[4] Deibert, R. J., & Rohozinski, R. (2010). “Risking security: Policies and paradoxes of cyberspace security”, International Political Sociology, vol. 4(1), pp. 15-32.
[5] Mohammadzadeh, Azadeh, (2019). “The growing market of cyber insurance”, Iran and world insurance news monthly. pp. 11-17. (In Persian).
[6] Ale, B., Burnap, P., & Slater, D. (2015). “On the origin of PCDS–(Probability consequence diagrams)”, Safety science, vol. 72, pp. 229-239.
[7] Aven, T. (2014). “What is safety science?”, Safety science, 67, pp. 15-20.
[8] Allianz Risk Barometer.2023. Allianz Global Corporate & Specialty.
[9] Ventures, C. (2022). “2022 Official Cybercrime Report”, Cybersecurity Ventures.
[10] Roodpashti Rahmanai, Fereydoun, Zandi, Anahita, (2021). “Security Risk Models for Cyber Insurance”, Insurance Research Center. (In Persian)
[11] Tadaion, Mehtab, Ahmadian, Yasmin, Jahangirzadeh, Elnaz, Maleki, Hamid, (2021). “Investigating the impact of the organization's information technology capabilities on the development of new products and services (case study: development of cyber insurance as a new product in Saman Insurance Company)”, 20 and the 8th Insurance and Development Conference, Tehran, https://civilica.com/doc/1390759 (In Persian)
[12] Sadeghi, Ali, Asghari Eskoui, Mohammad Reza, (2021). “Review of risk estimation models in cyber insurance”, 28th Insurance and Development Conference, Tehran, https://civilica.com/doc/1390872 (In Persian)
[13] Mukhopadhyay, A., Chatterjee, S., Saha, D., Mahanti, A., & Sadhukhan, S. K. (2013). “Cyber-risk decision models: To insure IT or not?”, Decision Support Systems, vol. 56, pp. 11-26.
[14] Biener, C., Eling, M., & Wirfs, J. H. (2015). “Insurability of cyber risk: An empirical analysis”, The Geneva Papers on Risk and Insurance-Issues and Practice, vol. 40(1), pp. 131-158.
[15] Bartolini, D. N., Benavente-Peces, C., & Ahrens, A. (2017). “Using risk assessments to assess insurability in the context of cyber insurance”, In International Conference on E-Business and Telecommunications Springer, Cham, pp. 337-345.
[16] Trang, M. N. (2017). “Compulsory corporate cyber-liability insurance: Outsourcing data privacy regulation to prevent and mitigate data breaches”, Minn. JL Sci. & Tech., no. 18, vol. 389.
[17] Nurse, J. R., Axon, L., Erola, A., Agrafiotis, I., Goldsmith, M., & Creese, S. (2020). “The data that drives cyber insurance: A study into the underwriting and claims processes”, In 2020 International conference on cyber situational awareness, data analytics and assessment (CyberSA). IEEE, pp. 1-8.
[18] Awiszus, K., Knispel, T., Penner, I., Svindland, G., Voß, A., & Weber, S. (2022). “Modeling and Pricing Cyber Insurance--A Survey”, arXiv preprint arXiv:2209.07415
[19] Elsan, M., (2016). “Cyber space insurance: basic concepts and operational plan”, Insurance Research Center (In Persian)
[20] Burke, D. (2020, April 2). “Coronavirus Impact on Cyber Insurance Coverage”, Woodruff Sawyer. https://woodruffsawyer.com/cyber-liability/coronavirus-impact-cyber-insurance/
[21] Pourshikhi, M., Karam Elahi, A. and Moghadisi, M., (2013). “Introduction of security threats in the virtual world”, The first specialized conference of electrical and computer engineering. (In Persian)
[22 Swiss Re Institute, (2022). “Cyber insurance: strengthening resilience for the digital transformation”.
[23] Moody Kiddell and partnered, (2022). “Cyber Insurance”, https://www.mkpgroup.com.au-/insurance/cyber-insurance.
[24] Roso, J., (2020), “The Importance of Cyber Insurance in a Working from Home Economy”, https://www.linkedin.com/pulse/importance-cyber-insurance-working-from-home-economy-jonathan-ross
[25] Eiopa, (2021). “Joint Committee Report on risks and vulnerabilities in the EU financial system”.
[26] Deloitte, (2022). “Global Cyber Executive Briefing: Insurance”, https://www2.deloitte.com-/tw/en/pages/risk/articles/insurance.html