{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:32:30Z","timestamp":1758702750733},"publisher-location":"New York, NY","reference-count":35,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461419808"},{"type":"electronic","value":"9781461419815"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-1981-5_10","type":"book-chapter","created":{"date-parts":[[2012,9,24]],"date-time":"2012-09-24T22:57:39Z","timestamp":1348527459000},"page":"213-238","source":"Crossref","is-referenced-by-count":12,"title":["Economic Methods and Decision Making by Security Professionals"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Baldwin","sequence":"first","affiliation":[]},{"given":"Yolanta","family":"Beres","sequence":"additional","affiliation":[]},{"given":"Geoffrey B.","family":"Duggan","sequence":"additional","affiliation":[]},{"given":"Marco Casassa","family":"Mont","sequence":"additional","affiliation":[]},{"given":"Hilary","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Middup","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Shiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,27]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson R, Moore T (2006) The economics of information security. Science 314:610\u2013613","journal-title":"Science"},{"key":"10_CR2","unstructured":"Anderson R (2001) Why information security is hard: an economic perspective. In: Proceedings of 17th annual computer security applications conference (ACSAC)"},{"key":"10_CR3","volume-title":"Modelling the human and technological costs and benefits of USB memory stick security","author":"A Beautement","year":"2009","unstructured":"Beautement A, Coles R, Griffin J, Ioannidis C, Monahan B, Pym D, Sasse A, Wonham M (2009) Modelling the human and technological costs and benefits of USB memory stick security. In: Managing information risk and the economics of security. Springer"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Baldwin A, Mont M (2009) Simon Shiu - using modelling and simulation for policy decision support in identity management. In: IEEE 10th symposium on policies for distributed systems and networks, ieee policy 2009 symposium, 20\u201322 July. London","DOI":"10.1109\/POLICY.2009.16"},{"key":"10_CR5","unstructured":"Beres Y, Griffin J, Shiu S, Heitman M, Markle D, Ventura P (2008) Analysing the performance of security solutions to reduce vulnerability exposure windows, in annual computer security applications conference (ACSAC) CA IEEE. pp 33\u201342"},{"key":"10_CR6","volume-title":"Decision support for systems security investment","author":"Y Beres","year":"2010","unstructured":"Beres Y, Pym D, Shiu S (2010) Decision support for systems security investment. In: Network Operations and Management Symposium Workshops (IEEE\/IFIP, NOMS Wksps"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Beautement A, Sasse A, Wonham M (2008) The compliance budget: managing security behaviour in organisations. In: New Security Paradigms Workshop (NSPW) 2008, Plumpjack Squaw Valley Inn, Olympic, California, USA, pp 22\u201325","DOI":"10.1145\/1595676.1595684"},{"key":"10_CR8","volume-title":"Economics of identity and access management: providing decision support for investments","author":"M Casassa Mont","year":"2010","unstructured":"Casassa Mont M, Beres Y, Pym D and Shiu S (2010) Economics of identity and access management: providing decision support for investments. In: Network Operations and Management Symposium Workshops (IEEE\/IFIP, NOMS Wksps"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Collinson M, Monahan B, D Pym (2009) A logical and computational theory of located resources. J Logic Comput (in press) DOI: 10.1093\/logcom\/exp021","DOI":"10.1093\/logcom\/exp021"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Collinson M, Monahan B, Pym D Semantics for structured systems modelling and simulation. In: Proceedings of simutools 2010, ACM digital library and EU digital library","DOI":"10.4108\/ICST.SIMUTOOLS2010.8631"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1146\/annurev.psych.47.1.273","volume":"47","author":"KA Ericsson","year":"1996","unstructured":"Ericsson KA, Lehmann AC (1996) Expert and exceptional performance: Evidence of maximal adaptation to task constraints. Ann Rev Psychol 47:273\u2013305","journal-title":"Ann Rev Psychol"},{"key":"10_CR12","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674189089","volume-title":"Medical problem solving: an analysis of clinical reasoning","author":"AS Elstein","year":"1978","unstructured":"Elstein AS, Shulman LS, Sprafka SA (1978) Medical problem solving: an analysis of clinical reasoning. MA: Harvard University Press, Cambridge"},{"key":"10_CR13","doi-asserted-by":"crossref","DOI":"10.1515\/9781503620766","volume-title":"A theory of cognitive dissonance","author":"L Festinger","year":"1957","unstructured":"Festinger L (1957) A theory of cognitive dissonance. Stanford University Press, Stanford, CA"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"French S, Maule J, N Papamichail (2009) Decision behavior, analysis and support. Cambridge University Press","DOI":"10.1017\/CBO9780511609947"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1037\/0033-295X.103.4.650","volume":"103","author":"G Gigerenzer","year":"1996","unstructured":"Gigerenzer G, Goldstein D (1996) Reasoning the fast and frugal way: Models of bounded rationality. Psychol Rev 103:650\u2013669","journal-title":"Psychol Rev"},{"key":"10_CR16","unstructured":"Gordon LA, Loeb MP (2006) Managing cybersecurity resources: a cost-benefit analysis. McGraw Hill"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1111\/j.1475-6803.1997.tb00241.x","volume":"2","author":"WM Goetzmann","year":"1997","unstructured":"Goetzmann WM, Peles N (1997) Cognitive dissonance and mutual fund investors. J Financ Res 2:145\u2013158","journal-title":"J