{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:43:42Z","timestamp":1742924622588,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_13","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"150-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection"],"prefix":"10.1007","author":[{"given":"Alain","family":"Mermoud","sequence":"first","affiliation":[]},{"given":"Marcus Matthias","family":"Keupp","sequence":"additional","affiliation":[]},{"given":"Solange","family":"Ghernaouti","sequence":"additional","affiliation":[]},{"given":"Dimitri","family":"Percia David","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-21694-7_5","volume-title":"Critical Information Infrastructures Security","author":"C Alcaraz","year":"2011","unstructured":"Alcaraz, C., Balastegui, A., Lopez, J.: Early warning system for cascading effect control in energy control systems. In: Xenakis, C., Wolthusen, S. (eds.) CRITIS 2010. LNCS, vol. 6712, pp. 55\u201366. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-21694-7_5"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-1-4419-6967-5_4","volume-title":"Economics of Information Security and Privacy","author":"R Anderson","year":"2010","unstructured":"Anderson, R., Fuloria, S.: Security economics and critical national infrastructure. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 55\u201366. Springer, Boston (2010). \n                    https:\/\/doi.org\/10.1007\/978-1-4419-6967-5_4"},{"issue":"1898","key":"13_CR3","doi-asserted-by":"publisher","first-page":"2717","DOI":"10.1098\/rsta.2009.0027","volume":"367","author":"R Anderson","year":"2009","unstructured":"Anderson, R., Moore, T.: Information security: where computer science, economics and psychology meet. Philos. Trans. A Math. Phys. Eng. Sci. 367(1898), 2717\u20132727 (2009)","journal-title":"Philos. Trans. A Math. Phys. Eng. Sci."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, R., Moore, T., Nagaraja, S., Ozment, A.: Incentives and information security. In: Algorithmic Game Theory, pp. 633\u2013649. Cambridge University Press, New York (2007)","DOI":"10.1017\/CBO9780511800481.027"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Aviram, A., Tor, A.: Overcoming impediments to information sharing. Alabama Law Rev. 55, 231 (2003\u20132004)","DOI":"10.2139\/ssrn.435600"},{"issue":"10","key":"13_CR6","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1016\/j.telpol.2009.09.001","volume":"33","author":"JM Bauer","year":"2009","unstructured":"Bauer, J.M., Van Eeten, M.J.: Cybersecurity: stakeholder incentives, externalities, and policy options. Telecommun. Policy 33(10), 706\u2013719 (2009)","journal-title":"Telecommun. Policy"},{"issue":"3","key":"13_CR7","doi-asserted-by":"publisher","first-page":"431","DOI":"10.3233\/JCS-2003-11308","volume":"11","author":"K Campbell","year":"2003","unstructured":"Campbell, K., Gordon, L.A., Loeb, M.P., Zhou, L.: The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J. Comput. Secur. 11(3), 431\u2013448 (2003)","journal-title":"J. Comput. Secur."},{"issue":"1","key":"13_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1111\/j.1468-5973.2007.00501.x","volume":"15","author":"M Bruijne De","year":"2007","unstructured":"De Bruijne, M., Van Eeten, M.: Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment. J. Contingencies Crisis Manag. 15(1), 18\u201329 (2007)","journal-title":"J. Contingencies Crisis Manag."},{"key":"13_CR9","series-title":"SpringerBriefs in Cybersecurity","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10620-5","volume-title":"Cybersecurity in Switzerland","author":"M Dunn Cavelty","year":"2014","unstructured":"Dunn Cavelty, M.: Cybersecurity in Switzerland. SpringerBriefs in Cybersecurity. Springer, Cham (2014)"},{"issue":"4","key":"13_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.ijcip.2009.08.006","volume":"2","author":"M Dunn-Cavelty","year":"2009","unstructured":"Dunn-Cavelty, M., Suter, M.: Public-private partnerships are no silver bullet: an expanded governance model for critical infrastructure protection. Int. J. Crit. Infrastruct. Prot. 2(4), 179\u2013187 (2009)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"13_CR11","unstructured":"ENISA: Good Practice Guide on Information Sharing. Report\/study (2009)"},{"key":"13_CR12","unstructured":"ENISA: Incentives and Barriers to Information Sharing. Report\/study (2010)"},{"key":"13_CR13","unstructured":"ENISA: Economic Efficiency of Security Breach Notification. Report\/study (2011)"},{"key":"13_CR14","unstructured":"ENISA: Cyber Security Information Sharing: An Overview of Regulatory and Non-regulatory Approaches. Report\/study (2015)"},{"key":"13_CR15","unstructured":"ENISA: Information sharing and common taxonomies between CSIRTs and Law Enforcement. Report\/study (2016)"},{"key":"13_CR16","unstructured":"Vazquez, D.F., et al.: Conceptual framework for cyber defense information sharing within trust relationships, June 2012"},{"issue":"2","key":"13_CR17","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/isre.1050.0053","volume":"16","author":"E Gal-Or","year":"2005","unstructured":"Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Inf. Syst. Res. 16(2), 186\u2013208 (2005)","journal-title":"Inf. Syst. Res."