{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:31:15Z","timestamp":1769283075164,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003345","name":"CAMS","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003345","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/wsc63780.2024.10838964","type":"proceedings-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:40:24Z","timestamp":1737398424000},"page":"560-571","source":"Crossref","is-referenced-by-count":4,"title":["How Hard is it to Estimate Systemic Enterprise Cyber Risk?"],"prefix":"10.1109","author":[{"given":"Ranjan","family":"Pal","sequence":"first","affiliation":[{"name":"MIT Sloan School of Management, Massachusetts Institute of Technology,Cambridge,MA,USA"}]},{"given":"Rohan Xavier","family":"Sequeira","sequence":"additional","affiliation":[{"name":"University of Southern California,Electrical and Computer Engineering,Los Angeles,CA,USA"}]},{"given":"Sander","family":"Zeijlmaker","sequence":"additional","affiliation":[{"name":"MIT Sloan School of Management, Massachusetts Institute of Technology,Cambridge,MA,USA"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","first-page":"22","article-title":"The Behavioral Economics of why Executives Underinvest in Cybersecurity","volume":"95","author":"Blau","year":"2017","journal-title":"Harvard Business Review"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509985"},{"key":"ref3","article-title":"Hardness of Approximation of the Balanced Complete Bipartite Subgraph Problem","volume-title":"Technical report, Technical Report MCS04\u201304","author":"Feige","year":"2004"},{"key":"ref4","volume-title":"Systemic Cyber Risk: A Primer","author":"Forscey","year":"2022"},{"key":"ref5","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","volume":"174","author":"Garey","year":"1979"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3233\/af-160166"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10713-007-0004-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(82)90238-5"},{"key":"ref9","first-page":"23","article-title":"Voluntary Participation in Cyber-Insurance Markets","volume-title":"Workshop on the Economics of Information Security (WEIS)","author":"Naghizadeh"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.79"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25280-8_12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847944"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3273996.3273999"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3446635"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3105","DOI":"10.1109\/WSC48552.2020.9384103","article-title":"Sustainable Catastrophic Cyber-Risk Management in IoT Societies","volume-title":"2020 Winter Simulation Conference (WSC)","author":"Pal","year":"2020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3039254"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3568399"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/wsc52266.2021.9715524"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3386159"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/1016079"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_12"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(77)90081-7"}],"event":{"name":"2024 Winter Simulation Conference (WSC)","location":"Orlando, FL, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 Winter Simulation Conference (WSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10838618\/10838619\/10838964.pdf?arnumber=10838964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T06:46:16Z","timestamp":1737441976000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10838964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wsc63780.2024.10838964","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}