메뉴 건너뛰기




Volumn 19, Issue 1, 2007, Pages 43-64

To disclose or not? An analysis of software user behavior

Author keywords

Economics of information security; Open source; Patching; Software vulnerabilities; Vulnerability disclosure

Indexed keywords

DECISION THEORY; GAME THEORY; SECURITY OF DATA;

EID: 33846588487     PISSN: 01676245     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infoecopol.2006.10.001     Document Type: Article
Times cited : (25)

References (33)
  • 1
    • 33846638224 scopus 로고    scopus 로고
    • Arora, A., Telang, R., Xu, H., 2004a. Optimal Policy for Software Vulnerability Disclosure, Working paper, Carnegie Mellon University.
  • 2
    • 33846586354 scopus 로고    scopus 로고
    • Arora, A., Krishnan, R., Nandkumar, A., Telang, R., Yang, Y., 2004b. Impact of Vulnerability Disclosure and Patch Availability - an Empirical Analysis. In: Third Workshop on the Economics of Information Security, Minneapolis. MN.
  • 3
    • 33644916146 scopus 로고    scopus 로고
    • Research note - sell first, fix later: impact of patching on software quality
    • Arora A., Caulkins J.P., and Telang R. Research note - sell first, fix later: impact of patching on software quality. Management Science 52 3 (2005) 465-471
    • (2005) Management Science , vol.52 , Issue.3 , pp. 465-471
    • Arora, A.1    Caulkins, J.P.2    Telang, R.3
  • 4
    • 33846597907 scopus 로고    scopus 로고
    • Bank, D., 2004. MyDoom worm renews debate on cyber-ethics, The Wall Street Journal, November 11, 2004.
  • 5
    • 78249276668 scopus 로고    scopus 로고
    • Beattie, S., Arnold, S., Cowan, C., Wagle, P., Wright, C., Shostack, A., 2002. Timing the Application of Security Patches for Optimal Uptime. In: Proceedings of LISA 2002: Sixteenth Systems Administration Conference.
  • 6
    • 33846633622 scopus 로고    scopus 로고
    • Camp, L.J., 2006. Economics of Information Security, SSRN Working Paper. Available from: .
  • 8
    • 33846636769 scopus 로고    scopus 로고
    • Cavusoglu, H., Cavusoglu, H., Raghunathan, S., 2004. How Should We Disclose Software Vulnerabilities? Workshop on Information Technology and Systems (WITS), Washington, DC, December 2004.
  • 9
    • 33846607234 scopus 로고    scopus 로고
    • Choi, J.P., Fershtman, C., Gandal, N., 2005. Internet Security, Vulnerability Disclosure, and Software Provision, Fourth Workshop on the Economics of Information Security (WEIS), Cambridge, MA, June 2005.
  • 10
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or E., and Ghose A. The economic incentives for sharing security information. Information Systems Research 16 2 (2005) 186-208
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 11
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer system security: an economic analysis
    • Gordon A.L., Loeb M., and Lucyshyn W. Sharing information on computer system security: an economic analysis. Journal of Accounting and Public Policy 22 6 (2003) 461-485
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, A.L.1    Loeb, M.2    Lucyshyn, W.3
  • 12
    • 33846605004 scopus 로고    scopus 로고
    • Gordon, L.A., Loeb, M., Lucyshyn, W., Richardson, R., 2005. 2005 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.
  • 13
    • 33846570841 scopus 로고    scopus 로고
    • Granick, J.S., 2005. The price of restricting vulnerability publications, International Journal of Communications Law and Policy Special Issue on Cybercrime, Spring, 2005, pp. 1-35.
  • 14
    • 33846648411 scopus 로고    scopus 로고
