European Commission logo
English English
CORDIS - EU research results

Supporting Cyberinsurance from a Behavioural Choice Perspective


Project Website and Social Media

The deliverable will consist of a fully functional project website also including social media pages. The website will include the internal consortium coordination space.

Description Methodology & Design Principles of the CYBECO Toolbox

Will encompass T5.1 results including business requirements and constraints, integration requirements, preliminary solution specifications and planning of prototype tool development. Two (2) versions of the document are planned: 1.0 (M10) to address CYBECO Toolbox 1.0; 2.0 (M18) to address end user feedback and CYBECO Toolbox 2.0 specs.

Development of Dissemination Material

The deliverable contains printed and digital material that will be produced and distributed during the project.

CYBECO policy recommendations

A report identifying gaps in directives, standards, policy design and cyber insurance services and how they may be sorted out in light of CYBECO findings.

(a-e). Periodic Report

Covers the reports to be sent periodically to the EC. These include the six-monthly, annual progress and final reports.

Concept Note with Design of the Economic Experiments.

A concept note regarding the design of economic experiments based on T6.1 activities.

Advisory Booard Recommendation Report

Intermediate (M12) and final (M18) reports of the Advisory board with recommendations.

Use-Case Evaluation of the Methodology and Framework

Document describing the outcome of the evaluation of the framework and the methodology with respect to the established cyber-insurance use-cases and scenarios.

Modelling Framework for Cyber Risk Management

Document describing the methodology and framework in sufficient detail for implementation in tool.

CYBECO Content and Data Collection Manual

Will specify the data and content collection procedures and will specify the annotation of content based on common expert-generated vocabularies.

Innovation Schedule and Risk Management Plan

Provides an innovation schedule referring to delivery of relevant project innovations and defines a risk management plan accompanied by concrete mitigation activities.

Report with Main Findings of Experiments and Policy Implications

A report summarising the results and conclusions of the experiments and their policy implications.

Dissemination Reports

The deliverable will contain the initial dissemination strategy, including the initial list of relevant stakeholders and expected dissemination approaches. Will be updated with the dissemination activities executed through the years. First reports on M12.

Improved Modelling Framework for Cyber Risk Management

Document describing the improved methodology and framework after the experiments.

Cyber-Insurance Use-Cases and Scenarios

Document providing the initial description of the use-cases and scenarios.

Dissemination and Communication Plan

The deliverable is the project’s dissemination and communication plan including a stakeholders’ analysis, objectives, dissemination channels and activities.

Project Handbook

Ensure a smooth initiation to the overall project in order to reduce risks and delays later in the project lifecycle. Definition of the KPI monitoring methods and procedures. System in place, with agreement and provision for auditing.

Data Management Plan

Data management plan that conforms to H2020 Guidelines.

Organisation of Final Event

Organisation of final event with stakeholders and end users to present the results. It wll be organised as a Lorentz seminar at the Lorentz center.


Some risk analysis problems in cyber insurance economics.

Author(s): David Ríos, Aitor Couce, Kreshnik Musaraj
Published in: Est. Econ Aplicada, Issue 36, 2018, 2018, Page(s) 181-194, ISSN 1133-3197
Publisher: Estudios de economía aplicada

An Adversarial Risk Analysis Framework for Cybersecurity

Author(s): David Rios Insua, Aitor Couce‐Vieira, Jose A. Rubio, Wolter Pieters, Katsiaryna Labunets, Daniel G. Rasines
Published in: Risk Analysis, 2019, ISSN 0272-4332
Publisher: Blackwell Publishing Inc.
DOI: 10.1111/risa.13331

The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

Author(s): Wytske van der Wagen, Wolter Pieters
Published in: European Journal of Criminology, 2018, Page(s) 147737081881201, ISSN 1477-3708
Publisher: SAGE Publications
DOI: 10.1177/1477370818812016

Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach

Author(s): Jorge González-Ortega, David Ríos Insua, Javier Cano
Published in: European Journal of Operational Research, Issue 273/3, 2019, Page(s) 1085-1096, ISSN 0377-2217
Publisher: Elsevier BV
DOI: 10.1016/j.ejor.2018.09.015

Challenges in Cybersecurity and Privacy - the European Research Landscape

Author(s): Jorge Bernal Bernabe, Antonio Skarmeta
Published in: Challenges in Cybersecurity and Privacy - the European Research Landscape, Issue 1, 2019, Page(s) 1-372, ISBN 9788-770220873
Publisher: River Publisher
DOI: 10.13052/rp-9788770220873

Adversarial risk analysis as an expert judgement technique

Author(s): D. Ríos, J. Ortega, D. Banks. J. Ríos
Published in: The art and science of expert judgement elicitation, 2019
Publisher: Springer

Philosophy of Security Engineering

Author(s): Wolter Pieters
Published in: Philosophy of Security Engineering, 2019
Publisher: TBD

No search allowed - what risk modeling notation to choose?

Author(s): Katsiaryna Labunets
Published in: Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '18, 2018, Page(s) 1-10, ISBN 9781-450358231
Publisher: ACM Press
DOI: 10.1145/3239235.3239247

On Security Singularities

Author(s): Wolter Pieters
Published in: Proceedings of the New Security Paradigms Workshop on - NSPW '18, 2018, Page(s) 80-88, ISBN 9781-450365970
Publisher: ACM Press
DOI: 10.1145/3285002.3285008

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available