@incollection{, E659F5FB8089A785C5FA4910F62B209E , author={{Md. BazlurRahman} and {TaniaKarim} and {Imtiaz UddinChowdhury} and {University of Chittagong}}, journal={{Global Journal of Management and Business Research}}, journal={{GJMBR}}2249-45880975-585310.34257/GJMBR, address={Cambridge, United States}, publisher={Global Journals Organisation}2134958 } @incollection{b0, , title={{Risk committee, firm life cycle, and market risk disclosures}} , author={{ AAl-Hadi } and { MMHasan } and { AHabib }} , journal={{Corporate Governance: An International Review}} 24 2 , year={2016} } @book{b1, , title={{Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice}} , author={{ CBiener } and { MEling } and { JHWirfs }} , year={2015} 40 } @incollection{b2, , title={{Models and Measures for Correlation in Cyber-Insurance}} , author={{ RBöhme } and { GKataria }} , booktitle={{WEIS}} , year={2006. June} 2 3 } @book{b3, , title={{A taxonomy of operational cyber security risks}} , author={{ JLCebula } and { LRYoung }} , year={2010} Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst } @book{b4, , title={{Corporate governance: Decades of dialogue and data}} , author={{ CMDaily } and { DRDalton } and { AACannellaJr }} , year={2003} , publisher={Academy of management review} 28 } @book{b5, , title={{Cyber risk as systemic risk}} , author={{ JDanielsson } and { MFouche } and { RMacrae }} , year={2016} VOX CEPR Policy Portal } @book{b6, , title={{Cyber risk: too big to insure? Risk transfer options for a mercurial risk class}} , author={{ MEling } and { JH. ; IWirfs } and { Vw } and { Schriftenreihe }} , year={2016} } @book{b7, , title={{Enterprise risk management: Today's leading research and best practices for tomorrow's executives}} , editor={Fraser, J., & Simkins, B.} , year={2010} 3 } @book{b8, , title={{Cyber liability & data breach insurance claims}} , author={{ MGreisiger } and { IDAllclear } and { FIreland } and { PL LCox }} , year={2013. 2017} 3 } @book{b9, , title={{Information security management standards: Compliance, governance and risk management}} , author={{ EHumphreys }} , year={2008} 13 , note={information security technical report} } @incollection{b10, , title={{Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools}} , author={{ WKröger }} , journal={{Reliability Engineering & System Safety}} 93 12 , year={2008} } @book{b11, , title={{The Handbook of Board Governance: A Comprehensive Guide for Public, Private, and Not-for-Profit Board Members}} , author={{ RLeblanc } and { JFraser }} , year={2016} , publisher={John Wiley & Sons} } @book{b12, , title={{The economic impact of cybercrime and cyber espionage}} , author={{ JLewis } and { SBaker }} , year={2013} , address={McAfee} } @incollection{b13, , title={{Making boards effective: An empirical examination of board task performance}} , author={{ AMinichilli } and { AZattoni } and { FZona }} , journal={{British Journal of Management}} 20 1 , year={2009} } @incollection{b14, , title={{Cyber-risk decision models: To insure IT or not}} , author={{ AMukhopadhyay } and { SChatterjee } and { DSaha } and { AMahanti } and { SKSadhukhan }} , journal={{Decision Support Systems}} 56 , year={2013} } @incollection{b15, , title={{Cyber security risk management: Public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection}} , author={{ HÖ?üt } and { SRaghunathan } and { NMenon }} , journal={{An International Journal}} 31 3 , year={2011} } @incollection{b16, , title={{Governing information technology risk}} , author={{ MParent } and { BHReich }} , journal={{California Management Review}} 51 3 , year={2009} } @book{b17, , title={{On studying managerial elites. Strategic management journal}} , author={{ AMPettigrew }} , year={1992} 13 } @book{b18, , title={{Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age}} , author={{ PonemonInstitute }} , year={2013} } @book{b19, , title={{Cost of data breach study: Global analysis. Poneomon Institute sponsored by Symantec}} , author={{ LPonemon }} , year={2013} } @incollection{b20, , title={{A framework for the governance of information security}} , author={{ SPosthumus } and { RVon Solms }} , journal={{Computers & Security}} 23 8 , year={2004} } @incollection{b21, , title={{The effect of cybercrime on a Bank's finances}} , author={{ ARRaghavan } and { LParthiban }} , journal={{International Journal of Current Research and Academic Review}} 2 2 , year={2014} } @incollection{b22, , title={{Lessons learned: A re-assessment of the IRGC framework on risk governance}} , author={{ ORenn } and { KWalker }} , booktitle={{Global risk governance}} Dordrecht , publisher={Springer} , year={2008} } @incollection{b23, , title={{Cybercrimes of the 21st Century}} , author={{ ARiem }} , journal={{Computer Fraud & Security}} , year={2001. April} } @incollection{b24, , title={{A strategic approach to risk governance of critical infrastructures}} , author={{ MSajeva } and { MMasera }} , journal={{International journal of critical infrastructures}} 2 4 , year={2006} } @incollection{b25, , title={{Should your firm invest in cyber risk insurance}} , author={{ SJShackelford }} , booktitle={{Business Horizons}} , year={2012} 55 } @incollection{b26, , title={{Cyber-risk management: technical and insurance controls for enterprise-level security}} , author={{ CASiegel } and { TRSagalow } and { PSerritella }} , journal={{Information Systems Security}} 11 4 , year={2002} } @incollection{b27, , title={{Jurisdictional integrity, polycentrism, and the design of democratic governance}} , author={{ CSkelcher }} , journal={{Governance}} 18 1 , year={2005} } @incollection{b28, , title={{Case studies of cybercrime and its impact on marketing activity and shareholder value}} , author={{ KTSmith } and { MSmith } and { JLSmith }} , journal={{Academy of Marketing Studies Journal}} , year={2011} } @book{b29, , title={{The Role of the Board in Cybersecurity: 'Learn, Ensure, Inspect', Dark Reading}} , author={{ JStraight }} , year={2015. August 02. 2015} } @book{b30, , author={{ RTourangeau } and { LJRips } and { KRasinski }} CMU/SEI-2010-TN-028 , title={{The psychology of survey response}} , publisher={Cambridge University Press} , year={2000} CERT Carnegie Mellon University , note={Technical Note} } @incollection{b31, , title={{Risk governance}} , author={{ MBVan Asselt } and { ORenn }} , journal={{Journal of Risk Research}} 14 4 , year={2011} } @incollection{b32, , title={{Is ERM legally required? Yes for financial and governmental institutions, no for private enterprises}} , author={{ AFWhitman }} , journal={{Risk Management and Insurance Review}} 18 2 , year={2015} } @incollection{b33, , title={{Information Management: Challenges in Federal Agencies' Use of Web 2.0 Technologies: Testimony Before the Subcommittee on Information Policy, Census, and National Archives, Committee on Oversight and Government Reform, House of Representatives}} , author={{ GCWilshusen }} , journal={{US Government Accountability Office}} , year={2010} } @incollection{b34, , title={{}} , journal={{World Economic Forum}} , year={2012} , note={Global Risks 2012 Seventh Edition} } @incollection{b35, , title={{Passwords: use and abuse}} , author={{ PYapp }} , journal={{Computer Fraud & Security}} 9 , year={2001. 2001} }