    • Harsanyi, J.C., 1967-1968. Games with incomplete information played by 'Bayesian' players, Parts I, II, and III, Management Science 14, pp. 159-182, 320-324, and 486-502.
  • 15
    • 4243442002 scopus 로고    scopus 로고
    • Managerial incentive problems: a dynamic perspective
    • Holmstrom B. Managerial incentive problems: a dynamic perspective. Review of Economic Studies 66 (1999) 169-182
    • (1999) Review of Economic Studies , vol.66 , pp. 169-182
    • Holmstrom, B.1
  • 16
    • 20944441343 scopus 로고    scopus 로고
    • Market for software vulnerabilities? Think again
    • Kannan K., and Telang R. Market for software vulnerabilities? Think again. Management Science 51 5 (2005) 726-740
    • (2005) Management Science , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 17
    • 33846578181 scopus 로고    scopus 로고
    • Kenneally, E., 2001. Stepping on the Digital Scale: Duty and Liability for Negligent Internet Security, login: The Magazine of USENIX and SAGE, 26(8), pp. 62-77. Available from: .
  • 18
    • 33846600341 scopus 로고    scopus 로고
    • Lasser, J., 2002. Irresponsible disclosure, Security Focus, June 26, 2002.
  • 19
    • 33846584486 scopus 로고    scopus 로고
    • Lee, J., 2001a. Man Denies Digital Piracy in First Case Under '98 Act, The New York Times, August 31, 2001.
  • 20
    • 33846566720 scopus 로고    scopus 로고
    • Lee, J., 2001b. In Digital Copyright Case, Programmer Can Go Home, The New York Times, December 14, 2001.
  • 21
    • 33846604111 scopus 로고    scopus 로고
    • Lemos, R., 2006. Security Flaws on the Rise, Questions Remain, SecurityFocus, January 5, 2006. Available from: .
  • 23
    • 33846618637 scopus 로고    scopus 로고
    • Meunier, P., 2006. Reporting Vulnerabilities is for the Brave, CERIAS Weblogs, May 22, 2006. Available from: .
  • 25
    • 33846626338 scopus 로고    scopus 로고
    • Ozment, A., 2004. Bug Auctions: Vulnerability Markets Reconsidered, Third Workshop on the Economics of Information Security.
  • 26
    • 33846606253 scopus 로고    scopus 로고
    • Pavlicek, R., 2002. DMCA Horror Show, InfoWorld, October 19, 2002.
  • 27
    • 33846572260 scopus 로고    scopus 로고
    • Pond, W., 2000. Do Security Holes Demand Full Disclosure? eWeek, August 16, 2000.
  • 28
    • 33846601746 scopus 로고    scopus 로고
    • Poulsen, K., 2003. Super-DMCA' Fears Suppress Security Research, SecurityFocus, April 14, 2003. Available from: .
  • 29
    • 14744268697 scopus 로고    scopus 로고
    • Computer security publications: information economics, shifting liability and the first amendment
    • Preston E., and Lofton J. Computer security publications: information economics, shifting liability and the first amendment. Whittier Law Review 24 (2002) 71-142
    • (2002) Whittier Law Review , vol.24 , pp. 71-142
    • Preston, E.1    Lofton, J.2
  • 30
    • 33846634547 scopus 로고    scopus 로고
    • Raikow, D., 2000. Bug Fixes Have No Profit Margin, eWeek, October 19, 2000.
  • 31
    • 33846614478 scopus 로고    scopus 로고
    • Rauch, J., 1999, Full Disclosure: The Future of Vulnerability Disclosure? Login: The Magazine of USENIX and SAGE, Special Issue on Security, November 1999. Available from .
  • 32
    • 33846616753 scopus 로고    scopus 로고
    • Schneier, B., 2000. Full Disclosure and the Window of Exposure," CRYPTO-GRAM, September 15, 2000. Counterpane Internet Security, Inc. Available from: .
  • 33
    • 33846627219 scopus 로고    scopus 로고
    • Telang, R., Wattal, S., 2005. Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation, Fourth Workshop on the Economics of Information Security (WEIS), Cambridge, MA, June 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.