{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:54Z","timestamp":1725899994459},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_25","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"337-351","source":"Crossref","is-referenced-by-count":0,"title":["How the Public Views Strategies Designed to Reduce the Threat of Botnets"],"prefix":"10.1007","author":[{"given":"Brent","family":"Rowe","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dallas","family":"Wood","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Douglas","family":"Reeves","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"unstructured":"Homeland Security News Wire (HSNW): U.S. Cybercrime Losses Double (2010), \n                    \n                      http:\/\/homelandsecuritynewswire.com\/us-cybercrime-losses-double\n                    \n                    \n                   (as obtained on April 7, 2010)","key":"25_CR1"},{"unstructured":"U.S. Government Accountability Office. Report to Congressional Requestors. Cybercrime. Public and Private Entities Face Challenges in Addressing Cyber Threats. GAO-07-705 (2007), \n                    \n                      http:\/\/www.gao.gov\/new.items\/d07705.pdf\n                    \n                    \n                   (as obtained on April 12, 2010)","key":"25_CR2"},{"unstructured":"The White House. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure (2009), \n                    \n                      http:\/\/www.whitehouse.gov\/assets\/documents\/Cyberspace_Policy_Review_final.pdf\n                    \n                    \n                   (as obtained on April 12, 2010)","key":"25_CR3"},{"unstructured":"Arbor Networks: 2009 Worldwide Infrastructure Security Report (2010), \n                    \n                      http:\/\/www.arbornetworks.com\/report\n                    \n                    \n                   (as obtained on February 21, 2010)","key":"25_CR4"},{"unstructured":"Swartz, J.: Cybersecurity CEO Keeps Watch Over Threat. USA Today, July 23, p. 6B (2007)","key":"25_CR5"},{"unstructured":"Anderson, R., Bohme, R., Clayton, R., Moore, T.: Analyzing Barriers and Incentives for Network and Information Security in the Internal Market for e-Communication (2008), \n                    \n                      http:\/\/www.enisa.europa.eu\/act\/sr\/reports\/econ-sec\n                    \n                    \n                   (as obtained on February 21, 2010)","key":"25_CR6"},{"unstructured":"Lichtman, D., Posner, E.: Holding Internet Service Providers Accountable. University of Chicago John M. Olin Law and Economist Working Paper No. 217 (2006), \n                    \n                      http:\/\/www.law.uchicago.edu\/files\/files\/217-dgl-eap-isp.pdf\n                    \n                    \n                   (as obtained on April 12, 2010)","key":"25_CR7"},{"unstructured":"Baker, S., Shaun, W., Ivanov, G.: In the Crossfire: Critical Infrastructure in the Age of CyberWar (2010), \n                    \n                      http:\/\/csis.org\/event\/crossfire-critical-infrastructure-age-cyber-war\n                    \n                    \n                   (as obtained on February 21, 2010)","key":"25_CR8"},{"unstructured":"Buskirk, E.: Denial-of-Service Attack Knocks Twitter Offline (2009), \n                    \n                      http:\/\/www.wired.com\/epicenter\/2009\/08\/twitter-apparently-down\/\n                    \n                    \n                   (as obtained on February 21, 2010)","key":"25_CR9"},{"unstructured":"Swabey, P.: The New Cybercriminals (2010), \n                    \n                      http:\/\/www.growthbusiness.co.uk\/channels\/growth-strategies\/technology-in-business\/1147068\/the-new-cybercriminals.thtml\n                    \n                    \n                   (as obtained on February 21, 2010)","key":"25_CR10"},{"unstructured":"Symantec: Symantec Global Internet Security Threat Report: Trends for 2008 (2009), \n                    \n                      http:\/\/eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b-whitepaper_Internet_security_threat_report_xiv_04-2009.en-us.pdf\n                    \n                    \n                   (as obtained on February 21, 2009)","key":"25_CR11"},{"unstructured":"British Broadcasting Company (BBC): BBC Team Exposes Cyber Crime Risk, \n                    \n                      http:\/\/news.bbc.co.uk\/2\/hi\/programmes\/click_online\/7932816.stm\n                    \n                    \n                   (as obtained on February 22, 2009) (last updated March 12, 2009)","key":"25_CR12"},{"unstructured":"iDefense: Distributed Denial of Service and Botnet Attacks (2006), \n                    \n                      http:\/\/complianceandprivacy.com\/WhitePapers\/iDefense_DDoS_20060428.pdf\n                    \n                    \n                   (as obtained on February 21, 2010)","key":"25_CR13"},{"unstructured":"Cranton, T.: Cracking Down on Botnets (2009), \n                    \n                      http:\/\/microsoftontheissues.com\/cs\/blogs\/mscorp\/archive\/2010\/02\/24\/cracking-down-on-botnets.aspx\n                    \n                    \n                   (as obtained on April 07, 2010)","key":"25_CR14"},{"unstructured":"Wash, R.: Mental Models of Home Computer Security. Presented at the Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, July 23-25 (2008)","key":"25_CR15"},{"issue":"10","key":"25_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(09)70127-7","volume":"2009","author":"A. Beautement","year":"2009","unstructured":"Beautement, A., Sasse, A.: The Economics of User Effort in Information Security. Computer Fraud & Security\u00a02009(10), 8\u201312 (2009), \n                    \n                      http:\/\/www.sciencedirect.com\/science?_ob=ArticleURL&_udi=B6VNT-4XMCXV1-8&_user=775537&_coverDate=10%2F31%2F2009&_rdoc=1&_fmt=high&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=1292011789&_rerunOrigin=google&_acct=C000042938&_version=1&_urlVersion=0&_userid=775537&md5=d0b7627564e032d681962cdb844a7afb\n                    \n                    \n                   (as obtained April 12, 2010)","journal-title":"Computer Fraud & Security"},{"unstructured":"Evers, J.: ISPs Versus the Zombies. Cnet News.com (July 19, 2005), \n                    \n                      http:\/\/news.cnet.com\/ISPs-versus-the-zombies\/2100-7349_3-5793719.html\n                    \n                    \n                   (as obtained on February 21, 2010)","key":"25_CR17"},{"issue":"1","key":"25_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1189740.1189745","volume":"7","author":"Y. Huang","year":"2007","unstructured":"Huang, Y., Xianjun, G., Whinston, A.: Defeating DDoS Attacks by Fixing the Incentive Chain. ACM Transactions on Internet Technology\u00a0article 5, 7(1), 1\u20135 (2007), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?doid=1189740.1189745\n                    \n                    \n                   (as obtained on April 30, 2009)","journal-title":"ACM Transactions on Internet Technology"},{"unstructured":"Richards, J.: Make Firms Bear the Cost to Improve Information Security, says Schneier. Computer Weekly (May 22, 2007), \n                    \n                      http:\/\/www.computerweekly.com\/Articles\/2007\/05\/22\/223959\/make-firms-bear-the-cost-toimprove-information-security-says-schneier.htm\n                    \n                    \n                   (as obtained on February 21, 2010)","key":"25_CR19"},{"unstructured":"Robinson, N., Potoglou, D., Woo Kim, C., Burge, P., Warnes, P.: Security, at What Cost? Quantifying People\u2019s Trade-offs across Liberty, Privacy and Security (2010), \n                    \n                      http:\/\/www.rand.org\/pubs\/technical_reports\/2010\/RAND_TR664.pdf\n                    \n                    \n                   (as obtained on April 9, 2010)","key":"25_CR20"},{"key":"25_CR21","volume-title":"Nonparametric and Distribution-Free Methods for the Social Sciences","author":"M. Marasculio","year":"1977","unstructured":"Marasculio, M., McSweeny, M.: Nonparametric and Distribution-Free Methods for the Social Sciences. Waldsworth Publishing Company, Belmont (1977)"},{"unstructured":"National Cyber Security Alliance (NCSA) and Symantec. 2009 NCSA\/Symantec Home User Study (2009), \n                    \n                      http:\/\/www.staysafeonline.org\/files\/pdfs\/2009HomeUserStudy\/Home%20User%20Study%20FINAL.pdf\n                    \n                    \n                   (as obtained on April 12, 2010)","key":"25_CR22"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:14:56Z","timestamp":1619770496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}