-
1
-
-
85005305538
-
The market for 'lemons': Quality uncertainty and the market mechanism
-
Akerlof, G. A. 1970. "The Market for 'Lemons': Quality Uncertainty and the Market Mechanism," The Quarterly Journal of Economics (84:3), pp. 488-500.
-
(1970)
The Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.A.1
-
5
-
-
84926093593
-
Incentives and information security
-
in N. Nisan, T. Roughgarden, E. Tardos and V. V. Vazirani (eds.), New York: Cambridge University Press
-
Anderson, R., Moore, T., Nagaraja, S., and Ozment, A. 2007. "Incentives and Information Security," Algorithmic Game Theory, in N. Nisan, T. Roughgarden, E. Tardos and V. V. Vazirani (eds.), New York: Cambridge University Press, pp. 633-650.
-
(2007)
Algorithmic Game Theory
, pp. 633-650
-
-
Anderson, R.1
Moore, T.2
Nagaraja, S.3
Ozment, A.4
-
6
-
-
72449189100
-
Product differentiation
-
S. Durlauf and L. Blume (eds.), London: Palgrave Macmillan
-
Anderson, S. P. 2008. "Product Differentiation," The New Palgrave Dictionary of Economics Online, S. Durlauf and L. Blume (eds.), London: Palgrave Macmillan (http://www.dictionaryofeconomics.com/article?id=pde2008- P000201)
-
(2008)
The New Palgrave Dictionary of Economics Online
-
-
Anderson, S.P.1
-
7
-
-
33644916146
-
Sell first, fix later: Impact of patching on software quality
-
Arora, A., Caulkins, J. P., and Telang, R. 2006. "Sell First, Fix Later: Impact of Patching on Software Quality," Management Science (52:3), pp. 465-471.
-
(2006)
Management Science
, vol.52
, Issue.3
, pp. 465-471
-
-
Arora, A.1
Caulkins, J.P.2
Telang, R.3
-
8
-
-
38149097274
-
Impact of vulnerability disclosure and patch availability: An empirical analysis
-
paper presented at the, Minneapolis, MN, May 13-14.
-
Arora, A., Nandkumar, A., Krishnan, R., Telang, R., and Yang, Y. 2004. "Impact of Vulnerability Disclosure and Patch Availability: An Empirical Analysis," paper presented at the Workshop on Economics and Information Security, Minneapolis, MN, May 13-14.
-
(2004)
Workshop on Economics and Information Security
-
-
Arora, A.1
Nandkumar, A.2
Krishnan, R.3
Telang, R.4
Yang, Y.5
-
9
-
-
61849175198
-
Optimal policy for software vvulnerability disclosure
-
Arora, A., Telang, R., and Xu, H. 2008. "Optimal Policy for Software Vvulnerability Disclosure," Management Science (54:4), pp. 642-656.
-
(2008)
Management Science
, vol.54
, Issue.4
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
10
-
-
4043130905
-
An empirical analysis of network externalities in peer-to-peer music sharing networks
-
Asvanund, A., Clay, K., Krishnan, R., and Smith, M. 2004. "An Empirical Analysis of Network Externalities in Peer-to-Peer Music Sharing Networks," Information Systems Research (15:2), pp. 155-174.
-
(2004)
Information Systems Research
, vol.15
, Issue.2
, pp. 155-174
-
-
Asvanund, A.1
Clay, K.2
Krishnan, R.3
Smith, M.4
-
11
-
-
33750703619
-
Network software security and user incentives
-
August, T., and Tunca, T. I. 2006. "Network Software Security and User Incentives," Management Science (52:11), pp. 1703-1720.
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.I.2
-
12
-
-
61349202831
-
Let the pirates patch? An economic analysis of software security patch restrictions
-
August, T., and Tunca, T. I. 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research (19:1), pp. 48-70.
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 48-70
-
-
August, T.1
Tunca, T.I.2
-
14
-
-
0029190847
-
Automobile prices in market equilibrium
-
Berry, S., Levinsohn, J., and Pakes, A. 1995. "Automobile Prices in Market Equilibrium," Econometrica (63:4), pp. 841-890.
-
(1995)
Econometrica
, vol.63
, Issue.4
, pp. 841-890
-
-
Berry, S.1
Levinsohn, J.2
Pakes, A.3
-
15
-
-
0010028689
-
The measure of information security is dollars
-
paper presented at the, Berkeley, CA, May 16-17.
