{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:47:47Z","timestamp":1735584467938},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T00:00:00Z","timestamp":1565654400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering & Physical Science Research Council","doi-asserted-by":"crossref","award":["EP\/P005039\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100000266","name":"EPSRC","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1016\/j.cose.2019.101591","type":"journal-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T22:02:56Z","timestamp":1565301776000},"page":"101591","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets"],"prefix":"10.1016","volume":"87","author":[{"given":"Atin","family":"Basuchoudhary","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Searle","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2019.101591_bib0001","series-title":"ICIS 2006 Proc.","first-page":"94","article-title":"Is there a cost to privacy breaches? An event study","author":"Acquisti","year":"2006"},{"issue":"5799","key":"10.1016\/j.cose.2019.101591_bib0065","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1126\/science.1130992","article-title":"The economics of information security","volume":"314","author":"Anderson","year":"2006","journal-title":"Science"},{"key":"10.1016\/j.cose.2019.101591_bib0002","series-title":"The Economics of Information Security and Privacy","first-page":"265","article-title":"Measuring the cost of cybercrime","author":"Anderson","year":"2013"},{"issue":"4","key":"10.1016\/j.cose.2019.101591_bib0003","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1111\/j.1539-6924.2006.00787.x","article-title":"A macro\u2010economic framework for evaluation of cyber security risks related to protection of intellectual property","volume":"26","author":"Andrijcic","year":"2006","journal-title":"Risk Anal."},{"key":"10.1016\/j.cose.2019.101591_bib0004","article-title":"Intellectual property valuation: a primer for identifying and determining value","author":"Anson","year":"2005","journal-title":"Am. Bar Assoc. J"},{"key":"10.1016\/j.cose.2019.101591_bib0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/1593727","article-title":"Little patents and big secrets: managing intellectual property","author":"Anton","year":"2004","journal-title":"RAND J. Econ."},{"key":"10.1016\/j.cose.2019.101591_bib0006","series-title":"How Does Cyber Crime Affect Firms? The Effect of Information Security Breaches on Stock Returns","author":"Arcuri","year":"2017"},{"key":"10.1016\/j.cose.2019.101591_bib0007","first-page":"172","article-title":"Killing the golden goose: the dangers of strengthening domestic trade secret rights in response to cyber-misappropriation","volume":"16","author":"Argento","year":"2013","journal-title":"Yale JL Tech."},{"issue":"4","key":"10.1016\/j.cose.2019.101591_bib0008","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/S0048-7333(00)00100-1","article-title":"The relative effectiveness of patents and secrecy for appropriation","volume":"30","author":"Arundel","year":"2001","journal-title":"Res. Policy"},{"key":"10.1016\/j.cose.2019.101591_bib0009","series-title":"Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on","first-page":"646","article-title":"The evolution of network based cyber security norms: an analytical narrative","author":"Basuchoudhary","year":"2014"},{"key":"10.1016\/j.cose.2019.101591_bib0010","series-title":"2015 IEEE International Conference on Information Reuse and Integration","first-page":"502","article-title":"Cyberdefense when attackers mimic legitimate users: a Bayesian approach","author":"Basuchoudhary","year":"2015"},{"key":"10.1016\/j.cose.2019.101591_bib0011","series-title":"The Economic Dimensions of Crime","first-page":"13","article-title":"Crime and punishment: an economic approach","author":"Becker","year":"1968"},{"issue":"6","key":"10.1016\/j.cose.2019.101591_bib0012","doi-asserted-by":"crossref","first-page":"1112","DOI":"10.1162\/JEEA.2006.4.6.1112","article-title":"Patents vs. trade secrets: knowledge licensing and spillover","volume":"4","author":"Bhattacharya","year":"2006","journal-title":"J. Eur. Econ. Assoc."},{"issue":"1","key":"10.1016\/j.cose.2019.101591_bib0013","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.econlet.2005.11.010","article-title":"Patents, trade secrets and the correlation among R&D projects","volume":"91","author":"Bulut","year":"2006","journal-title":"Econ Lett."