메뉴 건너뛰기




Volumn 52, Issue 11, 2006, Pages 1703-1720

Network software security and user incentives

Author keywords

Economics of IS; Information systems; IT policy and management; Network economics

Indexed keywords

FREEWARE; MANDATORY PATCHING; NETWORK SECURITY; USER INCENTIVES;

EID: 33750703619     PISSN: 00251909     EISSN: 15265501     Source Type: Journal    
DOI: 10.1287/mnsc.1060.0568     Document Type: Article
Times cited : (98)

References (52)
  • 1
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard - An economic perspective
    • IEEE Computer Society, Los Alamitos, CA
    • Anderson, R. J. 2001. Why information security is hard - An economic perspective. Proc. 17th Ann. Comput. Security Appl. Conf. IEEE Computer Society, Los Alamitos, CA, 358-365.
    • (2001) Proc. 17th Ann. Comput. Security Appl. Conf. , pp. 358-365
    • Anderson, R.J.1
  • 5
    • 84860019483 scopus 로고    scopus 로고
    • Developing a patch and vulnerability management strategy
    • Retrieved March 2006
    • Bentley, A. 2005. Developing a patch and vulnerability management strategy. SC Magazine. Retrieved March 2006, http://www. scmagazine.com.
    • (2005) SC Magazine
    • Bentley, A.1
  • 6
    • 33750686102 scopus 로고    scopus 로고
    • The patch problem: It's costing your business real dollars
    • Bloor, B. 2003. The patch problem: It's costing your business real dollars. Baroudi Bloor. http://www.baroudi.com/pdfs/patch. pdf.
    • (2003) Baroudi Bloor
    • Bloor, B.1
  • 10
    • 84860024872 scopus 로고    scopus 로고
    • CERT/CC statistics 1988-2003
    • Retrieved August 2004
    • CERT. 2004. CERT/CC Statistics 1988-2003. CERT Coordination Center. Retrieved August 2004, http://www.cert.org/stats.
    • (2004) CERT Coordination Center
  • 12
    • 33750695434 scopus 로고    scopus 로고
    • The cost impact of major virus attacks since 1995
    • Computer Economies. 2004. The cost impact of major virus attacks since 1995. (February).
    • (2004) Computer Economies , Issue.FEBRUARY
  • 13
    • 33750690799 scopus 로고    scopus 로고
    • What does a computer security breach really cost?
    • Applied Visions Inc., Northport, NY
    • D'Amico, A. D. 2000. What does a computer security breach really cost? Secure Decisions, Applied Visions Inc., Northport, NY.
    • (2000) Secure Decisions
    • D'Amico, A.D.1
  • 15
    • 0031065891 scopus 로고    scopus 로고
    • Dynamic epidemiology and the market for vaccinations
    • Francis, P. J. 1997. Dynamic epidemiology and the market for vaccinations. J. Public Econom, 63(3) 383-406.
    • (1997) J. Public Econom , vol.63 , Issue.3 , pp. 383-406
    • Francis, P.J.1
  • 16
    • 33750722921 scopus 로고    scopus 로고
    • The cost of information security breaches
    • Ernst & Young, New York
    • Garg, A. 2003. The cost of information security breaches. CrossCur-rents. Ernst & Young, New York.
    • (2003) CrossCurrents
    • Garg, A.1
  • 17
    • 84860026910 scopus 로고    scopus 로고
    • The economics of shared risk at the national scale
    • University of Minnesota, Minneapolis, MN
    • Geer, D. E. 2004. The economics of shared risk at the national scale. Third Annual Workshop on Economics and Information Security, University of Minnesota, Minneapolis, MN. Available at http://www.dtc.umn.edu/weis2004/weis- geer.pdf.
    • (2004) Third Annual Workshop on Economics and Information Security
    • Geer, D.E.1
  • 18
    • 0030368092 scopus 로고    scopus 로고
    • Rational epidemics and their public control
    • Geoffard, P.-Y., T. Philipson. 1996. Rational epidemics and their public control. Internat. Econom. Rev, 37(3) 603-624.
    • (1996) Internat. Econom. Rev , vol.37 , Issue.3 , pp. 603-624
    • Geoffard, P.-Y.1    Philipson, T.2
  • 20
    • 0842284567 scopus 로고    scopus 로고
    • The economical control of infectious diseases
    • Gersovitz, M., J. S. Hammer. 2004. The economical control of infectious diseases. Econom, J, 114(492) 1-27.
    • (2004) Econom, J , vol.114 , Issue.492 , pp. 1-27
    • Gersovitz, M.1    Hammer, J.S.2
  • 21
    • 14044260575 scopus 로고    scopus 로고
    • Tax/subsidy policies toward vector-borne infectious disease
    • Gersovitz, M., J. S. Hammer. 2005. Tax/subsidy policies toward vector-borne infectious disease. J. Public Econom. 89(4) 647-674.
    • (2005) J. Public Econom. , vol.89 , Issue.4 , pp. 647-674
    • Gersovitz, M.1    Hammer, J.S.2
  • 22
    • 0842274642 scopus 로고    scopus 로고
    • Cost optimization in the SIS model of infectious disease with treatment
    • Goldman, S. M., J. Lightwood. 2002. Cost optimization in the SIS model of infectious disease with treatment. Topics Econom. Anal. Policy 2(1) 1-22.
    • (2002) Topics Econom. Anal. Policy , vol.2 , Issue.1 , pp. 1-22
    • Goldman, S.M.1    Lightwood, J.2
  • 23
    • 84860028169 scopus 로고    scopus 로고
    • World internet usage and population statistics
    • Retrieved March 2004
    • Internet World Stats. 2004. World internet usage and population statistics. Retrieved March 2004, http://www.internetworldstats. com/stats.htm.
    • (2004) Internet World Stats
  • 25
    • 84860034467 scopus 로고    scopus 로고
    • More regulation for the software industry?
    • Joyce, E. 2005. More regulation for the software industry? Enterprise IT Planet (February), http://www.enterpriseitplanet.com/security/news/article.php/ 3483876.
    • (2005) Enterprise IT Planet , Issue.FEBRUARY
    • Joyce, E.1
  • 27
    • 0041115542 scopus 로고    scopus 로고
    • Integrating behavioral choice into epidemiological models of AIDS
    • Kremer, M. 1996. Integrating behavioral choice into epidemiological models of AIDS. Quart. J. Econom. 111(2) 549-573.
    • (1996) Quart. J. Econom. , vol.111 , Issue.2 , pp. 549-573
    • Kremer, M.1
  • 28
    • 33750716284 scopus 로고    scopus 로고
    • U.S. goals solicited on software security
    • Krim, J. 2004. U.S. goals solicited on software security. Washington-Post.com.
    • (2004) Washington-Post.com
    • Krim, J.1
  • 30
    • 10444267314 scopus 로고    scopus 로고
    • Interdependent security: Implications for homeland security policy and other areas
    • The Brookings Institution, Washington, D.C.
    • Kunreuther, H., G. M. Heal, P. R. Orszag. 2002. Interdependent security: Implications for homeland security policy and other areas. Policy Brief 108, The Brookings Institution, Washington, D.C.
    • (2002) Policy Brief , vol.108
    • Kunreuther, H.1    Heal, G.M.2    Orszag, P.R.3
  • 31
    • 33750702296 scopus 로고    scopus 로고
    • Squashing the next worm
    • Lemos, R. 2003. Squashing the next worm. CNET News (August).
    • (2003) CNET News , Issue.AUGUST
    • Lemos, R.1
  • 32
    • 84860030283 scopus 로고    scopus 로고
    • Witty worm proves patching "not viable."
    • Lemos, R. 2004. Witty worm proves patching "not viable." CNET News (March).
    • (2004) CNET News , Issue.MARCH
    • Lemos, R.1
  • 33
    • 33750733390 scopus 로고    scopus 로고
    • Patching takes over IT for a day
    • Lemos, R. 2005. Patching takes over IT for a day. Techworld (January).
    • (2005) Techworld , Issue.JANUARY
    • Lemos, R.1
  • 34
    • 84860028459 scopus 로고    scopus 로고
    • EPA offers incentives to firms that adopt telecommuting in five U.S. metros
    • Leung, L. 2001. EPA offers incentives to firms that adopt telecommuting in five U.S. metros. Online Insider (May), http://www. conway.com/ssinsider/ incentive/ti0105.htm.
    • (2001) Online Insider , Issue.MAY
    • Leung, L.1
  • 35
    • 33750712169 scopus 로고    scopus 로고
    • Who's patching open source?
    • Maguire, J. 2004. Who's patching open source? Enterprise Linux IT (January).
    • (2004) Enterprise Linux IT , Issue.JANUARY
    • Maguire, J.1
  • 36
    • 84860016149 scopus 로고    scopus 로고
    • Can software patching be automated?
    • Messmer, E. 2004a. Can software patching be automated? Network World Fusion (May), http://www.nwfusion.com/weblogs/security/005182.html.
    • (2004) Network World Fusion , Issue.MAY
    • Messmer, E.1
  • 37
    • 84860028912 scopus 로고    scopus 로고
    • Sasser worm exposes patching failures
    • Messmer, E. 2004b. Sasser worm exposes patching failures. 'Network World Fusion (May), http://www.nwfusion.com/news/ 2004/0510sasser.html.
    • (2004) Network World Fusion , Issue.MAY
    • Messmer, E.1
  • 38
    • 84860019349 scopus 로고    scopus 로고
    • U.S. government calls for enforced patches
    • Middleton, J. 2001. U.S. government calls for enforced patches. VNUnet (December), http://www.vnunet.com/.
    • (2001) VNUnet , Issue.DECEMBER
    • Middleton, J.1
  • 39
    • 84860017722 scopus 로고    scopus 로고
    • Regulation, bad software, new threats fodder for Congress
    • Mimoso, M. 2003. Regulation, bad software, new threats fodder for Congress. Search Security (September), http://www. searchsecurity.com/.
    • (2003) Search Security , Issue.SEPTEMBER
    • Mimoso, M.1
  • 43
    • 84860020855 scopus 로고    scopus 로고
    • Network security tactics. Step-by-step guide: How to deploy a successful patch
    • Nicastro, F. 2005. Network security tactics. Step-by-step guide: How to deploy a successful patch. Searchsecurity (September), http://www. searchsecurity.techtarget.com/.
    • (2005) Searchsecurity , Issue.SEPTEMBER
    • Nicastro, F.1
  • 44
    • 33645402013 scopus 로고    scopus 로고
    • Emerging technology: Patch me if you can!
    • Schweitzer, D. 2003. Emerging technology: Patch me if you can! Network-Magazine (August), http://www.network-magazine. com/.
    • (2003) Network-magazine , Issue.AUGUST
    • Schweitzer, D.1
  • 45
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the witty worm
    • Shannon, C, D. Moore. 2004. The spread of the witty worm. IEEE Security Privacy 2(4) 46-50.
    • (2004) IEEE Security Privacy , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 47
    • 33750712168 scopus 로고    scopus 로고
    • Symantec. Symantec Corporation, Cupertino, CA
    • Symantec. 2004. Automating patch management. Symantec Corporation, Cupertino, CA.
    • (2004) Automating Patch Management
  • 49
    • 84881301125 scopus 로고    scopus 로고
    • US-CERT 2004. U.S. Department of Homeland Security, Washington, D.C.
    • US-CERT 2004. US-CERT vulnerability notes database. U.S. Department of Homeland Security, Washington, D.C., http://www. kb.cert.org/vuls/.
    • US-CERT Vulnerability Notes Database
  • 50
    • 33750715221 scopus 로고    scopus 로고
    • Working paper, University of California, Berkeley, CA
    • Varian, H. 2004. System reliability and free riding. Working paper, University of California, Berkeley, CA.
    • (2004) System Reliability and Free Riding
    • Varian, H.1
  • 52
    • 33750696774 scopus 로고    scopus 로고
    • Attack takes down Yahoo for three hours
    • Williams, M. 2000. Attack takes down Yahoo for three hours. IDG News Service (February).
    • (2000) IDG News Service , Issue.FEBRUARY
    • Williams, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.