{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T09:25:51Z","timestamp":1751275551956},"publisher-location":"New York, NY","reference-count":39,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461419808"},{"type":"electronic","value":"9781461419815"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-1981-5_2","type":"book-chapter","created":{"date-parts":[[2012,9,24]],"date-time":"2012-09-24T22:57:39Z","timestamp":1348527459000},"page":"13-33","source":"Crossref","is-referenced-by-count":14,"title":["Where Do All the Attacks Go?"],"prefix":"10.1007","author":[{"given":"Dinei","family":"Flor\u00eancio","sequence":"first","affiliation":[]},{"given":"Cormac","family":"Herley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,27]]},"reference":[{"unstructured":"http:\/\/pr.webroot.com\/threat-research\/cons\/protect-your-computer-from-hackers-101210.html","key":"2_CR1"},{"unstructured":"http:\/\/gs.statcounter.com\/press\/microsoft-internet-explorer-browser-falls-below-50-perc-of-worldwide-market-for-first-time","key":"2_CR2"},{"unstructured":"http:\/\/www.trusteer.com\/files\/Flash_Security_Hole_Advisory.pdf","key":"2_CR3"},{"unstructured":"http:\/\/www.schneier.com\/blog\/archives\/2010\/01\/32_million_jewe.html","key":"2_CR4"},{"key":"2_CR5","volume-title":"Why information security is hard","author":"R Anderson","year":"2001","unstructured":"Anderson R (2001) Why information security is hard. In: Proceedings of ACSAC"},{"doi-asserted-by":"crossref","unstructured":"Bond CM, Danezis G (2006) A pact with the devil","key":"2_CR6","DOI":"10.1145\/1278940.1278952"},{"doi-asserted-by":"crossref","unstructured":"Barth A, Rubinstein BIP, Sundararajan M, Mitchell JC, Song D, Bartlett PL (2010) A learning-based approach to reactive security. Financial Crypto","key":"2_CR7","DOI":"10.1007\/978-3-642-14577-3_16"},{"unstructured":"Boehme R, Moore T (2009) The iterated weakest-link: a model of adaptive security investment. WEIS","key":"2_CR8"},{"doi-asserted-by":"crossref","unstructured":"Dhamija R, Tygar JD, Hearst M (2006) Why phishing works. CHI","key":"2_CR9","DOI":"10.1145\/1124772.1124861"},{"doi-asserted-by":"crossref","unstructured":"Egelman S, Cranor LF, Hong J (2008) You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI","key":"2_CR10","DOI":"10.1145\/1357054.1357219"},{"unstructured":"Enright B, Voelker G, Savage S, Kanich C, Levhchenko K (2008) Storm: when researchers collide. login","key":"2_CR11"},{"doi-asserted-by":"crossref","unstructured":"Flor\u00eancio D and Herley C (2007) A large-scale study of web password habits. WWW 2007, Banff","key":"2_CR12","DOI":"10.1145\/1242572.1242661"},{"key":"2_CR13","volume-title":"An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants","author":"J Franklin","year":"2007","unstructured":"Franklin J, Paxson V, Perrig A, Savage S (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In: Proceedings of CCS"},{"unstructured":"Federal Trade Commission (2007) Identity theft survey report. www.ftc.gov\/os\/2007\/11\/SynovateFinalReportIDTheft2006pdf","key":"2_CR14"},{"doi-asserted-by":"crossref","unstructured":"Fultz N, Grossklags J (2009) Blue versus red: toward a model of distributed security attacks. Financial Crypto","key":"2_CR15","DOI":"10.1007\/978-3-642-03549-4_10"},{"unstructured":"Gartner (2007) Phishing survey. http:\/\/www.gartner.com\/it\/page.jsp?id=565125","key":"2_CR16"},{"key":"2_CR17","volume-title":"Cyber insecurity: the cost of monopoly","author":"D Geer","year":"2003","unstructured":"Geer D, Bace R, Gutmann P, Metzger P, Pfleeger C, Quarterman J, Schneier B (2003) Cyber insecurity: the cost of monopoly. Computer and Communications Industry Association (CCIA), Sep, 24"},{"doi-asserted-by":"crossref","unstructured":"Gordon LA, Loeb MP (2002) The economics of information security investment. ACM Trans Inform Syst Secur","key":"2_CR18","DOI":"10.1145\/581271.581274"},{"doi-asserted-by":"crossref","unstructured":"Grossklags J, Christin N, Chuang J (2008) Secure or insure?: a game-theoretic analysis of information security games. WWW","key":"2_CR19","DOI":"10.1145\/1367497.1367526"},{"doi-asserted-by":"crossref","unstructured":"Herley C, Flor\u00eancio D