메뉴 건너뛰기




Volumn 34, Issue SPEC. ISSUE 3, 2010, Pages 595-612

The impact of malicious agents on the enterprise software industry

Author keywords

Game theory; Information system security; Network externalities; Software selection

Indexed keywords

COMMERCE; COMPUTER SOFTWARE SELECTION AND EVALUATION; GAME THEORY; HORIZONTAL WELLS; INVESTMENTS; NETWORK SECURITY; SOFTWARE AGENTS;

EID: 77957089023     PISSN: 02767783     EISSN: None     Source Type: Journal    
DOI: 10.2307/25750693     Document Type: Article
Times cited : (41)

References (73)
  • 1
    • 85005305538 scopus 로고
    • The market for 'lemons': Quality uncertainty and the market mechanism
    • Akerlof, G. A. 1970. "The Market for 'Lemons': Quality Uncertainty and the Market Mechanism," The Quarterly Journal of Economics (84:3), pp. 488-500.
    • (1970) The Quarterly Journal of Economics , vol.84 , Issue.3 , pp. 488-500
    • Akerlof, G.A.1
  • 5
    • 84926093593 scopus 로고    scopus 로고
    • Incentives and information security
    • in N. Nisan, T. Roughgarden, E. Tardos and V. V. Vazirani (eds.), New York: Cambridge University Press
    • Anderson, R., Moore, T., Nagaraja, S., and Ozment, A. 2007. "Incentives and Information Security," Algorithmic Game Theory, in N. Nisan, T. Roughgarden, E. Tardos and V. V. Vazirani (eds.), New York: Cambridge University Press, pp. 633-650.
    • (2007) Algorithmic Game Theory , pp. 633-650
    • Anderson, R.1    Moore, T.2    Nagaraja, S.3    Ozment, A.4
  • 6
    • 72449189100 scopus 로고    scopus 로고
    • Product differentiation
    • S. Durlauf and L. Blume (eds.), London: Palgrave Macmillan
    • Anderson, S. P. 2008. "Product Differentiation," The New Palgrave Dictionary of Economics Online, S. Durlauf and L. Blume (eds.), London: Palgrave Macmillan (http://www.dictionaryofeconomics.com/article?id=pde2008- P000201)
    • (2008) The New Palgrave Dictionary of Economics Online
    • Anderson, S.P.1
  • 7
    • 33644916146 scopus 로고    scopus 로고
    • Sell first, fix later: Impact of patching on software quality
    • Arora, A., Caulkins, J. P., and Telang, R. 2006. "Sell First, Fix Later: Impact of Patching on Software Quality," Management Science (52:3), pp. 465-471.
    • (2006) Management Science , vol.52 , Issue.3 , pp. 465-471
    • Arora, A.1    Caulkins, J.P.2    Telang, R.3
  • 8
    • 38149097274 scopus 로고    scopus 로고
    • Impact of vulnerability disclosure and patch availability: An empirical analysis
    • paper presented at the, Minneapolis, MN, May 13-14.
    • Arora, A., Nandkumar, A., Krishnan, R., Telang, R., and Yang, Y. 2004. "Impact of Vulnerability Disclosure and Patch Availability: An Empirical Analysis," paper presented at the Workshop on Economics and Information Security, Minneapolis, MN, May 13-14.
    • (2004) Workshop on Economics and Information Security
    • Arora, A.1    Nandkumar, A.2    Krishnan, R.3    Telang, R.4    Yang, Y.5
  • 9
    • 61849175198 scopus 로고    scopus 로고
    • Optimal policy for software vvulnerability disclosure
    • Arora, A., Telang, R., and Xu, H. 2008. "Optimal Policy for Software Vvulnerability Disclosure," Management Science (54:4), pp. 642-656.
    • (2008) Management Science , vol.54 , Issue.4 , pp. 642-656
    • Arora, A.1    Telang, R.2    Xu, H.3
  • 10
    • 4043130905 scopus 로고    scopus 로고
    • An empirical analysis of network externalities in peer-to-peer music sharing networks
    • Asvanund, A., Clay, K., Krishnan, R., and Smith, M. 2004. "An Empirical Analysis of Network Externalities in Peer-to-Peer Music Sharing Networks," Information Systems Research (15:2), pp. 155-174.
