메뉴 건너뛰기




Volumn 21, Issue 1, 2010, Pages 115-132

An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure

Author keywords

Disclosure policy; Hazard model; Information security; Open source vendors; Patch release time; Security vulnerability; Software vendors

Indexed keywords

DECISION MAKING; OPEN SYSTEMS; SECURITY OF DATA;

EID: 77954250852     PISSN: 10477047     EISSN: 15265536     Source Type: Journal    
DOI: 10.1287/isre.1080.0226     Document Type: Article
Times cited : (115)

References (26)
  • 1
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Anderson, R., T. Moore. 2006. The economics of information security. Science 27(314) 610-613.
    • (2006) Science , vol.27 , Issue.314 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 2
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • Arbaugh, W. A., W. L. Fithen, J. McHugh. 2000. Windows of vulnerability: A case study analysis. IEEE Comput. 33(12) 52-59.
    • (2000) IEEE Comput , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 3
    • 33644916146 scopus 로고    scopus 로고
    • Sell first, fix later: Impact of patching on software quality
    • Arora, A., J. P. Caulkins, R. Telang. 2006a. Sell first, fix later: Impact of patching on software quality. Management Sci. 52(3) 465-471.
    • (2006) Management Sci , vol.52 , Issue.3 , pp. 465-471
    • Arora, A.1    Caulkins, J.P.2    Telang, R.3
  • 4
    • 33846183559 scopus 로고    scopus 로고
    • Impact of patches and software vulnerability information on frequency of security attacks-An empirical analysis
    • Arora, A., A. Nandkumar, R. Telang. 2006b. Impact of patches and software vulnerability information on frequency of security attacks-An empirical analysis. Inform. Systems Frontier 8(5) 350-362.
    • (2006) Inform. Systems Frontier , vol.8 , Issue.5 , pp. 350-362
    • Arora, A.1    Nandkumar, A.2    Telang, R.3
  • 5
    • 61849175198 scopus 로고    scopus 로고
    • Optimal policy for vulnerability disclosure
    • Arora, A., R. Telang, H. Xu. 2008. Optimal policy for vulnerability disclosure. Management Sci. 54(4) 642-656.
    • (2008) Management Sci , vol.54 , Issue.4 , pp. 642-656
    • Arora, A.1    Telang, R.2    Xu, H.3
  • 6
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • August, T., T. Tunca. 2006. Network software security and user incentives. Management Sci. 52(11) 1703-1720.
    • (2006) Management Sci , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.2
  • 7
    • 0032050741 scopus 로고    scopus 로고
    • Software development practices, software complexities, and software maintenance
    • Banker, R., G. Davis, S. Slaughter. 1998. Software development practices, software complexities, and software maintenance. Management Sci. 44(4) 433-450.
    • (1998) Management Sci , vol.44 , Issue.4 , pp. 433-450
    • Banker, R.1    Davis, G.2    Slaughter, S.3
  • 8
    • 0029479221 scopus 로고
    • Unemployment insurance and unemployment over time: An analysis with event history data
    • Belzil, C. 1995. Unemployment insurance and unemployment over time: An analysis with event history data. Rev. Econom. Statist. 77(1) 113-126.
    • (1995) Rev. Econom. Statist. , vol.77 , Issue.1 , pp. 113-126
    • Belzil, C.1
  • 9
    • 33746595082 scopus 로고    scopus 로고
    • Pricing security
    • Survivability Workshop, Boston
    • Camp, L., C. Wolfram. 2000. Pricing security. Proc. CERT Inform. Survivability Workshop, Boston, 31-39.
    • (2000) Proc. CERT Inform. , pp. 31-39
    • Camp, L.1    Wolfram, C.2
  • 11
  • 12
    • 0016794660 scopus 로고
    • Partial likelihood
    • (2, May/August)
    • Cox, D. R. 1975. Partial likelihood. Biometrika 62(2, May/August) 269-276.
    • (1975) Biometrika , vol.62 , pp. 269-276
    • Cox, D.R.1
  • 13
    • 0004296209 scopus 로고
    • Macmillan Publishing Company, New York
    • Green, W. 1992. Econometric Analysis. Macmillan Publishing Company, New York.
    • (1992) Econometric Analysis
    • Green, W.1
  • 14
