{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:49:38Z","timestamp":1774367378832,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":25,"publisher":"Springer US","isbn-type":[{"value":"9780387097619","type":"print"},{"value":"9780387097626","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-09762-6_5","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T08:10:37Z","timestamp":1238055037000},"page":"99-119","source":"Crossref","is-referenced-by-count":12,"title":["Productivity Space of Information Security in an Extension of the Gordon-Loeb\u2019s InvestmentModel"],"prefix":"10.1007","author":[{"given":"Kanta","family":"Matsuura","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,12,22]]},"reference":[{"key":"5_CR1_5","volume-title":"The Fifth Workshop on the Economics of Information Security","author":"R. Boehme","year":"2006","unstructured":"Boehme, R., and Kataria, G. \"Models and Measures for Correlation in Cyber-Insurance,\" The Fifth Workshop on the Economics of Information Security, Cambridge, UK, June 2006."},{"key":"5_CR2_5","first-page":"139","volume-title":"Lecture Notes in Computer Science, (740)","author":"C. Dwork","year":"1992","unstructured":"Dwork, C., and Naor, M. Pricing via Processing or Combatting Junk Mail, Lecture Notes in Computer Science (740), Springer, Berlin\/Heidelberg, August 1992, pp. 139-147."},{"key":"5_CR3_5","volume-title":"The Fourth Workshop on the Economics of Information Security","author":"S. Dynes","year":"2005","unstructured":"Dynes, S., Brechbuhl, H., and Johnson, M. E. \"Information Security in the Extended Enterprise: Some Initial Results from a Field Study of an Industrial Firm,\" The Fourth Workshop on the Economics of Information Security, Cambridge, MA, June 2005."},{"key":"5_CR4_5","unstructured":"Geer, D. E. \u201cMaking Choices to Show ROI,\u201d Secure Business Quarterly (1:2), 2001, Q4."},{"issue":"4","key":"5_CR5_5","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L.A. Gordon","year":"2002","unstructured":"Gordon, L.A., and Loeb, M.P. \"The Economics of Information Security Investment,\" ACM Transactions on Info rmation and System Security (5:4), November 2002, pp. 438-457.","journal-title":"ACM Transactions on Info rmation and System Security"},{"issue":"6","key":"5_CR6_5","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.jaccpubpol.2003.09.001","volume":"22","author":"L.A. Gordon","year":"2003","unstructured":"Gordon, L.A., Loeb, M.P., and Lucyshyn, W. \u201cSharing Information on Computer Systems Security: An Economic Analysis,\u201d Journal of Accounting & Public Policy (22:6), November\/December 2003, pp. 461-485.","journal-title":"Journal of Accounting & Public Policy"},{"key":"5_CR7_5","unstructured":"Gordon, L. A., Loeb, M. P., Lucyshyn, W., and Richardson, R. \u201c2005 CSI\/FBI Computer Crime and Security Survey,\u201d Computer Security Institute, July 2005, Available from: \n                http:\/\/gocsi.com."},{"key":"5_CR8_5","unstructured":"Hoo, K.S., Sudbury, A.W., and Jaquith, A.R. \u201cTangible ROI through Secure Software Engineering,\u201d Secure Business Quarterly (1:2), 2001, Q4."},{"key":"5_CR9_5","unstructured":"Juels, A., and Brainard, J. \u201cClient Puzzles: A Cryptographic Countermeasure against Connection Depletion Attacks,\u201d in Proceedings of the Network and Distributed System Security Symposium 1999, San Diego, CA, February 1999, pp. 151-165."},{"issue":"2","key":"5_CR10_5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2004.07.004","volume":"24","author":"B. Karabacak","year":"2005","unstructured":"Karabacak, B., and Sogukpinar, L. \u201cISRAM: Information Security Risk Analysis Method,\u201d Computers & Security (24:2), March 2005, pp. 147-159.","journal-title":"Computers & Security"},{"key":"5_CR11_5","volume-title":"The Fourth Workshop on the Economics of Information Security","author":"J. P. Kesan","year":"2005","unstructured":"Kesan, J. P., Majuca, R. P., and Yurcik, W. J. \"Cyberinsurance as a Market-Based Solution to the Problem of Cybersecurity: A Case Study,\" The Fourth Workshop on the Economics of Information Security, Cambridge, MA, June 2005."},{"key":"5_CR12_5","first-page":"1239","volume-title":"Lecture Notes in Computer Science, (3482)","author":"S. Kim","year":"2005","unstructured":"Kim, S., and Lee, H.J. \u201cCost-Benefit Analysis of Security Investments: Methodology and Case Study,\u201d Lecture Notes in Computer Science (3482), Berlin\/Heidelberg, Springer, May 2005, pp. 1239-1248."