    • (2004) Information Systems Research , vol.15 , Issue.2 , pp. 155-174
    • Asvanund, A.1    Clay, K.2    Krishnan, R.3    Smith, M.4
  • 11
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • August, T., and Tunca, T. I. 2006. "Network Software Security and User Incentives," Management Science (52:11), pp. 1703-1720.
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 12
    • 61349202831 scopus 로고    scopus 로고
    • Let the pirates patch? An economic analysis of software security patch restrictions
    • August, T., and Tunca, T. I. 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research (19:1), pp. 48-70.
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 48-70
    • August, T.1    Tunca, T.I.2
  • 14
    • 0029190847 scopus 로고
    • Automobile prices in market equilibrium
    • Berry, S., Levinsohn, J., and Pakes, A. 1995. "Automobile Prices in Market Equilibrium," Econometrica (63:4), pp. 841-890.
    • (1995) Econometrica , vol.63 , Issue.4 , pp. 841-890
    • Berry, S.1    Levinsohn, J.2    Pakes, A.3
  • 15
    • 0010028689 scopus 로고    scopus 로고
    • The measure of information security is dollars
    • paper presented at the, Berkeley, CA, May 16-17.
    • Blakley, B. 2002. "The Measure of Information Security Is Dollars," paper presented at the Workshop on Economics and Information Security, Berkeley, CA, May 16-17.
    • (2002) Workshop on Economics and Information Security
    • Blakley, B.1
  • 16
    • 33750037937 scopus 로고    scopus 로고
    • On the limits of cyber-insurance
    • S. Fischer-Huebner, S. Furnell and C. Lambrinoudakis (eds.), Berlin: Springer Verlag
    • Bohme, R., and Kataria, G. 2006. "On the Limits of Cyber-Insurance," in Trust, Privacy and Security in Digital Business, S. Fischer-Huebner, S. Furnell and C. Lambrinoudakis (eds.), Berlin: Springer Verlag, pp. 31-40.
    • (2006) Trust Privacy and Security in Digital Business , pp. 31-40
    • Bohme, R.1    Kataria, G.2
  • 17
    • 0006298293 scopus 로고    scopus 로고
    • Network externalities in microcomputer software: An econometric analysis of the spreadsheet market
    • Brynjolfsson, E., and Kemerer, C. F. 1996. "Network Externalities in Microcomputer Software: An Econometric Analysis of the Spreadsheet Market," Management Science (42:12), pp. 1627-1647.
    • (1996) Management Science , vol.42 , Issue.12 , pp. 1627-1647
    • Brynjolfsson, E.1    Kemerer, C.F.2
  • 18
    • 33947376004 scopus 로고    scopus 로고
    • Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
    • Cavusoglu, H., Cavusoglu, H., and Raghunathan, S. 2007. "Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge," IEEE Transactions on Software Engineering (33:3), pp. 171-185.
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.3 , pp. 171-185
    • Cavusoglu, H.1    Cavusoglu, H.2    Raghunathan, S.3
  • 19
    • 61849135265 scopus 로고    scopus 로고
    • Security patch management: Share the burden or share the damage?
    • Cavusoglu, H., Cavusoglu, H., and Zhang, J. 2008. "Security Patch Management: Share the Burden or Share the Damage?," Management Science (54:4), pp. 657-670.
    • (2008) Management Science , vol.54 , Issue.4 , pp. 657-670
    • Cavusoglu, H.1    Cavusoglu, H.2    Zhang, J.3
  • 20
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
    • Cavusoglu, H., Mishra, B., and Raghunathan, S. 2004. "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers," International Journal of Electronic Commerce (9:4), pp. 69-105.
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.4 , pp. 69-105
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 21
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, H., Mishra, B., and Raghunathan, S. 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture,"Information Systems Research (16:1), pp. 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 22
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: A comparison of decision and game theory approaches
    • Cavusoglu, H., and Raghunathan, S. 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis (1:3), pp. 131-148.
