CORDIS - Wyniki badań wspieranych przez UE
CORDIS

Supporting Cyberinsurance from a Behavioural Choice Perspective

Rezultaty

Project Website and Social Media

The deliverable will consist of a fully functional project website also including social media pages. The website will include the internal consortium coordination space.

Description Methodology & Design Principles of the CYBECO Toolbox

Will encompass T5.1 results including business requirements and constraints, integration requirements, preliminary solution specifications and planning of prototype tool development. Two (2) versions of the document are planned: 1.0 (M10) to address CYBECO Toolbox 1.0; 2.0 (M18) to address end user feedback and CYBECO Toolbox 2.0 specs.

Development of Dissemination Material

The deliverable contains printed and digital material that will be produced and distributed during the project.

CYBECO policy recommendations

A report identifying gaps in directives, standards, policy design and cyber insurance services and how they may be sorted out in light of CYBECO findings.

(a-e). Periodic Report

Covers the reports to be sent periodically to the EC. These include the six-monthly, annual progress and final reports.

Concept Note with Design of the Economic Experiments.

A concept note regarding the design of economic experiments based on T6.1 activities.

Advisory Booard Recommendation Report

Intermediate (M12) and final (M18) reports of the Advisory board with recommendations.

Use-Case Evaluation of the Methodology and Framework

Document describing the outcome of the evaluation of the framework and the methodology with respect to the established cyber-insurance use-cases and scenarios.

Modelling Framework for Cyber Risk Management

Document describing the methodology and framework in sufficient detail for implementation in tool.

CYBECO Content and Data Collection Manual

Will specify the data and content collection procedures and will specify the annotation of content based on common expert-generated vocabularies.

Innovation Schedule and Risk Management Plan

Provides an innovation schedule referring to delivery of relevant project innovations and defines a risk management plan accompanied by concrete mitigation activities.

Report with Main Findings of Experiments and Policy Implications

A report summarising the results and conclusions of the experiments and their policy implications.

Dissemination Reports

The deliverable will contain the initial dissemination strategy, including the initial list of relevant stakeholders and expected dissemination approaches. Will be updated with the dissemination activities executed through the years. First reports on M12.

Improved Modelling Framework for Cyber Risk Management

Document describing the improved methodology and framework after the experiments.

Cyber-Insurance Use-Cases and Scenarios

Document providing the initial description of the use-cases and scenarios.

Dissemination and Communication Plan

The deliverable is the project’s dissemination and communication plan including a stakeholders’ analysis, objectives, dissemination channels and activities.

Project Handbook

Ensure a smooth initiation to the overall project in order to reduce risks and delays later in the project lifecycle. Definition of the KPI monitoring methods and procedures. System in place, with agreement and provision for auditing.

Data Management Plan

Data management plan that conforms to H2020 Guidelines.

Organisation of Final Event

Organisation of final event with stakeholders and end users to present the results. It wll be organised as a Lorentz seminar at the Lorentz center.

Publikacje

Some risk analysis problems in cyber insurance economics.

Autorzy: David Ríos, Aitor Couce, Kreshnik Musaraj
Opublikowane w: Est. Econ Aplicada, Numer 36, 2018, 2018, Strona(/y) 181-194, ISSN 1133-3197
Wydawca: Estudios de economía aplicada

An Adversarial Risk Analysis Framework for Cybersecurity

Autorzy: David Rios Insua, Aitor Couce‐Vieira, Jose A. Rubio, Wolter Pieters, Katsiaryna Labunets, Daniel G. Rasines
Opublikowane w: Risk Analysis, 2019, ISSN 0272-4332
Wydawca: Blackwell Publishing Inc.
DOI: 10.1111/risa.13331

The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

Autorzy: Wytske van der Wagen, Wolter Pieters
Opublikowane w: European Journal of Criminology, 2018, Strona(/y) 147737081881201, ISSN 1477-3708
Wydawca: SAGE Publications
DOI: 10.1177/1477370818812016

Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach

Autorzy: Jorge González-Ortega, David Ríos Insua, Javier Cano
Opublikowane w: European Journal of Operational Research, Numer 273/3, 2019, Strona(/y) 1085-1096, ISSN 0377-2217
Wydawca: Elsevier BV
DOI: 10.1016/j.ejor.2018.09.015

Challenges in Cybersecurity and Privacy - the European Research Landscape

Autorzy: Jorge Bernal Bernabe, Antonio Skarmeta
Opublikowane w: Challenges in Cybersecurity and Privacy - the European Research Landscape, Numer 1, 2019, Strona(/y) 1-372, ISBN 9788-770220873
Wydawca: River Publisher
DOI: 10.13052/rp-9788770220873

Adversarial risk analysis as an expert judgement technique

Autorzy: D. Ríos, J. Ortega, D. Banks. J. Ríos
Opublikowane w: The art and science of expert judgement elicitation, 2019
Wydawca: Springer

Philosophy of Security Engineering

Autorzy: Wolter Pieters
Opublikowane w: Philosophy of Security Engineering, 2019
Wydawca: TBD

No search allowed - what risk modeling notation to choose?

Autorzy: Katsiaryna Labunets
Opublikowane w: Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '18, 2018, Strona(/y) 1-10, ISBN 9781-450358231
Wydawca: ACM Press
DOI: 10.1145/3239235.3239247

On Security Singularities

Autorzy: Wolter Pieters
Opublikowane w: Proceedings of the New Security Paradigms Workshop on - NSPW '18, 2018, Strona(/y) 80-88, ISBN 9781-450365970
Wydawca: ACM Press
DOI: 10.1145/3285002.3285008

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników