{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T18:49:17Z","timestamp":1778611757508,"version":"3.51.4"},"reference-count":121,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T00:00:00Z","timestamp":1737331200000},"content-version":"vor","delay-in-days":19,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Cyber risk management involves balancing risk acceptance, avoidance, reduction, and transfer. Academic researchers have focused on risk reduction measures. Studies of cyber risk transfer are less common, mainly centering on cyber insurance. This emphasis on risk reduction overlooks the development of many real-world cyber risk transfer products in the last decade. Our study describes the emergence of products including: cyber (re)insurance, parametric insurance, warranties, and cyber cat bonds. We characterize how these solutions addressed four core challenges of transferring cyber risk: (1) tailoring coverage to the threat landscape; (2) managing solvency; (3) data collection for risk assessment; and (4) creating incentives for risk reduction. The result is an integrated history of cyber risk transfer describing how novel products and partnerships emerged to address failings in prevailing business models. Our descriptive study can help other researchers to understand real-world problems, providing a foundation for future research and a richer picture of the overall cyber risk transfer landscape, as well as a deeper understanding of the types of cyber risk that can\u2014and cannot\u2014be effectively transferred.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae028","type":"journal-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T07:42:40Z","timestamp":1731483760000},"source":"Crossref","is-referenced-by-count":7,"title":["A history of cyber risk transfer"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8569-1917","authenticated-orcid":false,"given":"Daniel W","family":"Woods","sequence":"first","affiliation":[{"name":"University of Edinburgh , School of Informatics, EH8 9AB, Edinburgh ,","place":["UK"]},{"name":"British University in Dubai , Department of Computer Science, 345015, Dubai ,","place":["UAE"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5139-5554","authenticated-orcid":false,"given":"Josephine","family":"Wolff","sequence":"additional","affiliation":[{"name":"Tufts University , The Fletcher School of Law and Diplomacy, MA 02155, Boston ,","place":["USA"]}]}],"member":"286","published-online":{"date-parts":[[2025,1,20]]},"reference":[{"key":"2025112702400295700_bib1","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/508171.508187","article-title":"Information security is information risk management","volume-title":"Proceedings of the 2001 Workshop on New Security Paradigms","author":"Blakley","year":"2001"},{"key":"2025112702400295700_bib2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/636772.636774","article-title":"A framework for using insurance for cyber-risk management","volume":"46","author":"Gordon","year":"2003","journal-title":"Commun ACM"},{"key":"2025112702400295700_bib3","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/1330311.1330325","article-title":"Information security and risk management","volume":"51","author":"Bodin","year":"2008","journal-title":"Commun ACM"},{"key":"2025112702400295700_bib4","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1111\/rmir.12169","article-title":"Cyber risk management: History and future research directions","volume":"24","author":"Eling","year":"2021","journal-title":"Risk Manage Insurance Rev"},{"key":"2025112702400295700_bib5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/MRR-10-2021-0774","article-title":"Enterprise risk management: how do firms integrate cyber risk?","volume":"47","author":"Romanosky","year":"2023","journal-title":"Manage Res Rev"},{"key":"2025112702400295700_bib6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s102070100003","article-title":"Computer security","volume":"1","author":"Landwehr","year":"2001","journal-title":"Int J Inf Secur"},{"key":"2025112702400295700_bib7","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/13665.001.0001","article-title":"Cyberinsurance policy: rethinking risk in an age of ransomware, computer fraud, data breaches, and cyberattacks","author":"Wolff","year":"2022"},{"key":"2025112702400295700_bib8","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz002","article-title":"Content analysis of cyber insurance policies: How do carriers price cyber risk?","volume":"5","author":"Romanosky","year":"2019","journal-title":"J