{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T05:00:46Z","timestamp":1772600446334,"version":"3.50.1"},"reference-count":81,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T00:00:00Z","timestamp":1708387200000},"content-version":"vor","delay-in-days":50,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R513143\/1"],"award-info":[{"award-number":["EP\/R513143\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Efficient risk transfer is an important condition for ensuring the sustainability of a market according to the established economics literature. In an inefficient market, significant financial imbalances may develop and potentially jeopardize the solvency of some market participants. The constantly evolving nature of cyber-threats and lack of public data sharing mean that the economic conditions required for quoted cyber-insurance premiums to be considered efficient are highly unlikely to be met. This paper develops Monte Carlo simulations of an artificial cyber-insurance market and compares the efficient and inefficient outcomes based on the informational setup between the market participants. The existence of diverse loss distributions is justified by the dynamic nature of cyber-threats and the absence of any reliable and centralized incident reporting. It is shown that the limited involvement of reinsurers when loss expectations are not shared leads to increased premiums and lower overall capacity. This suggests that the sustainability of the cyber-insurance market requires both better data sharing and external sources of risk tolerant capital.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae003","type":"journal-article","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T10:04:12Z","timestamp":1708423452000},"source":"Crossref","is-referenced-by-count":7,"title":["The barriers to sustainable risk transfer in the cyber-insurance market"],"prefix":"10.1093","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7062-2575","authenticated-orcid":false,"given":"Henry R K","family":"Skeoch","sequence":"first","affiliation":[{"name":"Department of Computer Science, University College London , Gower Street , London, WC1E 6BT,","place":["United Kingdom"]}]},{"given":"Christos","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University College London , Gower Street , London, WC1E 6BT,","place":["United Kingdom"]},{"name":"Aston Business School, Aston University , Birmingham, B4 7ET ,","place":["United Kingdom"]}]}],"member":"286","published-online":{"date-parts":[[2024,2,20]]},"reference":[{"key":"2024121909141229900_bib1","article-title":"U.S. Cyber market update: 2022\u00a0U.S. cyber insurance profits and performance","author":"Aon PLC","year":"2022"},{"key":"2024121909141229900_bib2","article-title":"Through the looking glass: interrogating the key numbers behind today\u2019s Cyber market","author":"Guy Carpenter","year":"2023"},{"key":"2024121909141229900_bib3","article-title":"Cyber risks in a new era: reinsurers could unlock the Cyber insurance market","author":"Adam","year":"2021"},{"key":"2024121909141229900_bib4","article-title":"Cyber in the 2020s: a question of capacity","author":"Gallagher Re","year":"2021"},{"key":"2024121909141229900_bib5","article-title":"The future of cyber (Re)insurance","author":"Gallagher Re","year":"2022"},{"key":"2024121909141229900_bib6","article-title":"The all risk cyber challenge","author":"Brew","year":"2023"},{"key":"2024121909141229900_bib7","article-title":"Cyber risk accumulation: fully tackling the insurability challenge","author":"Pain","year":"2023"},{"key":"2024121909141229900_bib8","article-title":"How the market works","author":"Lloyd\u2019s of London","year":"2022"},{"key":"2024121909141229900_bib9","author":"Institute and Faculty of Actuaries"},{"key":"2024121909141229900_bib10","doi-asserted-by":"crossref","DOI":"10.1002\/9781119412540","volume-title":"Reinsurance: Actuarial and Statistical Aspects","author":"Albrecher","year":"2017"},{"key":"2024121909141229900_bib11","doi-asserted-by":"crossref","DOI":"10.4324\/9781351224109","volume-title":"Reinsurance Underwriting","author":"Kiln","year":"2017"},{"key":"2024121909141229900_bib12","doi-asserted-by":"crossref","DOI":"10.7312\/kurz20652","volume-title":"The Market Power of Technology: Understanding the Second Gilded Age","author":"Kurz","year":"2023"},{"key":"2024121909141229900_bib13","article-title":"What does cyber insurance cover?","author":"Association of British Insurers"},{"key":"2024121909141229900_bib14","article-title":"AIR Estimates Losses for the Marriott Breach Will Be Between USD 200 Million and USD 600 Million","author":"AIR worldwide","year":"2018"},{"key":"2024121909141229900_bib15","article-title":"Meta Platforms must face medical privacy class action","author":"Reuters","year":"2023"},{"key":"2024121909141229900_bib16","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1080\/23738871.2021.2000628","article-title":"On