{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:59:55Z","timestamp":1773413995942,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/gamenets.2009.5137460","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T15:05:14Z","timestamp":1246460714000},"page":"673-682","source":"Crossref","is-referenced-by-count":18,"title":["Uncertainty in the weakest-link security game"],"prefix":"10.1109","author":[{"given":"Jens","family":"Grossklags","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benjamin","family":"Johnson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1386790.1386818"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/JCIT.1990.128279"},{"key":"17","article-title":"predicted and observed user behavior in the weakest-link security game","author":"grossklags","year":"2008","journal-title":"Proceedings of the 2008 USENIX Workshop on Usability Psychology and Security (UPSEC'08)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367526"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"34","year":"0"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1281700.1281711"},{"key":"13","year":"0"},{"key":"14","author":"gordon","year":"2006","journal-title":"Managing Cyber-Security Resources A Cost-Benefit Analysis"},{"key":"11","first-page":"375","article-title":"an inquiry into the nature and causes of the wealth of internet miscreants","author":"franklin","year":"2007","journal-title":"Proceedings of 14th ACM Conference on Computer and Communications Security (CCS)"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03549-4_10","article-title":"blue versus red: towards a model of distributed security attacks","author":"fultz","year":"2009","journal-title":"Proceedings of the 13th International Conference Financial Cryptography and Data Security (FC'09)"},{"key":"21","first-page":"45","article-title":"lest we remember: cold boot attacks on encryption keys","author":"halderman","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"key":"20","year":"0"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/BF00141070"},{"key":"23","author":"jaeger","year":"2001","journal-title":"Risk Uncertainty and Rational Action"},{"key":"24","year":"2009","journal-title":"Global backup survey"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511803475","author":"kahneman","year":"2000","journal-title":"Choices Values and Frames"},{"key":"26","first-page":"503","article-title":"the fourth amendment in cyberspace: can encryption create a reasonable expectation of privacy?","volume":"33","author":"kerr","year":"2001","journal-title":"Connecticut Law Review"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"key":"28","author":"mitnick","year":"2002","journal-title":"The Art of Deception Controlling the Human Element of Security"},{"key":"29","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/1146381.1146391","article-title":"when selfish meets evil: byzantine players in a virus inoculation game","author":"moscibroda","year":"2006","journal-title":"Proceedings of the 25th Annual Symposium on Principles of Distributed Computing (PODC 2006)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2003.09.002"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0568"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1086\/259916"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"30","year":"0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1016527.1016536"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250211"},{"key":"32","author":"schneier","year":"2006","journal-title":"Beyond Fear"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v14i1.9"},{"key":"31","year":"0"},{"key":"4","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/191177.191193","article-title":"protocol failure in the escrowed encryption standard","author":"blaze","year":"1994","journal-title":"Proceedings of the 2nd ACM Conference on Computer and Communications Security (CCS)"},{"key":"9","author":"dorner","year":"1996","journal-title":"The Logic of Failure Recognizing and Avoiding Error in Complex Situations"},{"key":"8","author":"comes","year":"1986","journal-title":"The theory of externalities public goods and club goods"}],"event":{"name":"2009 International Conference on Game Theory for Networks (GameNets)","location":"Istanbul, Turkey","start":{"date-parts":[[2009,5,13]]},"end":{"date-parts":[[2009,5,15]]}},"container-title":["2009 International Conference on Game Theory for Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5076471\/5137364\/05137460.pdf?arnumber=5137460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T15:40:38Z","timestamp":1739202038000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5137460\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/gamenets.2009.5137460","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}