{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:46:38Z","timestamp":1742924798138,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642394973"},{"type":"electronic","value":"9783642394980"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39498-0_6","type":"book-chapter","created":{"date-parts":[[2013,11,28]],"date-time":"2013-11-28T13:05:32Z","timestamp":1385643932000},"page":"115-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Sectoral and Regional Interdependency of Japanese Firms Under the Influence of Information Security Risks"],"prefix":"10.1007","author":[{"given":"Bongkot","family":"Jenjarrussakul","sequence":"first","affiliation":[]},{"given":"Hideyuki","family":"Tanaka","sequence":"additional","affiliation":[]},{"given":"Kanta","family":"Matsuura","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,8]]},"reference":[{"issue":"5799","key":"6_CR1","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R. Anderson","year":"2006","unstructured":"Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610\u2013613 (2006)","journal-title":"Science"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Aoyama, Y., Ratick, S.J.: Trust, transactions, and information technologies in the U.S. logistics industry. Econ. Geogr. 83(2), 159\u2013180 (2007)","DOI":"10.1111\/j.1944-8287.2007.tb00341.x"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s10799-010-0066-1","volume":"11","author":"T. Bandyopadhyay","year":"2010","unstructured":"Bandyopadhyay, T., Jacob, V., Raghunathan, S.: Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. Inf. Technol. Manage. 11(1), 7\u201323 (2010)","journal-title":"Inf. Technol. Manage."},{"issue":"6","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1093\/icc\/dtn040","volume":"17","author":"A.W.A. Boot","year":"2008","unstructured":"Boot, A.W.A., Marinc, M.: The evolving landscape of banking. Ind. Corpor. Change 17(6), 1173\u20131203 (2008)","journal-title":"Ind. Corpor. Change"},{"key":"6_CR5","unstructured":"Cabineet Office, Government of Japan: Gross capital stock by industry. Available via DIALOG. http:\/\/www.esri.cao.go.jp\/jp\/sna\/sonota\/minkan\/kekka\/20110107\/h21y_stock_all.xls (2009)"},{"key":"6_CR6","unstructured":"Cabinet Office, Government of Japan: Special Cabinet Meeting Material on Monthly Economic Report due to the Earthquake. Available via DIALOG. http:\/\/www5.cao.go.jp\/keizai3\/getsurei-s\/1103.pdf (2011)"},{"issue":"3","key":"6_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.2307\/41166309","volume":"47","author":"J. Dedrick","year":"2005","unstructured":"Dedrick, J., Kraemer, K.L.: The impacts of IT on firm and industry structure: the personal computer industry. Calif. Manage. Rev. 47(3), 122\u2013142 (2005)","journal-title":"Calif. Manage. Rev."},{"issue":"2","key":"6_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1111\/0022-4146.00053","volume":"37","author":"E. Dietzenbacher","year":"1997","unstructured":"Dietzenbacher, E., Linder, J.A.: Sectoral and spatial linkages in the EC production structure. J. Reg. Sci. 37(2), 235\u2013257 (1997)","journal-title":"J. Reg. Sci."},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/026839699344719","volume":"14","author":"C. Fearon","year":"1999","unstructured":"Fearon, C., Philip, G.: An empirical study of the use of EDI in supermarket chains using a new conceptual framework. J. Inf. Technol. 14(1), 3\u201321 (1999)","journal-title":"J. Inf. Technol."},{"issue":"6","key":"6_CR10","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1080\/01449290601177029","volume":"27","author":"C. Fearon","year":"2008","unstructured":"Fearon, C., Philip, G.: Measuring success of electronic trading in the insurance industry: operationalising the disconfirmation of expectations paradigm. Behav. Inf. Technol. 27(6), 483\u2013493 (2008)","journal-title":"Behav. Inf. Technol."},{"key":"6_CR11","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2005 CSI\/FBI Computer crime and security survey. Available via DIALOG. http:\/\/www.cpppe.umd.edu\/Bookstore\/Documents\/2005CSISurvey.pdf (2005)"},{"issue":"3","key":"6_CR12","first-page":"130","volume":"4","author":"Y.Y. Haimes","year":"2001","unstructured":"Haimes, Y.Y., Jiang, P.: Leontief-based model of risk in complex interconnected infrastructures. Int. J. Netw. Virtual Organ. 4(3), 130\u2013144 (2001)","journal-title":"Int. J. Netw. Virtual Organ."},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1061\/(ASCE)1076-0342(2005)11:2(80)","volume":"11","author":"Y.Y. Haimes","year":"2005","unstructured":"Haimes, Y.Y., Horowitz, B.M., Lambert, J.H., Santos, J.R., Crowther, K., Lian, C.: Inoperability input\u2013output model for interdependent infrastructure sectors. II: Case studies. J. Infrastruct. Syst. 11(2), 80\u201392 (2005)","journal-title":"II: Case studies. J. Infrastruct. Syst."},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1061\/(ASCE)1076-0342(2005)11:2(67)","volume":"11","author":"Y.Y. Haimes","year":"2005","unstructured":"Haimes, Y.Y., Horowitz, B.M., Lambert, J.H., Santos, J.R., Lian, C., Crowther, K.G.: Inoperability input\u2013output model for interdependent infrastructure sectors. I: Theory and methodology. J. Infrastruct. Syst. 11(2), 67\u201379 (2005)","journal-title":"I: Theory and methodology. J. Infrastruct. Syst."