{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:07:26Z","timestamp":1770890846728,"version":"3.50.1"},"reference-count":104,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s10207-025-01010-6","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T06:14:26Z","timestamp":1741673666000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Applications of cyber insurance in smart cities: a systematic literature review"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3186-275X","authenticated-orcid":false,"given":"Carolina Cardoso","family":"Novo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4506-7009","authenticated-orcid":false,"given":"Mirian Picinini","family":"M\u00e9xas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4557-0210","authenticated-orcid":false,"given":"Lidia Angulo","family":"Meza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,11]]},"reference":[{"issue":"1","key":"1010_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-5397-4","volume":"58","author":"C Yin","year":"2015","unstructured":"Yin, C., Xiong, Z., Chen, H., Wang, J., Cooper, D., David, B.: A literature survey on smart cities. Sci. China Inf. Sci. 58(1), 1\u201318 (2015). https:\/\/doi.org\/10.1007\/s11432-015-5397-4","journal-title":"Sci. China Inf. Sci."},{"key":"1010_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.103151","volume":"74","author":"G Keshavarzi","year":"2021","unstructured":"Keshavarzi, G., Yildirim, Y., Arefi, M.: Does scale matter? An overview of the \u201csmart cities\" literature. Sustain. Cities Soc. 74, 103151 (2021). https:\/\/doi.org\/10.1016\/j.scs.2021.103151","journal-title":"Sustain. Cities Soc."},{"key":"1010_CR3","doi-asserted-by":"publisher","first-page":"90738","DOI":"10.1109\/ACCESS.2021.3089601","volume":"9","author":"A Al Omar","year":"2021","unstructured":"Al Omar, A., Jamil, A., Khandakar, A., Uzzal, A.R., Bosri, R., Mansoor, N., Rahman, M.S.: A transparent and privacy-preserving healthcare platform with novel smart contract for smart cities. IEEE Access. 9, 90738\u201390749 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3089601","journal-title":"IEEE Access."},{"key":"1010_CR4","doi-asserted-by":"publisher","first-page":"86448","DOI":"10.1109\/ACCESS.2020.2992441","volume":"8","author":"A Kirimtat","year":"2020","unstructured":"Kirimtat, A., Krejcar, O., Kertesz, A., Tasgetiren, M.F.: Future trends and current state of smart city concepts: a survey. IEEE Access. 8, 86448\u201386467 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2992441","journal-title":"IEEE Access."},{"key":"1010_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102301","volume":"61","author":"MA Ahad","year":"2020","unstructured":"Ahad, M.A., Paiva, S., Tripathi, G., Feroz, N.: Enabling technologies and sustainable smart cities. Sustain. Cities Soc. 61, 102301 (2020). https:\/\/doi.org\/10.1016\/j.scs.2020.102301","journal-title":"Sustain. Cities Soc."},{"issue":"2","key":"1010_CR6","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s10796-020-10044-1","volume":"24","author":"E Ismagilova","year":"2022","unstructured":"Ismagilova, E., Hughes, L., Rana, N.P., Dwivedi, Y.K.: Security, privacy and risks within smart cities: literature review and development of a smart city interaction framework. Inf. Syst. Front. 24(2), 393\u2013414 (2022). https:\/\/doi.org\/10.1007\/s10796-020-10044-1","journal-title":"Inf. Syst. Front."},{"key":"1010_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2023.104771","author":"L Xia","year":"2023","unstructured":"Xia, L., Semirumi, D.T., Rezaei, R.: A thorough examination of smart city applications: exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy. Sustain. Cities Soc. (2023). https:\/\/doi.org\/10.1016\/j.scs.2023.104771","journal-title":"Sustain. Cities Soc."},{"issue":"3","key":"1010_CR8","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1057\/s41288-022-00266-6","volume":"47","author":"F Cremer","year":"2022","unstructured":"Cremer, F., Sheehan, B., Fortmann, M., Kia, A.N., Mullins, M., Murphy, F., Materne, S.: Cyber risk and cybersecurity: a systematic review of data availability. Geneva Pap. Risk Insur. Issues Pract. 47(3), 698\u2013736 (2022). https:\/\/doi.org\/10.1057\/s41288-022-00266-6","journal-title":"Geneva Pap. Risk Insur. Issues Pract."},{"key":"1010_CR9","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12950","author":"D Wilusz","year":"2022","unstructured":"Wilusz, D., W\u00f3jtowicz, A.: Secure protocols for smart contract based insurance services. Expert Syst. (2022). https:\/\/doi.org\/10.1111\/exsy.12950","journal-title":"Expert Syst."},{"issue":"2","key":"1010_CR10","doi-asserted-by":"publisher","first-page":"1516","DOI":"10.1109\/TSG.2021.3131468","volume":"13","author":"Z Liu","year":"2022","unstructured":"Liu, Z., Wei, W., Wang, L.: An extreme value theory-based catastrophe bond design for cyber risk management of power systems. IEEE Trans. Smart Grid. 13(2), 1516\u20131528 (2022). https:\/\/doi.org\/10.1109\/TSG.2021.3131468","journal-title":"IEEE Trans. Smart Grid."},{"issue":"9","key":"1010_CR11","doi-asserted-by":"publisher","first-page":"7360","DOI":"10.1109\/JIOT.2020.3039254","volume":"8","author":"R Pal","year":"2021","unstructured":"Pal, R., Huang, Z., Yin, X., Lototsky, S., De, S., Tarkoma, S., Liu, M., Crowcroft, J., Sastry, N.: Aggregate cyber-risk management in the IoT age cautionary statistics for (Re)Insurers and likes. IEEE Internet Things J. 8(9), 7360\u20137371 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3039254","journal-title":"IEEE Internet Things J."