{"id":"https://openalex.org/W2031535643","doi":"https://doi.org/10.1109/allerton.2013.6736604","title":"Why cyber-insurance contracts fail to reflect cyber-risks","display_name":"Why cyber-insurance contracts fail to reflect cyber-risks","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2031535643","doi":"https://doi.org/10.1109/allerton.2013.6736604","mag":"2031535643"},"language":"en","primary_location":{"id":"doi:10.1109/allerton.2013.6736604","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2013.6736604","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076396570","display_name":"Galina Schwartz","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]},{"id":"https://openalex.org/I134446601","display_name":"Berkeley College","ror":"https://ror.org/02xewxa75","country_code":"US","type":"education","lineage":["https://openalex.org/I134446601"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Galina Schwartz","raw_affiliation_strings":["EECS Dept., UC Berkeley, CA, USA","EECS Department, UC Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"EECS Dept., UC Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601"]},{"raw_affiliation_string":"EECS Department, UC Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053290362","display_name":"Nikhil Shetty","orcid":"https://orcid.org/0000-0001-7321-3240"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nikhil Shetty","raw_affiliation_strings":["Insieme Networks, USA"],"affiliations":[{"raw_affiliation_string":"Insieme Networks, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041937901","display_name":"Jean Walrand","orcid":"https://orcid.org/0000-0002-1460-6826"},"institutions":[{"id":"https://openalex.org/I134446601","display_name":"Berkeley College","ror":"https://ror.org/02xewxa75","country_code":"US","type":"education","lineage":["https://openalex.org/I134446601"]},{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jean Walrand","raw_affiliation_strings":["EECS Dept., UC Berkeley, CA, USA","EECS Department, UC Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"EECS Dept., UC Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601"]},{"raw_affiliation_string":"EECS Department, UC Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076396570"],"corresponding_institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":1.6179,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.87996741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"781","last_page":"787"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7265457510948181},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6093538999557495},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5616229176521301},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.555114209651947},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4902051091194153}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7265457510948181},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6093538999557495},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5616229176521301},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.555114209651947},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4902051091194153},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/allerton.2013.6736604","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2013.6736604","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W77047371","https://openalex.org/W134064092","https://openalex.org/W1499711535","https://openalex.org/W1516366611","https://openalex.org/W1557770428","https://openalex.org/W2045974281","https://openalex.org/W2056075452","https://openalex.org/W2062460331","https://openalex.org/W2063236501","https://openalex.org/W2078309362","https://openalex.org/W2099263883","https://openalex.org/W2099613071","https://openalex.org/W2107966619","https://openalex.org/W2110522107","https://openalex.org/W2121034459","https://openalex.org/W2126949246","https://openalex.org/W2144173251","https://openalex.org/W2156109180","https://openalex.org/W2156983464","https://openalex.org/W2165913973","https://openalex.org/W2168337670","https://openalex.org/W2396816275","https://openalex.org/W2399439481","https://openalex.org/W2406157377","https://openalex.org/W3125210271","https://openalex.org/W3205357727","https://openalex.org/W4236841844","https://openalex.org/W4285719527","https://openalex.org/W6603145189","https://openalex.org/W6605443630","https://openalex.org/W6606971471","https://openalex.org/W6631017487","https://openalex.org/W6633353333","https://openalex.org/W6712562987"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2749324135","https://openalex.org/W2139079562","https://openalex.org/W114687057","https://openalex.org/W2908433117","https://openalex.org/W2969604939","https://openalex.org/W2378306841","https://openalex.org/W2390279801","https://openalex.org/W3122988618","https://openalex.org/W1994631104"],"abstract_inverted_index":{"We":[0,41,73,89,107,148,180,196],"consider":[1,108],"arbitrary":[2,14,109,121],"risk-averse":[3,110],"users,":[4,111],"whose":[5,112],"costs":[6,113],"of":[7,70,97,114,177,204],"improving":[8,115],"security":[9,33,38,68,85,116,140,145,175,192],"are":[10,117],"given":[11,118],"by":[12,119],"an":[13,26,120,133],"convex":[15,122],"function.":[16,123],"In":[17,124],"our":[18,125],"model,":[19,126],"user":[20,44,52,84,127,151,159,191],"probability":[21,128],"to":[22,56,87,99,129,163,194,206],"incur":[23,130],"damage":[24,131],"(from":[25,132],"attack)":[27,134],"depends":[28,135],"on":[29,105,136,212],"both":[30,137],"his":[31,138],"own":[32,139],"and":[34,47,49,141,154,156],"network":[35,142],"security:":[36,143],"thus,":[37,144],"is":[39,146],"interdependent.":[40,147],"introduce":[42,149],"two":[43,150],"types":[45,152],"(normal":[46,153],"malicious),":[48,155],"allow":[50,157],"one":[51,158],"type":[53,160],"(malicious":[54,161],"users)":[55,162],"subvert":[57,164],"insurer":[58,165],"monitoring,":[59,166],"even":[60,167],"if":[61,168],"insurers":[62,169],"perfectly":[63,170],"enforce":[64,171],"(at":[65,172],"zero":[66,173],"cost)":[67,174],"levels":[69,176],"normal":[71,178],"users.":[72,179],"prove":[74,181],"that":[75,82,182,189],"with":[76,183],"malicious":[77,184],"users":[78,185],"present,":[79,186],"equilibrium":[80,187],"contract":[81,188],"specifies":[83,190],"fails":[86,193],"exist.":[88,195],"demonstrate,":[90,197],"in":[91,198],"a":[92,95,199,202],"general":[93,200],"setting,":[94,201],"failure":[96,203],"cyber-insurers":[98,205],"underwrite":[100,207],"contracts":[101,208],"conditioning":[102,209],"the":[103,210],"premiums":[104,211],"security.":[106,213]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
