{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:52:43Z","timestamp":1730213563766,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/cybersa.2018.8551456","type":"proceedings-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T00:11:06Z","timestamp":1543536666000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["When to Treat Security Risks with Cyber Insurance"],"prefix":"10.1109","author":[{"given":"Per Hakon","family":"Meland","sequence":"first","affiliation":[]},{"given":"Fredrik","family":"Seehusen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25280-8_11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.79"},{"key":"ref12","article-title":"Modeling cyber-insurance: Towards a unifying framework","author":"b\u00f6hme","year":"2010","journal-title":"WEIS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.04.004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68063-7_6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39256-6_18"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyw001"},{"article-title":"Cyber security breaches survey 2016","year":"2016","author":"klahr","key":"ref17"},{"article-title":"Damage control: The cost of security breaches it security risks special report series","year":"2015","author":"lab","key":"ref18"},{"journal-title":"Thinking Fast and Slow","year":"2011","author":"kahneman","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1057\/gpp.2014.19"},{"article-title":"Incentives and barriers of the cyber insurance market in europe","year":"2012","author":"robinson","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592780"},{"article-title":"Cyber: In search of resilience in an interconnected world","year":"2016","author":"pain","key":"ref6"},{"article-title":"Quarterly sector update, forth quarter 2016","year":"2016","author":"investments","key":"ref29"},{"article-title":"The role of insurance in managing and mitigating the riske","year":"2015","author":"maude","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_14"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/636772.636774"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.137"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367526"},{"article-title":"Cyber insurance as one element of the cyber risk management strategy","year":"2015","author":"hurtaud","key":"ref1"},{"key":"ref20","article-title":"Cyber risk: Too big to insure?&#x2013;risk transfer options for a mercurial risk class","volume":"59","author":"eling","year":"2016","journal-title":"I VW Schriftenreihe"},{"journal-title":"Swiss Re Tech Rep","article-title":"Cyber: getting to grips with a complex risk","year":"2017","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.56"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2918674"},{"key":"ref23","first-page":"153","article-title":"Insurance for cyber-risk: A utility model","volume":"32","author":"mukhopadhyay","year":"2005","journal-title":"La Decision"},{"key":"ref26","article-title":"Bridging the insurance\/infosec gap: The sans 2016 cyber insurance survey","author":"filkins","year":"2016","journal-title":"Technical report SANS"},{"key":"ref25","first-page":"40","article-title":"How to buy cyber insurance","volume":"59","author":"siemens","year":"2012","journal-title":"Risk Management"}],"event":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2018,6,11]]},"location":"Glasgow","end":{"date-parts":[[2018,6,12]]}},"container-title":["2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536739\/8551360\/08551456.pdf?arnumber=8551456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T15:50:05Z","timestamp":1643298605000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8551456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2018.8551456","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}