{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:49:54Z","timestamp":1725702594252},"publisher-location":"New York, NY","reference-count":12,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461419808"},{"type":"electronic","value":"9781461419815"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-1981-5_1","type":"book-chapter","created":{"date-parts":[[2012,9,24]],"date-time":"2012-09-24T18:57:39Z","timestamp":1348513059000},"page":"1-12","source":"Crossref","is-referenced-by-count":4,"title":["The Impact of Immediate Disclosure on Attack Diffusion and Volume"],"prefix":"10.1007","author":[{"given":"Sam","family":"Ransbotham","sequence":"first","affiliation":[]},{"given":"Sabyasachi","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,27]]},"reference":[{"issue":"3","key":"1_CR1","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1287\/mnsc.1050.0440","volume":"52","author":"A Arora","year":"2006","unstructured":"Arora A, Caulkins JP, Telang R (2006) Sell first, fix later: impact of patching on software quality. Manag Sci 52(3):465\u2013471","journal-title":"Manag Sci"},{"issue":"4","key":"1_CR2","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1287\/mnsc.1070.0771","volume":"54","author":"A Arora","year":"2008","unstructured":"Arora A, Telang R, Hao X (2008) Optimal policy for software vulnerability disclosure. Manag Sci 54(4):642\u2013656","journal-title":"Manag Sci"},{"issue":"11","key":"1_CR3","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.1287\/mnsc.1060.0568","volume":"52","author":"T August","year":"2006","unstructured":"August T, Tunca TI (2006) Network software security and user incentives. Manag Sci 52(11):1703\u20131720","journal-title":"Manag Sci"},{"issue":"1","key":"1_CR4","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1287\/isre.1070.0142","volume":"19","author":"T August","year":"2008","unstructured":"August T, Tunca TI (2008) Let the pirates patch? an economic analysis of software security patch restrictions. Inform Syst Res 19(1):48\u201370","journal-title":"Inform Syst Res"},{"issue":"3","key":"1_CR5","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/TSE.2007.26","volume":"33","author":"H Cavusoglu","year":"2007","unstructured":"Cavusoglu H, Cavusoglu H, Raghunathan S (2007) Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Trans Software Eng 33(3):171\u2013185","journal-title":"IEEE Trans Software Eng"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1287\/mnsc.1070.0794","volume":"54","author":"H Cavusoglu","year":"2008","unstructured":"Cavusoglu H, Cavusoglu H, Zhang J (2008) Security patch management: share the burden or share the damage? Manag Sci 54(4):657\u2013670","journal-title":"Manag Sci"},{"issue":"3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"488","DOI":"10.2307\/2600997","volume":"31","author":"V Denicolo","year":"2000","unstructured":"Denicolo V (2000) Two-stage patent races and patent policy. RAND J Econ 31(3):488\u2013501","journal-title":"RAND J Econ"},{"key":"1_CR8","unstructured":"National Vulnerability Database (2008) \n                http:\/\/nvd.nist.gov\/\n                \n               Accessed 23 Apr 2008"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.dss.2006.12.014","volume":"43","author":"I Park","year":"2007","unstructured":"Park I, Sharman R, Rao HR, Upadhyaya S (2007) Short term and total life impact analysis of email worms in computer systems. Decis Support Syst 43:827\u2013841","journal-title":"Decis Support Syst"},{"issue":"1","key":"1_CR10","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1287\/isre.1080.0174","volume":"20","author":"S Ransbotham","year":"2009","unstructured":"Ransbotham S, Mitra S (2009) Choice and chance: a conceptual model of paths to information security compromise. Inform Syst Res 20(1):121\u2013139","journal-title":"Inform Syst Res"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Ransbotham S, Mitra S, Ramsey J (2011) Are Markets for Vulnerabilities Effective? MIS Quarterly forthcoming","DOI":"10.2307\/41410405"},{"key":"1_CR12","volume-title":"Diffusion of innovations","author":"EM Rogers","year":"2003","unstructured":"Rogers EM (2003) Diffusion of innovations, 5th edn. The Free Press, New York, NY","edition":"5"}],"container-title":["Economics of Information Security and Privacy III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-1981-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T12:07:18Z","timestamp":1557230838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-1981-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,27]]},"ISBN":["9781461419808","9781461419815"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_1","relation":{},"subject":[],"published":{"date-parts":[[2012,7,27]]}}}