{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:55:03Z","timestamp":1761807303541},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540377504"},{"type":"electronic","value":"9783540377528"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11824633_4","type":"book-chapter","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T15:23:09Z","timestamp":1158592989000},"page":"31-40","source":"Crossref","is-referenced-by-count":11,"title":["On the Limits of Cyber-Insurance"],"prefix":"10.1007","author":[{"given":"Rainer","family":"B\u00f6hme","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Kataria","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","first-page":"233","volume-title":"Proceedings of LISA 2002: 16th Systems Administration Conference","author":"S. Beattie","year":"2002","unstructured":"Beattie, S., et al.: Timing the application of security patches for optimal uptime. In: Proceedings of LISA 2002: 16th Systems Administration Conference, pp. 233\u2013242. USENIX Association, Berkeley (2002)"},{"key":"4_CR2","unstructured":"Geer, D., et al.: CyberInsecurity \u2013 The cost of monopoly (2003), http:\/\/www.ccianet.org\/papers\/cyberinsecurity.pdf"},{"key":"4_CR3","unstructured":"Chen, P.Y., Kataria, G., Krishnan, R.: Software diversity for information security. In: Workshop on the Economics of Information Security (WEIS), Harvard University, Cambridge, MA (2005), http:\/\/infosecon.net\/workshop\/pdf\/47.pdf"},{"key":"4_CR4","unstructured":"Soo\u00a0Hoo, K.J.: How Much Is Enough? A Risk-Management Approach To Computer Security. PhD thesis, Stanford University, CA (2000), http:\/\/cisac.stanford.edu\/publications\/11900\/"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-540-45126-6_9","volume-title":"Financial Cryptography","author":"S.E. Schechter","year":"2003","unstructured":"Schechter, S.E., Smith, M.D.: How much security is enough to stop a thief? In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 122\u2013137. Springer, Heidelberg (2003)"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MITP.2004.89","volume":"6","author":"A. Arora","year":"2004","unstructured":"Arora, A., Hall, D., Pinto, C.A., Ramsey, D., Telang, R.: Measuring the risk-based value of IT security solutions. IEEE IT Professional Magazine\u00a06, 35\u201342 (2004)","journal-title":"IEEE IT Professional Magazine"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L.A. Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Transactions on Information and System Security\u00a05, 438\u2013457 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/636772.636774","volume":"46","author":"L.A. Gordon","year":"2003","unstructured":"Gordon, L.A., Loeb, M.P., Sohail, T.: A framework for using insurance for cyber-risk management. Communications of the ACM\u00a046, 81\u201385 (2003)","journal-title":"Communications of the ACM"},{"key":"4_CR9","unstructured":"Majuca, R.P., Yurcik, W., Kesan, J.P.: The evolution of cyberinsurance. In: ACM Computing Research Repository (CoRR), Technical Report cs.CR\/0601020 (2006)"},{"key":"4_CR10","unstructured":"Ogut, H., Menon, N., Ragunathan, S.: Cyber insurance and IT security investment: Impact of independent risk. In: Workshop on the Economics of Information Security (WEIS), Harvard University, Cambridge, MA (2005), http:\/\/infosecon.net\/workshop\/pdf\/56.pdf"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H. Kunreuther","year":"2003","unstructured":"Kunreuther, H., Heal, G.: Interdependent security. Journal of Risk and Uncertainty\u00a026, 231\u2013249 (2003)","journal-title":"Journal of Risk and Uncertainty"},{"key":"4_CR12","unstructured":"B\u00f6hme, R.: Cyber-insurance revisited. In: Workshop on the Economics of Information Security (WEIS), Harvard University, Cambridge, MA (2005), http:\/\/infosecon.net\/workshop\/pdf\/15.pdf"},{"key":"4_CR13","volume-title":"Modelling Extremal Events for Insurance and Finance","author":"P. Embrechts","year":"1999","unstructured":"Embrechts, P., Kl\u00fcppelberg, C., Mikosch, T.: Modelling Extremal Events for Insurance and Finance, 2nd edn. Springer, Heidelberg (1999)","edition":"2"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Schultz, E.E.: A framework for understanding and predicting insider attacks. In: Proc. of Compsec, London, UK, pp. 526\u2013531 (2002)","DOI":"10.1016\/S0167-4048(02)01009-X"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Kreibich, C., Crowcroft, J.: Honeycomb - creating intrusion detection signatures using honeypots. In: Proceedings of the Second Workshop on Hot Topics in Networks (HotNets-II) (2003)","DOI":"10.1145\/972374.972384"},{"key":"4_CR16","unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI) (2004)"},{"key":"4_CR17","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: Automatic signature generation for polymorphic worms. In: Proceedings of the IEEE Security and Privacy Symposium (2005)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Bakkaloglu, M., Wylie, J., Wang, C., Ganger, G.: On correlated failures in survivable storage systems, Technical Report CMU-CS-02-129, Carnegie Mellon University, School of Computer Science (2002)","DOI":"10.21236\/ADA461303"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/32.48942","volume":"16","author":"V.F. Nicola","year":"1990","unstructured":"Nicola, V.F., Goyal, A.: Modeling of correlated failures and community error recovery in multiversion software. IEEE Transactions on Software Engineering\u00a016, 350\u2013359 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR20","first-page":"111","volume":"71","author":"S. Demarta","year":"2005","unstructured":"Demarta, S., McNeil, A.J.: The t copula and related copulas. International Statistical Review\u00a071, 111\u2013129 (2005)","journal-title":"International Statistical Review"},{"key":"4_CR21","volume-title":"Workshop on the Economics of Information Security (WEIS).","author":"R. B\u00f6hme","year":"2006","unstructured":"B\u00f6hme, R., Kataria, G.: Models and measures for correlation in cyber-insurance. In: Workshop on the Economics of Information Security (WEIS). University of Cambridge, UK (2006), http:\/\/weis2006.econinfosec.org\/docs\/16.pdf"},{"key":"4_CR22","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.863969","volume":"33","author":"J.J. Wylie","year":"2000","unstructured":"Wylie, J.J., et al.: Survivable information storage systems. IEEE Computer\u00a033, 61\u201368 (2000)","journal-title":"IEEE Computer"},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022, 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"32","author":"M.O. Rabin","year":"1989","unstructured":"Rabin, M.O.: Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the ACM\u00a032, 335\u2013348 (1989)","journal-title":"Journal of the ACM"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"122","DOI":"10.2307\/1913738","volume":"32","author":"J.W. Pratt","year":"1964","unstructured":"Pratt, J.W.: Risk aversion in the small and in the large. Econometrica\u00a032, 122\u2013136 (1964)","journal-title":"Econometrica"},{"key":"4_CR26","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1086\/259916","volume":"80","author":"I. Ehrlich","year":"1972","unstructured":"Ehrlich, I., Becker, G.S.: Market insurance, self-insurance, and self-protection. Journal of Political Economy\u00a080, 623\u2013648 (1972)","journal-title":"Journal of Political Economy"}],"container-title":["Lecture Notes in Computer Science","Trust and Privacy in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11824633_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:17:38Z","timestamp":1605644258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11824633_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540377504","9783540377528"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11824633_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}