{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:28:24Z","timestamp":1775838504063,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":28,"publisher":"Springer New York","isbn-type":[{"value":"9781461419808","type":"print"},{"value":"9781461419815","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-1981-5_9","type":"book-chapter","created":{"date-parts":[[2012,9,24]],"date-time":"2012-09-24T18:57:39Z","timestamp":1348513059000},"page":"193-212","source":"Crossref","is-referenced-by-count":7,"title":["Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?"],"prefix":"10.1007","author":[{"given":"Brent","family":"Rowe","sequence":"first","affiliation":[]},{"given":"Dallas","family":"Wood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,27]]},"reference":[{"key":"9_CR1","unstructured":"Anderson R (2001) Why Information security is hard: an economic perspective. In: Proceedings of the 17th Annual Computer Security Applications Conference"},{"key":"9_CR2","unstructured":"Anderson R, Bohme R, Clayton R, Moore T (2008) Analyzing barriers and incentives for network and information security in the internal market for e-communication. \n                http:\/\/www.enisa.europa.eu\/act\/sr\/reports\/econ-sec\n                \n              . Accessed 1 June 2011"},{"key":"9_CR3","unstructured":"Arbor Networks (2010) 2009 Worldwide infrastructure security report. \n                http:\/\/www.arbornetworks.com\/report\n                \n              . Accessed 21 Feb 2010"},{"key":"9_CR4","unstructured":"Clayton R (2010) Might governments clean-up malware? \n                http:\/\/weis2010.econinfosec.org\/papers\/session4\/weis2010_clayton.pdf"},{"key":"9_CR5","unstructured":"Evers J (2005) ISPs versus the zombies. Cnet News.com. \n                http:\/\/news.cnet.com\/ISPs-versus-the-zombies\/2100--7349_3--5793719.html\n                \n              . Accessed 24 Apr 2009"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Gallaher M, Rowe B, Rogozhin A, Link A (2006) Economic analysis of cyber security and private sector investment decisions. Report prepared for the U.S. Department of Homeland Security. Research Triangle Park, NC: RTI International","DOI":"10.21236\/ADA455398"},{"key":"9_CR7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511610356","volume-title":"Applied choice analysis: a primer","author":"DA Hensher","year":"2005","unstructured":"Hensher DA, Rose JM, Green WH (2005) Applied choice analysis: a primer. Cambridge University Press, Cambridge, UK"},{"issue":"1","key":"9_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1189740.1189745","volume":"7","author":"Y Huang","year":"2007","unstructured":"Huang Y, Xianjun G, Whinston A (2007) Defeating DDoS attacks by fixing the incentive chain. ACM Trans Internet Technol 7(1):1\u20135. \n                http:\/\/portal.acm.org\/citation.cfm?doid=1189740.1189745\n                \n              . Accessed 30 Apr 2009","journal-title":"ACM Trans Internet Technol"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1509\/jmkr.39.2.214.19080","volume":"39","author":"B Kanninen","year":"2002","unstructured":"Kanninen B (2002) Optimal design for multinomial choice experiments. J Mark Res 39: 214\u2013227","journal-title":"J Mark Res"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"715","DOI":"10.2307\/1924536","volume":"68","author":"I Krinsky","year":"1986","unstructured":"Krinsky I, Robb A (1986) On approximating the statistical properties of elasticities. Rev Econ Stat 68:715\u2013719","journal-title":"Rev Econ Stat"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"189","DOI":"10.2307\/2109761","volume":"72","author":"I Krinsky","year":"1990","unstructured":"Krinsky I, Robb A (1990) On approximating the statistical properties of elasticities: a correction. Rev Econ Stat 72:189\u201390","journal-title":"Rev Econ Stat"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"545","DOI":"10.2307\/3151882","volume":"31","author":"WF Kuhfeld","year":"1994","unstructured":"Kuhfeld WF, Tobias RD, Garratt M (1994) Efficient experimental design with marketing research applications. J Mark Res 31:545\u2013557","journal-title":"J Mark Res"},{"issue":"2","key":"9_CR13","first-page":"1","volume":"6","author":"J List","year":"2006","unstructured":"List J, Sinha P, Taylor M (2006) Using choice experiments to value non-market goods and services: evidence from field experiments. Adv Econ Anal Policy 6(2):1\u201337","journal-title":"Adv Econ Anal Policy"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Lichtman D, Posner E (2004) Holding Internet service providers accountable. In: John M Olin Law and Economist Working Paper, Vol 217. University of Chicago. \n                http:\/\/www.law.uchicago.edu\/files\/files\/217-dgl-eap-isp.pdf\n                \n              . Accessed 1 June 2011","DOI":"10.2139\/ssrn.573502"},{"issue":"3\u20134","key":"9_CR15","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.ijcip.2010.10.002","volume":"3","author":"T Moore","year":"2010","unstructured":"Moore T (2010) The economics of cybersecurity: principles and policy options. Int J Crit Infrastruct Prot 3(3\u20134):103\u2013117","journal-title":"Int J Crit Infrastruct Prot"},{"key":"9_CR16","volume-title":"Getting started with conjoint analysis","author":"B Orme","year":"2010","unstructured":"Orme B (2010) Getting started with conjoint analysis. Research Publishers, LLC, Madison, WI"},{"key":"9_CR17","unstructured":"Richards J (2007) Make firms bear the cost to improve information security, says Schneier. Computer Weekly. \\url{http:\/\/www.computerweekly.com\/Articles\/2007\/05\/22\/223959\/make-firms-bear-the-cost-to-improve-information-security$\\neg}$says-schneier.htm. Accessed 24 Apr 2009"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-16806-2_1","volume":"342","author":"N Robinson","year":"2010","unstructured":"Robinson N, Potoglou D, Kim C, Burge P, Warnes R (2010) Security at what cost? In: Critical infrastructure protection IV: IFIP advances in information and communication technology. 342:3\u201315","journal-title":"In: Critical infrastructure protection IV: IFIP advances in information and communication technology."},{"key":"9_CR19","unstructured":"Rowe B, Wood D, Reeves D, Braun F (2011) Economic analysis of ISP provided cyber security solutions. \n                https:\/\/www.ihssnc.org\/portals\/0\/Rowe_IHSS{\\_}Cyber{\\_}Final{\\_}ReportFINAL.pdf\n                \n              . Accessed 3 June 2011"},{"key":"9_CR20","unstructured":"Sawtooth Software, Inc. (2010) SSI Web v.6.6.12: choice based conjoint [Computer Software]. Sequim, WA"},{"key":"9_CR21","unstructured":"Smith A (2010) Home broadband adoption 2010.\\url{http:\/\/www.pewinternet.org\/$\\sim}$\/media\/\/Files\/Reports\/2010\/Home{\\%}20broadband{\\%}202010.pdf. Accessed 3 June 2011"},{"key":"9_CR22","unstructured":"Smith V, Mansfield CA (2006) Valuing airline security: an analysis of the MANPADS program. Paper presented at the Workshop on Benefit Methodologies for Homeland Security Analysis, Washington, DC, June 8\u20139"},{"key":"9_CR23","unstructured":"StreamShield Networks (2004) Consumers prepared to pay extra for clean and safe Internet service. Press release. \n                http:\/\/www.streamshield.com\/index.php?option=com_content{\\&}task=view{\\&}id=59{\\&}Itemid=130\n                \n              . Accessed 24 Apr 2009"},{"key":"9_CR24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511753930","volume-title":"Discrete choice methods with simulation","author":"K Train","year":"2003","unstructured":"Train K (2003) Discrete choice methods with simulation. Cambridge University Press, Cambridge"},{"key":"9_CR25","unstructured":"van Eeten M, Bauer J, Asghari H, Tabatabaie S (2010) The role of Internet service providers in botnet mitigation: an empirical analysis based on spam data. \n                http:\/\/www.oecd.org\/LongAbstract\/0,3425,en{\\_}2649{\\_}33703{\\_}46396507{\\_}119684{\\_}1{\\_}1{\\_}1,00.html\n                \n              . Accessed 1 June 2010"},{"key":"9_CR26","unstructured":"van Eet3n M, Asghari H, Bauer J, Tabatabaie S (2011) Internet service providers and botnet mitigation: a fact-finding study on the Dutch market. \n                http:\/\/www.rijksoverheid.nl\/bestanden\/documenten-en-publicaties\/rapporten\/2011\/01\/13\/internet-service-providers-and-botnet-mitigation\/tud-isps-and-botnet-mitigation-in-nl-final-public-version-07jan2011.pdf\n                \n              . Accessed 1 July 2011"},{"key":"9_CR27","unstructured":"Varian H (2000) Managing online security risks. The New York Times. \n                http:\/\/www.nytimes.com\/library\/financial\/columns\/060100econ-scene.html\n                \n              . Accessed 3 June 2011"},{"key":"9_CR28","unstructured":"Zwerina K, Huber J, Kuhfeld WF (1996) A general method for constructing efficient choice designs. SAS Working Paper. \n                http:\/\/support.sas.com\/techsup\/technote\/mr2010e.pdf\n                \n              . Accessed 3 June 2011"}],"container-title":["Economics of Information Security and Privacy III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-1981-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T10:07:30Z","timestamp":1557223650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-1981-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,27]]},"ISBN":["9781461419808","9781461419815"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_9","relation":{},"subject":[],"published":{"date-parts":[[2012,7,27]]}}}