Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 管理學院企業管理專班(Global MBA)
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/87899
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor堯里昂zh_TW
dc.contributor.advisorLeon van Jaarsveldten
dc.contributor.author黃金蓮zh_TW
dc.contributor.authorAureliana Winartoen
dc.date.accessioned2023-07-31T16:11:58Z-
dc.date.available2023-11-09-
dc.date.copyright2023-07-31-
dc.date.issued2023-
dc.date.submitted2023-06-27-
dc.identifier.citationAna-Maria, B., & Ghiorghe, B. (2012). Pricing General Insurance in a Competitive Market. "Ovidius" University Annals, Economic Sciences Series, 1-4.
Antaranews.com. (2017, May 20). Wannacry ransomware affected 12 institutions in Indonesia: Minister. Retrieved from Antaranews.com Web site: https://en.antaranews.com/news/111011/wannacry-ransomware-affected-12-institutions-in-indonesia-minister
Antonio, Y., Indratno, S. W., & Saputro, S. W. (2021, October 26). Pricing of cyber insurance premiums using a Markov-based dynamic model with clustering structure. Retrieved from Plos One: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0258867
Baker, T., & Shortland, A. (2022, December 4). Insurance and enterprise: cyber insurance for ransomware. Retrieved from Springer Link: https://link.springer.com/article/10.1057/s41288-022-00281-7
Brown, R. L., & Lennox, W. S. (2015). Introduction to Ratemaking and Loss Reserving for Property and Casualty Insurance (4th Edition). Winsted: ACTEX Publications.
BSSN. (2022). Cloud BSSN. Retrieved from BSSN Web Site: https://cloud.bssn.go.id/s/nM3mDzCkgycRx4S
Cakti, A., & Ihsan, N. (2022, March 30). Digital economy key to make Indonesia major economy: Thohir. Retrieved from Antaranews.com: https://en.antaranews.com/news/222557/digital-economy-key-to-make-indonesia-major-economy-thohir
Cartwright, A., Cartwright, E., MacColl, J., Mott, G., Turner, S., Sullivan, J., & Nurse, J. R. (2023, March 9). How cyber insurance influences the ransomware payment decision: theory and evidence. Retrieved from Springer Link: https://link.springer.com/article/10.1057/s41288-023-00288-8#Sec14
Chakravarti, J. (2023, May 18). LockBit Leaks 1.5TB of Data Stolen From Indonesia's BSI Bank. Retrieved from Bank Info Security: https://www.bankinfosecurity.com/lockbit-leaks-15tb-data-stolen-from-indonesias-bsi-bank-a-22110
Cisco. (n.d.). What is malware? Retrieved from Cisco Web site: https://www.cisco.com/site/us/en/products/security/what-is-malware.html
Cisomag. (2022, January 21). Bank Indonesia Suffers Ransomware Attack, Suspects Conti Involvement. Retrieved from Cisomga Web site: https://cisomag.com/bank-indonesia-suffers-ransomware-attack-suspects-conti-involvement/
Claroty. (2022). The Global State of Industrial Cybersecurity 2021: Resilience Amid Disruption. Retrieved from Claroty Web site: https://claroty.com/resources/reports/the-global-state-of-industrial-cybersecurity
CNN Indonesia. (2023, February 26). 5 Ransomware yang Paling Sering 'Ngerjain' Perusahaan di Indonesia (Top 5 Most Commonly Disruptive Ransomware in Indonesian Enterprises). Retrieved from CNN Indonesia Web Site: https://www.cnnindonesia.com/teknologi/20230221160558-192-915906/5-ransomware-yang-paling-sering-ngerjain-perusahaan-di-indonesia
Cole, N. (2023, May 2). 23 Eye-Opening Cybersecurity Insurance Statistics (2023). Retrieved from Network Assured: https://networkassured.com/security/cybersecurity-insurance-statistics/
Crosley, J. (2021, April). What (Exactly) Is Thematic Analysis? Retrieved from Grad Coach: https://gradcoach.com/what-is-thematic-analysis/
Danis, L., & Gollub, H. (2023, February 21). What is insurance underwriting? Retrieved from USA Today: https://www.usatoday.com/money/blueprint/insurance/what-is-insurance-underwriting/
Dreyer, P., Jones, T., Klima, K., Oberholtzer, J., Strong, A., Welburn, J. W., & Winkelman, Z. (2018, January). Estimating the Global Cost of Cyber Risk. Santa Monica: RAND Corporation. Retrieved from ResearchGate.
