메뉴 건너뛰기




Volumn 54, Issue 4, 2008, Pages 657-670

Security patch management: Share the burden or share the damage?

Author keywords

Coordination schemes; Cost sharing; Information technology security; Liability; Patch management

Indexed keywords

COORDINATION SCHEMES; COST SHARING; INFORMATION TECHNOLOGY SECURITY; LIABILITY; PATCH MANAGEMENT;

EID: 61849135265     PISSN: 00251909     EISSN: 15265501     Source Type: Journal    
DOI: 10.1287/mnsc.1070.0794     Document Type: Article
Times cited : (125)

References (42)
  • 1
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard: An economic perspective
    • IEEE Computer Society, Washington, D.C
    • Anderson, R. 2001. Why information security is hard: An economic perspective. Proc. 17th Annual Comput. Security Appl. Conf., IEEE Computer Society, Washington, D.C., 358-365.
    • (2001) Proc. 17th Annual Comput. Security Appl. Conf , pp. 358-365
    • Anderson, R.1
  • 3
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • August, T., T. I. Tunca. 2006. Network software security and user incentives. Management Sci. 52(11) 1703-1720.
    • (2006) Management Sci , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 4
    • 61349202831 scopus 로고    scopus 로고
    • Let the pirates patch? An economic analysis of network software security patch restrictions
    • Forthcoming
    • August, T., T. I. Tunca. 2008. Let the pirates patch? An economic analysis of network software security patch restrictions. Inform. Systems Res. Forthcoming.
    • (2008) Inform. Systems Res
    • August, T.1    Tunca, T.I.2
  • 6
    • 12344312471 scopus 로고    scopus 로고
    • A general equilibrium model for industries with price and service competition
    • Bernstein, F., A. Federgruen. 2004. A general equilibrium model for industries with price and service competition. Oper. Res. 52(6) 868-886.
    • (2004) Oper. Res , vol.52 , Issue.6 , pp. 868-886
    • Bernstein, F.1    Federgruen, A.2
  • 8
    • 0032677415 scopus 로고    scopus 로고
    • Competitive and cooperative inventory policies in a two-stage supply chain
    • Cachon, G. P., P. H. Zipkin. 1999. Competitive and cooperative inventory policies in a two-stage supply chain. Management Sci. 45(7) 936-953.
    • (1999) Management Sci , vol.45 , Issue.7 , pp. 936-953
    • Cachon, G.P.1    Zipkin, P.H.2
  • 9
    • 33947373662 scopus 로고    scopus 로고
    • Economics of IT security management: Four improvements to current security practices
    • Cavusoglu, H., H. Cavusoglu, S. Raghunathan. 2004a. Economics of IT security management: Four improvements to current security practices. Comm. AIS 14 65-75.
    • (2004) Comm. AIS , vol.14 , pp. 65-75
    • Cavusoglu, H.1    Cavusoglu, H.2    Raghunathan, S.3
  • 10
    • 33947376004 scopus 로고    scopus 로고
    • Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
    • Cavusoglu, H., H. Cavusoglu, S. Raghunathan. 2007. Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Trans. Software Engrg. 33(3) 171-185.
    • (2007) IEEE Trans. Software Engrg , vol.33 , Issue.3 , pp. 171-185
    • Cavusoglu, H.1    Cavusoglu, H.2    Raghunathan, S.3
  • 11
    • 7444242205 scopus 로고    scopus 로고
    • The effect of Internet security breach announcements on market value: Capital market reaction for breached firms and Internet security developers
    • Cavusoglu, H., B. Mishra, S. Raghunathan. 2004b. The effect of Internet security breach announcements on market value: Capital market reaction for breached firms and Internet security developers. Internat. J. Electronic Commerce 9(4) 69-105.
    • (2004) Internat. J. Electronic Commerce , vol.9 , Issue.4 , pp. 69-105
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 13
    • 61849150288 scopus 로고    scopus 로고
    • Dacey, R. F. 2003. Effective patch management is critical to mitigating software vulnerabilities. GAO-03-1138T. United States General Accounting Office, Washington, D.C.
    • Dacey, R. F. 2003. Effective patch management is critical to mitigating software vulnerabilities. GAO-03-1138T. United States General Accounting Office, Washington, D.C.
  • 14
    • 61849136535 scopus 로고    scopus 로고
    • Automatic patching-Boon or bane?
    • Davidson, M. A. 2003. Automatic patching-Boon or bane? Sec. Bus. Quart. 3(2) 1-4.
    • (2003) Sec. Bus. Quart , vol.3 , Issue.2 , pp. 1-4
    • Davidson, M.A.1
  • 15
    • 61849085585 scopus 로고    scopus 로고
    • Patch management-Bits, bad guys, and bucks!
    • Donner, M. 2003. Patch management-Bits, bad guys, and bucks! Sec. Bus. Quart. 3(2) 1-4.
    • (2003) Sec. Bus. Quart , vol.3 , Issue.2 , pp. 1-4
    • Donner, M.1
  • 16
    • 61849100277 scopus 로고    scopus 로고
    • Farber, D. 2003. Should Microsoft pay for your security patch costs? Tech Update (January 30). http://techupdate.zdnet.com/techupdate/stories/ main/0,14179,2909857,00.html.
    • Farber, D. 2003. Should Microsoft pay for your security patch costs? Tech Update (January 30). http://techupdate.zdnet.com/techupdate/stories/ main/0,14179,2909857,00.html.
  • 17
    • 61849090657 scopus 로고    scopus 로고
    • Contracts getting tough on security