Cybersecur"},{"key":"2025112702400295700_bib9","article-title":"WhiteHat is guaranteeing security","author":"Kerner","year":"2015","journal-title":"eWeek"},{"key":"2025112702400295700_bib10","article-title":"Insurer Beazley launches first catastrophe bond for cyber threats","author":"Smith","year":"2023","journal-title":"Financial Times"},{"key":"2025112702400295700_bib11","first-page":"358","article-title":"Why information security is hard\u2014an economic perspective","volume-title":"Proceedings of the Computer Security Applications Conference","author":"Anderson","year":"2001"},{"key":"2025112702400295700_bib12","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","article-title":"The economics of information security","volume":"314","author":"Anderson","year":"2006","journal-title":"Science"},{"key":"2025112702400295700_bib13","article-title":"SentinelOne\u2019s $1m ransomware guarantee dismissed as PR stunt","author":"Leyden","year":"2016","journal-title":"The Register"},{"key":"2025112702400295700_bib14","article-title":"Deep Instinct to offer $3 million ransomware warranty","author":"Zurier","year":"2021","journal-title":"SC Media"},{"key":"2025112702400295700_bib15","article-title":"Measuring the changing cost of cybercrime","volume-title":"Workshop on the Economics of Information Security","author":"Anderson","year":"2019"},{"key":"2025112702400295700_bib16","article-title":"Silicon Den: cybercrime is entrepreneurship","volume-title":"Workshop on the Economics of Information Security (WEIS)","author":"Anderson","year":"2021"},{"key":"2025112702400295700_bib17","article-title":"Models and measures for correlation in cyber-insurance","volume-title":"Workshop on the Economics of Information Security","author":"B\u00f6hme","year":"2006"},{"key":"2025112702400295700_bib18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/23738871.2020.1728355","article-title":"On market concentration and cybersecurity risk","volume":"5","author":"Geer","year":"2020","journal-title":"J Cyber Policy"},{"key":"2025112702400295700_bib19","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1126\/science.aaz4795","article-title":"Cyber risk research impeded by disciplinary barriers","volume":"366","author":"Falco","year":"2019","journal-title":"Science"},{"key":"2025112702400295700_bib20","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1093\/cybsec\/tyw002","article-title":"The economics of mandatory security breach reporting to authorities","volume":"2","author":"Laube","year":"2016","journal-title":"J Cybersecur"},{"key":"2025112702400295700_bib21","first-page":"909","article-title":"SoK: quantifying cyber risk","volume-title":"IEEE Symposium on Security and Privacy","author":"Woods","year":"2021"},{"key":"2025112702400295700_bib22","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/365181.365229","article-title":"Insurance and the computer industry","volume":"44","author":"Schneier","year":"2001","journal-title":"Commun ACM"},{"key":"2025112702400295700_bib23","article-title":"Modeling cyber-insurance: towards a unifying framework","volume-title":"Workshop on the Economics of Information Security","author":"B\u00f6hme","year":"2010"},{"key":"2025112702400295700_bib24","doi-asserted-by":"crossref","DOI":"10.4324\/9780203850596","article-title":"Insurance theory and practice","author":"Thoyts","year":"2010"},{"key":"2025112702400295700_bib25","doi-asserted-by":"crossref","DOI":"10.1201\/9780367802745","article-title":"Modern actuarial theory and practice","author":"Booth","year":"2020"},{"key":"2025112702400295700_bib26","first-page":"5","article-title":"Back to the future of cyber insurance","volume":"3","author":"Baker","year":"2019","journal-title":"Professional Liability Underwriting Society"},{"key":"2025112702400295700_bib27","article-title":"On Making Lemonade","volume":"1","author":"Sagalow","year":"2019","journal-title":"Not Unreasonable Podcast"},{"key":"2025112702400295700_bib28","article-title":"Do data breach disclosure laws reduce identity theft?","volume-title":"Workshop on the Economics of Information Security","author":"Romanosky","year":"2008"},{"key":"2025112702400295700_bib29","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/11336.001.0001","article-title":"You\u2019ll see this message when it is too late: the legal and economic aftermath of cybersecurity breaches","author":"Wolff","year":"2018"},{"key":"2025112702400295700_bib30","article-title":"2016 Data Breach Investigations Report","author":"Verizon","year":"2016"},{"key":"2025112702400295700_bib31","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1140\/epjb\/e2015-60754-4","article-title":"The