{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T02:37:10Z","timestamp":1770345430409,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642138683","type":"print"},{"value":"9783642138690","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_23","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"308-322","source":"Crossref","is-referenced-by-count":32,"title":["Can Competitive Insurers Improve Network Security?"],"prefix":"10.1007","author":[{"given":"Nikhil","family":"Shetty","sequence":"first","affiliation":[]},{"given":"Galina","family":"Schwartz","sequence":"additional","affiliation":[]},{"given":"Jean","family":"Walrand","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Anderson, R., B\u00f6ehme, R., Clayton, R., Moore, T.: Security economics and european policy. In: Proceedings of WEIS 2008, Hanover, USA, June 25-28 (2008)"},{"key":"23_CR2","unstructured":"B\u00f6hme, R.: Cyber-insurance revisited. In: Proceedings of WEIS 2005, Cambridge, USA (2005)"},{"issue":"3","key":"23_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/636772.636774","volume":"46","author":"L.A. Gordon","year":"2003","unstructured":"Gordon, L.A., Loeb, M., Sohail, T.: A framework for using insurance for cyber-risk management. Communications of the ACM\u00a046(3), 81\u201385 (2003)","journal-title":"Communications of the ACM"},{"key":"23_CR4","unstructured":"Majuca, R.P., Yurcik, W., Kesan, J.P.: The evolution of cyberinsurance. Technical Report CR\/0601020, ACM Computing Research Repository (2006)"},{"key":"23_CR5","unstructured":"Soohoo, K.: How much is enough? A risk-management approach to computer security. PhD thesis, Stanford University"},{"key":"23_CR6","unstructured":"Schechter, S.E.: Computer security strength and risk: a quantitative approach. PhD thesis, Cambridge, MA, USA, Adviser-Smith, Michael D (2004)"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"1948","DOI":"10.1109\/INFOCOM.2008.259","volume-title":"The 27th Conference on Computer Communications, INFOCOM 2008","author":"J. Bolot","year":"2008","unstructured":"Bolot, J., Lelarge, M.: A new perspective on internet security using insurance. In: The 27th Conference on Computer Communications, INFOCOM 2008, April 2008, pp. 1948\u20131956. IEEE, Los Alamitos (2008)"},{"key":"23_CR8","unstructured":"Boehme, R., Kataria, G.: Models and measures for correlation in cyber-insurance. In: Fifth Workshop on the Economics of Information Security (2006)"},{"issue":"2-3","key":"23_CR9","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H. Kunreuther","year":"2003","unstructured":"Kunreuther, H., Heal, G.: Interdependent security. Journal of Risk and Uncertainty\u00a026(2-3), 231\u2013249 (2003)","journal-title":"Journal of Risk and Uncertainty"},{"issue":"4","key":"23_CR10","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L.A. Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur.\u00a05(4), 438\u2013457 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"5","key":"23_CR11","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/s10796-006-9011-6","volume":"8","author":"K. Hausken","year":"2006","unstructured":"Hausken, K.: Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers\u00a08(5), 338\u2013349 (2006)","journal-title":"Information Systems Frontiers"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1145\/1367497.1367526","volume-title":"WWW 2008: Proceeding of the 17th international conference on World Wide Web","author":"J. Grossklags","year":"2008","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Secure or insure? a game-theoretic analysis of information security games. In: WWW 2008: Proceeding of the 17th international conference on World Wide Web, pp. 209\u2013218. ACM, New York (2008)"},{"key":"23_CR13","unstructured":"Varian, H.: System reliability and free riding. In: Workshop on the Economics of Information Security, WEIS 2002, Cambridge, USA (2002)"},{"key":"23_CR14","unstructured":"Ogut, H., Menon, N., Raghunathan, S.: Cyber insurance and it security investment: Impact of interdependent risk. In: Proceedings of WEIS 2005, Cambridge, USA (2005)"},{"issue":"1","key":"23_CR15","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10713-007-0004-2","volume":"32","author":"A. Hofmann","year":"2007","unstructured":"Hofmann, A.: Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks. Geneva Risk and Insurance Review\u00a032(1), 91\u2013111 (2007)","journal-title":"Geneva Risk and Insurance Review"},{"issue":"3","key":"23_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2007.57","volume":"5","author":"W.S. Baer","year":"2007","unstructured":"Baer, W.S., Parkinson, A.: Cyberinsurance in it security management. IEEE Security and Privacy\u00a05(3), 50\u201356 (2007)","journal-title":"IEEE Security and Privacy"},{"key":"23_CR17","unstructured":"Fisk, M.: Causes and remedies for social acceptance of network insecurity. In: Proceedings of WEIS 2002, Berkeley, USA (2002)"},{"key":"23_CR18","unstructured":"Honeyman, P., Schwartz, G., Assche, A.V.: Interdependence of reliability and security. In: Proceedings of WEIS 2007, Pittsburg, PA (2007)"},{"key":"23_CR19","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.1109\/INFCOM.2009.5062066","volume-title":"INFOCOM 2009","author":"M. Lelarge","year":"2009","unstructured":"Lelarge, M., Bolot, J.: Economic incentives to increase security in the internet: The case for insurance. In: INFOCOM 2009, April 2009, pp. 1494\u20131502. IEEE, Los Alamitos (2009)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Radosavac, S., Kempf, J., Kozat, U.: Using insurance to increase internet security. In: Proceedings of NetEcon 2008, Seattle, USA, August 22 (2008)","DOI":"10.1145\/1403027.1403037"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Shetty, N., Schwartz, G., Walrand, J.: Can Competitive Insurers improve Network Security (2010) (in preparation), www.eecs.berkeley.edu\/~nikhils\/SSW-Trust-Long.pdf","DOI":"10.1007\/978-3-642-13869-0_23"},{"key":"23_CR22","unstructured":"Schwartz, G., Shetty, N., Walrand, J.: Cyber Insurance with Interdepedent Security and Aysmmetric Information (2010) (in preparation), www.eecs.berkeley.edu\/~nikhils\/EconSec.pdf"},{"issue":"4","key":"23_CR23","doi-asserted-by":"publisher","first-page":"630","DOI":"10.2307\/1885326","volume":"90","author":"M. Rothschild","year":"1976","unstructured":"Rothschild, M., Stiglitz, J.E.: Equilibrium in competitive insurance markets: An essay on the economics of imperfect information. The Quarterly Journal of Economics\u00a090(4), 630\u2013649 (1976)","journal-title":"The Quarterly Journal of Economics"},{"issue":"3","key":"23_CR24","doi-asserted-by":"publisher","first-page":"488","DOI":"10.2307\/1879431","volume":"84","author":"G.A. Akerlof","year":"1970","unstructured":"Akerlof, G.A.: The market for \u2018lemons\u2019: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics\u00a084(3), 488\u2013500 (1970)","journal-title":"The Quarterly Journal of Economics"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T19:51:52Z","timestamp":1685649112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}