    • Fisher, D. 2002. Contracts getting tough on security. eWeek (April 15) 1-2.
    • (2002) eWeek (April 15) , pp. 1-2
    • Fisher, D.1
  • 19
  • 20
    • 61849093515 scopus 로고    scopus 로고
    • Patching: Process matters
    • Fontana, J. 2003. Patching: Process matters. Network World 20(48) 50-52.
    • (2003) Network World , vol.20 , Issue.48 , pp. 50-52
    • Fontana, J.1
  • 23
    • 20944441343 scopus 로고    scopus 로고
    • Market for vulnerabilities? Think again
    • Kannan, K., R. Telang. 2004. Market for vulnerabilities? Think again. Management Sci. 51(5) 726-740.
    • (2004) Management Sci , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 26
    • 4344628821 scopus 로고    scopus 로고
    • Converting technology to mitigate environmental damage
    • Levi, M., B. Nault. 2004. Converting technology to mitigate environmental damage. Management Sci. 50(8) 1015-1030.
    • (2004) Management Sci , vol.50 , Issue.8 , pp. 1015-1030
    • Levi, M.1    Nault, B.2
  • 27
    • 24344497787 scopus 로고    scopus 로고
    • Software patch management-The new frontier
    • McGhie, L. 2003. Software patch management-The new frontier. Sec. Bus. Quart. 3(2) 1-4.
    • (2003) Sec. Bus. Quart , vol.3 , Issue.2 , pp. 1-4
    • McGhie, L.1
  • 28
    • 84868891507 scopus 로고    scopus 로고
    • Microsoft TechNet
    • Microsoft. 2005. Security tools. Microsoft TechNet. http//www.microsoft. com/technet/security.
    • (2005) Security tools
  • 29
    • 84868900590 scopus 로고    scopus 로고
    • Security patch deluge: A double-edged sword
    • Naraine, R. 2005. Security patch deluge: A double-edged sword. eWeek (July 14). http://www.eweek.com/c/a/Security/Security-Patch-Deluge- A-DoubleEdged-Sword/.
    • (2005) eWeek (July 14)
    • Naraine, R.1
  • 30
    • 61849151675 scopus 로고    scopus 로고
    • NetSupport Solutions. 2003. Beating hackers to the patch. http://www.secinf.net.
    • NetSupport Solutions. 2003. Beating hackers to the patch. http://www.secinf.net.
  • 33
    • 61849085586 scopus 로고    scopus 로고
    • Pruitt, S. 2003. Software users hit a rough patch. PC World (November 10). http://www.pcworld.com/article/id,113296-page,1/article.html.
    • Pruitt, S. 2003. Software users hit a rough patch. PC World (November 10). http://www.pcworld.com/article/id,113296-page,1/article.html.
  • 35
    • 20944436854 scopus 로고    scopus 로고
    • How to buy better testing: Using competition to get the most security and robustness for your dollar
    • Bristol, UK
    • Schechter, S. 2002. How to buy better testing: Using competition to get the most security and robustness for your dollar. Proc. Infrastructure Security Conf., Bristol, UK, 78-87.
    • (2002) Proc. Infrastructure Security Conf , pp. 78-87
    • Schechter, S.1
  • 36
    • 61849111530 scopus 로고    scopus 로고
    • Schneier, B. 2004. Information security: How liable should vendors be? Computer World (October 28). http://www.computerworld.com/securitytopics/ security/story/0,,96948,00.html?SKC=security-96948.
    • Schneier, B. 2004. Information security: How liable should vendors be? Computer World (October 28). http://www.computerworld.com/securitytopics/ security/story/0,,96948,00.html?SKC=security-96948.
  • 37
    • 84868902823 scopus 로고    scopus 로고
    • Quickest patch ever
    • September 7
    • Schneier, B. 2006. Quickest patch ever. Wired (September 7). http://www.wired.com/politics/security/commentary/securitymatters/2006/09/71738.
    • (2006) Wired
    • Schneier, B.1
  • 38
    • 84868902407 scopus 로고    scopus 로고
    • Painless (well, almost) patch management procedures
    • April 1
    • Shipley, G. 2004. Painless (well, almost) patch management procedures. Network Comput. (April 1). http://www.networkcomputing. com/showitem.jhtml?docid=1506f1.
    • (2004) Network Comput
    • Shipley, G.1
  • 39
    • 49649107819 scopus 로고    scopus 로고
    • Quantifying patch management
    • Shostack, A. 2003. Quantifying patch management. Sec. Bus. Quart. 3(2) 1-4.
    • (2003) Sec. Bus. Quart , vol.3 , Issue.2 , pp. 1-4
    • Shostack, A.1
  • 40
    • 69149101277 scopus 로고    scopus 로고
    • Patch management is about process, not just technology
    • December 2
    • Travis, L. 2003. Patch management is about process, not just technology. AMR Res. (December 2). http://www.amrresearch.com/Content/View.asp? pmillid=16832.
    • (2003) AMR Res
    • Travis, L.1
  • 41
    • 84868901245 scopus 로고    scopus 로고
    • Practical patch management
    • October 21
    • Ulfelder, S. 2002. Practical patch management. Network World Fusion. (October 21) http://www.networkworld.com/supp/security2/patch.html.
    • (2002) Network World Fusion
    • Ulfelder, S.1
  • 42
    • 33747177064 scopus 로고    scopus 로고
    • Competition, cooperation and information sharing in a two-echelon assembly system
    • Zhang, F. 2006. Competition, cooperation and information sharing in a two-echelon assembly system. Manufacturing Service Oper. Management 8(3) 273-291.
    • (2006) Manufacturing Service Oper. Management , vol.8 , Issue.3 , pp. 273-291
    • Zhang, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.