    • (2004) Decision Analysis , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 23
    • 77957100043 scopus 로고    scopus 로고
    • Mozilla's firefox browser gaining in popularity among u.s. Small-to-medium businesses
    • March 9 (accessed March 26, 2007
    • Cherian, J. 2007. "Mozilla's Firefox Browser Gaining in Popularity Among U.S. Small-to-Medium Businesses," All Headline News, March 9 (accessed March 26, 2007
    • (2007) All Headline News
    • Cherian, J.1
  • 24
    • 33750710835 scopus 로고    scopus 로고
    • Internet security, vulnerability, and software provision
    • paper presented at the, Cambridge, MA, June 2-3.
    • Choi, J. P., Fershtman, C., and Gandal, N. 2005. "Internet Security, Vulnerability, and Software Provision," paper presented at the Workshop on Economics and Information Security, Cambridge, MA, June 2-3.
    • (2005) Workshop on Economics and Information Security
    • Choi, J.P.1    Fershtman, C.2    Gandal, N.3
  • 25
    • 77957043702 scopus 로고    scopus 로고
    • Net threat rising
    • Consumer Reports, September
    • Consumer Reports. 2005. "Net Threat Rising," Consumer Reports, September, pp. 12-15.
    • (2005) Consumer Reports , pp. 12-15
  • 26
    • 84909999858 scopus 로고    scopus 로고
    • Understanding and influencing attackers decisions: Implications for security investment strategies
    • paper presented at the, Cambridge, UK, June 26-28.
    • Cremonini, M., and Nizovtsez, D. 2006. "Understanding and Influencing Attackers Decisions: Implications for Security Investment Strategies," paper presented at the Workshop on Economics and Information Security, Cambridge, UK, June 26-28.
    • (2006) Workshop on Economics and Information Security
    • Cremonini, M.1    Nizovtsez, D.2
  • 28
    • 77957032789 scopus 로고    scopus 로고
    • Firefox a growing target for hackers
    • August 1 (available at, accessed September 6, 2009)
    • DeFelice, A. 2006. "Firefox a Growing Target for Hackers, Linux Insider, August 1 (available at http://www.linuxinsider.com/story/52152.html; accessed September 6, 2009).
    • (2006) Linux Insider
    • Defelice, A.1
  • 29
    • 33645133251 scopus 로고    scopus 로고
    • An extended privacy calculus model for e-commerce transactions
    • DOI 10.1287/isre.1060.0080
    • Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-commerce Transactions," Information Systems Research (17:1), pp. 61-80. (Pubitemid 43450179)
    • (2006) Information Systems Research , vol.17 , Issue.1 , pp. 61-80
    • Dinev, T.1    Hart, P.2
  • 30
    • 77957091098 scopus 로고    scopus 로고
    • November 2 (available at, accessed September 6, 2009)
    • Evers, J. 2004. "'Internet Explorer Loses Market Share," Info World, November 2 (available at www.infoworld.com/article/04/11/02/HNielosing-1. html; accessed September 6, 2009).
    • (2004) Internet Explorer Loses Market Share
    • Evers, J.1
  • 31
    • 0000150059 scopus 로고
    • Standardization, compatability and innovation
    • Farrell, J., and Saloner, G. 1985. "Standardization, Compatability and Innovation," RAND Journal of Economics (76:5), pp. 940-955.
    • (1985) RAND Journal of Economics , vol.76 , Issue.5 , pp. 940-955
    • Farrell, J.1    Saloner, G.2
  • 32
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or, E., and Ghose, A. 2005. "The Economic Incentives for Sharing Security Information," Information Systems Research (16:2), pp. 186-208.
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 35
    • 27744596824 scopus 로고    scopus 로고
    • Hacker hunters
    • May 30
    • Grow, B., and Bush, J. 2005. "Hacker Hunters," Business Week, May 30, pp. 74-82.
    • (2005) Business Week , pp. 74-82
    • Grow, B.1    Bush, J.2
  • 36
    • 0002531230 scopus 로고    scopus 로고
    • Vanity and congestion: A study of reciprocal externalities
    • Hackner, J., and Nyberg, S. 1996. "Vanity and Congestion: A Study of Reciprocal Externalities," Economica (63:249), pp. 97-111.