},{"key":"1010_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2021.103423","author":"GA Weaver","year":"2022","unstructured":"Weaver, G.A., Feddersen, B., Marla, L., Wei, D., Rose, A., Van Moer, M.: Estimating economic losses from cyber-attacks on shipping ports: An optimization-based approach. Transp. Res. Part C Emerging Technol. (2022). https:\/\/doi.org\/10.1016\/j.trc.2021.103423","journal-title":"Transp. Res. Part C Emerging Technol."},{"key":"1010_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2021.113580","author":"S Armenia","year":"2021","unstructured":"Armenia, S., Angelini, M., Nonino, F., Palombi, G., Schlitzer, M.F.: A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs. Decis. Support Syst. (2021). https:\/\/doi.org\/10.1016\/j.dss.2021.113580","journal-title":"Decis. Support Syst."},{"key":"1010_CR14","first-page":"1","volume":"2","author":"JJ Mu\u00f1oz","year":"2019","unstructured":"Mu\u00f1oz, J.J.: Cyber risks: liability and insurance. InDret. 2, 1\u201335 (2019)","journal-title":"InDret."},{"key":"1010_CR15","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ijcip.2016.04.001","volume":"14","author":"D Young","year":"2016","unstructured":"Young, D., Lopez, J., Rice, M., Ramsey, B., McTasney, R.: A framework for incorporating insurance in critical infrastructure cyber risk strategies. Int. J. Crit. Infrastruct. Prot. 14, 43\u201357 (2016). https:\/\/doi.org\/10.1016\/j.ijcip.2016.04.001","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"3","key":"1010_CR16","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1080\/10920277.2019.1641416","volume":"24","author":"M Eling","year":"2020","unstructured":"Eling, M., Schnell, W.: Capital requirements for cyber risk and cyber risk insurance: an analysis of solvency II, the U.S. risk-based capital standards, and the swiss solvency test. North Am. Actuar. J 24(3), 370\u2013392 (2020). https:\/\/doi.org\/10.1080\/10920277.2019.1641416","journal-title":"North Am. Actuar. J"},{"issue":"2","key":"1010_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.22495\/jgrv9i2art2","volume":"9","author":"KM Hogan","year":"2020","unstructured":"Hogan, K.M.: A global comparison of corporate value adjustments to news of cyber-attacks. J. Govern. Reg. 9(2), 34\u201344 (2020). https:\/\/doi.org\/10.22495\/jgrv9i2art2","journal-title":"J. Govern. Reg."},{"key":"1010_CR18","doi-asserted-by":"publisher","DOI":"10.1145\/3418288","author":"JP Kesan","year":"2020","unstructured":"Kesan, J.P., Zhang, L.: Analysis of cyber incident categories based on losses. ACM Trans. Manage. Inf. Syst. (2020). https:\/\/doi.org\/10.1145\/3418288","journal-title":"ACM Trans. Manage. Inf. Syst."},{"key":"1010_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/jrfm15100463","author":"L Mastroeni","year":"2022","unstructured":"Mastroeni, L., Mazzoccoli, A., Naldi, M.: Pricing cat bonds for cloud service failures. J. Risk. Financ. Manag. (2022). https:\/\/doi.org\/10.3390\/jrfm15100463","journal-title":"J. Risk. Financ. Manag."},{"key":"1010_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2021.105627","author":"D Markopoulou","year":"2021","unstructured":"Markopoulou, D.: Cyber-insurance in EU policy-making: regulatory options, the market\u2019s challenges and the US example. Comput. Law Secur. Rev. (2021). https:\/\/doi.org\/10.1016\/j.clsr.2021.105627","journal-title":"Comput. Law Secur. Rev."},{"key":"1010_CR21","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cosrev.2017.01.001","volume":"24","author":"A Marotta","year":"2017","unstructured":"Marotta, A., Martinelli, F., Nanni, S., Orlando, A., Yautsiukhin, A.: Cyber-insurance survey. Comput. Sci. Rev. 24, 35\u201361 (2017). https:\/\/doi.org\/10.1016\/j.cosrev.2017.01.001","journal-title":"Comput. Sci. Rev."},{"issue":"4","key":"1010_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07366981.2023.2165293","volume":"67","author":"A Chaudhuri","year":"2023","unstructured":"Chaudhuri, A., Bozkus Kahyaoglu, S.: Cybersecurity assurance in smart cities: a risk management perspective. EDPACS. 67(4), 1\u201322 (2023). https:\/\/doi.org\/10.1080\/07366981.2023.2165293","journal-title":"EDPACS."},{"key":"1010_CR23","doi-asserted-by":"publisher","unstructured":"Wrede, D., Stegen, T., Graf von der Schulenburg, J.M.: Affirmative and silent cyber coverage in traditional insurance policies: Qualitative content analysis of selected insurance products from the German insurance market. Geneva Pap. Risk Insur. Issues Pract. 45, 657-689 (2020). https:\/\/doi.org\/10.1057\/s41288-020-00183-6","DOI":"10.1057\/s41288-020-00183-6"},{"issue":"5","key":"1010_CR24","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1108\/JRF-09-2016-0122","volume":"17","author":"M Eling","year":"2016","unstructured":"Eling, M., Schnell, W.: What do we know about cyber risk and cyber risk insurance? J. Risk Financ. 17(5), 474\u2013491 (2016). https:\/\/doi.org\/10.1108\/JRF-09-2016-0122","journal-title":"J. Risk Financ."