Cyber-Versicherungsnachfrage im KMU-Bereich
JOURNAL ARTICLE
Cite JOURNAL ARTICLE
Style
Format
Cyber-Versicherungsnachfrage im KMU-Bereich
Zeitschrift für die gesamte Versicherungswissenschaft, Vol. (2025), Online First : pp. 1–27
Additional Information
Article Details
Author Details
Niklas Alexander Anders, Universität zu Köln, Seminar für ABWL, Risikomanagement und Versicherungslehre
References
-
Abhilash, J. V. (2023): A Roadmap for SMEs to Adopt an AI Based Cyber Threat Intelligence. The Effect of Information Technology on Business and Marketing Intelligence Systems Studies in Computational Intelligence, S. 1903–1926.
Google Scholar -
Anderson, R. (1994): Liability and computer security: nine principles. (D. Gollmann, Hrsg.) Berlin: Springer.
Google Scholar -
Böhme, R. K. (2006): On the limits of cyber-insurance. (S. Fischer-Hübner, S. Furnell, C. Lambrinoudakis, Hrsg.). Springer.
Google Scholar -
BAFA (2012): Bundesamt für Wirtschaft und Ausfuhrkontrolle. Abgerufen im Januar 2024 von https://www.bafa.de/SharedDocs/Downloads/DE/Energie/ea_leitfaden_definition_kmu.html.
Google Scholar -
BaFin (25.5.2020): Bundesanstalt für Finanzdienstleistungsaufsicht. Abgerufen im Januar 2024 von https://www.bafin.de/SharedDocs/Veroeffentlichungen/DE/BaFinPerspekti ven/2020/bp_20_1_Lohmann_Schmitz_Huy_Schulze_Wegerhoff.html.
Google Scholar -
Bandyopadhyay, T. (2012): AISeL. Abgerufen im Januar 2024 von https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1004&context=sais2012.
Google Scholar -
Bandyopadhyay, T. M. (2009): Why IT managers don’t go for cyber-insurance products. ACM, 52(11), S. 706–719.
Google Scholar -
Bauer, J. V. (2009): Cybersecurity: stakeholder incentives, externalities, and policy options. Telecomm. Policy, 33(10–11), S. 706–719.
Google Scholar -
Becker, W. S. (2008): Deloitte Mittelstandsinstitut. Abgerufen im Januar 2024 von https://fis.uni-bamberg.de/server/api/core/bitstreams/ca7d0daa-4783-43c7-bd40-a6aafb80056e/ content.
Google Scholar -
Behringer, S. (2012): Unternehmensbewertung der Mittel- und Kleinbetriebe Betriebswirtschaftliche Verfahrensweisen (Bd. 5). Hamburg: Erich Schmidt Verlag.
Google Scholar -
Biener, C. E. (2015): Cyber Risk: Risikomanagement und Versicherbarkeit. I VW HSG Schriftenreihe, 54.
Google Scholar -
Blind, K. (1996): Eine Analyse der Versicherung von Risiken der Informationssicherheit in Kommunikationsnetzen. Z. Ges. Versicherungswiss., 85(1), S. 81–101.
Google Scholar -
Bogner, A. L. (2014): Interviews mit Experten: Eine praxisorientierte Einführung. Wiesbaden: Springer VS.
Google Scholar -
Bonn, I. (2003): Institut für Mittelstandsforschung. Abgerufen im Januar 2024 von https://www.ifm-bonn.org/definitionen/kmu-definition-der-eu-kommission.
Google Scholar -
Brancheau, J. J. (1996): Key issues in information systems management. SIM Delphi results, 20(2), S. 225–242.
Google Scholar -
BSI (27.12.2022): NIS-2-Richtlinie im Amtsblatt der EU veröffentlicht. Abgerufen im Januar 2024 von Bundesamt für Sicherheit in der Informationstechnik: https://www.bsi.bund.de/DE/Themen/KRITIS-und-regulierte-Unternehmen/Kritische-Infrastrukturen/ KRITIS-aktuell/KRITIS-Meldungen/221227-veroeffentlichung-nis-2.html.
Google Scholar -
Cachia, M. M. (2011): The telephone medium and semi-structured interviews: a complementary fit. Qual. Res. Organ. Manage. Int. J., 6(3), S. 265–277.
Google Scholar -
Cavusoglu, H. C. (27.7.2004): Economics of ITSecurity Management: Four Improvements to Current Security Practices. Communications of the Association for Information Systems, 14, S. 65–75.
Google Scholar -
Cebula, J. P. (Mai 2014): A Taxonomy of Operational Cyber Security Risks Version 2. Abgerufen im Januar 2024 von Software Engineering Institute: https://insights.sei.cmu.edu/documents/2273/2014_004_001_91026.pdf.
