{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T18:48:12Z","timestamp":1769280492091,"version":"3.49.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/wsc63780.2024.10838727","type":"proceedings-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:40:24Z","timestamp":1737398424000},"page":"572-583","source":"Crossref","is-referenced-by-count":2,"title":["Is Systemic Cyber Risk Management for Enterprises Sustainable?"],"prefix":"10.1109","author":[{"given":"Ranjan","family":"Pa","sequence":"first","affiliation":[{"name":"MIT Sloan School of Management, Massachusetts Institute of Technology,Cambridge,MA,USA"}]},{"given":"Konnie","family":"Duan","sequence":"additional","affiliation":[{"name":"MIT Sloan School of Management, Massachusetts Institute of Technology,Cambridge,MA,USA"}]},{"given":"Rohan Xavier","family":"Sequeira","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Southern California,Los Angeles,CA,USA"}]},{"given":"Michael","family":"Siegel","sequence":"additional","affiliation":[{"name":"MIT Sloan School of Management, Massachusetts Institute of Technology,Cambridge,MA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0262.2005.00629.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511753893"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/asb.2021.18"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/10920277.2022.2034507"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.insmatheco.2008.08.001"},{"key":"ref7","article-title":"Understanding systemic cyber risk-global agenda council on risk and resilience","author":"Hanouz","year":"2016","journal-title":"World Economic Forum"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10713-007-0004-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/14697680802629384"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2006.11.014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10436-010-0166-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176342873"},{"key":"ref14","volume-title":"Inequalities: Theory of Majorization and its Applications","volume":"143","author":"Marshall","year":"1979"},{"key":"ref15","volume-title":"Quantitative risk management: concepts, techniques and tools-revised edition","author":"McNeil","year":"2015"},{"key":"ref16","article-title":"Voluntary participation in cyber-insurance markets","volume-title":"Workshop on the Economics of Information Security (WEIS)","author":"Naghizadeh","year":"2014"},{"key":"ref17","article-title":"Competitive Cyber-Insurance and Internet Security","author":"Shetty","year":"2009","journal-title":"WEIS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.79"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25280-8_12"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847944"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2684801"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3273996.3273999"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3446635"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WSC48552.2020.9384103"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3039254"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3568399"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WSC52266.2021.9715524"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3386159"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75953-1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1515\/9783110935974"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1111\/risa.13715"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1090\/mmono\/065"}],"event":{"name":"2024 Winter Simulation Conference (WSC)","location":"Orlando, FL, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 Winter Simulation Conference (WSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10838618\/10838619\/10838727.pdf?arnumber=10838727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T07:04:57Z","timestamp":1737443097000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10838727\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/wsc63780.2024.10838727","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}