    • (1996) Economica , vol.63 , Issue.249 , pp. 97-111
    • Hackner, J.1    Nyberg, S.2
  • 37
    • 74349087011 scopus 로고    scopus 로고
    • Conjoint analysis, related modeling, and applications
    • J. Wind and P. Green (eds.), New York: Kluwer Academic Publishers
    • Hauser, J. R., and Rao, V. 2004. "Conjoint Analysis, Related Modeling, and Applications," in Advances in Market Research and Modeling: Progress and Prospects, J. Wind and P. Green (eds.), New York: Kluwer Academic Publishers, pp. 141-168.
    • (2004) Advances in Market Research and Modeling Progress and Prospects , pp. 141-168
    • Hauser, J.R.1    Rao, V.2
  • 38
    • 0002860654 scopus 로고
    • Stability in competition
    • Hotelling, H. 1929. "Stability in Competition," Economic Journal (39:1), pp. 41-57.
    • (1929) Economic Journal , vol.39 , Issue.1 , pp. 41-57
    • Hotelling, H.1
  • 39
    • 85020616309 scopus 로고
    • Network externalities, competition, and compatability
    • Katz, M. L., and Shapiro, C. 1985. "Network Externalities, Competition, and Compatability," American Economic Review (75:3), pp. 424-440.
    • (1985) American Economic Review , vol.75 , Issue.3 , pp. 424-440
    • Katz, M.L.1    Shapiro, C.2
  • 40
    • 0035018527 scopus 로고    scopus 로고
    • Market structure in congestible markets
    • Lee, I. H., and Mason, R. 2001. "Market Structure in Congestible Markets," European Economic Review (45:4-6), pp. 809-818.
    • (2001) European Economic Review , vol.45 , Issue.4-6 , pp. 809-818
    • Lee, I.H.1    Mason, R.2
  • 41
    • 4243098325 scopus 로고    scopus 로고
    • Information cascades in it adoption
    • Li, X. 2004. "Information Cascades in IT Adoption," Communications of the ACM (47:4), pp. 93-97.
    • (2004) Communications of the ACM , vol.47 , Issue.4 , pp. 93-97
    • Li, X.1
  • 42
    • 14744270678 scopus 로고    scopus 로고
    • Technology and web user data privacy
    • Linn, J. 2005. "Technology and Web User Data Privacy," IEEE Security and Privacy (3:5), pp. 52-58.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5 , pp. 52-58
    • Linn, J.1
  • 43
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K. D., Carr, H. H., and Warkentin, M. E. 1992. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly (16:2), pp. 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 45
    • 77957031940 scopus 로고    scopus 로고
    • Gates' mac attack: Fact vs. Fiction
    • March 1 (available at, accessed September 6, 2009)
    • Maxcer, C. 2007. "Gates' Mac Attack: Fact vs. Fiction," Mac News World, March 1 (available at http://www.macnewsworld.com/story/56017.html; accessed September 6, 2009).
    • (2007) Mac News World
    • Maxcer, C.1
  • 46
    • 0000142503 scopus 로고
    • The choice theory approach to market research
    • McFadden, D. 1986. "The Choice Theory Approach to Market Research," Marketing Science (5:4), pp. 275-297.
    • (1986) Marketing Science , vol.5 , Issue.4 , pp. 275-297
    • McFadden, D.1
  • 47
    • 0034270431 scopus 로고    scopus 로고
    • McHugh, J. A., Christie, A., and Allen, J. 2000. "Defending Yourself: The Role of Intrusion Detection Systems," IEEE Software (17:5), pp. 42-51.
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 42-51
    • McHugh, J.A.1    Christie, A.2    Allen, J.3
  • 48
    • 0000228289 scopus 로고
    • Moorthy, K. S. 1988. "Product and Price Competition in a Duopoly," Marketing Science (7:2), pp. 141-168.
