{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:33:23Z","timestamp":1725701603871},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334474"},{"type":"electronic","value":"9783642334481"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33448-1_22","type":"book-chapter","created":{"date-parts":[[2012,8,28]],"date-time":"2012-08-28T14:13:55Z","timestamp":1346163235000},"page":"156-163","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing the Economic Impacts of Security Breaches Due to Outsourcing"],"prefix":"10.1007","author":[{"given":"Dimitrios","family":"Koumaridis","sequence":"first","affiliation":[]},{"given":"Emmanouil","family":"Stiakakis","sequence":"additional","affiliation":[]},{"given":"Christos K.","family":"Georgiadis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Wang, T.W.: Essays on Information Security from an Economic Perspective. Center for Education and Research Information Assurance and Security Purdue University. Technical report (2009)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Ioannidis, C.: Investments and Trade-offs in the Economics of Information Security. School of Management, University of Bath, Hewlett-Packard Laboratories Bristol UK (2009)","DOI":"10.1007\/978-3-642-03549-4_9"},{"key":"22_CR3","unstructured":"Anderson, R.: Why Information Security is Hard: An Economic Perspective. University of Cambridge Computer Laboratory (2001)"},{"issue":"2","key":"22_CR4","doi-asserted-by":"publisher","first-page":"449","DOI":"10.2308\/accr.2003.78.2.449","volume":"78","author":"B.N. Jorgensen","year":"2003","unstructured":"Jorgensen, B.N., Kirschenheiter, M.T.: Discretionary Risk Disclosures. The Accounting Review\u00a078(2), 449\u2013469 (2003)","journal-title":"The Accounting Review"},{"issue":"1","key":"22_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.2307\/2491386","volume":"32","author":"D.J. Skinner","year":"1994","unstructured":"Skinner, D.J.: Why Firms Voluntarily Disclose Bad News. Journal of Accounting Research\u00a032(1), 38\u201360 (1994)","journal-title":"Journal of Accounting Research"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Anderson, R., B\u00f6hme, R., Clayton, R., Moore, T.: Security Economics and the Internal Market. Report to the European Network and Information Security Agency, ENISA (2007)","DOI":"10.1007\/978-0-387-09762-6_3"},{"issue":"4","key":"22_CR7","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L.A. Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The Economics of Information Security Investment. ACM Transactions on Information and Systems Security\u00a05(4), 438\u2013457 (2002)","journal-title":"ACM Transactions on Information and Systems Security"},{"issue":"5","key":"22_CR8","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/s10796-006-9011-6","volume":"8","author":"K. Hausken","year":"2006","unstructured":"Hausken, K.: Returns to Information Security Investment: The Effect of Alternative Information Security Breach Functions on Optimal Investment and Sensitivity to Vulnerability. Information Systems Frontiers\u00a08(5), 338\u2013349 (2006)","journal-title":"Information Systems Frontiers"},{"key":"22_CR9","unstructured":"Willemson, J.: On the Gordon & Loeb Model for Information Security Investment. In: The Fifth Workshop on the Economics of Information Security WEIS, Cambridge, UK (2006)"},{"issue":"11","key":"22_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R.J. Anderson","year":"1994","unstructured":"Anderson, R.J.: Why Cryptosystems Fail. Communications of the ACM\u00a037(11), 32\u201340 (1994)","journal-title":"Communications of the ACM"},{"key":"22_CR11","unstructured":"Zhou, Z.Z., Johnson, M.E.: The Impact of Information Security Ratings on Vendor Competition. Center for Digital Strategies, Tuck School of Business Dartmouth College (2009)"},{"key":"22_CR12","unstructured":"Macura, I., Johnson, E.: Information Risk and the Evolution of the Security Rating Industry. Working paper, Tuck School of Business Dartmouth College (2009)"},{"key":"22_CR13","unstructured":"Kark, K.: Can Moody\u2019s Solve Your Third Party Assessment Problem?, \n                  \n                    http:\/\/blogs.forrester.com\/srm\/2008\/05\/can-moodys-solv.html"},{"issue":"6","key":"22_CR14","doi-asserted-by":"publisher","first-page":"2879","DOI":"10.1111\/0022-1082.00311","volume":"55","author":"D. Kliger","year":"2000","unstructured":"Kliger, D., Sarig, O.: The Information Value of Bond Ratings. The Journal of Finance\u00a055(6), 2879\u20132902 (2000)","journal-title":"The Journal of Finance"},{"issue":"5","key":"22_CR15","doi-asserted-by":"publisher","first-page":"843","DOI":"10.2307\/2297722","volume":"53","author":"C. Shapiro","year":"1986","unstructured":"Shapiro, C.: Investment, Moral Hazard, and Occupational Licensing. The Review of Economic Studies\u00a053(5), 843\u2013862 (1986)","journal-title":"The Review of Economic Studies"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Global Security, Safety and Sustainability &amp; e-Democracy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33448-1_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:09:41Z","timestamp":1620130181000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33448-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334474","9783642334481"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33448-1_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}