{"id":"https://openalex.org/W2900879715","doi":"https://doi.org/10.1109/tifs.2018.2881694","title":"A Coalitional Cyber-Insurance Framework for a Common Platform","display_name":"A Coalitional Cyber-Insurance Framework for a Common Platform","publication_year":2018,"publication_date":"2018-11-16","ids":{"openalex":"https://openalex.org/W2900879715","doi":"https://doi.org/10.1109/tifs.2018.2881694","mag":"2900879715"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2881694","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2881694","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008183355","display_name":"Iman Vakilinia","orcid":"https://orcid.org/0000-0003-3015-2518"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Iman Vakilinia","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Nevada, Reno, NV, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nevada, Reno, NV, USA","institution_ids":["https://openalex.org/I134113660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100748436","display_name":"Shamik Sengupta","orcid":"https://orcid.org/0000-0002-2019-8056"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shamik Sengupta","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Nevada, Reno, NV, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nevada, Reno, NV, USA","institution_ids":["https://openalex.org/I134113660"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5008183355"],"corresponding_institution_ids":["https://openalex.org/I134113660"],"apc_list":null,"apc_paid":null,"fwci":9.8429,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.98137101,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"14","issue":"6","first_page":"1526","last_page":"1538"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11995","display_name":"FinTech, Crowdfunding, Digital Finance","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adverse-selection","display_name":"Adverse selection","score":0.7570952773094177},{"id":"https://openalex.org/keywords/moral-hazard","display_name":"Moral hazard","score":0.6643176674842834},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.6092017889022827},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5866456627845764},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.560093104839325},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5257202982902527},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5253973603248596},{"id":"https://openalex.org/keywords/incentive-compatibility","display_name":"Incentive compatibility","score":0.5003547668457031},{"id":"https://openalex.org/keywords/business-interruption-insurance","display_name":"Business interruption insurance","score":0.46906518936157227},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.43401262164115906},{"id":"https://openalex.org/keywords/information-asymmetry","display_name":"Information asymmetry","score":0.42824414372444153},{"id":"https://openalex.org/keywords/risk-pool","display_name":"Risk pool","score":0.4100745916366577},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.40338370203971863},{"id":"https://openalex.org/keywords/insurance-policy","display_name":"Insurance policy","score":0.39171040058135986},{"id":"https://openalex.org/keywords/actuarial-science","display_name":"Actuarial science","score":0.30702537298202515},{"id":"https://openalex.org/keywords/casualty-insurance","display_name":"Casualty insurance","score":0.3057977557182312},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.2808016240596771},{"id":"https://openalex.org/keywords/general-insurance","display_name":"General insurance","score":0.2327427864074707},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.21372762322425842},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.1489785611629486},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.11165428161621094}],"concepts":[{"id":"https://openalex.org/C32252159","wikidata":"https://www.wikidata.org/wiki/Q380037","display_name":"Adverse selection","level":2,"score":0.7570952773094177},{"id":"https://openalex.org/C2780202544","wikidata":"https://www.wikidata.org/wiki/Q44454","display_name":"Moral hazard","level":3,"score":0.6643176674842834},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.6092017889022827},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5866456627845764},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.560093104839325},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5257202982902527},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5253973603248596},{"id":"https://openalex.org/C91810955","wikidata":"https://www.wikidata.org/wiki/Q7731670","display_name":"Incentive compatibility","level":3,"score":0.5003547668457031},{"id":"https://openalex.org/C172195485","wikidata":"https://www.wikidata.org/wiki/Q4443488","display_name":"Business interruption insurance","level":5,"score":0.46906518936157227},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.43401262164115906},{"id":"https://openalex.org/C137577040","wikidata":"https://www.wikidata.org/wiki/Q431965","display_name":"Information asymmetry","level":2,"score":0.42824414372444153},{"id":"https://openalex.org/C96535974","wikidata":"https://www.wikidata.org/wiki/Q1351914","display_name":"Risk