{"id":"https://openalex.org/W2129239071","doi":"https://doi.org/10.1109/hicss.2004.1265445","title":"Method for insuring IT risks","display_name":"Method for insuring IT risks","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2129239071","doi":"https://doi.org/10.1109/hicss.2004.1265445","mag":"2129239071"},"language":"en","primary_location":{"id":"doi:10.1109/hicss.2004.1265445","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2004.1265445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111182194","display_name":"Christer Sven Magnusson","orcid":null},"institutions":[{"id":"https://openalex.org/I161593684","display_name":"Stockholm University","ror":"https://ror.org/05f0yaq80","country_code":"SE","type":"education","lineage":["https://openalex.org/I161593684"]},{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"C. Magnusson","raw_affiliation_strings":["Department of Computer and Systems Sciences, Royal Institute of Technology/Stockholm University, Sweden","Dept. of Comput. & Syst. Sci., Stockholm Univ., , Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Systems Sciences, Royal Institute of Technology/Stockholm University, Sweden","institution_ids":["https://openalex.org/I86987016","https://openalex.org/I161593684"]},{"raw_affiliation_string":"Dept. of Comput. & Syst. Sci., Stockholm Univ., , Sweden","institution_ids":["https://openalex.org/I161593684"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046808650","display_name":"Louise Yngstr\u00f6m","orcid":null},"institutions":[{"id":"https://openalex.org/I161593684","display_name":"Stockholm University","ror":"https://ror.org/05f0yaq80","country_code":"SE","type":"education","lineage":["https://openalex.org/I161593684"]},{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"L. Yngstrom","raw_affiliation_strings":["Department of Computer and Systems Sciences, Royal Institute of Technology/Stockholm University, Sweden","Dept. of Comput. & Syst. Sci., Stockholm Univ., , Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Systems Sciences, Royal Institute of Technology/Stockholm University, Sweden","institution_ids":["https://openalex.org/I86987016","https://openalex.org/I161593684"]},{"raw_affiliation_string":"Dept. of Comput. & Syst. Sci., Stockholm Univ., , Sweden","institution_ids":["https://openalex.org/I161593684"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111182194"],"corresponding_institution_ids":["https://openalex.org/I161593684","https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":0.7891,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.85497861,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"25","issue":null,"first_page":"8 pp.","last_page":"8 pp."},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/embezzlement","display_name":"Embezzlement","score":0.79624342918396},{"id":"https://openalex.org/keywords/property-insurance","display_name":"Property insurance","score":0.6444550156593323},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.599786639213562},{"id":"https://openalex.org/keywords/business-interruption-insurance","display_name":"Business interruption insurance","score":0.5647938847541809},{"id":"https://openalex.org/keywords/actuarial-science","display_name":"Actuarial science","score":0.5415773987770081},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.5366726517677307},{"id":"https://openalex.org/keywords/insurance-policy","display_name":"Insurance policy","score":0.5204030275344849},{"id":"https://openalex.org/keywords/liability-insurance","display_name":"Liability insurance","score":0.5150977969169617},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.5094671845436096},{"id":"https://openalex.org/keywords/insurance-fraud","display_name":"Insurance fraud","score":0.47613123059272766},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.44437146186828613},{"id":"https://openalex.org/keywords/casualty-insurance","display_name":"Casualty insurance","score":0.41990718245506287},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37890830636024475},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.3764950931072235},{"id":"https://openalex.org/keywords/general-insurance","display_name":"General insurance","score":0.36030900478363037},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.22074905037879944},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.11623337864875793},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10479074716567993},{"id":"https://openalex.org/keywords/income-protection-insurance","display_name":"Income protection insurance","score":0.09546175599098206}],"concepts":[{"id":"https://openalex.org/C2776529561","wikidata":"https://www.wikidata.org/wiki/Q157833","display_name":"Embezzlement","level":3,"score":0.79624342918396},{"id":"https://openalex.org/C5891342","wikidata":"https://www.wikidata.org/wiki/Q2868302","display_name":"Property insurance","level":4,"score":0.6444550156593323},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.599786639213562},{"id":"https://openalex.org/C172195485","wikidata":"https://www.wikidata.org/wiki/Q4443488","display_name":"Business interruption insurance","level":5,"score":0.5647938847541809},{"id":"https://openalex.org/C162118730","wikidata":"https://www.wikidata.org/wiki/Q1128453","display_name":"Actuarial science","level":1,"score":0.5415773987770081},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.5366726517677307},{"id":"https://openalex.org/C68799949","wikidata":"https://www.wikidata.org/wiki/Q977871","display_name":"Insurance