{"id":"https://openalex.org/W4406603560","doi":"https://doi.org/10.1093/cybsec/tyae028","title":"A history of cyber risk transfer","display_name":"A history of cyber risk transfer","publication_year":2024,"publication_date":"2024-11-13","ids":{"openalex":"https://openalex.org/W4406603560","doi":"https://doi.org/10.1093/cybsec/tyae028"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyae028","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae028","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyae028/61510645/tyae028.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyae028/61510645/tyae028.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080051176","display_name":"Daniel Woods","orcid":"https://orcid.org/0000-0002-8569-1917"},"institutions":[{"id":"https://openalex.org/I193260172","display_name":"British University in Dubai","ror":"https://ror.org/00mc18523","country_code":"AE","type":"education","lineage":["https://openalex.org/I193260172"]},{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["AE","GB"],"is_corresponding":true,"raw_author_name":"Daniel W Woods","raw_affiliation_strings":["British University in Dubai , Department of Computer Science, 345015, Dubai ,","University of Edinburgh , School of Informatics, EH8 9AB, Edinburgh ,"],"raw_orcid":"https://orcid.org/0000-0002-8569-1917","affiliations":[{"raw_affiliation_string":"British University in Dubai , Department of Computer Science, 345015, Dubai ,","institution_ids":["https://openalex.org/I193260172"]},{"raw_affiliation_string":"University of Edinburgh , School of Informatics, EH8 9AB, Edinburgh ,","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005106101","display_name":"Josephine Wolff","orcid":"https://orcid.org/0000-0002-5139-5554"},"institutions":[{"id":"https://openalex.org/I121934306","display_name":"Tufts University","ror":"https://ror.org/05wvpxv85","country_code":"US","type":"education","lineage":["https://openalex.org/I121934306"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Josephine Wolff","raw_affiliation_strings":["Tufts University , The Fletcher School of Law and Diplomacy, MA 02155, Boston ,"],"raw_orcid":"https://orcid.org/0000-0002-5139-5554","affiliations":[{"raw_affiliation_string":"Tufts University , The Fletcher School of Law and Diplomacy, MA 02155, Boston ,","institution_ids":["https://openalex.org/I121934306"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080051176"],"corresponding_institution_ids":["https://openalex.org/I193260172","https://openalex.org/I98677209"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":4.3363,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.95096646,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3802679777145386}],"concepts":[{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3802679777145386}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1093/cybsec/tyae028","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae028","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyae028/61510645/tyae028.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:pure.ed.ac.uk:openaire/e1c2d005-c843-4bb7-86db-4356416b8d48","is_oa":true,"landing_page_url":"https://hdl.handle.net/20.500.11820/e1c2d005-c843-4bb7-86db-4356416b8d48","pdf_url":null,"source":{"id":"https://openalex.org/S4306400321","display_name":"Edinburgh Research Explorer (University of Edinburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98677209","host_organization_name":"University of Edinburgh","host_organization_lineage":["https://openalex.org/I98677209"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Woods, D W & Wolff, J 2025, 'A history of cyber risk transfer', Journal of Cybersecurity, vol. 11, no. 1, tyae028, pp. 1-16. https://doi.org/10.1093/cybsec/tyae028","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.ed.ac.uk:publications/e1c2d005-c843-4bb7-86db-4356416b8d48","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/e1c2d005-c843-4bb7-86db-4356416b8d48","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Woods, D W & Wolff, J 2025, 'A history of cyber risk transfer', Journal of Cybersecurity, vol. 11, no. 1, tyae028, pp. 1-16. https://doi.org/10.1093/cybsec/tyae028","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyae028","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae028","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyae028/61510645/tyae028.