-
Blakley, B. 2002. "The Measure of Information Security Is Dollars," paper presented at the Workshop on Economics and Information Security, Berkeley, CA, May 16-17.
-
(2002)
Workshop on Economics and Information Security
-
-
Blakley, B.1
-
16
-
-
33750037937
-
On the limits of cyber-insurance
-
S. Fischer-Huebner, S. Furnell and C. Lambrinoudakis (eds.), Berlin: Springer Verlag
-
Bohme, R., and Kataria, G. 2006. "On the Limits of Cyber-Insurance," in Trust, Privacy and Security in Digital Business, S. Fischer-Huebner, S. Furnell and C. Lambrinoudakis (eds.), Berlin: Springer Verlag, pp. 31-40.
-
(2006)
Trust Privacy and Security in Digital Business
, pp. 31-40
-
-
Bohme, R.1
Kataria, G.2
-
17
-
-
0006298293
-
Network externalities in microcomputer software: An econometric analysis of the spreadsheet market
-
Brynjolfsson, E., and Kemerer, C. F. 1996. "Network Externalities in Microcomputer Software: An Econometric Analysis of the Spreadsheet Market," Management Science (42:12), pp. 1627-1647.
-
(1996)
Management Science
, vol.42
, Issue.12
, pp. 1627-1647
-
-
Brynjolfsson, E.1
Kemerer, C.F.2
-
18
-
-
33947376004
-
Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
-
Cavusoglu, H., Cavusoglu, H., and Raghunathan, S. 2007. "Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge," IEEE Transactions on Software Engineering (33:3), pp. 171-185.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.3
, pp. 171-185
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
19
-
-
61849135265
-
Security patch management: Share the burden or share the damage?
-
Cavusoglu, H., Cavusoglu, H., and Zhang, J. 2008. "Security Patch Management: Share the Burden or Share the Damage?," Management Science (54:4), pp. 657-670.
-
(2008)
Management Science
, vol.54
, Issue.4
, pp. 657-670
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Zhang, J.3
-
20
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
-
Cavusoglu, H., Mishra, B., and Raghunathan, S. 2004. "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers," International Journal of Electronic Commerce (9:4), pp. 69-105.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.4
, pp. 69-105
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
21
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H., Mishra, B., and Raghunathan, S. 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture,"Information Systems Research (16:1), pp. 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
22
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
Cavusoglu, H., and Raghunathan, S. 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis (1:3), pp. 131-148.
-
(2004)
Decision Analysis
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
23
-
-
77957100043
-
Mozilla's firefox browser gaining in popularity among u.s. Small-to-medium businesses
-
March 9 (accessed March 26, 2007
-
Cherian, J. 2007. "Mozilla's Firefox Browser Gaining in Popularity Among U.S. Small-to-Medium Businesses," All Headline News, March 9 (accessed March 26, 2007
-
(2007)
All Headline News
-
-
Cherian, J.1
-
24
-
-
33750710835
-
Internet security, vulnerability, and software provision
-
paper presented at the, Cambridge, MA, June 2-3.
-
Choi, J. P., Fershtman, C., and Gandal, N. 2005. "Internet Security, Vulnerability, and Software Provision," paper presented at the Workshop on Economics and Information Security, Cambridge, MA, June 2-3.
-
(2005)
Workshop on Economics and Information Security
-
-
Choi, J.P.1
Fershtman, C.2
Gandal, N.3
-
25
-
-
77957043702
-
Net threat rising
-
Consumer Reports, September
-
Consumer Reports. 2005. "Net Threat Rising," Consumer Reports, September, pp. 12-15.
-
(2005)
Consumer Reports
, pp. 12-15
-
-
-
26
-
-
84909999858
-
Understanding and influencing attackers decisions: Implications for security investment strategies
-
paper presented at the, Cambridge, UK, June 26-28.
-
Cremonini, M., and Nizovtsez, D. 2006. "Understanding and Influencing Attackers Decisions: Implications for Security Investment Strategies," paper presented at the Workshop on Economics and Information Security, Cambridge, UK, June 26-28.
