{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T03:25:50Z","timestamp":1778815550761,"version":"3.51.4"},"reference-count":83,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T00:00:00Z","timestamp":1680652800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Insurance Australia Group"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2024,1,2]]},"DOI":"10.1080\/08874417.2023.2185551","type":"journal-article","created":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T20:13:53Z","timestamp":1680725633000},"page":"157-171","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":10,"title":["Cyberspace and Personal Cyber Insurance: A Systematic Review"],"prefix":"10.1080","volume":"64","author":[{"given":"Richard","family":"McGregor","sequence":"first","affiliation":[{"name":"James Cook University, Townsville, Queensland, Australia"}]},{"given":"Carmen","family":"Reaiche","sequence":"additional","affiliation":[{"name":"James Cook University, Townsville, Queensland, Australia"}]},{"given":"Stephen","family":"Boyle","sequence":"additional","affiliation":[{"name":"James Cook University, Townsville, Queensland, Australia"}]},{"given":"Graciela","family":"Corral de Zubielqui","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, South Australia, Australia"}]}],"member":"301","published-online":{"date-parts":[[2023,4,5]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-102295-5.10810-8"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2017.8203709"},{"key":"e_1_3_3_5_1","volume-title":"Personal cyber insurance: protecting our digital lives","author":"Willi F","year":"2019","unstructured":"Willi F, Bundt M. Personal cyber insurance: protecting our digital lives. Zurich, Switzerland: Swiss Reinsurance Company Ltd; 2019. https:\/\/www.swissre.com\/dam\/jcr:68e4d8fb-509c-4182-a219-c803f7d23af1\/ZRH-18-00632-P1_Personal_cyber_insurance_Publication_WEB.pdf."},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102248"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy006"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2020.01.01"},{"key":"e_1_3_3_10_1","unstructured":"Khaliligarekani M. Incentive Mechanisms for Managing and Controlling Cyber Risks: The Role of Cyber Insurance and Resource Pooling. USA: University of Michigan; 2020. https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/155236\/khalili_1.pdf?sequence=1&isAllowed=y"},{"key":"e_1_3_3_14_1","volume-title":"10th Economics & Finance Conference","author":"Strupczewski G","unstructured":"Strupczewski G. Current State of the Cyber Insurance Market. 10th Economics & Finance Conference; 2018; Rome, Italy."},{"key":"e_1_3_3_15_1","series-title":"Resilience and CIIP Program","volume-title":"Incentives and barriers of the cyber insurance market in Europe","author":"(ENISA), E.N.a.I.S.A., R. N, and R. Europe","year":"2016","unstructured":"(ENISA), E.N.a.I.S.A., R. N, and R. Europe. Incentives and barriers of the cyber insurance market in Europe. Resilience and CIIP Program. Greece: European Network and Information Security Agency (ENISA); 2016."},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45507-5_12"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00019"},{"key":"e_1_3_3_18_1","doi-asserted-by":"crossref","unstructured":"Granato A Polacek A. The growth and challenges of cyber insurance. In: Essays on issues. Chicago USA: The Federal Reserve Bank of Chicago; 2019. p. 1\u20136.","DOI":"10.21033\/cfl-2019-426"},{"key":"e_1_3_3_19_1","volume-title":"Demystifying cyber insurance coverage","author":"Friedman S","year":"2017","unstructured":"Friedman S, Thomas A. Demystifying cyber insurance coverage. In: Demystifying cyber insurance coverage. USA: Deloitte Touche Tohmatsu Limited; 2017. p. 2-17."},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.137"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-021-01671-z"},{"key":"e_1_3_3_22_1","first-page":"671","volume-title":"The SAGE handbook of organizational research methods","author":"Denyer D","year":"2009","unstructured":"Denyer D, Tranfield D. Chapter 39: Producing a systematic review. In: Buchanon D, Bryman A, editors. The SAGE handbook of organizational research methods. United Kingdom: SAGE Publishing; 2009. p. 671\u201389."},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.2009.00880.x"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.5539\/elt.v2n3p39"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-021-04082-y"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41288-017-0073-0"},{"key":"e_1_3_3_27_1","volume-title":"Using cyber insurance as a risk management strategy: knowledge gaps and recommendations for further research","author":"T\u00f8ndel IA","year":"2015","unstructured":"T\u00f8ndel IA, Meland PH, Omerovic A, Gj\u00e6re EA, Solhaug B. Using cyber insurance as a risk management strategy: knowledge gaps and recommendations for further research. Norway: SINTEF Digital; 2015."},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1590\/s0102-8529.2019420100002"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.14763\/2017.3.712"},{"key":"e_1_3_3_30_1","isbn-type":"print","first-page":"1","volume-title":"Cyber risk: too big to insure? Risk transfer options for a mercurial risk class","author":"Eling M","year":"2016","unstructured":"Eling M, Hendrick Wirfs J. Cyber risk: too big to insure? Risk transfer options for a mercurial risk class. Switzerland: University of St. Gallen; 2016. p. 1\u2013174. 978-3-7297-2006-0.","ISBN":"https:\/\/id.crossref.org\/isbn\/9783729720060"},{"key":"e_1_3_3_31_1","first-page":"76","article-title":"Information in cyberspace - actuality and challenges","volume":"76","author":"Mare\u0161i NC","year":"2020","unstructured":"Mare\u0161i NC. Information in cyberspace - actuality and challenges. Strategic Impact. 2020;76:76\u201388.","journal-title":"Strategic Impact"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11442-019-1698-7"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1093\/isr\/viz022"},{"key":"e_1_3_3_35_1","first-page":"2016","volume-title":"Characterising cyberspace: past, present and future","author":"Clark D","year":"2010","unstructured":"Clark D. Characterising cyberspace: past, present and future. USA: MIT CSAIL: MIT; 2010. p. 2016\u201328."},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-021-01199-3"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2011.940293"},{"key":"e_1_3_3_38_1","first-page":"24","volume-title":"7th International Conference on Financial Criminology 2015","author":"Bendovschi A","year":"2015","unstructured":"Bendovschi A. Cyber-attacks \u2013 trends, patterns and security countermeasures. 7th International Conference on Financial Criminology 2015; 2015; Oxford, United Kingdom. p. 24\u201331."