    • (1988) Marketing Science , vol.7 , Issue.2 , pp. 141-168
    • Moorthy, K.S.1
  • 49
    • 77957077298 scopus 로고    scopus 로고
    • In browser wars, the new firefox loses some edge
    • July 16, Section D
    • Mossberg, W. 2009. "In Browser Wars, the New Firefox Loses Some Edge," Wall Street Journal, July 16, Section D, p. 1.
    • (2009) Wall Street Journal , pp. 1
    • Mossberg, W.1
  • 50
    • 0036914810 scopus 로고    scopus 로고
    • Research report: Intrafirm resource allocation with asymmetric information and negative externalities
    • Nadiminti, R., Mukhopadhyay, T., and Kriebel, C. H. 2002. "Research Report: Intrafirm Resource Allocation with Asymmetric Information and Negative Externalities," Information Systems Research (13:4), pp. 428-434.
    • (2002) Information Systems Research , vol.13 , Issue.4 , pp. 428-434
    • Nadiminti, R.1    Mukhopadhyay, T.2    Kriebel, C.H.3
  • 51
    • 27544481423 scopus 로고    scopus 로고
    • Two-sided network effects: A theory of information product design
    • Parker, G. G., and VanAlstyne, M. W. 2005. "Two-Sided Network Effects: A Theory of Information Product Design," Management Science (51:10), pp. 1494-1504.
    • (2005) Management Science , vol.51 , Issue.10 , pp. 1494-1504
    • Parker, G.G.1    Vanalstyne, M.W.2
  • 52
    • 14744276335 scopus 로고    scopus 로고
    • Is finding security holes a good idea?
    • Rescorla, E. 2005. "Is Finding Security Holes a Good Idea?," IEEE Security and Privacy (3:5), pp. 14-19.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5 , pp. 14-19
    • Rescorla, E.1
  • 53
    • 0028480761 scopus 로고
    • The growth of interorganizational systems in the presence of network externalities
    • Riggins, F. J., Kriebel, C. H., and Mukhopadhyay, T. 1994. "The Growth of Interorganizational Systems in the Presence of Network Externalities," Management Science (40:8), pp. 984-998.
    • (1994) Management Science , vol.40 , Issue.8 , pp. 984-998
    • Riggins, F.J.1    Kriebel, C.H.2    Mukhopadhyay, T.3
  • 54
    • 0038606761 scopus 로고    scopus 로고
    • Development of software selection criteria for supply chain solutions
    • Sahay, B. S., and Gupta, A. K. 2003. "Development of Software Selection Criteria for Supply Chain Solutions," Industrial Management and Data Systems (103:2), pp. 97-110.
    • (2003) Industrial Management and Data Systems , vol.103 , Issue.2 , pp. 97-110
    • Sahay, B.S.1    Gupta, A.K.2
  • 55
    • 70349735505 scopus 로고    scopus 로고
    • SANS Institute (available at, accessed April 1, 2010)
    • SANS. 2007. "SANS Top-20 2007 Security Risks," SANS Institute (available at http://www.sans.org/top20/2007/; accessed April 1, 2010).
    • (2007) SANS Top-20 2007 Security Risks
  • 56
    • 0006990228 scopus 로고
    • Profit maximizing clubs
    • Scotchmer, S. 1985. "Profit Maximizing Clubs," Journal of Public Economics (27:1), pp. 25-45.
    • (1985) Journal of Public Economics , vol.27 , Issue.1 , pp. 25-45
    • Scotchmer, S.1
  • 58
    • 32644456297 scopus 로고    scopus 로고
    • working paper, Consortium for Research on Information Security and Policy, Stanford University (available at, accessed April 1, 2010)
    • Soo Hoo, K. J. 2000. "How Much Is Enough? A Risk-Management Approach to Computer Security," working paper, Consortium for Research on Information Security and Policy, Stanford University (available at http://pointy.stanford.edu/pubs/11900/soohoo.pdf; accessed April 1, 2010).
    • (2000) How Much Is Enough? A Risk-management Approach to Computer Security
    • Soo Hoo, K.J.1
  • 59
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • Straub, D. W. 1990. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 61
    • 33846093250 scopus 로고    scopus 로고
    • Symantec Corporation, Cupertino, CA, September (available at)
    • Symantec. 2005. "Internet Security Threat Report: Trends for January 05-June 05," Symantec Corporation, Cupertino, CA, September (available at http://eval.symantec.com/mktginfo/enterprise/white-papers/ent-whitepaper- symantec-internet-security-threat-report-viii.pdf).
