Regional Perspective of Using Cyber Insurance as a Tool for Protection of Agriculture 4.0
Abstract
:1. Introduction
- Creating policies for mandatory identification in IT systems for company employees and limited access for one-time visitors; enhancing information security to maintain confidentiality; implementing blockchain technologies to improve data encryption and transmission channels; establishing cryptography mechanisms and management to access key creation and circulation; physical security for computer equipment, network equipment and other devices; implementing cyber incident detection systems. The measures described above can be implemented separately, but the full positive effect occurs when they are implemented in a comprehensive manner [10];
- Providing appropriate education for current and future agricultural workers, which will be the basis for improving cybersecurity in the future; strengthening interdisciplinary cooperation between the agriculture and cybersecurity sectors; creating government security standards for the agricultural sector. These measures will help to maintain the stability of food supply chains and therefore food security in general [11];
- Implementation of a scenario-based approach based on a system that assesses risk factors, safety factors and potential costs. This approach is also adapted for different agricultural scenarios and therefore already includes sub-scenarios and cases for different cases of cyber incidents [12].
2. Materials and Methods
2.1. Research Purpose
2.2. Research Framework
2.3. Research Methods
2.4. Research Materials
- In order to assess the extent to which cyber insurance is necessary in the agricultural sector, we examined the various factors that contribute to the development of cyber insurance overall. Through a regression analysis, we determined that the dependent indicator is global cyber insurance premiums (GCIP) [15], while independent indicators are industry 4.0 market size (IMS) [16] and cyber-attacks (CAs) [17] (Table 2).
Indicator 2018 2019 2020 2021 2022 GCIP, billion USD 4.75 5.05 5.25 7.01 11.70 IMS, billion USD 54.1 57.8 62.5 68.2 78.5 CAs, million 7.9 9.5 10.8 13.9 15.4 Source: Calculated by authors based on the GlobalData Cyber-insurance Report, Cisco Annual Internet Report, Acumen Industry 4.0 Market Report. - The regression analysis findings reveal a consistent correlation between global cyber insurance premiums (GCIP) and industry 4.0 market size (IMS), as well as cyber-attacks (CAs) (Table 3).
Independent Indicators R2 R F Statistic p-Value The Shapiro–Wilk p-Value CAs 0.9635 0.9816 79.2049 0.002992 0.4545 IMS 0.9653 0.9825 83.5518 0.002768 0.5182 Source: Calculated by authors based on the GlobalData Cyber-insurance Report, Cisco Annual Internet Report, Acumen Industry 4.0 Market Report.
- The share of global cyber-attacks [18]. The data are presented as a percentage for each region, which is calculated using the formula:
- Limits of this indicator: [0%; 100%].
- National Cybersecurity Index [19]. This indicator considers the degree of progress made in protecting against cyber-attacks. This index was calculated by the NCSI project and is based on the value of denial of e-services, data integrity breach and data confidentiality breach. Limits of this indicator: [0%; 100%].
- Smart farming market share [20]. The data are presented as a percentage for each region, which is calculated using the formula:
- Limits of this indicator: [0%; 100%].
- Share of agricultural output [21]. This indicator considers the role of the region in promoting food safety. The data are presented as a percentage for each region, calculated using the formula:
- Limits of this indicator: [0%; 100%].
- It should be noted that we chose the current USD measure for agricultural products to unify the components of the formula. The total amount of agricultural output includes crops and livestock. Therefore, the share of agricultural output is a representative cross-section of the real global volume of agricultural products (Table 5).