extreme risk of personal data breaches and the erosion of privacy","volume":"89","author":"Wheatley","year":"2016","journal-title":"Eur Phys J B"},{"key":"2025112702400295700_bib32","article-title":"Cyberattack insurance a challenge for business","author":"Perlroth","year":"2014","journal-title":"New York Times"},{"key":"2025112702400295700_bib33","article-title":"Target data breach prompts insurers to scale back cyber coverage for retailers","author":"Greenwald","year":"2014","journal-title":"Bus Insur"},{"key":"2025112702400295700_bib34","article-title":"State of the cyber (re)insurance market","author":"Scor","year":"2017"},{"key":"2025112702400295700_bib35","article-title":"The extortion economy: how insurance companies are fueling a rise in ransomware attacks","author":"Dudley","year":"2019","journal-title":"ProPublica"},{"key":"2025112702400295700_bib36","article-title":"The county fair cyber loss distribution: drawing inference from insurance prices","volume-title":"Workshop on the Economics of Information Security","author":"Woods","year":"2019"},{"key":"2025112702400295700_bib37","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSEC.2019.2935702","article-title":"Does insurance have a future in governing cybersecurity?","volume":"18","author":"Woods","year":"2020","journal-title":"IEEE Security and Privacy"},{"key":"2025112702400295700_bib38","article-title":"Cyber insurance and the cyber security challenge","author":"MacColl","year":"2021","journal-title":"Royal United Services Institute Occasional Paper Series"},{"key":"2025112702400295700_bib39","first-page":"967","article-title":"The technologization of insurance: an empirical analysis of big data and artificial intelligence\u2019s impact on cybersecurity and privacy","author":"Talesh","year":"2021","journal-title":"Utah Law Rev"},{"key":"2025112702400295700_bib40","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3141409","article-title":"Roles for policy-makers in emerging cyber insurance industry partnerships","author":"Wolff","year":"2018"},{"key":"2025112702400295700_bib41","article-title":"How cyber insurance shapes incident response: a mixed methods study","volume-title":"Workshop on the Economics of Information Security","author":"Woods","year":"2021"},{"key":"2025112702400295700_bib42","article-title":"Arch to back coalition cyber insurance programs with long-term capacity","author":"Writers","year":"2021","journal-title":"Insurance J"},{"key":"2025112702400295700_bib43","article-title":"Travelers expands cyber capabilities with acquisition of Corvus Insurance","author":"Jain","year":"2023"},{"key":"2025112702400295700_bib44","article-title":"Chubb and SentinelOne Partner to enhance cyber risk management","volume-title":"Yahoo Finance","author":"Group C","year":"2023"},{"key":"2025112702400295700_bib45","article-title":"Microsoft and At-Bay partner to offer data-driven cyber insurance coverage","author":"Center","year":"2021"},{"key":"2025112702400295700_bib46","article-title":"Cowbell and Swiss Re Partner to offer first ever cyber insurance program dedicated to cloud workloads","author":"Cowbell","year":"2022"},{"key":"2025112702400295700_bib47","article-title":"Risk Protection Program Preview","author":"Google","year":"2021"},{"key":"2025112702400295700_bib48","article-title":"Solving cyber risk: protecting your company and society","author":"Coburn","year":"2018"},{"key":"2025112702400295700_bib49","article-title":"Are insurers adequately balancing risk and opportunity? Findings Findings from PwC\u2019s global cyber insurance survey","author":"PricewaterhouseCoopers","year":"2018"},{"key":"2025112702400295700_bib50","article-title":"Cyber reinsurance in the \u201dnew normal\u201d","author":"Cordonnier","year":"2020"},{"key":"2025112702400295700_bib51","first-page":"553","article-title":"Herding vulnerable cats: A statistical approach to disentangle joint responsibility for web security in shared hosting","volume-title":"Proceedings\u2009of the Conference on Computer and Communications Security","author":"Tajalizadehkhoob","year":"2017"},{"key":"2025112702400295700_bib52","article-title":"Ranking email security solutions a data analysis of cyber insurance claims","author":"Tyra","year":"2023"},{"key":"2025112702400295700_bib53","article-title":"Cloud Protection + Innovative Cyber Solutions for Google Cloud Customers Fact Sheet","author":"Allianz and\u00a0MunichRE","year":"2021"},{"key":"2025112702400295700_bib54","first-page":"421","article-title":"How privilege undermines