Google Scholar -
Cepeda, G. M. (2005): A review of case studies. Management Decision, 43(6), S. 851–876.
Google Scholar -
Chen, Y.-C. L.-Y. (2022): The Effect of Cyber Risk Management Services in Insurance Policies. (D. M.-T. Dr. Cheng-Few Lee, Hrsg.) Emerald Publishing Limited.
Google Scholar -
Choudhry, U. (2014): Der Cyber-Versicherungsmarkt in Deutschland. Wiesbaden: Springer Gabler.
Google Scholar -
Christmann, G. (2009): Expert interviews on the telephone: a difficult undertaking. In: A. L. Bogner, Experts (S. 157–183). London: Palgrave Macmillan.
Google Scholar -
Destatis (2024): Statistisches Bundesamt. Abgerufen im Januar 2024 von https://www. destatis.de/DE/Themen/Branchen-Unternehmen/Unternehmen/Kleine-Unternehmen-Mittlere-Unternehmen/Glossar/kmu.html.
Google Scholar -
Diekmann, A. (2007): Empirische Sozialforschung: Grundlagen, Methoden, Anwendungen. Reinbek: Rowohlt.
Google Scholar -
Dobias, P. (2022): Insurance of Cyber Risk in International Transport. Masaryk University Journal of law and technology, 16(1), S. 3–36.
Google Scholar -
Dyah, H. D. (27.3.2023): Strategi Pengembangan Dan Pengelolaan UMKM Desa Kalikidang Banyumas Jawa Tengah. Jurnal Pengabdian Masyarakat Darul Ulum.
Google Scholar -
Eling, M. S. (November 2016): Ten Key Questions on Cyber Risk and Cyber Risk Insurance. The Geneva Association. Abgerufen im Januar 2024 von https://www.genevaassociation.org/sites/default/files/research-topics-document-type/pdf_public//cyber- risk-10_key_questions.pdf.
Google Scholar -
Eling, M. W. (2016): Cyber Risk: Too Big to Insure? – Risk Transfer Options for a Mercurial Risk Class. Business, Law, Computer Science.
Google Scholar -
ENISA (2018): European Union Agency for Network and Information Security. Abgerufen im Januar 2024 von https://www.enisa.europa.eu/publications/incentives-and-barriers-of-the-cyber-insurance-market-in-europe/at_download/fullReport.
Google Scholar -
EP (10.11.2022): Europäisches Parlament. Abgerufen im Januar 2024 von https://www.europarl.europa.eu/news/de/press-room/20221107IPR49608/cybersicherheit-plane-zur-starkung-der-eu-weiten-widerstandsfahigkeit.
Google Scholar -
Faisst, U. P. (2007): Ein Modell zur dynamischen Investitionsrechnung von IT-Sicherheitsmaßnahmen. Z. Betriebswirtsch., 77(5), S. 511–538.
Google Scholar -
Finfgeld-Connett, D. (2014): Use of content analysis to conduct knowledge-building and theory-generating qualitative systematic reviews. Qual. Res., 14(3), S. 341–352.
Google Scholar -
Gambacorta, L. (2.6.2022): The drivers of cyber risk. Journal of Financial Stability.
Google Scholar -
GDV (19.4.2020): Gesamtverband der Versicherer. Abgerufen im Januar 2024 von https://www.gdv.de/gdv/themen/digitalisierung/vier-von-zehn-deutschen-schon-von-cyberattacken-betroffen-58642.
Google Scholar -
Gläser, J. L. (2010): Experteninterviews und qualitative Inhaltsanalyse als Instrumente rekonstruierender Untersuchungen. Wiesbaden: Springer VS.
Google Scholar -
Gordon, L. L. (2003): A framework for using insurance for cyber-risk management. ACM, 46(3), S. 81–85.
Google Scholar -
Grzebiela, T. (2002): Internet-Risiken: Versicherbarkeit und Alternativer Risikotransfer. Wiesbaden: Deutscher Universitäts-Verlag.
Google Scholar -
Haas, A. H. (2014): Risiken aus der Nutzung von Cloud-Computing-Diensten: Fragen des Risikomanagements und Aspekte der Versicherbarkeit. Zeitschrift für die gesamte Versicherungswissenschaft, 103(4), S. 377–407.
Google Scholar -
Haitham, N. A. (16.6.2023): Mapping cyber insurance: a taxonomical study using bibliometric visualization and systematic analysis. Global knowledge, memory and communication.
Google Scholar -
Hartley, J. (1994): Case studies in organizational research. In: Cassell, C., Symon, G. (Hrsg.) Qualitative Methods in Organizational Research: A Practical Guide (S. 209–229). London: SAGE.
