-
1
-
-
84925838576
-
Why information security is hard - An economic perspective
-
Los Alamitos, CA: IEEE Computer Society
-
Anderson, R. Why information security is hard-An economic perspective. In Proceedings of 17th Annual Computer Security Applications Conference. Los Alamitos, CA: IEEE Computer Society, 2001, pp. 358-365.
-
(2001)
Proceedings of 17th Annual Computer Security Applications Conference
, pp. 358-365
-
-
Anderson, R.1
-
2
-
-
33644916146
-
Sell first, fix later: Impact of patching on software quality
-
Arora, A.; Calkins, J.; and Telang, R. Sell first, fix later: Impact of patching on software quality. Management Science, 52, 3 (2006), 465-471.
-
(2006)
Management Science
, vol.52
, Issue.3
, pp. 465-471
-
-
Arora, A.1
Calkins, J.2
Telang, R.3
-
3
-
-
61849175198
-
Optimal policy for software vulnerability disclosure
-
Arora, A.; Telang, R.; and Xu, H. Optimal policy for software vulnerability disclosure. Management Science, 54, 4 (2007), 642-656.
-
(2007)
Management Science
, vol.54
, Issue.4
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
4
-
-
33750703619
-
Network software security and user incentives
-
August, T., and Tunca, T. Network software security and user incentives. Management Science, 52, 11 (2006), 1703-1720.
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.2
-
5
-
-
61349202831
-
Let the pirates patch? An economic analysis of software security patch restrictions
-
August, T., and Tunca. T. Let the pirates patch? An economic analysis of software security patch restrictions. Information Systems Research, 19, 1 (2008), 48-70.
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 48-70
-
-
August, T.1
Tunca, T.2
-
6
-
-
0001309797
-
Weak invisible hand theorems on the sustainability of multiproduct natural monopoly
-
Baumol, W.; Bailey, E.; and Willig, R. Weak invisible hand theorems on the sustainability of multiproduct natural monopoly. American Economic Review, 67, 3 (1977), 350-365.
-
(1977)
American Economic Review
, vol.67
, Issue.3
, pp. 350-365
-
-
Baumol, W.1
Bailey, E.2
Willig, R.3
-
7
-
-
42649122624
-
A privacy-protecting business-analytics service for on-line transactions
-
Berendt, B.; Preibusch, S.; and Teltzrow, M. A privacy-protecting business-analytics service for on-line transactions. International Journal of Electronic Commerce, 12, 3 (2008), 115-150.
-
(2008)
International Journal of Electronic Commerce
, vol.12
, Issue.3
, pp. 115-150
-
-
Berendt, B.1
Preibusch, S.2
Teltzrow, M.3
-
8
-
-
61849135265
-
Security patch management: Share the burden or share the damage
-
Cavusoglu, H.; Cavusoglu, H.; and Zhang, J. Security patch management: Share the burden or share the damage. Management Science, 54, 4 (2008), 657-670.
-
(2008)
Management Science
, vol.54
, Issue.4
, pp. 657-670
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Zhang, J.3
-
9
-
-
7444242205
-
The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers
-
Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce, 9, 1 (2004), 69-104.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
10
-
-
66549093519
-
Decision-theoretic and game-theoretic approaches to IT security investment
-
Cavusoglu, H.; Raghunathan, S.; and Yue, W. Decision-theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems, 25, 2 (2008), 281-304.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 281-304
-
-
Cavusoglu, H.1
Raghunathan, S.2
Yue, W.3
-
11
-
-
39749171832
-
An economic model of privacy: A property rights approach to regulatory choices for online personalization
-
winter
-
Chellappa, R., and Shivendu, S. An economic model of privacy: A property rights approach to regulatory choices for online personalization. Journal of Management Information Systems, 24, 3 (winter 2007-2008), 193-225.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.3
, pp. 193-225
-
-
Chellappa, R.1
Shivendu, S.2
-
12
-
-
33645785886
-
Internet privacy concerns and social awareness as determinants of intention to transact
-
winter
-
Dinev, T., and Hart, P. Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10, 2 (winter 2005-2006), 7-29.
-
(2005)
International Journal of Electronic Commerce
, vol.10
, Issue.2
, pp. 7-29
-
-
Dinev, T.1
Hart, P.2
-
13
-
-
33745625086
-
Two-sided competition of proprietary vs. open implications for the software industry
-
Economides, N., and Katsamakas, E. Two-sided competition of proprietary vs. open implications for the software industry. Management Science, 52, 7 (2006), 1057-1071.
-
(2006)
Management Science
, vol.52
, Issue.7
, pp. 1057-1071
-
-
Economides, N.1
Katsamakas, E.2
-
15
-
-
61849090657
-
Contracts getting tough on security
-
April 15
-
Fisher, D. Contracts getting tough on security. eWeek, April 15, 2002, 1-2.