Item 2017 2018 2019 2020 2021 Crops 2,571,197 2,620,248 2,846,269 2,895,524 3,082,672 Asia–Pacific 1,604,731 1,679,983 1,882,061 1,925,848 2,003,488 Europe 295,072 287,034 286,026 293,700 362,457 Middle East and Africa 210,004 224,532 230,356 217,169 216,342 Northern America 257,843 255,849 253,162 278,557 317,474 South America 203,546 172,850 194,663 180,251 182,912 Livestock 1,112,905 1,117,987 1,305,721 1,332,435 1,364,798 Asia–Pacific 592,419 607,734 781,210 809,673 800,001 Europe 211,325 214,435 211,871 212,241 228,460 Middle East and Africa 56,148 58,875 63,695 66,591 72,034 Northern America 134,690 135,773 141,073 140,921 144,861 South America 118,323 101,170 107,872 103,010 119,442 Total 3,684,102 3,738,235 4,151,991 4,227,959 4,447,470 Source: Calculated by authors based on the Food and Agriculture Organization of the United Nations Statistics. - Also, during the analyzed period, we can see a stable share of agricultural output in 2021 compared to the average for the previous 3 years in the regions of the Asia–Pacific, Northern America and South America. However, the Europe region increased its share by 1 pp due to a decrease in the share of Middle East and Africa (Table 6). Therefore, we use the data for 2021 in the formula for the Necessity of Cyber Insurance for the Agricultural Industry Index.
Region 2017 2018 2019 2020 2021 Asia–Pacific 60% 61% 64% 65% 63% Europe 14% 13% 12% 12% 13% Middle East and Africa 7% 8% 7% 7% 6% Northern America 11% 10% 9% 10% 10% South America 9% 7% 7% 7% 7% Grand Total, m USD 3,684,102 3,738,235 4,151,991 4,227,959 4,447,470 Source: Calculated by authors based on the Food and Agriculture Organization of the United Nations Statistics.
- In general, we consider all the described indicators to be equal in the formula for calculating the Necessity of Cyber Insurance for the Agricultural Industry, so we do not include weighting indicators.
3. Results
3.1. Cyber Risks in Digital Agricultural Sector
3.1.1. Group of Cyber Risks Aimed at Stealing and Using Confidential Information
3.1.2. Cyber-Warfare and Cyber-Terrorism as Instruments of Political/Military Pressure on Vulnerable Groups
- Supply chain disruption: cyber-attacks can cause changes in supply chains, redirecting raw materials or finished products [42];
- Deterioration in product quality: cyber-attacks on production monitoring and testing systems implemented to reduce access to food for vulnerable populations [43];
- Misrepresentation of product information: cybercriminals can spread disinformation about the quality or quantity of products, provoking panic among the population, or interfere with monitoring results, with the possible deletion or falsification of data [44].
3.1.3. Targeted Attacks on Data Processing and Transmission Systems, Controllers or Testers
3.1.4. Malware That Blocks or Alters the Operation of Software, Robotics or Automated Systems
3.1.5. Cyber-Attacks on Digital Markets or Exchanges, Their Full/Partial Shutdown, Removal of Functionality, Blocking of Transactions
- Deterioration in the financial performance of the agricultural sector, and therefore a decrease in investment flows. Often, such attacks block bidding and transactions and therefore delay the supply of food to certain groups of companies or end users [55];
- Removing exchange instruments that block the ability to track prices and trade efficiently. Also, changes in trade profile settings can lead to the mass blocking of transactions as potentially fraudulent.
3.2. Cyber Insurance as a Tool to Protect Agricultural Industry 4.0
- Develop a cybersecurity culture in which all business owners and their employees are familiar with the basic rules and principles of information systems. In addition, the entities in this area should strengthen cooperation with other critical industry entities [60];
- Establishing cybersecurity departments within organizations or engaging specialists in this area to monitor and improve the security of IT systems [44];
- Use of cyber risk insurance policies as an effective tool for the timely prevention and identification of risks, as well as ensuring a set of post-incident measures in case of their occurrence [61].
