Sunday, March 17, 2013


INFORMATION TECHNOLOGY ON INSURANCE SERVICES

The development of information and communication technology (ICT) has an impact on the insurance industry especially in the service process.
With the growing use of ICT, there are five shifts in the service process, namely: (1) from training to performance, (2) from the ministry to where and at any time, (3) of the paper to the "on line" or channel, (4) facility physical to network facilities, (5) of the cycle time to real time. Insurance as a medium of communication is done using communication media such as telephone, computer, internet, e-mail, and so on. The interaction between the marketer and the consumer is not only done through face-to-face relationships but also done using these media. Marketers can provide service without having to deal directly with consumers. Similarly, consumers can obtain information in a broad scope from a variety of sources via cyber space or virtual space by using a computer or the internet. The most recent is the development of so-called "cyber peresentation" or virtual presentation, the marketing communication process is done by using the internet. Another term that increasingly poluper today is e-marketing is a model of care by using information and communication technology media especially the internet. e-Marketing is the use of Internet technology in the delivery of services in a broad range belandaskan three criteria: (1) e-marketing is a network with the ability to update, store, distribute, and share information on the product, (2) delivery to the end users through computer using standard Internet technology, (3) focus on the most extensive services beyond traditional service paradigm. Currently, e-marketing has evolved in various models of ICT-based services such as: CBT (Computer Based Training), CBI (Computer Based Instruction), Distance Learning, Distance Education, CLE (Cybernetic Learning Environment), Desktop Videoconferencing, ILS (Integrated Learning syatem), LCC (Learner-Cemterted Classroom), Teleconferencing, WBT (Web-Based Training), etc..


NEW OPPORTUNITIES IN THE ERA OF INSURANCE SERVICES INDUSTRY INFORMATION TECHNOLOGY
The issue of standards in the digital age is an Information Technology (IT) as a main stream in the development of today's economy. IT has provided a new opportunity in the business world. In other words, through a question what are the information technology, if it is not able to create a business opportunity, job creation and increased income. This is a pragmatic way of thinking in the world of industry. The next concept is how the formation and strategic direction as well as qualifying for the building industry particularly in the information technology industry.
In the industrial world, as we have seen with risk management is important to consider in running a business (business). Risk is a fundamental aspect of the business world. Business risks and uncertainties that could occur without causing damage can be predicted in advance. This is the reason that drives an entrepreneur and those engaged in the business to insure the assets related to its business activities. Furthermore it is with the aim of preventing harm is too great when the risks and uncertainties of adverse forms happened. With the above requirements, a variety of insurance products currently available on the market has a lot to reduce the various risks such as fire, theft, earthquakes, and floods and any other risks.
The development of current information technology era, marked by the development of computer technology and the Internet that causes most of the business done day-to-day use of both. Business activities are currently able to connect from different parts of the world directly and allows for real time transactions. Thus, the new system was evident in the business world in sight. But not only found a new economic system, but also a new form of risk that most of the issues related to security and privacy. As a result of these developments, the risk of becoming increasingly complex business only.
The Internet is an open network (open network) that enables other parties either interested or not interested in participating in it. A hyperlink to the company's computer network a virtual world through the internet opens up the possibility of damage, because the outside is now the potential to attack or manipulation of the database of a company that ultimately cause damage.
Evil in the world of internet or commonly referred to cybercrime, such as the form of credit card theft, hacking, cracking, tapping data transmission is a form of crime that can potentially cause financial loss. However, a common form of attack that occurred from the internet is a viral invasion, intrusion hackers, as well as efforts to tie up a website through a series of efforts to flood the server with a number of large-scale information. Various forms of the implications for the loss did little for the company targets / objects.
Other supporting factors that cause harm Vendor is not entirely determined by external factors, but can also be caused by internal factors. The internal factor is defined in the capacity of skills and knowledge about the world of computing to people in the (internal company). Knowledge and skills within the scope of that understands the ins and outs of computing (understood technologies in) or who did not understand computing.
Various forms of protection applied to companies that are connected to the Internet today, providing enough protection for the property, which is the system of computing and electronic data company. But the security system that is applied is not always provide total protection. As mentioned previously, the destruction of the security system (security breaches) may occur, due to factors such as unauthorized access, as well as the use of computing systems and enterprise data by outside parties or parties in (insider or outsider).
When assessed in nominal terms, the losses suffered by the company due to damage computer networks and Internet systems is very high and may reach millions of dollars.
New risks as described above is a form of insurance industry new opportunities. Theoretically any risks mentioned above appears capable of inflicting losses can be the object of insurance or otherwise can be insured. As is the object of insurance based on Article 1 point (2)
Law no. 2 year 1992 on Insurance Business, is:
"Objects and services, body and soul, human health, liability, and all other interests that may be lost, damaged, and the loss or reduced in value"
Of these limits, the risks surrounding the security systems of computer networks and the Internet can serve as the object of insurance or otherwise can be insured. This is what gives rise to what we know as cyber insurance.
Cyber ​​insurance as a form of insurance products to cover risks related to computer network security system. Networks of computers connected to the Internet network implies harm either because hackers and virus attacks. New phenomenon that is the issue of cyber insurance in the insurance world today. If we look further, cyber insurance that covers the scope of the computation is divided into two types, namely: the first type associated with the first party or cyber property that covers the risk of losses due to crime, theft, destruction software (software) and database, the data rehabilitation , extortion, and business interuption. Meanwhile, the second type is associated with a third party or cyber liability including defamation related to the website content, copyright infringement, hiperlinking liability, as well as contextual liability.
Currently, the value of the resulting cyber insurance premiums is not very large when compared to other insurance sectors (traditional). But the predicted growth rate of cyber insurance sector will have increased every year. It is connected with the growth of businesses that use information technology is increasing.

Although it has a market share that is promising, but it is not easy for insurance companies to translate the losses that will arise in e-business. In other words, not all insurance companies can be engaged in the business of cyber insurance.
Some cyber insurance is available and quite popular currently include AIG, Marsh, and St. Paul. The three insurance company has offered the use of information technology risk closure. For example, AIG with its policy called it by Protech Technology Liability Insurance, St. Paul with Cybertech + liability policy. There are also a leading reinsurance company that provides protection against the risks of the internet such as Munich Re and Swiss Re.
Insurance risk to be borne by the insurance companies is high, so it is natural that the premium to be paid the insured is relatively large. In addition, there are several requirements that must be met insured include network management computer must be equipped with the implementation of security systems such as firewalls, as well as the use of appropriate encryption techniques. The insurance company Lloyd's of London, for example, the policyholder Computer Information and Data Security and E-Comprehensive Insurance, cyber insurance premiums wearing of U.S. $ 20,000 to U.S. $ 75,000 for closing risks U.S. $ 1 million to U.S. $ 10 million.
In Indonesia itself has become something phenomenal for an insurance company to expand its business in the form of cyber-insurance. This is due to lack of encouragement needs of people who indicated low or even lack of public demand in this field. However, predicted in a relatively short span of time the demand for cyber insurance protection in Indonesia will increase and there will be growing trend. Ready our insurance world in addressing the development of cyber insurance?



No comments:

Post a Comment

Thank you for your visit and your willingness to read this article.