{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:45:17Z","timestamp":1773409517707,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":86,"publisher":"Springer New York","isbn-type":[{"value":"9781461419808","type":"print"},{"value":"9781461419815","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-1981-5_6","type":"book-chapter","created":{"date-parts":[[2012,9,24]],"date-time":"2012-09-24T22:57:39Z","timestamp":1348527459000},"page":"119-148","source":"Crossref","is-referenced-by-count":9,"title":["Resilience of the Internet Interconnection Ecosystem"],"prefix":"10.1007","author":[{"given":"Chris","family":"Hall","sequence":"first","affiliation":[]},{"given":"Ross","family":"Anderson","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Clayton","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Ouzounis","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Trimintzios","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,27]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/1012888.1005724","volume":"32","author":"Sharad Agarwal","year":"2004","unstructured":"Agarwal S, Chuah C, Bhattacharyya S, Diot C (2004) The impact of BGP dynamics on intra-domain traffic. SIGMETRICS\/Performance\u201904, ACM, pp 319\u2013330","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"key":"6_CR2","unstructured":"Akamai Inc. (2010) Facts & Figures. http:\/\/www.akamai.com\/html\/about\/facts_figures.html#6"},{"key":"6_CR3","unstructured":"Alleman J, Liebenau J (2004) Network resilience and its regulatory inhibitors. Bohlin E et\u00a0al. (eds) Global economy and digital society, Elsevier, Amsterdam, pp 379\u2013394"},{"key":"6_CR4","unstructured":"Alperovitch D (2010) US-based internet traffic redirected to China. McAfee\u00a0blog. http:\/\/blogs.mcafee.com\/mcafee-labs\/u-s-based-internet-traffic-redirected-to-china"},{"key":"6_CR5","unstructured":"Alperovitch D (2010) April route hijack: sifting through the confusion. McAfee blog. http:\/\/blogs.mcafee.com\/mcafee-labs\/april-route-hijack-sifting-through-the-confusion-2"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Augustin B, Krishnamurthy B, Willinger W (2009) IXPs: mapped? IMC\u201909, pp 336\u2013349","DOI":"10.1145\/1644893.1644934"},{"key":"6_CR7","unstructured":"Blumenfeld L (2003) Dissertation could be security threat. Washington Post. http:\/\/www.washingtonpost.com\/ac2\/wp-dyn\/A23689-2003Jul7"},{"key":"6_CR8","unstructured":"Blunk LJ (2005) New BGP analysis tools and a look at the AS9121 incident. http:\/\/iepg.org\/march2005\/bgptools+as9121.pdf"},{"key":"6_CR9","unstructured":"Bono VJ (1997) 7007 Explanation and apology. NANOG mailing list. http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00444.html"},{"key":"6_CR10","unstructured":"Brown MA (2008) Pakistan hijacks YouTube. Renesys blog. http:\/\/www.renesys.com\/blog\/2008\/02\/pakistan_hijacks_youtube_1.shtml"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Bush R, Maennel O, Roughan M, Uhlig S (2009) Internet optometry: assessing the broken glasses in internet reachability. IMC\u201909, pp 242\u2013253","DOI":"10.1145\/1644893.1644923"},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/JPROC.2009.2034031","volume":"98","author":"K Butler","year":"2010","unstructured":"Butler K, Farley TR, McDaniel P, Rexford J (2010) A survey of BGP security issues and solutions. Proc IEEE 98(1):100\u2013122","journal-title":"Proc IEEE"},{"issue":"6","key":"6_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MNET.2005.1541715","volume":"19","author":"M Caesar","year":"2005","unstructured":"Caesar M, Rexford J (2005) BGP routing policies in ISP networks. IEEE Network 19(6):5\u201311","journal-title":"IEEE Network"},{"key":"6_CR14","unstructured":"Chadd A (2006) Murphy\u2019s Law strikes again: AS7007. Murphy\u2019s law mailing list. http:\/\/lists.ucc.gu.uwa.edu.au\/pipermail\/lore\/2006-August\/000040.html"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Chang H, Willinger W (2006) Difficulties measuring the internet\u2019s AS-level ecosystem. Information sciences