請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/87899完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 堯里昂 | zh_TW |
| dc.contributor.advisor | Leon van Jaarsveldt | en |
| dc.contributor.author | 黃金蓮 | zh_TW |
| dc.contributor.author | Aureliana Winarto | en |
| dc.date.accessioned | 2023-07-31T16:11:58Z | - |
| dc.date.available | 2023-11-09 | - |
| dc.date.copyright | 2023-07-31 | - |
| dc.date.issued | 2023 | - |
| dc.date.submitted | 2023-06-27 | - |
| dc.identifier.citation | Ana-Maria, B., & Ghiorghe, B. (2012). Pricing General Insurance in a Competitive Market. "Ovidius" University Annals, Economic Sciences Series, 1-4.
Antaranews.com. (2017, May 20). Wannacry ransomware affected 12 institutions in Indonesia: Minister. Retrieved from Antaranews.com Web site: https://en.antaranews.com/news/111011/wannacry-ransomware-affected-12-institutions-in-indonesia-minister Antonio, Y., Indratno, S. W., & Saputro, S. W. (2021, October 26). Pricing of cyber insurance premiums using a Markov-based dynamic model with clustering structure. Retrieved from Plos One: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0258867 Baker, T., & Shortland, A. (2022, December 4). Insurance and enterprise: cyber insurance for ransomware. Retrieved from Springer Link: https://link.springer.com/article/10.1057/s41288-022-00281-7 Brown, R. L., & Lennox, W. S. (2015). Introduction to Ratemaking and Loss Reserving for Property and Casualty Insurance (4th Edition). Winsted: ACTEX Publications. BSSN. (2022). Cloud BSSN. Retrieved from BSSN Web Site: https://cloud.bssn.go.id/s/nM3mDzCkgycRx4S Cakti, A., & Ihsan, N. (2022, March 30). Digital economy key to make Indonesia major economy: Thohir. Retrieved from Antaranews.com: https://en.antaranews.com/news/222557/digital-economy-key-to-make-indonesia-major-economy-thohir Cartwright, A., Cartwright, E., MacColl, J., Mott, G., Turner, S., Sullivan, J., & Nurse, J. R. (2023, March 9). How cyber insurance influences the ransomware payment decision: theory and evidence. Retrieved from Springer Link: https://link.springer.com/article/10.1057/s41288-023-00288-8#Sec14 Chakravarti, J. (2023, May 18). LockBit Leaks 1.5TB of Data Stolen From Indonesia's BSI Bank. Retrieved from Bank Info Security: https://www.bankinfosecurity.com/lockbit-leaks-15tb-data-stolen-from-indonesias-bsi-bank-a-22110 Cisco. (n.d.). What is malware? Retrieved from Cisco Web site: https://www.cisco.com/site/us/en/products/security/what-is-malware.html Cisomag. (2022, January 21). Bank Indonesia Suffers Ransomware Attack, Suspects Conti Involvement. Retrieved from Cisomga Web site: https://cisomag.com/bank-indonesia-suffers-ransomware-attack-suspects-conti-involvement/ Claroty. (2022). The Global State of Industrial Cybersecurity 2021: Resilience Amid Disruption. Retrieved from Claroty Web site: https://claroty.com/resources/reports/the-global-state-of-industrial-cybersecurity CNN Indonesia. (2023, February 26). 5 Ransomware yang Paling Sering 'Ngerjain' Perusahaan di Indonesia (Top 5 Most Commonly Disruptive Ransomware in Indonesian Enterprises). Retrieved from CNN Indonesia Web Site: https://www.cnnindonesia.com/teknologi/20230221160558-192-915906/5-ransomware-yang-paling-sering-ngerjain-perusahaan-di-indonesia Cole, N. (2023, May 2). 