},{"key":"1010_CR25","doi-asserted-by":"publisher","DOI":"10.3390\/computation10120208","author":"MF Carfora","year":"2022","unstructured":"Carfora, M.F., Orlando, A.: Some remarks on malicious and negligent data breach distribution estimates. Computation (2022). https:\/\/doi.org\/10.3390\/computation10120208","journal-title":"Computation"},{"key":"1010_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/risks10120224","author":"M Sun","year":"2022","unstructured":"Sun, M., Lu, Y.: A generalized linear mixed model for data breaches and its application in cyber insurance. Risks (2022). https:\/\/doi.org\/10.3390\/risks10120224","journal-title":"Risks"},{"key":"1010_CR27","doi-asserted-by":"publisher","unstructured":"Erola, A., Agrafiotis, I., Nurse, JRC., Axon, L., Goldsmith, M., Creese, S.: A system to calculate Cyber Value-at-Risk. Comput. Secur. (2022). 113, https:\/\/doi.org\/10.1016\/j.cose.2021.102545","DOI":"10.1016\/j.cose.2021.102545"},{"key":"1010_CR28","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.cose.2017.04.010","volume":"68","author":"U Franke","year":"2017","unstructured":"Franke, U.: The cyber insurance market in Sweden. Comput Secur. 68, 130\u2013144 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.04.010","journal-title":"Comput Secur."},{"issue":"1","key":"1010_CR29","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dss.2013.04.004","volume":"56","author":"A Mukhopadhyay","year":"2013","unstructured":"Mukhopadhyay, A., Chatterjee, S., Saha, D., Mahanti, A., Sadhukhan, S.K.: Cyber-risk decision models: to insure IT or not? Decis Support Syst. 56(1), 11\u201326 (2013). https:\/\/doi.org\/10.1016\/j.dss.2013.04.004","journal-title":"Decis Support Syst."},{"issue":"2","key":"1010_CR30","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1057\/s41288-023-00285-x","volume":"48","author":"GW Peters","year":"2023","unstructured":"Peters, G.W., Malavasi, M., Sofronov, G., Shevchenko, P.V., Tr\u00fcck, S., Jang, J.: Cyber loss model risk translates to premium mispricing and risk sensitivity. Geneva Pap. Risk Insur. Issues Pract. 48(2), 372\u2013433 (2023). https:\/\/doi.org\/10.1057\/s41288-023-00285-x","journal-title":"Geneva Pap. Risk Insur. Issues Pract."},{"issue":"4","key":"1010_CR31","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.bushor.2012.02.004","volume":"55","author":"SJ Shackelford","year":"2012","unstructured":"Shackelford, S.J.: Should your firm invest in cyber risk insurance? Bus. Horiz. 55(4), 349\u2013356 (2012). https:\/\/doi.org\/10.1016\/j.bushor.2012.02.004","journal-title":"Bus. Horiz."},{"issue":"1","key":"1010_CR32","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s13385-021-00290-1","volume":"12","author":"G Zeller","year":"2022","unstructured":"Zeller, G., Scherer, M.: A comprehensive model for cyber risk based on marked point processes and its application to insurance. Eur. Actuar. J. 12(1), 33\u201385 (2022). https:\/\/doi.org\/10.1007\/s13385-021-00290-1","journal-title":"Eur. Actuar. J."},{"issue":"1","key":"1010_CR33","doi-asserted-by":"publisher","first-page":"123","DOI":"10.2753\/MIS0742-1222300104","volume":"30","author":"X Zhao","year":"2013","unstructured":"Zhao, X., Xue, L., Whinston, A.B.: Managing interdependent information security risks: cyberinsurance, managed security services, and risk pooling arrangements. J. Manag. Inf. Syst. 30(1), 123\u2013152 (2013). https:\/\/doi.org\/10.2753\/MIS0742-1222300104","journal-title":"J. Manag. Inf. Syst."},{"issue":"6","key":"1010_CR34","doi-asserted-by":"publisher","first-page":"5512","DOI":"10.1109\/TPWRS.2021.3078730","volume":"36","author":"P Lau","year":"2021","unstructured":"Lau, P., Wang, L.F., Liu, Z.X., Wei, W., Ten, C.W.: A coalitional cyber-insurance design considering power system reliability and cyber vulnerability. IEEE Trans. Power Syst. 36(6), 5512\u20135524 (2021). https:\/\/doi.org\/10.1109\/TPWRS.2021.3078730","journal-title":"IEEE Trans. Power Syst."},{"key":"1010_CR35","doi-asserted-by":"publisher","first-page":"1855","DOI":"10.1109\/TIFS.2020.3045902","volume":"16","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Wang, L., Liu, Z., Wei, W.: A cyber-insurance scheme for water distribution systems considering malicious cyberattacks. IEEE Trans. Inf. Forensics Secur. 16, 1855\u20131867 (2021). https:\/\/doi.org\/10.1109\/TIFS.2020.3045902","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"1010_CR36","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.jaccpubpol.2018.10.004","volume":"37","author":"LD Bodin","year":"2018","unstructured":"Bodin, L.D., Gordon, L.A., Loeb, M.P., Wang, A.: Cybersecurity insurance and risk-sharing. J. Account. Public Policy. 37(6), 527\u2013544 (2018). https:\/\/doi.org\/10.1016\/j.jaccpubpol.2018.10.004","journal-title":"J. Account. Public Policy."},{"key":"1010_CR37","doi-asserted-by":"publisher","DOI":"10.1017\/S1748499523000258","author":"R He","year":"2024","unstructured":"He, R., Jin, Z., Li, J.S.-H.: Modeling and management of cyber risk: a cross-disciplinary review. Ann. Actuar. Sci. (2024). https:\/\/doi.org\/10.1017\/S1748499523000258","journal-title":"Ann. Actuar. Sci."},{"key":"1010_CR38","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7689828","author":"O Kolesnikov","year":"2022","unstructured":"Kolesnikov, O., Markov, A., Smagulov, D., Solovjovs, S.: Cyber loss distribution fitting: a general framework towards cyber bonds and their pricing models. Int. J. Math. Math. Sci. (2022). https:\/\/doi.org\/10.1155\/2022\/7689828","journal-title":"Int. J. Math. Math. Sci."