3.2.1. Development of an Algorithm for Cooperation between an Agricultural Company and an Insurance Company When Concluding a Cyber Risk Insurance Contract
- Step 1. Request of an agricultural company to an insurance company. After deciding about the need for cyber risk insurance, agribusiness owners start looking for insurers that provide the following services. After selecting one or more options, the process of negotiations between the parties to the insurance relationship begins;
- Step 2. Assessment of existing risks of an agricultural company. The other party, the insurance company, begins to assess the current state of the agricultural company, its IT infrastructure, employee awareness, information security and data transmission channels. Based on the information collected, the risk is quantified. To monitor the required indicators, an insurance company may engage cybersecurity experts;
- Step 3. Obtaining results and recommendations. After receiving the results of the inspection, the insurer determines the level of risk: acceptable or unacceptable for insurance. Also, at this stage, the insurer, either independently or with the involvement of cybersecurity experts, creates a roadmap for correcting disadvantages to improve the protection of the agricultural company;
- Step 4. (a) If the risks are acceptable to the insurer, an individual insurance plan is developed based on the client’s needs. (b) If the risks are high, the insurance company may accept the object for insurance, while transferring part of the risk to reinsurance. The insurer makes the decision to reinsure independently and is not obliged to notify the client. In this case, an individual insurance plan is developed based on the client’s needs. (c) In a case where the risks are big or excessive and therefore unacceptable, an agricultural company is offered coinsurance for the following risks. If such conditions are agreed upon, the insurance company begins to work with co-insurance partners and develops an individual insurance plan based on the client’s needs. If the client refuses this option, then a refusal to cooperate is recorded. (d) If the risks are unacceptable due to the unsatisfactory state of cybersecurity, the agricultural company is requested to correct the problems based on the recommendations received. If an agricultural company agrees to correct the problems, it undergoes a second inspection (Step 3). If an agricultural company refuses to correct the problems, a refusal to cooperate is recorded;
- Step 5. After the development of an individual insurance policy with the required coverage and tariff, the agricultural company decides whether the proposed option is suitable for it. (a) If the terms and conditions are acceptable to the agricultural company, an agreement is concluded. (b) If the conditions are unacceptable to the agricultural company, a refusal to cooperate is recorded.
3.2.2. Regional Need to Develop Cyber Insurance for Agricultural Sector 4.0
4. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- International Covenant on Economic, Social and Cultural Rights. 1966, Volume 3. Available online: https://treaties.un.org/Pages/ViewDetails.aspx?src=TREATY&mtdsg_no=IV-3&chapter=4&clang=_en (accessed on 16 November 2023).
- Marvin, H.J.P.; Bouzembrak, Y.; van der Fels-Klerx, H.J.; Kempenaar, C.; Veerkamp, R.; Chauhan, A.; Stroosnijder, S.; Top, J.; Simsek-Senel, G.; Vrolijk, H.; et al. Digitalisation and Artificial Intelligence for Sustainable Food Systems. Trends Food Sci. Technol. 2022, 120, 344–348. [Google Scholar] [CrossRef]
- Alahmadi, A.N.; Rehman, S.U.; Alhazmi, H.S.; Glynn, D.G.; Shoaib, H.; Solé, P. Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. Sensors 2022, 22, 3520. [Google Scholar] [CrossRef]
- Angyalos, Z.; Botos, S.; Szilagyi, R. The Importance of Cybersecurity in Modern Agriculture. J. Agric. Inform. 2021, 12, 1–8. [Google Scholar] [CrossRef]
- Amin, Z. A Practical Road Map for Assessing Cyber Risk. J. Risk Res. 2017, 22, 32–43. [Google Scholar] [CrossRef]
- Vatn, K.J.D. Cybersecurity in Agriculture: A Threat Analysis of Cyber-Enabled Dairy Farm Systems. Master’s Thesis, NTNU–Norwegian University of Science and Technology, Trondheim, Norway, 2023. Available online: https://ntnuopen.ntnu.no/ntnu-xmlui/handle/11250/3082225 (accessed on 16 November 2023).
- Okupa, H. Cybersecurity and the Future of Agri-Food Industries. Master’s Thesis, Kansas State University, Manhattan, KS, USA, 2020. Available online: https://hdl.handle.net/2097/40529 (accessed on 16 November 2023).