23 Eye-Opening Cybersecurity Insurance Statistics (2023). Retrieved from Network Assured: https://networkassured.com/security/cybersecurity-insurance-statistics/ Crosley, J. (2021, April). What (Exactly) Is Thematic Analysis? Retrieved from Grad Coach: https://gradcoach.com/what-is-thematic-analysis/ Danis, L., & Gollub, H. (2023, February 21). What is insurance underwriting? Retrieved from USA Today: https://www.usatoday.com/money/blueprint/insurance/what-is-insurance-underwriting/ Dreyer, P., Jones, T., Klima, K., Oberholtzer, J., Strong, A., Welburn, J. W., & Winkelman, Z. (2018, January). Estimating the Global Cost of Cyber Risk. Santa Monica: RAND Corporation. Retrieved from ResearchGate. Embroker Team. (2022, 10 5). What are the Elements of Insurable Risk? Retrieved from Embroker: https://www.embroker.com/blog/insurable-risk/ Embroker Team. (2023, March 27). How Much Does Cyber Insurance Cost? Retrieved from Embroker Web site: https://www.embroker.com/blog/cyber-insurance-cost/ Fitch Ratings. (2022, May 6). US Cyber Insurance Payouts Increase Amid Rising Claims, Premium Hikes. Retrieved from Fitch Ratings Website: https://www.fitchratings.com/research/insurance/us-cyber-insurance-payouts-increase-amid-rising-claims-premium-hikes-06-05-2022 Fitch Ratings. (2023, May 12). U.S. Cyber Insurance Market Update (Sharp Pricing Increases Yield Strong Profit Improvement). Retrieved from Fitch Ratings Web site: https://www.fitchratings.com/research/insurance/us-cyber-insurance-market-update-sharp-pricing-increases-yield-strong-profit-improvement-12-05-2023 Floresca, L. (2014, June 19). Cyber Insurance 101: The Basics of Cyber Coverage. Retrieved from WS&Co. Blog: https://conferences.law.stanford.edu/cyberday/wp-content/uploads/sites/10/2016/10/3g_CorpEx-DO-Blog-Cyber101-Lauri-061914-2.pdf Fong, J. (2023, April 13). Global Cybercrime Report: Which Countries Are Most at Risk in 2023? Retrieved from SEON Web site: https://seon.io/resources/global-cybercrime-report/ Fortune Business Insights. (2023, April). Cyber Insurance Market Size, Share & COVID-19 Impact Analysis. Retrieved from Fortune Business Insights Web site: https://www.fortunebusinessinsights.com/cyber-insurance-market-106287 Franedya, R. (2020, May 7). 91 Juta Data Pengguna Bocor, Tokopedia Digugat Rp 100 M (91 Million User Data Leaked, Tokopedia Faces Legal Action for IDR 100 Billion). Retrieved from CNBC Indonesia: https://www.cnbcindonesia.com/tech/20200507083340-37-156876/91-juta-data-pengguna-bocor-tokopedia-digugat-rp-100-m/2 Google, Temasek, Bain & Company. (2021, November 10). e-Conomy SEA 2021. Retrieved from Bain & Company Website: https://www.bain.com/insights/e-conomy-sea-2021/ Gray, D. (2023, April 27). First-Party vs. Third-Party Insurance: What’s the Difference? Retrieved from Procore: https://www.procore.com/library/first-party-vs-third-party-insurance Happy Sunflowers. (2017, August 17). 資安險不好賣?3不理賠讓人卻步 (3 Failures in Claim Settlements Deterring People from Purchasing Cyber Insurance). Retrieved from Yahoo Finance: https://tw.stock.yahoo.com/news/%E8%B3%87%E5%AE%89%E9%9A%AA%E4%B8%8D%E5%A5%BD%E8%B3%A3%EF%BC%9F3%E4%B8%8D%E7%90%86%E8%B3%A0%E8%AE%93%E4%BA%BA%E5%8D%BB%E6%AD%A5-042832855.html Hassan, M. (2022, October 4). Content Analysis – Methods, Types and Examples. Retrieved from ResearchMethod.Net: https://researchmethod.net/content-analysis/ Hayes, A. (2022, September 15). Adverse Selection: Definition, How It Works, and The Lemons Problem. Retrieved from Investopedia: https://www.investopedia.com/terms/a/adverseselection.asp He, Y. (2016). Cyber Risk Insurance Pricing Based on Optimized Insured Strategy. Ontario: University of Waterloo. Hiscox. (n.d.). What is cyber insurance? Retrieved from Hiscox Web site: https://www.hiscox.co.uk/business-insurance/cyber-and-data-insurance/faq/what-is-cyber-insurance Hongyu, H. (2017, September 13). 