},{"key":"1010_CR39","doi-asserted-by":"publisher","DOI":"10.1017\/S1357321720000021","author":"S Cartagena","year":"2020","unstructured":"Cartagena, S., Gosrani, V., Grewal, J., Pikinska, J.: Silent cyber assessment framework. Br. Actuar. J. (2020). https:\/\/doi.org\/10.1017\/S1357321720000021","journal-title":"Br. Actuar. J."},{"issue":"2","key":"1010_CR40","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1109\/TPWRS.2020.3018701","volume":"36","author":"Z Liu","year":"2021","unstructured":"Liu, Z., Wei, W., Wang, L., Ten, C.-W., Rho, Y.: An actuarial framework for power system reliability considering cybersecurity threats. IEEE Trans Power Syst. 36(2), 851\u2013864 (2021). https:\/\/doi.org\/10.1109\/TPWRS.2020.3018701","journal-title":"IEEE Trans Power Syst."},{"key":"1010_CR41","doi-asserted-by":"publisher","unstructured":"McGregor, R., Reaiche, C., Boyle, S., Corral de Zubielqui, G.: Cyberspace and Personal Cyber Insurance: A Systematic Review. J. Comput. Inf. Syst. 64(1), 157\u2013171 (2024). https:\/\/doi.org\/10.1080\/08874417.2023.2185551","DOI":"10.1080\/08874417.2023.2185551"},{"key":"1010_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102893","author":"N Hamid","year":"2022","unstructured":"Hamid, N., Nor, N., Hussain, F., Raju, R., Naseer, H., Ahmad, A.: Barriers and enablers to adoption of cyber insurance in developing countries: an exploratory study of Malaysian organizations. Comput. Secur. (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102893","journal-title":"Comput. Secur."},{"issue":"2","key":"1010_CR43","doi-asserted-by":"publisher","first-page":"32","DOI":"10.4018\/IJISP.2019040103","volume":"13","author":"AA Al Shidhani","year":"2019","unstructured":"Al Shidhani, A.A.: Cyber defense maturity levels and threat models for smart cities. Int. J. Inf. Secur. Priv. 13(2), 32\u201346 (2019). https:\/\/doi.org\/10.4018\/IJISP.2019040103","journal-title":"Int. J. Inf. Secur. Priv."},{"key":"1010_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.arcontrol.2020.10.009","volume":"51","author":"B Kalluri","year":"2021","unstructured":"Kalluri, B., Chronopoulos, C., Kozine, I.: The concept of smartness in cyber-physical systems and connection to urban environment. Ann. Rev. Control. 51, 1\u201322 (2021). https:\/\/doi.org\/10.1016\/j.arcontrol.2020.10.009","journal-title":"Ann. Rev. Control."},{"issue":"4","key":"1010_CR45","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.3390\/smartcities6040080","volume":"6","author":"JS Gracias","year":"2023","unstructured":"Gracias, J.S., Parnell, G.S., Specking, E., Pohl, E.A., Buchanan, R.: Smart cities - A structured literature review. Smart Cities. 6(4), 1719\u20131743 (2023). https:\/\/doi.org\/10.3390\/smartcities6040080","journal-title":"Smart Cities."},{"issue":"4","key":"1010_CR46","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1007\/s11227-019-03028-9","volume":"76","author":"S Walker-Roberts","year":"2020","unstructured":"Walker-Roberts, S., Hammoudeh, M., Aldabbas, O., Aydin, M., Dehghantanha, A.: Threats on the horizon: understanding security threats in the era of cyber-physical systems. J. Supercomput. 76(4), 2643\u20132664 (2020). https:\/\/doi.org\/10.1007\/s11227-019-03028-9","journal-title":"J. Supercomput."},{"key":"1010_CR47","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.cose.2019.02.009","volume":"83","author":"M Vitunskaite","year":"2019","unstructured":"Vitunskaite, M., He, Y., Brandstetter, T., Janicke, H.: Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 83, 313\u2013331 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.02.009","journal-title":"Comput. Secur."},{"key":"1010_CR48","doi-asserted-by":"publisher","DOI":"10.3390\/machines9040078","author":"M Kalinin","year":"2021","unstructured":"Kalinin, M., Krundyshev, V., Zegzhda, P.: Cybersecurity risk assessment in smart city infrastructures. Machines (2021). https:\/\/doi.org\/10.3390\/machines9040078","journal-title":"Machines"},{"issue":"2","key":"1010_CR49","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1108\/ECAM-03-2018-0101","volume":"26","author":"EA Parn","year":"2019","unstructured":"Parn, E.A., Edwards, D.: Cyber threats confronting the digital built environment Common data environment vulnerabilities and block chain deterrence. Eng. Constr. Archit. Manag. 26(2), 245\u2013266 (2019). https:\/\/doi.org\/10.1108\/ECAM-03-2018-0101","journal-title":"Eng. Constr. Archit. Manag."},{"key":"1010_CR50","doi-asserted-by":"publisher","DOI":"10.3390\/su141610368","author":"M Wright","year":"2022","unstructured":"Wright, M., Chizari, H., Viana, T.: A systematic review of smart city infrastructure threat modelling methodologies: a bayesian focused review. Sustainability (2022). https:\/\/doi.org\/10.3390\/su141610368","journal-title":"Sustainability"},{"key":"1010_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.103542","author":"R Al Sharif","year":"2022","unstructured":"Al Sharif, R., Pokharel, S.: Smart city dimensions and associated risks: review of literature. Sustain. Cities Soc. (2022). https:\/\/doi.org\/10.1016\/j.scs.2021.103542","journal-title":"Sustain. Cities Soc."},{"key":"1010_CR52","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00363-0","author":"N Neshenko","year":"2020","unstructured":"Neshenko, N., Nader, C., Bou-Harb, E., Furht, B.: A survey of methods supporting cyber situational awareness in the context of smart cities. J. Big Data. (2020). https:\/\/doi.org\/10.1186\/s40537-020-00363-0","journal-title":"J. Big Data."