},{"key":"10.1016\/j.cose.2019.101591_bib0014","series-title":"Security Breach Notification Laws: Views From Chief Security Officers. A study Conduct Samuelson Law","author":"Burstein","year":"2007"},{"key":"10.1016\/j.cose.2019.101591_bib0015","first-page":"25","article-title":"The revictimization of companies by the stock market who report trade secret theft under the Economic Espionage Act","author":"Carr","year":"2001","journal-title":"Bus. Lawyer"},{"key":"10.1016\/j.cose.2019.101591_bib0016","first-page":"263","article-title":"Keep it secret, keep it safe: protecting trade secrets by revisiting the reasonable efforts requirement in Federal Law","volume":"23","author":"Cash","year":"2015","journal-title":"J. Intell. Prop. L"},{"issue":"1","key":"10.1016\/j.cose.2019.101591_bib0017","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/10864415.2004.11044320","article-title":"The effect of internet security breach announcements on market value\u202f: capital market reactions for breached firms and internet security developers","volume":"9","author":"Cavusoglu","year":"2004","journal-title":"Int. J. Electron. Commer."},{"key":"10.1016\/j.cose.2019.101591_bib0018","doi-asserted-by":"crossref","unstructured":"Cohen W, Nelson R, Walsh J. Protecting Their Intellectual Assets: Appropriability Conditions and Why Firm Patent and Why They Do Not in the American Manufacturing Sector. NBER Work Pap.2000: 7552.","DOI":"10.3386\/w7552"},{"key":"10.1016\/j.cose.2019.101591_bib0019","series-title":"Are Our Laws Adequate for Today's Threats","year":"2014"},{"key":"10.1016\/j.cose.2019.101591_bib0020","doi-asserted-by":"crossref","unstructured":"Crass D, Garcia-Valero F, Pitton F, Rammer C. Protecting Innovation Through Patents and Trade Secrets: Determinants and Performance Impacts for Firms with a Single Innovation. 2016.","DOI":"10.2139\/ssrn.2844731"},{"issue":"2","key":"10.1016\/j.cose.2019.101591_bib0021","doi-asserted-by":"crossref","DOI":"10.2202\/1555-5879.1069","article-title":"Trade secret vs. broad patent: the role of licensing","volume":"2","author":"Cugno","year":"2006","journal-title":"Rev. Law Econ."},{"issue":"9","key":"10.1016\/j.cose.2019.101591_bib0022","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1111\/j.1539-6924.2009.01245.x","article-title":"Empirical analysis of the effects of cyber security incidents","volume":"29","author":"Davis","year":"2009","journal-title":"Risk Anal."},{"key":"10.1016\/j.cose.2019.101591_bib0023","unstructured":"DOJ. Electrical Engineer Found Guilty for Intending to Convert Trade Secrets from Defense Contractor. Press Release (Online). 2018 Jul 10; Available from: HYPERLINK https:\/\/www.justice.gov\/usao-ct\/pr\/electrical-engineer-found-guilty-intending-convert-trade-secrets-defense-contractor."},{"issue":"2","key":"10.1016\/j.cose.2019.101591_bib0066","first-page":"419","article-title":"Economic espionage as reality or rhetoric: Equating trade secrecy with national security","volume":"20","author":"Dreyfuss","year":"2016","journal-title":"O Lewis & Clark L. Rev."},{"issue":"2018","key":"10.1016\/j.cose.2019.101591_bib0024","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.jaccpubpol.2018.10.006","article-title":"Trade secrets and cyber security breaches","volume":"37.6","author":"Ettredge","year":"2018","journal-title":"J. Acc. Public Policy"},{"issue":"4","key":"10.1016\/j.cose.2019.101591_bib0025","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/581271.581274","article-title":"The economics of information security investment","volume":"5","author":"Gordon","year":"2002","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"10.1016\/j.cose.2019.101591_bib0026","first-page":"24","article-title":"Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model","volume":"6","author":"Gordon","year":"2015","journal-title":"J. Inf. Secur."},{"issue":"1","key":"10.1016\/j.cose.2019.101591_bib0027","first-page":"3","article-title":"Increasing cyber security investments in private sector firms","volume":"1","author":"Gordon","year":"2015","journal-title":"J. Cyber. Secur."