Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2002, Vol. 3 Issue (2): 140-147    DOI: 10.1631/jzus.2002.0140
Computer Technology     
Estimation of financial loss ratio for E-insurance: a quantitative model
ZHONG Yuan-sheng, CHEN De-ren, SHI Min-hua
Department of Computer Science & Technology, Zhejiang University, Hangzhou 310027, China; School of Information Management, Jiangxi University of Finance & Economics, Nanchang 330013, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  In view of the risk of E-commerce and the response of the insurance industry to it, this paper is aimed at one important point of insurance, that is, estimation of financial loss ratio, which is one of the most difficult problems facing the E-insurance industry. This paper proposes a quantitative analyzing model for estimating E-insurance financial loss ratio. The model is based on gross income per enterprise and CSI/FBI computer crime and security survey. The analysis results presented are reasonable and valuable for both insurer and the insured and thus can be accepted by both of them. What we must point out is that according to our assumption, the financial loss ratio varied very little, 0.233% in 1999 and 0.236% in 2000 although there was much variation in the main data of the CSI/FBI survey.

Key wordsElectronic commerce      Security      Financial loss ratio      Insurance     
Received: 18 April 2001     
CLC:  TP309  
  F840  
Cite this article:

ZHONG Yuan-sheng, CHEN De-ren, SHI Min-hua. Estimation of financial loss ratio for E-insurance: a quantitative model. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2002, 3(2): 140-147.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2002.0140     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2002/V3/I2/140

[1] Fan-rui KONG, Chun-wen LI, Qing-qing DING, Guang-zhao CUI, Bing-yi CUI. WAPN: a distributed wormhole attack detection approach for wireless sensor networks[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 279-289.
[2] Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU. Improved Feistel-based ciphers for wireless sensor network security[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1111-1117.
[3] Chang-da WANG, Shi-guang JU. Integrated criteria for covert channel auditing[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 737-743.
[4] LEE Kok-wah, EWE Hong-tat. Multiple hashes of single key with passcode for multiple accounts[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(8): 1183-1190.
[5] KULESZA Kamil, KOTULSKI Zbigniew. On ASGS framework: general requirements and an example of implementation[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4 ): 1-.
[6] LIAO Jian, QI Ying-hao, HUANG Pei-wei, RONG Meng-tian, LI Sheng-hong. Protection of mobile location privacy by using blind signature[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(6 ): 8-.
[7] Yang Rui-jun, Xia Qi, Pan Qun-hua, Wang Wei-nong, Li Ming-lu. Cost management based security framework in mobile ad hoc networks[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(4 ): 3-.
[8] REN Kui, PARK Jaemin, KIM Kwangjo. On the construction of cryptographically strong Boolean functions with desirable trade-off[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 2-.
[9] SU Gui-yang, LI Jian-hua, MA Ying-hua, LI Sheng-hong. Improving the precision of the keyword-matching pornographic text filtering method using a hybrid model[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5( 9): 13-.
[10] CAI Liang, YANG Xiao-hu, DONG Jin-xiang. Building a highly available and intrusion tolerant database security and protection system (DSPS)[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2003, 4(3): 287-293.
[11] CAI Liang, YANG Xiao-hu, DONG Jin-xiang. A reference model for database security proxy[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2002, 3(1): 30-36.
[12] JIANG Xiao-ning, YE Cheng-qing. A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2000, 1(3): 317-321.