},{"key":"1010_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.120743","volume":"167","author":"F Ullah","year":"2021","unstructured":"Ullah, F., Qayyum, S., Thaheem, M.J., Al-Turjman, F., Sepasgozar, S.M.E.: Risk management in sustainable smart cities governance: A TOE framework. Technol. Forecasting Social Change. 167, 120743 (2021). https:\/\/doi.org\/10.1016\/j.techfore.2021.120743","journal-title":"Technol. Forecasting Social Change."},{"key":"1010_CR54","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1016\/j.future.2020.06.028","volume":"112","author":"S Sengan","year":"2020","unstructured":"Sengan, S., Subramaniyaswamy, V., Nair, S.K., Indragandhi, V., Manikandan, J., Ravi, L.: Enhancing cyber-physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Gener. Comput. Syst. 112, 724\u2013737 (2020). https:\/\/doi.org\/10.1016\/j.future.2020.06.028","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"1010_CR55","doi-asserted-by":"publisher","first-page":"4150","DOI":"10.1109\/TII.2020.3022182","volume":"17","author":"M Tang","year":"2021","unstructured":"Tang, M., Yin, J., Alazab, M., Cao, J., Luo, Y.: Modeling of extreme vulnerability disclosure in smart city industrial environments. IEEE Trans. Ind. Inform. 17(6), 4150\u20134158 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3022182","journal-title":"IEEE Trans. Ind. Inform."},{"key":"1010_CR56","doi-asserted-by":"publisher","DOI":"10.3390\/info13120580","author":"DI Sensuse","year":"2022","unstructured":"Sensuse, D.I., Putro, P.A.W., Rachmawati, R., Sunindyo, W.D.: Initial cybersecurity framework in the new capital city of Indonesia: factors, objectives, and technology. Inf. (Switz.) (2022). https:\/\/doi.org\/10.3390\/info13120580","journal-title":"Inf. (Switz.)"},{"key":"1010_CR57","doi-asserted-by":"publisher","unstructured":"Abdalla, W., Renukappa, S., Suresh, S., Al-Janabi, R., IEEE Computer Soc.: challenges for managing smart cities initiatives: an empirical study. In: 2019 3rd International Conference on Smart Grid and Smart Cities (ICSGSC 2019). (2019). 10\u201317 https:\/\/doi.org\/10.1109\/ICSGSC.2019.00-26","DOI":"10.1109\/ICSGSC.2019.00-26"},{"key":"1010_CR58","doi-asserted-by":"publisher","unstructured":"Tubaishat, A., Jouhi, M.A.: Building a security framework for smart cities: A case study from UAE. In: 2020 5th International conference on computer and communication systems (ICCCS 2020). 477\u2013481 (2020). https:\/\/doi.org\/10.1109\/ICCCS49078.2020.9118517","DOI":"10.1109\/ICCCS49078.2020.9118517"},{"issue":"1","key":"1010_CR59","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s10207-023-00741-8","volume":"23","author":"A Farao","year":"2024","unstructured":"Farao, A., Paparis, G., Panda, S., Panaousis, E., Zarras, A., Xenakis, C.: INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. Int. J. Inf. Secur. 23(1), 347\u2013371 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00741-8","journal-title":"Int. J. Inf. Secur."},{"key":"1010_CR60","doi-asserted-by":"publisher","DOI":"10.3390\/su13179528","author":"D Branley-Bell","year":"2021","unstructured":"Branley-Bell, D., G\u00f3mez, Y., Coventry, L., Vila, J., Briggs, P.: Developing and validating a behavioural model of cyberinsurance adoption. Sustainability (2021). https:\/\/doi.org\/10.3390\/su13179528","journal-title":"Sustainability"},{"key":"1010_CR61","doi-asserted-by":"publisher","DOI":"10.1142\/S0219525921500144","author":"P Jevti\u0107","year":"2021","unstructured":"Jevti\u0107, P., Lanchier, N.: Probabilistic framework for loss distribution of smart contract risk. Adv. Complex Syst. (2021). https:\/\/doi.org\/10.1142\/S0219525921500144","journal-title":"Adv. Complex Syst."},{"issue":"3","key":"1010_CR62","doi-asserted-by":"publisher","first-page":"237","DOI":"10.26555\/ijain.v7i3.698","volume":"7","author":"SW Indratno","year":"2021","unstructured":"Indratno, S.W., Antonio, Y., Saputro, S.W.: Adjusting cyber insurance premiums based on frequency in a communication network. Int. J. Adv. Intell. Inform. 7(3), 237\u2013248 (2021). https:\/\/doi.org\/10.26555\/ijain.v7i3.698","journal-title":"Int. J. Adv. Intell. Inform."},{"key":"1010_CR63","doi-asserted-by":"publisher","DOI":"10.3390\/risks9120224","author":"Y Antonio","year":"2021","unstructured":"Antonio, Y., Indratno, S.W., Simanjuntak, R.: Cyber insurance ratemaking: a graph mining approach. Risks (2021). https:\/\/doi.org\/10.3390\/risks9120224","journal-title":"Risks"},{"key":"1010_CR64","unstructured":"R. B\u00f6hme, G. Schwartz, Modeling cyber-insurance: Towards a unifying framework, In: Proceedings of the 9th Workshop on the Economics in Information Security (2010)"},{"issue":"3","key":"1010_CR65","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10207-023-00660-8","volume":"22","author":"A Tsohou","year":"2023","unstructured":"Tsohou, A., Diamantopoulou, V., Gritzalis, S., Lambrinoudakis, C.: Cyber insurance: state of the art, trends and future directions. Int. J. Inf. Secur. 22(3), 737\u2013748 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00660-8","journal-title":"Int. J. Inf. Secur."