{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:47:48Z","timestamp":1769723268813,"version":"3.49.0"},"publisher-location":"Wiesbaden","reference-count":37,"publisher":"Vieweg+Teubner","isbn-type":[{"value":"9783834806604","type":"print"},{"value":"9783834892836","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_6","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"57-76","source":"Crossref","is-referenced-by-count":8,"title":["Security Economics and European Policy"],"prefix":"10.1007","author":[{"given":"Ross","family":"Anderson","sequence":"first","affiliation":[]},{"given":"Rainer","family":"B\u00f6hme","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Clayton","sequence":"additional","affiliation":[]},{"given":"Tyler","family":"Moor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Acquisti, A., Friedman, A., and Telang, R. \u201cIs There a Cost to Privacy Breaches? An Event Study\u201d, in 5th Workshop on the Economics of Information Security (WEIS), Cambridge, United Kingdom, June 2006."},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"488","DOI":"10.2307\/1879431","volume":"84","author":"G. Akerlof","year":"1970","unstructured":"Akerlof, G. \u201cThe Market for \u2018Lemons\u2019: Quality Uncertainty and the Market Mechanism\u201d. Quart. J. Economics (84), 1970, pp. 488\u2013500.","journal-title":"Quart. J. Economics"},{"key":"6_CR3","unstructured":"Anderson, N. \u201cGerman \u2018Anti-Hacker\u2019 Law Forces Hacker Sites to Relocate\u201d. Ars Technica, 14 August 2007. http:\/\/arstechnica.com\/news.ars\/post\/20070814-german-anti-hacker-law-forcing-hacker-sites-torelocate.html"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, R., and Moore, T. \u201cThe Economics of Information Security\u201d, Science (314:5799), October 2006, pp. 610\u2013613.","DOI":"10.1126\/science.1130992"},{"key":"6_CR5","unstructured":"APACS. \u201cCard Fraud Losses Continue to Fall\u201d, Press Release, APACS, 14 March 2007. http:\/\/www.apacs.org.uk\/media_centre\/press\/07_14_03.html"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Arora, A., Krishnan, R., Telang, R., and Yang, Y. \u201cAn Empirical Analysis of Vendor Response to Disclosure Policy\u201d, in 4th WEIS, Cambridge, Massachusetts, June 2005.","DOI":"10.2139\/ssrn.786128"},{"key":"6_CR7","unstructured":"BBC. \u201cDevices Attached to Cash Machines\u201d, BBC News, 15 October 2007. http:\/\/news.bbc.co.uk\/1\/hi\/england\/cambridgeshire\/7044894.stm"},{"key":"6_CR8","unstructured":"California State Senate. Assembly Bill 700, 2002. http:\/\/info.sen.ca.gov\/pub\/01-02\/bill\/asm\/ab_0651-0700\/ab_700_bill_20020929_chaptered.pdf"},{"key":"6_CR9","unstructured":"Casper, C. \u201cExamining the Feasibility of a Data Collection Framework\u201d, ENISA, February 2008."},{"key":"6_CR10","unstructured":"Cavusoglu, H., Cavusoglu, H., and Zhang, J. \u201cEconomics of Patch Management\u201d, in 5th WEIS, Cambridge, United Kingdom, June 2006."},{"key":"6_CR11","unstructured":"Clayton, R. \u201cHacking Tools are Legal for a Little Longer\u201d, Light Blue Touchpaper, 19 June 2007. http:\/\/www.lightbluetouchpaper.org\/2007\/06\/19\/hacking-tools-are-legal-for-a-little-longer\/"},{"key":"6_CR12","unstructured":"Computer Security Institute. \u201cThe 12th Annual Computer Crime and Security Survey\u201d, October 2007. http:\/\/www.gocsi.com\/"},{"key":"6_CR13","unstructured":"Council of Europe. Convention on Cybercrime, CETS 185, November 2001. http:\/\/conventions.coe.int\/Treaty\/Commun\/QueVoulezVous.asp?NT=185&CL=ENG"},{"key":"6_CR14","unstructured":"Edelman, B. \u201cAdvertisers Using WhenU\u201d, July 2004. http:\/\/www.benedelman.org\/spyware\/whenu-advertisers\/"},{"key":"6_CR15","unstructured":"Edelman, B. \u201cSpyware: Research, Testing, Legislation, and Suits\u201d, June 2008. http:\/\/www.benedelman.org\/spyware\/"},{"key":"6_CR16","unstructured":"van Eeten, M., and Bauer, J. \u201cThe Economics of Malware: Security Decisions, Incentives and Externalities\u201d, OECD, May 2008. http:\/\/www.oecd.org\/dataoecd\/25\/2\/40679279.pdf"},{"key":"6_CR17","unstructured":"European Commission. \u201ci2010 Benchmarking Framework\u201d, November 2006. http:\/\/ec.europa.eu\/information_society\/eeurope\/i2010\/docs\/benchmarking\/060220_i2010_Benchmarking_Framework_final_nov_2006.doc"},{"key":"6_CR18","unstructured":"European Commission. \u201cReport on the Outcome of the Review of the EU Regulatory Framework for Electronic Communications Networks and Services in Accordance with Directive 2002\/21\/EC and Summary of the 2007 Reform Proposals\u201d, November 2007. http:\/\/ec.europa.eu\/information_society\/policy\/ecomm\/doc\/library\/proposals\/com_review_en.pdf"},{"key":"6_CR19","unstructured":"European Economic Community. \u201cCouncil Directive of 25 July 1985 on the Approximation of the Laws, Regulations and Administrative Provisions of the Member States Concerning Liability for Defective Products (85\/374\/EEC)\u201d, July 1985."