Embroker Team. (2022, 10 5). What are the Elements of Insurable Risk? Retrieved from Embroker: https://www.embroker.com/blog/insurable-risk/
Embroker Team. (2023, March 27). How Much Does Cyber Insurance Cost? Retrieved from Embroker Web site: https://www.embroker.com/blog/cyber-insurance-cost/
Fitch Ratings. (2022, May 6). US Cyber Insurance Payouts Increase Amid Rising Claims, Premium Hikes. Retrieved from Fitch Ratings Website: https://www.fitchratings.com/research/insurance/us-cyber-insurance-payouts-increase-amid-rising-claims-premium-hikes-06-05-2022
Fitch Ratings. (2023, May 12). U.S. Cyber Insurance Market Update (Sharp Pricing Increases Yield Strong Profit Improvement). Retrieved from Fitch Ratings Web site: https://www.fitchratings.com/research/insurance/us-cyber-insurance-market-update-sharp-pricing-increases-yield-strong-profit-improvement-12-05-2023
Floresca, L. (2014, June 19). Cyber Insurance 101: The Basics of Cyber Coverage. Retrieved from WS&Co. Blog: https://conferences.law.stanford.edu/cyberday/wp-content/uploads/sites/10/2016/10/3g_CorpEx-DO-Blog-Cyber101-Lauri-061914-2.pdf
Fong, J. (2023, April 13). Global Cybercrime Report: Which Countries Are Most at Risk in 2023? Retrieved from SEON Web site: https://seon.io/resources/global-cybercrime-report/
Fortune Business Insights. (2023, April). Cyber Insurance Market Size, Share & COVID-19 Impact Analysis. Retrieved from Fortune Business Insights Web site: https://www.fortunebusinessinsights.com/cyber-insurance-market-106287
Franedya, R. (2020, May 7). 91 Juta Data Pengguna Bocor, Tokopedia Digugat Rp 100 M (91 Million User Data Leaked, Tokopedia Faces Legal Action for IDR 100 Billion). Retrieved from CNBC Indonesia: https://www.cnbcindonesia.com/tech/20200507083340-37-156876/91-juta-data-pengguna-bocor-tokopedia-digugat-rp-100-m/2
Google, Temasek, Bain & Company. (2021, November 10). e-Conomy SEA 2021. Retrieved from Bain & Company Website: https://www.bain.com/insights/e-conomy-sea-2021/
Gray, D. (2023, April 27). First-Party vs. Third-Party Insurance: What’s the Difference? Retrieved from Procore: https://www.procore.com/library/first-party-vs-third-party-insurance
Happy Sunflowers. (2017, August 17). 資安險不好賣?3不理賠讓人卻步 (3 Failures in Claim Settlements Deterring People from Purchasing Cyber Insurance). Retrieved from Yahoo Finance: https://tw.stock.yahoo.com/news/%E8%B3%87%E5%AE%89%E9%9A%AA%E4%B8%8D%E5%A5%BD%E8%B3%A3%EF%BC%9F3%E4%B8%8D%E7%90%86%E8%B3%A0%E8%AE%93%E4%BA%BA%E5%8D%BB%E6%AD%A5-042832855.html
Hassan, M. (2022, October 4). Content Analysis – Methods, Types and Examples. Retrieved from ResearchMethod.Net: https://researchmethod.net/content-analysis/
Hayes, A. (2022, September 15). Adverse Selection: Definition, How It Works, and The Lemons Problem. Retrieved from Investopedia: https://www.investopedia.com/terms/a/adverseselection.asp
He, Y. (2016). Cyber Risk Insurance Pricing Based on Optimized Insured Strategy. Ontario: University of Waterloo.