-
(2006)
Workshop on Economics and Information Security
-
-
Cremonini, M.1
Nizovtsez, D.2
-
28
-
-
77957032789
-
Firefox a growing target for hackers
-
August 1 (available at, accessed September 6, 2009)
-
DeFelice, A. 2006. "Firefox a Growing Target for Hackers, Linux Insider, August 1 (available at http://www.linuxinsider.com/story/52152.html; accessed September 6, 2009).
-
(2006)
Linux Insider
-
-
Defelice, A.1
-
29
-
-
33645133251
-
An extended privacy calculus model for e-commerce transactions
-
DOI 10.1287/isre.1060.0080
-
Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-commerce Transactions," Information Systems Research (17:1), pp. 61-80. (Pubitemid 43450179)
-
(2006)
Information Systems Research
, vol.17
, Issue.1
, pp. 61-80
-
-
Dinev, T.1
Hart, P.2
-
30
-
-
77957091098
-
-
November 2 (available at, accessed September 6, 2009)
-
Evers, J. 2004. "'Internet Explorer Loses Market Share," Info World, November 2 (available at www.infoworld.com/article/04/11/02/HNielosing-1. html; accessed September 6, 2009).
-
(2004)
Internet Explorer Loses Market Share
-
-
Evers, J.1
-
31
-
-
0000150059
-
Standardization, compatability and innovation
-
Farrell, J., and Saloner, G. 1985. "Standardization, Compatability and Innovation," RAND Journal of Economics (76:5), pp. 940-955.
-
(1985)
RAND Journal of Economics
, vol.76
, Issue.5
, pp. 940-955
-
-
Farrell, J.1
Saloner, G.2
-
32
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or, E., and Ghose, A. 2005. "The Economic Incentives for Sharing Security Information," Information Systems Research (16:2), pp. 186-208.
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
33
-
-
23744455066
-
A game-theoretic model of e-marketplace participation growth
-
Galbreth, M. R., March, S. T., Scudder, G. D., and Shor, M. 2005. "A Game-Theoretic Model of E-Marketplace Participation Growth," Journal of Management Information Systems (22:1), pp. 295-319.
-
(2005)
Journal of Management Information Systems
, vol.22
, Issue.1
, pp. 295-319
-
-
Galbreth, M.R.1
March, S.T.2
Scudder, G.D.3
Shor, M.4
-
34
-
-
84990029315
-
The economics of information security investment
-
Gordon, L. A., and Loeb, M. P. 2002. "The Economics of Information Security Investment," ACM Transactions on Information and System Security (5:4), pp. 438-457.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
35
-
-
27744596824
-
Hacker hunters
-
May 30
-
Grow, B., and Bush, J. 2005. "Hacker Hunters," Business Week, May 30, pp. 74-82.
-
(2005)
Business Week
, pp. 74-82
-
-
Grow, B.1
Bush, J.2
-
36
-
-
0002531230
-
Vanity and congestion: A study of reciprocal externalities
-
Hackner, J., and Nyberg, S. 1996. "Vanity and Congestion: A Study of Reciprocal Externalities," Economica (63:249), pp. 97-111.
-
(1996)
Economica
, vol.63
, Issue.249
, pp. 97-111
-
-
Hackner, J.1
Nyberg, S.2
-
37
-
-
74349087011
-
Conjoint analysis, related modeling, and applications
-
J. Wind and P. Green (eds.), New York: Kluwer Academic Publishers
-
Hauser, J. R., and Rao, V. 2004. "Conjoint Analysis, Related Modeling, and Applications," in Advances in Market Research and Modeling: Progress and Prospects, J. Wind and P. Green (eds.), New York: Kluwer Academic Publishers, pp. 141-168.
-
(2004)
Advances in Market Research and Modeling Progress and Prospects
, pp. 141-168
-
-
Hauser, J.R.1
Rao, V.2
-
38
-
-
0002860654
-
Stability in competition
-
Hotelling, H. 1929. "Stability in Competition," Economic Journal (39:1), pp. 41-57.
-
(1929)
Economic Journal
, vol.39
, Issue.1
, pp. 41-57
-
-
Hotelling, H.1
-
39
-
-
85020616309
-
Network externalities, competition, and compatability
-
Katz, M. L., and Shapiro, C. 1985. "Network Externalities, Competition, and Compatability," American Economic Review (75:3), pp. 424-440.
-
(1985)
American Economic Review
, vol.75
, Issue.3
, pp. 424-440
-
-
Katz, M.L.1
Shapiro, C.2
-
40
-
-
0035018527
-
Market structure in congestible markets
-
Lee, I. H., and Mason, R. 2001. "Market Structure in Congestible Markets," European Economic Review (45:4-6), pp. 809-818.
