-
1
-
-
33846638224
-
-
Arora, A., Telang, R., Xu, H., 2004a. Optimal Policy for Software Vulnerability Disclosure, Working paper, Carnegie Mellon University.
-
-
-
-
2
-
-
33846586354
-
-
Arora, A., Krishnan, R., Nandkumar, A., Telang, R., Yang, Y., 2004b. Impact of Vulnerability Disclosure and Patch Availability - an Empirical Analysis. In: Third Workshop on the Economics of Information Security, Minneapolis. MN.
-
-
-
-
3
-
-
33644916146
-
Research note - sell first, fix later: impact of patching on software quality
-
Arora A., Caulkins J.P., and Telang R. Research note - sell first, fix later: impact of patching on software quality. Management Science 52 3 (2005) 465-471
-
(2005)
Management Science
, vol.52
, Issue.3
, pp. 465-471
-
-
Arora, A.1
Caulkins, J.P.2
Telang, R.3
-
4
-
-
33846597907
-
-
Bank, D., 2004. MyDoom worm renews debate on cyber-ethics, The Wall Street Journal, November 11, 2004.
-
-
-
-
5
-
-
78249276668
-
-
Beattie, S., Arnold, S., Cowan, C., Wagle, P., Wright, C., Shostack, A., 2002. Timing the Application of Security Patches for Optimal Uptime. In: Proceedings of LISA 2002: Sixteenth Systems Administration Conference.
-
-
-
-
6
-
-
33846633622
-
-
Camp, L.J., 2006. Economics of Information Security, SSRN Working Paper. Available from: .
-
-
-
-
8
-
-
33846636769
-
-
Cavusoglu, H., Cavusoglu, H., Raghunathan, S., 2004. How Should We Disclose Software Vulnerabilities? Workshop on Information Technology and Systems (WITS), Washington, DC, December 2004.
-
-
-
-
9
-
-
33846607234
-
-
Choi, J.P., Fershtman, C., Gandal, N., 2005. Internet Security, Vulnerability Disclosure, and Software Provision, Fourth Workshop on the Economics of Information Security (WEIS), Cambridge, MA, June 2005.
-
-
-
-
10
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or E., and Ghose A. The economic incentives for sharing security information. Information Systems Research 16 2 (2005) 186-208
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
12
-
-
33846605004
-
-
Gordon, L.A., Loeb, M., Lucyshyn, W., Richardson, R., 2005. 2005 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.
-
-
-
-
13
-
-
33846570841
-
-
Granick, J.S., 2005. The price of restricting vulnerability publications, International Journal of Communications Law and Policy Special Issue on Cybercrime, Spring, 2005, pp. 1-35.
-
-
-
-
14
-
-
33846648411
-
-
Harsanyi, J.C., 1967-1968. Games with incomplete information played by 'Bayesian' players, Parts I, II, and III, Management Science 14, pp. 159-182, 320-324, and 486-502.
-
-
-
-
15
-
-
4243442002
-
Managerial incentive problems: a dynamic perspective
-
Holmstrom B. Managerial incentive problems: a dynamic perspective. Review of Economic Studies 66 (1999) 169-182
-
(1999)
Review of Economic Studies
, vol.66
, pp. 169-182
-
-
Holmstrom, B.1
-
16
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
Kannan K., and Telang R. Market for software vulnerabilities? Think again. Management Science 51 5 (2005) 726-740
-
(2005)
Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
17
-
-
33846578181
-
-
Kenneally, E., 2001. Stepping on the Digital Scale: Duty and Liability for Negligent Internet Security, login: The Magazine of USENIX and SAGE, 26(8), pp. 62-77. Available from: .
-
-
-
-
18
-
-
33846600341
-
-
Lasser, J., 2002. Irresponsible disclosure, Security Focus, June 26, 2002.
-
-
-
-
19
-
-
33846584486
-
-
Lee, J., 2001a. Man Denies Digital Piracy in First Case Under '98 Act, The New York Times, August 31, 2001.
-
-
-
-
20
-
-
33846566720
-
-
Lee, J., 2001b. In Digital Copyright Case, Programmer Can Go Home, The New York Times, December 14, 2001.
-
-
-
-
21
-
-
33846604111
-
-
Lemos, R., 2006. Security Flaws on the Rise, Questions Remain, SecurityFocus, January 5, 2006. Available from: .
-
-
-
-
23
-
-
33846618637
-
-
Meunier, P., 2006. Reporting Vulnerabilities is for the Brave, CERIAS Weblogs, May 22, 2006. Available from: .
-
-
-
-
25
-
-
33846626338
-
-
Ozment, A., 2004. Bug Auctions: Vulnerability Markets Reconsidered, Third Workshop on the Economics of Information Security.
-
-
-
-
26
-
-
33846606253
-
-
Pavlicek, R., 2002. DMCA Horror Show, InfoWorld, October 19, 2002.
-
-
-
-
27
-
-
33846572260
-
-
Pond, W., 2000. Do Security Holes Demand Full Disclosure? eWeek, August 16, 2000.
-
-
-
-
28
-
-
33846601746
-
-
Poulsen, K., 2003. Super-DMCA' Fears Suppress Security Research, SecurityFocus, April 14, 2003. Available from: .
-
-
-
-
29
-
-
14744268697
-
Computer security publications: information economics, shifting liability and the first amendment
-
Preston E., and Lofton J. Computer security publications: information economics, shifting liability and the first amendment. Whittier Law Review 24 (2002) 71-142
-
(2002)
Whittier Law Review
, vol.24
, pp. 71-142
-
-
Preston, E.1
Lofton, J.2
-
30
-
-
33846634547
-
-
Raikow, D., 2000. Bug Fixes Have No Profit Margin, eWeek, October 19, 2000.
-
-
-
-
31
-
-
33846614478
-
-
Rauch, J., 1999, Full Disclosure: The Future of Vulnerability Disclosure? Login: The Magazine of USENIX and SAGE, Special Issue on Security, November 1999. Available from .
-
-
-
-
32
-
-
33846616753
-
-
Schneier, B., 2000. Full Disclosure and the Window of Exposure," CRYPTO-GRAM, September 15, 2000. Counterpane Internet Security, Inc. Available from: .
-
-
-
-
33
-
-
33846627219
-
-
Telang, R., Wattal, S., 2005. Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation, Fourth Workshop on the Economics of Information Security (WEIS), Cambridge, MA, June 2005.
-
-
-
|