    • (2005) Internet Security Threat Report Trends for January 05-june 05
  • 62
    • 0034908673 scopus 로고    scopus 로고
    • A choice model for the selection of computer vendors and its empirical estimation
    • Tam, K. Y., and Hui, K. L. 2001. "A Choice Model for the Selection of Computer Vendors and its Empirical Estimation," Journal of Management Information Systems (17:4), pp. 97-124.
    • (2001) Journal of Management Information Systems , vol.17 , Issue.4 , pp. 97-124
    • Tam, K.Y.1    Hui, K.L.2
  • 63
    • 0000778367 scopus 로고
    • A pure theory of local public expenditures
    • Tiebout, C. M. 1956. "A Pure Theory of Local Public Expenditures," Journal of Political Economy (64:5), pp. 416-424.
    • (1956) Journal of Political Economy , vol.64 , Issue.5 , pp. 416-424
    • Tiebout, C.M.1
  • 64
    • 0037448859 scopus 로고    scopus 로고
    • Enterprise resource planning: Implementation procedures and critical success factors
    • Umble, E. J., Haft, R. R., and Umble, M. M. 2003. "Enterprise Resource Planning: Implementation Procedures and Critical Success Factors," European Journal of Operational Research (146), pp. 241-257.
    • (2003) European Journal of Operational Research , vol.146 , pp. 241-257
    • Umble, E.J.1    Haft, R.R.2    Umble, M.M.3
  • 65
    • 17644387827 scopus 로고    scopus 로고
    • working paper, Department of Economics, University of California, Irvine online at
    • Van Dender, K. 2002. "Nash-Bertrand Competition in a Duopoly with Congestion," working paper, Department of Economics, University of California, Irvine online at http://www.economics.uci.edu/docs/2002-03/ VanDender-01.pdf
    • (2002) Nash-bertrand Competition in A Duopoly with Congestion
    • Van Dender, K.1
  • 67
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding,"in
    • L. J. Camp and S. Lewis (eds.), New York: Springer
    • Varian, H. 2004. "System Reliability and Free Riding,"in Economics of Information Security, in L. J. Camp and S. Lewis (eds.), New York: Springer, pp. 1-15.
    • (2004) Economics of Information Security , pp. 1-15
    • Varian, H.1
  • 69
    • 0029275247 scopus 로고
    • Electronic data interchange: Competitive externalities and strategic implementation policies
    • Wang, E. T. G., and Seidmann, A. 1995. "Electronic Data Interchange: Competitive Externalities and Strategic Implementation Policies," Management Science (41:3), pp. 401-418.
    • (1995) Management Science , vol.41 , Issue.3 , pp. 401-418
    • Wang, E.T.G.1    Seidmann, A.2
  • 70
    • 0001679557 scopus 로고
    • Congestion and network externalities in the short run pricing of information systems services
    • Westland, J. C. 1992. "Congestion and Network Externalities in the Short Run Pricing of Information Systems Services," Management Science (38:6), pp. 992-1009.
    • (1992) Management Science , vol.38 , Issue.6 , pp. 992-1009
    • Westland, J.C.1
  • 71
    • 77957078173 scopus 로고    scopus 로고
    • 'Worms' Turn on Apple Macs, Bigger Target as Sales Boom
    • February 27, Section B
    • Wingfield, N. 2006. "'Worms' Turn on Apple Macs, Bigger Target as Sales Boom," Wall Street Journal, February 27, Section B, pp. 1-3.
    • (2006) Wall Street Journal , pp. 1-3
    • Wingfield, N.1
  • 73
    • 77957072682 scopus 로고    scopus 로고
    • Hackers learn to think like the enemy
    • March 23, Section B
    • Yuan, L. 2006. "Hackers Learn to Think Like the Enemy," Wall Street Journal, March 23, Section B, pp. 3.
    • (2006) Wall Street Journal , pp. 3
    • Yuan, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.