Daniel Woods

ORCID: 0000-0002-8569-1917
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Cybercrime and Law Enforcement Studies
  • Network Security and Intrusion Detection
  • Experimental Behavioral Economics Studies
  • Privacy, Security, and Data Protection
  • Terrorism, Counterterrorism, and Political Violence
  • Cybersecurity and Cyber Warfare Studies
  • Decision-Making and Behavioral Economics
  • Advanced Malware Detection Techniques
  • Infrastructure Resilience and Vulnerability Analysis
  • Culture, Economy, and Development Studies
  • Spam and Phishing Detection
  • Auction Theory and Applications
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Insurance and Financial Risk Management
  • Economic theories and models
  • Game Theory and Applications
  • Internet Traffic Analysis and Secure E-voting
  • FinTech, Crowdfunding, Digital Finance
  • Probability and Risk Models
  • Crime Patterns and Interventions
  • Psychology of Moral and Emotional Judgment
  • Legal and Constitutional Studies
  • Hate Speech and Cyberbullying Detection

University of Edinburgh
2022-2025

British University in Dubai
2023-2025

Universität Innsbruck
2020-2023

Rafiki Coalition
2023

Purdue University West Lafayette
2015-2021

University of Oxford
2017-2019

State Street (United States)
2017

Abstract Cyber risk management involves balancing acceptance, avoidance, reduction, and transfer. Academic researchers have focused on reduction measures. Studies of cyber transfer are less common, mainly centering insurance. This emphasis overlooks the development many real-world products in last decade. Our study describes emergence including: (re)insurance, parametric insurance, warranties, cat bonds. We characterize how these solutions addressed four core challenges transferring risk:...

10.1093/cybsec/tyae028 article EN cc-by Journal of Cybersecurity 2025-01-01

Privacy laws like the General Data Protection Regulation (GDPR) and California Consumer Act (CCPA) have pushed internet firms processing personal data to obtain user consent. Uncertainty around sanctions for non-compliance led many websites embed a Consent Management Provider (CMP), which collects users' consent shares it with third-party vendors other websites. Our paper maps formation of this ecosystem using longitudinal measurements. Primary secondary sources are used measure each actor...

10.1145/3419394.3423647 article EN 2020-10-23
Christoph Huber Anna Dreber Jürgen Huber Magnus Johannesson Michael Kirchler and 90 more Utz Weitzel Miguel Abellán Xeniya Adayeva Fehime Ceren Ay Kai Barron Zachariah Berry Werner Bönte Katharina Brütt Muhammed Bulutay Pol Campos‐Mercade Eric Cardella Maria Almudena Claassen Gert Cornelissen Ian Dawson Joyce Delnoij Elif E. Demiral Eugen Dimant Johannes T. Doerflinger Malte Dold Cécile Emery Lenka Fiala Susann Fiedler Eleonora Freddi Tilman Fries Agata Gąsiorowska Ulrich Glogowsky Paul M. Gorny Jeremy D. Gretton Antonia Grohmann Sebastian Hafenbrädl Michel J. J. Handgraaf Yaniv Hanoch Einav Hart Max Hennig Stanton Hudja Mandy Hütter Kyle Hyndman Konstantinos Ioannidis Ozan İşler Sabrina Jeworrek Daniel Jolles Marie Juanchich Raghabendra P. KC Menusch Khadjavi Tamar Kugler Shuwen Li Brian J. Lucas Vincent Mak Mario Mechtel Christoph Merkle Ethan A. Meyers Johanna Möllerström Alexander Nesterov Levent Neyse Petra Nieken Anne‐Marie Nussberger Helena Palumbo Kim Peters Angelo Pirrone Xiangdong Qin Rima-Maria Rahal Holger A. Rau Johannes Rincke Piero Ronzani Yefim Roth Ali Seyhun Saral Jan Schmitz Florian Schneider Arthur Schram Simeon Schudy Maurice E. Schweitzer Christiane Schwieren Irene Scopelliti Miroslav Sirota Joep Sonnemans Ivan Soraperra Lisa Spantig Ivo Steimanis Janina Steinmetz Sigrid Suetens Andriana Theodoropoulou Diemo Urbig Tobias Vorlaufer Joschka Waibel Daniel Woods Ofir Yakobi Onurcan Yılmaz Tomasz Zaleśkiewicz Stefan Zeisberger Felix Holzmeister

Does competition affect moral behavior? This fundamental question has been debated among leading scholars for centuries, and more recently, it tested in experimental studies yielding a body of rather inconclusive empirical evidence. A potential source ambivalent results on the same hypothesis is design heterogeneity-variation true effect sizes across various reasonable research protocols. To provide further evidence whether affects behavior to examine generalizability single study...

10.1073/pnas.2215572120 article EN cc-by Proceedings of the National Academy of Sciences 2023-05-30

The role of the insurance industry in driving improvements cyber security has been identified as mutually beneficial for both insurers and policy-makers. To date, there no consideration roles governments should pursue support this public–private partnership. This paper rectifies omission presents a framework to help underpin such partnership, giving particular possible government interventions that might affect market. We have undertaken qualitative analysis reports published by...

10.1080/23738871.2017.1360927 article EN cc-by Journal of Cyber Policy 2017-05-04

This paper introduces a causal model inspired by structural equation modeling that explains cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we use the to classify empirical harm studies. We discover harms are not exceptional typical or extreme losses. The increasing frequency data breaches is contested and stock market reactions incidents becoming less damaging over time. Focusing on alone breeds fatalism; most useful evaluating effectiveness...