cybersecurity","volume":"36","author":"Schwarcz","year":"2023","journal-title":"Harvard J Law Technol"},{"key":"2025112702400295700_bib55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/CyberSA49311.2020.9139703","article-title":"The data that drives cyber insurance: a study into the underwriting and claims processes","volume-title":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","author":"Nurse","year":"2020"},{"key":"2025112702400295700_bib56","article-title":"With rising cyber insurance costs and requirements, consider new alternatives to fight ransomware","author":"Lawson","year":"2021"},{"key":"2025112702400295700_bib57","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.procs.2023.01.320","article-title":"Consumer cyber insurance as risk transfer: a coverage analysis","volume":"219","author":"Sch\u00fctz","year":"2023","journal-title":"Procedia Computer Sci"},{"key":"2025112702400295700_bib58","article-title":"\u201cWhy would money protect me from cyber bullying?\u201d: a mixed-methods study of personal cyber insurance","volume-title":"46th IEEE Symposium on Security and Privacy","author":"Jain","year":"2024"},{"key":"2025112702400295700_bib59","article-title":"SentinelOne establishes $1 million cyber threat protection warranty giving first-ever industry assurance against growing threats","author":"Ciulla","year":"2016"},{"key":"2025112702400295700_bib60","article-title":"Assurant partners with MyDigitalShield to offer small businesses protection against data breaches.","author":"Byrd","year":"2016"},{"key":"2025112702400295700_bib61","article-title":"Cymmetria offers $1m warranty to make cybersecurity more accountable","author":"Mott","year":"2016","journal-title":"Tom\u2019s Hardware"},{"key":"2025112702400295700_bib62","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1145\/3360310","article-title":"Cyber warranties: market fix or marketing trick?","volume":"63","author":"Woods","year":"2020","journal-title":"Commun ACM"},{"key":"2025112702400295700_bib63","article-title":"Rubrik enterprise edition ransomware recovery warranty agreement","author":"Rubrik, Inc.","year":"2022"},{"key":"2025112702400295700_bib64","article-title":"AsTech offers a $5 million security breach warranty","author":"Dark Reading Staff","year":"2017","journal-title":"Dark Reading"},{"key":"2025112702400295700_bib65","article-title":"CrowdStrike to pay up to $1 million warranty if its clients suffer a data breach","author":"Cimpanu","year":"2018","journal-title":"Bleeping Computer"},{"key":"2025112702400295700_bib66","article-title":"Cybereason announces $1 million comprehensive breach protection warranty","author":"Reghellin","year":"2020","journal-title":"IT Security Guru"},{"key":"2025112702400295700_bib67","article-title":"ThreatAdvice breach prevention warranty","author":"ThreatAdvice","year":"2020"},{"key":"2025112702400295700_bib68","article-title":"Up to $5m compensation if Rubrik Cloud Vault recovery busted","author":"Mellor","year":"2022","journal-title":"Blocks Files"},{"key":"2025112702400295700_bib69","article-title":"Arctic Wolf Backs Security Operations Portfolio with $1 million service assurance benefit","author":"Wolf","year":"2021"},{"key":"2025112702400295700_bib70","article-title":"Introducing the Sophos Breach Protection Warranty","author":"Harrison","year":"2022"},{"key":"2025112702400295700_bib71","article-title":"Kroll adds complimentary $1 million incident protection warranty to managed detection and response (MDR) service","author":"Cusi","year":"2022","journal-title":"Business Wire"},{"key":"2025112702400295700_bib72","article-title":"Defendify launches $1 million cybersecurity service warranty to insulate organizations financially from the damages of cyber threats","author":"Defendify","year":"2022"},{"key":"2025112702400295700_bib73","article-title":"Dell delivers cyber recovery guarantee","author":"Dell","year":"2023"},{"key":"2025112702400295700_bib74","article-title":"Rubrik Ups the Ante with $10 million ransomware recovery warranty","author":"Rubrik","year":"2023"},{"key":"2025112702400295700_bib75","article-title":"Veeam ransomware recovery warranty veeam has you covered","author":"Veeam","year":"2023"},{"key":"2025112702400295700_bib76","article-title":"Barracuda partners with Cork to offer cyber warranty created exclusively for customers of MSPs","author":"Barracuda","year":"2023"},{"key":"2025112702400295700_bib77","article-title":"PCH Technologies launches cyber warranty program for small business clients, powered by CorkTM","author":"Business Wire","year":"2023","journal-title":"Yahoo