Hiscox. (n.d.). What is cyber insurance? Retrieved from Hiscox Web site: https://www.hiscox.co.uk/business-insurance/cyber-and-data-insurance/faq/what-is-cyber-insurance
Hongyu, H. (2017, September 13). 認識4種臺灣常見的資安保險 (Know 4 Common Types of Cyber Insurance in Taiwan). Retrieved from iThome: https://www.ithome.com.tw/news/116740
IBM Security. (2022, February). X-Force Threat Intelligence Index 2022. Retrieved from IBM Web site: https://www.ibm.com/downloads/cas/ADLMYLAZ
IBM. (n.d.). What is a data breach? Retrieved from IBM Web site: https://www.ibm.com/topics/data-breach
IBM. (n.d.). What is ransomware? Retrieved from IBM Web site: https://www.ibm.com/topics/ransomware
Iffco-Tokio. (n.d.). How No Claim Bonus is Calculated in Motor Insurance? Retrieved from Iffco-Tokio Web site: https://www.iffcotokio.co.in/motor-insurance/how-no-claim-bonus-is-calculated-in-motor-insurance
Indeed Editorial Team. (2023, February 4). 6 Steps of a Case Analysis (With Example). Retrieved from Indeed: https://www.indeed.com/career-advice/career-development/case-analysis-example
Indonesia Investments. (2022, July 16). Micro, Small & Medium Enterprises in Indonesia: Backbone of the Indonesian Economy. Retrieved from Indonesia Investments Web site: https://www.indonesia-investments.com/finance/financial-columns/micro-small-medium-enterprises-in-indonesia-backbone-of-the-indonesian-economy/item9532
Indonesia Stock Exchange (IDX). (2023, April 27). Daftar Saham (List of Stocks). Retrieved from IDX Web site: https://www.idx.co.id/id/data-pasar/data-saham/daftar-saham
Indonesian Stock Exchange (IDX). (2023, May). Company Profiles. Retrieved from IDX Web site: https://www.idx.co.id/en/listed-companies/company-profiles
Insurance Journal. (2019, June 18). State of the Cyber Insurance Market- Top Trends, Insurers and Challenges: A.M. Best. Retrieved from Insurance Journal Web site: https://www.insurancejournal.com/news/national/2019/06/18/529747.htm
Jackson, P., & McLeary, J. (2022, October 31). The Cyber Threat Landscape in Indonesia. Retrieved from Kroll Web site: https://www.kroll.com/en/insights/publications/cyber/apac-state-incident-response/indonesia
JDIH BPK RI (Legal Documentation and Information Network Indonesia). (2016, November 25). Perubahan Atas Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik. Retrieved from JDIH BPK RI Web site: https://peraturan.bpk.go.id/Home/Details/37582/uu-no-19-tahun-2016
JDIH BPK RI (Legal Documentation and Information Network Indonesia). (2019, October 19). Penyelenggaraan Sistem dan Transaksi Elektronik. Retrieved from JDIH BPK RI Web site: https://peraturan.bpk.go.id/Home/Details/122030/pp-no-71-tahun-2019
JDIH BPK RI (Legal Documentation and Information Network Indonesia). (2022, October 17). Pelindungan Data Pribadi. Retrieved from JDIH BPK RI Web site: https://peraturan.bpk.go.id/Home/Details/229798/uu-no-27-tahun-2022
Kenton, W. (2023, March 27). Marketing Mix: The 4 Ps of Marketing and How to Use Them. Retrieved from Investopedia: https://www.investopedia.com/terms/m/marketing-mix.asp
KirstenS. (n.d.). Cross Site Scripting (XSS). Retrieved from OWASP: https://owasp.org/www-community/attacks/xss/
Kompas.com. (2022, September 26). Jokowi: Kita Punya 65,4 Juta UMKM, Baru 19 Juta yang Masuk Platform Digital (Jokowi: We have 65.4 million SMEs, only 19 million of which are on digital platforms). Retrieved from Kompas.com: https://nasional.kompas.com/read/2022/09/26/15013771/jokowi-kita-punya-654-juta-umkm-baru-19-juta-yang-masuk-platform-digital
Kreuzer, M., & Knesebeck, A. v. (2022, May 16). Cyber insurance: Risks and trends 2022. Retrieved from MunichRe Web site: https://www.munichre.com/topics-online/en/digitalisation/cyber/cyber-insurance-risks-and-trends-2022.html