- Stephen, S.; Alexander, K.; Potter, L.; Palmer, X.-L. Implications of Cyberbiosecurity in Advanced Agriculture. In Proceedings of the 18th International Conference on Information Warfare and Security, Baltimore, MD, USA, 9–10 March 2023; Volume 18, pp. 387–393. [Google Scholar] [CrossRef]
- Rotz, S.; Duncan, E.; Small, M.; Botschner, J.; Dara, R.; Mosby, I.; Reed, M.; Fraser, E.D.G. The Politics of Digital Agricultural Technologies: A Preliminary Review. Sociol. Rural. 2019, 59, 203–229. [Google Scholar] [CrossRef]
- Yang, X.; Shu, L.; Chen, J.; Ferrag, M.A.; Wu, J.; Nurellari, E.; Huang, K. A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges. IEEE/CAA J. Autom. Sin. 2021, 8, 273–302. [Google Scholar] [CrossRef]
- Drape, T.; Magerkorth, N.; Sen, A.; Simpson, J.; Seibel, M.; Murch, R.S.; Duncan, S.E. Assessing the Role of Cyberbiosecurity in Agriculture: A Case Study. Front. Bioeng. Biotechnol. 2021, 9, 737927. [Google Scholar] [CrossRef]
- Riaz, A.R.; Gilani, S.M.M.; Naseer, S.; Alshmrany, S.; Shafiq, M.; Choi, J.-G. Applying Adaptive Security Techniques for Risk Analysis of Internet of Things (IoT)-Based Smart Agriculture. Sustainability 2022, 14, 10964. [Google Scholar] [CrossRef]
- Marotta, A.; Martinelli, F.; Nanni, S.; Orlando, A.; Yautsiukhin, A. Cyber-Insurance Survey. Comput. Sci. Rev. 2017, 24, 35–61. [Google Scholar] [CrossRef]
- Prykaziuk, N.; Lobova, O.; Motashko, T.; Prokofieva, O.; Diachuk, H. Optimization of the Mechanism of Natural and Climate Risk Insurance at the Macro- and Meso-Levels of the National Economy. Stud. Appl. Econ. 2021, 39, 4655. [Google Scholar] [CrossRef]
- GlobalData. Cyber Insurance—Thematic Intelligence; GlobalData: London, UK, 2023; Available online: https://www.globaldata.com/store/report/cyber-insurance-theme-analysis/ (accessed on 16 November 2023).
- Acumen Global Industry 4.0 Market Report: Los Angeles, CA, USA. 2022. Available online: https://www.globenewswire.com/en/news-release/2022/10/21/2539262/0/en/Industry-4-0-Market-Size-Will-Attain-USD-261-9-Billion-by-2030-growing-at-16-3-CAGR-Exclusive-Report-by-Acumen-Research-and-Consulting.html (accessed on 6 February 2024).
- Cisco Annual Internet Report (2018–2023) White Paper: CA, USA. 2020. Available online: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html (accessed on 6 February 2024).
- Imperva. Available online: https://www.imperva.com/ (accessed on 16 November 2023).
- NCSI. Available online: https://ncsi.ega.ee/compare/ (accessed on 16 November 2023).
- Maximize Market Research. Smart Farming Market—Global Industry Analysis and Forecast (2023–2029); Maximize Market Research: Narhe Pune, India, 2023; Available online: http://www.maximizemarketresearch.com/market-report/global-smart-farming-market/22769/ (accessed on 16 November 2023).
- Food and Agriculture Organization of the United Nation Statistics. Available online: https://www.fao.org/faostat/en/#data/QV (accessed on 16 November 2023).
