{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:56:00Z","timestamp":1725530160375},"publisher-location":"Boston, MA","reference-count":32,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387097619"},{"type":"electronic","value":"9780387097626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-09762-6_7","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T08:10:37Z","timestamp":1238055037000},"page":"141-163","source":"Crossref","is-referenced-by-count":29,"title":["Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security"],"prefix":"10.1007","author":[{"given":"Adam","family":"Beautement","sequence":"first","affiliation":[]},{"given":"Robert","family":"Coles","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Griffin","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Monahan","sequence":"additional","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]},{"given":"Angela","family":"Sasse","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Wonham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,12,22]]},"reference":[{"key":"7_CR1_7","doi-asserted-by":"crossref","unstructured":"Anderson. R., and Moore, T. \u201cThe Economics of Information Security,\u201d Science (314), 2006, pp. 610\u2013613. Extended version available at http:\/\/www.cl.cam.ac.uk\/~rja14\/Papers\/toulouse- summary.pdf .","DOI":"10.1126\/science.1130992"},{"key":"7_CR2_7","doi-asserted-by":"crossref","unstructured":"Anderson, R. \u201cWhy Information Security Is Hard: An Economic Perspective,\u201d in Proceedings 17th Annual Computer Security Applications Conference, 2001.","DOI":"10.1109\/ACSAC.2001.991552"},{"issue":"12),","key":"7_CR3_7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42:","author":"A.L. Adams","year":"1999","unstructured":"Adams, A.L., and Sasse, M.A. \u201cUsers Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures,\u201d Communications of the ACM (42:12), 1999, pp. 40\u201346.","journal-title":"Communications of the ACM ("},{"key":"7_CR4_7","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1086\/261167","volume":"91),","author":"R. Barro","year":"1983","unstructured":"Barro, R., and Gordon, D. \u201cA Positive Theory of Monetary Policy in a Natural Rate Model,\u201d Journal of Political Economy (91), 1983, pp. 589\u2013610.","journal-title":"Journal of Political Economy ("},{"key":"7_CR5_7","doi-asserted-by":"crossref","unstructured":"Birtwistle, G. Demos \u2014 discrete event modelling on Simula. Macmillan, 1979.","DOI":"10.1007\/978-1-4899-6685-8"},{"issue":"4),","key":"7_CR6_7","first-page":"299","volume":"10:","author":"G. Birtwistle","year":"1993","unstructured":"Birtwistle, G., and Tofts, C. \u201cAn Operational Semantics of Process-Orientated Simulation Languages: Part I,\u201d, Demos. Transactions of the Society for Computer Simulation (10:4), 1993, pp. 299\u2013333.","journal-title":"Demos. Transactions of the Society for Computer Simulation ("},{"issue":"4),","key":"7_CR7_7","first-page":"303","volume":"11:","author":"G. Birtwistle","year":"1994","unstructured":"Birtwistle, G., and Tofts, C. \u201cAn Operational Semantics of Process-Orientated Simulation Languages: Part II,\u201d Demos. Transactions of the Society for Computer Simulation (11:4), 1994 pp. 303\u2013336.","journal-title":"Demos. Transactions of the Society for Computer Simulation ("},{"issue":"3),","key":"7_CR8_7","first-page":"281","volume":"8:","author":"G. Birtwistle","year":"1998","unstructured":"Birtwistle, G., and Tofts, C. \u201cA Denotational Semantics for a Process-Based Simulation Language,\u201d ACM ToMaCS (8:3), 1998, pp. 281\u2013305.","journal-title":"ACM ToMaCS ("},{"issue":"6-7),","key":"7_CR9_7","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/S0928-4869(00)00029-X","volume":"8:","author":"G. Birtwistle","year":"2001","unstructured":"Birtwistle, G., and