},{"issue":"2","key":"6_CR15","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1080\/07421222.2004.11045799","volume":"21","author":"K. Han","year":"2004","unstructured":"Han, K., Kauffman, R.J., Nault, B.R.: Information exploitation and interorganizational systems ownership. J. Manage. Inf. Syst. 21(2), 109\u2013135 (2004)","journal-title":"J. Manage. Inf. Syst."},{"issue":"6","key":"6_CR16","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/j.jaccpubpol.2006.09.001","volume":"25","author":"K. Hausken","year":"2006","unstructured":"Hausken, K.: Income, Interdependence, and substitution effects affecting incentives for security investment. J. Account. Public Policy 25(6), 629\u2013665 (2006)","journal-title":"J. Account. Public Policy"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"King, J.L., Lyytinen, K.: Automotive Informatics: Information Technology and Enterprise Transformation in the Automobile Industry. Transforming Enterprise: The Economic and Social Implications of Information Technology, pp. 283\u2013312. MIT, Cambridge (2005)","DOI":"10.7551\/mitpress\/6900.003.0017"},{"issue":"4","key":"6_CR18","doi-asserted-by":"crossref","first-page":"735","DOI":"10.2307\/20650325","volume":"33","author":"R. Klein","year":"2009","unstructured":"Klein, R., Rai, A.: Interfirm Strategic Information Flows in Logistics Supply Chain Relationships. Manage. Inf. Syst. Q. 33(4), 735\u2013762 (2009)","journal-title":"Manage. Inf. Syst. Q."},{"issue":"2\u20133","key":"6_CR19","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H. Kunreuther","year":"2003","unstructured":"Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertain. 26(2\u20133), 231\u2013249 (2003)","journal-title":"J. Risk Uncertain."},{"key":"6_CR20","unstructured":"Ministry of Economic, Trade and Industry: Inter-regional input\u2013output tables 2005. Available via DIALOG. http:\/\/www.meti.go.jp\/statistics\/tyo\/tiikiio\/result\/result_02.html (2005)"},{"key":"6_CR21","unstructured":"Ministry of Economic, Trade and Industry: The 2006 Survey of Information Technology. Available via DIALOG. http:\/\/www.meti.go.jp\/statistics\/zyo\/zyouhou\/result-2\/h18jyojitsu.html (2007)"},{"key":"6_CR22","unstructured":"Office of the Manager, National Communications System: Supervisory Control and Data Acquisition (SCADA) Systems: Technical information bulletin 04-1, National communications system. Available via DIALOG. http:\/\/www.ncs.gov\/library\/tech_bulletins\/2004\/tib_04-1.pdf (2004)"},{"key":"6_CR23","unstructured":"Ogut, H., Menon, N., Raghunathan, S.: Cyber insurance and IT security investment: impact of interdependent risk. In: 4th Workshop on the Economics of Information Security (WEIS), Cambridge (2005)"},{"issue":"4","key":"6_CR24","doi-asserted-by":"publisher","first-page":"86","DOI":"10.2307\/41166318","volume":"47","author":"R. Pierre","year":"2005","unstructured":"Pierre, R., Timothy, D.: Modular strategies: B2B technology and architectural knowledge. Calif. Manage. Rev. 47(4), 86\u2013113 (2005)","journal-title":"Calif. Manage. Rev."},{"key":"6_CR25","unstructured":"Research Institute of Economy, Trade and Industry: Japan industrial productivity database 2008. Available via DIALOG. http:\/\/www.rieti.go.jp\/jp\/database\/JIP2008\/index.html (2008)"},{"key":"6_CR26","unstructured":"Shinozaki, A., Yamamoto, Y., Yamazaki, S.: Technical papers on ICT related economics. No. 11-1: Estimation on the amount of damage on ICT-related capital stock. Available via DIALOG. http:\/\/www.icr.co.jp\/ICT\/report\/TP_201106.pdf (2011)"},{"key":"6_CR27","volume-title":"Geography and information security: does location affect information security effort? In: Fourth Forum on Financial Systems and Cyber Security: A Public Policy Perspective","author":"H. Tanaka","year":"2007","unstructured":"Tanaka, H.: Geography and information security: does location affect information security effort? In: Fourth Forum on Financial Systems and Cyber Security: A Public Policy Perspective, Smith School of Business, University of Maryland (2007)"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Tanaka, H.: Quantitative analysis of information security interdependency between industrial sectors. In: Proceedings of the 3rd International Symposium on Empirical Software Engineering and Measurement, Lake Buena Vista, pp. 574\u2013583 (2009)","DOI":"10.1109\/ESEM.2009.5314218"},{"key":"6_CR29","unstructured":"The Institute for Information Infrastructure Protection (I3P): Security Solution for the Oil and Gas Industry, Technology Fact Sheet. Inoperability input\u2013output model (IIM). Available via DIALOG. http:\/\/www.dartmouth.edu\/~i3p\/docs\/publications\/IIM-factsheet-Feb2007.pdf (2007)"}],"container-title":["The Economics of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39498-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T16:49:38Z","timestamp":1716223778000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-39498-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642394973","9783642394980"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39498-0_6","relation":{},"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"8 October 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}