- Van der Linden, D.; Michalec, O.A.; Zamansky, A. Cybersecurity for Smart Farming: Socio-Cultural Context Matters. IEEE Technol. Soc. Mag. 2020, 39, 28–35. [Google Scholar] [CrossRef]
- Abbasi, R.; Martinez, P.; Ahmad, R. The Digitization of Agricultural Industry—A Systematic Literature Review on Agriculture 4.0. Smart Agric. Technol. 2022, 2, 100042. [Google Scholar] [CrossRef]
- Cunha, L.; Silva, D.; Maggioli, S. Exploring the Status of the Human Operator in Industry 4.0: A Systematic Review. Front. Psychol. 2022, 13, 889129. [Google Scholar] [CrossRef]
- Deng, F.; Jia, S.; Ye, M.; Li, Z. Coordinated Development of High-Quality Agricultural Transformation and Technological Innovation: A Case Study of Main Grain-Producing Areas, China. Environ. Sci. Pollut. Res. 2022, 29, 35150–35164. [Google Scholar] [CrossRef]
- Da Silveira, F.; Lermen, F.H.; Amaral, F.G. An Overview of Agriculture 4.0 Development: Systematic Review of Descriptions, Technologies, Barriers, Advantages, and Disadvantages. Comput. Electron. Agric. 2021, 189, 106405. [Google Scholar] [CrossRef]
- Trivelli, L.; Apicella, A.; Chiarello, F.; Rana, R.; Fantoni, G.; Tarabella, A. From precision agriculture to Industry 4.0: Unveiling technological connections in the agrifood sector. Br. Food J. 2019, 121, 1730–1743. [Google Scholar] [CrossRef]
- Yarashynskaya, A.; Prus, P. Precision Agriculture Implementation Factors and Adoption Potential: The Case Study of Polish Agriculture. Agronomy 2022, 12, 2226. [Google Scholar] [CrossRef]
- Monteleone, S.; Moraes, E.A.d.; Tondato de Faria, B.; Aquino Junior, P.T.; Maia, R.F.; Neto, A.T.; Toscano, A. Exploring the Adoption of Precision Agriculture for Irrigation in the Context of Agriculture 4.0: The Key Role of Internet of Things. Sensors 2020, 20, 7091. [Google Scholar] [CrossRef]
- Yaqot, M.; Menezes, B.C.; Al-Ansari, T. Unmanned Aerial Vehicles in Precision Agriculture towards Circular Economy: A Process System Engineering (PSE) Assessment. Comput. Aided Chem. Eng. 2021, 50, 1559–1565. [Google Scholar] [CrossRef]
- Dey, K.; Shekhawat, U. Blockchain for Sustainable E-Agriculture: Literature Review, Architecture for Data Management, and Implications. J. Clean. Prod. 2021, 316, 128254. [Google Scholar] [CrossRef]
- Yépez-Ponce, D.F.; Salcedo, J.V.; Rosero-Montalvo, P.D.; Sanchis, J. Mobile Robotics in Smart Farming: Current Trends and Applications. Front. Artif. Intell. 2023, 6, 1213330. [Google Scholar] [CrossRef]
- Bland, R.; Ganesan, V.; Hong, E.; Kalanik, J. Trends Driving Automation on the Farm; McKinsey & Company. 2023, p. 9. Available online: https://www.mckinsey.com/industries/agriculture/our-insights/trends-driving-automation-on-the-farm (accessed on 16 November 2023).
- Demestichas, K.; Peppes, N.; Alexakis, T. Survey on Security Threats in Agricultural IoT and Smart Farming. Sensors 2020, 20, 6458. [Google Scholar] [CrossRef]
- Keshavarz, M.; Sharafi, H. Scaling up Climate-Smart Regenerative Agriculture for the Restoration of Degraded Agroecosystems in Developing Countries. Sustain. Prod. Consum. 2023, 38, 159–173. [Google Scholar] [CrossRef]
- Bendovschi, A. Cyber-Attacks—Trends, Patterns and Security Countermeasures. Procedia Econ. Financ. 2015, 28, 24–31. [Google Scholar] [CrossRef]
- Ghiasi, M.; Niknam, T.; Wang, Z.; Mehrandezh, M.; Dehghani, M.; Ghadimi, N. A Comprehensive Review of Cyber-Attacks and Defense Mechanisms for Improving Security in Smart Grid Energy Systems: Past, Present and Future. Electr. Power Syst. Res. 2023, 215, 108975. [Google Scholar] [CrossRef]
- ProofPrint. 2023 State of the Phish; ProofPrint: Toronto, ON, Canada, 2023; p. 35. Available online: https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2023.pdf (accessed on 16 November 2023).