Finance"},{"key":"2025112702400295700_bib78","article-title":"Adlumin unveils warranty and cyber insurance offerings that make coverage attainable and affordable for previously unprotected small and mid-sized organizations","author":"Adlumin","year":"2023"},{"key":"2025112702400295700_bib79","volume-title":"Munich Re and CloudCover announce partnership","author":"Jimenez-Sanchez","year":"2023"},{"key":"2025112702400295700_bib80","article-title":"Cork Cyber Warranty becomes available through Liongard MSP Partners","author":"Christian","year":"2023"},{"key":"2025112702400295700_bib81","volume-title":"CrowdStrike CEO George Kurtz bets on community immunity for breach protection","author":"Albertson","year":"2022"},{"key":"2025112702400295700_bib82","article-title":"No more snake oil: why infosec needs security guarantees","author":"Grossman","year":"2015"},{"key":"2025112702400295700_bib83","volume-title":"Cyber Warranties: What to Know, What to Ask","author":"Sheridan","year":"2018"},{"key":"2025112702400295700_bib84","article-title":"QOMPLX and Chaucer launch multi-peril parametric insurance for SME\u2019s","author":"Evans","year":"2019"},{"key":"2025112702400295700_bib85","article-title":"QOMPLX and Chaucer launch first-ever parametric multi-peril insurance product for small-to-medium enterprises","author":"QOMPLX","year":"2019"},{"key":"2025112702400295700_bib86","article-title":"Parametric cloud outage cyber risk transfer deal backed by Hiscox","author":"Evans","year":"2020"},{"key":"2025112702400295700_bib87","article-title":"How Cloud Downtime insurance became a thing","author":"Howard","year":"2022","journal-title":"Insurance J"},{"key":"2025112702400295700_bib88","article-title":"Startup Sells Insurance Coverage for Cloud Outages","author":"McCormick","year":"2022","journal-title":"Wall Street J"},{"key":"2025112702400295700_bib89","article-title":"Downtime insurance for cloud services","author":"Insurance","year":"2022"},{"key":"2025112702400295700_bib90","article-title":"QOMPLX: protection for small businesses","author":"QOMPLX","year":"2020"},{"key":"2025112702400295700_bib91","doi-asserted-by":"publisher","first-page":"63","DOI":"10.5325\/jinfopoli.11.2021.0063","article-title":"Early GDPR penalties: analysis of implementation and fines through May 2020","volume":"11","author":"Wolff","year":"2021","journal-title":"J Inform Policy"},{"key":"2025112702400295700_bib92","article-title":"What is Parametric Insurance?","author":"Cohen","year":"2020"},{"key":"2025112702400295700_bib93","article-title":"Cyber in the 2020s: a question of capacity","author":"GallagherRe","year":"2021"},{"key":"2025112702400295700_bib94","article-title":"Supervisory Statement | SS4\/17: cyber insurance underwriting risk","author":"Bank of England Prudential Regulation Authority","year":"2017"},{"key":"2025112702400295700_bib95","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1080\/23738871.2017.1360927","article-title":"Policy measures and cyber insurance: a framework","volume":"2","author":"Woods","year":"2017","journal-title":"J Cyber Policy"},{"key":"2025112702400295700_bib96","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1057\/s41288-020-00183-6","article-title":"Affirmative and silent cyber coverage in traditional insurance policies: Qualitative content analysis of selected insurance products from the German insurance market","volume":"45","author":"Wrede","year":"2020","journal-title":"Geneva Papers Risk Insurance Issues Practice"},{"key":"2025112702400295700_bib97","article-title":"CY\u2013FI The Future of Cyber (Re)insurance","author":"Newman","year":"2020"},{"key":"2025112702400295700_bib98","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1080\/10920277.2022.2034507","article-title":"The economic impact of extreme cyber risk scenarios","author":"Eling","year":"2022","journal-title":"North American Actuarial J"},{"key":"2025112702400295700_bib99","first-page":"40","article-title":"Cyber ILS: How acute demand could drive a scalable retro market","volume":"26","author":"Johansmeyer","year":"2022","journal-title":"J Risk Manage Insurance"},{"key":"2025112702400295700_bib100","article-title":"The defence implications of increased cyber reinsurance concentrations","author":"Johansmeyer","year":"2022"},{"key":"2025112702400295700_bib101","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1057\/s41288-020-00176-5","article-title":"Cyber insurance offering and performance: an analysis of the US cyber insurance market","volume":"45","author":"Xie","year":"2020","journal-title":"Geneva Papers Risk Insurance