-
(2001)
European Economic Review
, vol.45
, Issue.4-6
, pp. 809-818
-
-
Lee, I.H.1
Mason, R.2
-
41
-
-
4243098325
-
Information cascades in it adoption
-
Li, X. 2004. "Information Cascades in IT Adoption," Communications of the ACM (47:4), pp. 93-97.
-
(2004)
Communications of the ACM
, vol.47
, Issue.4
, pp. 93-97
-
-
Li, X.1
-
42
-
-
14744270678
-
Technology and web user data privacy
-
Linn, J. 2005. "Technology and Web User Data Privacy," IEEE Security and Privacy (3:5), pp. 52-58.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 52-58
-
-
Linn, J.1
-
43
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K. D., Carr, H. H., and Warkentin, M. E. 1992. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly (16:2), pp. 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
44
-
-
0002582286
-
Economics faqs about the internet
-
MacKie-Mason, J. K., and Varian, H. 1994. "Economics FAQs About the Internet," Journal of Economic Perspectives (8:3), pp. 75-96.
-
(1994)
Journal of Economic Perspectives
, vol.8
, Issue.3
, pp. 75-96
-
-
MacKie-Mason, J.K.1
Varian, H.2
-
45
-
-
77957031940
-
Gates' mac attack: Fact vs. Fiction
-
March 1 (available at, accessed September 6, 2009)
-
Maxcer, C. 2007. "Gates' Mac Attack: Fact vs. Fiction," Mac News World, March 1 (available at http://www.macnewsworld.com/story/56017.html; accessed September 6, 2009).
-
(2007)
Mac News World
-
-
Maxcer, C.1
-
46
-
-
0000142503
-
The choice theory approach to market research
-
McFadden, D. 1986. "The Choice Theory Approach to Market Research," Marketing Science (5:4), pp. 275-297.
-
(1986)
Marketing Science
, vol.5
, Issue.4
, pp. 275-297
-
-
McFadden, D.1
-
47
-
-
0034270431
-
-
McHugh, J. A., Christie, A., and Allen, J. 2000. "Defending Yourself: The Role of Intrusion Detection Systems," IEEE Software (17:5), pp. 42-51.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.A.1
Christie, A.2
Allen, J.3
-
48
-
-
0000228289
-
-
Moorthy, K. S. 1988. "Product and Price Competition in a Duopoly," Marketing Science (7:2), pp. 141-168.
-
(1988)
Marketing Science
, vol.7
, Issue.2
, pp. 141-168
-
-
Moorthy, K.S.1
-
49
-
-
77957077298
-
In browser wars, the new firefox loses some edge
-
July 16, Section D
-
Mossberg, W. 2009. "In Browser Wars, the New Firefox Loses Some Edge," Wall Street Journal, July 16, Section D, p. 1.
-
(2009)
Wall Street Journal
, pp. 1
-
-
Mossberg, W.1
-
50
-
-
0036914810
-
Research report: Intrafirm resource allocation with asymmetric information and negative externalities
-
Nadiminti, R., Mukhopadhyay, T., and Kriebel, C. H. 2002. "Research Report: Intrafirm Resource Allocation with Asymmetric Information and Negative Externalities," Information Systems Research (13:4), pp. 428-434.
-
(2002)
Information Systems Research
, vol.13
, Issue.4
, pp. 428-434
-
-
Nadiminti, R.1
Mukhopadhyay, T.2
Kriebel, C.H.3
-
51
-
-
27544481423
-
Two-sided network effects: A theory of information product design
-
Parker, G. G., and VanAlstyne, M. W. 2005. "Two-Sided Network Effects: A Theory of Information Product Design," Management Science (51:10), pp. 1494-1504.
-
(2005)
Management Science
, vol.51
, Issue.10
, pp. 1494-1504
-
-
Parker, G.G.1
Vanalstyne, M.W.2
-
52
-
-
14744276335
-
Is finding security holes a good idea?
-
Rescorla, E. 2005. "Is Finding Security Holes a Good Idea?," IEEE Security and Privacy (3:5), pp. 14-19.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 14-19
-
-
Rescorla, E.1
-
53
-
-
0028480761
-
The growth of interorganizational systems in the presence of network externalities
-
Riggins, F. J., Kriebel, C. H., and Mukhopadhyay, T. 1994. "The Growth of Interorganizational Systems in the Presence of Network Externalities," Management Science (40:8), pp. 984-998.