},{"key":"1010_CR66","doi-asserted-by":"publisher","DOI":"10.3390\/risks9100184","author":"A Orlando","year":"2021","unstructured":"Orlando, A.: Cyber risk quantification: investigating the role of cyber value at risk. Risks (2021). https:\/\/doi.org\/10.3390\/risks9100184","journal-title":"Risks"},{"key":"1010_CR67","doi-asserted-by":"publisher","unstructured":"Sibindi, A.B.: The art of alternative risk transfer methods of insurance. Risk Gov. Control Financ. Mark. Inst. 5(4CONT1), 224\u2013233 (2015). https:\/\/doi.org\/10.22495\/rgcv5i4c1art11","DOI":"10.22495\/rgcv5i4c1art11"},{"issue":"2","key":"1010_CR68","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1017\/asb.2019.11","volume":"49","author":"Q Tang","year":"2019","unstructured":"Tang, Q., Yuan, Z.: CAT bond pricing under a product probability measure with POT risk characterization. ASTIN Bulletin: J. IAA. 49(2), 457\u2013490 (2019). https:\/\/doi.org\/10.1017\/asb.2019.11","journal-title":"ASTIN Bulletin: J. IAA."},{"issue":"6","key":"1010_CR69","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1109\/TIFS.2018.2881694","volume":"14","author":"I Vakilinia","year":"2018","unstructured":"Vakilinia, I., Sengupta, S.: A coalitional cyber-insurance framework for a common platform. IEEE Trans. Inf. Forensics Secur. 14(6), 1526\u20131538 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2881694","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1010_CR70","first-page":"1","volume":"33","author":"B Kitchenham","year":"2004","unstructured":"Kitchenham, B.: Procedures for performing systematic reviews. Keele Univ. 33, 1\u201326 (2004)","journal-title":"Keele Univ."},{"issue":"3","key":"1010_CR71","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1111\/1467-8551.00375","volume":"14","author":"D Tranfield","year":"2003","unstructured":"Tranfield, D., Denyer, D., Smart, P.: Towards a methodology for developing evidence-informed management knowledge by means of systematic review. Br. J. Manag. 14(3), 207\u2013222 (2003)","journal-title":"Br. J. Manag."},{"key":"1010_CR72","doi-asserted-by":"publisher","unstructured":"Page, M.J., McKenzie, J.E., Bossuyt, P.M., Boutron, I., Hoffmann, T.C., Mulrow, C. D., Shamseer, L., Tetzlaff, J.M., Akl, E.A., Brennan, S.E. et al.: The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ. 372(2021). https:\/\/doi.org\/10.1186\/s13643-021-01626-4","DOI":"10.1186\/s13643-021-01626-4"},{"key":"1010_CR73","doi-asserted-by":"publisher","DOI":"10.3390\/risks11050091","author":"A Aleksandrova","year":"2023","unstructured":"Aleksandrova, A., Ninova, V., Zhelev, Z.: A survey on AI implementation in finance, (Cyber) insurance and financial controlling. Risks (2023). https:\/\/doi.org\/10.3390\/risks11050091","journal-title":"Risks"},{"key":"1010_CR74","doi-asserted-by":"publisher","DOI":"10.1108\/GKMC-03-2023-0082","author":"H Nobanee","year":"2023","unstructured":"Nobanee, H., Alodat, A.Y., Dilshad, M.N., El Sayah, A., Alas\u2019ad, S.N., Al Shalabi, B.O., Alsadi, S.F., Al Marri, N.M., Fiza, F.K.: Mapping cyber insurance: a taxonomical study using bibliometric visualization and systematic analysis. Glob. Knowl. Mem. Commun. (2023). https:\/\/doi.org\/10.1108\/GKMC-03-2023-0082","journal-title":"Glob. Knowl. Mem. Commun."},{"key":"1010_CR75","doi-asserted-by":"publisher","unstructured":"Dawood, H., Al Zadjali, F., Al Rawahi, M., Karim, S., Hazik, M.: Business trends & challenges in Islamic FinTech: A systematic literature review. F1000Research. 11 (2022). https:\/\/doi.org\/10.12688\/f1000research.109400.1","DOI":"10.12688\/f1000research.109400.1"},{"key":"1010_CR76","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.tranpol.2019.04.019","volume":"79","author":"G Tonn","year":"2019","unstructured":"Tonn, G., Kesan, J.P., Zhang, L., Czajkowski, J.: Cyber risk and insurance for transportation infrastructure. Transp. Policy. 79, 103\u2013114 (2019). https:\/\/doi.org\/10.1016\/j.tranpol.2019.04.019","journal-title":"Transp. Policy."},{"issue":"1","key":"1010_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10919392.2022.2054259","volume":"32","author":"K Sharma","year":"2022","unstructured":"Sharma, K., Mukhopadhyay, A.: Sarima-based cyber-risk assessment and mitigation model for a smart city\u2019s traffic management systems (Scram). J. Org. Comput. Electr. Commer. 32(1), 1\u201320 (2022). https:\/\/doi.org\/10.1080\/10919392.2022.2054259","journal-title":"J. Org. Comput. Electr. Commer."},{"issue":"2","key":"1010_CR78","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MNET.2017.1600321NM","volume":"31","author":"D Niyato","year":"2017","unstructured":"Niyato, D., Hoang, D.T., Wang, P., Han, Z.: Cyber insurance for plug-In electric vehicle charging in vehicle-to-grid systems. IEEE Network. 31(2), 38\u201346 (2017). https:\/\/doi.org\/10.1109\/MNET.2017.1600321NM","journal-title":"IEEE Network."},{"key":"1010_CR79","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/ACCESS.2017.2649042","volume":"5","author":"DT Hoang","year":"2017","unstructured":"Hoang, D.T., Wang, P., Niyato, D., Hossain, E.: Charging and discharging of plug-in electric vehicles (PEVs) in vehicle-to-grid (V2G) systems: A cyber insurance-based model. IEEE Access. 5, 732\u2013754 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2649042","journal-title":"IEEE Access."},{"issue":"2","key":"1010_CR80","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1109\/TSG.2021.3133536","volume":"13","author":"S Acharya","year":"2022","unstructured":"Acharya, S., Mieth, R., Konstantinou, C., Karri, R., Dvorkin, Y.: Cyber insurance against cyberattacks on electric vehicle charging stations. IEEE Trans. Smart Grid. 13(2), 1529\u20131541 (2022). https:\/\/doi.org\/10.1109\/TSG.2021.3133536","journal-title":"IEEE Trans. Smart Grid."