Слободан Јовановић

DOI Number
First page
Last page


Over the previous two decades, evеryday life of the society, fundamental rights, social interactions and economy have become largely dependant on the continuous work on the computers and communication technologies. Cyber risks pose everyday threat to the uninterrupted operation and service provision in the public and private sectors, and their occurrence may cause catastrophic consequences to property and people. This necessitates adequate IT risk management and appropriate contract framework of insurance. This paper deals with the analysis of different definitions of the information risks and a few terms connected with information risks, information risk exposure, reasons for cyber insurance, and object of cyber insurance by analyzing insurance policies from London market.


Information Risk, Internet, Insurance, Property, Liability.

Full Text:

PDF (Cрпски)


Agrawal, T., Henry, D. & Finkle, J. (2014, October 2). JP Morgan hack exposed data of 83 million, among biggest breaches in history. Reuters. Retrieved from

Allianz Global Corporate & Specialty SE. (2015). A Guide to Cyber Risk. Munich: Allianz Global Corporate & Specialty SE.

Association of British Insurers. (2015). Cyber insurance to become a business essential within the next decade. Retrieved from

Beck, D., Siemens, R. (2012). Cyber Insurance – Mitigating Loss from Cyber Attacks. Perspectives on Insurance Recovery Newsletter. New York: Pillsbury Winthrop Shaw Pittman LLP. Retrieved from

Bolton, D. (2016, May 16). Hackers and Government surveillance are making people abandon the Internet, survey finds. Independent. Retrieved from

CRO Forum. (2014). Cyber resilience: The cyber risk challenge and the role of insurance. Amsterdam: CRO Forum & KPMG Advisory N.V.

Cumming, L. (2011, July 17). Art Theft and the Case of the Stolen Turners by Sandy Nairne – review. The Guardian. Retrieved from

Cyber-attack. (2016, April 17). In Wikipedia, the free encyclopedia. Retrieved May 20, 2016, from

European Commission. (2013, Ferbuary 7). Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions – Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN(2013) 1 final. Brussels: European Commission.

European Cybersecurity Industry Leaders. (2016). Recommendations on Cybersecurity for Europe. Forum International de la Cybersécurité. Lille: European Cybersecurity Industry Leaders.

Griffin, A. (2016a, May 4). Instagram hacked by 10-year-old, who wins $10,000 prize for finding way to delete comments. Independent. Retrieved from

Griffin, A. (2016b, May 10). iPhone app tells users if phones have been hacked into or secretly jailbroken. Independent. Retrieved from

Hiscox PLC. (2015). Cyber and data Policy wording, WD-PIP-UK-CD(2) 13388 05/15.

HM Government & Marsh Ltd. (2015). UK Cyber Security: The Role of Insurance in Managing and Mitigating the Risk. London: Marsh Ltd.

Insurance Information Institute. (2014). Cyber Risks: The Growing Threat. New York: Insurance Information Institute.

Кривични законик [Criminal Code], Службени гласник РС. Бр. (85/2005), 88/2005, 107/2005, 72/2009, 111/2009, 121/2012, 104/2013 и 108/2014.

Lemos, R. (2014, September 19). Home Depot estimates data on 56 million cards stolen by cybercriminals. Ars Technica. Retrieved from

Lloyd’s Cyber Core Data Requirements. (n.d.). Retrieved from

news-and-insight/risk-insight/emerging-risks-team/cyber-core-data-requirements, May 26, 2016.

Malicious Software (Malware). (n. d.). In Techopedia. Retrieved May 26, 2016, from

Nakashima, E. (2011, August 3). Report on ‘Operation Shady RAT’ identifies widespread cyber-spying. The Washington Post. Retrieved from

QBE Insurance (Europe) Limited. (n. d.). QBE Cyber Response: Cyber and Data Security Insurance Policy, PCYB020414 QBE Cyber Response (QBE PI 14 CR).

Rawlings, P. (2015). Cyber Risk: Insuring the Digital Age. Legal Studies Research Paper No. 189/2015. London: Queen Mary University of London, School of Law.

Securities and Exchange Commission. (2011). CF Disclosure Guidance: Topic No. 2 – Cybersecurity. Retrieved from

The Institute of Risk Management. (2014). IRM Cyber Risk: Executive Summary. London: The Institute of Risk Management.

Trautman, L. (2016, March 25). Is Cyberattack the Next Pearl Harbor? North Carolina Journal of Law and Technology, Vol. 18, 2017 Forthcoming. Retrieved from, May 27, 2016.

UK Department for Culture, Media & Sport and Ed Vaizey MP. (2016). Two thirds of large UK businesses hit by cyber breach or attack in past year. London: UK Department for Culture, Media & Sport and Ed Vaizey MP. Retrieved from

Закон о електронским комуникацијама [Electronic Communications Act], Службени гласник РС. бр. (45/2010).



  • There are currently no refbacks.

© University of Niš, Serbia
Creative Commons licence CC BY-NC-ND
Print ISSN: 0353-7919
Online ISSN: 1820-7804