認識4種臺灣常見的資安保險 (Know 4 Common Types of Cyber Insurance in Taiwan). Retrieved from iThome: https://www.ithome.com.tw/news/116740 IBM Security. (2022, February). X-Force Threat Intelligence Index 2022. Retrieved from IBM Web site: https://www.ibm.com/downloads/cas/ADLMYLAZ IBM. (n.d.). What is a data breach? Retrieved from IBM Web site: https://www.ibm.com/topics/data-breach IBM. (n.d.). What is ransomware? Retrieved from IBM Web site: https://www.ibm.com/topics/ransomware Iffco-Tokio. (n.d.). How No Claim Bonus is Calculated in Motor Insurance? Retrieved from Iffco-Tokio Web site: https://www.iffcotokio.co.in/motor-insurance/how-no-claim-bonus-is-calculated-in-motor-insurance Indeed Editorial Team. (2023, February 4). 6 Steps of a Case Analysis (With Example). Retrieved from Indeed: https://www.indeed.com/career-advice/career-development/case-analysis-example Indonesia Investments. (2022, July 16). Micro, Small & Medium Enterprises in Indonesia: Backbone of the Indonesian Economy. Retrieved from Indonesia Investments Web site: https://www.indonesia-investments.com/finance/financial-columns/micro-small-medium-enterprises-in-indonesia-backbone-of-the-indonesian-economy/item9532 Indonesia Stock Exchange (IDX). (2023, April 27). Daftar Saham (List of Stocks). Retrieved from IDX Web site: https://www.idx.co.id/id/data-pasar/data-saham/daftar-saham Indonesian Stock Exchange (IDX). (2023, May). Company Profiles. Retrieved from IDX Web site: https://www.idx.co.id/en/listed-companies/company-profiles Insurance Journal. (2019, June 18). State of the Cyber Insurance Market- Top Trends, Insurers and Challenges: A.M. Best. Retrieved from Insurance Journal Web site: https://www.insurancejournal.com/news/national/2019/06/18/529747.htm Jackson, P., & McLeary, J. (2022, October 31). The Cyber Threat Landscape in Indonesia. Retrieved from Kroll Web site: https://www.kroll.com/en/insights/publications/cyber/apac-state-incident-response/indonesia JDIH BPK RI (Legal Documentation and Information Network Indonesia). (2016, November 25). Perubahan Atas Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik. Retrieved from JDIH BPK RI Web site: https://peraturan.bpk.go.id/Home/Details/37582/uu-no-19-tahun-2016 JDIH BPK RI (Legal Documentation and Information Network Indonesia). (2019, October 19). Penyelenggaraan Sistem dan Transaksi Elektronik. Retrieved from JDIH BPK RI Web site: https://peraturan.bpk.go.id/Home/Details/122030/pp-no-71-tahun-2019 JDIH BPK RI (Legal Documentation and Information Network Indonesia). (2022, October 17). Pelindungan Data Pribadi. Retrieved from JDIH BPK RI Web site: https://peraturan.bpk.go.id/Home/Details/229798/uu-no-27-tahun-2022 Kenton, W. (2023, March 27). Marketing Mix: The 4 Ps of Marketing and How to Use Them. Retrieved from Investopedia: https://www.investopedia.com/terms/m/marketing-mix.asp KirstenS. (n.d.). Cross Site Scripting (XSS). Retrieved from OWASP: https://owasp.org/www-community/attacks/xss/ Kompas.com. (2022, September 26). Jokowi: Kita Punya 65,4 Juta UMKM, Baru 19 Juta yang Masuk Platform Digital (Jokowi: We have 65.4 million SMEs, only 19 million of which are on digital platforms). Retrieved from Kompas.com: https://nasional.kompas.com/read/2022/09/26/15013771/jokowi-kita-punya-654-juta-umkm-baru-19-juta-yang-masuk-platform-digital Kreuzer, M., & Knesebeck, A. v. (2022, May 16). Cyber insurance: Risks and trends 2022. Retrieved from MunichRe Web site: https://www.munichre.com/topics-online/en/digitalisation/cyber/cyber-insurance-risks-and-trends-2022.html Limanseto, H. (2022, October 1). Perkembangan UMKM sebagai Critical Engine Perekonomian Nasional Terus Mendapatkan Dukungan Pemerintah (The development of SMEs as a critical engine of the national economy continues to receive government support). Retrieved from Kementerian Koordinator Bidang Perekonomian Republik Indonesia Web site: https://www.ekon.go.id/publikasi/detail/4593/perkembangan-umkm-sebagai-critical-engine-perekonomian-nasional-terus-mendapatkan-dukungan-pemerintah Llewellyn, A. (2022, September 23). Bjorka, the