{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:19:12Z","timestamp":1742951952493,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319680620"},{"type":"electronic","value":"9783319680637"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68063-7_6","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T04:23:18Z","timestamp":1505190198000},"page":"89-100","source":"Crossref","is-referenced-by-count":7,"title":["Facing Uncertainty in Cyber Insurance Policies"],"prefix":"10.1007","author":[{"given":"Per H\u00e5kon","family":"Meland","sequence":"first","affiliation":[]},{"given":"Inger Anne","family":"T\u00f8ndel","sequence":"additional","affiliation":[]},{"given":"Marie","family":"Moe","sequence":"additional","affiliation":[]},{"given":"Fredrik","family":"Seehusen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"6_CR1","unstructured":"Association of British Insurers: Making sense of cyber insurance: a guide for SMEs. Technical report, ABO (2016)"},{"key":"6_CR2","unstructured":"Bandyopadhyay, T.: Organizational adoption of cyber insurance instruments in it security risk management: a modeling approach, Proceedings, P. 5 (2012)"},{"issue":"11","key":"6_CR3","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/1592761.1592780","volume":"52","author":"T Bandyopadhyay","year":"2009","unstructured":"Bandyopadhyay, T., Mookerjee, V.S., Rao, R.C.: Why IT managers don\u2019t go for cyber-insurance products. Commun. ACM 52(11), 68\u201373 (2009)","journal-title":"Commun. ACM"},{"key":"6_CR4","unstructured":"Bentz, T.: Negotiating key cyber exclusions. Insurance Day (2015). \nhttps:\/\/www.insuranceday.com\/news_analysis\/legal_focus\/negotiating-key-cyber-exclusions.htm"},{"key":"6_CR5","unstructured":"B\u00f6hme, R., Schwartz, G.: Modeling cyber-insurance: towards a unifying framework. In: Workshop on the Economics in Information Security (WEIS) (2012)"},{"key":"6_CR6","unstructured":"Cambridge Centre for Risk Studies: Managing cyber insurance accumulation risk. Technical report, University of Cambridge (2016)"},{"key":"6_CR7","unstructured":"Cohn, C., Barlyn, S.: European, Asian companies short on cyber insurance before ransomware attack (2017). \nhttp:\/\/www.reuters.com\/article\/us-cyber-attack-insurance-idUSKCN18B00H"},{"key":"6_CR8","unstructured":"CRIF: Cyber insurance and the terrorism exclusion (2014). \nhttp:\/\/www.cyberriskinsuranceforum.com\/content\/cyber-insurance-and-terrorism-exclusion"},{"key":"6_CR9","unstructured":"DG Justice and Consumers: Reform of EU data protection rules (2016). \nhttp:\/\/ec.europa.eu\/justice\/data-protection\/reform\/index_en.htm"},{"key":"6_CR10","unstructured":"Digital Single Market: Digital scoreboard (2016). \nhttps:\/\/ec.europa.eu\/digital-single-market\/digital-scoreboard"},{"key":"6_CR11","unstructured":"Dobie, G., Collins, S.: A guide to cyber risk - managing the impact of increasing interconnectivity. Technical report, Allianz (2015). \nhttp:\/\/www.agcs.allianz.com\/assets\/PDFs\/risk%20bulletins\/CyberRiskGuide.pdf"},{"key":"6_CR12","unstructured":"ENISA, Robinson, N.: Incentives and barriers of the cyber insurance market in Europe. Report 28th June 2012. \nhttp:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/national-cyber-security-strategies-ncsss\/incentives-and-barriers-of-the-cyber-insurance-market-in-europe\/at_download\/fullReport"},{"issue":"3","key":"6_CR13","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/636772.636774","volume":"46","author":"LA Gordon","year":"2003","unstructured":"Gordon, L.A., Loeb, M.P., Sohail, T.: A framework for using insurance for cyber-risk management. Commun. ACM 46(3), 81\u201385 (2003)","journal-title":"Commun. ACM"},{"key":"6_CR14","unstructured":"Hiscox: The hiscox cyber readiness report (2017). \nhttps:\/\/www.hiscox.co.uk\/cyber-readiness-report\/docs\/cyber-readiness-report-2017.pdf"},{"key":"6_CR15","unstructured":"Hurtaud, S., Flamand, T., de la Vaissiere, L., Hounka, A.: Cyber insurance as one element of the cyber risk management strategy, February 2015. \nhttps:\/\/www2.deloitte.com\/lu\/en\/pages\/risk\/articles\/cyber-insurance-element-cyber-risk-management-strategy.html"},{"key":"6_CR16","unstructured":"Lloyd\u2019s, Cambridge Centre for Risk Studies: Lloyds City Risk Index 2015\u20132025 (2015). \nhttp:\/\/hwww.lloyds.com\/cityriskindex\/"},{"key":"6_CR17","unstructured":"Maude, F.: The role of insurance in managing and mitigating the riske (2015). \nhttps:\/\/www.marsh.com\/uk\/insights\/research\/uk-cyber-security-role-of-insurance-in-managing-mitigating-risk.html"},{"issue":"6","key":"6_CR18","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSP.2015.137","volume":"13","author":"PH Meland","year":"2015","unstructured":"Meland, P.H., T\u00f8ndel, I.A., Solhaug, B.: Mitigating risk with cyberinsurance. IEEE Secur. Priv. 13(6), 38\u201343 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR19","unstructured":"Nikolaeva, M., Rivet, M.: French central bank chief urges insurers to step up cyber risk coverage (2017). \nhttp:\/\/www.reuters.com\/article\/us-france-insurance-idUSKBN1591Q9"},{"key":"6_CR20","unstructured":"Pain, L.D., Anchen, J., Bundt, M., Durand, E., Schmitt, M.: Cyber: In search of resilience in an interconnected world (2016). \nhttp:\/\/www.swissre.com\/library\/archive\/Demand_for_cyber_insurance_on_the_rise_joint_Swiss_Re_IBM_study_shows.html"},{"key":"6_CR21","unstructured":"Ponemon: Managing cyber security as a business risk: Cyber insurance in the digital age. Report, Ponemon Institute, August 2013. \nhttp:\/\/www.ponemon.org\/blog\/managing-cyber-security-as-a-business-risk-cyber-insurance-in-the-digital-age"},{"key":"6_CR22","unstructured":"National Protection and Programs Directorate: Cyber risk culture roundtable readout report. Technical report. U.S. Department of Homeland Security (2013)"},{"key":"6_CR23","unstructured":"National Protection and Programs Directorate: Cybersecurity insurance workshop readout report. Technical report. U.S. Department of Homeland Security (2012)"},{"issue":"2","key":"6_CR24","first-page":"121","volume":"2","author":"S Romanosky","year":"2016","unstructured":"Romanosky, S.: Examining the costs and causes of cyber incidents. J. Cybersecur. 2(2), 121\u2013135 (2016)","journal-title":"J. Cybersecur."},{"issue":"8","key":"6_CR25","first-page":"40","volume":"59","author":"R Siemens","year":"2012","unstructured":"Siemens, R., Beck, D.: How to buy cyber insurance. Risk Manag. 59(8), 40 (2012)","journal-title":"Risk Manag."},{"key":"6_CR26","unstructured":"Svanemyr, S.: Kontantene forsvinner i butikkene (Norwegian) (2016). \nhttps:\/\/tinyurl.com\/j7qaqe9"},{"key":"6_CR27","unstructured":"Swiss Re Institute: Cyber: getting to grips with a complex risk. Technical report, Swiss Re (2017). \nhttp:\/\/www.swissre.com\/library\/sigma_01_2017_en.html"},{"key":"6_CR28","unstructured":"World Economic Forum: The global risks report 2016, 11st edn. (2016). \nhttp:\/\/www3.weforum.org\/docs\/GRR\/WEF_GRR16.pdf"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68063-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,13]],"date-time":"2017-09-13T04:08:02Z","timestamp":1505275682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68063-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319680620","9783319680637"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68063-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}