H., & Yoo, J. H. (2016). A Study on the Distribution Estimation of Personal Data Leak Incidents. Journal of The Korea Institute of Information Security & Cryptology, 26(3), 799-808.

14.

Joo, H. (2017). The Impact of Corporate's Attributes on Corporate Pension Insurance Products & Type Preference. International Journal of Industrial Distribution & Business, 8(2), 21-31.

15.

Kazemi, A., Javanmard, H., & Mohammadi, R. (2017). Determining the Relationship between the Effective Factors of Strategic Behavior: A Case Study for Social Insurance Company of Tehran. East Asian Journal of Business Management, 7(1), 5-12.

16.

Kim, E. K. (2014). Study on Information Leakage Liability Insurance. The Korean Journal of Financial Law, 11(3), 149-176.

17.

Kim, S. M., Lee, S. Y., Kim, P. J., Nam, M., & Youn, M. K. (2010). Promotional Strategies of Local Drugstores. Journal of Industrial Distribution & Business, 1(1), 5-12.

18.

Kim, P. J., & Kim, H. K. (2017). The Effect of Loyalty Factors Perceived by Consumers on General Super Market. International Journal of Industrial Distribution & Business, 8(4), 37-46.

19.

Kwak, Y. A. (2009). A study on insurance utilization for recent cases of personal information leak on e-commerce. Journal of Korean Electronic Commerce Research Association, 10(2), 21-44.

20.

Lee, G. H., & Kim, S. C. (2017). The Growth Strategy of Retail Companies: Focusing on New Stores Expansion of E-mart. International Journal of Industrial Distribution & Business, 8(1), 15-22.

21.

Lee, S. H., Jun, H. J., & Kim, T. S. (2017). Risk Management Requirements for cyber Insurance. Journal of The Korea Institute of Information Security & Cryptology, 27(5), 1233~1245.

22.

Leszczyna, R. (2018). Cybersecurity and privacy in standards for smart grids – A comprehensive survey. Computer Standards & Interfaces, 56(1), 62–73.

23.

Menashri, H., & Baram, G. (2015). Critical Infrastructures and their Interdependence in a Cyber Attack – The Case of the U.S.. Military and Strategic Affairs, 7(1), 79-100.

24.

OECD Report (2017). Supporting an Effective Cyber Insurance Market. OECD Report for the G7 Presidency, 5(1), 13-14.

25.

Polatidis, N., Pavlidis, M., & Mouratidis, H. (2018). Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Computer Standards & Interfaces, 56(1), 74–82.

26.

Quan, S. X., & Youn, M. K. (2016). Analysis on Preceding Study of Consumer's Store-Choice Model: Focusing on Commercial Sphere Analysis Theories. International Journal of Industrial Distribution & Business, 7(4), 11-16.

27.

Romanosky, S., Ablon, L., & Kuehn, A., & Jones, T. (2017). Content Analysis of Cyber Insurance Policies: How do carriers write policies and price cyber risk?. Proceedings of the Workshop on the Economics of Information Security (WEIS), 8(2), 1040.

28.

Yang, J. M. (2011). A Review of NH Bank Cyber Attack. The Journal of Legal Studies, 19(2), 129-157.

The Journal of Distribution Science