{"id":"https://openalex.org/W48135433","doi":"https://doi.org/10.1007/978-3-642-30436-1_34","title":"A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation","display_name":"A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W48135433","doi":"https://doi.org/10.1007/978-3-642-30436-1_34","mag":"48135433"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-30436-1_34","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-30436-1_34","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-30436-1_34.pdf","source":{"id":"https://openalex.org/S4210175514","display_name":"IFIP International Federation for Information Processing/IFIP","issn_l":"1571-5736","issn":["1571-5736","1861-2288"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-30436-1_34.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088519302","display_name":"Giuseppe D\u2019Acquisto","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Giuseppe D\u2019Acquisto","raw_affiliation_strings":["Garante per la protezione dei dati personali, Roma, Italy"],"affiliations":[{"raw_affiliation_string":"Garante per la protezione dei dati personali, Roma, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059751212","display_name":"Marta Flamini","orcid":"https://orcid.org/0000-0002-5266-8809"},"institutions":[{"id":"https://openalex.org/I4210155399","display_name":"UniNettuno University","ror":"https://ror.org/04q0nep37","country_code":"IT","type":"education","lineage":["https://openalex.org/I4210155399"]},{"id":"https://openalex.org/I4210125243","display_name":"Italian University Line","ror":"https://ror.org/02wgnr390","country_code":"IT","type":"education","lineage":["https://openalex.org/I4210125243"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marta Flamini","raw_affiliation_strings":["Universit\u00e0 telematica internazionale UNINETTUNO, Roma, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 telematica internazionale UNINETTUNO, Roma, Italy","institution_ids":["https://openalex.org/I4210155399","https://openalex.org/I4210125243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079223759","display_name":"Maurizio Naldi","orcid":"https://orcid.org/0000-0002-0903-398X"},"institutions":[{"id":"https://openalex.org/I116067653","display_name":"University of Rome Tor Vergata","ror":"https://ror.org/02p77k626","country_code":"IT","type":"education","lineage":["https://openalex.org/I116067653"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Maurizio Naldi","raw_affiliation_strings":["Universit\u00e0 di Roma Tor Vergata, Roma, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 di Roma Tor Vergata, Roma, Italy","institution_ids":["https://openalex.org/I116067653"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088519302"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.0454,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.89942043,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"412","last_page":"423"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.7296243906021118},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6499723196029663},{"id":"https://openalex.org/keywords/customer-retention","display_name":"Customer retention","score":0.4837520122528076},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.48019564151763916},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.46395960450172424},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4431843161582947},{"id":"https://openalex.org/keywords/service-level-objective","display_name":"Service level objective","score":0.43030959367752075},{"id":"https://openalex.org/keywords/investment","display_name":"Investment (military)","score":0.4298584461212158},{"id":"https://openalex.org/keywords/apportionment","display_name":"Apportionment","score":0.4266558587551117},{"id":"https://openalex.org/keywords/business-service-provider","display_name":"Business service provider","score":0.4136103689670563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3882285952568054},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.3489900231361389},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.3286157250404358},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.2653580904006958},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.19033262133598328},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.16595134139060974},{"id":"https://openalex.org/keywords/service-design","display_name":"Service design","score":0.14394637942314148},{"id":"https://openalex.org/keywords/service-quality","display_name":"Service quality","score":0.12448394298553467},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11263018846511841}],"concepts":[{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.7296243906021118},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6499723196029663},{"id":"https://openalex.org/C101276457","wikidata":"https://www.wikidata.org/wiki/Q5196474","display_name":"Customer retention","level":4,"score":0.4837520122528076},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.48019564151763916},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.46395960450172424},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4431843161582947},{"id":"https://openalex.org/C16151460","wikidata":"https://www.wikidata.org/wiki/Q3480069","display_name":"Service level objective","level":5,"score":0.43030959367752075},{"id":"https://openalex.org/C27548731","wikidata":"https://www.wikidata.org/wiki/Q88272","display_name":"Investment (military)","level":3,"score":0.4298584461212158},{"id":"https://openalex.org/C2778337684","wikidata":"https://www.wikidata.org/wiki/Q3173700","display_name":"Apportionment","level":2,"score":0.4266558587551117},{"id":"https://openalex.org/C1622189","wikidata":"https://www.wikidata.org/wiki/Q5001944","display_name":"Business service provider","level":5,"score":0.4136103689670563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3882285952568054},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.3489900231361389},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.3286157250404358},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.2653580904006958},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.19033262133598328},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.16595134139060974},{"id":"https://openalex.org/C61063171","wikidata":"https://www.wikidata.org/wiki/Q532781","display_name":"Service design","level":4,"score":0.14394637942314148},{"id":"https://openalex.org/C140781008","wikidata":"https://www.wikidata.org/wiki/Q1221081","display_name":"Service quality","level":3,"score":0.12448394298553467},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11263018846511841},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-30436-1_34","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-30436-1_34","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-30436-1_34.pdf","source":{"id":"https://openalex.org/S4210175514","display_name":"IFIP International Federation for Information Processing/IFIP","issn_l":"1571-5736","issn":["1571-5736","1861-2288"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01518258v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01518258","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.412-423, &#x27E8;10.1007/978-3-642-30436-1_34&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-30436-1_34","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-30436-1_34","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-30436-1_34.pdf","source":{"id":"https://openalex.org/S4210175514","display_name":"IFIP International Federation for Information Processing/IFIP","issn_l":"1571-5736","issn":["1571-5736","1861-2288"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W48135433.pdf","grobid_xml":"https://content.openalex.org/works/W48135433.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W1607309762","https://openalex.org/W2028269651","https://openalex.org/W2045237777","https://openalex.org/W2056075452","https://openalex.org/W2131832787","https://openalex.org/W2137503421","https://openalex.org/W2141499038","https://openalex.org/W2950627632","https://openalex.org/W4214736398"],"related_works":["https://openalex.org/W2016087123","https://openalex.org/W2328609219","https://openalex.org/W2949429726","https://openalex.org/W1516324214","https://openalex.org/W928714965","https://openalex.org/W2786810075","https://openalex.org/W2168158826","https://openalex.org/W1797105837","https://openalex.org/W2028359368","https://openalex.org/W2049301720"],"abstract_inverted_index":{"Data":[0],"breaches":[1,25,128],"represents":[2],"a":[3,18,59,160],"major":[4],"source":[5],"of":[6,98,121,173,176],"worries":[7],"(and":[8],"economic":[9,46],"losses)":[10],"for":[11,81,159],"customers":[12],"and":[13,70,88,103,143],"service":[14,38,53,72,90,131,184],"providers.":[15],"We":[16],"introduce":[17],"data":[19,127,174],"breach":[20,175],"model":[21],"that":[22,24,62,117],"recognizes":[23],"can":[26],"take":[27],"place":[28],"on":[29,36,191],"the":[30,37,42,45,52,64,68,71,82,86,89,93,96,104,119,122,130,145,152,166,171,183,192],"customer\u2019s":[31,193],"premises":[32],"as":[33,35],"well":[34],"provider\u2019s":[39,185],"side,":[40],"but":[41,151,187],"customer":[43,69,87,146],"bears":[44],"loss.":[47],"In":[48],"order":[49],"to":[50,85,109,126,140,147,163],"induce":[51],"provider":[54,73,132],"into":[55],"investing":[56],"in":[57,111,136,170],"security,":[58],"regulatory":[60],"policy":[61],"apportions":[63],"money":[65,123],"loss":[66,124],"between":[67],"is":[74,79],"introduced.":[75],"A":[76],"game-theoretic":[77],"formulation":[78],"given":[80],"strategic":[83],"interaction":[84],"provider,":[91],"where":[92],"former":[94],"sets":[95],"amount":[97],"personal":[99],"information":[100],"it":[101],"releases":[102],"latter":[105],"decides":[106],"how":[107],"much":[108],"invest":[110],"security.":[112],"The":[113],"game\u2019s":[114],"outcome":[115],"shows":[116],"shifting":[118],"burden":[120],"due":[125],"towards":[129],"spurs":[133],"its":[134],"investment":[135],"security":[137],"(though":[138],"up":[139],"moderate":[141],"levels)":[142],"leads":[144],"be":[148,156],"more":[149],"confident,":[150],"apportionment":[153],"must":[154],"not":[155,180],"too":[157],"unbalanced":[158],"Nash":[161],"equilibrium":[162],"exist.":[164],"On":[165],"other":[167],"hand,":[168],"changes":[169],"probability":[172],"both":[177],"sides":[178],"do":[179],"affect":[181],"significantly":[182],"behaviour,":[186],"cause":[188],"heavy":[189],"consequences":[190],"confidence.":[194]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