Tofts, C. \u201cGetting Demos Models Right \u2014 Part I Practice,\u201d Simulation Practice and Theory (8:6-7), 2001, pp. 377\u2013393.","journal-title":"Simulation Practice and Theory ("},{"issue":"6-7),","key":"7_CR10_7","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/S0928-4869(00)00030-6","volume":"8:","author":"G. Birtwistle","year":"2001","unstructured":"Birtwistle, G., and Tofts, C. \u201cGetting Demos Models Right \u2014 Part II ... and Theory,\u201d Simulation Practice and Theory (8:6-7), 2001, pp. 395\u2013414.","journal-title":"Simulation Practice and Theory ("},{"key":"7_CR11_7","unstructured":"Mathematica Documentation Center. http:\/\/reference.wolfram.com\/mathematica\/guide\/Mathematica .html. 2008 ."},{"key":"7_CR12_7","doi-asserted-by":"crossref","unstructured":"Clatworthy, M., Peel, D., and Pope, P. \u201cAre Analysts\u2019 Loss Functions Asymmetric?\u201d Technical Report 005, Lancaster University Management School, 2006.","DOI":"10.2139\/ssrn.875790"},{"key":"7_CR13_7","unstructured":"Demos2k. http:\/\/www.demos2k.org ."},{"issue":"4),","key":"7_CR14_7","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5:","author":"L.A. Gordon","year":"2002","unstructured":"Gordon, L.A., and Loeb, M.P. \u201cThe Economics of Information Security Investment,\u201d ACM Transactions on Information and Systems Security (5:4), 2002, pp. 438\u2013457.","journal-title":"ACM Transactions on Information and Systems Security ("},{"key":"7_CR15_7","unstructured":"Gordon, L.A., and Loeb, M.P. Managing Cybersecurity Resources: A Cost-Benefit Analysis. McGraw Hill, 2006."},{"issue":"3),","key":"7_CR16_7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0304-3975(83)90114-7","volume":"25:","author":"R. Milner","year":"1983","unstructured":"Milner, R. \u201cCalculi for Synchrony and Asynchrony,\u201d Theoretical Computer Science (25:3), 1983, pp. 267\u2013310.","journal-title":"Theoretical Computer Science ("},{"key":"7_CR17_7","unstructured":"Milner, R. Communication and Concurrency. Prentice-Hall, 1989."},{"key":"7_CR18_7","unstructured":"Monahan, B. \u201cDXM: Demos Experiments Manager,\u201d Forthcoming HP Labs Technical Report, 2008."},{"issue":"489),","key":"7_CR19_7","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1111\/1468-0297.t01-1-00149","volume":"113:","author":"R.A. Nobay","year":"2003","unstructured":"Nobay, R.A., and Peel, D.A. \u201cOptimal Discretionary Monetary Policy in a Model of Asymmetric Bank Preferences,\u201d The Economic Journal (113:489), 2003, pp. 657\u2013665.","journal-title":"The Economic Journal ("},{"key":"7_CR20_7","doi-asserted-by":"crossref","unstructured":"Pym, D., and Tofts, C. \u201cA Calculus and Logic of Resources and Processes,\u201d Formal Aspects of Computing (18:4), 2006, pp. 495\u2013517, Erratum (with Collinson, M.) Formal Aspects of Computing (19) 2007, pp. 551\u2013554.","DOI":"10.1007\/s00165-007-0047-2"},{"key":"7_CR21_7","doi-asserted-by":"crossref","unstructured":"Pym, D., and Tofts, C. \u201cSystems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic,\u201d in Cardelli, L., Fiore, M., and Winskel, G. (Eds), Electronic Notes in Theoretical Computer Science (Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin), (107) 2007, pp. 545\u2013587, Erratum (with Collinson, M.) Formal Aspects of Computing (19) 2007, pp. 551\u2013554.","DOI":"10.1016\/j.entcs.2007.02.020"},{"key":"7_CR22_7","doi-asserted-by":"crossref","unstructured":"Pym, D.J. The Semantics and Proof Theory of the Logic of Bunched Implications, Applied Logic Series 26 Kluwer Academic Publishers, 2002. Errata and Remarks maintained at: http:\/\/www.cs.bath.ac.uk\/~pym\/BI-monograph-errata.pdf .","DOI":"10.1007\/978-94-017-0091-7"},{"key":"7_CR23_7","volume-title":"Technical Report 2001-22,","author":"F.J. Ruge-Murcia","year":"2001.","unstructured":"Ruge-Murcia, F.J. \u201cThe Inflation Bias When the Central Bank Targets the Natural Rate of Unemployment,\u201d Technical Report 2001-22, D\u00e9partement de Sciences \u00c9conomique, Universit\u00e9 de Montr\u00e9al, 2001."