{"id":"https://openalex.org/W2983037960","doi":"https://doi.org/10.1109/cybersa.2019.8899678","title":"Two simple models of business interruption accumulation risk in cyber insurance","display_name":"Two simple models of business interruption accumulation risk in cyber insurance","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2983037960","doi":"https://doi.org/10.1109/cybersa.2019.8899678","mag":"2983037960"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2019.8899678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2019.8899678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-39900","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037374855","display_name":"Ulrik Franke","orcid":"https://orcid.org/0000-0003-2017-7914"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Ulrik Franke","raw_affiliation_strings":["RISE Research Institutes of Sweden, Kista, Sweden"],"affiliations":[{"raw_affiliation_string":"RISE Research Institutes of Sweden, Kista, Sweden","institution_ids":["https://openalex.org/I2800664555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088161461","display_name":"Joachim Draeger","orcid":"https://orcid.org/0000-0001-6117-5726"},"institutions":[{"id":"https://openalex.org/I4210145618","display_name":"Industrieanlagen Betriebsgesellschaft (Germany)","ror":"https://ror.org/05bdw2t94","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210145618"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Joachim Draeger","raw_affiliation_strings":["IABG mbH, Ottobrunn, Germany"],"affiliations":[{"raw_affiliation_string":"IABG mbH, Ottobrunn, Germany","institution_ids":["https://openalex.org/I4210145618"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037374855"],"corresponding_institution_ids":["https://openalex.org/I2800664555"],"apc_list":null,"apc_paid":null,"fwci":0.3391,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6958228,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"24","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.7059313654899597},{"id":"https://openalex.org/keywords/obstacle","display_name":"Obstacle","score":0.6504307985305786},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.6093679666519165},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5960260629653931},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5680655241012573},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5484415888786316},{"id":"https://openalex.org/keywords/actuarial-science","display_name":"Actuarial science","score":0.5335543751716614},{"id":"https://openalex.org/keywords/business-interruption-insurance","display_name":"Business interruption insurance","score":0.49727681279182434},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4839373230934143},{"id":"https://openalex.org/keywords/business-model","display_name":"Business model","score":0.4809533655643463},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.4452529847621918},{"id":"https://openalex.org/keywords/insurance-policy","display_name":"Insurance policy","score":0.3359941840171814},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3339020609855652},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.25678104162216187},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.21308231353759766},{"id":"https://openalex.org/keywords/general-insurance","display_name":"General insurance","score":0.1383841335773468},{"id":"https://openalex.org/keywords/income-protection-insurance","display_name":"Income protection insurance","score":0.10624492168426514},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10087105631828308}],"concepts":[{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.7059313654899597},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.6504307985305786},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.6093679666519165},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5960260629653931},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5680655241012573},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5484415888786316},{"id":"https://openalex.org/C162118730","wikidata":"https://www.wikidata.org/wiki/Q1128453","display_name":"Actuarial science","level":1,"score":0.5335543751716614},{"id":"https://openalex.org/C172195485","wikidata":"https://www.wikidata.org/wiki/Q4443488","display_name":"Business interruption insurance","level":5,"score":0.49727681279182434},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4839373230934143},{"id":"https://openalex.org/C4216890","wikidata":"https://www.wikidata.org/wiki/Q815823","display_name":"Business model","level":2,"score":0.4809533655643463},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.4452529847621918},{"id":"https://openalex.org/C68799949","wikidata":"https://www.wikidata.org/wiki/Q977871","display_name":"Insurance policy","level":2,"score":0.3359941840171814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3339020609855652},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.25678104162216187},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.21308231353759766},{"id":"https://openalex.org/C14293393","wikidata":"https://www.wikidata.org/wiki/Q2663825","display_name":"General insurance","level":3,"score":0.1383841335773468},{"id":"https://openalex.org/C101615574","wikidata":"https://www.wikidata.org/wiki/Q17055997","display_name":"Income protection insurance","level":4,"score":0.10624492168426514},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10087105631828308},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cybersa.2019.8899678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2019.8899678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},{"id":"pmh:oai:DiVA.org:ri-39900","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-39900","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:DiVA.org:ri-39900","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-39900","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1495768301","https://openalex.org/W2062493711","https://openalex.org/W2092311045","https://openalex.org/W2126949246","https://openalex.org/W2142812297","https://openalex.org/W2144173251","https://openalex.org/W2550780206","https://openalex.org/W2565682512","https://openalex.org/W2590695271","https://openalex.org/W2591887805","https://openalex.org/W2609980528","https://openalex.org/W2618523767","https://openalex.org/W4229856074"],"related_works":["https://openalex.org/W4312311705","https://openalex.org/W2127879436","https://openalex.org/W196259366","https://openalex.org/W2393100584","https://openalex.org/W779360494","https://openalex.org/W1932190921","https://openalex.org/W2580403632","https://openalex.org/W4380030173","https://openalex.org/W4233466766","https://openalex.org/W4322155231"],"abstract_inverted_index":{"As":[0],"modern":[1],"society":[2],"becomes":[3,15],"ever":[4],"more":[5,16],"dependent":[6],"on":[7,106,155],"IT":[8],"services,":[9],"risk":[10,27,52,69,84],"management":[11,28,131],"of":[12,70,85,128],"cyber":[13,43,50],"incidents":[14,111],"important.":[17],"Cyber":[18],"insurance":[19],"is":[20,46,137,150],"one":[21],"tool,":[22],"among":[23],"others,":[24],"for":[25,142],"such":[26],"that":[29,49,76,97,112,120,135],"has":[30,77],"received":[31,78],"much":[32],"attention":[33,80],"in":[34],"the":[35,47,67,82,99,104,122,126,156],"past":[36],"few":[37],"years.":[38],"One":[39],"obstacle":[40],"to":[41],"well-functioning":[42],"insurance,":[44],"however,":[45],"fact":[48],"accumulation":[51,68,83],"remains":[53],"poorly":[54],"understood,":[55],"despite":[56],"efforts":[57],"from":[58,110],"practitioners":[59],"and":[60,102,133,158],"scientists.":[61],"In":[62],"this":[63],"article,":[64],"we":[65],"address":[66],"business":[71],"interruption":[72],"incidents,":[73],"an":[74,139,159],"area":[75],"less":[79],"than":[81],"data":[86],"breach":[87],"incidents.":[88],"Two":[89],"simple":[90],"models":[91,157],"are":[92],"introduced:":[93],"First,":[94],"a":[95,118],"model":[96,119],"takes":[98,121],"insurer's":[100],"perspective":[101],"explores":[103],"impact":[105],"aggregated":[107],"claims":[108],"cost":[109],"unintentionally":[113],"propagate":[114],"between":[115],"firms.":[116],"Second,":[117],"insured's":[123],"perspective,":[124],"considering":[125],"impacts":[127],"limited":[129],"incident":[130,146],"capacity":[132],"showing":[134],"there":[136],"sometimes":[138],"economic":[140],"case":[141],"collectively":[143],"funding":[144],"additional":[145],"managers.":[147],"The":[148],"paper":[149],"concluded":[151],"with":[152],"some":[153],"reflections":[154],"outlook.":[160]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
