{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:43:40Z","timestamp":1726037020730},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030248994"},{"type":"electronic","value":"9783030249007"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24900-7_26","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T08:12:15Z","timestamp":1562746335000},"page":"317-330","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Predictably Deterrable? The Case of System Trespassers"],"prefix":"10.1007","author":[{"given":"David","family":"Maimon","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Testa","sequence":"additional","affiliation":[]},{"given":"Bertrand","family":"Sobesto","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Cukier","sequence":"additional","affiliation":[]},{"given":"Wuling","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"26_CR1","volume-title":"Cybercrime: Vandalizing the Information Society","author":"S Furnell","year":"2002","unstructured":"Furnell, S.: Cybercrime: Vandalizing the Information Society. Addison-Wesley, Boston (2002)"},{"key":"26_CR2","unstructured":"Online Trust Alliance: Data Protection and Breech: Readiness Guide. Online Trust Alliance (2014)"},{"key":"26_CR3","unstructured":"Storm, D.: MEDJACK: hackers hijacking medical devices to create backdoors in hospital networks. Computer World (2015). \n                      http:\/\/www.computerworld.com\/article\/2932371\/cybercrime-hacking\/medjack-hackers-hijacking-medical-devices-to-create-backdoors-in-hospital-networks.html"},{"key":"26_CR4","unstructured":"Riffkin, R.: Hacking Tops List of Crimes Americans Worry about Most. Gallup Poll News Service (2014). \n                      http:\/\/www.gallup.com\/poll\/178856\/hacking-tops-list-crimes-americans-worry.aspx"},{"key":"26_CR5","unstructured":"The Comprehensive National Cybersecurity Initiative. The White House. \n                      www.whitehouse.gov"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1086\/259394","volume":"76","author":"G Becker","year":"1968","unstructured":"Becker, G.: Crime and punishment: an economic approach. J. Polit. Econ. 76, 169\u2013217 (1968)","journal-title":"J. Polit. Econ."},{"key":"26_CR7","volume-title":"Crime, Punishment, and Deterrence","author":"J Gibbs","year":"1975","unstructured":"Gibbs, J.: Crime, Punishment, and Deterrence. Elsevier Scientific Publishing Company, New York (1975)"},{"key":"26_CR8","first-page":"93","volume":"26","author":"R Harknett","year":"1996","unstructured":"Harknett, R.: Information warfare and deterrence. Parameters 26, 93\u2013107 (1996)","journal-title":"Parameters"},{"issue":"1","key":"26_CR9","first-page":"1","volume":"7","author":"R Harknett","year":"2010","unstructured":"Harknett, R., Callaghan, J., Kauffman, R.: Leaving deterrence behind: war-fighting and national cybersecurity. J. Homel. Secur. Emerg. Manag. 7(1), 1\u201324 (2010)","journal-title":"J. Homel. Secur. Emerg. Manag."},{"key":"26_CR10","unstructured":"Denning, D., Baugh, W.: Hiding crimes in cyberspace. In: Thomas, D., Loader, D. (eds.) Cybercrime: Law Enforcement, Security and Surveillance in the Information Age, pp. 105\u2013132. Routledge, London (2000)"},{"key":"26_CR11","unstructured":"Goodman, W.: Cyber deterrence: tougher in theory than in practice? Strategic Studies Quarterly Fall, pp. 102\u2013135 (2010)"},{"key":"26_CR12","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195326215.001.0001","volume-title":"Making Public Places Safer: Surveillance and Crime Prevention","author":"B Welsh","year":"2009","unstructured":"Welsh, B., Farrington, D.: Making Public Places Safer: Surveillance and Crime Prevention. Oxford University Press, New York (2009)"},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1057\/sj.2008.22","volume":"23","author":"B Welsh","year":"2010","unstructured":"Welsh, B., Mudge, M., Farrington, D.: Reconceptualizing public area surveillance and crime prevention: security guards, place managers and defensible space. Secur. J. 23, 299\u2013319 (2010)","journal-title":"Secur. J."},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1086\/670398","volume":"42","author":"D Nagin","year":"2013","unstructured":"Nagin, D.: Deterrence in the twenty-first century. Crime Justice 42(1), 199\u2013263 (2013)","journal-title":"Crime Justice"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1086\/449163","volume":"12","author":"Lawrence W. Sherman","year":"1990","unstructured":"Sherman, L.: Police crackdowns: initial and residual deterrence. In: Tonry, M., Morris, M. (eds.) Crime and Justice: An Annual Review of Research, vol. 12, pp. 1\u201348. University of Chicago Press, Chicago (1990)","journal-title":"Crime and Justice"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems. NIST Special Publication 800:30 (2002)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"26_CR17","doi-asserted-by":"publisher","first-page":"97","DOI":"10.2753\/MIS0742-1222260205","volume":"26","author":"I Png","year":"2009","unstructured":"Png, I., Wang, Q.: Information security: facilitating user precautions vis-\u00e0-vis enforcement against attackers. J. Manag. Inf. Syst. 26, 97\u2013121 (2009)","journal-title":"J. Manag. Inf. Syst."