},{"key":"1010_CR81","unstructured":"Rosson, J., Rice, M., Lopez, J., Fass, D.: Incentivizing cyber security investment in the power sector using an extended cyber insurance framework. Homeland Secur. Aff. 15, (2019)"},{"key":"1010_CR82","doi-asserted-by":"publisher","first-page":"78890","DOI":"10.1109\/ACCESS.2020.2988548","volume":"8","author":"Z Yang","year":"2020","unstructured":"Yang, Z., Liu, Y., Campbell, M., Ten, C.-W., Rho, Y., Wang, L., Wei, W.: Premium calculation for insurance businesses based on cyber risks in IP-Based power substations. IEEE Access. 8, 78890\u201378900 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2988548","journal-title":"IEEE Access."},{"issue":"5","key":"1010_CR83","doi-asserted-by":"publisher","first-page":"4403","DOI":"10.1109\/TSG.2020.2992782","volume":"11","author":"P Lau","year":"2020","unstructured":"Lau, P., Wei, W., Wang, L., Liu, Z., Ten, C.-W.: A cybersecurity insurance model for power system reliability considering optimal defense resource allocation. IEEE Trans. Smart Grid. 11(5), 4403\u20134414 (2020). https:\/\/doi.org\/10.1109\/TSG.2020.2992782","journal-title":"IEEE Trans. Smart Grid."},{"issue":"1","key":"1010_CR84","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/TPWRS.2022.3164628","volume":"38","author":"P Lau","year":"2023","unstructured":"Lau, P., Wang, L., Wei, W., Liu, Z., Ten, C.-W.: A novel mutual insurance model for hedging against cyber risks in power systems deploying smart technologies. IEEE Trans Power Syst. 38(1), 630\u2013642 (2023). https:\/\/doi.org\/10.1109\/TPWRS.2022.3164628","journal-title":"IEEE Trans Power Syst."},{"key":"1010_CR85","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102963","author":"YY Li","year":"2023","unstructured":"Li, Y.Y., Mamon, R.: Modelling health-data breaches with application to cyber insurance. Comput. Secur. (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.102963","journal-title":"Comput. Secur."},{"issue":"3","key":"1010_CR86","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/JSAC.2017.2672378","volume":"35","author":"R Zhang","year":"2017","unstructured":"Zhang, R., Zhu, Q., Hayel, Y.: A Bi-level game approach to attack-aware cyber insurance of computer networks. IEEE J Sel Areas Commun. 35(3), 779\u2013794 (2017). https:\/\/doi.org\/10.1109\/JSAC.2017.2672378","journal-title":"IEEE J Sel Areas Commun."},{"issue":"6","key":"1010_CR87","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MCOM.2018.1700504","volume":"56","author":"X Lu","year":"2018","unstructured":"Lu, X., Niyato, D., Jiang, H., Wang, P., Poor, H.V.: Cyber insurance for heterogeneous wireless networks. IEEE Commun Mag. 56(6), 21\u201327 (2018). https:\/\/doi.org\/10.1109\/MCOM.2018.1700504","journal-title":"IEEE Commun Mag."},{"issue":"7","key":"1010_CR88","doi-asserted-by":"publisher","first-page":"1648","DOI":"10.1109\/JSAC.2018.2825518","volume":"36","author":"X Lu","year":"2018","unstructured":"Lu, X., Niyato, D., Privault, N., Jiang, H., Wang, P.: Managing physical layer security in wireless cellular networks: a cyber insurance approach. IEEE J. Sel. Areas Commun. 36(7), 1648\u20131661 (2018). https:\/\/doi.org\/10.1109\/JSAC.2018.2825518","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"1010_CR89","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TDSC.2017.2703626","volume":"16","author":"J Chase","year":"2019","unstructured":"Chase, J., Niyato, D., Wang, P., Chaisiri, S., Ko, R.K.L.: A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Trans. Dependable Secure Comput. 16(4), 565\u2013579 (2019). https:\/\/doi.org\/10.1109\/TDSC.2017.2703626","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1010_CR90","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1109\/TIFS.2019.2955891","volume":"15","author":"R Zhang","year":"2020","unstructured":"Zhang, R., Zhu, Q.: FlipIn: a game-theoretic cyber insurance framework for incentive-compatible cyber risk management of internet of things. IEEE Trans. Inf. Forensics Secur. 15, 2026\u20132041 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2955891","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"1010_CR91","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1109\/TCC.2019.2896632","volume":"9","author":"S Feng","year":"2021","unstructured":"Feng, S., Xiong, Z., Niyato, D., Wang, P.: Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach. IEEE Trans. Cloud Comput. 9(3), 995\u20131007 (2021). https:\/\/doi.org\/10.1109\/TCC.2019.2896632","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"5","key":"1010_CR92","doi-asserted-by":"publisher","first-page":"1492","DOI":"10.1109\/TSC.2018.2876846","volume":"14","author":"S Feng","year":"2021","unstructured":"Feng, S., Wang, W., Xiong, Z., Niyato, D., Wang, P., Wang, S.S.: On cyber risk management of blockchain networks: a game theoretic approach. IEEE Trans. Serv. Comput. 14(5), 1492\u20131504 (2021). https:\/\/doi.org\/10.1109\/TSC.2018.2876846","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"1010_CR93","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1109\/TSC.2020.2996382","volume":"15","author":"S Feng","year":"2022","unstructured":"Feng, S., Xiong, Z., Niyato, D., Wang, P., Wang, S.S., Shen, S.X.: Joint pricing and security investment in cloud security service market with user interdependency. IEEE Trans. Serv. Comput. 