{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:48:32Z","timestamp":1757778512129,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503987"},{"type":"electronic","value":"9783030503994"}],"license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50399-4_14","type":"book-chapter","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:02:37Z","timestamp":1591700557000},"page":"135-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Modeling the Risk of Data Breach Incidents at the Firm Level"],"prefix":"10.1007","author":[{"given":"Kazuki","family":"Ikegami","sequence":"first","affiliation":[]},{"given":"Hiroaki","family":"Kikuchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"14_CR1","unstructured":"Information security incident survey report (JNSA dataset). Japan Network Security Association (2018)"},{"key":"14_CR2","unstructured":"Cybersecurity Management Guidelines Ver1.1. In: Ministry of Economy, Trade and Industry Home page. \nhttps:\/\/www.meti.go.jp\/policy\/netsecurity\/downloadfiles\/CSM_Guidelines_v1.1_en.pdf\n\n. Accessed 19 March"},{"key":"14_CR3","unstructured":"What is cyber insurance. In: cyber-hoken.com. \nhttps:\/\/cyberhoken-jp.com\/cyber-hoken\n\n. Accessed 19 March"},{"key":"14_CR4","unstructured":"Sakuma, J., Inomata, A.: Proposal for improvement of penetration on investigation and analysis of cyber insurance. Internet Oper. Technol. (IOT) (IPSJ) 9, 1\u20138 (2019)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1093\/cybsec\/tyw003","volume":"2","author":"B Edwards","year":"2016","unstructured":"Edwards, B., Hofmeyr, S., Forrest, S.: Hype and heavy tails: a closer look at data breaches. J. Cybersecur. 2, 3\u201314 (2016)","journal-title":"J. Cybersecur."},{"key":"14_CR6","unstructured":"Kokaji, A., Harada, Y., Goto, A.: A consideration of assessment on cyber security in financial institutions. Electron. Intell. Prop. (IPSJ) 1, 1\u20135 (2019)"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1140\/epjb\/e2010-00120-8","volume":"75","author":"T Maillart","year":"2010","unstructured":"Maillart, T., Sornette, D.: Heavy-tailed distribution of cyber-risks. Eur. Phys. J. B 75, 357\u2013364 (2010)","journal-title":"Eur. Phys. J. B"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjb\/e2015-60754-4","volume":"89","author":"S Wheatley","year":"2016","unstructured":"Wheatley, S., Maillart, T., Sornette, T.: The extreme risk of personal data breaches and the erosion of privacy. Eur. Phys. J. B 89, 1\u201312 (2016)","journal-title":"Eur. Phys. J. B"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1016\/j.ejor.2018.07.021","volume":"272","author":"M Eling","year":"2019","unstructured":"Eling, M., Loperfido, N.: What are the actual costs of cyber risk events? Eur. J. Oper. Res. 272, 1109\u20131119 (2019)","journal-title":"Eur. J. Oper. Res."},{"key":"14_CR10","unstructured":"Yamada, M., Ikegami, K., Kikuchi, H., Inui, K.: Assessment of the effect of decreasing data breach by the management situation (2). In: Computer Security Symposium (CSS 2018), pp. 376\u2013384 (2018)"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1080\/07421222.2015.1063315","volume":"32","author":"R Sen","year":"2015","unstructured":"Sen, R., Borle, S.: Estimating the contextual risk of data breach: an empirical approach. J. Manage. Inf. Syst. 32, 314\u2013341 (2015)","journal-title":"J. Manage. Inf. Syst."},{"key":"14_CR12","first-page":"126","volume":"75","author":"M Eling","year":"2017","unstructured":"Eling, M., Loperfido, N.: Data breaches: goodness of fit, pricing, and risk measurement. Insur.: Math. Econ. 75, 126\u2013136 (2017)","journal-title":"Insur.: Math. Econ."},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"2856","DOI":"10.1109\/TIFS.2018.2834227","volume":"13","author":"M Xu","year":"2018","unstructured":"Xu, M., Schweitzer, K., Bateman, R., Xu, S.: Modeling and predicting cyber hacking breaches. IEEE Trans. Inf. Forensics Secur. 13, 2856\u20132871 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1002\/pam.20567","volume":"30","author":"S Romanosky","year":"2011","unstructured":"Romanosky, S., Telang, R., Acquisti, A.: Do data breach disclosure laws reduce identify theft? J. Policy Anal. Manage. 30, 256\u2013286 (2011)","journal-title":"J. Policy Anal. Manage."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/01621459.1951.10500769","volume":"46","author":"F Massey Jr","year":"1951","unstructured":"Massey Jr., F.: The Kolmogorov-Smirnov test for goodness of fit. J. Am. Stat. Assoc. 46, 68\u201378 (1951)","journal-title":"J. Am. Stat. Assoc."},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"370","DOI":"10.2307\/2344614","volume":"135","author":"JA Nelder","year":"1972","unstructured":"Nelder, J.A., Wedderburn, R.W.M.: Generalized linear models. J. Roy. Stat. Soc. Ser. A (Gener.) 135, 370\u2013384 (1972)","journal-title":"J. Roy. Stat. Soc. Ser. A (Gener.)"},{"key":"14_CR17","unstructured":"CSR DATA: Toyo Keizai Data Services (2017)"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50399-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:25:35Z","timestamp":1591701935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50399-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"ISBN":["9783030503987","9783030503994"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50399-4_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"10 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}