    • 84876635784 scopus 로고    scopus 로고
    • Cisco details IOS vulnerability spilled at Black Hat, (July 29)
    • Information Week. 2005. Cisco details IOS vulnerability spilled at Black Hat. http://www.informationweek.com/story/showArticle.jhtml?articleID=166403842 (July 29).
    • (2005) Information Week
  • 16
    • 20944441343 scopus 로고    scopus 로고
    • Market for software vulnerabilities? Think again
    • Kannan, K., R. Telang. 2005. Market for software vulnerabilities? Think again. Management Sci. 51(5) 726-740.
    • (2005) Management Sci , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 17
    • 33845382806 scopus 로고
    • Nonparametric estimation from incomplete observations
    • Kaplan, E. L., P. Meier. 1958. Nonparametric estimation from incomplete observations. J. Amer. Statist. Assoc. 53 457-548.
    • (1958) J. Amer. Statist. Assoc. , vol.53 , pp. 457-548
    • Kaplan, E.L.1    Meier, P.2
  • 18
    • 0034205501 scopus 로고    scopus 로고
    • An empirical analysis of cost and conformance quality in software products
    • Krishnan, M. S., C. Kriebel, S. Kekre, T. Mukhopadhyay. 2000. An empirical analysis of cost and conformance quality in software products. Management Sci. 46 745-759.
    • (2000) Management Sci , vol.46 , pp. 745-759
    • Krishnan, M.S.1    Kriebel, C.2    Kekre, S.3    Mukhopadhyay, T.4
  • 19
    • 84876660363 scopus 로고    scopus 로고
    • National Vulnerability Database (NVD)
    • National Vulnerability Database (NVD). http://www.nvd.nist.gov/.
  • 20
    • 33846588487 scopus 로고    scopus 로고
    • To disclose or not? An analysis of software user behavior
    • Nizovtsev, D., M. Thursby. 2007. To disclose or not? An analysis of software user behavior. Inform. Econom. Policy 19(1) 43-64.
    • (2007) Inform. Econom. Policy , vol.19 , Issue.1 , pp. 43-64
    • Nizovtsev, D.1    Thursby, M.2
  • 21
    • 38149139761 scopus 로고    scopus 로고
    • Bug auctions: Vulnerability markets reconsidered
    • Minneapolis
    • Ozment, A. 2004. Bug auctions: Vulnerability markets reconsidered. 3rd Workshop Econom. Inform. Security, Minneapolis.
    • (2004) 3rd Workshop Econom. Inform. Security
    • Ozment, A.1
  • 22
    • 84876608221 scopus 로고    scopus 로고
    • Information security: User precaution and hacker targeting
    • Png, I., C. Tang, Q.-H. Wang. 2006. Information security: User precaution and hacker targeting. http://ssrn.com/abstract=912161.
    • (2006)
    • Png, I.1    Tang, C.2    Wang, Q.-H.3
  • 23
    • 84876625221 scopus 로고    scopus 로고
    • Symantec Inc. Symantec Internet Security Threat Report. Accessed June 24
    • Symantec Inc. Symantec Internet Security Threat Report. Accessed June 24, 2003, http://www.symantec.com.
    • (2003)
  • 24
    • 34547100991 scopus 로고    scopus 로고
    • Impact of vulnerability disclosure on market value of software vendors: An empirical analysis
    • Telang, R., S. Wattal. 2007. Impact of vulnerability disclosure on market value of software vendors: An empirical analysis. IEEE Trans. Software Engrg. 33(8) 544-557.
    • (2007) IEEE Trans. Software Engrg. , vol.33 , Issue.8 , pp. 544-557
    • Telang, R.1    Wattal, S.2
  • 25
    • 0018503089 scopus 로고
    • The impact of heterogeneity in individual frailty on the dynamics of mortality
    • Vaupel, J. W., K. G. Manton, E. Stallard. 1979. The impact of heterogeneity in individual frailty on the dynamics of mortality. Demography 16 439-454.
    • (1979) Demography , vol.16 , pp. 439-454
    • Vaupel, J.W.1    Manton, K.G.2    Stallard, E.3
  • 26
    • 84876618821 scopus 로고    scopus 로고
    • Why open source software/free software (OSS/FS)? Look at the numbers! Accessed June 19, 2007
    • Wheeler, D. 2002. Why open source software/free software (OSS/FS)? Look at the numbers! Accessed June 19, 2007, https://wideopennews.com/archives/open-source-now-list/2002-May/pdf00000.pdf.
    • (2002)
    • Wheeler, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.