{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T18:47:13Z","timestamp":1778611633767,"version":"3.51.4"},"reference-count":75,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"vor","delay-in-days":16,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100014013","name":"UKRI","doi-asserted-by":"publisher","award":["EP\/V011189\/1"],"award-info":[{"award-number":["EP\/V011189\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The adoption of digital technology creates the potential for new harms. Given that risk prevention solutions are imperfect, individuals may wish to transfer digital risk to an insurer. It is unclear whether existing insurance policies cover these harms, or whether specialized consumer cyber insurance products are available. We address this research gap by conducting a content analysis of 50 insurance policies, 32 in the USA and 18 in the UK. Our analysis of 26 home insurance policies reveals that insurers typically exclude digital perils (losses caused by computer viruses, hacking, or cyber attacks), but include coverage for digital assets (devices and downloaded data) impacted by conventional perils. A minority of home insurance policies affirmatively cover digital perils such as identity theft and social media defamation. Our analysis of 24 consumer cyber insurance products identifies 6 core perils that are generally covered: cyber attack, data breach, ransomware, online fraud, cyberbullying, and identity theft. Finally, pricing information from 21 policies reveals that specialist cyber policies typically cost between $20 and $150. One insurer\u2019s actuarial calculations suggest that the expected losses range from $2 (online fraud) to $9 (computer attack). These findings can help users form strategies to manage digital risk.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae031","type":"journal-article","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:06:41Z","timestamp":1737119201000},"source":"Crossref","is-referenced-by-count":2,"title":["Insurance versus digital harm: a content analysis of home and cyber insurance policies in the USA and UK"],"prefix":"10.1093","volume":"11","author":[{"given":"Rachiyta","family":"Jain","sequence":"first","affiliation":[{"name":"School of Informatics, University of Edinburgh , Edinburgh, EH8 9AB ,","place":["United Kingdom"]}]},{"given":"Temima","family":"Hrle","sequence":"additional","affiliation":[{"name":"School of Informatics, University of Edinburgh , Edinburgh, EH8 9AB ,","place":["United Kingdom"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8569-1917","authenticated-orcid":false,"given":"Daniel W","family":"Woods","sequence":"additional","affiliation":[{"name":"School of Informatics, University of Edinburgh , Edinburgh, EH8 9AB ,","place":["United Kingdom"]},{"name":"Department of Computer Science, British University in Dubai , Dubai, PO Box 345015 ,","place":["UAE"]}]}],"member":"286","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"2025021914453553400_bib1","first-page":"393","article-title":"Now I\u2019m a bit angry\u201d individuals\u2019 awareness, perception, and responses to data breaches that affected them","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security 21)","author":"Mayer","year":"2021"},{"key":"2025021914453553400_bib2","first-page":"155","article-title":"\u201cI was told to buy a software or lose my computer. I ignored it\u201d: a study of ransomware","volume-title":"Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Simoiu","year":"2019"},{"key":"2025021914453553400_bib3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2335356.2335362","article-title":"Smart, useful, scary, creepy: perceptions of online behavioral advertising","volume-title":"Proceedings of the 8th Symposium on Usable Privacy and Security","author":"Ur","year":"2012"},{"key":"2025021914453553400_bib4","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1002\/pam.20567","article-title":"Do data breach disclosure laws reduce identity theft?","volume":"30","author":"Romanosky","year":"2011","journal-title":"J Policy Anal Manage"},{"key":"2025021914453553400_bib5","doi-asserted-by":"publisher","first-page":"148353","DOI":"10.1109\/ACCESS.2021.3123894","article-title":"Cryptocurrency scams: analysis and perspectives","volume":"9","author":"Bartoletti","year":"2021","journal-title":"IEEE Access"},{"key":"2025021914453553400_bib6","first-page":"247","article-title":"SoK: Hate, harassment, and the changing landscape of