{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:40:09Z","timestamp":1743129609906,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642300530"},{"type":"electronic","value":"9783642300547"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30054-7_14","type":"book-chapter","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T10:42:55Z","timestamp":1337078575000},"page":"172-183","source":"Crossref","is-referenced-by-count":4,"title":["Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market"],"prefix":"10.1007","author":[{"given":"Zichao","family":"Yang","sequence":"first","affiliation":[]},{"given":"John C. S.","family":"Lui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1214\/105051605000000142","volume":"15","author":"D. Aldous","year":"2005","unstructured":"Aldous, D., Bandyopadhyay, A.: Survey of max-type recursive distributional equations. The Annals of Applied Prob.\u00a015(2), 1047\u20131110 (2005)","journal-title":"The Annals of Applied Prob."},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Why information security is hard-an economic perspective. In: IEEE Computer Security Applications Conference 2001, pp. 358\u2013365 (2001)","DOI":"10.1109\/ACSAC.2001.991552"},{"issue":"5799","key":"14_CR3","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R. Anderson","year":"2006","unstructured":"Anderson, R., Moore, T.: The economics of information security. Science\u00a0314(5799), 610 (2006)","journal-title":"Science"},{"key":"14_CR4","volume-title":"Workshop on the Economics of Information Security","author":"R. B\u00f6hme","year":"2010","unstructured":"B\u00f6hme, R., Schwartz, G.: Modeling cyber-insurance: Towards a unifying framework. In: Workshop on the Economics of Information Security. Harvard University, Cambridge (2010)"},{"key":"14_CR5","unstructured":"Bu, T., Towsley, D.: On distinguishing between internet power law topology generators. In: INFOCOM, pp. 638\u2013647. IEEE (2002)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Easley, D., Kleinberg, J.: Networks, crowds, and markets: Reasoning about a highly connected world. Cambridge Univ. Pr. (2010)","DOI":"10.1017\/CBO9780511761942"},{"issue":"4","key":"14_CR7","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1086\/259916","volume":"80","author":"I. Ehrlich","year":"1972","unstructured":"Ehrlich, I., Becker, G.S.: Market insurance, self-insurance, and self-protection. The Journal of Political Economy\u00a080(4), 623\u2013648 (1972)","journal-title":"The Journal of Political Economy"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. In: ACM SIGCOMM, pp. 251\u2013262 (1999)","DOI":"10.1145\/316194.316229"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Secure or insecure? a game-theoretic analysis of information security games. In: WWW 2008 (2008)","DOI":"10.1145\/1367497.1367526"},{"key":"14_CR10","unstructured":"Heal, G., Kunreuther, H.: The vaccination game. Center for Risk Management and Decision Process Working Paper (2005)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Hillier, B.: The economics of asymmetric information. Palgrave Macmillan (1997)","DOI":"10.1007\/978-1-349-25485-9"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, L., Anantharam, V., Walrand, J.: Efficiency of selfish investments in network security. In: Proc. of the 3rd International Workshop on Economics of Networked Systems, pp. 31\u201336. ACM (2008)","DOI":"10.1145\/1403027.1403035"},{"key":"14_CR13","unstructured":"Kesan, J., Majuca, R., Yurcik, W.: Cyberinsurance as a market-based solution to the problem of cybersecurity: a case study. In: Proc. WEIS. Citeseer (2005)"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H. Kunreuther","year":"2003","unstructured":"Kunreuther, H., Heal, G.: Interdependent security. Journal of Risk and Uncertainty\u00a026(2), 231\u2013249 (2003)","journal-title":"Journal of Risk and Uncertainty"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: A local mean field analysis of security investments in networks. In: Proc. of the 3rd International Workshop on Economics of Networked Systems, pp. 25\u201330. ACM (2008)","DOI":"10.1145\/1403027.1403034"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: Network externalities and the deployment of security features and protocols in the internet. In: ACM SIGMETRICS (2008)","DOI":"10.1145\/1375457.1375463"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: Economic incentives to increase security in the internet: The case for insurance. In: INFOCOM, pp. 1494\u20131502 (2009)","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Medvinsky, G., Lai, C., Neuman, B.: Endorsements, licensing, and insurance for distributed system services. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 170\u2013175. ACM (1994)","DOI":"10.1145\/191177.191215"},{"issue":"3","key":"14_CR19","doi-asserted-by":"publisher","first-page":"36112","DOI":"10.1103\/PhysRevE.83.036112","volume":"83","author":"S. Melnik","year":"2011","unstructured":"Melnik, S., Hackett, A., Porter, M.A., Mucha, P.J., Gleeson, J.P.: The unreasonable effectiveness of tree-based theory for networks with clustering. Physical Review E\u00a083(3), 036112 (2011)","journal-title":"Physical Review E"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Miura-Ko, R., Yolken, B., Bambos, N., Mitchell, J.: Security investment games of interdependent organizations. In: 2008 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 252\u2013260. IEEE (2008)","DOI":"10.1109\/ALLERTON.2008.4797564"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., et al.: Code-red: a case study on the spread and victims of an internet worm. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, pp. 273\u2013284. ACM (2002)","DOI":"10.1145\/637241.637244"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Newman, M.: Networks: an introduction. Oxford Univ. Pr. (2010)","DOI":"10.1093\/acprof:oso\/9780199206650.003.0001"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Nisan, N.: Algorithmic game theory. Cambridge Univ. Pr. (2007)","DOI":"10.1017\/CBO9780511800481"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Omic, J., Orda, A., Van Mieghem, P.: Protecting against network infections: A game theoretic perspective. In: INFOCOM 2009. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5062065"},{"issue":"4","key":"14_CR25","doi-asserted-by":"publisher","first-page":"541","DOI":"10.2307\/1884469","volume":"93","author":"S. Shavell","year":"1979","unstructured":"Shavell, S.: On moral hazard and insurance. The Quarterly Journal of Economics\u00a093(4), 541 (1979)","journal-title":"The Quarterly Journal of Economics"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Shetty, N., Schwartz, G., Felegyhazi, M., Walrand, J.: Competitive cyber-insurance and internet security. Economics of Information Security and Privacy, 229\u2013247 (2010)","DOI":"10.1007\/978-1-4419-6967-5_12"},{"key":"14_CR27","unstructured":"Yang, Z., Lui, J.: Security adoption in heterogeneous networks: the influence of cyber-insurance market (2011), http:\/\/www.cse.cuhk.edu.hk\/%7ecslui\/TR1.pdf"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Yang, Z., Lui, J.: Investigating the effect of node heterogeneity and network externality on security adoption. In: Thirteenth ACM Sigmetrics Workshop on Mathematical Performance Modeling and Analysis, MAMA (June 2011)","DOI":"10.1145\/2160803.2160858"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30054-7_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:10:57Z","timestamp":1743127857000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30054-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642300530","9783642300547"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30054-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}