and systems, pp 1479\u20131483","DOI":"10.1109\/CISS.2006.286698"},{"key":"6_CR16","unstructured":"Cisco Systems (2010) Cisco visual networking index: forecast and methodology, 2009\u20132014. White paper. http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/white_paper_c11-481360.pdf"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Claffy KC (2008) Ten things lawyers should know about the internet. http:\/\/www.caida.org\/publications\/papers\/2008\/lawyers_top_ten\/","DOI":"10.2139\/ssrn.1266324"},{"key":"6_CR18","unstructured":"CNet News Staff (1997) Router glitch cuts net access. CNet News. http:\/\/news.cnet.com\/2100-1033-279235.html"},{"key":"6_CR19","unstructured":"Cowie J (2010) How to build a cybernuke. Renesys blog. http:\/\/www.renesys.com\/blog\/2010\/04\/how-to-build-a-cybernuke.shtml"},{"key":"6_CR20","unstructured":"Cowie JH, Ogielski AT, Premore BJ, Smith EA, Underwood T (2003) Impact of the 2003 blackouts on internet communications. Renesys. http:\/\/www.renesys.com\/tech\/reports\/Renesys_BlackoutReport.pdf"},{"key":"6_CR21","unstructured":"Cowie J, Popescu A, Underwood T (2005) Impact of hurricane Katrina on internet infrastructure. Renesys. http:\/\/www.renesys.com\/tech\/presentations\/pdf\/Renesys-Katrina-Report-9sep2005.pdf"},{"issue":"1","key":"6_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.1468-5973.2007.00501.x","volume":"15","author":"M Bruijne De","year":"2007","unstructured":"De Bruijne M (2007) Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment. J Contingencies Crisis Manag 15(1):1\u201329","journal-title":"J Contingencies Crisis Manag"},{"key":"6_CR23","unstructured":"ENISA (2009) Good practice guide on national exercises. ENISA technical report. http:\/\/www.enisa.europa.eu\/act\/res\/policies\/good-practices-1\/exercises\/national-exercise-good-practice-guide"},{"key":"6_CR24","unstructured":"ENISA (2011) Inter-X: resilience of the internet interconnection ecosystem. ENISA technical report. Available at http:\/\/www.enisa.europa.eu\/act\/res\/other-areas\/inter-x ."},{"key":"6_CR25","unstructured":"ENISA (2011) Cyber Europe 2010\u2014evaluation report. ENISA technical report. Available at http:\/\/www.enisa.europa.eu\/act\/res\/cyber-europe-2010\/cyber-europe-2010-report"},{"key":"6_CR26","first-page":"51","volume":"72","author":"P Faratin","year":"2008","unstructured":"Faratin P, Clark DD, Bauer S, Lehr W, Gilmore PW, Berger A (2008) The growing complexity of internet interconnection. Comm Strat 72:51\u201371","journal-title":"Comm Strat"},{"issue":"1","key":"6_CR27","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1145\/1012888.1005726","volume":"32","author":"Nick Feamster","year":"2004","unstructured":"Feamster N, Winick J, Rexford J (2004) A model of BGP routing for network engineering. SIGMETRICS\/Performance\u201904, ACM, pp 331\u2013342","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Ferguson P, Senie D (2000) Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2827, RFC Editor","DOI":"10.17487\/rfc2827"},{"key":"6_CR29","unstructured":"Fried M, Klemming L (2008) Severed cables in mediterranean disrupt communication. Bloomberg http:\/\/www.bloomberg.com\/apps\/news?pid=newsarchive&sid=aBa0lTN.dcoQ"},{"key":"6_CR30","unstructured":"Gill P, Arlitt M, Li Z, Mahanti A (2008) The flattening internet topology: natural evolution. Unsightly barnacles or contrived collapse? Ninth passive and active measurement conference (PAM)"},{"issue":"4","key":"6_CR31","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/2043164.2018439","volume":"41","author":"Phillipa Gill","year":"2011","unstructured":"Gill P, Schapira M, Goldberg S (2011) Let the market drive deployment: a strategy for transitioning to BGP security. Boston University Computer Science, Technical report BUCS-TR-2011-003. http:\/\/www.cs.bu.edu\/~goldbe\/papers\/sbgpTrans.html","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"6_CR32","unstructured":"Griffin TG, Premore BJ (2001) An experimental analysis of BGP convergence time. ICNP\u201901, pp 