• About Me
  • COMMENTARY ON LAW AND TECHNOLOGY
  • Contact Me
 |  |  |  
Jay Kesan Publications
7th EAI International Conference

Risk Management using Cyber-Threat Information Sharing and Cyber-Insurance

Risk Management using Cyber-Threat Information Sharing and Cyber-Insurance

Critical infrastructure systems spanning from transportation to nuclear operations are vulnerable to cyber attacks. Cyber-insurance and cyber-threat information sharing are two prominent mechanisms to defend cybersecurity issues proactively.

jkpublic

YOU MIGHT ALSO LIKE

When Is A Cyber Incident Likely to Be Litigated and How Much Will It Cost? An Empirical Study

When Is A Cyber Incident Likely to Be Litigated and How Much Will It Cost? An Empirical Study

jkpublic April 15, 2021
Eligible Subject Matter at the Patent Office: An Empirical Study of the Influence of Alice on Patent Examiners and Patent Applicants

Eligible Subject Matter at the Patent Office: An Empirical Study of the Influence of Alice on Patent Examiners and Patent Applicants

jkpublic January 22, 2021
Eligible Subject Matter at the Patent Office

Eligible Subject Matter at the Patent Office

jkpublic April 8, 2020
Patent Trolls

Patent Trolls

jkpublic November 12, 2019
The Political Economy of Intellectual Property Reforms

The Political Economy of Intellectual Property Reforms

jkpublic November 12, 2019
  |   |   |  
  • About Me
  • COMMENTARY ON LAW AND TECHNOLOGY
  • Contact Me
Developed by Arokia IT LLC