메뉴 건너뛰기




Volumn 51, Issue 5, 2005, Pages 726-740

Market for software vulnerabilities? Think again

Author keywords

Game theory; Information security; Public policy; Software vulnerabilities; Vulnerability disclosure

Indexed keywords

SOCIAL OUTCOMES; SOCIAL PLANNERS; SOFTWARE VULNERABILITIES; VULNERABILITY DISCLOSURE;

EID: 20944441343     PISSN: 00251909     EISSN: None     Source Type: Journal    
DOI: 10.1287/mnsc.1040.0357     Document Type: Article
Times cited : (123)

References (30)
  • 1
    • 12344289850 scopus 로고    scopus 로고
    • Provision of software quality in the presence of patching technology
    • Carnegie Mellon University, Pittsburgh, PA
    • Arora, A., J. P. Caulkins, R. Telang. 2003. Provision of software quality in the presence of patching technology. Working paper, Carnegie Mellon University, Pittsburgh, PA.
    • (2003) Working Paper
    • Arora, A.1    Caulkins, J.P.2    Telang, R.3
  • 3
    • 0033338075 scopus 로고    scopus 로고
    • Bundling information goods: Pricing, profits and efficiency
    • Bakos, Y., E. Brynjolfsson. 1999. Bundling information goods: Pricing, profits and efficiency. Management Sci. 45(12) 1613-1630.
    • (1999) Management Sci. , vol.45 , Issue.12 , pp. 1613-1630
    • Bakos, Y.1    Brynjolfsson, E.2
  • 7
    • 33744821759 scopus 로고    scopus 로고
    • Computer Emergency Response Team (CERT). 2003. CERT/CC Statistics 1988-2003. http://www.cert.org/stats/.
    • (2003) CERT/CC Statistics 1988-2003
  • 8
    • 0003164458 scopus 로고
    • Uncertainty, industrial structure, and the speed of R&D
    • Dasgupta, P. S., J. E. Stiglitz. 1980. Uncertainty, industrial structure, and the speed of R&D. Bell J. Econom. 11 1-8.
    • (1980) Bell J. Econom. , vol.11 , pp. 1-8
    • Dasgupta, P.S.1    Stiglitz, J.E.2
  • 10
    • 0009545307 scopus 로고    scopus 로고
    • Categorization of software errors that led to security breaches
    • Crystal City, VA
    • Du, W., A. P. Mathur. 1998a. Categorization of software errors that led to security breaches. Proc. 21st National Inform. Systems Security Conf., Crystal City, VA, 392-407.
    • (1998) Proc. 21st National Inform. Systems Security Conf. , pp. 392-407
    • Du, W.1    Mathur, A.P.2
  • 11
    • 1942425806 scopus 로고    scopus 로고
    • Vulnerability testing of software system using fault injection
    • Reference: Coast TR 98-02, Department of Computer Science, Purdue University, West Lafayette, IN
    • Du, W., A. P. Mathur. 1998b. Vulnerability testing of software system using fault injection. Technical report, Reference: Coast TR 98-02, Department of Computer Science, Purdue University, West Lafayette, IN.
    • (1998) Technical Report
    • Du, W.1    Mathur, A.P.2
  • 13
    • 20944450733 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Forthcoming
    • Gal-Or, E., A. Ghose. 2003. The economic incentives for sharing security information. Inform. Systems Res. Forthcoming.
    • (2003) Inform. Systems Res.
    • Gal-Or, E.1    Ghose, A.2
  • 14
    • 84990029315 scopus 로고    scopus 로고
    • The economics of information security investment
    • Gordon, L. A., M. P. Loeb. 2002. The economics of information security investment. ACM Trans. Inform. System Security 5(4) 438-457.
    • (2002) ACM Trans. Inform. System Security , vol.5 , Issue.4 , pp. 438-457
    • Gordon, L.A.1    Loeb, M.P.2
  • 15
    • 20944447987 scopus 로고    scopus 로고
    • An economic perspective on the sharing of information related to security breaches: Concepts and empirical evidence
    • Berkeley, CA
    • Gordon, L. A., M. P. Loeb, W. Lucyshyn. 2002. An economic perspective on the sharing of information related to security breaches: Concepts and empirical evidence. 1st Workshop Econom. Inform. Security, Berkeley, CA
    • (2002) 1st Workshop Econom. Inform. Security
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 16
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems: An economic analysis
    • Gordon, L. A., M. P. Loeb, W. Lucyshyn. 2003a. Sharing information on computer systems: An economic analysis. J. Accounting Public Policy 22(6) 461-485.
    • (2003) J. Accounting Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 17
    • 4243121902 scopus 로고    scopus 로고
    • A framework for using insurance for cyber risk management
    • Gordon, L. A., M. P. Loeb, T. Sohail. 2003b. A framework for using insurance for cyber risk management. Comm. ACM 46(3) 81-85.
    • (2003) Comm. ACM , vol.46 , Issue.3 , pp. 81-85
    • Gordon, L.A.1    Loeb, M.P.2    Sohail, T.3
  • 18
    • 0042338123 scopus 로고    scopus 로고
    • The Internet goes to college
    • Pew Internet & American Life Project
    • Jones, S. 2002. The Internet goes to college. Technical report, Pew Internet & American Life Project, http://www.pewinternet.org.
    • (2002) Technical Report
    • Jones, S.1
  • 19
    • 12344294075 scopus 로고    scopus 로고
    • Computer vulnerability analysis
    • Department of Computer Science, Purdue University, West Lafayette, IN
    • Krsul, I., E. Spafford, M. Tripunitara. 1998. Computer vulnerability analysis. Technical report, Department of Computer Science, Purdue University, West Lafayette, IN.
    • (1998) Technical Report
    • Krsul, I.1    Spafford, E.2    Tripunitara, M.3
  • 20
    • 0010361611 scopus 로고    scopus 로고
    • The economic impacts of inadequate infrastructure for software testing
    • National Institute of Standards and Technology (NIST). 2002. The economic impacts of inadequate infrastructure for software testing. Technical report, www.nist.gov/director/progofc/report02-03.pdf.
    • (2002) Technical Report
  • 22
    • 14744268697 scopus 로고    scopus 로고
    • Computer security publications: Information economics, shifting liability and the first amendment
    • Preston, E., J. Lofton. 2002. Computer security publications: Information economics, shifting liability and the first amendment. Whittier Law Rev. 24 71-142.
    • (2002) Whittier Law Rev. , vol.24 , pp. 71-142
    • Preston, E.1    Lofton, J.2
  • 23
    • 0001024816 scopus 로고
    • A dynamic game of R&D: Patent protection and competitive behavior
    • Reinganum, J. 1982. A dynamic game of R&D: Patent protection and competitive behavior. Econometrica 48 671-688.
    • (1982) Econometrica , vol.48 , pp. 671-688
    • Reinganum, J.1
  • 24
    • 20944436854 scopus 로고    scopus 로고
    • How to buy better testing: Using competition to get the most security and robustness for your dollar
    • G. Davida, Y. Frankel, O. Rees, eds. Springer-Verlag
    • Schechter, S. E. 2002. How to buy better testing: Using competition to get the most security and robustness for your dollar. G. Davida, Y. Frankel, O. Rees, eds. Proc. Infrastructure Security Conf. Springer-Verlag.
    • (2002) Proc. Infrastructure Security Conf.
    • Schechter, S.E.1
  • 26
    • 0004175691 scopus 로고    scopus 로고
    • Harvard Business School Press, Cambridge, MA
    • Shapiro, C., H. Varian. 1998. Information Rules. Harvard Business School Press, Cambridge, MA.
    • (1998) Information Rules
    • Shapiro, C.1    Varian, H.2
  • 27
    • 0034358645 scopus 로고    scopus 로고
    • Buying, sharing and renting information goods
    • Varian, H. R. 2000a. Buying, sharing and renting information goods. J. Indust. Econom. 48(4) 473-488.
    • (2000) J. Indust. Econom. , vol.48 , Issue.4 , pp. 473-488
    • Varian, H.R.1
  • 28
    • 0344792106 scopus 로고    scopus 로고
    • Managing online security risks
    • Varian, H. R. 2000b. Managing online security risks. New York Times (June 1).
    • (2000) New York Times , Issue.JUNE 1
    • Varian, H.R.1
  • 30
    • 84941158228 scopus 로고    scopus 로고
    • Cyberinsurance: A market solution to Internet security market failure
    • Berkeley, CA
    • Yurcik, W., D. Doss. 2002. Cyberinsurance: A market solution to Internet security market failure. 1st Workshop Econom. Inform. Security, Berkeley, CA.
    • (2002) 1st Workshop Econom. Inform. Security
    • Yurcik, W.1    Doss, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.