{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T05:55:58Z","timestamp":1770357358677,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319766867","type":"print"},{"value":"9783319766874","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76687-4_11","type":"book-chapter","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T04:02:09Z","timestamp":1519358529000},"page":"159-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Martinelli","sequence":"first","affiliation":[]},{"given":"Albina","family":"Orlando","sequence":"additional","affiliation":[]},{"given":"Ganbayar","family":"Uuganbayar","sequence":"additional","affiliation":[]},{"given":"Artsiom","family":"Yautsiukhin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,24]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, R., B\u00f6hme, R., Claytin, R., Moore, T.: Security economics and the internal market, January 2008. https:\/\/www.enisa.europa.eu\/publications\/archive\/economics-sec\/at_download\/fullReport . Accessed 15 Jan 2016","DOI":"10.1007\/978-0-387-09762-6_3"},{"key":"11_CR2","unstructured":"B\u00f6hme, R., Schwartz, G.: Modeling cyber-insurance: towards a unifying framework. In: Proceedings of the 9th Workshop on the Economics in Information Security (2010)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Bolot, J., Lelarge, M.: A new perspective on internet security using insurance. In: Proceedings of the 27th IEEE International Conference on Computer Communications, Phoenix, AZ, USA, pp. 1948\u20131956, April 2008","DOI":"10.1109\/INFOCOM.2008.259"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-94-015-7957-5_8","volume-title":"Foundations of Insurance Economics","author":"I Ehrlich","year":"1992","unstructured":"Ehrlich, I., Becker, G.S.: Market insurance, self-insurance, and self-protection. In: Dionne, G., Harrington, S.E. (eds.) Foundations of Insurance Economics, pp. 164\u2013189. Springer, Dordrecht (1992). https:\/\/doi.org\/10.1007\/978-94-015-7957-5_8"},{"key":"11_CR5","unstructured":"ENISA: Incentives and barriers of the cyber insurance market in Europe, June 2012. goo.gl\/BtNyj4 . Accessed 12 Dec 2014"},{"key":"11_CR6","unstructured":"EY: Global insurance outlook (2015). goo.gl\/uyFzQ4 . Accessed 11 Aug 2015"},{"issue":"4","key":"11_CR7","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L Gordon","year":"2003","unstructured":"Gordon, L., Loeb, M.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5(4), 438\u2013457 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"11_CR8","doi-asserted-by":"crossref","first-page":"23:1","DOI":"10.1145\/2635673","volume":"47","author":"A Laszka","year":"2014","unstructured":"Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv. 47(2), 23:1\u201323:38 (2014)","journal-title":"ACM Comput. Surv."},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-662-45472-5_27","volume-title":"Financial Cryptography and Data Security","author":"A Laszka","year":"2014","unstructured":"Laszka, A., Johnson, B., Grossklags, J., Felegyhazi, M.: Estimating systematic risk in real-world networks. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 417\u2013435. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_27"},{"issue":"1","key":"11_CR10","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/1384529.1375463","volume":"36","author":"M Lelarge","year":"2008","unstructured":"Lelarge, M., Bolot, J.: Network externalities and the deployment of security features and protocols in the internet. SIGMETRICS Perform. Eval. Rev. 36(1), 37\u201348 (2008)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: Economic incentives to increase security in the internet: the case for insurance. In: Proceedings of the 28th IEEE International Conference on Computer Communications, Rio de Janeiro, pp. 1494\u20131502, April 2009","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"11_CR12","unstructured":"Majuca, R.P., Yurcik, W., Kesan, J.P.: The evolution of cyberinsurance. The Computing Research Repository, pp. 1\u201316 (2006)"},{"key":"11_CR13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.cosrev.2017.01.001","volume":"24","author":"A Marotta","year":"2017","unstructured":"Marotta, A., Martinelli, F., Nanni, S., Orlando, A., Yautsiukhin, A.: Cyber-insurance survey. Comput. Sci. Rev. 24, 35\u201361 (2017)","journal-title":"Comput. Sci. Rev."},{"key":"11_CR14","unstructured":"Naghizadeh, P., Liu, M.: Voluntary participation in cyber-insurance markets. In: Proceedings of the 2014 Workshop on Economics in Information Security (2014)"},{"key":"11_CR15","unstructured":"Ogut, H., Menon, N., Raghunathan, S.: Cyber insurance and it security investment: impact of interdependent risk. In: Proceedings of the 4-th Workshop on the Economics of Information Security (2005)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Pal, R., Golubchik, L., Psounis, K., Hui, P.: Will cyber-insurance improve network security? A market analysis. In: Proceedings of the 2014 INFOCOM, pp. 235\u2013243. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6847944"},{"issue":"3","key":"11_CR17","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1145\/365181.365229","volume":"44","author":"B Schneier","year":"2001","unstructured":"Schneier, B.: Insurance and the computer industry. Commun. ACM 44(3), 114\u2013115 (2001)","journal-title":"Commun. ACM"},{"key":"11_CR18","unstructured":"Schwartz, G., Shetty, N., Walrand, J.: Cyber-insurance: missing market driven by user heterogeneity. In: WEIS (2010)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Schwartz, G.A., Sastry, S.S.: Cyber-insurance framework for large scale interdependent networks. In: Proceedings of the 3rd International Conference on High Confidence Networked Systems, HiCoNS 2014, pp. 145\u2013154. ACM (2014)","DOI":"10.1145\/2566468.2566481"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-642-13869-0_23","volume-title":"Trust and Trustworthy Computing","author":"N Shetty","year":"2010","unstructured":"Shetty, N., Schwartz, G., Walrand, J.: Can competitive insurers improve network security? In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010. LNCS, vol. 6101, pp. 308\u2013322. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13869-0_23"},{"key":"11_CR21","volume-title":"Fundamentals of Risk and Insurance","author":"EJ Vaughan","year":"2014","unstructured":"Vaughan, E.J., Vaughan, T.M.: Fundamentals of Risk and Insurance, 11th edn. Wiley, Hoboken (2014)","edition":"11"},{"key":"11_CR22","volume-title":"Theory of Games and Economic Behaviour","author":"J Neumann von","year":"1953","unstructured":"von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behaviour, 3rd edn. Princeston University Press, Princeston (1953)","edition":"3"},{"key":"11_CR23","unstructured":"World Economic Forum: Global risks 2014. 9th edn (2014). http:\/\/www.droughtmanagement.info\/literature\/WEF_global_risks_report_2014.pdf . Accessed 3 Jan 2017"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76687-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T13:37:05Z","timestamp":1570801025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76687-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319766867","9783319766874"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76687-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}