{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:VOGRUBKBAQPVZAIMXLACUK7WUZ","short_pith_number":"pith:VOGRUBKB","schema_version":"1.0","canonical_sha256":"ab8d1a0541041f5c810cbac02a2bf6a678306b911638cec4cf1765399b021594","source":{"kind":"arxiv","id":"1712.05893","version":1},"attestation_state":"computed","paper":{"title":"Uncertainty in Cyber Security Investments","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.GT","authors_text":"Andrew Fielder, Emmanouil Panaousis, Sandra Konig, Stefan Rass, Stefan Schauer","submitted_at":"2017-12-16T02:05:44Z","abstract_excerpt":"When undertaking cyber security risk assessments, we must assign numeric values to metrics to compute the final expected loss that represents the risk that an organization is exposed to due to cyber threats. Even if risk assessment is motivated from real-world observations and data, there is always a high chance of assigning inaccurate values due to different uncertainties involved (e.g., evolving threat landscape, human errors) and the natural difficulty of quantifying risk per se. Our previous work has proposed a model and a software tool that empowers organizations to compute optimal cyber "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1712.05893","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2017-12-16T02:05:44Z","cross_cats_sorted":[],"title_canon_sha256":"49d0b7da41e601726fdb52d03b3313bea6ce25ac87f4c71f2e7652e6114ce4a0","abstract_canon_sha256":"1fe05f0601db2a9a08bd6ab2ba102a8cf6f3cd19c11a39a3eb84fb703bb5f7c0"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:27:51.611160Z","signature_b64":"iLN/wqprQTzTjat+doQg808+e4vSHHM/tAt2YVsNUF6zKDQdT5UIrHpmSrw05y/2SgWtq9tMttR61Hln5Nv8Aw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ab8d1a0541041f5c810cbac02a2bf6a678306b911638cec4cf1765399b021594","last_reissued_at":"2026-05-18T00:27:51.610727Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:27:51.610727Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Uncertainty in Cyber Security Investments","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.GT","authors_text":"Andrew Fielder, Emmanouil Panaousis, Sandra Konig, Stefan Rass, Stefan Schauer","submitted_at":"2017-12-16T02:05:44Z","abstract_excerpt":"When undertaking cyber security risk assessments, we must assign numeric values to metrics to compute the final expected loss that represents the risk that an organization is exposed to due to cyber threats. Even if risk assessment is motivated from real-world observations and data, there is always a high chance of assigning inaccurate values due to different uncertainties involved (e.g., evolving threat landscape, human errors) and the natural difficulty of quantifying risk per se. Our previous work has proposed a model and a software tool that empowers organizations to compute optimal cyber "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1712.05893","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1712.05893","created_at":"2026-05-18T00:27:51.610790+00:00"},{"alias_kind":"arxiv_version","alias_value":"1712.05893v1","created_at":"2026-05-18T00:27:51.610790+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1712.05893","created_at":"2026-05-18T00:27:51.610790+00:00"},{"alias_kind":"pith_short_12","alias_value":"VOGRUBKBAQPV","created_at":"2026-05-18T12:31:49.984773+00:00"},{"alias_kind":"pith_short_16","alias_value":"VOGRUBKBAQPVZAIM","created_at":"2026-05-18T12:31:49.984773+00:00"},{"alias_kind":"pith_short_8","alias_value":"VOGRUBKB","created_at":"2026-05-18T12:31:49.984773+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/VOGRUBKBAQPVZAIMXLACUK7WUZ","json":"https://pith.science/pith/VOGRUBKBAQPVZAIMXLACUK7WUZ.json","graph_json":"https://pith.science/api/pith-number/VOGRUBKBAQPVZAIMXLACUK7WUZ/graph.json","events_json":"https://pith.science/api/pith-number/VOGRUBKBAQPVZAIMXLACUK7WUZ/events.json","paper":"https://pith.science/paper/VOGRUBKB"},"agent_actions":{"view_html":"https://pith.science/pith/VOGRUBKBAQPVZAIMXLACUK7WUZ","download_json":"https://pith.science/pith/VOGRUBKBAQPVZAIMXLACUK7WUZ.json","view_paper":"https://pith.science/paper/VOGRUBKB","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1712.05893&json=true","fetch_graph":"https://pith.science/api/pith-number/VOGRUBKBAQPVZAIMXLACUK7WUZ/graph.json","fetch_events":"https://pith.science/api/pith-number/VOGRUBKBAQPVZAIMXLACUK7WUZ/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/VOGRUBKBAQPVZAIMXLACUK7WUZ/action/timestamp_anchor","attest_storage":"https://pith.science/pith/VOGRUBKBAQPVZAIMXLACUK7WUZ/action/storage_attestation","attest_author":"https://pith.science/pith/VOGRUBKBAQPVZAIMXLACUK7WUZ/action/author_attestation","sign_citation":"https://pith.science/pith/VOGRUBKBAQPVZAIMXLACUK7WUZ/action/citation_signature","submit_replication":"https://pith.science/pith/VOGRUBKBAQPVZAIMXLACUK7WUZ/action/replication_record"}},"created_at":"2026-05-18T00:27:51.610790+00:00","updated_at":"2026-05-18T00:27:51.610790+00:00"}