-
(1994)
Management Science
, vol.40
, Issue.8
, pp. 984-998
-
-
Riggins, F.J.1
Kriebel, C.H.2
Mukhopadhyay, T.3
-
54
-
-
0038606761
-
Development of software selection criteria for supply chain solutions
-
Sahay, B. S., and Gupta, A. K. 2003. "Development of Software Selection Criteria for Supply Chain Solutions," Industrial Management and Data Systems (103:2), pp. 97-110.
-
(2003)
Industrial Management and Data Systems
, vol.103
, Issue.2
, pp. 97-110
-
-
Sahay, B.S.1
Gupta, A.K.2
-
55
-
-
70349735505
-
-
SANS Institute (available at, accessed April 1, 2010)
-
SANS. 2007. "SANS Top-20 2007 Security Risks," SANS Institute (available at http://www.sans.org/top20/2007/; accessed April 1, 2010).
-
(2007)
SANS Top-20 2007 Security Risks
-
-
-
56
-
-
0006990228
-
Profit maximizing clubs
-
Scotchmer, S. 1985. "Profit Maximizing Clubs," Journal of Public Economics (27:1), pp. 25-45.
-
(1985)
Journal of Public Economics
, vol.27
, Issue.1
, pp. 25-45
-
-
Scotchmer, S.1
-
57
-
-
84910319124
-
-
Shaked, A., and Sutton, J. 1982. "Relaxing Price Competition Through Product Differentiation," The Review of Economic Studies (49:1), pp. 3-13.
-
(1982)
The Review of Economic Studies
, vol.49
, Issue.1
, pp. 3-13
-
-
Shaked, A.1
Sutton, J.2
-
58
-
-
32644456297
-
-
working paper, Consortium for Research on Information Security and Policy, Stanford University (available at, accessed April 1, 2010)
-
Soo Hoo, K. J. 2000. "How Much Is Enough? A Risk-Management Approach to Computer Security," working paper, Consortium for Research on Information Security and Policy, Stanford University (available at http://pointy.stanford.edu/pubs/11900/soohoo.pdf; accessed April 1, 2010).
-
(2000)
How Much Is Enough? A Risk-management Approach to Computer Security
-
-
Soo Hoo, K.J.1
-
59
-
-
0000280419
-
Effective is security: An empirical study
-
Straub, D. W. 1990. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
60
-
-
77957030450
-
Viruses, worms and blended threats
-
Chapter 3, (available at)
-
Sullivan, D. 2006. "Viruses, Worms and Blended Threats," Chapter 3 in The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam, realtimepublishers.com (available at http://nexus.realtimepublishers.com/ dgcmsps.php).
-
(2006)
The Definitive Guide to Controlling Malware Spyware Phishing and Spam Realtimepublishers.com
-
-
Sullivan, D.1
-
61
-
-
33846093250
-
-
Symantec Corporation, Cupertino, CA, September (available at)
-
Symantec. 2005. "Internet Security Threat Report: Trends for January 05-June 05," Symantec Corporation, Cupertino, CA, September (available at http://eval.symantec.com/mktginfo/enterprise/white-papers/ent-whitepaper- symantec-internet-security-threat-report-viii.pdf).
-
(2005)
Internet Security Threat Report Trends for January 05-june 05
-
-
-
62
-
-
0034908673
-
A choice model for the selection of computer vendors and its empirical estimation
-
Tam, K. Y., and Hui, K. L. 2001. "A Choice Model for the Selection of Computer Vendors and its Empirical Estimation," Journal of Management Information Systems (17:4), pp. 97-124.
-
(2001)
Journal of Management Information Systems
, vol.17
, Issue.4
, pp. 97-124
-
-
Tam, K.Y.1
Hui, K.L.2
-
63
-
-
0000778367
-
A pure theory of local public expenditures
-
Tiebout, C. M. 1956. "A Pure Theory of Local Public Expenditures," Journal of Political Economy (64:5), pp. 416-424.
