{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:43:41Z","timestamp":1742921021608,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_25","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"263-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Strange Bedfellows: How and When to Work with Your Enemy"],"prefix":"10.1007","author":[{"given":"Aaron D.","family":"Jaggard","sequence":"first","affiliation":[]},{"given":"Rebecca N.","family":"Wright","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"key":"25_CR1","unstructured":"Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of Internet miscreants. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)"},{"issue":"2","key":"25_CR2","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1257\/jel.40.2.351","volume":"40","author":"S Frederick","year":"2002","unstructured":"Frederick, S., Loewenstein, G., O\u2019Donoghue, T.: Time discounting and time preference: a critical review. J. Econ. Lit. 40(2), 351\u2013401 (2002)","journal-title":"J. Econ. Lit."},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04444-1_1","volume-title":"Computer Security \u2013 ESORICS 2009","author":"T Holz","year":"2009","unstructured":"Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: a case-study of keyloggers and dropzones. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 1\u201318. Springer, Heidelberg (2009)"},{"key":"25_CR4","unstructured":"Kannan, K., Telang, R.: An economic analysis of markets for software vulnerabilities. In: Proceedings of the Third Workshop of Economics and Information Security (2004)"},{"key":"25_CR5","unstructured":"Ozment, A.: Bug auctions: vulnerability markets reconsidered. In: Proceedings of the Third Workshop of Economics and Information Security (2004)"},{"issue":"2","key":"25_CR6","doi-asserted-by":"publisher","first-page":"155","DOI":"10.2307\/2967612","volume":"4","author":"PA Samuelson","year":"1937","unstructured":"Samuelson, P.A.: A note on measurement of utility. Rev. Econ. Stud. 4(2), 155\u2013161 (1937)","journal-title":"Rev. Econ. Stud."},{"key":"25_CR7","unstructured":"Schecter, S.: Quantitatively differentiating system security. In: Proceedings of the First Workshop of Economics and Information Security (2002)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Syverson, P., Meadows, C., Cervesato, I.: Dolev-Yao is no better than Machiavelli. In: First Workshop on Issues in the Theory of Security WITS\u201900, pp. 87\u201392 (2000)","DOI":"10.21236\/ADA464936"},{"key":"25_CR9","unstructured":"Zetter, K.: TJX hacker gets 20\u00a0years in prison. Wired Magazine (2010). www.wired.com\/threatlevel\/2010\/03\/tjx-sentencing"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T14:49:05Z","timestamp":1676904545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}