15(3), 1461\u20131472 (2022). https:\/\/doi.org\/10.1109\/TSC.2020.2996382","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"1010_CR94","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1016\/j.ejor.2022.07.033","volume":"305","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Xu, M., Su, J., Zhao, P.: Structural models for fog computing based internet of things architectures with insurance and risk management applications. Eur J Oper Res. 305(3), 1273\u20131291 (2023). https:\/\/doi.org\/10.1016\/j.ejor.2022.07.033","journal-title":"Eur J Oper Res."},{"key":"1010_CR95","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3856","author":"KK Gai","year":"2017","unstructured":"Gai, K.K., Qiu, M.K., Hassan, H.: Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing. Concurr. Comput. Pract. Exp. (2017). https:\/\/doi.org\/10.1002\/cpe.3856","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"1010_CR96","doi-asserted-by":"publisher","unstructured":"Radanliev, P., De Roure, D.C., Nicolescu, R., Huth, M., Montalvo, R.M., Cannady, S., Burnap, P.: Future developments in cyber risk assessment for the internet of things. Comput Ind. 102, 14\u201322 (2018). https:\/\/doi.org\/10.1016\/j.compind.2018.08.002","DOI":"10.1016\/j.compind.2018.08.002"},{"issue":"1","key":"1010_CR97","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.jik.2017.06.002","volume":"3","author":"RPJ Rajapathirana","year":"2018","unstructured":"Rajapathirana, R.P.J., Hui, Y.: Relationship between innovation capability, innovation type, and firm performance. J. Innov. Knowl. 3(1), 44\u201355 (2018). https:\/\/doi.org\/10.1016\/j.jik.2017.06.002","journal-title":"J. Innov. Knowl."},{"key":"1010_CR98","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1016\/j.future.2019.03.042","volume":"98","author":"H Tao","year":"2019","unstructured":"Tao, H., Bhuiyan, M.Z.A., Rahman, M.A., Wang, G., Wang, T., Ahmed, M.M., Li, J.: Economic perspective analysis of protecting big data security and privacy. Future Gener Comput Syst. 98, 660\u2013671 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.03.042","journal-title":"Future Gener Comput Syst."},{"issue":"4","key":"1010_CR99","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1108\/BEPAM-07-2018-0098","volume":"9","author":"A Mitra","year":"2019","unstructured":"Mitra, A., Munir, K.: Influence of big data in managing cyber assets. Built Environ. Proj. Asset Manage. 9(4), 503\u2013514 (2019). https:\/\/doi.org\/10.1108\/BEPAM-07-2018-0098","journal-title":"Built Environ. Proj. Asset Manage."},{"key":"1010_CR100","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/j.tra.2018.06.033","volume":"124","author":"B Sheehan","year":"2019","unstructured":"Sheehan, B., Murphy, F., Mullins, M., Ryan, C.: Connected and autonomous vehicles: a cyber-risk classification framework. Transp. Res. Part A Policy Pract. 124, 523\u2013536 (2019). https:\/\/doi.org\/10.1016\/j.tra.2018.06.033","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"1010_CR101","doi-asserted-by":"publisher","DOI":"10.1145\/3386159","author":"R Pal","year":"2020","unstructured":"Pal, R., Psounis, K., Crowcroft, J., Kelly, F., Hui, P., Tarkoma, S., Kumar, A., Kelly, J., Chatterjee, A., Golubchik, L., Sastry, N., Nag, B.: When are cyber blackouts in modern service networks likely? ACM Trans. Manage. Inf. Syst. (2020). https:\/\/doi.org\/10.1145\/3386159","journal-title":"ACM Trans. Manage. Inf. Syst."},{"key":"1010_CR102","doi-asserted-by":"publisher","DOI":"10.1145\/3568399","author":"R Pal","year":"2023","unstructured":"Pal, R., Liu, P., Lu, T., Hua, E.: How hard is cyber-risk management in IT\/OT systems? a theory to classify and conquer hardness of insuring ICSs. ACM Trans. Cyber-Phys. Syst. (2023). https:\/\/doi.org\/10.1145\/3568399","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"1010_CR103","doi-asserted-by":"publisher","DOI":"10.3390\/agriculture14020320","author":"MW Sitnicki","year":"2024","unstructured":"Sitnicki, M.W., Prykaziuk, N., Ludmila, H., Pimenowa, O., Imbrea, F., \u015emuleac, L., Pa\u015fcal\u0103u, R.: Regional perspective of using cyber insurance as a tool for protection of agriculture 4.0. Agric. (2024). https:\/\/doi.org\/10.3390\/agriculture14020320","journal-title":"Agric."},{"key":"1010_CR104","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2023.102724","author":"A Mukhopadhyay","year":"2024","unstructured":"Mukhopadhyay, A., Jain, S.: A framework for cyber-risk insurance against ransomware: a mixed-method approach. Int. J. Inf. Manage. (2024). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2023.102724","journal-title":"Int. J. Inf. Manage."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01010-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01010-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01010-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T08:00:36Z","timestamp":1743321636000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01010-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,11]]},"references-count":104,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["1010"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01010-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,11]]},"assertion":[{"value":"11 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have no financial interests. Additionally, the authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"93"}}