{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:24:28Z","timestamp":1740097468879,"version":"3.37.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474120"},{"type":"electronic","value":"9783319474137"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47413-7_21","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T16:20:15Z","timestamp":1475598015000},"page":"370-381","source":"Crossref","is-referenced-by-count":3,"title":["A Logic for the Compliance Budget"],"prefix":"10.1007","author":[{"given":"Gabrielle","family":"Anderson","sequence":"first","affiliation":[]},{"given":"Guy","family":"McCusker","sequence":"additional","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"21_CR1","volume-title":"Decision and Game-Theoretic Approach","author":"T Alpcan","year":"2010","unstructured":"Alpcan, T., Ba\u015far, T., Security, N.: Decision and Game-Theoretic Approach. Cambridge University Press, Cambridge (2010)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Why information security is hard: an economic perspective. In: Proceedings of the 17th Annual Computer Security Applications Conference, pp. 358\u2013265. IEEE (2001)","DOI":"10.1109\/ACSAC.2001.991552"},{"key":"21_CR3","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson, R., Moore, T.: The economics of information security. Science 314, 610\u2013613 (2006)","journal-title":"Science"},{"key":"21_CR4","unstructured":"Baskent, C., McCusker, G.: Preferences and equilibria in history based models. In: Proceedings of the 12th Conference on Logic and the Foundations of Game and Decision Theory (2016). http:\/\/loft.epicenter.name"},{"key":"21_CR5","doi-asserted-by":"publisher","unstructured":"Beautement, A., Sasse, A., Wonham, M.: The compliance budget. In: Proceedings of the New Security Paradigms Workshop (NSPW 2008), pp. 47\u201355. ACM (2008) doi: 10.1145\/1595676.1595684","DOI":"10.1145\/1595676.1595684"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(09)70127-7","volume":"10","author":"A Beautement","year":"2009","unstructured":"Beautement, A., Sasse, A.: The economics of user effort in information security. Comput. Fraud Secur. 10, 8\u201312 (2009). doi: 10.1016\/S1361-3723(09)70127-7","journal-title":"Comput. Fraud Secur."},{"key":"21_CR7","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-0-387-09762-6_7","volume-title":"Managing Information Risk and the Economics of Security","author":"A Beautement","year":"2009","unstructured":"Beautement, A., Coles, R., Griffin, J., Ioannidis, C., Monahan, B., Pym, D., Sasse, A., Wonham, M.: Modelling the human and technological costs and benefits of USB memory stick security. In: Johnson, M.E. (ed.) Managing Information Risk and the Economics of Security, pp. 141\u2013163. Springer, New York (2009)"},{"key":"21_CR8","volume-title":"A Discipline of Mathematical Systems Modelling","author":"M Collinson","year":"2012","unstructured":"Collinson, M., Monahan, B., Pym, D.: A Discipline of Mathematical Systems Modelling. College Publications, London (2012)"},{"volume-title":"Handbook of Epistemic Logic","year":"2015","key":"21_CR9","unstructured":"van Ditmarsch, H., Halpern, J., van der Hoek, W., Kooi, B. (eds.): Handbook of Epistemic Logic. College Publications, London (2015)"},{"issue":"4","key":"21_CR10","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5(4), 438\u2013457 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"21_CR11","volume-title":"A Cost-Benefit Analysis","author":"LA Gordon","year":"2006","unstructured":"Gordon, L.A., Loeb, M.P., Resources, M.C.: A Cost-Benefit Analysis. McGraw Hill, New York (2006)"},{"issue":"7","key":"21_CR12","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1287\/mnsc.14.7.486","volume":"14","author":"J Harsanyi","year":"1968","unstructured":"Harsanyi, J.: Games with incomplete information played by \u2018Bayesian\u2019 players, Part III. Manag. Sci. 14(7), 486\u2013502 (1968)","journal-title":"Manag. Sci."},{"key":"21_CR13","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511810275","volume-title":"Logic in Computer Science: Modelling and Reasoning About Systems","author":"M Huth","year":"2004","unstructured":"Huth, M., Ryan, M.: Logic in Computer Science: Modelling and Reasoning About Systems. Cambridge University Press, Cambridge (2004)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Investments and trade-offs in the economics of information security. In: Proceedings of the Financial Cryptography, Data Security, pp. 148\u2013162 (2009)","DOI":"10.1007\/978-3-642-03549-4_9"},{"issue":"2","key":"21_CR15","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.ejor.2011.05.050","volume":"216","author":"C Ioannidis","year":"2012","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Information security trade-offs and optimal patching policies. Eur. J. Oper. Res. 216(2), 434\u2013444 (2012). doi: 10.1016\/j.ejor.2011.05.050","journal-title":"Eur. J. Oper. Res."},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Is public co-ordination of investment in information security desirable? J. Inf. Secur. 7, 60\u201380 (2016). http:\/\/dx.doi.org\/10.4236\/jis.2016.72005","DOI":"10.4236\/jis.2016.72005"},{"issue":"4","key":"21_CR17","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1016\/j.jal.2006.03.012","volume":"5","author":"E Pacuit","year":"2007","unstructured":"Pacuit, E.: Some comments on history based structures. J. Appl. Logic 5(4), 613\u2013624 (2007)","journal-title":"J. Appl. Logic"},{"issue":"4","key":"21_CR18","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1023\/A:1025007018583","volume":"12","author":"R Parikh","year":"2003","unstructured":"Parikh, R., Ramanujam, R.: A knowledge-based semantics of messages. J. Logic Lang. Inf. 12(4), 453\u2013467 (2003)","journal-title":"J. Logic Lang. Inf."},{"key":"21_CR19","doi-asserted-by":"publisher","unstructured":"A. Pnueli. The temporal logic of programs. In: Proceedings of the 18th Annual Symposium on Foundations of Computer Science (FOCS), pp. 46\u201357 (1977). doi: 10.1109\/SFCS.1977.32","DOI":"10.1109\/SFCS.1977.32"},{"key":"21_CR20","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511973031","volume-title":"Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned","author":"M Tambe","year":"2011","unstructured":"Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011)"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47413-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:20:43Z","timestamp":1498335643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47413-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319474120","9783319474137"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47413-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}