{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:21:20Z","timestamp":1725517280908},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642322860"},{"type":"electronic","value":"9783642322877"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32287-7_13","type":"book-chapter","created":{"date-parts":[[2012,8,20]],"date-time":"2012-08-20T02:35:41Z","timestamp":1345430141000},"page":"149-160","source":"Crossref","is-referenced-by-count":3,"title":["Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"D\u2019Acquisto","sequence":"first","affiliation":[]},{"given":"Marta","family":"Flamini","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Naldi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Verizon Risk Team: 2011 Data Breach Investigations Report. Technical report, Verizon (2011)"},{"issue":"11","key":"13_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2018396.2018404","volume":"54","author":"L. Hoffmann","year":"2011","unstructured":"Hoffmann, L.: Risky business. Commun. ACM\u00a054(11), 20\u201322 (2011)","journal-title":"Commun. ACM"},{"issue":"4","key":"13_CR3","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L.A. Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur.\u00a05(4), 438\u2013457 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"13_CR4","unstructured":"European Network and Information Security Agency (ENISA): Economics of Security: Facing the Challenge (2011)"},{"issue":"4","key":"13_CR5","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1016\/j.dss.2011.02.009","volume":"51","author":"Y.J. Lee","year":"2011","unstructured":"Lee, Y.J., Kauffman, R.J., Sougstad, R.: Profit-maximizing firm investments in customer information security. Decision Support Systems\u00a051(4), 904\u2013920 (2011)","journal-title":"Decision Support Systems"},{"key":"13_CR6","series-title":"IFIP AICT","first-page":"412","volume-title":"SEC 2012","author":"G. D\u2019Acquisto","year":"2012","unstructured":"D\u2019Acquisto, G., Flamini, M., Naldi, M.: A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol.\u00a0376, pp. 412\u2013423. Springer, Heidelberg (2012)"},{"key":"13_CR7","unstructured":"Gibbons, R.: A Primer in Game Theory. Prentice-Hall (1992)"},{"key":"13_CR8","unstructured":"D\u2019Acquisto, G., Naldi, M., Italiano, G.F.: Personal data disclosure and data breaches: the customer\u2019s viewpoint. ArXiv e-prints (2012)"},{"key":"13_CR9","unstructured":"Javelin: 2011 identity fraud survey report. Technical report, Javelin Strategy (2011)"},{"key":"13_CR10","volume-title":"The Ninth Workshop on the Economics of Information Security (WEIS)","author":"S. Romanosky","year":"2010","unstructured":"Romanosky, S., Sharp, R., Acquisti, A.: Data breaches and identity theft: When is mandatory disclosure optimal? In: The Ninth Workshop on the Economics of Information Security (WEIS), June 7-8. Harvard University, USA (2010)"},{"key":"13_CR11","unstructured":"Osservatorio eCommerce B2c: B2c eCommerce in Italy. Technical report, Netcomm-School of Management of Politecnico di Milano (2011) (in Italian)"},{"key":"13_CR12","unstructured":"Casaleggio Associati: E-commerce in Italy 2011. Technical report (April 2011) (in Italian), \n                    \n                      http:\/\/www.casaleggio.it\/e-commerce\/"},{"key":"13_CR13","unstructured":"AGCOM (Italian Communications Regulatory Authority): Annual report (2011), \n                    \n                      http:\/\/www.agcom.it"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32287-7_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:59:54Z","timestamp":1620115194000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32287-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322860","9783642322877"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32287-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}