},{"key":"6_CR20","unstructured":"European Union. \u201cDirective 93\/13\/EEC of 5 April 1993 on Unfair Terms in Consumer Contracts\u201d, April 1993. http:\/\/eur-lex.europa.eu\/smartapi\/cgi\/sga_doc?smatapi!celexapi!prod!CELEXnumdoc&lg=EN&numdoc=31993L0013&model=guichett"},{"key":"6_CR21","unstructured":"European Union. \u201cDirective 2002\/58\/EC of the European Parliament and of the Council of 12 July 2002 Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (Directive on Privacy and Electronic Communications)\u201d, July 2002. http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:32002L0058:EN:HTML"},{"key":"6_CR22","unstructured":"European Union. \u201cDirective 2006\/123\/EC of the European Parliament and of the Council of of 12 December 2006 on Services in the Internal Market\u201d, December 2006. http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2006:376:0036:0068:EN:PDF"},{"key":"6_CR23","unstructured":"European Union. \u201cDirective 2007\/64\/EC of the European Parliament and of the Council of 13 November 2007 on Payment Services in the Internal Market Amending Directives 97\/7\/EC, 2002\/65\/EC, 2005\/60\/EC and 2006\/48\/EC and Repealing Directive 97\/5\/EC Text with EEA Relevance\u201d, November 2007. http:\/\/eurlex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2007:319:0001:01:EN:HTML"},{"key":"6_CR24","volume-title":"Personal Internet Security, 5th Report of 2006-07","author":"House of Lords Science and Technology Committee","year":"2007","unstructured":"House of Lords Science and Technology Committee. Personal Internet Security, 5th Report of 2006-07, The Stationery Office, London, August 2007."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"D\u2019Ignazio, A., and Giovannetti, E. \u201cSpatial Dispersion of Peering Clusters in the European Internet\u201d, Cambridge Working Papers in Economics 0601, January 2006. http:\/\/econpapers.repec.org\/paper\/camcamdae\/0601.htm","DOI":"10.2139\/ssrn.885928"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"D\u2019Ignazio, A., and Giovannetti, E. \u201c\u2018Unfair\u2019 Discrimination in Two-sided Peering? Evidence from LINX\u201d, Cambridge Working Papers in Economics 0621, February 2006. http:\/\/econpapers.repec.org\/paper\/camcamdae\/0621.htm","DOI":"10.2139\/ssrn.880077"},{"key":"6_CR27","volume-title":"Crimeware: Understanding New Attacks and Defenses","author":"M. Jakobsson","year":"2008","unstructured":"Jakobsson, M., and Ramzan Z. Crimeware: Understanding New Attacks and Defenses, Addison Wesley, Upper Saddle River, New Jersey, 2008."},{"key":"6_CR28","unstructured":"McPherson, D., Labovitz, C., and Hollyman, M. \u201cWorldwide Infrastructure Security Report Volume III\u201d, Arbor Networks, 2007. http:\/\/www.arbornetworks.com\/report"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Moore, T., and Clayton, R. \u201cExamining the Impact of Website Take-down on Phishing\u201d in 2nd Anti-Phishing Working Group eCrime Researcher\u2019s Summit (APWG eCrime), Pittsburgh, Pennsylvania, October 2007, pp. 1\u201313.","DOI":"10.1145\/1299015.1299016"},{"key":"6_CR30","unstructured":"OpenDNS. \u201cOpenDNS Shares April 2007 PhishTank Statistics\u201d, Press Release, 1 May 2007. http:\/\/www.opendns.com\/about\/press_release.php?id=14"},{"key":"6_CR31","unstructured":"Pitcom. \u201cCritical National Infrastructure, Briefings for Parliamentarians on the Politics of Information Technology\u201d, November 2006. http:\/\/www.pitcom.org.uk\/briefings\/PitComms1-CNI.doc"},{"key":"6_CR32","unstructured":"Serjantov, A., and Clayton, R. \u201cModelling Incentives for E-mail Blocking Strategies\u201d, in 4th WEIS, Cambridge, Massachusetts, June 2005."},{"key":"6_CR33","volume-title":"Information Rules. A Strategic Guide to the Network Economy","author":"C. Shapiro","year":"1999","unstructured":"Shapiro, C., and Varian, H. Information Rules. A Strategic Guide to the Network Economy, Harvard Business School Press, Boston, Massachusetts, 1999."},{"key":"6_CR34","unstructured":"Symantec. \u201cInternet Security Threat Report Volume XII\u201d, September 2007. http:\/\/www.symantec.com\/business\/theme.jsp?themeid=threatreport"},{"key":"6_CR35","unstructured":"Zetter, K. \u201cRouter Flaw is a Ticking Bomb\u201d, Wired, 1 August 2005. http:\/\/www.wired.com\/politics\/security\/news\/2005\/08\/68365"},{"key":"6_CR36","unstructured":"Zhuge, J., Holz, T., Han, X., Guo, J., and Zou, W. \u201cCharacterizing the IRC-based Botnet Phenomenon\u201d, Reihe Informatik Technical Report TR-2007-010, December 2007. http:\/\/honeyblog.org\/junkyard\/reports\/botnet-china-TR.pdf"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Zhuge, J., Holz, T., Song, C., Guo, J., Han, X., and Zou, W. \u201cStudying Malicious Websites and the Underground Economy on the Chinese Web\u201d, in 7th WEIS, Hanover, New Hampshire, June 2008.","DOI":"10.1007\/978-0-387-09762-6_11"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:23:03Z","timestamp":1606134183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_6","relation":{},"subject":[]}}