- 2023 Data Breach Investigations Report; Verizon. 2023, p. 89. Available online: https://inquest.net/wp-content/uploads/2023-data-breach-investigations-report-dbir.pdf (accessed on 16 November 2023).
- Hazrati, M.; Dara, R.; Kaur, J. On-Farm Data Security: Practical Recommendations for Securing Farm Data. Front. Sustain. Food Syst. 2022, 6, 884187. [Google Scholar] [CrossRef]
- Anand, S.; Sharma, D.A. AgroKy: An Approach for Enhancing Security Services in Precision Agriculture. Meas. Sens. 2022, 24, 100449. [Google Scholar] [CrossRef]
- Ben Hassen, T.; El Bilali, H. Impacts of the Russia-Ukraine War on Global Food Security: Towards More Sustainable and Resilient Food Systems? Foods 2022, 11, 2301. [Google Scholar] [CrossRef]
- Elhabashy, A.E.; Wells, L.J.; Camelio, J.A. Cyber-Physical Attack Vulnerabilities in Manufacturing Quality Control Tools. Qual. Eng. 2020, 4, 676–692. [Google Scholar] [CrossRef]
- Leclair, J. Protecting Our Future, Volume 2: Educating a Cybersecurity Workforce; Hudson Whitman Press: New York, NY, USA, 2015. [Google Scholar]
- Oluwaseun, A.D.; Olugbemi, O.T.; Anani, O.A.; Hefft, D.I.; Wilson, N.; Olayinka, A.S.; Ukhurebor, K.E. Cyberespionage: Socioeconomic Implications on Sustainable Food Security. In AI, Edge and IoT-Based Smart Agriculture; Academic Press: Cambridge, MA, USA, 2022; pp. 477–486. [Google Scholar] [CrossRef]
- Ayrour, Y.; Raji, A.; Nassar, M. Modelling Cyber-Attacks: A Survey Study. Netw. Secur. 2018, 3, 13–19. [Google Scholar] [CrossRef]
- Xu, J.; Gu, B.; Tian, G. Review of Agricultural IoT Technology. Artif. Intell. Agric. 2022, 6, 10–22. [Google Scholar] [CrossRef]
- A Novel Technology for Smart Agriculture Based on IoT with Cloud Computing. Available online: https://ieeexplore.ieee.org/abstract/document/8058280 (accessed on 15 November 2023).
- Precedence Research. Internet of Things (IoT) in Agriculture Market; Precedence Research: Ottawa, ON, Canada, 2022; Available online: https://www.precedenceresearch.com/iot-in-agriculture-market (accessed on 16 November 2023).
- European Commission. Industry 4.0 in Agriculture: Focus on IoT Aspects; European Commission: Brussels, Belgium, 2017; p. 6. Available online: https://ati.ec.europa.eu/reports/technology-watch/industry-40-agriculture-focus-iot-aspects (accessed on 16 November 2023).
- Yascaribay, G.; Huerta, M.; Silva, M.; Clotet, R. Performance Evaluation of Communication Systems Used for Internet of Things in Agriculture. Agriculture 2022, 12, 786. [Google Scholar] [CrossRef]
- Watson, M.R.; Shirazi, N.; Marnerides, A.K.; Mauthe, A.; Hutchison, D. Malware Detection in Cloud Computing Infrastructures. IEEE Trans. Dependable Secur. Comput. 2016, 13, 192–205. [Google Scholar] [CrossRef]
- ResearchDive. Agriculture Robot Market Report; ResearchDive: New York, NY, USA, 2020; p. 210. Available online: https://www.researchdive.com/52/agriculture-robot-market (accessed on 16 November 2023).
