{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T06:41:37Z","timestamp":1651819297991},"reference-count":40,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1]]},"abstract":"<jats:p>Recently the study of economics of internet has emerged as an emerging field of study. The workstations being distributed across the network along with the users having varied interests has made this study very important from an information security and policy designing point of view. The main purpose of any framework design is to keep up with the security standards of confidentiality, integrity and availability without being an overburden on the deployer. The same goes for the users, the Quality of Service (QoS) should be in accordance with what they pay for. The concept of \u201ctragedy of commons\u201d plays an important role in distributing the limited resources of the internet. In this, the users because of their own self-interest destroy the collective interest of a community sharing the resource. A sustainable pricing strategy is the one which is able to cater to the competitive advantage of different network providers offering the same set of services but on varied prices. A pricing mechanism will help in differentiating the services offered to the users, but another important task is of fixing the incentives. The pricing strategy plays a very important role in facilitating varied kinds of QoS requirements. Security professionals have realized that while designing any security mechanism it is vital to keep in consideration the \u201ctheory of mind\u201d which explains the way the attackers and benign users take decision to deceive of remain loyal to the system. So, studying the incentive and payment structure from economic point of view is important.<\/jats:p>","DOI":"10.4018\/jitr.2020010110","type":"journal-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T13:18:25Z","timestamp":1571836705000},"page":"150-166","source":"Crossref","is-referenced-by-count":2,"title":["Taxonomy of Payment Structures and Economic Incentive Schemes in Internet"],"prefix":"10.4018","volume":"13","author":[{"given":"Brij B.","family":"Gupta","sequence":"first","affiliation":[{"name":"National Institute of Technology, Kurukshetra, India"}]},{"given":"Prachi","family":"Gulihar","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Kurukshetra, India"}]}],"member":"2432","reference":[{"key":"JITR.2020010110-0","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326280"},{"key":"JITR.2020010110-1","doi-asserted-by":"crossref","unstructured":"Albert, R., Jeong, H., & Barab\u00e1si, A. L. (2000). Error and attack tolerance of complex networks. nature, 406(6794), 378.","DOI":"10.1038\/35019019"},{"key":"JITR.2020010110-2","doi-asserted-by":"publisher","DOI":"10.5120\/7640-0724"},{"key":"JITR.2020010110-3","doi-asserted-by":"publisher","DOI":"10.1145\/188280.188291"},{"key":"JITR.2020010110-4","first-page":"155","article-title":"The economics of Internet interconnection agreements.","volume":"35","author":"J. P.Bailey","year":"1997","journal-title":"Inter Economics"},{"key":"JITR.2020010110-5","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.811200"},{"key":"JITR.2020010110-6","unstructured":"Bellovin, S. M., Leech, M., & Taylor, T. (2003). ICMP traceback messages."},{"key":"JITR.2020010110-7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511492532"},{"key":"JITR.2020010110-8","author":"J.Boyle","year":"2000"},{"key":"JITR.2020010110-9","unstructured":"Cao, Z., & Zegura, E. W. (1999, March). Utility max-min: An application-oriented bandwidth allocation scheme. In IEEE INFOCOM'99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Vol. 2, pp. 793-801). IEEE."},{"key":"JITR.2020010110-10","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.43019"},{"key":"JITR.2020010110-11","author":"L. F.Cranor","year":"2005","journal-title":"Security and usability: designing secure systems that people can use"},{"key":"JITR.2020010110-12","doi-asserted-by":"publisher","DOI":"10.1145\/50087.50089"},{"key":"JITR.2020010110-13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019160708424"},{"key":"JITR.2020010110-14","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505588"},{"key":"JITR.2020010110-15","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501177"},{"key":"JITR.2020010110-16","doi-asserted-by":"publisher","DOI":"10.1109\/49.400666"},{"key":"JITR.2020010110-17","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0122-y"},{"key":"JITR.2020010110-18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014526713037"},{"key":"JITR.2020010110-19","doi-asserted-by":"publisher","DOI":"10.1109\/6294.869381"},{"issue":"1&2","key":"JITR.2020010110-20","article-title":"A priority pricing approach to manage multi-service class networks in real-time.","volume":"1","author":"A.Gupta","year":"1995","journal-title":"The Journal of Electronic Publishing"},{"key":"JITR.2020010110-21","doi-asserted-by":"publisher","DOI":"10.1080\/10919399609540269"},{"key":"JITR.2020010110-22","doi-asserted-by":"publisher","DOI":"10.1145\/315762.315772"},{"key":"JITR.2020010110-23","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"JITR.2020010110-24","doi-asserted-by":"publisher","DOI":"10.1145\/1189740.1189745"},{"key":"JITR.2020010110-25","doi-asserted-by":"crossref","unstructured":"Kelly, F. (1997). Charging and rate control for elastic traffic. European transactions on Telecommunications, 8(1), 33-37.","DOI":"10.1002\/ett.4460080106"},{"key":"JITR.2020010110-26","volume":"Vol. 1","author":"S.Keshav","year":"1997","journal-title":"An engineering approach to computer networking: ATM networks, the Internet, and the telephone network"},{"key":"JITR.2020010110-27","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2010.5466993"},{"key":"JITR.2020010110-28","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015470"},{"key":"JITR.2020010110-29","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2016.2620973"},{"key":"JITR.2020010110-30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.37"},{"key":"JITR.2020010110-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.07.011"},{"issue":"2 Part 1","key":"JITR.2020010110-32","first-page":"142","article-title":"Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment.","volume":"10","author":"P.Negi","year":"2013","journal-title":"International Journal of Computer Science Issues"},{"key":"JITR.2020010110-33","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301287"},{"key":"JITR.2020010110-34","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"JITR.2020010110-35","doi-asserted-by":"publisher","DOI":"10.1007\/BF02283186"},{"key":"JITR.2020010110-36","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383060"},{"key":"JITR.2020010110-37","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1109\/INFCOM.2001.916279","article-title":"Advanced and authenticated marking schemes for IP traceback.","volume":"Vol. 2","author":"D. X.Song","year":"2001","journal-title":"Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society"},{"key":"JITR.2020010110-38","unstructured":"Varian, H. (2015). Keynote address to the Digital Rights Management Conference, Berlin, Germany."},{"key":"JITR.2020010110-39","doi-asserted-by":"crossref","unstructured":"Yavatkar, R., Pendarakis, D., & Guerin, R. (2000). A Framework for Policy-based Admission Control RSVP.","DOI":"10.17487\/rfc2753"}],"container-title":["Journal of Information Technology Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=240727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T06:01:17Z","timestamp":1651816877000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JITR.2020010110"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/jitr.2020010110","relation":{},"ISSN":["1938-7857","1938-7865"],"issn-type":[{"value":"1938-7857","type":"print"},{"value":"1938-7865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}