},{"key":"13_CR18","doi-asserted-by":"publisher","DOI":"10.1201\/b15441","volume-title":"Cyber Power: Crime, Conflict and Security in Cyberspace","author":"S Ghernaouti","year":"2013","unstructured":"Ghernaouti, S.: Cyber Power: Crime, Conflict and Security in Cyberspace. EPFL Press, Burlington (2013)"},{"issue":"3","key":"13_CR19","doi-asserted-by":"publisher","first-page":"567","DOI":"10.2307\/25750692","volume":"34","author":"L Gordon","year":"2010","unstructured":"Gordon, L., Loeb, M., Sohail, T.: Market value of voluntary disclosures concerning information security. Manag. Inf. Syst. Q. 34(3), 567\u2013594 (2010)","journal-title":"Manag. Inf. Syst. Q."},{"issue":"6","key":"13_CR20","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.jaccpubpol.2003.09.001","volume":"22","author":"LA Gordon","year":"2003","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W.: Sharing information on computer systems security: an economic analysis. J. Account. Public Policy 22(6), 461\u2013485 (2003)","journal-title":"J. Account. Public Policy"},{"issue":"5","key":"13_CR21","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.jaccpubpol.2006.07.005","volume":"25","author":"LA Gordon","year":"2006","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Sohail, T.: The impact of the Sarbanes-Oxley Act on the corporate disclosures of information security activities. J. Account. Public Policy 25(5), 503\u2013530 (2006)","journal-title":"J. Account. Public Policy"},{"issue":"01","key":"13_CR22","first-page":"24","volume":"06","author":"LA Gordon","year":"2015","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Zhou, L.: Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model. J. Inf. Secur. 06(01), 24\u201330 (2015)","journal-title":"J. Inf. Secur."},{"issue":"1","key":"13_CR23","first-page":"3","volume":"1","author":"LA Gordon","year":"2015","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Zhou, L.: Increasing cybersecurity investments in private sector firms. J. Cybersecur. 1(1), 3\u201317 (2015)","journal-title":"J. Cybersecur."},{"key":"13_CR24","unstructured":"Grudzien, W., H\u00e4mmerli, B.: Voluntary information sharing. Technical report, Networking Information Security, Chapter 3 Voluntary Information Sharing (2014)"},{"key":"13_CR25","unstructured":"Haemmerli, B., Raaum, M., Franceschetti, G.: Trust networks among human beings. In: Multimedia Computing, Communication and Intelligence, May 2013"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Harrison, K., White, G.: Information sharing requirements and framework needed for community cyber incident detection and response, November 2012","DOI":"10.1109\/THS.2012.6459893"},{"issue":"6","key":"13_CR27","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/j.jaccpubpol.2007.10.001","volume":"26","author":"K Hausken","year":"2007","unstructured":"Hausken, K.: Information sharing among firms and cyber attacks. J. Account. Public Policy 26(6), 639\u2013688 (2007)","journal-title":"J. Account. Public Policy"},{"key":"13_CR28","unstructured":"Laube, S., B\u00f6hme, R.: The economics of mandatory security breach reporting to authorities. In: Proceedings of the 14th Workshop on the Economics of Information Security (WEIS), Delft, Netherlands (2015)"},{"key":"13_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-33331-1_13","volume-title":"Critical Information Infrastructures Security","author":"PO Leu","year":"2016","unstructured":"Leu, P.O., Peter, D.: Case study: information flow resilience of a retail company with regard to the electricity scenarios of the Sicherheitsverbunds\u00fcbung Schweiz (Swiss Security Network Exercise) SVU 2014. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds.) CRITIS 2015. LNCS, vol. 9578, pp. 159\u2013170. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-33331-1_13"},{"issue":"1","key":"13_CR30","first-page":"15","volume":"34","author":"C Liu","year":"2014","unstructured":"Liu, C., Zafar, H., Au, Y.: Rethinking FS-ISAC: an IT security information sharing network model for the financial services sector. Commun. Assoc. Inf. Syst. 34(1), 15\u201336 (2014)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"13_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-14577-3_18","volume-title":"Financial Cryptography and Data Security","author":"T Moran","year":"2010","unstructured":"Moran, T., Moore, T.: The phish-market protocol: securely sharing attack data between competitors. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 222\u2013237. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-14577-3_18"},{"key":"13_CR32","unstructured":"PricewaterhouseCoopers: information sharing and analysis organizations: putting theory into practice. Technical report (2016)"},{"key":"13_CR33","unstructured":"Suter, M.: The Governance of Cybersecurity: An Analysis of Public-Private Partnerships in a New Field of Security Policy. ETH, Z\u00fcrich (2012)"},{"issue":"2","key":"13_CR34","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1287\/orsc.14.2.209.14992","volume":"14","author":"E Hippel von","year":"2003","unstructured":"von Hippel, E., von Krogh, G.: Open source software and the \u201cPrivate-Collective\u201d innovation model. Organ. Sci. 14(2), 208\u2013223 (2003)","journal-title":"Organ. Sci."},{"key":"13_CR35","unstructured":"Weiss, E.: Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis"},{"issue":"7","key":"13_CR36","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843\u2013857 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T03:03:45Z","timestamp":1558321425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/critis2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}