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406603560.pdf","grobid_xml":"https://content.openalex.org/works/W4406603560.grobid-xml"},"referenced_works_count":53,"referenced_works":["https://openalex.org/W632355419","https://openalex.org/W1495768301","https://openalex.org/W1532754853","https://openalex.org/W1985240760","https://openalex.org/W2028907687","https://openalex.org/W2062493711","https://openalex.org/W2062830664","https://openalex.org/W2063236501","https://openalex.org/W2126949246","https://openalex.org/W2144173251","https://openalex.org/W2156350103","https://openalex.org/W2184786010","https://openalex.org/W2567607894","https://openalex.org/W2639421075","https://openalex.org/W2744457088","https://openalex.org/W2914368133","https://openalex.org/W2918490372","https://openalex.org/W2972902221","https://openalex.org/W2982373842","https://openalex.org/W2990292214","https://openalex.org/W2994175110","https://openalex.org/W3003499255","https://openalex.org/W3007738605","https://openalex.org/W3011396964","https://openalex.org/W3023513155","https://openalex.org/W3034927504","https://openalex.org/W3042690941","https://openalex.org/W3084177670","https://openalex.org/W3094763195","https://openalex.org/W3134966463","https://openalex.org/W3171197544","https://openalex.org/W3174740818","https://openalex.org/W3194487227","https://openalex.org/W3211415631","https://openalex.org/W4242289848","https://openalex.org/W4289547206","https://openalex.org/W4293697625","https://openalex.org/W4301329292","https://openalex.org/W4353005505","https://openalex.org/W4378234069","https://openalex.org/W4391987523","https://openalex.org/W6628901981","https://openalex.org/W6684660999","https://openalex.org/W6763238779","https://openalex.org/W6763318891","https://openalex.org/W6779241723","https://openalex.org/W6793832870","https://openalex.org/W6797643652","https://openalex.org/W6800357153","https://openalex.org/W6840416690","https://openalex.org/W6841603600","https://openalex.org/W6881211177","https://openalex.org/W7006083307"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2931662336","https://openalex.org/W2077865380","https://openalex.org/W3006817050","https://openalex.org/W4401768695","https://openalex.org/W2765597752","https://openalex.org/W2134894512","https://openalex.org/W2083375246","https://openalex.org/W2067108088"],"abstract_inverted_index":{"Abstract":[0],"Cyber":[1],"risk":[2,6,17,23,36,45,96,103,113,154,168],"management":[3],"involves":[4],"balancing":[5],"acceptance,":[7],"avoidance,":[8],"reduction,":[9],"and":[10,65,98,119,146],"transfer.":[11],"Academic":[12],"researchers":[13,135],"have":[14],"focused":[15],"on":[16,30,35],"reduction":[18,37],"measures.":[19],"Studies":[20],"of":[21,41,57,78,111,150,163,166],"cyber":[22,31,44,60,66,80,112,153,167],"transfer":[24,46,114,155],"are":[25],"less":[26],"common,":[27],"mainly":[28],"centering":[29],"insurance.":[32],"This":[33],"emphasis":[34],"overlooks":[38],"the":[39,49,55,86,151,164],"development":[40],"many":[42],"real-world":[43,138],"products":[47,58,118],"in":[48,125],"last":[50],"decade.":[51],"Our":[52,129],"study":[53,131],"describes":[54],"emergence":[56],"including:":[59],"(re)insurance,":[61],"parametric":[62],"insurance,":[63],"warranties,":[64],"cat":[67],"bonds.":[68],"We":[69],"characterize":[70],"how":[71,116],"these":[72],"solutions":[73],"addressed":[74],"four":[75],"core":[76],"challenges":[77],"transferring":[79],"risk:":[81],"(1)":[82],"tailoring":[83],"coverage":[84],"to":[85,122,136],"threat":[87],"landscape;":[88],"(2)":[89],"managing":[90],"solvency;":[91],"(3)":[92],"data":[93],"collection":[94],"for":[95,102,143],"assessment;":[97],"(4)":[99],"creating":[100],"incentives":[101],"reduction.":[104],"The":[105],"result":[106],"is":[107],"an":[108],"integrated":[109],"history":[110],"describing":[115],"novel":[117],"partnerships":[120],"emerged":[121],"address":[123],"failings":[124],"prevailing":[126],"business":[127],"models.":[128],"descriptive":[130],"can":[132],"help":[133],"other":[134],"understand":[137],"problems,":[139],"providing":[140],"a":[141,147,160],"foundation":[142],"future":[144],"research":[145],"richer":[148],"picture":[149],"overall":[152],"landscape,":[156],"as":[157,159],"well":[158],"deeper":[161],"understanding":[162],"types":[165],"that":[169],"can\u2014and":[170],"cannot\u2014be":[171],"effectively":[172],"transferred.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":2}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-10-10T00:00:00"}