},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfs.2022.100989"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC52330.2021.9640951"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1093\/jogss\/ogz077"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/835"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.29007\/fq42"},{"key":"e_1_3_3_44_1","first-page":"140","article-title":"Critical issues of cybersecurity: solutions beyond the technical","volume":"26","author":"Etschmaier MM","year":"2019","unstructured":"Etschmaier MM. Critical issues of cybersecurity: solutions beyond the technical. Inter J Comput Appl. 2019;26:140\u201353.","journal-title":"Inter J Comput Appl"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10111-021-00683-y"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.004"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43999-6_3"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHILECON.2017.8229528"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22351-9_15"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41288-020-00183-6"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaz4795"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470024"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.26634\/jse.14.4.17403"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41288-020-00163-w"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2018.07.021"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007867"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12052589"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/23743603.2020.1756240"},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2022.131439"},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.36965\/OJAKM.2020.8(2)1-16"},{"key":"e_1_3_3_63_1","first-page":"1","volume-title":"Department of economics","author":"Kesan JP","year":"2005","unstructured":"Kesan JP, Majuca RP, Yurcik WJ. The evolution of cyberinsurance. In: National Center for Supercomputing Applications (NCSA) editor. Department of economics. Illinois (USA): University of Illinois at Urbana-Champaign; 2005. p. 1\u201316."},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812205"},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.051"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41288-020-00171-w"},{"key":"e_1_3_3_67_1","volume-title":"24th USENIX Security Symposium","author":"Liu Y","year":"2015","unstructured":"Liu Y, Sarabi A, Zhang J, Naghizadeh P, Karir M, Bailey M, Liu M. Cloudy with a chance of breach: forecasting cyber security incidents. In: 24th USENIX Security Symposium Washington (USA): USENIX The Advanced Computing Systems Association; 2015."},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12864"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI53430.2021.00126"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.08.002"},{"key":"e_1_3_3_71_1","first-page":"1","article-title":"A survey on human and personality vulnerability assessment in cybersecurity: challenges: approaches, and open issues","author":"Papatsaroucha D","year":"2021","unstructured":"Papatsaroucha D, Nikoloudakis Y, Kefaloukos I, Pallis E, Markakis EK. A survey on human and personality vulnerability assessment in cybersecurity: challenges: approaches, and open issues. ACM Comput. Surv. 2021;1\u201339.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.023"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3273996.3273999"},{"key":"e_1_3_3_75_1","volume-title":"Underwritten or oversold? How cyber insurance can hinder (or help) cyber security in Australia","author":"Falk R","year":"2021","unstructured":"Falk R, Brown AL. Underwritten or oversold? How cyber insurance can hinder (or help) cyber security in Australia. Australia: Cyber Security Cooperative Research Centre; 2021."},{"key":"e_1_3_3_76_1","first-page":"1","volume-title":"Insurance for cyber attacks: the issue of setting premiums in context","author":"Toregas C","year":"2014","unstructured":"Toregas C, Zahn N. Insurance for cyber attacks: the issue of setting premiums in context. United States: The George Washington University; 2014. p. 1\u201320."},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3187211"},{"key":"e_1_3_3_79_1","first-page":"290","article-title":"Cyberspace identity theft: an overview","volume":"6","author":"Manap NA","year":"2015","unstructured":"Manap NA, Abdul Rahim A, Taji H. Cyberspace identity theft: an overview. Mediterr J Social Sci. 2015;6:290\u201399.","journal-title":"Mediterr J Social Sci"},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3133536"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102418"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"e_1_3_3_83_1","unstructured":"Flaco GEA. A research agenda for cyber risk and cyber insurance. In: The 2019 Workshop on the Economics of Information Security (WEIS). Boston (USA): Stanford Center for International Security and Cooperation; 2019. https:\/\/cisac.fsi.stanford.edu\/publication\/research-agenda-cyber-risk-and-cyber-insurance-0."},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.120737"},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.121026"},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592780"},{"key":"e_1_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1787\/9789264282148-en"},{"key":"e_1_3_3_88_1","volume-title":"The current state of cyber insurance as a risk transference option","author":"Waters M","year":"2015","unstructured":"Waters M. The current state of cyber insurance as a risk transference option. Nashville (USA): Lipscomb University; 2015."},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.54648\/ERPL2018027"},{"key":"e_1_3_3_90_1","volume-title":"Workshop on the Economics of Information Security (WEIS)","author":"Bohme R","year":"2010","unstructured":"Bohme R, Schwartz G. Modeling cyber-insurance: towards a unifying framework. In: Workshop on the Economics of Information Security (WEIS). USA: Harvard; 2010."},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2019-0012"},{"key":"e_1_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1108\/JRF-09-2016-0122"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2023.2185551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T17:59:57Z","timestamp":1705514397000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2023.2185551"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,5]]},"references-count":83,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,2]]}},"alternative-id":["10.1080\/08874417.2023.2185551"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2023.2185551","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}