{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:03Z","timestamp":1750220643003,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,20]]},"DOI":"10.1145\/3424978.3425017","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T19:06:17Z","timestamp":1602788777000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Pricing Strategy of Software"],"prefix":"10.1145","author":[{"given":"Wujuan","family":"Yang","sequence":"first","affiliation":[{"name":"School of Management and Key Laboratory of Process Optimization and Intelligent, Decision-making of the Ministry of Education, Hefei University of Technology, Hefei, China"}]},{"given":"Xiaofei","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Management and Key Laboratory of Process Optimization and Intelligent, Decision-making of the Ministry of Education, Hefei University of Technology, Hefei, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9562-5"},{"key":"e_1_3_2_1_2_1","volume-title":"Italian email provider Email.it hacked, data of 600k users available for sale. https:\/\/securityaffairs.co\/wordpress\/101196\/data-breach\/italian-email-provider-email-it-hacked.html","author":"Paganini P","year":"2020","unstructured":"P Paganini ( 2020 ). Italian email provider Email.it hacked, data of 600k users available for sale. https:\/\/securityaffairs.co\/wordpress\/101196\/data-breach\/italian-email-provider-email-it-hacked.html . P Paganini (2020). Italian email provider Email.it hacked, data of 600k users available for sale. https:\/\/securityaffairs.co\/wordpress\/101196\/data-breach\/italian-email-provider-email-it-hacked.html."},{"key":"e_1_3_2_1_3_1","volume-title":"RagnarLocker ransomware hits EDP energy giant, asks for \u20ac10M. https:\/\/www.bleepingcomputer.com\/news\/security\/ragnarlocker-ransomware-hits-edp-energy-giant-asks-for-10m\/","author":"Gatlan S","year":"2020","unstructured":"S Gatlan ( 2020 ). RagnarLocker ransomware hits EDP energy giant, asks for \u20ac10M. https:\/\/www.bleepingcomputer.com\/news\/security\/ragnarlocker-ransomware-hits-edp-energy-giant-asks-for-10m\/ . S Gatlan (2020). RagnarLocker ransomware hits EDP energy giant, asks for \u20ac10M. https:\/\/www.bleepingcomputer.com\/news\/security\/ragnarlocker-ransomware-hits-edp-energy-giant-asks-for-10m\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Ethereum client update issue costs cryptocurrency exchange $14 million.","author":"Higgins S","year":"2017","unstructured":"S Higgins ( 2017 ). Ethereum client update issue costs cryptocurrency exchange $14 million. Available at https:\/\/www.coindesk.com\/ethereum-client-exchange-14-million\/. S Higgins (2017). Ethereum client update issue costs cryptocurrency exchange $14 million. Available at https:\/\/www.coindesk.com\/ethereum-client-exchange-14-million\/."},{"key":"e_1_3_2_1_5_1","volume-title":"7-Eleven Japanese customers lose $500,000 due to mobile app flaw. https:\/\/www.zdnet.com\/article\/7-eleven-japanese-customers-lose-500000-due-to-mobile-app-flaw\/","author":"Cimpanu C","year":"2019","unstructured":"C Cimpanu ( 2019 ). 7-Eleven Japanese customers lose $500,000 due to mobile app flaw. https:\/\/www.zdnet.com\/article\/7-eleven-japanese-customers-lose-500000-due-to-mobile-app-flaw\/ . C Cimpanu (2019). 7-Eleven Japanese customers lose $500,000 due to mobile app flaw. https:\/\/www.zdnet.com\/article\/7-eleven-japanese-customers-lose-500000-due-to-mobile-app-flaw\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0142"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2015.2309"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1070.0771"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0341"},{"key":"e_1_3_2_1_11_1","unstructured":"R Telang and S Wattal (2005). Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation. https:\/\/cn.bing.com\/academic\/profile?id=2b0ab7151a63131cfe3ee31ae372d829&encoded=0&v=paper_preview&mkt=zh-cn.  R Telang and S Wattal (2005). Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation. https:\/\/cn.bing.com\/academic\/profile?id=2b0ab7151a63131cfe3ee31ae372d829&encoded=0&v=paper_preview&mkt=zh-cn."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0568"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2018.3153"},{"key":"e_1_3_2_1_14_1","volume-title":"G Settanni and F Skopik","author":"Maghrabi L","year":"2017","unstructured":"L Maghrabi , E Pfluegel , L Alfagih , R Graf , G Settanni and F Skopik ( 2017 ). Improved software vulnerability patching techniques using CVSS and game theory. https:\/\/cn.bing.com\/academic\/profile?id=6dcd2071a680feb184ae7dfe86efe89b&encoded=0&v=paper_preview&mkt=zh-cn. L Maghrabi, E Pfluegel, L Alfagih, R Graf, G Settanni and F Skopik (2017). Improved software vulnerability patching techniques using CVSS and game theory. https:\/\/cn.bing.com\/academic\/profile?id=6dcd2071a680feb184ae7dfe86efe89b&encoded=0&v=paper_preview&mkt=zh-cn."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1070.0794"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"}],"event":{"name":"CSAE 2020: The 4th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2020","location":"Sanya China"},"container-title":["Proceedings of the 4th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424978.3425017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424978.3425017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:10Z","timestamp":1750197730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424978.3425017"}},"subtitle":["Vulnerability and Patch"],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":16,"alternative-id":["10.1145\/3424978.3425017","10.1145\/3424978"],"URL":"https:\/\/doi.org\/10.1145\/3424978.3425017","relation":{},"subject":[],"published":{"date-parts":[[2020,10,20]]},"assertion":[{"value":"2020-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}