{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:41:38Z","timestamp":1767339698751},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_24","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"323-336","source":"Crossref","is-referenced-by-count":12,"title":["Nudge: Intermediaries\u2019 Role in Interdependent Network Security"],"prefix":"10.1007","author":[{"given":"Jens","family":"Grossklags","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Svetlana","family":"Radosavac","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alvaro A.","family":"C\u00e1rdenas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John","family":"Chuang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"6","key":"24_CR1","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2009.163","volume":"7","author":"A. Acquisti","year":"2009","unstructured":"Acquisti, A.: Nudging privacy: The behavioral economics of personal information. IEEE Security & Privacy\u00a07(6), 82\u201385 (2009)","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A. Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy\u00a03(1), 26\u201333 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"24_CR3","unstructured":"Anderson, R.: Why information security is hard \u2013 An economic perspective. In: Proc. of the 17th Annual Computer Security Applications Conference (ACSAC 2001), New Orleans, LA (December 2001)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, R., B\u00f6hme, R., Clayton, R., Moore, T.: Security economics and European policy. In: Proceedings of WEIS 2008, Hanover, USA (June 2008)","DOI":"10.1007\/978-0-387-09762-6_3"},{"issue":"11","key":"24_CR5","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/1592761.1592780","volume":"52","author":"T. Bandyopadhyay","year":"2009","unstructured":"Bandyopadhyay, T., Mookerjee, V., Rao, R.: Why IT managers don\u2019t go for cyber-insurance products. Communications of the ACM\u00a052(11), 68\u201373 (2009)","journal-title":"Communications of the ACM"},{"issue":"3","key":"24_CR6","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.cose.2003.09.002","volume":"23","author":"D. Besnard","year":"2004","unstructured":"Besnard, D., Arief, B.: Computer security impaired by legitimate users. Computers & Security\u00a023(3), 253\u2013264 (2004)","journal-title":"Computers & Security"},{"key":"24_CR7","unstructured":"B\u00f6hme, R., Kataria, G.: Models and measures for correlation in cyber-insurance. In: Proc. of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK (June 2006)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Clark, D., Wroclawski, J., Sollins, K., Braden, R.: Tussle in cyberspace: Defining tomorrow\u2019s Internet. In: Proc. of ACM SIGCOMM 2002, Pittsburgh, PA, pp. 347\u2013356 (August 2002)","DOI":"10.1145\/633057.633059"},{"key":"24_CR9","unstructured":"Clayton, R.: Using early results from the \u2018spamHINTS\u2019 project to estimate an ISP Abuse Team\u2019s task. In: Proc. of CEAS 2006, Mountain View, CA (July 2006)"},{"issue":"1","key":"24_CR10","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1198255.1198265","volume":"37","author":"N. Feamster","year":"2007","unstructured":"Feamster, N., Gao, L., Rexford, J.: How to lease the Internet in your spare time. ACM SIGCOMM Computer Communications Review\u00a037(1), 61\u201364 (2007)","journal-title":"ACM SIGCOMM Computer Communications Review"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-03549-4_10","volume-title":"Financial Cryptography and Data Security","author":"N. Fultz","year":"2009","unstructured":"Fultz, N., Grossklags, J.: Blue versus red: Towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 167\u2013183. Springer, Heidelberg (February 2009)"},{"issue":"2","key":"24_CR12","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/isre.1050.0053","volume":"16","author":"E. Gal-Or","year":"2005","unstructured":"Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research\u00a016(2), 186\u2013208 (2005)","journal-title":"Information Systems Research"},{"key":"24_CR13","unstructured":"Geers, J., Goobic, J. (eds.): Cyber insurance. The CIP Report\u00a06(3), 1\u201311 (2007)"},{"key":"24_CR14","unstructured":"Gerber, A., Houle, J., Nguyen, H., Roughan, M., Sen, S.: P2P, The gorilla in the cable. In: NCTA 2003 National Show, Chicago, IL (June 2003)"},{"issue":"5","key":"24_CR15","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1257\/aer.91.5.1402","volume":"91","author":"J. Goeree","year":"2001","unstructured":"Goeree, J., Holt, C.: Ten little treasures of game theory and ten intuitive contradictions. American Economic Review\u00a091(5), 1402\u20131422 (2001)","journal-title":"American Economic Review"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Secure