Google Scholar -
Harvey, C. (1988): Telephone survey techniques. Can. Home Econ. J., 38(1), S. 30–35.
Google Scholar -
Hiller, J. R. (1.6.2013): The challenge and imperative of private sector cybersecurity: an international comparison. Computer Law and Security Review, 29(3), S. 236–245.
Google Scholar -
Hopf, C. (2013): Qualitative Interviews – Ein Überblick. In: U. V. Flick, Qualitative Forschung: Ein Handbuch. Reinbek: Rowohlt.
Google Scholar -
Hoppe, F. G. (19.11.2021): Cyber risk management in SMEs: insights from industry surveys. The Journal of Risk Finance, S. 240–260.
Google Scholar -
Königs, H.-P. (2017): IT-Risikomanagement mit System Praxisorientiertes Management von Informationssicherheits-, IT- und Cyber-Risiken (Bd. 5). Wiesbaden: Springer Vieweg.
Google Scholar -
Kaiser, R. (2014): Qualitative Experteninterviews: Konzeptionelle Grundlagen und praktische Durchführung. Wiesbaden: Springer VS.
Google Scholar -
Kankanhalli, A. T.-H.-K. (2003): An integrative study of information systems security effectiveness. Int. J. Inf. Manage., 23(2), S. 139–154.
Google Scholar -
Katkova, T. G. (2020): Provision of Cybersecurity in Ukraine. In: M. Nechyporuk/P. Vladimir/D. Kritskiy, Integrated Computer Technologies in Mechanical Engineering (S. 243–254). Springer.
Google Scholar -
Kin Cheah, P. P. (2019): Interviewing Criminal Justice Populations without Electronic Recording Devices: A Guide. The Qualitative Report, 24(4), S. 705–716.
Google Scholar -
Kosub, T. (2015): Components and challenges of integrated cyber risk management. Z. Ges. Versicherungswiss., 104(5), S. 615–634.
Google Scholar -
Kuhlee, L. (13.4.2023): pwc. Abgerufen im Januar 2024 von https://www.pwc.de/de/ cyber-security/global-threat-intelligence-report.html.
Google Scholar -
Lamnek, S. (2005): Qualitative Sozialforschung. Basel: Beltz.
Google Scholar -
Lebek, B. U. (2014): Information security awareness and behavior: a theory-based literature review. Manage. Res. Rev., 37(12), S. 1049–1092.
Google Scholar -
Lesch, T. R. (2000): Risiken aus kommerzieller Nutzung des Internet – Möglichkeiten der Schadenverhütung und Versicherung. Z. Ges. Versicherungswiss, 89(4), S. 605–633.
Google Scholar -
Luftman, J. B.-Z. (2010): Key issues for IT executives 2009: difficult economy’s impact on IT. MIS Q. Exec, 9(1), S. 49–59.
Google Scholar -
Marshall, B. C. (2013): Does sample size matter in qualitative research?: A review of qualitative interviews in is research. J. Comput. Inf. Syst., 54(1), S. 11–22.
Google Scholar -
Meland, P. T. (2017): Facing uncertainty in cyber insurance policies. (G. M. Livraga, Hrsg.) Springer.
Google Scholar -
Merkens, H. (1997): Stichproben bei qualitativen Studien. In: B. P. Friebertshäuser, Handbuch Qualitative Forschungsmethoden in der Erziehungswissenschaft (S. 97–106). München: Juventa.
Google Scholar -
Modrow-Thiel, B. (1993): Qualitative Interviews – Vorgehen und Probleme. Z. Personalforsch., S. 129–146.
Google Scholar -
Mukhopadhyay, A. C. (2013): Cyber-risk decision models: to insure IT or not? Decision Support Systems.
Google Scholar -
Myers, M. N. (2007): The qualitative interview in IS research: examining the craft. Inf. Organ., 17(1), S. 2–26.
Google Scholar -
Njegomir, V. M. (2012): Contemporary trend in the global insurance industry. Procedia Soc. Behav. Sci., 44, S. 134–142.
Google Scholar -
OECD (2017): Organisation for Economic Co-operation and Development. Abgerufen im Januar 2024 von https://www.oecd.org/daf/fin/insurance/Enhancing-the-Role-of-Insurance-in-Cyber-Risk-Management.pdf.
Google Scholar -
Oğüt, H. R. (2011): Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection. Risk Anal. 31(3), S. 497–512.
Google Scholar -
Palsson, K. G. (4.6.2020): Analysis of the impact of cyber events for cyber insurance. The Geneva Papers on Risk and Insurance – Issues and Practice, 45, S. 564–579.