the strategic consequences of digital espionage","volume":"6","author":"Devanny","year":"2021","journal-title":"J Cyber Pol"},{"key":"2024121909141229900_bib17","author":"Lloyd\u2019s Underwriting and Investment Phrases Glossary"},{"key":"2024121909141229900_bib18","article-title":"Concerns over scope of cover limit cyber reinsurance capacity","author":"Business Insurance"},{"key":"2024121909141229900_bib19","article-title":"Cyber reinsurance must triple by 2030, capital markets are key: Howden"},{"key":"2024121909141229900_bib20","article-title":"Munich Re prepared to give up cyber business over accumulation concerns"},{"key":"2024121909141229900_bib21","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.insmatheco.2012.10.006","article-title":"Pricing and simulations of catastrophe bonds","volume":"52","author":"Nowak","year":"2013","journal-title":"Insur Math Econ"},{"key":"2024121909141229900_bib22","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1111\/j.1540-6296.2008.00127.x","article-title":"Cat bonds and other risk-linked securities: state of the market and recent developments","volume":"11","author":"Cummins","year":"2008","journal-title":"Risk Manage Ins Rev"},{"key":"2024121909141229900_bib23","volume-title":"The Handbook of Insurance-Linked Securities","author":"Barrieu","year":"2009"},{"key":"2024121909141229900_bib24","volume-title":"Foundations of Insurance Economics: Readings in Economics and Finance","author":"Dionne","year":"2013"},{"key":"2024121909141229900_bib25","doi-asserted-by":"crossref","first-page":"424","DOI":"10.2307\/1909887","article-title":"Equilibrium in a reinsurance market","volume":"30","author":"Borch","year":"1962","journal-title":"Econometrica"},{"key":"2024121909141229900_bib26","doi-asserted-by":"crossref","first-page":"402","DOI":"10.2307\/252778","article-title":"Incomplete markets for insurance: an overview","volume":"52","author":"Schlesinger","year":"1985","journal-title":"J Risk Insur"},{"key":"2024121909141229900_bib27","doi-asserted-by":"crossref","first-page":"195","DOI":"10.7208\/chicago\/9780226266251.001.0001","article-title":"The pricing of US catastrophe reinsurance","volume-title":"The Financing of Catastrophe Risk","author":"Froot","year":"1999"},{"key":"2024121909141229900_bib28","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1017\/S1748499520000093","article-title":"Multivariate Hawkes process for cyber insurance","volume":"15","author":"Bessy-Roland","year":"2021","journal-title":"Ann Actuar Sci"},{"key":"2024121909141229900_bib29","first-page":"89","article-title":"An expansion formula for Hawkes processes and application to cyber-insurance derivatives","volume-title":"Stoch Proces Appl","author":"Hillairet","year":"2021"},{"key":"2024121909141229900_bib30","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1080\/03461238.2021.1872694","article-title":"Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models","volume":"2021","author":"Hillairet","year":"2021","journal-title":"Scand Actuar J"},{"key":"2024121909141229900_bib31","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1057\/gpp.2014.19","article-title":"Insurability of cyber risk: an empirical analysis","volume":"40","author":"Biener","year":"2015","journal-title":"Geneva Pap R I-Iss P"},{"key":"2024121909141229900_bib32","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1016\/j.ejor.2018.07.021","article-title":"What are the actual costs of cyber risk events?","volume":"272","author":"Eling","year":"2019","journal-title":"Eur J Oper Res"},{"key":"2024121909141229900_bib33","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1057\/jors.2016.37","article-title":"Contagion in cyber security attacks","volume":"68","author":"Baldwin","year":"2017","journal-title":"J Oper Res Soc"},{"key":"2024121909141229900_bib34","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1017\/S1748499520000093","article-title":"Multivariate Hawkes process for cyber insurance","volume":"15","author":"Bessy-Roland","year":"2021","journal-title":"Ann Actuar Sci"},{"key":"2024121909141229900_bib35","article-title":"Aspects of the theory of risk-bearing","author":"Arrow","year":"1965"},{"key":"2024121909141229900_bib36","article-title":"Theory of value: an axiomatic analysis of economic equilibrium","author":"Debreu","year":"1959"},{"key":"2024121909141229900_bib37","doi-asserted-by":"crossref","first-page":"81","DOI":"10.2307\/1885225","article-title":"Optimal production and allocation under uncertainty","volume":"87","author":"Starr","year":"1973","journal-title":"Q J Econ"},{"key":"2024121909141229900_bib38","article-title":"Diverse anticipations, rational anticipations, ex ante efficiency and ex post efficiency","author":"Feiger","year":"1976"},{"key":"2024121909141229900_bib39","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1111\/j.1744-1714.1981.tb01193.x","article-title":"The dilemma