{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:11:58Z","timestamp":1761808318791,"version":"3.44.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899685","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:18:43Z","timestamp":1574705923000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Demand side expectations of cyber insurance"],"prefix":"10.1109","author":[{"given":"Ulrik","family":"Franke","sequence":"first","affiliation":[{"name":"RISE Research Institutes of Sweden,Kista,Sweden"}]},{"given":"Per H\u00e5kon","family":"Meland","sequence":"additional","affiliation":[{"name":"SINTEF Digital and Norwegian University of Science and Technology,Trondheim,Norway"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Bashe attack: Global infection by contagious malware","author":"daffron","year":"2019","journal-title":"Cambridge Centre for Risk Studies Lloyds of London and Nanyang Technological University"},{"year":"2018","journal-title":"Lloyd's of London","article-title":"Cloud Down: Impacts on the US economy","key":"ref38"},{"key":"ref33","first-page":"89","article-title":"Facing uncertainty in cyber insurance policies","author":"meland","year":"0","journal-title":"International Workshop on Security and Trust Management"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1057\/s41288-018-0082-7"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TIFS.2018.2881694"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1057\/s41288-018-0078-3"},{"year":"2019","journal-title":"Allianz","article-title":"Allianz risk barometer results appendix 2019","key":"ref37"},{"year":"2018","author":"mirchandani","journal-title":"Laughing All The Way To The Bank Cybercriminals Targeting U S Financial Institutions","key":"ref36"},{"year":"2018","journal-title":"Willis Towers Watson","article-title":"Intelligence & risk insight report: Data breach event statistics","key":"ref35"},{"year":"2018","journal-title":"Willis Towers Watson","article-title":"Cyber risk exposure - what are the business risks?","key":"ref34"},{"year":"2018","author":"ostrager","journal-title":"Handbook on Insurance Coverage Disputes","key":"ref10"},{"year":"2018","journal-title":"Europolitics","article-title":"Internet organised crime threat assessment 2018","key":"ref40"},{"key":"ref11","first-page":"645","article-title":"The techno-neutrality solution to navigating insurance coverage for cyber losses","volume":"122","author":"knutsen","year":"2017","journal-title":"Penn St L Rev"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIFS.2018.2812205"},{"key":"ref13","first-page":"1","article-title":"Security pricing as enabler of cyber-insurance a first look at differentiated pricing markets","author":"pal","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"year":"2017","author":"xu","journal-title":"Cybersecurity Insurance Modeling and Pricing","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.cose.2017.04.010"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.18559\/ebr.2017.2.3"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1080\/23738871.2017.1296878"},{"key":"ref18","first-page":"9","article-title":"Insurability of cyber risk","author":"biener","year":"2018","journal-title":"Methods"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1080\/23738871.2017.1360927"},{"key":"ref28","article-title":"Cyber risk assessment and mitigation (cram) framework using logit and probit models for cyber insurance","author":"mukhopadhyay","year":"2017","journal-title":"Information Systems Frontiers"},{"year":"2017","journal-title":"European European Union Agency for Network and Information Security","article-title":"Commonality of risk assessment language in cyber insurance","key":"ref4"},{"key":"ref27","first-page":"2","article-title":"Cyberinsurance and public policy: Self-protection and insurance with endogenous adversaries","volume":"1","author":"massacci","year":"2017","journal-title":"Paragraph"},{"key":"ref3","first-page":"61","article-title":"Cyber-insurance: Black swans and fat tails","year":"2019","journal-title":"The Economist"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.cosrev.2017.01.001"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/CyberSA.2018.8551456"},{"year":"2017","author":"wallace","journal-title":"Digital evolution index maps competitiveness of 60 countries","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.7249\/WR1208"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1186\/s13174-017-0059-y"},{"year":"2018","journal-title":"Preparing for cyber insurance","key":"ref2"},{"key":"ref9","first-page":"191","article-title":"Strengthening cybersecurity with cyberin-surance markets and better risk assessment","volume":"102","author":"kesan","year":"2017","journal-title":"Minn Law Rev"},{"year":"2017","journal-title":"Enhancing the role of insurance in cyber risk management","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/S1361-3723(17)30034-9"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.2139\/ssrn.3200166"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.5089\/9781484313787.001"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ACCESS.2017.2649042"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.2139\/ssrn.2918674"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1007\/978-3-319-68711-7_28"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.jaccpubpol.2018.10.004"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, UK","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899685.pdf?arnumber=8899685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:21:25Z","timestamp":1755800485000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899685\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899685","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}