- Nikander, J.; Manninen, O.; Laajalahti, M. Requirements for Cybersecurity in Agricultural Communication Networks. Comput. Electron. Agric. 2020, 179, 105776. [Google Scholar] [CrossRef]
- Tosun, O.K. Cyber-Attacks and Stock Market Activity. Int. Rev. Financ. Anal. 2021, 76, 101795. [Google Scholar] [CrossRef]
- Tsohou, A.; Diamantopoulou, V.; Gritzalis, S.; Lambrinoudakis, C. Cyber Insurance: State of the Art, Trends and Future Directions. Int. J. Inf. Secur. 2023, 22, 737–748. [Google Scholar] [CrossRef]
- Pranggono, B.; Arabo, A. COVID-19 Pandemic Cybersecurity Issues. Internet Technol. Lett. 2020, 4, e247. [Google Scholar] [CrossRef]
- Sebastian, G. Do ChatGPT and Other AI Chatbots Pose a Cybersecurity Risk? Int. J. Secur. Priv. Pervasive Comput. 2023, 15, 320225. [Google Scholar] [CrossRef]
- Baker, T.; Shortland, A. Insurance and Enterprise: Cyber Insurance for Ransomware. Geneva Pap. Risk Insur. Issues Pract. 2023, 48, 275–299. [Google Scholar] [CrossRef]
- Duncan, S.E.; Reinhard, R.; Williams, R.C.; Ramsey, F.; Thomason, W.; Lee, K.; Dudek, N.; Mostaghimi, S.; Colbert, E.; Murch, R. Cyberbiosecurity: A New Perspective on Protecting U.S. Food and Agricultural System. Front. Bioeng. Biotechnol. 2019, 7, 63. [Google Scholar] [CrossRef]
- Development of Large-Scale Farming Based on Explainable Machine Learning for a Sustainable Rural Economy: The Case of Cyber Risk Analysis to Prevent Costly Data Breaches. Available online: https://www.tandfonline.com/doi/full/10.1080/08839514.2023.2223862 (accessed on 12 November 2023).
- Wolff, J.; Lehr, W. Roles for Policy-Makers in Emerging Cyber Insurance Industry Partnerships. In Proceedings of the TPRC 46: The 46th Research Conference on Communication, Information and Internet Policy 2018, Washington, DC, USA, 20–22 September 2018. [Google Scholar] [CrossRef]
- Camillo, M. Cyber risk and the changing role of insurance. J. Cyber Policy 2017, 1, 53–63. [Google Scholar] [CrossRef]
- Romanosky, S.; Ablon, L.; Kuehn, A.; Jones, T. Content Analysis of Cyber Insurance Policies: How Do Carriers Write Policies and Price Cyber Risk? SSRN Electron. J. 2017, 6, 38. [Google Scholar] [CrossRef]
- Jellason, N.P.; Robinson, E.J.Z.; Ogbaga, C.C. Agriculture 4.0: Is Sub-Saharan Africa Ready? Appl. Sci. 2021, 11, 5750. [Google Scholar] [CrossRef]
- Badiane, O.; Makombe, T. The Theory and Practice of Agriculture, Growth, and Development in Africa; The United Nations University World Institute for Development Economics Research (UNU-WIDER): Helsinki, Finland, 2014. [Google Scholar] [CrossRef]
- Ganbayar, U.; Yautsiukhin, A.; Martinelli, F.; Massacci, F. Optimisation of cyber insurance coverage with selection of cost effective security controls. Comput. Secur. 2021, 101, 102121. [Google Scholar] [CrossRef]
- Bartłomiej, B.; Dankiewicz, R.; Ostrowska-Dankiewicz, A. The role of insurance in cyber risk management in enterprises. Humanit. Soc. Sci. 2019, 26, 19–33. [Google Scholar] [CrossRef]
- Mazzoccoli, A.; Naldi, M. Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management. Risk Anal. 2019, 40, 550–564. [Google Scholar] [CrossRef]