Limanseto, H. (2022, October 1). Perkembangan UMKM sebagai Critical Engine Perekonomian Nasional Terus Mendapatkan Dukungan Pemerintah (The development of SMEs as a critical engine of the national economy continues to receive government support). Retrieved from Kementerian Koordinator Bidang Perekonomian Republik Indonesia Web site: https://www.ekon.go.id/publikasi/detail/4593/perkembangan-umkm-sebagai-critical-engine-perekonomian-nasional-terus-mendapatkan-dukungan-pemerintah
Llewellyn, A. (2022, September 23). Bjorka, the Online Hacker Trying To Take Down the Indonesian Government. Retrieved from The Diplomat: https://thediplomat.com/2022/09/bjorka-the-online-hacker-trying-to-take-down-the-indonesian-government/
Magnusson, A. (2023, April 21). Man-in-the-Middle (MITM) Attack: Definition, Examples & More. Retrieved from strongdm: https://www.strongdm.com/blog/man-in-the-middle-attack
Markets and Markets. (2023, March 28). Cybersecurity Insurance Market. Retrieved from Markets and Markets Web site: https://www.marketsandmarkets.com/Market-Reports/cyber-insurance-market-47709373.html
Matejka, V., & Soto, J. A. (2021, September 4). A Framework for the Definition and Analysis of Cyber Insurance Requirements. Retrieved from University of Zurich Web site: https://files.ifi.uzh.ch/CSG/staff/franco/extern/theses/MAP-VM-JAHS.pdf
MetLife. (2022, September 26). What Is Underwriting and How Does the Process Work? Retrieved from MetLife Web site: https://www.metlife.com/stories/benefits/underwriting/
Micro Focus. (n.d.). What is an Insider Threat? Retrieved from Micro Focus Web site: https://www.microfocus.com/en-us/what-is/insider-threat
Ministry of Law and Human Rights of the Republic of Indonesia. (2023, January 6). Pembahasan Rperpres Strategi Keamanan Siber Nasional dan Manajemen Krisis Siber (Discussion on the Draft Presidential Regulation on National Cybersecurity Strategy and Cyber Crisis Management). Retrieved from Ministry of Law and Human Rights of the Republic of Indonesia Web site: https://ditjenpp.kemenkumham.go.id/index.php?option=com_content&view=article&id=5179:pembahasan-rperpres-strategi-keamanan-siber-nasional-dan-manajemen-krisis-siber&catid=268&Itemid=73
Mirsanova, O. A. (2016, June). The Bonus-Malus System as the policyholders' classification method in cyber-insurance. Retrieved from Researchgate: https://www.researchgate.net/profile/Olga-Mirsanova/publication/321309172_The_Bonus-Malus_System_as_the_policyholders'_classification_method_in_cyber-insurance_Ol'ga_A_Mirsanova/links/5a1bc7cba6fdcc50adec9ac1/The-Bonus-Malus-System-as-the-policyholders-cl
National Cyber and Crypto Agency Indonesia. (2022, March 30). Launching Hasil Monitoring Keamanan Siber Tahun 2021 (Monitoring Results of Cyber Safety 2021). Retrieved from Youtube: https://www.youtube.com/watch?v=ZdCRUv3UFdA
National Cyber Security Index (NCSI). (2023, March). Retrieved from NCSI Web site: https://ncsi.ega.ee/ncsi-index/
Palo Alto Networks. (n.d.). What is a denial of service attack (DoS) ? Retrieved from Palo Alto Networks Web site: https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos
Phishing.org. (n.d.). What Is Phishing? Retrieved from Phishing.org: https://www.phishing.org/what-is-phishing
Policy Bazaar. (n.d.). List of Documents Required for Car Insurance Claim Process. Retrieved from Policy Bazaar Web site: https://www.policybazaar.com/motor-insurance/car-insurance/articles/list-of-documents-required-for-car-insurance-claim-process/
PT Asuransi MSIG Indonesia. (n.d.). Asuransi Siber (Cyber Insurance). Retrieved from MSIG Website: https://www.msig.co.id/id/commercial-insurance/cyber-insurance
PT Asuransi Umum BCA (“BCAinsurance”). (n.d.). Asuransi Siber Pribadi (Personal Cyber Insurance). Retrieved from BCAinsurance Website: https://www.bcainsurance.co.id/product/detail/asuransi-siber-pribadi-personal-cyber-insurance