},{"issue":"5),","key":"7_CR24_7","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1353\/mcb.2003.0038","volume":"35:","author":"R.J. Ruge-Murcia","year":"2003","unstructured":"Ruge-Murcia, R.J. \u201cInflation Targeting under Asymmetric Preferences,\u201d Journal of Money, Credit, and Banking (35:5), 2003, pp. 763\u2013785.","journal-title":"Journal of Money, Credit, and Banking ("},{"key":"7_CR25_7","volume-title":"Basics of Qualitative Research: Grounded Theory Procedures and Techniques.","author":"A.L. Strauss","year":"1990.","unstructured":"Strauss, A.L., and Corbine, J.M. Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Newbury Park, CA: Sage, 1990."},{"key":"7_CR26_7","unstructured":"Office Of Science and Technology. Foresight: Cyber Trustand Crime Prevention Project: Executive Summary. 2004."},{"key":"7_CR27_7","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/0167-2231(93)90009-L","volume":"39),","author":"J.B. Taylor","year":"1993","unstructured":"Taylor, J.B. \u201cDiscretion versus Policy Rules in Practice,\u201d Carnegie-Rochester Conference Series on Public Policy (39), 1993, pp. 195\u2013214.","journal-title":"Carnegie-Rochester Conference Series on Public Policy ("},{"issue":"5),","key":"7_CR28_7","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/BF01211867","volume":"6:","author":"C. Tofts","year":"1994","unstructured":"Tofts, C. \u201cProcesses with Probability, Priority and Time,\u201d Formal Aspects of Computing, (6:5), 1994, pp. 536\u2013564.","journal-title":"Formal Aspects of Computing, ("},{"key":"7_CR29_7","first-page":"195","volume-title":"Studies in Bayesian Economics in Honour of L.J.","author":"H. Varian","year":"1974","unstructured":"Varian, H. \u201cA Bayesian Approach to Real Estate Management,\u201d in Feinberg, S.E. and Zellner, A. (Eds) Studies in Bayesian Economics in Honour of L.J. Savage, North Holland, 1974, pp. 195\u2013208."},{"key":"7_CR30_7","doi-asserted-by":"crossref","unstructured":"Weirich, D., and Sasse, M.A. \u201cPretty Good Persuasion: A first Step towards Effective Password Security for the Real World,\u201d in Proceedings of the New Security Paradigms Workshop, Cloudcroft, NM, ACM Press. September 2001, pp. 137\u2013143.","DOI":"10.1145\/508171.508195"},{"key":"7_CR31_7","unstructured":"Yearworth, M., Monahan, B., and Pym, D. \u201cPredictive Modelling for Security Operations Economics,\u201d (extended abstract) in Proc. I3P Workshop on the Economics of Securing the Information Infrastructure, 2006. Proceedings at http:\/\/wesii.econinfosec.org\/workshop\/ ."},{"key":"7_CR32_7","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1080\/01621459.1986.10478289","volume":"81),","author":"A. Zellner","year":"1986","unstructured":"Zellner, A. \u201cBayesian Prediction and Estimation Using Asymmetric Loss Functions. Journal of the American Statistical Association (81), 1986, pp. 446\u2013451.","journal-title":"Journal of the American Statistical Association ("}],"container-title":["Managing Information Risk and the Economics of Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09762-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T23:13:08Z","timestamp":1558221188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09762-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,22]]},"ISBN":["9780387097619","9780387097626"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09762-6_7","relation":{},"subject":[],"published":{"date-parts":[[2008,12,22]]}}}