AI Cyber Damage Estimates
ai-cyber-damage-estimatesanalysisPath: /knowledge-base/models/ai-cyber-damage-estimates/
E2515Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "ai-cyber-damage-estimates",
"wikiId": "E2515",
"path": "/knowledge-base/models/ai-cyber-damage-estimates/",
"filePath": "knowledge-base/models/ai-cyber-damage-estimates.mdx",
"title": "AI Cyber Damage Estimates",
"quality": null,
"readerImportance": null,
"researchImportance": null,
"tacticalValue": null,
"contentFormat": "article",
"causalLevel": null,
"lastUpdated": "2026-04-25",
"dateCreated": "2026-04-25",
"summary": null,
"description": "Methodology comparison of major global cyber damage estimates (Cybersecurity Ventures, Munich Re, FBI IC3, IBM, academic) — translates each to GDP fraction, adjudicates which are credible for which questions, and reconciles the ~600x spread visible on E86 Cyberweapons",
"ratings": null,
"category": "models",
"subcategory": "analysis-models",
"clusters": [
"cyber",
"ai-safety"
],
"metrics": {
"wordCount": 2598,
"tableCount": 2,
"diagramCount": 0,
"internalLinks": 0,
"externalLinks": 18,
"footnoteCount": 11,
"bulletRatio": 0.05,
"sectionCount": 14,
"hasOverview": true,
"structuralScore": 12
},
"suggestedQuality": 80,
"updateFrequency": null,
"evergreen": true,
"wordCount": 2598,
"unconvertedLinks": [
{
"text": "IBM / Ponemon (2025)",
"url": "https://www.ibm.com/reports/data-breach",
"resourceId": "eb9eb1b74bd70224",
"resourceTitle": "IBM's 2025 Cost of a Data Breach Report"
},
{
"text": "Cost of a Data Breach Report 2025.",
"url": "https://www.ibm.com/reports/data-breach",
"resourceId": "eb9eb1b74bd70224",
"resourceTitle": "IBM's 2025 Cost of a Data Breach Report"
}
],
"unconvertedLinkCount": 2,
"convertedLinkCount": 0,
"backlinkCount": 4,
"hallucinationRisk": {
"level": "low",
"score": 30,
"factors": [
"moderately-cited"
]
},
"entityType": "analysis",
"redundancy": {
"maxSimilarity": 15,
"similarPages": [
{
"id": "fraud",
"title": "AI-Powered Fraud",
"path": "/knowledge-base/risks/fraud/",
"similarity": 15
},
{
"id": "cyberweapons",
"title": "Cyberweapons",
"path": "/knowledge-base/risks/cyberweapons/",
"similarity": 13
},
{
"id": "ai-powered-investigation",
"title": "AI-Powered Investigation",
"path": "/knowledge-base/capabilities/ai-powered-investigation/",
"similarity": 12
},
{
"id": "ai-compute-scaling-metrics",
"title": "AI Compute Scaling Metrics",
"path": "/knowledge-base/models/ai-compute-scaling-metrics/",
"similarity": 12
},
{
"id": "ai-cyber-damage-bounding-tail",
"title": "AI Cyber Damage: Bounding the Tail",
"path": "/knowledge-base/models/ai-cyber-damage-bounding-tail/",
"similarity": 12
}
]
},
"coverage": {
"passing": 4,
"total": 13,
"targets": {
"tables": 10,
"diagrams": 1,
"internalLinks": 21,
"externalLinks": 13,
"footnotes": 8,
"references": 8
},
"actuals": {
"tables": 2,
"diagrams": 0,
"internalLinks": 0,
"externalLinks": 18,
"footnotes": 11,
"references": 1,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"summary": "red",
"schedule": "red",
"entity": "green",
"editHistory": "red",
"overview": "green",
"tables": "amber",
"diagrams": "red",
"internalLinks": "red",
"externalLinks": "green",
"footnotes": "green",
"references": "amber",
"quotes": "red",
"accuracy": "red"
}
},
"recommendedScore": 21.76
}External Links
No external links
Backlinks (4)
| id | title | type | relationship |
|---|---|---|---|
| cyber-insurance-market-signals | Cyber Insurance Market Signals | analysis | related |
| ai-cyber-damage-bounding-tail | AI Cyber Damage: Bounding the Tail | analysis | related |
| catastrophic-cyber-tail-risk | Catastrophic Cyber Tail Risk | risk | — |
| cyberweapons | Cyberweapons | risk | — |