53\u201361"},{"issue":"2","key":"6_CR33","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/90.993304","volume":"10","author":"TG Griffin","year":"2002","unstructured":"Griffin TG, Shepherd FB, Wilfong G (2002) The stable paths problem and interdomain routing. IEEE ACM T Network 10(2):232\u2013243","journal-title":"IEEE ACM T Network"},{"key":"6_CR34","volume-title":"Resilience engineering: concepts and precepts","author":"E Hollnagel","year":"2006","unstructured":"Hollnagel E, Woods DD, Leveson N (2006) Resilience engineering: concepts and precepts. Ashgate Publishing, Surrey, UK"},{"key":"6_CR35","unstructured":"Huston G (2009) The ISP column: is the transition to IPv6 a \u201cmarket failure\u201d? http:\/\/www.potaroo.net\/ispcol\/2009-09\/v6trans.pdf"},{"key":"6_CR36","unstructured":"Huston G IPv4 Address Report. http:\/\/www.potaroo.net\/tools\/ipv4\/"},{"key":"6_CR37","unstructured":"Huston G et al. CIDR Report. http:\/\/www.cidr-report.org"},{"key":"6_CR38","unstructured":"ISC. The ISC domain survey. http:\/\/www.isc.org\/solutions\/survey"},{"key":"6_CR39","unstructured":"Kent S (2011) Threat model for BGP path security. Working draft. http:\/\/tools.ietf.org\/html\/draft-kent-bgpsec-threats-01"},{"issue":"4","key":"6_CR40","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/49.839934","volume":"18","author":"S Kent","year":"2000","unstructured":"Kent S, Lynn C, Seo K (2000) Secure border gateway protocol (S-BGP). IEEE J Sel Area Comm 18(4):582\u2013592","journal-title":"IEEE J Sel Area Comm"},{"key":"6_CR41","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.1126\/science.1069492","volume":"295","author":"H Kitano","year":"2002","unstructured":"Kitano H (2002) Systems biology: a brief overview. Science 295:1662\u20131664","journal-title":"Science"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Kuhn R, Sriram K, Montgomery D (2007) Border gateway protocol security\u2014recommendations of the National Institute of Standards and Technology. NIST. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-54\/SP800-54.pdf","DOI":"10.6028\/NIST.SP.800-54"},{"key":"6_CR43","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1232919.1232927","volume":"37","author":"N Kushman","year":"2007","unstructured":"Kushman N, Kandula S, Katabi D (2007) Can you hear me now?! It must be BGP. SIGCOMM Comput Commun Rev 37:75\u201384","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F (2010) Internet inter-domain traffic. SIGCOMM\u201910, ACM, pp 75\u201386","DOI":"10.1145\/1851275.1851194"},{"key":"6_CR45","unstructured":"Lepinski M, Kent S (2011) An infrastructure to support secure internet routing. Working draft. http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-arch-12"},{"key":"6_CR46","unstructured":"Lepinski M, Turner S (2011) An overview of BGPSEC. Working draft. http:\/\/tools.ietf.org\/html\/draft-lepinski-bgpsec-overview-00"},{"key":"6_CR47","unstructured":"Level 3 Communications, Inc. 2006 FORM 10-K For the fiscal year ended. http:\/\/lvlt.client.shareholder.com\/secfiling.cfm?filingID=1104659-07-88481"},{"key":"6_CR48","unstructured":"Level 3 Communications, Inc. (2008) FORM 10-K For the fiscal year ended. http:\/\/lvlt.client.shareholder.com\/secfiling.cfm?filingID=1047469-09-2002"},{"key":"6_CR49","unstructured":"Level 3 Communications, Inc. (2010) FORM 10-K For the fiscal year ended. http:\/\/lvlt.client.shareholder.com\/secfiling.cfm?filingID=1047469-11-1410"},{"key":"6_CR50","unstructured":"Leyden J (2010) China routing snafu briefly mangles interweb\u2014cockup, not conspiracy. The\u00a0register. http:\/\/www.theregister.co.uk\/2010\/04\/09\/china_bgp_interweb_snafu\/"},{"key":"6_CR51","unstructured":"Longstaff P Security, resilience, and communication in unpredictable environments such as terrorism, Natural disasters and complex technology. (2005) http:\/\/pirp.harvard.edu\/pubs_pdf\/longsta\/longsta-p05-3.pdf"},{"key":"6_CR52","unstructured":"Magnuson S (2010) Cyber experts have proof that China has hijacked US-based internet traffic: UPDATED. National defense