PT Chubb General Insurance Indonesia. (2020, December). Asuransi Siber (Cyber Insurance). Retrieved from Chubb Website: https://www.chubb.com/id-id/business/cyber-insurance.html
PT Tokio Marine Life Insurance Indonesia. (n.d.). Asuransi TM Cyber 365. Retrieved from Tokio Marine Website: https://www1.tokiomarine.com/id/id/business/products/liability/cyber-insurance.html
Purwiyatna, P. N. (2021, September 16). 5 Dampak Kebocoran Data bagi Perusahaan (5 Impacts of Data Breach to a Company). Retrieved from klikhukum.id: https://klikhukum.id/5-dampak-kebocoran-data-bagi-perusahaan/
Ramah, K. H., Ayari, H., & Kamoun, F. (2010). Traffic Anomaly Detection and Characterization in the Tunisian National University Network. Retrieved from Springer Link: https://link.springer.com/chapter/10.1007/11753810_12
Romanosky, S., Ablon, L., Kuehn, A., & Jones, T. (2018). Content analysis of cyber insurance policies: How do carriers price cyber risk? Arlington: RAND Corporation.
Sengupta, S. (2022, March 24). What is Password Attack. Retrieved from Crashtest Security: https://crashtest-security.com/password-attack/
Skeoch, H., & Ioannidis, C. (2023, March 3). The Barriers to Sustainable Risk Transfer in the Cyber-Insurance Market. Retrieved from arXiv by Cornell University: https://arxiv.org/pdf/2303.02061.pdf
SOCRadar. (2021). Indonesia Threat Landscape. Retrieved from SOCRadar Web site: https://socradar.io/resource/indonesia-threat-landscape_country-report/
Sukorejo Semarang Government. (n.d.). Pengertian UMKM Menurut Undang-Undang, Kriteria, dan Ciri-Ciri UMKM (Definition of MSMEs according to the Law, Criteria, and Characteristics of MSMEs). Retrieved from Sukorejo Semarang Government Web site: https://sukorejo.semarangkota.go.id/umkm
Syarif, N. (2023, May 4). UMKM: Kriteria Usaha (MSME: Business Criteria). Retrieved from Infiniti Blog: https://infiniti.id/blog/bisnis/kriteria-umkm-di-indonesia
TechInsurance. (n.d.). How much cyber liability insurance do you need? Retrieved from TechInsurance Web site: https://www.techinsurance.com/cyber-liability-insurance/how-much-do-you-need
Tsohou, A., Diamantopoulou, V., Gritzalis, S., & Lambrinoudakis, C. (2023, January 16). Cyber insurance: state of the art, trends and future directions. Retrieved from Springer Link: https://link.springer.com/article/10.1007/s10207-023-00660-8
Wall Street Journal (WSJ). (2023, May). Browse Companies. Retrieved from WSJ Web site: https://www.wsj.com/market-data/quotes/company-list
Xiang, Q., Neufeld, A., Peters, G. W., Nevat, I., & Datta, A. (2022, December 15). A Bonus-Malus Framework for Cyber Risk Insurance and Optimal Cybersecurity Provisioning. Retrieved from arXiv by Cornell University: https://arxiv.org/pdf/2102.05568.pdf
Yasar, K. (n.d.). 4 P's marketing mix. Retrieved from WhatIs.com: https://www.techtarget.com/whatis/definition/Four-Ps
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/87899-
dc.description.abstractNonezh_TW
dc.description.abstractThe optimistic outlook of Indonesia being one of the future major global economies through digital economy has rapidly impacted the country and its players to incentivize the growth of its internet development. On the flip side, the internet infrastructure in Indonesia has yet to keep up with the trend and is unable to sufficiently withstand or manage the risk associated with such sudden and rapid growth. Articles covering cyber incidents including hacking, data breaches, and ransomware have been increasingly painting the news media board, but the same cannot be said for its mitigation strategy. In response to this phenomenon, a study concerning one of such strategies, namely designing and pricing cyber insurance, is conducted mainly