10.1109/sp40001.2021.00053 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2021-05-01

Policy discussions often assume that wider adoption of cyber insurance will promote information security best practice. However, this depends on the process applicants need to go through apply for insurance. A typical would require an applicant fill out a proposal form, which is self-assessed questionnaire. In paper, we examine 24 forms, offered by insurers based in UK and US, determine controls are present forms. Our aim establish whether collection mentioned analysed forms corresponds...

10.1186/s13174-017-0059-y article EN cc-by-nc Journal of Internet Services and Applications 2017-07-14

Abstract The adoption of digital technology creates the potential for new harms. Given that risk prevention solutions are imperfect, individuals may wish to transfer an insurer. It is unclear whether existing insurance policies cover these harms, or specialized consumer cyber products available. We address this research gap by conducting a content analysis 50 policies, 32 in USA and 18 UK. Our 26 home reveals insurers typically exclude perils (losses caused computer viruses, hacking,...

10.1093/cybsec/tyae031 article EN cc-by Journal of Cybersecurity 2025-01-01

In the context of blockchain systems, importance decentralization is undermined by lack a widely accepted methodology to measure it. To address this gap, we set out systematization effort targeting measurement workflow. facilitate our systematization, put forth framework that categorizes all techniques used in previous work based on resource they target, methods use extract allocation, and functions apply produce final measurements. We complement with an empirical analysis designed evaluate...

10.48550/arxiv.2501.18279 preprint EN arXiv (Cornell University) 2025-01-30

Cyber insurance could achieve public policy goals for cybersecurity using private-sector means. Insurers assess organizational security postures, prescribe procedures and controls, provide postincident services. We evaluate how such mechanisms impact security, identify market dynamics restricting their effectiveness, sketch out possible futures cyber as governance.

10.1109/msec.2019.2935702 article EN IEEE Security & Privacy 2019-09-11

We consider interdependent systems managed by multiple defenders that are under the threat of stepping-stone attacks. model such via game-theoretic models and incorporate effect behavioral probability weighting is used to biases in human decision-making, as descended from field economics. then into our framework called TASHAROK, two types tax-based mechanisms for security games where central regulator incentivizes invest well securing their assets so achieve socially optimal outcome. first...

10.1109/sp46214.2022.9833591 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

10.1057/s41288-020-00168-5 article EN The Geneva Papers on Risk and Insurance Issues and Practice 2020-05-06

In the commodification of consent, a legal concept designed to empower users has been transformed into an asset that can be traded across firms. Users interact with consent dialog offered by one coalition member. The default setting allows any other member, including both publishers and third-party vendors, use this as basis for processing personal data. doing so, creates interdependent privacy considerations within notice paradigm. This paper considers how innovation could change...

10.1016/j.cose.2022.102605 article EN cc-by Computers & Security 2022-01-12

In theory, consent dialogs allow users to express privacy preferences regarding how a website and its partners process the user's personal data. reality, often employ subtle design techniques known as dark patterns that nudge towards accepting more data processing than user would otherwise accept. Dark undermine autonomy can violate laws. We build system, DarkDialogs, automatically extracts arbitrary from detects presence of 10 patterns. Evaluating DarkDialogs against hand-labelled dataset...

10.1109/eurosp57164.2023.00055 article EN 2023-07-01

We model the behavioral biases of human decision-making in securing interdependent systems and show that such leads to a suboptimal pattern resource allocation compared non-behavioral (rational) decision-making. provide empirical evidence for existence bias through controlled subject study with 145 participants. then propose three learning techniques enhancing multi-round setups. illustrate benefits our multiple real-world quantify level gain case which defenders are behavioral. also benefit...

10.1145/3433210.3437534 article EN 2021-05-24

Insurance premiums reflect expectations about the future losses of each insured. Given dearth cyber security loss data, market could shed light on true magnitude despite noise from factors unrelated to losses. To that end, we extract insurance pricing information regulatory filings 26 insurers. We provide empirical observations how vary by coverage type, amount, and policyholder type over time. A method using particle swarm optimisation expected value premium principle is introduced iterate...

10.1145/3434403 article EN Digital Threats Research and Practice 2021-04-15

Across both the public and private sector, cyberse-curity decisions could be informed by estimates of likelihood different types exploitation corresponding harms. Law enforcement should focus on investigating disrupting those cybercrimes that are relatively more frequent, all else being equal. Similarly, firms account for forms cyber incident when tailoring risk management policies. This paper reviews quantitative evidence available cybercrime victimi-sation likelihood, providing a bridge...

10.1109/eurospw55150.2022.00021 article EN 2022-06-01

Cyber insurance is becoming a popular cyber risk management tool. Beyond pure financial transfer, prior theoretical works anticipated that would influence the mitigation measures employed by policyholders, such as excluding losses caused security mismanagement or offering premium discounts for controls. Empirical literature has shown ineffective at influencing pre-breach levels; however, it also identified how insurers indemnify cost of team post-breach providers with expertise spanning...

10.1016/j.cose.2024.103742 article EN cc-by Computers & Security 2024-02-01

In recent years, cyberattacks have cost firms countless billions of dollars, undermined consumer privacy, distorted world geopolitics, and even resulted in death bodily harm. Rapidly accelerating not, however, been bad news for many lawyers. To the contrary, lawyers that specialize coordinating all elements victims’ incident response efforts are increasingly demand. Lawyers’ dominant role cyber-incident is driven predominantly by their purported capacity to ensure information produced during...

10.2139/ssrn.4175523 article EN SSRN Electronic Journal 2022-01-01

Technologists who understand and measure cyber risk can motivate policyholders to improve security.

10.1145/3545795 article EN Communications of the ACM 2023-02-22
Coming Soon ...