online abuse","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Thomas","year":"2021"},{"key":"2025021914453553400_bib7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MC.2020.2983711","article-title":"21 years of distributed denial-of service: current state of affairs","volume":"53","author":"Osterweil","year":"2020","journal-title":"Computer"},{"key":"2025021914453553400_bib8","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1109\/SP.2016.24","article-title":"I think they\u2019re trying to tell me something: advice sources and selection for digital security","volume-title":"Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP)","author":"Redmiles","year":"2016"},{"key":"2025021914453553400_bib9","first-page":"89","article-title":"A comprehensive quality evaluation of security and privacy advice on the web","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Redmiles","year":"2020"},{"key":"2025021914453553400_bib10","volume-title":"Security Engineering","author":"Anderson","year":"2008"},{"key":"2025021914453553400_bib11","doi-asserted-by":"crossref","DOI":"10.4324\/9780203850596","volume-title":"Insurance Theory and Practice","author":"Thoyts","year":"2010"},{"key":"2025021914453553400_bib12","first-page":"197","article-title":"Outsourcing regulation: how insurance reduces moral hazard","volume":"111","author":"Ben-Shahar","year":"2012","journal-title":"Mich L Rev"},{"key":"2025021914453553400_bib13","first-page":"5","article-title":"Back to the future of cyber insurance","volume":"3","author":"Baker","year":"2019","journal-title":"Prof Liab Underw Soc"},{"key":"2025021914453553400_bib14","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1057\/s41288-020-00183-6","article-title":"Affirmative and silent cyber coverage in traditional insurance policies: qualitative content analysis of selected insurance products from the German insurance market","volume":"45","author":"Wrede","year":"2020","journal-title":"Geneva Pap Risk Insur-Issues Pract"},{"key":"2025021914453553400_bib15","first-page":"102","article-title":"A semantic framework for analyzing \u201csilent cyber\u201d","volume":"55","author":"Castriotta","year":"2022","journal-title":"J Financ Trans"},{"key":"2025021914453553400_bib16","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/13665.001.0001","volume-title":"Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks","author":"Wolff","year":"2022"},{"key":"2025021914453553400_bib17","doi-asserted-by":"publisher","first-page":"tyz002","DOI":"10.1093\/cybsec\/tyz002","article-title":"Content analysis of cyber insurance policies: How do carriers price cyber risk?","volume":"5","author":"Romanosky","year":"2019","journal-title":"J Cybersecur"},{"key":"2025021914453553400_bib18","first-page":"1","article-title":"Cyberspace and personal cyber insurance: a systematic review","volume":"64","author":"McGregor","year":"2023","journal-title":"J Comput Inf Syst"},{"key":"2025021914453553400_bib19","first-page":"36","article-title":"Personal Identity Insurance: Coverage and Pricing in the US","volume":"57","author":"Woods","year":"2023","journal-title":"J Financ Trans"},{"key":"2025021914453553400_bib20","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MC.2019.2898720","article-title":"Thoughts on cyberbullying","volume":"52","author":"Kshetri","year":"2019","journal-title":"Computer"},{"key":"2025021914453553400_bib21","article-title":"Lloyd\u2019s launches new cryptocurrency wallet insurance solution for Coincover","author":"Lloyd\u2019s of London","year":"2019"},{"key":"2025021914453553400_bib22","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/978-3-642-39884-1_29","article-title":"Interdependent privacy: Let me share your data","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Bicz\u00f3k","year":"2013"},{"key":"2025021914453553400_bib23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3449119","article-title":"Owning and sharing: Privacy perceptions of smart speaker users","volume":"5","author":"Meng","year":"2021","journal-title":"Proc ACM Hum Comput Interact"},{"key":"2025021914453553400_bib24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3589958","article-title":"Awareness, intention,(In) action: individuals\u2019 reactions to data breaches","volume":"30","author":"Mayer","year":"2023","journal-title":"ACM Trans Comput Hum Interact"},{"key":"2025021914453553400_bib25","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1332\/239868021X16290304343529","article-title":"\u201cI feel like we\u2019re really behind the game\u201d: perspectives of the United Kingdom\u2019s intimate partner violence support sector on the rise of technology-facilitated abuse","volume":"5","author":"Tanczer","year":"2021","journal-title":"J Gender Based\u00a0Viol"},{"key":"2025021914453553400_bib26","article-title":"Modeling Cyber-Insurance: Towards a Unifying Framework","volume-title":"Proceedings of the Workshop on the Economics of Information Security","author":"B\u00f6hme","year":"2010"},{"key":"2025021914453553400_bib27","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cosrev.2017.01.001","article-title":"Cyber-insurance survey","volume":"24","author":"Marotta","year":"2017","journal-title":"Comput Sci Rev"},{"key":"2025021914453553400_bib28","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1057\/s41288-018-0083-6","article-title":"Cyber risk and cyber risk insurance: status quo and future research","volume":"43","author":"Eling","year":"2018","journal-title":"Geneva Pap Risk Insur: Issues Pract"},{"key":"2025021914453553400_bib29","first-page":"293","article-title":"SoK: cyber insurance\u2014technical challenges and a system security roadmap","volume-title":"\u00a0Proceedings of the IEEE Symposium on Security and Privacy","author":"Dambra","year":"2020"},{"key":"2025021914453553400_bib30","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1007\/s10207-023-00660-8","article-title":"Cyber insurance: state of the art, trends and future directions","volume":"22","author":"Tsohou","year":"2023","journal-title":"Int J Inf Secur"},{"key":"2025021914453553400_bib31","article-title":"Cyberinsurance as a market-based solution to the problem of cybersecurity: a case study","volume-title":"Workshop on the Economics of Information Security","author":"Kesan","year":"2005"},{"key":"2025021914453553400_bib32","first-page":"1948","article-title":"A new perspective on internet security using insurance","volume-title":"Proceedings of the 27th Conference on Computer Communications","author":"Bolot","year":"2008"},{"key":"2025021914453553400_bib33","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-1-4419-6967-5_12","article-title":"Competitive cyber-insurance and internet security","volume-title":"Economics of Information Security and Privacy","author":"Shetty","year":"2010"},{"key":"2025021914453553400_bib34","article-title":"Cyberinsurance and public policy: self-protection and insurance with endogenous adversaries","volume-title":"Workshop on the Economics of Information Security","author":"Massacci","year":"2017"},{"key":"2025021914453553400_bib35","doi-asserted-by":"publisher","first-page":"tyz010","DOI":"10.1093\/cybsec\/tyz010","article-title":"Embracing and controlling risk dependency in cyber-insurance policy underwriting","volume":"5","author":"Khalili","year":"2019","journal-title":"J Cybersecur"},{"key":"2025021914453553400_bib36","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSEC.2019.2935702","article-title":"Does insurance have a future in governing cybersecurity?","volume":"18","author":"Woods","year":"2020","journal-title":"IEEE Secur Priv"},{"key":"2025021914453553400_bib37","author":"MacColl","year":"2021","journal-title":"Cyber Insurance and the Cyber Security Challenge"},{"key":"2025021914453553400_bib38","first-page":"967","article-title":"The technologization of insurance: an empirical analysis of big data and artificial intelligence\u2019s impact on cybersecurity and privacy","volume":"5","author":"Talesh","year":"2021","journal-title":"Utah Law Rev"},{"key":"2025021914453553400_bib39","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.cose.2017.04.010","article-title":"The cyber insurance market in Sweden","volume":"68","author":"Franke","year":"2017","journal-title":"Comput Secur"},{"key":"2025021914453553400_bib40","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1111\/lsi.12303","article-title":"Data breach, privacy, and cyber insurance: how insurance companies act as \u201ccompliance managers\u201d for businesses","volume":"43","author":"Talesh","year":"2018","journal-title":"Law Soc Inq"},{"key":"2025021914453553400_bib41","article-title":"The data that drives cyber insurance: a study into the underwriting and claims processes","volume-title":"Proceedings of the 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA)","author":"Nurse","year":"2019"},{"key":"2025021914453553400_bib42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CyberSA.2019.8899641","article-title":"Analysing cyber-insurance claims to design harm-propagation trees","volume-title":"Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA)","author":"Axon","year":"2019"},{"key":"2025021914453553400_bib43","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1057\/s41288-020-00168-5","article-title":"Insurance definitions of cyber war","volume":"45","author":"Woods","year":"2020","journal-title":"Geneva Pap Risk Insur Issues Pract"},{"key":"2025021914453553400_bib44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3434403","article-title":"The county fair cyber loss distribution: drawing inference from insurance prices","volume-title":"Digital Threats: Research and Practice","author":"Woods","year":"2021"},{"key":"2025021914453553400_bib45","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1057\/s41288-020-00176-5","article-title":"Cyber insurance offering and performance: an analysis of the US cyber insurance market","volume":"45","author":"Xie","year":"2020","journal-title":"Geneva Pap Risk Insur Issues Pract"},{"key":"2025021914453553400_bib46","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s13174-017-0059-y","article-title":"Mapping the coverage of security controls in cyber insurance proposal forms","volume":"8","author":"Woods","year":"2017","journal-title":"\u00a0J Internet Serv Appl"},{"key":"2025021914453553400_bib47","first-page":"2259","article-title":"Lessons lost: incident response in the age of cyber insurance and breach attorneys","volume-title":"Proceedings of the 32nd USENIX Security Symposium","author":"Woods","year":"2023"},{"issue":"2","key":"2025021914453553400_bib48","first-page":"467","article-title":"Insuring AI: the role of insurance in artificial intelligence regulation","volume":"35","author":"Lior","year":"2022","journal-title":"Harvard J Law Technol"},{"key":"2025021914453553400_bib49","first-page":"75","article-title":"Insuring crypto: the birth of digital asset insurance","volume":"2021","author":"Zuckerman","year":"2021","journal-title":"U Ill JL Tech and Pol\u2019y"},{"key":"2025021914453553400_bib50","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.procs.2023.01.320","article-title":"Consumer cyber insurance for risk transfer: a coverage analysis","volume":"219","author":"Sch\u00fctz","year":"2023","journal-title":"Procedia Comput Sci"},{"key":"2025021914453553400_bib51","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11135-017-0574-8","article-title":"Saturation in qualitative research: exploring its conceptualization and operationalization","volume":"52","author":"Saunders","year":"2018","journal-title":"Qual Quant"},{"key":"2025021914453553400_bib52","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1080\/00380237.2018.1544514","article-title":"A pragmatic definition of the concept of theoretical saturation","volume":"52","author":"Low","year":"2019","journal-title":"Sociol Focus"},{"key":"2025021914453553400_bib53","article-title":"Top 100\u00a0U.S. property and casualty insurance companies","author":"Reinsurance News","year":"2022"},{"key":"2025021914453553400_bib54","first-page":"1263","article-title":"Reevaluating standardized insurance policies","volume":"78","author":"Schwarcz","year":"2011","journal-title":"Univ Chicago Law Rev"},{"key":"2025021914453553400_bib55","first-page":"73","article-title":"A concurrent mess and a call for clarity in first-party property insurance coverage analysis","volume":"18","author":"Bell","year":"2011","journal-title":"Conn Ins LJ"},{"key":"2025021914453553400_bib56","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1111\/j.1365-2648.2007.04569.x","article-title":"The qualitative content analysis process","volume":"62","author":"Elo","year":"2008","journal-title":"J Adv Nurs"},{"key":"2025021914453553400_bib57","volume-title":"The Coding Manual for Qualitative Researchers","author":"Salda\u00f1a","year":"2021"},{"key":"2025021914453553400_bib58","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-030-15636-7_8","article-title":"Qualitative text analysis: A systematic approach","volume-title":"Compendium for Early Career Researchers in Mathematics Education","author":"Kuckartz","year":"2019"},{"key":"2025021914453553400_bib59","first-page":"161","article-title":"A fundamental approach to cyber risk analysis","volume":"12","author":"B\u00f6hme","year":"2019","journal-title":"Variance"},{"key":"2025021914453553400_bib60","first-page":"1","article-title":"\u201cWhy would money protect me from cyber bullying?