- Harner, C.; Beck, C.; Fleisher, B. Cyber: Navigating the War Exclusion Issue. Risk Manag. 2020, 7, 8–11. [Google Scholar]
- Pal, R.; Golubchik, L.; Psounis, K.; Hui, P. Improving Cyber-Security via Profitable Insurance Markets. ACM SIGMETRICS Perform. Eval. Rev. 2018, 45, 7–15. [Google Scholar] [CrossRef]
Authors | Types of Cyber Risks | Number of Unique Types of Cyber Risks |
---|---|---|
Alahmadi, A.N.; Rehman, S.U.; Alhazmi, H.S.; Glynn, D.G.; Shoaib, H.; Solé, P. [3] | Commercially sensitive information threats; Internet of Things, robotics and aerial systems threats; Big Data and machine learning threats; supply chain threats. | 6 |
Angyalos, Z.; Botos, S.; Szilagyi, R. [4] | Blockchain threats; IoT systems and Big Data threats; phishing threats. | 3 |
Vatn, K.J.D. [6] | Threats to confidentiality; threats to integrity; threats to availability. | 3 |
Okupa, H. [7] | Social engineering threats; advanced persistent threats; malware threats; denial of service threats. | 4 |
Stephen, S.; Alexander, K.; Potter, L.; Palmer, X.-L. [8] | Threats to confidentiality; threats to integrity; threats to availability. | 3 |
Rotz, S.; Duncan, E.; Small, M.; Botschner, J.; Dara, R.; Mosby, I.; Reed, M.; Fraser, E.D.G. [9] | The production of technologies threats; data development threats; data security threats; data ownership and control threats. | 4 |
Region | Share of Cyber- Attacks, % | National Cyber Security Index, % | Smart Farming Market Share, % | Share of Agricultural Output, % |
---|---|---|---|---|
Asia–Pacific | 16% | 40% | 10% | 63% |
Europe | 39% | 78% | 21% | 13% |
Latin America | 3% | 51% | 7% | 7% |
Middle East and Africa | 1% | 30% | 8% | 6% |
North America | 41% | 31% | 54% | 10% |
Industry | Total | Small | Large | Other |
---|---|---|---|---|
Agriculture | 50% | 0% | 60% | 50% |
Finance | 26% | 54% | 60% | 24% |
Healthcare | 83% | 82% | 100% | 82% |
Retail | 47% | 53% | 64% | 44% |
Transportation | 30% | 62% | 52% | 27% |
Other | 30% | 53% | 39% | 29% |
Average | 32% | 54% | 46% | 30% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sitnicki, M.W.; Prykaziuk, N.; Ludmila, H.; Pimenowa, O.; Imbrea, F.; Șmuleac, L.; Pașcalău, R. Regional Perspective of Using Cyber Insurance as a Tool for Protection of Agriculture 4.0. Agriculture 2024, 14, 320. https://doi.org/10.3390/agriculture14020320
Sitnicki MW, Prykaziuk N, Ludmila H, Pimenowa O, Imbrea F, Șmuleac L, Pașcalău R. Regional Perspective of Using Cyber Insurance as a Tool for Protection of Agriculture 4.0. Agriculture. 2024; 14(2):320. https://doi.org/10.3390/agriculture14020320
Chicago/Turabian StyleSitnicki, Maksym W., Nataliia Prykaziuk, Humeniuk Ludmila, Olena Pimenowa, Florin Imbrea, Laura Șmuleac, and Raul Pașcalău. 2024. "Regional Perspective of Using Cyber Insurance as a Tool for Protection of Agriculture 4.0" Agriculture 14, no. 2: 320. https://doi.org/10.3390/agriculture14020320
APA StyleSitnicki, M. W., Prykaziuk, N., Ludmila, H., Pimenowa, O., Imbrea, F., Șmuleac, L., & Pașcalău, R. (2024). Regional Perspective of Using Cyber Insurance as a Tool for Protection of Agriculture 4.0. Agriculture, 14(2), 320. https://doi.org/10.3390/agriculture14020320