},{"issue":"1","key":"10.1016\/j.cose.2019.101591_bib0028","doi-asserted-by":"crossref","first-page":"33","DOI":"10.3233\/JCS-2009-0398","article-title":"The impact of information security breaches: has there been a downward shift in costs?","volume":"19","author":"Gordon","year":"2011","journal-title":"J. Comput. Secur."},{"key":"10.1016\/j.cose.2019.101591_bib0029","series-title":"Administration Strategy on Mitigating the Theft of U.S. Trade Secrets","year":"2013"},{"key":"10.1016\/j.cose.2019.101591_bib0030","series-title":"National Cyber Strategy of the United States of America (Online). Washington, DC","year":"2018"},{"issue":"2","key":"10.1016\/j.cose.2019.101591_bib0031","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1257\/jel.52.2.375","article-title":"The choice between formal and informal intellectual property: a review","volume":"52","author":"Hall","year":"2014","journal-title":"J. Econ. Lit."},{"key":"10.1016\/j.cose.2019.101591_bib0032","series-title":"Cyber-Risk Disclosure: Who Cares?","author":"Hilary","year":"2016"},{"key":"10.1016\/j.cose.2019.101591_bib0033","doi-asserted-by":"crossref","unstructured":"Hua, J., Bapna S.The economic impact of cyber terrorism. The Journal of. Strategic Strat. Information Inf. Systems Syst. 22.2 (2013): 175\u2013186.","DOI":"10.1016\/j.jsis.2012.10.004"},{"issue":"1","key":"10.1016\/j.cose.2019.101591_bib0034","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSP.2006.27","article-title":"The simple economics of cybercrimes","volume":"4","author":"Kshetri","year":"2006","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"10.1016\/j.cose.2019.101591_bib0035","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1756-2171.2007.tb00042.x","article-title":"Secrecy versus patenting","volume":"38","author":"Kultti","year":"2007","journal-title":"Rand. J. Econ."},{"issue":"3","key":"10.1016\/j.cose.2019.101591_bib0036","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1111\/j.1467-6451.2012.00482.x","article-title":"Patent races with secrecy","volume":"60","author":"Kwon","year":"2012","journal-title":"J. Ind. Econ."},{"key":"10.1016\/j.cose.2019.101591_bib0037","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.cose.2014.05.006","article-title":"A multi-level approach to understanding the impact of cyber crime on the financial sector","volume":"45","author":"Lagazio","year":"2014","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2019.101591_bib0038","series-title":"Did Goldman Sachs Overstep in Criminal Charging Its Ex-Programmer?","author":"Lewis","year":"2013"},{"issue":"3","key":"10.1016\/j.cose.2019.101591_bib0039","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2480741.2480742","article-title":"Game theory meets network security and privacy","volume":"45","author":"Manshaei","year":"2013","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.cose.2019.101591_bib0040","series-title":"Political Game Theory: An Introduction","author":"McCarty","year":"2007"},{"key":"10.1016\/j.cose.2019.101591_bib0041","article-title":"Identifying the real information security budget","author":"McMillan","year":"2016","journal-title":"Gart. Res."},{"issue":"3","key":"10.1016\/j.cose.2019.101591_bib0042","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1257\/jep.23.3.3","article-title":"The economics of online crime","volume":"23","author":"Moore","year":"2009","journal-title":"J. Econ. Perspect."},{"key":"10.1016\/j.cose.2019.101591_bib0043","series-title":"Identifying How Firms Manage Cyber Security Investment","first-page":"32","author":"Moore","year":"2015"},{"key":"10.1016\/j.cose.2019.101591_bib0044","series-title":"Big Patents, Small Secrets: How Firms Protect Inventions When R&D Outcome is Heterogeneous","author":"Mosel","year":"2011"},{"key":"10.1016\/j.cose.2019.101591_bib0046","first-page":"877","article-title":"Amending the economic espionage act to require the disclosure of national security-related technology thefts","volume":"62","author":"Orozco","year":"2012","journal-title":"Cath. UL Rev."},{"key":"10.1016\/j.cose.2019.101591_bib0047","doi-asserted-by":"crossref","unstructured":"Ottoz E, Cugno F.Patent-secret mix in complex product firms. 2007; American Am. Law and Economics Econ. Review Rev. 10.1: 142\u2013158.","DOI":"10.1093\/aler\/ahn007"},{"key":"10.1016\/j.cose.2019.101591_bib0048","series-title":"Park I-U. Patenting vs. Secrecy For Startups and the Trade of Patents As Negotiating Assets","author":"Panagopoulos","year":"2015"},{"key":"10.1016\/j.cose.2019.101591_bib0049","series-title":"Information Security: User Precautions and Hacker Targeting","author":"Png","year":"2006"},{"issue":"1","key":"10.1016\/j.cose.2019.101591_bib0050","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1162\/REST_a_00532","article-title":"Law and innovation: evidence from state trade secrets laws","volume":"99","author":"Png","year":"2017","journal-title":"Rev. Econ. Stat."},{"issue":"3","key":"10.1016\/j.cose.2019.101591_bib0051","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1287\/stsc.2017.0035","article-title":"Secrecy and patents: theory and evidence from the Uniform Trade Secrets Act","volume":"2","author":"Png","year":"2017","journal-title":"Strateg. Sci."},{"key":"10.1016\/j.cose.2019.101591_bib0052","series-title":"Trade Secrets Law and Engineer\/Scientist Mobility: Evidence from \u201cInevitable Disclosure.\u201d","author":"Png","year":"2013"},{"issue":"2","key":"10.1016\/j.cose.2019.101591_bib0054","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1002\/pam.20567","article-title":"Do data breach disclosure laws reduce identity theft?","volume":"30","author":"Romanosky","year":"2011","journal-title":"J. Policy Anal. Manag."},{"key":"10.1016\/j.cose.2019.101591_bib0067","first-page":"381","article-title":"RATs, TRAPs, and Trade Secrets","volume":"57","author":"Rowe","year":"2016","journal-title":"BCL Rev."},{"key":"10.1016\/j.cose.2019.101591_bib0055","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.cose.2016.10.009","article-title":"Introducing cybernomics: a unifying economic framework for measuring cyber risk","volume":"65","author":"Ruan","year":"2017","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2019.101591_bib0056","series-title":"Does One Size Policy Fit All? The Sensitivity of Cybercrime Policy to Preferences","author":"Searle","year":"2019"},{"key":"10.1016\/j.cose.2019.101591_bib0057","series-title":"Local Police Don't Go After Most cybercriminals. We Need Better Training","author":"Selby","year":"2017"},{"key":"10.1016\/j.cose.2019.101591_bib0058","first-page":"445","article-title":"Protecting intellectual property and privacy in the digital age: the use of national cyber security strategies to mitigate cyber risk","volume":"19","author":"Shackelford","year":"2016","journal-title":"Chap L Rev"},{"key":"10.1016\/j.cose.2019.101591_bib0059","article-title":"Ex-goldman programmer's code theft conviction revived by New York court","author":"Stempel","year":"2017","journal-title":"Reuters Bus. News"},{"key":"10.1016\/j.cose.2019.101591_bib0060","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","article-title":"From information security to cyber security","volume":"38","author":"Von Solms","year":"2013","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2019.101591_bib0061","first-page":"1017","article-title":"Bailouts and the potential for distortion of federal criminal law: industrial espionage and beyond","volume":"86","author":"Wagner","year":"2011","journal-title":"Tul. L. Rev."},{"key":"10.1016\/j.cose.2019.101591_bib0062","series-title":"Information Reuse and Integration, Conf, 2005 IRI-2005 IEEE International Conference on","first-page":"506","article-title":"A layered decision model for cost-effective network defense","author":"Wei","year":"2005"},{"key":"10.1016\/j.cose.2019.101591_bib0063","unstructured":"US v. Sergey Aleynikov: 1:10-cr-00096-DLC. USDC SDNY. 2010."},{"key":"10.1016\/j.cose.2019.101591_bib0064","doi-asserted-by":"crossref","unstructured":"USA v. Sparks et al 3:16\u2212cr\u221200198\u2212AWT\u22121. 2016.","DOI":"10.14321\/crnewcentrevi.16.1.0213"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404819300616?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404819300616?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T09:45:15Z","timestamp":1575452715000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404819300616"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":65,"alternative-id":["S0167404819300616"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2019.101591","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2019,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2019.101591","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"101591"}}