},{"issue":"2\/3","key":"5_CR13_5","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H. Kunreuther","year":"2003","unstructured":"Kunreuther, H., and Heal, G. \u201cInterdependent Security,\u201d The Journal of Risk and Uncertainty (26:2\/3), March 2003, pp. 231-249.","journal-title":"The Journal of Risk and Uncertainty"},{"issue":"5","key":"5_CR14_5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MSP.2005.134","volume":"3","author":"P. Kuper","year":"2005","unstructured":"Kuper, P. \u201cThe Status of Security,\u201d IEEE Security & Privacy (3:5), September\/October 2005, pp. 51-53.","journal-title":"IEEE Security & Privacy"},{"key":"5_CR15_5","volume-title":"The Third Annual Workshop on Economics of Information Security","author":"B. Laurie","year":"2004","unstructured":"Laurie, B., and Clayton, R. \"Proof-of-Work Proves Not to Work,\" The Third Annual Workshop on Economics of Information Security, Minneapolis, MN, May 2004."},{"key":"5_CR16_5","volume-title":"The Fifth Workshop on the Economics of Information Security","author":"D. Liu","year":"2006","unstructured":"Liu, D., and Camp, L.J. \"Proof of Work Can Work,\" The Fifth Workshop on the Economics of Information Security, Cambridge, UK, June 2006."},{"issue":"9","key":"5_CR17_5","first-page":"3204","volume":"48","author":"W. Liu","year":"2007","unstructured":"Liu, W., Tanaka, H., and Matsuura, K. \u201cEmpirical-Analysis Methodology for Information-Security Investmentand Its Application to a Reliable Survey of Japanese Firms,\u201d IPSJ Journal (48:9), September 2007, pp. 3204-3218.","journal-title":"IPSJ Journal"},{"issue":"7","key":"5_CR18_5","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1016\/j.im.2004.10.004","volume":"42","author":"P. E.D. Lovea","year":"2005","unstructured":"Lovea, P. E.D., Iranib, Z., Standinga, C., Lina, C., and Burna, J. M. \u201cThe Enigma of Evaluation: Benefits, Costs and Risks of IT in Australian Small-Medium-Sized Enterprises,\u201d Information & Management (42:7), October 2005, pp. 947-964.","journal-title":"Information & Management"},{"key":"5_CR19_5","unstructured":"Matsuura, K., and Imai, H. \u201cProtection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack,\u201d in Proceedings of the 1998 International Symposium on Information Theory and Its Applications, Mexico City, October 1998, pp. 466-470."},{"issue":"5","key":"5_CR20_5","first-page":"972","volume":"E83-D","author":"K. Matsuura","year":"2000","unstructured":"Matsuura, K., and Imai, H. \u201cModified Aggressive Modes of Internet Key Exchange Resistant against Denial-of-Service Attacks,\u201d IEICE Transactions on Information and Systems (E83-D:5), May 2000, pp. 972-979.","journal-title":"IEICE Transactions on Information and Systems"},{"key":"5_CR21_5","volume-title":"The Fourth Workshop on the Economics of Information Security","author":"H. Ogut","year":"2005","unstructured":"Ogut, H., Menon, N., and Raghunathan, S. \"Cyber Insuranceand IT Security Investment: Impact of Interdependent Risk,\" The Fourth Workshop on the Economics of Information Security, Cambridge, MA, June 2005."},{"issue":"7","key":"5_CR22_5","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/j.cose.2004.09.004","volume":"23","author":"S.A. Purser","year":"2004","unstructured":"Purser, S.A. \u201cImproving the ROI of the Security Management Process,\u201d Computers & Security (23:7), October 2004, pp. 542-546.","journal-title":"Computers & Security"},{"issue":"1","key":"5_CR23_5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jaccpubpol.2004.12.003","volume":"24","author":"H. Tanaka","year":"2005","unstructured":"Tanaka, H., Matsuura, K., and Sudoh, O. \u201cVulnerability and Information Security Investment: an Empirical Analysis of e-Local Government in Japan,\u201d Journal of Accounting and Public Policy (24:1), January\/February 2005, pp. 37-59.","journal-title":"Journal of Accounting and Public Policy"},{"key":"5_CR24_5","volume-title":"Workshop on Economics and Information Security","author":"H. R. Varian","year":"2002","unstructured":"Varian, H. R. \u201cSystem Reliability and Free Riding,\u201d Workshop on Economics and Information Security, Berkeley, CA, May 2002."},{"issue":"8","key":"5_CR25_5","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/859670.859675","volume":"46","author":"M. E. Whitman","year":"2003","unstructured":"Whitman, M. E. \u201cEnemy at the Gate: Threats to Information Security,\u201d Communications of the ACM (46:8), August 2003, pp. 91-95.","journal-title":"Communications of the ACM"}],"container-title":["Managing Information Risk and the Economics of Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09762-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T07:08:57Z","timestamp":1552374537000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09762-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,22]]},"ISBN":["9780387097619","9780387097626"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09762-6_5","relation":{},"subject":[],"published":{"date-parts":[[2008,12,22]]}}}