Online Hacker Trying To Take Down the Indonesian Government. Retrieved from The Diplomat: https://thediplomat.com/2022/09/bjorka-the-online-hacker-trying-to-take-down-the-indonesian-government/ Magnusson, A. (2023, April 21). Man-in-the-Middle (MITM) Attack: Definition, Examples & More. Retrieved from strongdm: https://www.strongdm.com/blog/man-in-the-middle-attack Markets and Markets. (2023, March 28). Cybersecurity Insurance Market. Retrieved from Markets and Markets Web site: https://www.marketsandmarkets.com/Market-Reports/cyber-insurance-market-47709373.html Matejka, V., & Soto, J. A. (2021, September 4). A Framework for the Definition and Analysis of Cyber Insurance Requirements. Retrieved from University of Zurich Web site: https://files.ifi.uzh.ch/CSG/staff/franco/extern/theses/MAP-VM-JAHS.pdf MetLife. (2022, September 26). What Is Underwriting and How Does the Process Work? Retrieved from MetLife Web site: https://www.metlife.com/stories/benefits/underwriting/ Micro Focus. (n.d.). What is an Insider Threat? Retrieved from Micro Focus Web site: https://www.microfocus.com/en-us/what-is/insider-threat Ministry of Law and Human Rights of the Republic of Indonesia. (2023, January 6). Pembahasan Rperpres Strategi Keamanan Siber Nasional dan Manajemen Krisis Siber (Discussion on the Draft Presidential Regulation on National Cybersecurity Strategy and Cyber Crisis Management). Retrieved from Ministry of Law and Human Rights of the Republic of Indonesia Web site: https://ditjenpp.kemenkumham.go.id/index.php?option=com_content&view=article&id=5179:pembahasan-rperpres-strategi-keamanan-siber-nasional-dan-manajemen-krisis-siber&catid=268&Itemid=73 Mirsanova, O. A. (2016, June). The Bonus-Malus System as the policyholders' classification method in cyber-insurance. Retrieved from Researchgate: https://www.researchgate.net/profile/Olga-Mirsanova/publication/321309172_The_Bonus-Malus_System_as_the_policyholders'_classification_method_in_cyber-insurance_Ol'ga_A_Mirsanova/links/5a1bc7cba6fdcc50adec9ac1/The-Bonus-Malus-System-as-the-policyholders-cl National Cyber and Crypto Agency Indonesia. (2022, March 30). Launching Hasil Monitoring Keamanan Siber Tahun 2021 (Monitoring Results of Cyber Safety 2021). Retrieved from Youtube: https://www.youtube.com/watch?v=ZdCRUv3UFdA National Cyber Security Index (NCSI). (2023, March). Retrieved from NCSI Web site: https://ncsi.ega.ee/ncsi-index/ Palo Alto Networks. (n.d.). What is a denial of service attack (DoS) ? Retrieved from Palo Alto Networks Web site: https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos Phishing.org. (n.d.). What Is Phishing? Retrieved from Phishing.org: https://www.phishing.org/what-is-phishing Policy Bazaar. (n.d.). List of Documents Required for Car Insurance Claim Process. Retrieved from Policy Bazaar Web site: https://www.policybazaar.com/motor-insurance/car-insurance/articles/list-of-documents-required-for-car-insurance-claim-process/ PT Asuransi MSIG Indonesia. (n.d.). Asuransi Siber (Cyber Insurance). Retrieved from MSIG Website: https://www.msig.co.id/id/commercial-insurance/cyber-insurance PT Asuransi Umum BCA (“BCAinsurance”). (n.d.). Asuransi Siber Pribadi (Personal Cyber Insurance). Retrieved from BCAinsurance Website: https://www.bcainsurance.co.id/product/detail/asuransi-siber-pribadi-personal-cyber-insurance PT Chubb General Insurance Indonesia. (2020, December). Asuransi Siber (Cyber Insurance). Retrieved from Chubb Website: https://www.chubb.com/id-id/business/cyber-insurance.html PT Tokio Marine Life Insurance Indonesia. (n.d.). Asuransi TM Cyber 365. Retrieved from Tokio Marine Website: https://www1.tokiomarine.com/id/id/business/products/liability/cyber-insurance.html Purwiyatna, P. N. (2021, September 16). 