{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:13:36Z","timestamp":1775067216548,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/cybersa49311.2020.9139703","type":"proceedings-article","created":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T17:39:37Z","timestamp":1594748377000},"page":"1-8","source":"Crossref","is-referenced-by-count":25,"title":["The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes"],"prefix":"10.1109","author":[{"given":"Jason R.C.","family":"Nurse","sequence":"first","affiliation":[]},{"given":"Louise","family":"Axon","sequence":"additional","affiliation":[]},{"given":"Arnau","family":"Erola","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Agrafiotis","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Goldsmith","sequence":"additional","affiliation":[]},{"given":"Sadie","family":"Creese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2019","journal-title":"Big companies thought insurance covered a cyberattack they may be wrong"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1111\/lsi.12303"},{"key":"ref33","article-title":"Cybercrime and you: How criminals attack and the human factors that they seek to exploit","author":"nurse","year":"2019","journal-title":"The Oxford Handbook of Cyberpsychology"},{"key":"ref32","year":"2018","journal-title":"Cybersecurity Framework-NIST"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68063-7_6"},{"key":"ref30","year":"2015","journal-title":"UK cyber security - the role of insurance in managing and mitigating the risk"},{"key":"ref37","year":"2020","journal-title":"Cybersecurity ratings & risk analysis"},{"key":"ref36","volume":"5","author":"romanosky","year":"2019","journal-title":"Content analysis of cyber insurance policies how do carriers price cyber risk? Journal of Cybersecurity"},{"key":"ref35","year":"2020","journal-title":"Systemic cyber risk and aggregate impacts"},{"key":"ref34","year":"2017","journal-title":"Enhancing the role of insurance in cyber risk management"},{"key":"ref10","first-page":"891","article-title":"Insurance coverage for&#x201D; cyber-losses","author":"cohen","year":"2000","journal-title":"Tort & Insurance Law Journal"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881694"},{"key":"ref11","first-page":"293","article-title":"Sok: Cyber insurance-technical challenges and a system security roadmap","author":"dambra","year":"2020","journal-title":"IEEE Symposium on Security and Privacy (SP)"},{"key":"ref12","year":"2019","journal-title":"Cyber security breaches survey 2019"},{"key":"ref13","year":"2020"},{"key":"ref14","year":"2020","journal-title":"Overcoming challenges to cyber insurance growth"},{"key":"ref15","article-title":"The cyber-resilience of financial institutions: significance and applicability","volume":"5","author":"dupont","year":"2019","journal-title":"Cybersecurity"},{"key":"ref16","year":"2019","journal-title":"Cyber insurance and systemic market risk"},{"key":"ref17","year":"2017","journal-title":"Commonality of risk assessment language in cyber insurance"},{"key":"ref18","article-title":"European Parliament and Council of the European Union","year":"2016","journal-title":"General Data Protection Regulation (GDPR)"},{"key":"ref19","year":"2020","journal-title":"European Systemic Risk Board Systemic cyber risk"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77492-3_1"},{"key":"ref4","author":"simpson","year":"2018","journal-title":"Cyber insurance Are UK businesses avoiding coverage?"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812205"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2019.8899641"},{"key":"ref6","year":"2020","journal-title":"Security ratings leader - cyber risk management"},{"key":"ref29","year":"2019","journal-title":"2019 cyber catalyst designations 17 cybersecurity solutions"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1057\/gpp.2014.19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"ref7","article-title":"Models and measures for correlation in cyber-insurance","author":"b\u00f6hme","year":"2006","journal-title":"Workshop on the Economics of Information Security (WEIS)"},{"key":"ref2","year":"2019","journal-title":"Prepare for the expected Safeguarding value in the era of cyber risk"},{"key":"ref9","year":"2017","journal-title":"Centre for Risk Studies Cyber exposure data schema"},{"key":"ref1","article-title":"A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate","volume":"4","author":"agrafiotis","year":"2018","journal-title":"Cybersecurity"},{"key":"ref20","year":"2016","journal-title":"Cyber Insurance Recent Advances Good Practices and Challenges"},{"key":"ref22","first-page":"13","article-title":"Cyber insurance to cover e-business","volume":"57","author":"figg","year":"2000","journal-title":"Internal Auditor"},{"key":"ref21","article-title":"A research agenda for cyber risk and cyber insurance","author":"falco","year":"2019","journal-title":"Workshop on the Economics of Information Security (WEIS)"},{"key":"ref42","article-title":"The county fair cyber loss distribution: Drawing inferences from insurance prices","author":"woods","year":"2019","journal-title":"Workshop on the Economics of Information Security (WEIS)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/636772.636774"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-017-0059-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.010"},{"key":"ref26","year":"2018","journal-title":"AXIS Launches Cyber Center of Excellence to Help Mitigate Cyber Risks"},{"key":"ref25","year":"2019","journal-title":"Cyber readiness report 2019"}],"event":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","location":"Dublin, Ireland","start":{"date-parts":[[2020,6,15]]},"end":{"date-parts":[[2020,6,19]]}},"container-title":["2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9136832\/9139607\/09139703.pdf?arnumber=9139703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:46:57Z","timestamp":1656330417000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9139703\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/cybersa49311.2020.9139703","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}