Issues Practice"},{"key":"2025112702400295700_bib102","article-title":"Silent cyber drives Petya loss to $2.7 billion, says PCS","author":"Gallin","year":"2018","journal-title":"Reinsurance News"},{"key":"2025112702400295700_bib103","doi-asserted-by":"publisher","first-page":"tyae003","DOI":"10.1093\/cybsec\/tyae003","article-title":"The barriers to sustainable risk transfer in the cyber-insurance market","volume":"10","author":"Skeoch","year":"2024","journal-title":"J Cybersecur"},{"key":"2025112702400295700_bib104","article-title":"Munich Re takes hard line on narrower cyber war exclusions","author":"Shi","year":"2023","journal-title":"Insurance Insider"},{"key":"2025112702400295700_bib105","article-title":"Chubb cancels mammoth cyber QS as it mulls 2023 XoL","author":"The Insurer","year":"2023"},{"key":"2025112702400295700_bib106","article-title":"Operational Re IV Ltd, $217.25m op-risk cat bond issued, likely for Credit Suisse","author":"Evans","year":"2023"},{"key":"2025112702400295700_bib107","article-title":"Beazley launches market\u2019s first cyber catastrophe bond","author":"Beazley","year":"2023"},{"key":"2025112702400295700_bib108","article-title":"Swiss Re successfully prices market\u2019s first industry-loss cyber cat bond","author":"Evans","year":"2023"},{"key":"2025112702400295700_bib109","article-title":"Coalition launches $300m Ferian Re to provide third-party cyber risk capital","author":"Evans","year":"2022"},{"key":"2025112702400295700_bib110","article-title":"Catastrophe bond market hits new record size of $38.2bn","author":"Evans","year":"2023"},{"key":"2025112702400295700_bib111","article-title":"Maybe Wall Street has the solution to stopping cyber attacks","author":"Bruschi","year":"2016","journal-title":"Wired"},{"key":"2025112702400295700_bib112","article-title":"Cyber insurers track privacy exposures","author":"Lerner","year":"2023"},{"key":"2025112702400295700_bib113","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3390\/risks8020045","article-title":"Towards an economic cyber loss index for parametric cover based on IT security indicator: a preliminary analysis","volume":"8","author":"Dal\u00a0Moro","year":"2020","journal-title":"Risks"},{"key":"2025112702400295700_bib114","article-title":"Is the fear of cyberwar worse than cyberwar itself?","author":"Johansmeyer","year":"2022"},{"key":"2025112702400295700_bib115","article-title":"Through the Looking Glass: Interrogating the key numbers behind today\u2019s cyber market","author":"GuyCarpenter","year":"2023"},{"key":"2025112702400295700_bib116","article-title":"Active cyber risk modeling: a modern approach to cyber risk aggregation","author":"Coalition","year":"2023"},{"key":"2025112702400295700_bib117","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/EuroSP51992.2021.00037","article-title":"SoK: a framework for asset discovery: systematizing advances in network measurements for protecting organizations","volume-title":"2021 IEEE European Symposium on Security and Privacy (EuroS&P)","author":"Vermeer","year":"2021"},{"key":"2025112702400295700_bib118","first-page":"5257","article-title":"Behavior ever follows intention? A validation of the Security Behavior Intentions Scale (SeBIS)","volume-title":"Proceedings\u2009of the Conference\u2009on Human Factors in Computing Systems","author":"Egelman","year":"2016"},{"key":"2025112702400295700_bib119","doi-asserted-by":"crossref","first-page":"S64","DOI":"10.1016\/j.diin.2010.05.009","article-title":"Digital forensics research: The next 10\u00a0years","volume":"7","author":"Garfinkel","year":"2010","journal-title":"Digital Investigation"},{"key":"2025112702400295700_bib120","article-title":"Measuring up to (reasonable) consumer expectations: providing an empirical basis for holding IoT manufacturers legally responsible","volume-title":"Proceedings of the 32nd USENIX Security Symposium","author":"Kustosch","year":"2023"},{"key":"2025112702400295700_bib121","article-title":"At-Bay launches new admitted cyber insurance for small firms","author":"Clere","year":"2023","journal-title":"InsurTech"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyae028\/61510645\/tyae028.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyae028\/61510645\/tyae028.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T07:40:18Z","timestamp":1764229218000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae028\/7962043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":121,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae028","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyae028"}}