-
(2002)
EWeek
, pp. 1-2
-
-
Fisher, D.1
-
16
-
-
79960122923
-
Causes and remedies for social acceptance of network insecurity
-
University of California, Berkeley, May
-
Fisk, M. Causes and remedies for social acceptance of network insecurity. Workshop on Economics and Information Security, University of California, Berkeley, May 16-17, 2002.
-
(2002)
Workshop on Economics and Information Security
, pp. 16-17
-
-
Fisk, M.1
-
18
-
-
3042780586
-
Two views on security software liability: Using the right legal tools
-
Heckman, C. Two views on security software liability: Using the right legal tools. IEEE Security & Privacy, 1, 1 (2003) 73-75.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 73-75
-
-
Heckman, C.1
-
20
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
Kannan, K., and Telang, R. Market for software vulnerabilities? Think again. Management Science, 51, 5 (2005), 726-740.
-
(2005)
Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
23
-
-
49349126835
-
Monopoly and product quality
-
Mussa, M., and Rosen, S. Monopoly and product quality. Journal of Economic Theory, 18, 2 (1978), 301-317.
-
(1978)
Journal of Economic Theory
, vol.18
, Issue.2
, pp. 301-317
-
-
Mussa, M.1
Rosen, S.2
-
27
-
-
0001294457
-
Minimum quality standards, fixed costs, and competition
-
Ronnen, U. Minimum quality standards, fixed costs, and competition. RAND Journal of Economics, 22, 4 (1991), 490-504.
-
(1991)
RAND Journal of Economics
, vol.22
, Issue.4
, pp. 490-504
-
-
Ronnen, U.1
-
28
-
-
3042744350
-
Two views on security software liability: Let the legal system decide
-
Ryan, D. Two views on security software liability: Let the legal system decide. IEEE Security & Privacy, 1, 1 (2003), 70-72.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 70-72
-
-
Ryan, D.1
-
29
-
-
84869736548
-
-
October 28
-
Schneier, B. Information security: How liable should vendors be? Computer World (October 28, 2004), www.computerworld.com/s/article/96948/ Information-security-How-liable-should-vendors-be-?taxonomyId=017& SKC=security-96948.
-
Information Security: How Liable Should Vendors Be?
, pp. 2004
-
-
Schneier, B.1
-
30
-
-
84869734809
-
-
Information Security .November
-
Schneier, B. Do federal security regulations help? Information Security (November 2006), http://searchsecurity.techtarget.com/magazineFeature/ 0,296894,sid14-gci1256971,00.html.
-
(2006)
Do Federal Security Regulations Help?
-
-
Schneier, B.1
-
31
-
-
53049103906
-
Five dimensions of information security awareness
-
Siponen, M. Five dimensions of information security awareness. ACM SIG CAS Computers and Society, 31, 2 (2001), 24-29.
-
(2001)
ACM SIG CAS Computers and Society
, vol.31
, Issue.2
, pp. 24-29
-
-
Siponen, M.1
-
32
-
-
84873321089
-
Monopoly quality, and regulation
-
Spence, M. Monopoly, quality, and regulation. Bell Journal of Economics, 6, 2 (1975), 417-429.
-
(1975)
Bell Journal of Economics
, vol.6
, Issue.2
, pp. 417-429
-
-
Spence, M.1
-
33
-
-
84959825935
-
Consumer misperceptions, product failure and producer liability
-
Spence, M. Consumer misperceptions, product failure and producer liability. Review of Economic Studies, 44, 3 (1977), 561-572.
-
(1977)
Review of Economic Studies
, vol.44
, Issue.3
, pp. 561-572
-
-
Spence, M.1
-
34
-
-
11844255411
-
Nonlinear pricing of information goods
-
Sundararajan, A. Nonlinear pricing of information goods. Management Science, 50, 12 (2004), 1660-1673.
-
(2004)
Management Science
, vol.50
, Issue.12
, pp. 1660-1673
-
-
Sundararajan, A.1
-
35
-
-
44249111255
-
Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor
-
Tang, Z.; Hu, Y.; and Smith, M. Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor. Journal of Management Information Systems, 24, 4 (2008), 153-173.
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.4
, pp. 153-173
-
-
Tang, Z.1
Hu, Y.2
Smith, M.3
-
36
-
-
34547100991
-
An empirical analysis of the impact of software vulnerability announcements on firm stock price
-
Telang, R., and Wattal, S. An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering, 33, 8 (2007), 544-557.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
37
-
-
7444251116
-
The market structure for Internet search engines
-
Telang, R.; Rajan, U.; and Mukhopadhyay, T. The market structure for Internet search engines. Journal of Management Information Systems, 21, 2 (2004), 137-160.
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.2
, pp. 137-160
-
-
Telang, R.1
Rajan, U.2
Mukhopadhyay, T.3
-
39
-
-
0242622210
-
-
Remarks delivered as the Mattioli Lecture Bocconi University Milan November
-
Varian, H.R. Economics of information technology. Remarks delivered as the Mattioli Lecture, Bocconi University, Milan, November 2001.
-
(2001)
Economics of Information Technology
-
-
Varian, H.R.1
|