메뉴 건너뛰기




Volumn 14, Issue 2, 2009, Pages 7-40

An economic analysis of the software market with a risk-sharing mechanism

Author keywords

Economics of IS; Information asymmetry; Security policies; Software liability; Software security

Indexed keywords


EID: 72449167415     PISSN: 10864415     EISSN: None     Source Type: Journal    
DOI: 10.2753/JEC1086-4415140201     Document Type: Article
Times cited : (17)

References (39)
  • 1
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard - An economic perspective
    • Los Alamitos, CA: IEEE Computer Society
    • Anderson, R. Why information security is hard-An economic perspective. In Proceedings of 17th Annual Computer Security Applications Conference. Los Alamitos, CA: IEEE Computer Society, 2001, pp. 358-365.
    • (2001) Proceedings of 17th Annual Computer Security Applications Conference , pp. 358-365
    • Anderson, R.1
  • 2
    • 33644916146 scopus 로고    scopus 로고
    • Sell first, fix later: Impact of patching on software quality
    • Arora, A.; Calkins, J.; and Telang, R. Sell first, fix later: Impact of patching on software quality. Management Science, 52, 3 (2006), 465-471.
    • (2006) Management Science , vol.52 , Issue.3 , pp. 465-471
    • Arora, A.1    Calkins, J.2    Telang, R.3
  • 3
    • 61849175198 scopus 로고    scopus 로고
    • Optimal policy for software vulnerability disclosure
    • Arora, A.; Telang, R.; and Xu, H. Optimal policy for software vulnerability disclosure. Management Science, 54, 4 (2007), 642-656.
    • (2007) Management Science , vol.54 , Issue.4 , pp. 642-656
    • Arora, A.1    Telang, R.2    Xu, H.3
  • 4
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • August, T., and Tunca, T. Network software security and user incentives. Management Science, 52, 11 (2006), 1703-1720.
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.2
  • 5
    • 61349202831 scopus 로고    scopus 로고
    • Let the pirates patch? An economic analysis of software security patch restrictions
    • August, T., and Tunca. T. Let the pirates patch? An economic analysis of software security patch restrictions. Information Systems Research, 19, 1 (2008), 48-70.
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 48-70
    • August, T.1    Tunca, T.2
  • 6
    • 0001309797 scopus 로고
    • Weak invisible hand theorems on the sustainability of multiproduct natural monopoly
    • Baumol, W.; Bailey, E.; and Willig, R. Weak invisible hand theorems on the sustainability of multiproduct natural monopoly. American Economic Review, 67, 3 (1977), 350-365.
    • (1977) American Economic Review , vol.67 , Issue.3 , pp. 350-365
    • Baumol, W.1    Bailey, E.2    Willig, R.3
  • 8
    • 61849135265 scopus 로고    scopus 로고
    • Security patch management: Share the burden or share the damage
    • Cavusoglu, H.; Cavusoglu, H.; and Zhang, J. Security patch management: Share the burden or share the damage. Management Science, 54, 4 (2008), 657-670.
    • (2008) Management Science , vol.54 , Issue.4 , pp. 657-670
    • Cavusoglu, H.1    Cavusoglu, H.2    Zhang, J.3
  • 9
    • 7444242205 scopus 로고    scopus 로고
    • The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers
    • Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce, 9, 1 (2004), 69-104.
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 69-104
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 10
    • 66549093519 scopus 로고    scopus 로고
    • Decision-theoretic and game-theoretic approaches to IT security investment
    • Cavusoglu, H.; Raghunathan, S.; and Yue, W. Decision-theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems, 25, 2 (2008), 281-304.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 281-304
    • Cavusoglu, H.1    Raghunathan, S.2    Yue, W.3
  • 11
    • 39749171832 scopus 로고    scopus 로고
    • An economic model of privacy: A property rights approach to regulatory choices for online personalization
    • winter
    • Chellappa, R., and Shivendu, S. An economic model of privacy: A property rights approach to regulatory choices for online personalization. Journal of Management Information Systems, 24, 3 (winter 2007-2008), 193-225.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.3 , pp. 193-225
    • Chellappa, R.1    Shivendu, S.2
  • 12
    • 33645785886 scopus 로고    scopus 로고
    • Internet privacy concerns and social awareness as determinants of intention to transact
    • winter
    • Dinev, T., and Hart, P. Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10, 2 (winter 2005-2006), 7-29.
    • (2005) International Journal of Electronic Commerce , vol.10 , Issue.2 , pp. 7-29
    • Dinev, T.1    Hart, P.2
  • 13
    • 33745625086 scopus 로고    scopus 로고
    • Two-sided competition of proprietary vs. open implications for the software industry
    • Economides, N., and Katsamakas, E. Two-sided competition of proprietary vs. open implications for the software industry. Management Science, 52, 7 (2006), 1057-1071.
    • (2006) Management Science , vol.52 , Issue.7 , pp. 1057-1071
    • Economides, N.1    Katsamakas, E.2
  • 15
    • 61849090657 scopus 로고    scopus 로고
    • Contracts getting tough on security
    • April 15