5 Dampak Kebocoran Data bagi Perusahaan (5 Impacts of Data Breach to a Company). Retrieved from klikhukum.id: https://klikhukum.id/5-dampak-kebocoran-data-bagi-perusahaan/ Ramah, K. H., Ayari, H., & Kamoun, F. (2010). Traffic Anomaly Detection and Characterization in the Tunisian National University Network. Retrieved from Springer Link: https://link.springer.com/chapter/10.1007/11753810_12 Romanosky, S., Ablon, L., Kuehn, A., & Jones, T. (2018). Content analysis of cyber insurance policies: How do carriers price cyber risk? Arlington: RAND Corporation. Sengupta, S. (2022, March 24). What is Password Attack. Retrieved from Crashtest Security: https://crashtest-security.com/password-attack/ Skeoch, H., & Ioannidis, C. (2023, March 3). The Barriers to Sustainable Risk Transfer in the Cyber-Insurance Market. Retrieved from arXiv by Cornell University: https://arxiv.org/pdf/2303.02061.pdf SOCRadar. (2021). Indonesia Threat Landscape. Retrieved from SOCRadar Web site: https://socradar.io/resource/indonesia-threat-landscape_country-report/ Sukorejo Semarang Government. (n.d.). Pengertian UMKM Menurut Undang-Undang, Kriteria, dan Ciri-Ciri UMKM (Definition of MSMEs according to the Law, Criteria, and Characteristics of MSMEs). Retrieved from Sukorejo Semarang Government Web site: https://sukorejo.semarangkota.go.id/umkm Syarif, N. (2023, May 4). UMKM: Kriteria Usaha (MSME: Business Criteria). Retrieved from Infiniti Blog: https://infiniti.id/blog/bisnis/kriteria-umkm-di-indonesia TechInsurance. (n.d.). How much cyber liability insurance do you need? Retrieved from TechInsurance Web site: https://www.techinsurance.com/cyber-liability-insurance/how-much-do-you-need Tsohou, A., Diamantopoulou, V., Gritzalis, S., & Lambrinoudakis, C. (2023, January 16). Cyber insurance: state of the art, trends and future directions. Retrieved from Springer Link: https://link.springer.com/article/10.1007/s10207-023-00660-8 Wall Street Journal (WSJ). (2023, May). Browse Companies. Retrieved from WSJ Web site: https://www.wsj.com/market-data/quotes/company-list Xiang, Q., Neufeld, A., Peters, G. W., Nevat, I., & Datta, A. (2022, December 15). A Bonus-Malus Framework for Cyber Risk Insurance and Optimal Cybersecurity Provisioning. Retrieved from arXiv by Cornell University: https://arxiv.org/pdf/2102.05568.pdf Yasar, K. (n.d.). 4 P's marketing mix. Retrieved from WhatIs.com: https://www.techtarget.com/whatis/definition/Four-Ps | - |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/87899 | - |
| dc.description.abstract | None | zh_TW |
| dc.description.abstract | The optimistic outlook of Indonesia being one of the future major global economies through digital economy has rapidly impacted the country and its players to incentivize the growth of its internet development. On the flip side, the internet infrastructure in Indonesia has yet to keep up with the trend and is unable to sufficiently withstand or manage the risk associated with such sudden and rapid growth. Articles covering cyber incidents including hacking, data breaches, and ransomware have been increasingly painting the news media board, but the same cannot be said for its mitigation strategy. In response to this phenomenon, a study concerning one of such strategies, namely designing and pricing cyber insurance, is conducted mainly through literature review methods of secondary data from formal reports, dissertations, and news articles publically available. The research results reveal that a tabular premium structure is preferred, with rates ranging from IDR 101 million to IDR 8,687 million per annual data breach coverage, base premium rate ranging from IDR 96 million to IDR 2,351 million per annual ransomware coverage, deductibles of IDR 15 