A profitless endeavor: phishing as tragedy of the commons. NSPW 2008, Lake Tahoe, CA","key":"2_CR20","DOI":"10.1145\/1595676.1595686"},{"doi-asserted-by":"crossref","unstructured":"Herley C (2009) So long, and no thanks for the externalities: the rational rejection of security advice by users. In: NSPW 2009, Oxford","key":"2_CR21","DOI":"10.1145\/1719030.1719050"},{"unstructured":"Herley C (2010) The plight of the targeted attacker in a world of scale. In: WEIS 2010, Boston","key":"2_CR22"},{"unstructured":"Imperva. Consumer password worst practices","key":"2_CR23"},{"key":"2_CR24","volume-title":"The domino effect of password re-use","author":"B Ives","year":"2004","unstructured":"Ives B, Walsh KR, Schneider H (2004) The domino effect of password re-use. In: CACM"},{"unstructured":"Kaminsky D (2008) Its the end of the cache as we know it. Black Hat Briefings","key":"2_CR25"},{"doi-asserted-by":"crossref","unstructured":"Kanich C, Kreibich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S (2008) Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, October, pp 3\u201314","key":"2_CR26","DOI":"10.1145\/1455770.1455774"},{"unstructured":"Klein DV (1990) Foiling the cracker: a survey of, and improvements to, password security. Usenix Security Workshop","key":"2_CR27"},{"unstructured":"Mankiw NG (2007) Principles of economics, 4th edn","key":"2_CR28"},{"key":"2_CR29","volume-title":"Chip and pin is broken","author":"SJ Murdoch","year":"2010","unstructured":"Murdoch SJ, Drimer S, Anderson R, Bond M (2010) Chip and pin is broken. In: IEEE Security&Privacy, Oakland"},{"key":"2_CR30","volume-title":"Internet traffic growth: sources and implications","author":"A Odlyzko","year":"2003","unstructured":"Odlyzko A (2003) Internet traffic growth: sources and implications. In: Proceedings of SPIE"},{"doi-asserted-by":"crossref","unstructured":"Odlyzko A (2010) Providing security with insecure systems. WiSec","key":"2_CR31","DOI":"10.1145\/1741866.1741867"},{"unstructured":"Rescorla E (2003) Security holes... who cares? Usenix Security Symp","key":"2_CR32"},{"key":"2_CR33","volume-title":"(2010) Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks","author":"S Schechter","year":"2010","unstructured":"Schechter S, Herley C, Mitzenmacher M (2010) Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks. In: Proceedings of HotSec, 2010"},{"key":"2_CR34","volume-title":"Measurement and analysis of spyware in a university environment","author":"S Saroiu","year":"2004","unstructured":"Saroiu S, Gribble SD, Levy HM (2004) Measurement and analysis of spyware in a university environment. In: Proceedings of NSDI"},{"unstructured":"Saroiu S, Gribble S, Levy H (2004) Measurement and analysis of spywave in a university environment. In: Proceedings of the 1st conference on symposium on networked systems design and implementation-volume 1, p\u00a011. USENIX Association","key":"2_CR35"},{"key":"2_CR36","first-page":"122","volume-title":"How much security is enough to stop a thief? In: Financial cryptography","author":"S Schechter","year":"2003","unstructured":"Schechter S, Smith M (2003) How much security is enough to stop a thief? In: Financial cryptography. Springer, Berlin, pp 122\u2013137"},{"doi-asserted-by":"crossref","unstructured":"Stone-Gross B, Cova M, Cavallaro L, Gilbert B, Szydlowski M, Kemmerer R, Kruegel\u00a0C, Vigna G (2009) Your botnet is my botnet: analysis of a botnet takeover. CCS","key":"2_CR37","DOI":"10.1145\/1653662.1653738"},{"unstructured":"Varian HR (2001) Sytem reliability and free riding. WEIS","key":"2_CR38"},{"unstructured":"Varian HR (2004) System reliability and free riding. Economics of information security","key":"2_CR39"}],"container-title":["Economics of Information Security and Privacy III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-1981-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T22:54:32Z","timestamp":1687733672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-1981-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,27]]},"ISBN":["9781461419808","9781461419815"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_2","relation":{},"subject":[],"published":{"date-parts":[[2012,7,27]]}}}