through literature review methods of secondary data from formal reports, dissertations, and news articles publically available. The research results reveal that a tabular premium structure is preferred, with rates ranging from IDR 101 million to IDR 8,687 million per annual data breach coverage, base premium rate ranging from IDR 96 million to IDR 2,351 million per annual ransomware coverage, deductibles of IDR 15 million to IDR 7.5 billion, and policy limits of IDR 1.5 billion to IDR 75 billion. They are further adjusted by factors of the insured company’s annual revenue; business sector; level of cyber, network, and data security; and cyber loss experience. The study also discovers that the current existing product pricing may not be sufficient to cover the recent risk nature and should be heightened. Ethical concerns for ransomware coverage payment are necessary to be addressed chiefly through severe punishments by law. Through these research findings, insurance companies may be inspired to tap and expand into the cyber insurance business, while placing critical significance on claim experience monitoring once the product is in force.en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-07-31T16:11:58Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2023-07-31T16:11:58Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontentsAcknowledgment ii
Abstract iii
Table of Contents iv
List of Tables and Figures vi
List of Abbreviations viii
1. Introduction 1
1.1 Background 1
1.2 Research Problem 1
1.3 Research Aims and Objectives 3
1.4 Research Methodology 4
1.5 Importance and Significance of Study 4
1.6 Structure of the Thesis 6
2 Background of Indonesian Landscape 6
2.1 Company Landscape in Indonesia 6
2.2 Regulatory Framework in Indonesia 10
2.3 Frequency of Cyber Risk in Indonesia 11
2.4 Severity of Cyber Risk in Indonesia 13
3 Literature Review 16
3.1 Introduction to Insurance 16
3.2 Insurance Coverage Assessment 21
3.3 General Insurance Landscape 24
3.4 Cyber Insurance Landscape 28
3.5 General Insurance Pricing or Ratemaking Method 38
3.6 Cyber Insurance Pricing or Ratemaking Method 40
4 Method 42
4.1 Data Collection Method 42
4.2 Data Analysis Method 43
5. Results 46
5.1 Product Design 46
5.2 Pricing Model 47
5.3 Base Rate Calculation 49
5.4 Premium Adjustment Factors 59
5.5 Product Features and Pricing Recommendation 66
6 Discussion 72
6.1 Proposed Product of Indonesian Cyber Insurance 72
6.2 Ethical Concerns 75
6.3 Limitations and Suggestions for Further Research 76
7. Conclusion 78
References 80
Appendix 1: SEA Internet Economies, by GMV (US$) 88
Appendix 2: Indonesia Traffic Anomaly 88
Appendix 3: Proportion of Businesses that Have Experienced a Cyber Incident 89
Appendix 4: ASEAN Ransomware Cases 2022 89
Appendix 5: Glossary 90
-
dc.language.isoen-
dc.subject勒索軟體zh_TW
dc.subject資安風險zh_TW
dc.subject資安保險zh_TW
dc.subject保險費率zh_TW
dc.subject數據洩露zh_TW
dc.subjectcyber insuranceen
dc.subjectcyber risken
dc.subjectransomwareen
dc.subjectdata breachen
dc.subjectpremium rateen
dc.title印尼資安保險可行定價模型的研究zh_TW
dc.titleA Study of a Viable Pricing Model of Cyber Insurance in Indonesiaen
dc.typeThesis-
dc.date.schoolyear111-2-
dc.description.degree碩士-
dc.contributor.oralexamcommittee許文馨;劉心才zh_TW
dc.contributor.oralexamcommitteeAudrey Hsu;Sophia Liuen
dc.subject.keyword資安風險,資安保險,保險費率,數據洩露,勒索軟體,zh_TW
dc.subject.keywordcyber risk,cyber insurance,premium rate,data breach,ransomware,en
dc.relation.page91-
dc.identifier.doi10.6342/NTU202301132-
dc.rights.note同意授權(限校園內公開)-
dc.date.accepted2023-06-28-
dc.contributor.author-college管理學院-
dc.contributor.author-dept企業管理碩士專班-
顯示於系所單位:管理學院企業管理專班(Global MBA)

文件中的檔案:
檔案 大小格式 
ntu-111-2.pdf
授權僅限NTU校內IP使用(校園外請利用VPN校外連線服務)
1.36 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved