Text this: Analysing cyber-insurance claims to design harm-propagation trees