{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:20:44Z","timestamp":1764174044132,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/allerton.2013.6736604","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T22:46:12Z","timestamp":1392331572000},"page":"781-787","source":"Crossref","is-referenced-by-count":14,"title":["Why cyber-insurance contracts fail to reflect cyber-risks"],"prefix":"10.1109","author":[{"given":"Galina","family":"Schwartz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nikhil","family":"Shetty","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jean","family":"Walrand","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592780"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.259"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"15","article-title":"Cyber insurance and it security investment: Impact of interdependent risk","author":"ogut","year":"2005","journal-title":"Proceedings of WEIS05"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s10713-007-0004-2"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.3386\/w13359"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.3386\/w10706"},{"key":"11","article-title":"Cyber-insurance revisited","author":"bhme","year":"2005","journal-title":"Proceedings of WEIS05"},{"key":"12","article-title":"Models and measures for correlation in cyber-insurance","author":"bhme","year":"2006","journal-title":"Fifth Workshop on the Economics of Information Security"},{"key":"21","first-page":"84","article-title":"The design of an optimal insurance policy","volume":"69","author":"raviv","year":"1979","journal-title":"American Economic Review"},{"journal-title":"A Model to Analyze the Unfulfilled Promise of Cyber Insurance The Impact of Secondary Loss","year":"2010","key":"20"},{"key":"22","article-title":"Competitive cyber-insurance and internet security","author":"shetty","year":"2009","journal-title":"Workshop on Economics and Information Security"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-006-9011-6"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/636772.636774"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367526"},{"key":"28","article-title":"System reliability and free riding","author":"varian","year":"2002","journal-title":"Workshop on the Economics of Information Security"},{"key":"29","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2007.57","article-title":"Cyberinsurance in it security management","volume":"5","author":"baer","year":"2007","journal-title":"IEEE Security and Privacy"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2307\/1879431"},{"key":"2","first-page":"7","article-title":"Modeling cyber-insurance: Towards a unifying framework","author":"bhme","year":"2010","journal-title":"Proceedings of WEIS10 Cambridge USA"},{"journal-title":"Why Cyber Insurance Contracts Fail to Reflect Security","year":"2012","author":"schwartz","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_3"},{"key":"30","article-title":"Causes and remedies for social acceptance of network insecurity","author":"fisk","year":"2002","journal-title":"Proceedings of WEIS02"},{"journal-title":"How Much Is Enough? A Risk-Management Approach to Computer Security","year":"2000","author":"soohoo","key":"7"},{"key":"6","first-page":"155","author":"winter","year":"2000","journal-title":"Optimal Insurance under Moral Hazard Ser Handbook of Insurance"},{"key":"32","first-page":"13","article-title":"Strategic defense and attack of complex networks","volume":"5","author":"hausken","year":"2009","journal-title":"International Journal of Performability Engineering"},{"key":"5","first-page":"185","author":"dionne","year":"2000","journal-title":"Adverse Selection in Insurance Markets Ser Handbook of Insurance"},{"key":"31","article-title":"Interdependence of reliability and security","author":"honeyman","year":"2007","journal-title":"Proceedings of WEIS07"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.2307\/1885326"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"}],"event":{"name":"2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2013,10,2]]},"location":"Monticello, IL","end":{"date-parts":[[2013,10,4]]}},"container-title":["2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6725831\/6736491\/06736604.pdf?arnumber=6736604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T07:51:32Z","timestamp":1498117892000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6736604\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/allerton.2013.6736604","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}