{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:57:40Z","timestamp":1743011860411,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035487"},{"type":"electronic","value":"9783642035494"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03549-4_9","type":"book-chapter","created":{"date-parts":[[2009,7,16]],"date-time":"2009-07-16T10:05:28Z","timestamp":1247738728000},"page":"148-166","source":"Crossref","is-referenced-by-count":23,"title":["Investments and Trade-offs in the Economics of Information Security"],"prefix":"10.1007","author":[{"given":"Christos","family":"Ioannidis","sequence":"first","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Williams","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Anderson, R., B\u00f6hme, R., Clayton, R., Moore, T.: Security economics and the internal market. Report to the European Network and Information Security Agency, ENISA (2007), http:\/\/www.enisa.europa.eu\/doc\/pdf\/report_sec_econ_&_int_mark_20080131.pdf"},{"key":"9_CR2","volume-title":"Managing Information Risk and the Economics of Security, Proc. WEIS 2008","author":"A. Beautement","year":"2008","unstructured":"Beautement, A., Coles, R., Griffin, J., Ioannidis, C., Monahan, B., Pym, D., Sasse, A., Wonham, M.: Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. In: Eric Johnson, M. (ed.) Managing Information Risk and the Economics of Security, Proc. WEIS 2008. Springer, Heidelberg (2008) (preliminary version), http:\/\/weis2008.econinfosec.org\/papers\/Pym.pdf"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Giannoni, M.P., Woodford, M.: Optimal Interest-Rate Rules I: General Theory. Working Paper Series 9419, National Bureau of Economic Research, ISSU 9419, ISSN 0898-2937 (2002)","DOI":"10.3386\/w9419"},{"issue":"4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L.A. Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The Economics of Information Security Investment. ACM Transactions on Information and Systems Security\u00a05(4), 438\u2013457 (2002)","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"9_CR5","doi-asserted-by":"crossref","DOI":"10.1515\/9780691218632","volume-title":"Time Series Analysis","author":"J.D. Hamilton","year":"1994","unstructured":"Hamilton, J.D.: Time Series Analysis. Princeton University Press, New Jersey (1994)"},{"issue":"5","key":"9_CR6","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/s10796-006-9011-6","volume":"8","author":"K. Hausken","year":"2006","unstructured":"Hausken, K.: Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers\u00a08(5), 338\u2013349 (2006)","journal-title":"Information Systems Frontiers"},{"issue":"5","key":"9_CR7","first-page":"904","volume":"66","author":"O. Loistl","year":"1976","unstructured":"Loistl, O.: The Erroneous Approximation of Expected Utility by Means of Taylor\u2019s Series Expansion: Analytic and Computational Results. American Economic Review\u00a066(5), 904\u2013910 (1976)","journal-title":"American Economic Review"},{"issue":"489","key":"9_CR8","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1111\/1468-0297.t01-1-00149","volume":"113","author":"R.A. Nobay","year":"2003","unstructured":"Nobay, R.A., Peel, D.A.: Optimal Discretionary Monetary Policy in a Model of Asymmetric Bank Preferences. Economic Journal\u00a0113(489), 657\u2013665 (2003)","journal-title":"Economic Journal"},{"key":"9_CR9","unstructured":"Willemson, J.: On the Gordon & Loeb Model for Information Security Investment. In: Proc. WEIS (2006), http:\/\/weis2006.econinfosec.org\/docs\/12.pdf"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03549-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T01:17:27Z","timestamp":1685063847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03549-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035487","9783642035494"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03549-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}