-
(1956)
Journal of Political Economy
, vol.64
, Issue.5
, pp. 416-424
-
-
Tiebout, C.M.1
-
64
-
-
0037448859
-
Enterprise resource planning: Implementation procedures and critical success factors
-
Umble, E. J., Haft, R. R., and Umble, M. M. 2003. "Enterprise Resource Planning: Implementation Procedures and Critical Success Factors," European Journal of Operational Research (146), pp. 241-257.
-
(2003)
European Journal of Operational Research
, vol.146
, pp. 241-257
-
-
Umble, E.J.1
Haft, R.R.2
Umble, M.M.3
-
65
-
-
17644387827
-
-
working paper, Department of Economics, University of California, Irvine online at
-
Van Dender, K. 2002. "Nash-Bertrand Competition in a Duopoly with Congestion," working paper, Department of Economics, University of California, Irvine online at http://www.economics.uci.edu/docs/2002-03/ VanDender-01.pdf
-
(2002)
Nash-bertrand Competition in A Duopoly with Congestion
-
-
Van Dender, K.1
-
66
-
-
0002102191
-
Erp adoption by european midsize compaines
-
van Everdingen, Y., van Hillegersberg, J., and Waarts, E. 2000. "ERP Adoption by European Midsize Compaines," Communications of the ACM (43:4), pp. 27-31.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 27-31
-
-
Van Everdingen, Y.1
Van Hillegersberg, J.2
Waarts, E.3
-
67
-
-
33750482906
-
System reliability and free riding,"in
-
L. J. Camp and S. Lewis (eds.), New York: Springer
-
Varian, H. 2004. "System Reliability and Free Riding,"in Economics of Information Security, in L. J. Camp and S. Lewis (eds.), New York: Springer, pp. 1-15.
-
(2004)
Economics of Information Security
, pp. 1-15
-
-
Varian, H.1
-
68
-
-
27644443664
-
The value of health care information exchange and interoperability
-
January 19
-
Walker, J., Pan, E., Johnston, D., Adler-Milstein, J., Bates, D. W., and Middleton, B. 2005. "The Value of Health Care Information Exchange and Interoperability," Health Affairs, January 19, pp. W510-W518.
-
(2005)
Health Affairs
-
-
Walker, J.1
Pan, E.2
Johnston, D.3
Adler-Milstein, J.4
Bates, D.W.5
Middleton, B.6
-
69
-
-
0029275247
-
Electronic data interchange: Competitive externalities and strategic implementation policies
-
Wang, E. T. G., and Seidmann, A. 1995. "Electronic Data Interchange: Competitive Externalities and Strategic Implementation Policies," Management Science (41:3), pp. 401-418.
-
(1995)
Management Science
, vol.41
, Issue.3
, pp. 401-418
-
-
Wang, E.T.G.1
Seidmann, A.2
-
70
-
-
0001679557
-
Congestion and network externalities in the short run pricing of information systems services
-
Westland, J. C. 1992. "Congestion and Network Externalities in the Short Run Pricing of Information Systems Services," Management Science (38:6), pp. 992-1009.
-
(1992)
Management Science
, vol.38
, Issue.6
, pp. 992-1009
-
-
Westland, J.C.1
-
71
-
-
77957078173
-
'Worms' Turn on Apple Macs, Bigger Target as Sales Boom
-
February 27, Section B
-
Wingfield, N. 2006. "'Worms' Turn on Apple Macs, Bigger Target as Sales Boom," Wall Street Journal, February 27, Section B, pp. 1-3.
-
(2006)
Wall Street Journal
, pp. 1-3
-
-
Wingfield, N.1
-
72
-
-
38049138451
-
An analysis of the vulnerability discovery process in web browsers
-
Dallas, TX, November 13-15,(available at)
-
th IASTED International Conference on Computational and Systems Biology, Dallas, TX, November 13-15, pp. 172-177 (available at http://www.cs.colostate.edu/-malaiya/pub/wooSEA-2006.pdf).
-
(2006)
th IASTED International Conference on Computational and Systems Biology
, pp. 172-177
-
-
Woo, S.-W.1
Alhazmi, O.H.2
Malaiya, Y.K.3
-
73
-
-
77957072682
-
Hackers learn to think like the enemy
-
March 23, Section B
-
Yuan, L. 2006. "Hackers Learn to Think Like the Enemy," Wall Street Journal, March 23, Section B, pp. 3.
-
(2006)
Wall Street Journal
, pp. 3
-
-
Yuan, L.1
|