\u201d: A mixed-methods study of personal cyber insurance","volume-title":"Proceedings of the 46th IEEE Symposium on Security and Privacy","author":"Jain","year":"2024"},{"key":"2025021914453553400_bib61","first-page":"305","article-title":"\u201cLike Lesbians Walking the Perimeter\u201d: experiences of U.S. LGBTQ+ Folks with online security, safety, and privacy advice","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security 22)","author":"Geeng","year":"2022"},{"key":"2025021914453553400_bib62","first-page":"341","article-title":"Networks of care: tech abuse advocates\u2019 digital security practices","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security 22)","author":"Slupska","year":"2022"},{"key":"2025021914453553400_bib63","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1145\/2998181.2998224","article-title":"Defining digital self-harm","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing","author":"Pater","year":"2017"},{"key":"2025021914453553400_bib64","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1108\/978-1-83982-848-520211049","article-title":"Threat modeling intimate partner violence: tech abuse as a cybersecurity challenge in the internet of things","volume-title":"The Emerald International Handbook of Technology-facilitated Violence and Abuse","author":"Slupska","year":"2021"},{"key":"2025021914453553400_bib65","first-page":"909","article-title":"SoK: quantifying cyber risk","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Woods","year":"2021"},{"key":"2025021914453553400_bib66","first-page":"1","article-title":"A large-scale measurement of cybercrime against individuals","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems","author":"Breen","year":"2022"},{"key":"2025021914453553400_bib67","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1109\/EuroSPW55150.2022.00021","article-title":"Reviewing estimates of cybercrime victimisation and cyber risk likelihood","volume-title":"Proceedings of the 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","author":"Woods","year":"2022"},{"key":"2025021914453553400_bib68","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MSEC.2021.3096742","article-title":"Incident response as a lawyers\u2019 service","volume":"20","author":"Woods","year":"2022","journal-title":"IEEE Secur Priv"},{"key":"2025021914453553400_bib69","first-page":"397","article-title":"Who\u2019s calling? characterizing robocalls through audio and metadata analysis","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Prasad","year":"2020"},{"key":"2025021914453553400_bib70","first-page":"1681","article-title":"TRIDENT: towards detecting and mitigating web-based social engineering attacks","volume-title":"Proceedings of the 32nd USENIX Security Symposium, USENIX Security","author":"Yang","year":"2023"},{"key":"2025021914453553400_bib71","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/EuroSPW59978.2023.00023","article-title":"\u201cGet a higher return on your savings!\u201d: comparing adverts for cryptocurrency investment scams across platforms","volume-title":"Proceedings of the 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","author":"Siu","year":"2023"},{"key":"2025021914453553400_bib72","volume-title":"Information Rules: A Strategic Guide to the Network Economy","author":"Shapiro","year":"1998"},{"key":"2025021914453553400_bib73","volume-title":"The Anxious Generation: How the Great Rewiring of Childhood Is Causing an Epidemic of Mental Illness","author":"Haidt","year":"2024"},{"key":"2025021914453553400_bib74","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/13523260.2023.2279033","article-title":"The role of insurers in shaping international cyber-security norms about cyber-war","volume":"45","author":"Wolff","year":"2024","journal-title":"Contemp Secur Policy"},{"key":"2025021914453553400_bib75","article-title":"Chubb Addresses Growing Cyber Risks with a Flexible and Sustainable Approach","author":"Chubb","year":"2022"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyae031\/61484238\/tyae031.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyae031\/61484238\/tyae031.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T14:46:07Z","timestamp":1739976367000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae031\/7959400"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":75,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae031","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyae031"}}