},{"key":"26_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1111\/1745-9125.12028","volume":"52","author":"D Maimon","year":"2014","unstructured":"Maimon, D., Alper, M., Sobesto, B., Cukier, M.: Restrictive deterrent effect of a warning banner in an attacked computer system. Criminology 52, 33\u201359 (2014)","journal-title":"Criminology"},{"issue":"2","key":"26_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07418825.2012.660977","volume":"31","author":"B Jacobs","year":"2014","unstructured":"Jacobs, B., Cherbonneau, M.: Auto theft and restrictive deterrence. Justice Q. 31(2), 1\u201324 (2014)","journal-title":"Justice Q."},{"key":"26_CR20","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1080\/07418829600093011","volume":"13","author":"B Jacobs","year":"1996","unstructured":"Jacobs, B.: Crack dealers\u2019 apprehension avoidance techniques: a case of restrictive deterrence. Justice Q. 13, 359\u2013381 (1996)","journal-title":"Justice Q."},{"key":"26_CR21","volume-title":"Burglars on the Job","author":"R Wright","year":"1994","unstructured":"Wright, R., Decker, S.: Burglars on the Job. Northeastern University Press, Boston (1994)"},{"key":"26_CR22","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1086\/449230","volume":"19","author":"RV Clarke","year":"1995","unstructured":"Clarke, R.V.: Situational crime prevention. Crime Justice 19, 91\u2013150 (1995)","journal-title":"Crime Justice"},{"issue":"4","key":"26_CR23","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1177\/0885412215595440","volume":"30","author":"P Cozens","year":"2015","unstructured":"Cozens, P., Love, T.: A review and current status of crime prevention through environmental design (CPTED). J. Plann. Lit. 30(4), 393\u2013412 (2015)","journal-title":"J. Plann. Lit."},{"issue":"4","key":"26_CR24","doi-asserted-by":"publisher","first-page":"643","DOI":"10.2307\/1884324","volume":"75","author":"D Ellsberg","year":"1961","unstructured":"Ellsberg, D.: Risk, ambiguity, and the Savage axioms. Q. J. Econ. 75(4), 643\u2013669 (1961)","journal-title":"Q. J. Econ."},{"issue":"2","key":"26_CR25","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2307\/1914185","volume":"47","author":"D Kahneman","year":"1979","unstructured":"Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 47(2), 263\u2013291 (1979)","journal-title":"Econometrica"},{"issue":"3","key":"26_CR26","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s11166-008-9038-9","volume":"36","author":"S Trautmann","year":"2008","unstructured":"Trautmann, S., Vieider, F., Wakker, P.: Causes of ambiguity aversion: known versus unknown preferences. J. Risk Uncertain. 36(3), 225\u2013243 (2008)","journal-title":"J. Risk Uncertain."},{"issue":"1","key":"26_CR27","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1086\/258854","volume":"72","author":"S Becker","year":"1964","unstructured":"Becker, S., Brownson, F.: What price ambiguity? Or the role of ambiguity in decision-making. J. Polit. Econ. 72(1), 62\u201373 (1964)","journal-title":"J. Polit. Econ."},{"issue":"2","key":"26_CR28","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1111\/j.1745-9125.2010.00191.x","volume":"48","author":"B Jacobs","year":"2010","unstructured":"Jacobs, B.: Deterrence and deterrability. Criminology 48(2), 417\u2013441 (2010)","journal-title":"Criminology"},{"issue":"2","key":"26_CR29","first-page":"77","volume":"7","author":"A Baillon","year":"2015","unstructured":"Baillon, A., Bleichrodt, H.: Testing ambiguity models through the measurement of probabilities for gains and losses. Am. Econ. J. 7(2), 77\u2013100 (2015)","journal-title":"Am. Econ. J."},{"key":"26_CR30","volume-title":"The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy","author":"P Engebretson","year":"2013","unstructured":"Engebretson, P.: The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. Elsevier, Waltham (2013)"},{"key":"26_CR31","unstructured":"National Institute for Standards and Technology: Recommended Security Controls for Federal Information Systems and Organization (U.S. Department of Commerce) (2009)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24900-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T08:25:20Z","timestamp":1562747120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24900-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030248994","9783030249007"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24900-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}