Búsqueda

Pricing of cyber insurance contracts in a network model

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20180031991</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20181122110428.0</controlfield>
    <controlfield tag="008">181119e20180903gbr|||p      |0|||b|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">6</subfield>
    </datafield>
    <datafield tag="100" ind1=" " ind2=" ">
      <subfield code="0">MAPA20180014598</subfield>
      <subfield code="a">Fahrenwaldt, Matthias A.</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Pricing of cyber insurance contracts in a network model</subfield>
      <subfield code="c">Matthias A. Fhrendwaldt, Stefan Weber, Kerstin Weske</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">The considered cyber threats, such as viruses and worms, diffuse in a structured data network. The spread of the cyber infection is modeled by an interacting Markov chain. Conditional on the underlying infection, the occurrence and size of claims are described by a marked point process.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080564322</subfield>
      <subfield code="a">Tarificación</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20170003779</subfield>
      <subfield code="a">Seguro de ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080612429</subfield>
      <subfield code="a">Riesgos extraordinarios</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080586294</subfield>
      <subfield code="a">Mercado de seguros</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080602437</subfield>
      <subfield code="a">Matemática del seguro</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080579258</subfield>
      <subfield code="a">Cálculo actuarial</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20180014710</subfield>
      <subfield code="a">Weber, Stefan</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20180014727</subfield>
      <subfield code="a">Weske, Kerstin</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000420</subfield>
      <subfield code="t">Astin bulletin</subfield>
      <subfield code="d">Belgium : ASTIN and AFIR Sections of the International Actuarial Association</subfield>
      <subfield code="x">0515-0361</subfield>
      <subfield code="g">03/09/2018 Volumen 48 Número 3 - septiembre 2018 , p. 1175-1218</subfield>
    </datafield>
  </record>
</collection>