Google Scholar -
Petermann, J. (19.7.2021): DW. Abgerufen im Januar 2024 von https://www.dw.com/de/experten-bedrohung-durch-cyberangriffe-steigt/a-58314785.
Google Scholar -
Pfeiffer, U. (17.12.2021): Eine starke Unternehmenskultur minimiert Cyberrisiken. Digitale Welt, 6(1), S. 24–27.
Google Scholar -
Ransbotham, S. M. (2009): Choice and chance: a conceptual model of paths to information security compromise. Inf. Syst. Res., 20(1), S. 121–139.
Google Scholar -
Romanosky, S. A. (2017): Content Analysis of Cyber Insurance Policies: How do Carriers Price Cyber Risk? Proceedings of the Southern Association for Information Systems Conference, Atlanta, (S. 23–29). USA.
Google Scholar -
Romanosky, S. S. (26.5.2023): Enterprise risk management: how do firms integrate cyber risk? Enterprise risk management.
Google Scholar -
Ruan, K. (2017): Introducing cybernomics: a unifying economic framework for measuring cyber risk. Computers & Security, 65, S. 77–89.
Google Scholar -
Schnell, R. H. (2011): Methoden der empirischen Sozialforschung. München: Oldenbourg.
Google Scholar -
Seibold, H. (2006): IT-Risikomanagement. München: Oldenbourg Wissenschaftsverlag.
Google Scholar -
Shetty, N. S. (2010): Competitive cyber-insurance and Internet security. In: T. P. Moore, Economics of Information Security and Privacy (S. 229–247). Boston: Springer.
Google Scholar -
Siegel, C. S. (2002): Cyber-risk management: technical and insurance controls for enterprise-level security. Inf. Syst. Secur., 11(5), S. 33–49.
Google Scholar -
Smith, G. (2004): Recognizing and preparing loss estimates from cyber-attacks. Information Systems Security, 12(6), S. 45–57.
Google Scholar -
Soyer, B. N. (2023): Cyber Risk Insurance – An Effective Risk Management Tool for SMES in the UK?. Edinburgh Law Review, 27(2), S. 157–184.
Google Scholar -
Sturges, J. H. (2004): Comparing telephone and face-to-face qualitative interviewing: a research note. Qual. Res., 4(1), S. 107–118.
Google Scholar -
Tøndel, I. M. (2015): Using Cyber-Insurance as a Risk Management Strategy: Knowledge Gaps and Recommendations for Further Research. Abgerufen im Januar 2024 von SINTEF ICT: https://brage.bibsys.no/xmlui/bitstream/handle/11250/2379189/SINTEF%2bA27298.pdf?sequence=3&isAllowed=y.
Google Scholar -
Tosh, D. S. (2017): Risk management using cyber-threat information sharing and cyber-insurance. (S. A. L., Hrsg.) USA: Springer.
Google Scholar -
Tsohou, A. (16.1.2023): Cyber insurance: state of the art, trends and future directions. International Journal of Information Security, 22(3), S. 737–748.
Google Scholar -
Völz, H.-J. (2018): Der Mittelstand BVMW. Abgerufen im Januar 2024 von https://www.bvmw.de/uploads/topics/Unternehmertum/Downloads/KMU-Definition.pdf.
Google Scholar -
Woods, D. S. (2017): Policy measures and cyber insurance: a framework. J. Cyber Policy, 2(2), S. 209–226.
Google Scholar -
Wrede, D. F.-M. (2018): Herausforderungen und Implikationen für das Cyber-Risikomanagement – Eine empirische Analyse. Z. Ges. Versicherungswiss., 107(4).
Google Scholar -
Yin, R. (2014): Case Study Research: Design and Methods. SAGE.
Google Scholar -
Zhao, X. X. (2013): Managing interdependent information security risks: cyberinsurance, managed security services, and risk pooling arrangements. J. Manage. Inf. Syst., 30(1), S. 123–152.
Google Scholar
Abstract
Cyber risks are increasingly relevant for companies, private individuals and government organizations. Insurance companies assume these risks, whereby the interaction between cyber risk management and cyber insurance is crucial. Small and medium-sized enterprises (SMEs) in particular have deficits, and although authorities and insurers point out the importance of cyber insurance, demand among SMEs is still low. A systematic literature review and expert interviews were conducted to investigate the reasons for this reluctance. The results show that the risk assessment processes lack standardization and transparency and that concluded contracts do not contain clear quality standards. In addition, an innovative coverage concept is needed to ensure the sustainability of insurers. There is a particular focus on the gap between the general and individual risks of managing directors and insurance sales. The study provides valuable insights and solutions for the optimization of cyber insurance and its demand.