pool","level":4,"score":0.4100745916366577},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.40338370203971863},{"id":"https://openalex.org/C68799949","wikidata":"https://www.wikidata.org/wiki/Q977871","display_name":"Insurance policy","level":2,"score":0.39171040058135986},{"id":"https://openalex.org/C162118730","wikidata":"https://www.wikidata.org/wiki/Q1128453","display_name":"Actuarial science","level":1,"score":0.30702537298202515},{"id":"https://openalex.org/C22738907","wikidata":"https://www.wikidata.org/wiki/Q3813256","display_name":"Casualty insurance","level":3,"score":0.3057977557182312},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.2808016240596771},{"id":"https://openalex.org/C14293393","wikidata":"https://www.wikidata.org/wiki/Q2663825","display_name":"General insurance","level":3,"score":0.2327427864074707},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.21372762322425842},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.1489785611629486},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.11165428161621094},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C101615574","wikidata":"https://www.wikidata.org/wiki/Q17055997","display_name":"Income protection insurance","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2018.2881694","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2881694","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.4300000071525574,"display_name":"Decent work and economic growth"}],"awards":[{"id":"https://openalex.org/G4602628829","display_name":null,"funder_award_id":"1528167","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W77047371","https://openalex.org/W195958578","https://openalex.org/W198324312","https://openalex.org/W1516366611","https://openalex.org/W1738749088","https://openalex.org/W2017809722","https://openalex.org/W2036567844","https://openalex.org/W2053225008","https://openalex.org/W2067064328","https://openalex.org/W2074035703","https://openalex.org/W2085839111","https://openalex.org/W2126949246","https://openalex.org/W2131832787","https://openalex.org/W2141961894","https://openalex.org/W2476088750","https://openalex.org/W2516247356","https://openalex.org/W2567607894","https://openalex.org/W2590695271","https://openalex.org/W2590787195","https://openalex.org/W2755503278","https://openalex.org/W2759989706","https://openalex.org/W2764126000","https://openalex.org/W2772966488","https://openalex.org/W2775296991","https://openalex.org/W2783270181","https://openalex.org/W2794377947","https://openalex.org/W2890976049","https://openalex.org/W2981014813","https://openalex.org/W3121840377","https://openalex.org/W3125210271","https://openalex.org/W6769507720"],"related_works":["https://openalex.org/W3155818834","https://openalex.org/W1544352685","https://openalex.org/W2393100584","https://openalex.org/W4239774117","https://openalex.org/W4240888861","https://openalex.org/W3015764716","https://openalex.org/W3125559947","https://openalex.org/W4386773976","https://openalex.org/W2736171364","https://openalex.org/W3204041098"],"abstract_inverted_index":{"Despite":[0],"the":[1,22,28,46,57,64,68,111,123,126,129,132,138,142,147,165,184,198],"benefits":[2],"of":[3,15,59,66,99,149],"cyber-insurance,":[4,54],"organizations":[5,92,114,194],"are":[6,26,42],"reluctant":[7],"to":[8,121,136,195],"enroll":[9],"in":[10,125,141],"such":[11,162,179],"policies":[12],"mainly":[13],"because":[14],"their":[16,51],"limitation":[17],"and":[18,31,37,50,73,79,119,172,201],"high":[19],"price.":[20],"On":[21],"other":[23],"hand,":[24],"insurers":[25],"confronting":[27],"adverse":[29,69],"selection":[30],"moral":[32,71],"hazard":[33],"problems":[34],"as":[35,116,190],"monitoring":[36],"distinguishing":[38],"insureds'":[39],"cybersecurity":[40,77,199],"posture":[41],"highly":[43],"complicated.":[44],"Considering":[45],"organizations'":[47],"security":[48],"interdependency":[49],"demand":[52],"for":[53,76,105,161,193],"we":[55,85,145,155],"study":[56,177],"design":[58],"coalitional":[60],"insurance":[61,89],"mechanisms":[62,160],"with":[63],"goal":[65],"covering":[67],"selection,":[70],"hazard,":[72],"motivating":[74],"players":[75],"investment":[78,200],"information":[80,202],"sharing.":[81,203],"To":[82],"this":[83],"end,":[84],"propose":[86],"a":[87,95,107,150,180,191],"synergistic":[88],"framework,":[90],"where":[91],"collaboratively":[93],"insure":[94],"common":[96,108,151],"platform":[97,152],"instead":[98],"themselves.":[100],"We":[101,176],"present":[102],"three":[103],"models":[104],"insuring":[106],"platform.":[109],"In":[110,128],"first":[112],"model,":[113,131,144],"act":[115],"both":[117],"insurer":[118],"insured":[120],"distribute":[122],"risk":[124],"coalition.":[127],"second":[130],"system":[133,181],"provides":[134],"rewards":[135],"crowdfund":[137],"insurance.":[139,153],"Finally,":[140],"third":[143],"investigate":[146],"outsourcing":[148],"Furthermore,":[154],"discuss":[156],"how":[157,178],"our":[158],"proposed":[159],"framework":[163],"satisfy":[164],"budget":[166],"balanced,":[167],"ex":[168],"ante":[169],"individual":[170],"rationality,":[171],"incentive":[173],"compatibility":[174],"properties.":[175],"can":[182],"improve":[183],"social":[185],"welfare":[186],"by":[187],"leveraging":[188],"cyber-insurance":[189],"motivation":[192],"cooperate":[196],"on":[197]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
