{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:49:26Z","timestamp":1749271766229},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/cybersa.2018.8551399","type":"proceedings-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T00:11:06Z","timestamp":1543536666000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Cyber Risk Economics Capability Gaps Research Strategy"],"prefix":"10.1109","author":[{"given":"Erin","family":"Kenneally","sequence":"first","affiliation":[]},{"given":"Lucien","family":"Randazzese","sequence":"additional","affiliation":[]},{"given":"David","family":"Balenson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2003","article-title":"Four Grand Challenges in Trustworthy Computing","key":"ref4"},{"year":"2016","journal-title":"Networking and Information Technology Research and Development Program Federal Cybersecurity Research and Development Strategic Plan","key":"ref3"},{"key":"ref10","article-title":"Experimental Elicitation of Risk Behaviour amongst Information Security Professionals","author":"mersinas","year":"2015","journal-title":"Workshop on Economics and Information Security"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1093\/cybsec\/tyw004"},{"key":"ref11","first-page":"610","article-title":"Why Information Security is Hard&#x2014; An Economic Perspective","author":"anderson","year":"2006","journal-title":"Proceedings of the 17th Annual Computer Security Applications Conference"},{"key":"ref5","article-title":"Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents","author":"liu","year":"2015","journal-title":"Usenix Security"},{"year":"0","author":"friedman","article-title":"Demystifying cyber insurance coverage: Clearing obstacles in a problematic but promising growth market","key":"ref8"},{"key":"ref7","article-title":"Identifying How Firms Manage Cybersecurity Investment","author":"moore","year":"2016","journal-title":"Workshop on Economics and Information Security"},{"year":"2103","journal-title":"Presidential Policy Directive - Critical Infrastructure Security and Resilience","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1108\/JRF-09-2016-0122"},{"year":"2013","journal-title":"Executive Order-Improving Critical Infrastructure Cybersecurity","key":"ref1"}],"event":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2018,6,11]]},"location":"Glasgow","end":{"date-parts":[[2018,6,12]]}},"container-title":["2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536739\/8551360\/08551399.pdf?arnumber=8551399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:01:27Z","timestamp":1643288487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8551399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2018.8551399","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}