blog. http:\/\/www.nationaldefensemagazine.org\/blog\/Lists\/Posts\/Post.aspx?ID=249"},{"key":"6_CR53","unstructured":"McCullagh D (2008) How Pakistan knocked YouTube offline (and how to make sure it never happens again). CNet. http:\/\/news.cnet.com\/8301-10784_3-9878655-7.html"},{"key":"6_CR54","unstructured":"McPherson D (2008) Internet routing insecurity: Pakistan nukes YouTube? Arbor networks blog http:\/\/asert.arbornetworks.com\/2008\/02\/internet-routing-insecuritypakistan-nukes-youtube\/"},{"key":"6_CR55","unstructured":"Mohapatra P, Scudder J, Bush R, Austein R (Eds.) (2011) BGP prefix origin validation. Working draft. http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-pfx-validate-01"},{"key":"6_CR56","unstructured":"Norton B (2010) Internet transit prices\u2014historical and projected. http:\/\/drpeering.net\/white-papers\/Internet-Transit-Pricing-Historical-And-Projected.php"},{"key":"6_CR57","doi-asserted-by":"crossref","unstructured":"Odlyzko A (2010) Collective hallucinations and inefficient markets: the British railway mania of the 1840s. http:\/\/www.dtc.umn.edu\/~odlyzko\/doc\/hallucinations.pdf","DOI":"10.2139\/ssrn.1537338"},{"key":"6_CR58","unstructured":"Odlyzko A. Minnesota Internet Traffic Studies (MINTS). http:\/\/www.dtc.umn.edu\/mints\/"},{"key":"6_CR59","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TNET.2009.2020798","volume":"18","author":"R Oliveira","year":"2010","unstructured":"Oliveira R, Pei D, Willinger W, Zhang B, Zhang L (2010) The (in)completeness of the observed internet AS-level structure. IEEE ACM T Network 18:109\u2013112","journal-title":"IEEE ACM T Network"},{"key":"6_CR60","volume-title":"The internet under crisis conditions: learning from September 11","author":"C Partridge","year":"2002","unstructured":"Partridge C et al. (2002) The internet under crisis conditions: learning from September 11. The\u00a0National Academies Press, Washington"},{"key":"6_CR61","unstructured":"Popescu A (2008) Deja Vu all over again: cables cut in the mediterranean. Renesys blog. http:\/\/www.renesys.com\/blog\/2008\/12\/deja-vu-all-over-again-cables.shtml"},{"key":"6_CR62","unstructured":"Popescu AC, Premore BJ, Underwood T (2005) The anatomy of a leak: AS9121. NANOG 34 http:\/\/www.renesys.com\/tech\/presentations\/pdf\/renesys-nanog34.pdf"},{"issue":"5","key":"6_CR63","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2003.1200112","volume":"41","author":"B Quoitin","year":"2003","unstructured":"Quoitin B, Pelsser C, Swinnen L, Bonaventure O, Uhlig S (2003) Interdomain traffic engineering with BGP. IEEE Comm Mag 41(5):122\u2013128","journal-title":"IEEE Comm Mag"},{"key":"6_CR64","unstructured":"Radovcic S (2010) European Internet Exchange Association 2010 Report on European IXPs. https:\/\/www.euro-ix.net\/resources\/reports\/euro-ix_report_2010.pdf"},{"key":"6_CR65","doi-asserted-by":"crossref","unstructured":"Rekhter Y, Li T, Hares S (2006) A border gateway protocol 4 (BGP-4). RFC4271, RFC Editor","DOI":"10.17487\/rfc4271"},{"key":"6_CR66","unstructured":"RIPE NCC (2008) YouTube hijacking: A RIPE NCC RIS case study. http:\/\/www.ripe.net\/news\/study-youtube-hijacking.html"},{"key":"6_CR67","unstructured":"Romijn E (2010) RIPE NCC and Duke University BGP Experiment. http:\/\/labs.ripe.net\/Members\/erik\/ripe-ncc-and-duke-university-bgp-experiment"},{"key":"6_CR68","unstructured":"Romijn E (2010) Re: did your BGP crash today? NANOG mailing list. http:\/\/www.merit.edu\/mail.archives\/nanog\/msg11505.html"},{"key":"6_CR69","unstructured":"Siganos G, Faloutsos M (2004) Analysing BGP policies: methodology and tool. INFOCOM\u201904, IEEE, pp 1640\u20131651"},{"key":"6_CR70","volume-title":"Reliability, maintainability and risk","author":"DJ Smith","year":"2005","unstructured":"Smith DJ (2005) Reliability, maintainability and risk. 7th edn. Elsevier, Amsterdam","edition":"7"},{"key":"6_CR71","unstructured":"Soares M (2009) Brazilian blackout traced to sooty insulators, not hackers. Wired. http:\/\/www.wired.com\/threatlevel\/2009\/11\/brazil_blackout\/"},{"key":"6_CR72","unstructured":"Telegeography 