{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:22:32Z","timestamp":1763580152588,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/hicss.2004.1265430","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":11,"title":["Economic analysis of the market for software vulnerability disclosure"],"prefix":"10.1109","author":[{"given":"K.","family":"Kannan","sequence":"first","affiliation":[]},{"given":"R.","family":"Telang","sequence":"additional","affiliation":[]},{"family":"Hao Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Vulnerability testing of software system using fault injection","author":"du","year":"1998","journal-title":"Technical Report"},{"key":"ref3","first-page":"392","article-title":"Categorization of software errors that led to security breaches","author":"du","year":"1998","journal-title":"21st National Information Systems Security Conference"},{"key":"ref10","article-title":"Managing online security risks","author":"varian","year":"2000","journal-title":"The New York Times"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"journal-title":"ZD-Net","article-title":"Trusted computing comes with a warning","year":"2003","key":"ref11"},{"journal-title":"e-Week","article-title":"Cert, feds consider new reporting process","year":"2003","key":"ref5"},{"key":"ref8","article-title":"Computer vulnerability analysis","author":"krsul","year":"1998","journal-title":"Technical Report"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.6.745.11941"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1287\/mnsc.44.4.433","article-title":"and Sandra Slaughter. Software development practices, software engineering complexities, and software maintenance","volume":"44","author":"rajiv","year":"1998","journal-title":"Management Science"},{"journal-title":"Security Focus","article-title":"Security research exemption to dmca considered","year":"2003","key":"ref9"},{"key":"ref1","article-title":"Provision of software quality in the presence of patching technology","author":"arora","year":"2003","journal-title":"Working Paper"}],"event":{"name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","start":{"date-parts":[[2004,1,8]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2004,1,8]]}},"container-title":["37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8934\/28293\/01265430.pdf?arnumber=1265430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:56:15Z","timestamp":1497585375000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/hicss.2004.1265430","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}