or insure? A game-theoretic analysis of information security games. In: Proceedings of the 2008 World Wide Web Conference (WWW 2008), Beijing, China, pp. 209\u2013218 (April 2008)","DOI":"10.1145\/1367497.1367526"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Security and insurance management in networks with heterogeneous agents. In: Proceedings of the 9th ACM Conference on Electronic Commerce (EC 2008), Chicago, IL, pp. 160\u2013169 (July 2008)","DOI":"10.1145\/1386790.1386818"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Johnson, B., Christin, N.: When information improves information security. In: Proceedings of the 2010 Financial Cryptography Conference (FC 2010), Canary Islands, Spain (January 2010)","DOI":"10.1007\/978-3-642-14577-3_37"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Radosavac, S., C\u00e1rdenas, A., Chuang, J.: Nudge: Intermediaries\u2019 role in interdependent network security. In: Proceedings of the 25th Symposium on Applied Computing (SAC), Sierre, Switzerland (March 2010)","DOI":"10.1145\/1774088.1774486"},{"issue":"3","key":"24_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10683-007-9179-8","volume":"10","author":"J. Hamman","year":"2007","unstructured":"Hamman, J., Rick, S., Weber, R.: Solving coordination failure with \u201call-or-none\u201d group-level incentives. Experimental Economics\u00a010(3), 285\u2013303 (2007)","journal-title":"Experimental Economics"},{"key":"24_CR21","unstructured":"Kirk, J.: ISPs report success in fighting malware-infected PCs (June 2009), \n                    \n                      http:\/\/www.pcworld.com\/businesscenter\/article\/166444\/isps_report_success_in_fighting_malwareinfected_pcs.html"},{"key":"24_CR22","unstructured":"Mills, E.: Comcast pop-ups alert customers to PC infections. CNet (October 2009), \n                    \n                      http:\/\/news.cnet.com\/8301-27080_3-10370996-245.html"},{"key":"24_CR23","unstructured":"Norton, W.: The art of peering: The peering playbook (2002)"},{"key":"24_CR24","unstructured":"Pritchard, W., Wong, K.: Infrastructure software: Latest survey results. Report by Cowen and Company (December 2008)"},{"key":"24_CR25","unstructured":"Singel, R.: Congressman wants to ban download caps. Wired.com (April 2009)"},{"key":"24_CR26","unstructured":"Shrestha, V.: ISP security. In: Tutorial provided at SANOG5 ISP\/NSP Security Workshop (February 2005)"},{"issue":"1","key":"24_CR27","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"M. Siponen","year":"2000","unstructured":"Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management & Computer Security\u00a08(1), 31\u201341 (2000)","journal-title":"Information Management & Computer Security"},{"key":"24_CR28","volume-title":"Nudge: Improving Decisions About Health, Wealth, and Happiness","author":"R. Thaler","year":"2008","unstructured":"Thaler, R., Sunstein, C.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press, New Haven (2008)"},{"key":"24_CR29","unstructured":"Twycross, J., Williamson, M.: Implementing and testing a virus throttle. In: Proc. of the 12th USENIX Security Symposium, Washington, DC, pp. 285\u2013294 (August 2003)"},{"key":"24_CR30","unstructured":"van Eeten, M., Bauer, J.M.: Economics of malware: Security decisions, incentives and externalities. In: STI Working Paper (May 2008)"},{"issue":"1","key":"24_CR31","first-page":"234","volume":"80","author":"J. Huyck","year":"1990","unstructured":"Van Huyck, J., Battallio, R., Beil, R.: Tacit coordination games, strategic uncertainty, and coordination failure. American Economic Review, 80(1):234\u2013248 (1990)","journal-title":"American Economic Review"},{"key":"24_CR32","unstructured":"Varian, H.: Managing online security risks. New York Times (June 2000)"},{"key":"24_CR33","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/1-4020-8090-5_1","volume-title":"Economics of Information Security","author":"H. Varian","year":"2004","unstructured":"Varian, H.: System reliability and free riding. In: Camp, L., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol.\u00a012, pp. 1\u201315. Kluwer, Dordrecht (2004)"},{"issue":"9","key":"24_CR34","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/JPROC.2004.832969","volume":"92","author":"D. Verma","year":"2004","unstructured":"Verma, D.: Service level agreements on IP networks. Proceedings of the IEEE\u00a092(9), 1382\u20131388 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"24_CR35","unstructured":"Williams, C.: BT abandons Phorm: Not looking good for ad tech. The Register (July 2009)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T15:24:59Z","timestamp":1558279499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}