{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:02:39Z","timestamp":1725584559671},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642213229"},{"type":"electronic","value":"9783642213236"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21323-6_26","type":"book-chapter","created":{"date-parts":[[2011,5,30]],"date-time":"2011-05-30T11:24:58Z","timestamp":1306754698000},"page":"206-213","source":"Crossref","is-referenced-by-count":1,"title":["Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls"],"prefix":"10.1007","author":[{"given":"Craig S.","family":"Wright","sequence":"first","affiliation":[]},{"given":"Tanveer A.","family":"Zia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"26_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/S0965-2590(09)70057-X","volume":"21","author":"Y. Ben-Itzhak","year":"2009","unstructured":"Ben-Itzhak, Y.: Organised cybercrime and payment cards. Card Technology Today\u00a021(2), 10\u201311 (2009)","journal-title":"Card Technology Today"},{"key":"26_CR2","volume-title":"Proceedings of the Conference on The Future of Software Engineering","author":"P.T. Devanbu","year":"2002","unstructured":"Devanbu, P.T., Stubblebine, S.: Software engineering for security: a roadmap. In: Proceedings of the Conference on The Future of Software Engineering. ACM, Limerick (2002)"},{"key":"26_CR3","unstructured":"DShield (2006-2010), \n                    \n                      http:\/\/www.dshield.org"},{"key":"26_CR4","first-page":"283","volume-title":"The Law and Economics of Software Security","author":"R.W.. Hahn","year":"2007","unstructured":"Hahn, R.W., Layne-Farrar, A.: The Law and Economics of Software Security, p. 283. Harv. J.L. & Pub., Pol\u2019y (2007)"},{"key":"26_CR5","unstructured":"Jaziar, R.: Understanding Hidden Information Security Threats: The Vulnerability Black Market. Paper presented at the 40th Annual Hawaii International Conference on System Sciences HICSS (2007)"},{"key":"26_CR6","volume-title":"WG 11.8 International Federation of Information Processing","author":"S. Peisert","year":"2007","unstructured":"Peisert, S., Bishop, M.: How to Design Computer Security Experiments. In: WG 11.8 International Federation of Information Processing. Springer, Boston (2007)"},{"key":"26_CR7","unstructured":"Scott, M.D.: Tort Liability for Vendors of Insecure Software: Has the Time Finally Come. Md. L. Rev.\u00a067(425) (2007-2008)"},{"key":"26_CR8","volume-title":"The Stag Hunt and the Evolution of Social Structure","author":"B. Skyrms","year":"2004","unstructured":"Skyrms, B.: The Stag Hunt and the Evolution of Social Structure. Cambridge University Press, Cambridge (2004)"},{"issue":"1","key":"26_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/10438590000000002","volume":"9","author":"M. Stolpe","year":"2000","unstructured":"Stolpe, M.: Protection Against Software Piracy: A Study Of Technology Adoption For The Enforcement Of Intellectual Property Rights. Economics of Innovation and New Technology\u00a09(1), 25\u201352 (2000)","journal-title":"Economics of Innovation and New Technology"},{"key":"26_CR10","unstructured":"White, D.S.D.: Limiting Vulnerability Exposure through effective Patch Management: threat mitigation through vulnerability remediation. Master of Science Thesis, Department of Computer Science, Rhodes University (2006)"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1287\/opre.39.5.739","volume":"39","author":"C.D. Kolstad","year":"1991","unstructured":"Kolstad, C.D., Mathiesen, L.: Computing Cournot-Nash Equilibria. Operations Research\u00a039, 739\u2013748 (1991)","journal-title":"Operations Research"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/0022-0531(82)90064-3","volume":"28","author":"M. Kurz","year":"1982","unstructured":"Kurz, M., Hart, S.: Pareto-Optimal Nash Equilibria Are Competitive in a Repeated Economy. Journal of Economic Theory\u00a028, 320\u2013346 (1982)","journal-title":"Journal of Economic Theory"},{"issue":"1","key":"26_CR13","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2005.12","volume":"3","author":"A. Arora","year":"2005","unstructured":"Arora, A., Telang, R.: Economics of Software Vulnerability Disclosure. IEEE Security and Privacy\u00a03(1), 20\u201322 (2005)","journal-title":"IEEE Security and Privacy"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Bacon, D.F., Chen, Y., Parkes, D., Rao, M.: A market-based approach to software evolution. Paper presented at the Proceeding of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications (2009)","DOI":"10.1145\/1639950.1640066"},{"key":"26_CR15","unstructured":"Cavusoglu, H., Cavusoglu, H., Zhang, J.: Economics of Security Patch Management. In: The Fifth Workshop on the Economics of Information Security, WEIS 2006 (2006)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21323-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T23:02:01Z","timestamp":1553727721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21323-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642213229","9783642213236"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21323-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}