{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:22:24Z","timestamp":1759134144535,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T00:00:00Z","timestamp":1510876800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s12525-017-0276-z","type":"journal-article","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T00:19:19Z","timestamp":1510877959000},"page":"39-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Negligence and sanctions in information security investments in a cloud environment"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0903-398X","authenticated-orcid":false,"given":"Maurizio","family":"Naldi","sequence":"first","affiliation":[]},{"given":"Marta","family":"Flamini","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"D\u2019Acquisto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,17]]},"reference":[{"key":"276_CR1","unstructured":"Bartolini, C., El Kateb, D., Le Traon, Y., Hagen, D. (2015). Cloud providers viability: how to address it from an IT and legal perspective?. In Economics of grids, clouds, systems, and services."},{"key":"276_CR2","volume-title":"Law and economics","author":"R Cooter","year":"2000","unstructured":"Cooter, R., & Ulen, T. (2000). Law and economics. Boston: Addison-Wesley."},{"key":"276_CR3","doi-asserted-by":"crossref","unstructured":"D\u2019Acquisto, G., Flamini, M., Naldi, M. (2012). Damage sharing may not be enough: an analysis of an ex-ante regulation policy for data breaches. In Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings (Vol. 7449, p. 149-160). Springer.","DOI":"10.1007\/978-3-642-32287-7_13"},{"key":"276_CR4","doi-asserted-by":"crossref","unstructured":"D\u2019Acquisto, G., Flamini, M., Naldi, M. (2012). A game-theoretic formulation of security investment decisions under ex-ante regulation. In 27th IFIP International Information Security and Privacy Conference (Vol. 376). Springer.","DOI":"10.1007\/978-3-642-30436-1_34"},{"key":"276_CR5","doi-asserted-by":"crossref","unstructured":"Drago, I., Bocchi, E., Mellia, M., Slatman, H., Pras, A. (2013). Benchmarking personal cloud storage. In Proceedings of the 2013 conference on internet measurement conference (pp. 205\u2013212). ACM.","DOI":"10.1145\/2504730.2504762"},{"issue":"2","key":"276_CR6","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C Farkas","year":"2002","unstructured":"Farkas, C., & Jajodia, S. (2002). The inference problem: a survey. ACM SIGKDD Explorations Newsletter, 4(2), 6\u201311.","journal-title":"ACM SIGKDD Explorations Newsletter"},{"issue":"4","key":"276_CR7","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon, L.A., & Loeb, M.P. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5(4), 438\u2013457.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"276_CR8","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.ijpe.2012.06.022","volume":"141","author":"CD Huang","year":"2013","unstructured":"Huang, C.D., & Behara, R.S. (2013). Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. International Journal of Production Economics, 141(1), 255\u2013268.","journal-title":"International Journal of Production Economics"},{"key":"276_CR9","doi-asserted-by":"crossref","unstructured":"Kim, K., Kang, S., Altmann, J. (2014). Cloud Goliath versus a federation of cloud Davids. In Economics of grids, clouds, systems, and services (pp. 55\u201366). Springer, Berlin.","DOI":"10.1007\/978-3-319-14609-6_4"},{"key":"276_CR10","unstructured":"Markovits, R.S. (2004). Tort-related risk costs and the hand formula for negligence. The University of Texas School of Law, Law and Economics Working Paper."},{"key":"276_CR11","doi-asserted-by":"crossref","unstructured":"Naldi, M. (2014). Balancing leasing and insurance costs to achieve total risk coverage in cloud storage multi-homing. In Altmann, J., Vanmechelen, K., Rana, O.F. (Eds.) Economics of Grids, Clouds, Systems, and Services - 11th International Conference, GECON 2014, Cardiff, UK, September 16-18, 2014. Revised Selected Papers. (Vol. 8914, pp. 146\u2013158). Springer.","DOI":"10.1007\/978-3-319-14609-6_10"},{"key":"276_CR12","unstructured":"Naldi, M., Flamini, M., D\u2019Acquisto, G. (2013). Economics of grids, clouds, systems, and services: 10th international conference, GECON 2013, Zaragoza, Spain, September 18-20, 2013. Proceedings. In Altmann, J., Vanmechelen, K., Rana, O. F., (Eds.), (pp. 268\u2013279). Springer International Publishing."},{"key":"276_CR13","unstructured":"Naldi, M., Flamini, M., D\u2019Acquisto, G. (2013). A revenue-based sanctioning procedure for data breaches. In The 7th International Conference on Network and System Security NSS 2013. Madrid: Springer."},{"issue":"1","key":"276_CR14","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1057\/ejis.2014.34","volume":"25","author":"M Naldi","year":"2016","unstructured":"Naldi, M., & Mastroeni, L. (2016). Economic decision criteria for the migration to cloud storage. Eur J Inf Syst, 25(1), 16\u201328.","journal-title":"Eur J Inf Syst"},{"issue":"3","key":"276_CR15","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/TCC.2015.2415792","volume":"3","author":"I Petri","year":"2015","unstructured":"Petri, I., Diaz-Montes, J., Zou, M., Beach, T., Rana, O., Parashar, M. (2015). Market models for federated clouds. IEEE Transactions on Cloud Computing, 3(3), 398\u2013410.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"1","key":"276_CR16","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.compeleceng.2012.04.015","volume":"39","author":"C Rong","year":"2013","unstructured":"Rong, C, Nguyen, S.T., Jaatun, M.G. (2013). Beyond lightning: a survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47\u201354. Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing and Bio-engineering.","journal-title":"Computers & Electrical Engineering"},{"issue":"2","key":"276_CR17","first-page":"236","volume":"3","author":"ML Rustad","year":"2007","unstructured":"Rustad, M.L., & Koenig, T.H. (2007). Extending learned hand\u2019s negligence formula to information security breaches. I\/S: A Journal on Law and Policy for the Information Society, 3(2), 236\u2013270.","journal-title":"I\/S: A Journal on Law and Policy for the Information Society"},{"issue":"2","key":"276_CR18","first-page":"279","volume":"15","author":"JW Schneider","year":"2009","unstructured":"Schneider, J.W. (2009). Preventing data breaches: alternative approaches to deter negligent handling of consumer data. Journal of Science & Technology Law, 15(2), 279\u2013332. Boston University School of Law.","journal-title":"Journal of Science & Technology Law"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12525-017-0276-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-017-0276-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-017-0276-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T04:07:35Z","timestamp":1570334855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12525-017-0276-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,17]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["276"],"URL":"https:\/\/doi.org\/10.1007\/s12525-017-0276-z","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"type":"print","value":"1019-6781"},{"type":"electronic","value":"1422-8890"}],"subject":[],"published":{"date-parts":[[2017,11,17]]}}}