51 résultats pour « risk »

Regulation of (Generative) AI Requires Continuous Oversight

Date : Tags : , , , , , ,
The submission suggests strategies for regulating #ai in #australia, including examining the rate of take-up of #automated #decisionmaking systems, and regulating specific applications of underlying AI technologies. It also suggests altering the definition of AI, creating a set of guiding principles, and adopting a #risk-based approach to #regulation.

Incident‑Specific Cyber Insurance

"In the current market practice, many #cyberinsurance products offer a coverage bundle for losses arising from various types of incidents, such as #databreaches and #ransomwareattacks, and the coverage for each incident type comes with a separate limit and deductible. Although this gives prospective cyber insurance buyers more flexibility in customizing the coverage and better manages the #risk exposures of sellers, it complicates the decision-making process in determining the optimal amount of risks to retain and transfer for both parties. This paper aims to build an economic foundation for these incident-specific cyber insurance products with a focus on how incident-specific indemnities should be designed for achieving #pareto optimality for both the #insurance seller and buyer. Real data on #cyberincidents is used to illustrate the feasibility of this approach. Several implementation improvement methods for practicality are also discussed."

Bayesian and Classical Approaches to Structural Estimation of Risk Attitudes

Date : Tags : , , , ,
This study examines interpersonal heterogeneity in #risk attitudes in #decisionmaking experiments. The use of #bayesian and classical methods for estimating the hierarchical model has sparked debate. Both approaches use the population distribution of risk attitudes to identify individual-specific risk attitudes. Comparing existing experimental data, both methods yield similar conclusions about risk attitudes.

Market Adoption of Cybersecurity: A Dynamic Analysis

Date : Tags : , , ,
"This paper presents a continuous-time dynamic model of market adoption of #cybersecurity. Individuals choose whether and when to make a precautionary investment in self-protection against the evolving security #risk of direct attack and indirect contagion. The equilibrium adoption path has a ``tipping point'': individual users will invest to get protected all at once when a critical mass of the infected has been reached."

Introduction to Bayesian Data Imputation

#bayesian data imputation is a technique used to fill in missing data in a variety of fields, including #riskmanagement. By employing imputation techniques to fill in the gaps, #riskmanagers can obtain a more comprehensive and reliable understanding of the underlying #risk factors, enabling them to make informed decisions and develop effective strategies for #riskmitigation.

Expert Evaluation of ChatGPT Performance for Risk Management Process based on ISO 31000 Standard

"... its ability to provide relevant #riskmitigation strategies was identified as its strongest aspect. However, the research also revealed that #chatgpt's consistency in #riskassessment and prioritization was the least effective aspect. This research serves as a foundation for future studies and developments in the field of #ai-driven #riskmanagement, advancing our theoretical understanding of the application of #aimodels like ChatGPT in #realworld #risk scenarios."

Note on the GDPR and US‑based cloud servers

This is a note on the #gdpr and the use of #us-based #cloudservers. The note raises concerns about the #risk of US #intelligenceagencies having access to #data transferred to any US cloud from the #eu, or directly accessed by US agencies, even while still in the EU / #eea or while in transit. The note discusses cases in #france, the #netherlands, and #germany that have addressed these issues, concluding that the legality of the use of US cloud servers and solutions remains problematic.