2008 Four international cable breaks in a week. http:\/\/www.telegeography.com\/cu\/article.php?article_id=21567"},{"key":"6_CR73","unstructured":"Telegeography (2010) IP transit prices continue their downward trend. http:\/\/www.telegeography.com\/cu\/article.php?article_id=35206"},{"key":"6_CR74","unstructured":"UK Cabinet Office (2010) Cyber security. Fact Sheet 18. http:\/\/download.cabinetoffice.gov.uk\/sdsr\/factsheet18-cyber-security.pdf"},{"key":"6_CR75","unstructured":"Underwood T (2005) Internet-wide catastrophe\u2014last year. Renesys blog. http:\/\/www.renesys.com\/blog\/2005\/12\/internetwide_nearcatastrophela.shtml"},{"key":"6_CR76","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1098\/rspb.2007.1137","volume":"275","author":"A Wagner","year":"2008","unstructured":"Wagner A (2008) Robustness and evolvability: a paradox resolved. Proc Biol Sci 275:91\u2013100","journal-title":"Proc Biol Sci"},{"issue":"4","key":"6_CR77","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1145\/1151659.1159956","volume":"36","author":"Feng Wang","year":"2006","unstructured":"Wang F, Mao, Z.M., Wang J, Gao L, Bush R (2006) A measurement study on the impact of routing events on end-to-end internet path performance. SIGCOMM\u201906, ACM, pp 375\u2013386","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"6_CR78","doi-asserted-by":"crossref","unstructured":"Wang L, Zhao X, Pei D, Bush R, Massey D, Mankin A, Wu SF, Zhang L (2002) Observation and analysis of BGP behavior under stress. IMW\u201902, ACM, pp 183\u2013195","DOI":"10.1145\/637201.637231"},{"key":"6_CR79","unstructured":"Wilson G (2010) Fight cyber war before planes fall out of sky. The Sun. http:\/\/www.thesun.co.uk\/sol\/homepage\/news\/3186185\/Security-chiefs-warn-Britain-must-protect-itself-against-cyber-warfare-amid-government-cuts.html"},{"key":"6_CR80","unstructured":"Xie L, Smith P, Banfield M, Leopold H, Sterbenz J, Hutchinson D (2005) Towards resilient networks using programmable networking technologies. IFIP IWAN"},{"issue":"6","key":"6_CR81","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MNET.2005.1541717","volume":"19","author":"YR Yang","year":"2005","unstructured":"Yang\u00a0YR, Xie\u00a0H, Wang\u00a0H, Silberschatz\u00a0A, Kroshnamurthy\u00a0A, Liu\u00a0Y, Li\u00a0LE (2005) On route selection for interdomain traffic engineering. IEEE Network 19(6):20\u201327","journal-title":"IEEE Network"},{"issue":"6","key":"6_CR82","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MNET.2005.1541721","volume":"19","author":"M Yannuzzi","year":"2005","unstructured":"Yannuzzi M, Masip-Bruin X, Bonaventure O (2005) Open issues in interdomain routing: a survey. IEEE Network 19(6):49\u201356","journal-title":"IEEE Network"},{"key":"6_CR83","unstructured":"Zmijewski E (2008) Mediterranean cable break\u2014Part II. Renesys blog. http:\/\/www.renesys.com\/blog\/2008\/01\/mediterranean-cable-break-part-1.shtml"},{"key":"6_CR84","unstructured":"Zmijewski E (2008) Mediterranean cable break\u2014Part III. Renesys blog. http:\/\/www.renesys.com\/blog\/2008\/02\/mediterranean-cable-break-part.shtml"},{"key":"6_CR85","unstructured":"Zmijewski E (2008) Mediterranean cable break\u2014Part IV. Renesys blog. http:\/\/www.renesys.com\/blog\/2008\/02\/mediterranean-cable-break-part-3.shtml"},{"key":"6_CR86","unstructured":"Zmijewski E (2011) A closer look at the \u201cLevel 3 + Global Crossing\u201d union. CircleID. http:\/\/www.circleid.com\/posts\/20110414_a_closer_look_at_the_level_3_and_global_crossing_union\/"}],"container-title":["Economics of Information Security and Privacy III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-1981-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T05:09:01Z","timestamp":1562216941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-1981-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,27]]},"ISBN":["9781461419808","9781461419815"],"references-count":86,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_6","relation":{},"subject":[],"published":{"date-parts":[[2012,7,27]]}}}