{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T07:40:30Z","timestamp":1776411630458,"version":"3.51.2"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2009,11,1]],"date-time":"2009-11-01T00:00:00Z","timestamp":1257033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2009,11]]},"abstract":"<jats:p>Proposed contracts tend to be overpriced because insurers are unable to anticipate customers' secondary losses.<\/jats:p>","DOI":"10.1145\/1592761.1592780","type":"journal-article","created":{"date-parts":[[2009,10,27]],"date-time":"2009-10-27T13:28:14Z","timestamp":1256650094000},"page":"68-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":83,"title":["Why IT managers don't go for cyber-insurance products"],"prefix":"10.1145","volume":"52","author":[{"given":"Tridib","family":"Bandyopadhyay","sequence":"first","affiliation":[{"name":"Kennesaw State University, Kennesaw, GA"}]},{"given":"Vijay S.","family":"Mookerjee","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas"}]},{"given":"Ram C.","family":"Rao","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas"}]}],"member":"320","published-online":{"date-parts":[[2009,11]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Betterley Report. Cyberrisk Market Survey 2008; http:\/\/www.betterley.com.  Betterley Report. Cyberrisk Market Survey 2008; http:\/\/www.betterley.com."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the Workshop on the Economics of Information Security","author":"Bohme R.","year":"2005","unstructured":"Bohme , R. Cyber insurance revisited . In Proceedings of the Workshop on the Economics of Information Security ( Boston, MA, June 2--3 , 2005 ); http:\/\/infosecon.net\/workshop\/index.php. Bohme, R. Cyber insurance revisited. In Proceedings of the Workshop on the Economics of Information Security (Boston, MA, June 2--3, 2005); http:\/\/infosecon.net\/workshop\/index.php."},{"key":"e_1_2_1_3_1","volume-title":"Economics of Insurance. Advanced Textbooks in Economics 29","author":"Borch K.","year":"1990","unstructured":"Borch , K. Economics of Insurance. Advanced Textbooks in Economics 29 , K.K. Aase and A. Sandmo, Eds. North Holland , Amsterdam , 1990 . Borch, K. Economics of Insurance. Advanced Textbooks in Economics 29, K.K. Aase and A. Sandmo, Eds. North Holland, Amsterdam, 1990."},{"key":"e_1_2_1_4_1","volume-title":"The Mathematical Theory of Insurance","author":"Borch K.","year":"1974","unstructured":"Borch , K. The Mathematical Theory of Insurance . Lexington Books , Lexington, MA , 1974 . Borch, K. The Mathematical Theory of Insurance. Lexington Books, Lexington, MA, 1974."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/876661.876669"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2004.11044320"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/2171958"},{"key":"e_1_2_1_8_1","volume-title":"The 11th Annual CSI\/FBI Computer Crime and Security Survey (2006)","author":"Gordon L.A.","year":"2006","unstructured":"Gordon , L.A. , Loeb , M.P. , Lucyshyn , W. , and Richardson , R . The 11th Annual CSI\/FBI Computer Crime and Security Survey (2006) ; http:\/\/i.cmpnet.com\/gocsi\/db_area\/pdfs\/fbi\/FBI 2006 .pdf. Gordon, L.A., Loeb, M.P., Lucyshyn, W., and Richardson, R. The 11th Annual CSI\/FBI Computer Crime and Security Survey (2006); http:\/\/i.cmpnet.com\/gocsi\/db_area\/pdfs\/fbi\/FBI2006.pdf."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/636772.636774"},{"key":"e_1_2_1_10_1","volume-title":"The Economic Case for Cyber Insurance. Securing Privacy in the Internet Age","author":"Kesan P.J.","year":"2005","unstructured":"Kesan , P.J. , Majuca , R.P. , and Yurcik , W.J . The Economic Case for Cyber Insurance. Securing Privacy in the Internet Age . Stanford University Press , Palo Alto, CA , 2005 . Kesan, P.J., Majuca, R.P., and Yurcik, W.J. The Economic Case for Cyber Insurance. Securing Privacy in the Internet Age. Stanford University Press, Palo Alto, CA, 2005."},{"key":"e_1_2_1_11_1","unstructured":"Majuca R.P. Yurcik W. and Kesan J.P. The Evolution of Cyber Insurance (2006); http:\/\/arxiv.org\/ftp\/cs\/papers\/0601\/0601020.pdf.  Majuca R.P. Yurcik W. and Kesan J.P. The Evolution of Cyber Insurance (2006); http:\/\/arxiv.org\/ftp\/cs\/papers\/0601\/0601020.pdf."},{"key":"e_1_2_1_12_1","unstructured":"Marsh Inc. E-Commerce E-Business; http:\/\/global.marsh.com\/risk\/ecommerce\/.  Marsh Inc. E-Commerce E-Business; http:\/\/global.marsh.com\/risk\/ecommerce\/."},{"key":"e_1_2_1_13_1","article-title":"Aspects of rational insurance purchasing","volume":"76","author":"Mossin J.","unstructured":"Mossin , J. and Smith , T . Aspects of rational insurance purchasing . Journal of Political Economy 76 , 4 (July\/Aug. 1968), 553--568. Mossin, J. and Smith, T. Aspects of rational insurance purchasing. Journal of Political Economy 76, 4 (July\/Aug. 1968), 553--568.","journal-title":"Journal of Political Economy"},{"key":"e_1_2_1_14_1","unstructured":"Ponemon Institute. The Fourth Annual U.S. Cost of Data Breach Study (2008); http:\/\/www.ponemon.org.  Ponemon Institute. The Fourth Annual U.S. Cost of Data Breach Study (2008); http:\/\/www.ponemon.org."},{"key":"e_1_2_1_15_1","first-page":"1","article-title":"The design of an optimal Insurance policy","volume":"69","author":"Raviv A","year":"1979","unstructured":"Raviv , A . The design of an optimal Insurance policy . American Economic Review 69 , 1 ( Mar. 1979 ), 84--96. Raviv, A. The design of an optimal Insurance policy. American Economic Review 69, 1 (Mar. 1979), 84--96.","journal-title":"American Economic Review"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/252724"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1592761.1592780","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1592761.1592780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:18Z","timestamp":1750249398000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1592761.1592780"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11]]},"references-count":16,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2009,11]]}},"alternative-id":["10.1145\/1592761.1592780"],"URL":"https:\/\/doi.org\/10.1145\/1592761.1592780","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,11]]},"assertion":[{"value":"2009-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}