of war and military exclusion clauses in insurance contracts","volume":"19","author":"Simon","year":"1981","journal-title":"Am Bus LJ"},{"key":"2024121909141229900_bib40","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1057\/s41288-020-00168-5","article-title":"Insurance definitions of cyber war","volume":"45","author":"Woods","year":"2020","journal-title":"Geneva Pap R I-Iss P"},{"key":"2024121909141229900_bib41","first-page":"309","article-title":"Cyberwarfare & cyber insurance: exploring when a cyberattack can negate a cyber insurance claim","volume":"18","author":"Rovetto\u00a0Jr","year":"2022","journal-title":"J Bus Tech L"},{"key":"2024121909141229900_bib42","first-page":"179","article-title":"Insurance policies and the attribution of cyber operations under international law: a commentary","volume":"55","author":"Brunner","year":"2022","journal-title":"NYUJ Int\u2019l L Pol"},{"key":"2024121909141229900_bib43","article-title":"Insurers can\u2019t use \u2018act of war\u2019 excuse to avoid Merck\u2019s $1.4B NotPetya payout","author":"Lyons\u00a0Hardcastle","year":"2023"},{"key":"2024121909141229900_bib44","article-title":"State backed cyber-attack exclusions","author":"Chaudhry"},{"key":"2024121909141229900_bib45","author":"Cyber war clauses","year":"2023"},{"key":"2024121909141229900_bib46","first-page":"1","article-title":"The role of insurers in shaping international cyber-security norms about cyber-war","volume":"45","author":"Wolff","year":"2023","journal-title":"Contemp Secur Pol"},{"key":"2024121909141229900_bib47","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1007\/BF01213816","article-title":"On rational belief equilibria","volume":"4","author":"Kurz","year":"1994","journal-title":"Econ Theor"},{"key":"2024121909141229900_bib48","article-title":"The structure of scientific revolutions","volume-title":"International Encyclopedia of Unified Science","author":"Kuhn","year":"1970","edition":"2nd edn"},{"key":"2024121909141229900_bib49","doi-asserted-by":"crossref","first-page":"235","DOI":"10.2307\/2552915","article-title":"Ex-ante and ex-post welfare optimality under uncertainty","volume":"48","author":"Hammond","year":"1981","journal-title":"Economica"},{"key":"2024121909141229900_bib50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/0700000023","article-title":"The microeconomics of insurance","volume":"4","author":"Rees","year":"2008","journal-title":"Found Trends Microecon"},{"key":"2024121909141229900_bib51","article-title":"Theory of probability. a critical introductory treatment","volume-title":"Wiley Series in Probability and Mathematical Statistics","author":"Finetti\u00a0De","year":"1974"},{"key":"2024121909141229900_bib52","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1086\/671179","article-title":"Smooth ambiguity aversion toward small risks and continuous-time recursive utility","volume":"121","author":"Skiadas","year":"2013","journal-title":"J. Polit Econ"},{"key":"2024121909141229900_bib53","first-page":"8085483","article-title":"On the theory of increased limits and excess of loss pricing","volume":"27","author":"Miccolis","year":"1977","journal-title":"PCAS LXIV"},{"key":"2024121909141229900_bib54","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511813658","volume-title":"Probability With Martingales","author":"Williams","year":"1991"},{"key":"2024121909141229900_bib55","article-title":"Moore's Law at 40","volume-title":"Understanding Moore's Law","author":"Moore","year":"2006"},{"key":"2024121909141229900_bib56","doi-asserted-by":"crossref","first-page":"e0121635","DOI":"10.1371\/journal.pone.0121635","article-title":"Quantitative determination of technological improvement from patent data","volume":"10","author":"Benson","year":"2015","journal-title":"PloS ONE"},{"key":"2024121909141229900_bib57","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1016\/j.respol.2014.11.005","article-title":"Rapid improvements with no commercial production: how do the improvements occur?","volume":"44","author":"Funk","year":"2015","journal-title":"Res Pol"},{"key":"2024121909141229900_bib58","doi-asserted-by":"crossref","first-page":"e52669","DOI":"10.1371\/journal.pone.0052669","article-title":"Statistical basis for predicting technological progress","volume":"8","author":"Nagy","year":"2013","journal-title":"PloS ONE"},{"key":"2024121909141229900_bib59","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1016\/j.respol.2015.11.001","article-title":"How predictable is technological progress?","volume":"45","author":"Farmer","year":"2016","journal-title":"Res Pol"},{"key":"2024121909141229900_bib60","doi-asserted-by":"crossref","DOI":"10.1002\/0470051310","volume-title":"Operational Risk: Modeling Analytics","author":"Panjer","year":"2006"},{"key":"2024121909141229900_bib61","article-title":"Non-life insurance mathematics: an introduction with stochastic processesMikosch","author":"Mikosch","year":"2004"},{"key":"2024121909141229900_bib62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3434403","article-title":"The county fair cyber loss distribution: drawing inferences from insurance prices","volume":"2","author":"Woods","year":"2021","journal-title":"Digit Threats Res Pract"},{"key":"2024121909141229900_bib63","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1017\/S0269964817000055","article-title":"On sums of independent generalized Pareto random variables with applications to insurance and CAT bonds","volume":"32","author":"Nadarajah","year":"2018","journal-title":"Probab Eng Inform Sci"},{"key":"2024121909141229900_bib64","volume-title":"Mathematica: A System for Doing Mathematics by Computer","author":"Wolfram","year":"1991"},{"key":"2024121909141229900_bib65","article-title":"Insurance risk models","author":"Panjer","year":"1992"},{"key":"2024121909141229900_bib66","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.2647458","article-title":"JuliaStats\/Distributions.jl: a Julia package for probability distributions and associated functions","author":"Lin","year":"2019"},{"key":"2024121909141229900_bib67","article-title":"QuadGK.jl: Gauss\u2013Kronrod integration in Julia","author":"Johnson","year":"2013"},{"key":"2024121909141229900_bib68","first-page":"15","article-title":"Plots.jl \u2013 a user extendable plotting API for the julia programming language","volume-title":"J OpenResearch Softw","author":"Christ","year":"2023"},{"key":"2024121909141229900_bib69","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1057\/gpp.1986.9","article-title":"Loadings for insurance premiums","volume":"11","author":"Benjamin","year":"1986","journal-title":"Geneva Pap Risk Insur"},{"key":"2024121909141229900_bib70","article-title":"Basics of reinsurance pricing?","author":"Clark","year":"2014"},{"key":"2024121909141229900_bib71","article-title":"Lloyd\u2019s Minimum Standards MS5 - Risk Management"},{"key":"2024121909141229900_bib72","article-title":"Report on the cyber insurance market","author":"National Association of Insurance Commissioners","year":"2022"},{"key":"2024121909141229900_bib73","article-title":"Insurers run from ransomware cover as losses mount","author":"Cohn","year":"2021"},{"key":"2024121909141229900_bib74","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1111\/risa.13416","article-title":"Robustness of optimal investment decisions in mixed insurance\/investment cyber risk management","volume":"40","author":"Mazzoccoli","year":"2020","journal-title":"Risk Anal"},{"key":"2024121909141229900_bib75","doi-asserted-by":"crossref","first-page":"102533","DOI":"10.1016\/j.cose.2021.102533","article-title":"Expanding the Gordon-Loeb model to cyber-insurance","volume":"112","author":"Skeoch","year":"2022","journal-title":"Comput Secur"},{"key":"2024121909141229900_bib76","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1137\/1114019","article-title":"Non-parametric estimation of a multivariate probability density","volume":"14","author":"Epanechnikov","year":"1969","journal-title":"Theor Probab Appl"},{"key":"2024121909141229900_bib77","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/3545795","article-title":"A turning point for cyber insurance","volume":"66","author":"Woods","year":"2023","journal-title":"Commun ACM"},{"key":"2024121909141229900_bib78","article-title":"Analyzing the feasibility of cyber bonds by stochastically solving a copula-based model with differential evolution","author":"Kasper","year":"2019"},{"key":"2024121909141229900_bib79","first-page":"1","article-title":"Cyber insurance-linked securities","volume":"53","author":"Braun","year":"2023","journal-title":"ASTIN Bull J IAA"},{"key":"2024121909141229900_bib80","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/978-3-031-17551-0_31","article-title":"A hierarchical macroeconomic copula model for cyber damages based on current cyber insurance prices","volume-title":"International Conference on Science of Cyber Security","author":"Kasper","year":"2022"},{"key":"2024121909141229900_bib81","article-title":"Cyber security service providers- should we leave them alone?","volume-title":"Workshop on Approaches to Modelling Heterogeneous Interacting Systems. In Association with Financial Cryptography","author":"Bajoori","year":"2022"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae003\/61182412\/tyae003.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae003\/61182412\/tyae003.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T09:14:38Z","timestamp":1734599678000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae003\/7610985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":81,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,2]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae003","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2024,1,1]]},"published":{"date-parts":[[2024,1,1]]},"article-number":"tyae003"}}