    • Fisher, D. Contracts getting tough on security. eWeek, April 15, 2002, 1-2.
    • (2002) EWeek , pp. 1-2
    • Fisher, D.1
  • 16
    • 79960122923 scopus 로고    scopus 로고
    • Causes and remedies for social acceptance of network insecurity
    • University of California, Berkeley, May
    • Fisk, M. Causes and remedies for social acceptance of network insecurity. Workshop on Economics and Information Security, University of California, Berkeley, May 16-17, 2002.
    • (2002) Workshop on Economics and Information Security , pp. 16-17
    • Fisk, M.1
  • 18
    • 3042780586 scopus 로고    scopus 로고
    • Two views on security software liability: Using the right legal tools
    • Heckman, C. Two views on security software liability: Using the right legal tools. IEEE Security & Privacy, 1, 1 (2003) 73-75.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 73-75
    • Heckman, C.1
  • 20
    • 20944441343 scopus 로고    scopus 로고
    • Market for software vulnerabilities? Think again
    • Kannan, K., and Telang, R. Market for software vulnerabilities? Think again. Management Science, 51, 5 (2005), 726-740.
    • (2005) Management Science , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 23
    • 49349126835 scopus 로고
    • Monopoly and product quality
    • Mussa, M., and Rosen, S. Monopoly and product quality. Journal of Economic Theory, 18, 2 (1978), 301-317.
    • (1978) Journal of Economic Theory , vol.18 , Issue.2 , pp. 301-317
    • Mussa, M.1    Rosen, S.2
  • 27
    • 0001294457 scopus 로고
    • Minimum quality standards, fixed costs, and competition
    • Ronnen, U. Minimum quality standards, fixed costs, and competition. RAND Journal of Economics, 22, 4 (1991), 490-504.
    • (1991) RAND Journal of Economics , vol.22 , Issue.4 , pp. 490-504
    • Ronnen, U.1
  • 28
    • 3042744350 scopus 로고    scopus 로고
    • Two views on security software liability: Let the legal system decide
    • Ryan, D. Two views on security software liability: Let the legal system decide. IEEE Security & Privacy, 1, 1 (2003), 70-72.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 70-72
    • Ryan, D.1
  • 29
    • 84869736548 scopus 로고    scopus 로고
    • October 28
    • Schneier, B. Information security: How liable should vendors be? Computer World (October 28, 2004), www.computerworld.com/s/article/96948/ Information-security-How-liable-should-vendors-be-?taxonomyId=017& SKC=security-96948.
    • Information Security: How Liable Should Vendors Be? , pp. 2004
    • Schneier, B.1
  • 30
    • 84869734809 scopus 로고    scopus 로고
    • Information Security .November
    • Schneier, B. Do federal security regulations help? Information Security (November 2006), http://searchsecurity.techtarget.com/magazineFeature/ 0,296894,sid14-gci1256971,00.html.
    • (2006) Do Federal Security Regulations Help?
    • Schneier, B.1
  • 31
    • 53049103906 scopus 로고    scopus 로고
    • Five dimensions of information security awareness
    • Siponen, M. Five dimensions of information security awareness. ACM SIG CAS Computers and Society, 31, 2 (2001), 24-29.
    • (2001) ACM SIG CAS Computers and Society , vol.31 , Issue.2 , pp. 24-29
    • Siponen, M.1
  • 32
    • 84873321089 scopus 로고
    • Monopoly quality, and regulation
    • Spence, M. Monopoly, quality, and regulation. Bell Journal of Economics, 6, 2 (1975), 417-429.
    • (1975) Bell Journal of Economics , vol.6 , Issue.2 , pp. 417-429
    • Spence, M.1
  • 33
    • 84959825935 scopus 로고
    • Consumer misperceptions, product failure and producer liability
    • Spence, M. Consumer misperceptions, product failure and producer liability. Review of Economic Studies, 44, 3 (1977), 561-572.
    • (1977) Review of Economic Studies , vol.44 , Issue.3 , pp. 561-572
    • Spence, M.1
  • 34
    • 11844255411 scopus 로고    scopus 로고
    • Nonlinear pricing of information goods
    • Sundararajan, A. Nonlinear pricing of information goods. Management Science, 50, 12 (2004), 1660-1673.
    • (2004) Management Science , vol.50 , Issue.12 , pp. 1660-1673
    • Sundararajan, A.1
  • 35
    • 44249111255 scopus 로고    scopus 로고
    • Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor
    • Tang, Z.; Hu, Y.; and Smith, M. Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor. Journal of Management Information Systems, 24, 4 (2008), 153-173.
    • (2008) Journal of Management Information Systems , vol.24 , Issue.4 , pp. 153-173
    • Tang, Z.1    Hu, Y.2    Smith, M.3
  • 36
    • 34547100991 scopus 로고    scopus 로고
    • An empirical analysis of the impact of software vulnerability announcements on firm stock price
    • Telang, R., and Wattal, S. An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering, 33, 8 (2007), 544-557.
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.8 , pp. 544-557
    • Telang, R.1    Wattal, S.2
  • 39
    • 0242622210 scopus 로고    scopus 로고
    • Remarks delivered as the Mattioli Lecture Bocconi University Milan November
    • Varian, H.R. Economics of information technology. Remarks delivered as the Mattioli Lecture, Bocconi University, Milan, November 2001.
    • (2001) Economics of Information Technology
    • Varian, H.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.