million to IDR 7.5 billion, and policy limits of IDR 1.5 billion to IDR 75 billion. They are further adjusted by factors of the insured company’s annual revenue; business sector; level of cyber, network, and data security; and cyber loss experience. The study also discovers that the current existing product pricing may not be sufficient to cover the recent risk nature and should be heightened. Ethical concerns for ransomware coverage payment are necessary to be addressed chiefly through severe punishments by law. Through these research findings, insurance companies may be inspired to tap and expand into the cyber insurance business, while placing critical significance on claim experience monitoring once the product is in force. | en |
| dc.description.provenance | Submitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-07-31T16:11:58Z No. of bitstreams: 0 | en |
| dc.description.provenance | Made available in DSpace on 2023-07-31T16:11:58Z (GMT). No. of bitstreams: 0 | en |
| dc.description.tableofcontents | Acknowledgment ii
Abstract iii Table of Contents iv List of Tables and Figures vi List of Abbreviations viii 1. Introduction 1 1.1 Background 1 1.2 Research Problem 1 1.3 Research Aims and Objectives 3 1.4 Research Methodology 4 1.5 Importance and Significance of Study 4 1.6 Structure of the Thesis 6 2 Background of Indonesian Landscape 6 2.1 Company Landscape in Indonesia 6 2.2 Regulatory Framework in Indonesia 10 2.3 Frequency of Cyber Risk in Indonesia 11 2.4 Severity of Cyber Risk in Indonesia 13 3 Literature Review 16 3.1 Introduction to Insurance 16 3.2 Insurance Coverage Assessment 21 3.3 General Insurance Landscape 24 3.4 Cyber Insurance Landscape 28 3.5 General Insurance Pricing or Ratemaking Method 38 3.6 Cyber Insurance Pricing or Ratemaking Method 40 4 Method 42 4.1 Data Collection Method 42 4.2 Data Analysis Method 43 5. Results 46 5.1 Product Design 46 5.2 Pricing Model 47 5.3 Base Rate Calculation 49 5.4 Premium Adjustment Factors 59 5.5 Product Features and Pricing Recommendation 66 6 Discussion 72 6.1 Proposed Product of Indonesian Cyber Insurance 72 6.2 Ethical Concerns 75 6.3 Limitations and Suggestions for Further Research 76 7. Conclusion 78 References 80 Appendix 1: SEA Internet Economies, by GMV (US$) 88 Appendix 2: Indonesia Traffic Anomaly 88 Appendix 3: Proportion of Businesses that Have Experienced a Cyber Incident 89 Appendix 4: ASEAN Ransomware Cases 2022 89 Appendix 5: Glossary 90 | - |
| dc.language.iso | en | - |
| dc.subject | 勒索軟體 | zh_TW |
| dc.subject | 資安風險 | zh_TW |
| dc.subject | 資安保險 | zh_TW |
| dc.subject | 保險費率 | zh_TW |
| dc.subject | 數據洩露 | zh_TW |
| dc.subject | cyber insurance | en |
| dc.subject | cyber risk | en |
| dc.subject | ransomware | en |
| dc.subject | data breach | en |
| dc.subject | premium rate | en |
| dc.title | 印尼資安保險可行定價模型的研究 | zh_TW |
| dc.title | A Study of a Viable Pricing Model of Cyber Insurance in Indonesia | en |
| dc.type | Thesis | - |
| dc.date.schoolyear | 111-2 | - |
| dc.description.degree | 碩士 | - |
| dc.contributor.oralexamcommittee | 許文馨;劉心才 | zh_TW |
| dc.contributor.oralexamcommittee | Audrey Hsu;Sophia Liu | en |
| dc.subject.keyword | 資安風險,資安保險,保險費率,數據洩露,勒索軟體, | zh_TW |
| dc.subject.keyword | cyber risk,cyber insurance,premium rate,data breach,ransomware, | en |
| dc.relation.page | 91 | - |
| dc.identifier.doi | 10.6342/NTU202301132 | - |
| dc.rights.note | 同意授權(限校園內公開) | - |
| dc.date.accepted | 2023-06-28 | - |
| dc.contributor.author-college | 管理學院 | - |
| dc.contributor.author-dept | 企業管理碩士專班 | - |
| 顯示於系所單位: | 管理學院企業管理專班(Global MBA) | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-111-2.pdf 授權僅限NTU校內IP使用(校園外請利用VPN校外連線服務) | 1.36 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
