What premium will be charged based on the above formula

Assignment Help Computer Engineering
Reference no: EM133337946

Case: An e-commerce firm estimates a stock market loss of a breach to be Z =$100,000. The firm purchases a cyber insurance policy with a deductible of $50,000. The policy covers direct losses from a breach minus the deductible. The firm and the insurer estimate that there will be a Low loss L (with probability p) or a Medium loss M (with probability q) or a High loss H (with probability 1 - p -

q). Assume that the firm is not obliged by law to disclose a breach when the loss is Low, but government regulations require the firm to disclose a Medium or a High breach.

The insurer uses the following (traditional) formula to the firm to calculate the premium P (x) based on the deductible, x:

P(x) = 1.05[p(L - x)+ + q(M - x)+ + (1 - p - q)(H - x)+]

The firm and the insurer agree on the estimates L = $100,000 (with a proba- bility of 0.4), M = $200,000 (with a probability of 0.4) and H = $600,000 (with a probability of 0.2).

What premium will be charged based on the above formula?

Is this premium fair, or is it overpriced based on the firm's correct claiming strategy?

Given the firm's correct claiming strategy, what should the fair premium be?

Under the traditional contract, can you suggest a better choice for the deductible that will maintain the current claiming strategy (based on the current deductible of 50, 000)?

Reference no: EM133337946

Questions Cloud

Possible threats and vulnerabilities : Purpose of the plan, background and overview of key risk concepts and The plan to conduct an information security risk assessment of the new company
Evaluate the best practices surrounding cybersecurity : I need help creating a report that evaluates the theories, principles, and best practices surrounding cybersecurity and security awareness training programs.
How does a functional organization impact project manager : How does a Functional organization impact the project manager, project team, and project? Why is this important?
Evaluate the deployment of a user-centered system : In this project, you will demonstrate your mastery of the following competency: Evaluate the design and deployment of a user-centered system.
What premium will be charged based on the above formula : What premium will be charged based on the above formula? Is this premium fair, or is it overpriced based on the firm's correct claiming strategy?
State the time management issue and how it was resolved : Write a scenario in which the CISO is able to resolve a time constraint using fast-tracking or crashing. State the time management issue and how it was resolved
What do the wireless carriers do mitigate this threat : takes out power and cell towers for a large geographical area? What do the wireless carriers do mitigate this threat or recover from a disaster
Reflect on your own icon arrangement and preferences : MMIS 680 Nova Southeastern University Reflect on your own icon arrangement and preferences on your smartphone. Which category (see the article, page 2139)
Elements of computer software security : Topic: Provide a basic discussion outlining the critical elements of Computer Software Security.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define the importance of bandwidth

define the importance of bandwidth

  What exception would be thrown if arithmetic were performed

What type of exception would be thrown if the following arithmetic were performed? double aValue = 0, bValue = 0; int result = (int) aValue / (int) bValue;

  How well can we predict the consequences of a new technology

How well can we predict the consequences of a new technology or application? Who should make the decision for a business on what technology the adopt?

  Sorts the vector containing the lottery numbers

Sorts the vector containing the lottery numbers. Determines whether the player guessed the lottery numbers correctly.

  Write a program that prompts the user for the wholesale

Write a program that prompts the user for the wholesale price and markup percentage of an item.

  Convert to mips assembler

Please provide the complete calculation, not just a result. For y: you can use the algorithm shown in the example output of a conversion program.

  How 5g service differ from its previous counterparts

Internet service providers (ISPs) In Saudi Arabia offer several different internet services such as 3G and 4G and most lately 5G.

  What happens if you multiply a number by a string

What happens if you multiply a number by a string? Try 5 * "=". Store the result in variable s. What happen if you multiply that string by 10 and then print it?

  What is a credit-balance function and how is it used

What is a credit-balance function, and how is it used? In the big-O notation, what is the cost of splaying amortized over sequence of retrievals and insertions?

  What is the difference between the two histograms

UMUC Data 620 Assignment 1. Write a few sentences - what is the difference between the two histograms? Which one would you use under which circumstances

  Why functional and nonfunctional requirements are important

"Functional vs. Nonfunctional Requirements" Please respond to the following: Explain why both functional and nonfunctional requirements are important.

  What are the trade offs between security and privacy

Write a 6-8 page paper (deliverable length does not include the title and reference pages) What are the trade offs between security and privacy?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd