{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:59:50Z","timestamp":1754110790853,"version":"3.41.2"},"reference-count":65,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"vor","delay-in-days":344,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Cyber reinsurance is crucial in fostering sustainable growth and enhancing risk transfer strategies within the cyber insurance sector. Approximately 50%\u201365% of global cyber insurance premiums were ceded to the reinsurance market in 2022. While current reinsurance capacity is adequate to meet prevailing market demands, significant increases are needed to safeguard international commerce and close the cyber protection gap. This study analyzes the management of cyber risk accumulation by cyber reinsurance. The research creates and analyzes a dataset of semi-structured interviews with twenty cyber reinsurance market participants. The findings indicate that due to the highly volatile nature of cyber risks, cyber reinsurers enforce stringent capacity provision criteria on primary insurers. It is highlighted that reinsurers diversify their aggregate and cyber risk accumulation across various factors. This study offers an in-depth analysis of cyber insurance within the reinsurance framework, detailing collective strategies for implementing ILS and PPPs to mitigate barriers. These measures aim to enhance cyber capacity within the market, ensuring that cyber insurance remains accessible and affordable.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae027","type":"journal-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T02:17:35Z","timestamp":1733883455000},"source":"Crossref","is-referenced-by-count":2,"title":["Enhancing cyber insurance strategies: exploring reinsurance and alternative risk transfer approaches"],"prefix":"10.1093","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7824-465X","authenticated-orcid":false,"given":"Frank","family":"Cremer","sequence":"first","affiliation":[{"name":"Kemmy Business School, University of Limerick , Limerick V94 PH93 ,","place":["Ireland"]}]},{"given":"Barry","family":"Sheehan","sequence":"additional","affiliation":[{"name":"Kemmy Business School, University of Limerick , Limerick V94 PH93 ,","place":["Ireland"]}]},{"given":"Martin","family":"Mullins","sequence":"additional","affiliation":[{"name":"Kemmy Business School, University of Limerick , Limerick V94 PH93 ,","place":["Ireland"]}]},{"given":"Michael","family":"Fortmann","sequence":"additional","affiliation":[{"name":"Institute of Insurance, T.H. K\u00f6ln University of Applied Sciences , K\u00f6ln 50968 ,","place":["Germany"]}]},{"given":"Stefan","family":"Materne","sequence":"additional","affiliation":[{"name":"Institute of Insurance, T.H. K\u00f6ln University of Applied Sciences , K\u00f6ln 50968 ,","place":["Germany"]}]},{"given":"Finbarr","family":"Murphy","sequence":"additional","affiliation":[{"name":"Kemmy Business School, University of Limerick , Limerick V94 PH93 ,","place":["Ireland"]}]}],"member":"286","published-online":{"date-parts":[[2024,12,10]]},"reference":[{"author":"Global","key":"2024121909121365500_bib1","article-title":"Global Cyber insurance: reinsurance remains key to growth"},{"author":"I. A. o. I. Supervisors","key":"2024121909121365500_bib2","article-title":"Global Insurance Market Report (GIMAR)"},{"key":"2024121909121365500_bib3","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1111\/lsi.12303","article-title":"Data breach, privacy, and cyber insurance: how insurance companies act as \u201ccompliance managers\u201d for businesses","volume":"43","author":"Talesh","year":"2018","journal-title":"Law Social Inquiry"},{"author":"Johansmeyer","key":"2024121909121365500_bib4","article-title":"The cyber insurance market needs more money"},{"key":"2024121909121365500_bib5","doi-asserted-by":"crossref","first-page":"103162","DOI":"10.1016\/j.cose.2023.103162","article-title":"Between a rock and a hard (ening) place: cyber insurance in the ransomware era","volume":"128","author":"Mott","year":"2023","journal-title":"Comput Secur"},{"key":"2024121909121365500_bib6","doi-asserted-by":"crossref","first-page":"tyae003","DOI":"10.1093\/cybsec\/tyae003","article-title":"The barriers to sustainable risk transfer in the cyber-insurance market","volume":"10","author":"Skeoch","year":"2024","journal-title":"Journal of Cybersecurity"},{"key":"2024121909121365500_bib7","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1057\/s41288-022-00281-7","article-title":"Insurance and enterprise: cyber insurance for ransomware","volume":"48","author":"Baker","year":"2023","journal-title":"Geneva Papers Risk Insurance-Issues Practice"},{"key":"2024121909121365500_bib8","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1057\/s41288-020-00176-5","article-title":"Cyber insurance offering and performance: an analysis of the US cyber insurance market","volume":"45","author":"Xie","year":"2020","journal-title":"Geneva Papers Risk Insurance-Issues Practice"},{"key":"2024121909121365500_bib9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/CyberSA49311.2020.9139703","article-title":"The data that drives cyber insurance: a study into the underwriting and claims processes","volume-title":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","author":"Nurse","year":"2020"},{"key":"2024121909121365500_bib10","first-page":"1","article-title":"The growth and challenges of cyber insurance","volume":"426","author":"Granato","year":"2019","journal-title":"Chicago Fed Letter"},{"article-title":"Demand side of cyber insurance in the EU","year":"2023","author":"E. U. A. f. Cybersecurity","key":"2024121909121365500_bib11"},{"key":"2024121909121365500_bib12","article-title":"How cyber insurance shapes incident response: a mixed methods study","volume-title":"Workshop on the Economics of Information Security","author":"Woods","year":"2021"},{"key":"2024121909121365500_bib13","article-title":"Cyber insurance and the cyber security challenge","author":"MacColl","year":"2021","journal-title":"RUSI Occasional Paper"},{"article-title":"Bridging the cyber protection gap: an investigation into the efficacy of the German cyber insurance market","year":"2023","author":"Cremer","key":"2024121909121365500_bib14"},{"key":"2024121909121365500_bib15","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MSEC.2019.2935702","article-title":"Does insurance have a future in governing cybersecurity?","volume":"18","author":"Woods","year":"2019","journal-title":"IEEE Security Privacy"},{"key":"2024121909121365500_bib16","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1109\/ICITSI50517.2020.9264966","article-title":"A systematic literature review of cyber insurance challenges","volume-title":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","author":"Aziz","year":"2020"},{"article-title":"Allianz Risk Barometer identifying the major business risks for 2024","year":"2024","author":"A. Commercial","key":"2024121909121365500_bib17"},{"article-title":"Cyber catastrophe could deter ILS investors: conning","year":"2023","author":"Evans","key":"2024121909121365500_bib18"},{"article-title":"Best's market segment report: first hard market cycle in US cyber insurance segment brings return to profitability","year":"2023","author":"Oldwick","key":"2024121909121365500_bib19"},{"key":"2024121909121365500_bib20","doi-asserted-by":"crossref","first-page":"1902","DOI":"10.1111\/risa.13657","article-title":"Systemic risks from different perspectives","volume":"42","author":"Renn","year":"2022","journal-title":"Risk Analysis"},{"key":"2024121909121365500_bib21","doi-asserted-by":"crossref","first-page":"1606","DOI":"10.1111\/risa.13715","article-title":"Systemic cyber risk and aggregate impacts","volume":"42","author":"Welburn","year":"2022","journal-title":"Risk Anal"},{"key":"2024121909121365500_bib22","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/978-3-658-37071-8_11","article-title":"Cyber-Kumulrisiko","volume-title":"Risiko im Wandel: Herausforderung f\u00fcr die Versicherungswirtschaft","author":"Cremer","year":"2023"},{"article-title":"Talking cyberinsurance with Munich Re","year":"2023","author":"Townsend","key":"2024121909121365500_bib23"},{"key":"2024121909121365500_bib24","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1080\/23738871.2021.1880609","article-title":"Why cybersecurity insurance should be regulated and compulsory","volume":"6","author":"Lemnitzer","year":"2021","journal-title":"Journal of Cyber Policy"},{"article-title":"Ransomware: an insurance market perspective","year":"2024","author":"T. G. Association","key":"2024121909121365500_bib25"},{"article-title":"Cyber insurance as a risk mitigation strategy","year":"2024","author":"T. G. Association","key":"2024121909121365500_bib26"},{"article-title":"Cyber risk accumulation: fully tackling the insurability challenge","year":"2024","author":"T. G. Association","key":"2024121909121365500_bib27"},{"key":"2024121909121365500_bib28","article-title":"A research agenda for cyber risk and cyber insurance","volume-title":"Workshop on the Economics of Information Security (WEIS)","author":"Falco","year":"(20.03.2024,   )"},{"key":"2024121909121365500_bib29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10207-023-00660-8","article-title":"Cyber insurance: state of the art, trends and future directions","volume":"22","author":"Tsohou","year":"2023","journal-title":"International Journal of Information Security"},{"key":"2024121909121365500_bib30","doi-asserted-by":"crossref","DOI":"10.1108\/GKMC-03-2023-0082","article-title":"Mapping cyber insurance: a taxonomical study using bibliometric visualization and systematic analysis","volume-title":"Global Knowledge, Memory and Communication","author":"Nobanee","year":"2023"},{"key":"2024121909121365500_bib31","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1017\/asb.2023.22","article-title":"Cyber insurance-linked securities","volume":"53","author":"Braun","year":"2023","journal-title":"ASTIN Bullet J IAA"},{"key":"2024121909121365500_bib32","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.4497405","article-title":"The supply of cyber risk insurance","volume-title":"Available at SSRN 4497405","author":"Eling","year":"2023"},{"key":"2024121909121365500_bib33","first-page":"40","article-title":"Cyber ILS: how acute demand could drive a scalable retro market","volume":"26","author":"Johansmeyer","year":"2022","journal-title":"Journal of Risk Management and Insurance"},{"key":"2024121909121365500_bib34","first-page":"1","article-title":"Perception shapes reality: how views on financial market correlation affect capital availability for cyber insurance","volume":"28","author":"Johansmeyer","year":"2024","journal-title":"Journal Risk Management and Insurance"},{"key":"2024121909121365500_bib35","first-page":"118","article-title":"How cyber model vendors see their role in closing the cyber insurance protection gap","volume":"47","author":"Johansmeyer","year":"2024","journal-title":"J Insur Issues"},{"author":"Guy Carpenter","key":"2024121909121365500_bib36","article-title":"Through the Looking Glass: interrogating the key numbers behind today's cyber market"},{"article-title":"CY-FI\u2014the future of cyber (Re)insurance","year":"2022","author":"Newman","key":"2024121909121365500_bib37"},{"article-title":"Cyber risk reinsurance issues","year":"2024","author":"A. A. o. Actuaries","key":"2024121909121365500_bib38"},{"article-title":"How big is the cyber insurance market? Can it keep growing?","year":"2024","author":"Johansmeyer","key":"2024121909121365500_bib39"},{"key":"2024121909121365500_bib40","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1057\/s41288-020-00186-3","article-title":"Exposure to catastrophe risk and use of reinsurance: an empirical evaluation for the US","volume":"47","author":"Drexler","year":"2022","journal-title":"Geneva Papers Risk Insurance-Issues Practice"},{"article-title":"Cyber in the 2020s: a question of capacity","year":"2023","author":"Re","key":"2024121909121365500_bib41"},{"article-title":"Cyber reinsurance, retro & ILS all critical to market expansion: S&P","year":"2024","author":"Evans","key":"2024121909121365500_bib42"},{"article-title":"Rule 144A catastrophe Bond","year":"2024","author":"Artemis","key":"2024121909121365500_bib43"},{"article-title":"Beazley's first 144a cyber catastrophe bond expected by year-end","year":"2024","author":"Gallin","key":"2024121909121365500_bib44"},{"article-title":"AXIS successfully closes market's first 144A cyber catastrophe bond","year":"2024","author":"Jain","key":"2024121909121365500_bib45"},{"article-title":"Beazley closes $140m cyber catastrophe bond","year":"2024","author":"Beazley","key":"2024121909121365500_bib46"},{"author":"Re","key":"2024121909121365500_bib47","article-title":"Insurance-linked securities\u2014market insights"},{"author":"Finn","key":"2024121909121365500_bib48"},{"author":"Parametrix","key":"2024121909121365500_bib49","article-title":"First-ever cloud outage catastrophe bond issued"},{"author":"Musselwhite","key":"2024121909121365500_bib50","article-title":"Beazley forecasts cyber insurance market to grow to $40bn by 2030"},{"key":"2024121909121365500_bib51","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1057\/s41288-018-0078-3","article-title":"Reducing informational disadvantages to improve cyber risk management","volume":"43","author":"Shetty","year":"2018","journal-title":"Geneva Papers Risk Insurance-Issues Practice"},{"key":"2024121909121365500_bib52","article-title":"The e-interview","volume-title":"Forum Qualitative Sozialforschung\/Forum: Qualitative Social Research","author":"Bampton","year":"2002"},{"key":"2024121909121365500_bib53","first-page":"492","article-title":"Conducting semi-structured interviews","volume":"492","author":"Newcomer","year":"2015","journal-title":"Handbook Practical Program Evaluation"},{"key":"2024121909121365500_bib54","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1002\/9781119171386.ch19","article-title":"Conducting semi-structured interviews","author":"Adams","year":"2015","journal-title":"Handbook Practical Program Evaluation"},{"article-title":"Data collection methods: semi-structured interviews and focus groups","year":"2009","author":"Harrell","key":"2024121909121365500_bib55"},{"volume-title":"Reinsurance","year":"2013","author":"Carter","key":"2024121909121365500_bib56"},{"key":"2024121909121365500_bib57","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1007\/978-0-387-34163-7_18","article-title":"The global reinsurance market","volume-title":"Handbook of International Insurance: Between Global Dynamics and Local Contingencies","author":"Holzheu","year":"2007"},{"key":"2024121909121365500_bib58","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1111\/j.1539-6975.2009.01319.x","article-title":"Securitization, insurance, and reinsurance","volume":"76","author":"Cummins","year":"2009","journal-title":"Journal of Risk and Insurance"},{"key":"2024121909121365500_bib59","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1057\/grir.2008.14","article-title":"Reinsurance brokers and advice quality: is there a need for regulation?","volume":"34","author":"Sonnenholzner","year":"2009","journal-title":"Geneva Risk Insurance Review"},{"article-title":"Revealed\u2014the world's 50 largest reinsurance companies","year":"2023","author":"Rosanes","key":"2024121909121365500_bib60"},{"article-title":"Unternehmensdatenbank BaFin","year":"2023","author":"Bafin","key":"2024121909121365500_bib61"},{"article-title":"K\u00f6lner Forschungsstelle R\u00fcckversicherung","year":"2023","author":"ivwK\u00f6ln","key":"2024121909121365500_bib62"},{"article-title":"Webpage\u2014organize. analyze. visualize. present","year":"2024","author":"MAXQDA","key":"2024121909121365500_bib63"},{"key":"2024121909121365500_bib64","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun","year":"2006","journal-title":"Quali Res Psychol"},{"key":"2024121909121365500_bib65","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1145\/3549015.3554206","article-title":"Cyber Insurance from the stakeholder's perspective: a qualitative analysis of barriers and facilitators to adoption","volume-title":"Proceedings of the 2022 European Symposium on Usable Security","author":"Branley-Bell","year":"2022"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae027\/61182503\/tyae027.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae027\/61182503\/tyae027.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T09:12:33Z","timestamp":1734599553000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae027\/7920185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,2]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae027","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2024]]},"published":{"date-parts":[[2024]]},"article-number":"tyae027"}}