policy","level":2,"score":0.5204030275344849},{"id":"https://openalex.org/C115672447","wikidata":"https://www.wikidata.org/wiki/Q992350","display_name":"Liability insurance","level":3,"score":0.5150977969169617},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.5094671845436096},{"id":"https://openalex.org/C2778976927","wikidata":"https://www.wikidata.org/wiki/Q838081","display_name":"Insurance fraud","level":2,"score":0.47613123059272766},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.44437146186828613},{"id":"https://openalex.org/C22738907","wikidata":"https://www.wikidata.org/wiki/Q3813256","display_name":"Casualty insurance","level":3,"score":0.41990718245506287},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37890830636024475},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.3764950931072235},{"id":"https://openalex.org/C14293393","wikidata":"https://www.wikidata.org/wiki/Q2663825","display_name":"General insurance","level":3,"score":0.36030900478363037},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.22074905037879944},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.11623337864875793},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10479074716567993},{"id":"https://openalex.org/C101615574","wikidata":"https://www.wikidata.org/wiki/Q17055997","display_name":"Income protection insurance","level":4,"score":0.09546175599098206},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C202565627","wikidata":"https://www.wikidata.org/wiki/Q146491","display_name":"Criminal law","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hicss.2004.1265445","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2004.1265445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W193500057","https://openalex.org/W610108610","https://openalex.org/W1535838524","https://openalex.org/W1559498407","https://openalex.org/W1995841147","https://openalex.org/W2084044852","https://openalex.org/W2096555306","https://openalex.org/W2167821110","https://openalex.org/W3217808497","https://openalex.org/W6618905659"],"related_works":["https://openalex.org/W2319381678","https://openalex.org/W2987735569","https://openalex.org/W586796497","https://openalex.org/W2619093284","https://openalex.org/W3003504667","https://openalex.org/W2769430682","https://openalex.org/W196259366","https://openalex.org/W2361123621","https://openalex.org/W4233466766","https://openalex.org/W2920968647"],"abstract_inverted_index":{"This":[0,213],"paper":[1],"explains":[2],"in":[3,38,65,117,124,132,184,209],"detail":[4],"the":[5,8,39,62,83,91,94,110,113,133,142,185,210,216,223,245,259,263,271,274,277,287],"method":[6,208],"behind":[7],"insurance":[9,154,160,182,202,211,217,231,260,266],"database":[10,18,199],"estimated":[11,84,123],"maximum":[12,85],"information":[13],"technology":[14],"loss":[15,86,114,147,187],"(EMitL).":[16],"The":[17,136,153,181,198,230,268],"has":[19],"been":[20],"a":[21,98,118,125,206],"crucial":[22],"tool":[23],"to":[24,28,34,222,237],"make":[25],"it":[26],"possible":[27],"insure":[29,35],"IT":[30,137,246],"perils.":[31],"It":[32],"helps":[33],"IT-perils":[36],"financially":[37],"same":[40],"professional":[41],"way":[42],"as":[43,79,293],"consequences":[44],"of":[45,148,173,177,188,225,265,276,289,295],"traditional":[46,143],"perils":[47],"like":[48],"fire,":[49],"flood,":[50],"and":[51,55,89,128,150,166,169,175,192,194,196,234,251,253,262,270,292],"robbery":[52,168,195],"are":[53,139,219,235,242,254,284],"insured,":[54],"thereby":[56,90,129],"secures":[57],"shareholders'":[58],"investments.":[59],"EMitL":[60,200],"estimates":[61],"security":[63,74,107,238,247,278,290],"awareness":[64,291],"an":[66],"existing":[67,73],"IT-platform.":[68],"Based":[69],"on":[70,105,141,244,258],"that":[71,215],"information,":[72],"measures":[75],"can":[76,102,121],"be":[77,103,122,130],"\"priced\"":[78],"they":[80,228,283],"may":[81],"reduce":[82],"figures":[87],"-":[88],"costs":[92,111],"for":[93,112,286],"insurance.":[95,296],"In":[96],"addition,":[97],"more":[99],"cost-effective":[100],"decision":[101],"made":[104],"additional":[106],"measures.":[108],"Furthermore,":[109],"exposure":[115],"inherent":[116],"business":[119,151,163],"service/product":[120],"better":[126],"way,":[127],"incorporated":[131],"product's":[134],"price.":[135],"insurances":[138],"based":[140],"industries'":[144],"classes:":[145],"liability,":[146],"property,":[149],"interruption.":[152],"class":[155,186],"liability":[156],"is":[157,205],"divided":[158],"into":[159],"policies":[161,183,218],"for:":[162],"interruption,":[164],"fraud":[165,191],"embezzlement,":[167,193],"theft,":[170],"defamation,":[171],"infringement":[172,176],"privacy,":[174],"code,":[178],"trademark":[179],"etc.":[180],"property":[189],"are:":[190],"theft.":[197],"layers":[201],"covers,":[203],"which":[204],"common":[207],"industry.":[212],"means":[214],"layered":[220],"according":[221],"amount":[224],"financial":[226],"cover":[227],"provide.":[229],"levels":[232,241,272],"relate":[233],"converted":[236],"levels.":[239],"These":[240],"built":[243],"properties":[248,269],"integrity,":[249],"availability":[250],"confidentiality,":[252],"utilized":[255],"differently,":[256],"depending":[257],"level":[261],"type":[264],"policy.":[267],"constitute":[273],"base":[275],"polices":[279],"produced":[280],"by":[281],"EMitL;":[282],"used":[285],"estimation":[288],"terms":[294]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