Financ Res"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Ioannidis C, Pym D, Williams J (2009) Investments and Trade-offs in the Economics of Information Security. In: Proceedings of financial cryptography and data security 2009, LNCS 5628. Springer, pp 148\u2013162","DOI":"10.1007\/978-3-642-03549-4_9"},{"key":"10_CR19","unstructured":"ISO 27000 series of standards for information security and security management. see http:\/\/www.27000.org\/"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1037\/0003-066X.58.9.697","volume":"58","author":"D Kahneman","year":"2003","unstructured":"Kahneman D (2003) A perspective on judgment and choice: Mapping bounded rationality. Amer Psychol 58:697\u2013720","journal-title":"Amer Psychol"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Keeney RL, Raiffa H (1976) Decisions with multiple objectives: preferences and value tradeoffs. Wiley, New York. Reprinted, Cambridge Univ. Press, New York (1993)","DOI":"10.1017\/CBO9781139174084"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1002\/bdm.381","volume":"14","author":"R Lipshitz","year":"2001","unstructured":"Lipshitz R, Klein G, Orasanu J, Salas E (2001) Taking stock of naturalistic decision making. J\u00a0Beh Dec Mak 14:331\u2013352","journal-title":"J Beh Dec Mak"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1037\/1089-2680.2.2.175","volume":"2","author":"RS Nickerson","year":"1998","unstructured":"Nickerson RS (1998) Confirmation bias: a ubiquitous phenomenon in many guises. Rev General Psychol 2:175\u2013220","journal-title":"Rev General Psychol"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1037\/0033-295X.84.3.231","volume":"84","author":"RE Nisbett","year":"1977","unstructured":"Nisbett RE, Wilson TD (1977) Telling more than we can know: verbal reports on mental processes. Psychol Rev 84:231\u2013259","journal-title":"Psychol Rev"},{"key":"10_CR25","volume-title":"Concord","author":"Parkin S, van Moorsel A, Inglesant P, Sasse A (2010) A stealth approach to usable security: helping it security managers to identify workable security solutions. In: The proceedings of the new security paradigms workshop (NSPW)","year":"2010","unstructured":"Parkin S, van Moorsel A, Inglesant P, Sasse A (2010) A stealth approach to usable security: helping it security managers to identify workable security solutions. In: The proceedings of the new security paradigms workshop (NSPW) 2010. Concord, MA, USA"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/0030-5073(76)90022-2","volume":"16","author":"JW Payne","year":"1976","unstructured":"Payne JW (1976) Task complexity and contingent processing in decision making: an information search and protocol analysis. Org Behav Human Perform 16:366\u2013387","journal-title":"Org Behav Human Perform"},{"key":"10_CR27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173933","volume-title":"The adaptive decision maker","author":"JW Payne","year":"1993","unstructured":"Payne JW, Bettman JR, Johnson EJ (1993) The adaptive decision maker. Cambridge University Press, New York"},{"issue":"5","key":"10_CR28","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1080\/01449290110078680","volume":"20","author":"SJ Payne","year":"2001","unstructured":"Payne SJ, Howes A, Reader WR (2001) Adaptively distributing cognition: a decision-making perspective on human-computer interaction. Behav Inform Technol 20(5): 339\u2013346","journal-title":"Behav Inform Technol"},{"key":"10_CR29","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1006\/obhd.1996.0041","volume":"66","author":"JE Russo","year":"1996","unstructured":"Russo JE, Medvec VH, Meloy MG (1996) The distortion of information during decisions. Org Behav Human Dec Processes 66:102\u2013110","journal-title":"Org Behav Human Dec Processes"},{"key":"10_CR30","unstructured":"Schneier B (2008) Security ROI, in Schneier on security blog. 2 Sept see http:\/\/www.schneier.com\/blog\/archives\/2008\/09\/security_roi{\\_}1.html"},{"key":"10_CR31","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1017\/S1352465802001029","volume":"30","author":"PM Salkovskis","year":"2003","unstructured":"Salkovskis PM (2003) Empirically grounded clinical interventions: cognitive-behavioural therapy progresses through a multi-dimensional approach to clinical science. Behav Cognitive Psychother 30:3\u20139","journal-title":"Behav Cognitive Psychother"},{"key":"10_CR32","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1037\/0022-3514.78.4.655","volume":"78","author":"S Schulz-Hardt","year":"2000","unstructured":"Schulz-Hardt S, Frey D, Luthgrens C, Moscovici S (2000) Biased information search in group decision making. JPers Soc Psychol 78:655\u2013669","journal-title":"JPers Soc Psychol"},{"key":"10_CR33","unstructured":"UK Government technology strategy board (TSB) funded collaborative research project. see http:\/\/www.trust-economics.org\/"},{"key":"10_CR34","volume-title":"The march of folly: from Troy to Vietnam","author":"BW Tuchman","year":"1984","unstructured":"Tuchman BW (1984) The march of folly: from Troy to Vietnam. Ballantine Books, New York"},{"key":"10_CR35","first-page":"135","volume-title":"New horizons in psychology","author":"PC Wason","year":"1966","unstructured":"Wason PC (1966) Reasoning. In: Foss B (ed) New horizons in psychology. Penguin, Harmonsworth, Middlesex, England, pp. 135\u2013151"}],"container-title":["Economics of Information Security and Privacy III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-1981-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T22:54:13Z","timestamp":1687733653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-1981-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,27]]},"ISBN":["9781461419808","9781461419815"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_10","relation":{},"subject":[],"published":{"date-parts":[[2012,7,27]]}}}