| 000 | 03269cam a2200565Ii 4500 | ||
|---|---|---|---|
| 999 |
_c93936 _d93936 |
||
| 001 | 13553215 | ||
| 005 | 20260227104013.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 220708s2022 mau ob 001 0 eng d | ||
| 020 |
_a9780262370752 _qelectronic book |
||
| 020 |
_a0262370751 _qelectronic book |
||
| 020 |
_a9780262370769 _q(electronic bk.) |
||
| 020 |
_a026237076X _q(electronic bk.) |
||
| 020 | _z9780262544184 | ||
| 020 | _z0262544180 | ||
| 035 | _a(OCoLC)1334725282 | ||
| 035 | 9 | _a(OCLCCM-CC)1334725282 | |
| 037 |
_a13665 _bMIT Press |
||
| 037 |
_a9780262370752 _bMIT Press |
||
| 037 |
_a46CABB11-750D-4670-916D-37F7D423DD9C _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 040 |
_aMITPR _beng _erda _epn _cMITPR _dYDXIT _dN$T _dTEFOD _dUKAHL _dOCLCQ |
||
| 041 | _aeng | ||
| 049 | _aMAIN | ||
| 050 | 4 |
_aHG9963.5 _b.W65 2022 |
|
| 082 | 0 | 0 |
_223 _a658.002/85 |
| 100 | 1 |
_aWolff, Josephine, _eauthor. _0http://id.loc.gov/authorities/names/n2018024122 |
|
| 245 | 1 | 0 |
_aCyberinsurance policy : _brethinking risk in an age of ransomware, computer fraud, data breaches, and cyberattacks / _cJosephine Wolff. |
| 264 | 1 |
_aCambridge, Massachusetts : _bThe MIT Press ; _c[2022] |
|
| 300 | _a1 online resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 490 | 1 | _aInformation policy series | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aIntroduction: A market-driven approach to cybersecurity -- Breach on the beach : origins of cyberinsurance -- "The hackers did this" : data breach lawsuits and commercial -- "The point of no return" : computer fraud insurance and defining cybercrime -- "Insurrection, rebellion, revolution, riot" : NotPetya, property insurance, and war exclusions -- "The big kahuna" : stand-alone cyber coverage -- "What is the point of collecting data?" : global growth of cyberinsurance and roles for policymakers -- Conclusion: Is cyber risk different? | |
| 520 |
_a"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"-- _cProvided by publisher. |
||
| 540 |
_aCreative Commons Attribution-NonCommercial-NoDerivatives 4.0 International _fCC BY-NC-ND 4.0 _uhttps://creativecommons.org/licenses/by-nc-nd/4.0/ |
||
| 588 | _aDescription based on online resource; title from digital title page (viewed on August 30, 2022). | ||
| 650 | 0 |
_aComputer insurance. _0http://id.loc.gov/authorities/subjects/sh85066874 |
|
| 650 | 0 |
_aComputer security _xManagement. |
|
| 650 | 0 |
_aCyberspace _xSecurity measures _xManagement. |
|
| 650 | 0 |
_aComputer crimes _xPrevention. |
|
| 650 | 0 |
_aRisk management. _0http://id.loc.gov/authorities/subjects/sh85114200 |
|
| 650 | 7 |
_aComputer security _xManagement. _2fast _0(OCoLC)fst00872493 |
|
| 655 | 4 | _aelectronic book. | |
| 830 | 0 |
_aInformation policy series. _0http://id.loc.gov/authorities/names/no2014101189 |
|
| 856 | 4 | 0 |
_uhttps://directory.doabooks.org/handle/20.500.12854/93165 _yFull text is available at the Directory of Open Access Books. Click here to view. |
| 942 |
_2ddc _cOA |
||