메뉴 건너뛰기




Volumn 57, Issue 5, 2011, Pages 934-959

Who should be responsible for software security? A comparative analysis of liability policies in network environments

Author keywords

Economics of IS; Enabling technologies; IT policy and management; Liability; Network economics; Software; Zero day

Indexed keywords

ECONOMICS OF IS; ENABLING TECHNOLOGIES; IT POLICY AND MANAGEMENT; LIABILITY; NETWORK ECONOMICS; SOFTWARE; ZERO-DAY;

EID: 79956063140     PISSN: 00251909     EISSN: 15265501     Source Type: Journal    
DOI: 10.1287/mnsc.1100.1304     Document Type: Article
Times cited : (57)

References (91)
  • 1
    • 0012934466 scopus 로고
    • Technical report, Software Engineering Institute, Carnegie Mellon University, Pittsburgh
    • Armour, J., W. S. Humphrey. 1993. Software product liability. Technical report, Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
    • (1993) Software product liability
    • Armour, J.1    Humphrey, W.S.2
  • 2
    • 61849175198 scopus 로고    scopus 로고
    • Optimal policy for software vulnerability disclosure
    • Arora, A., R. Telang, H. Xu. 2008. Optimal policy for software vulnerability disclosure. Management Sci. 54(4) 642-656.
    • (2008) Management Sci. , vol.54 , Issue.4 , pp. 642-656
    • Arora, A.1    Telang, R.2    Xu, H.3
  • 3
    • 79956069138 scopus 로고    scopus 로고
    • EC takes three steps back on software liability
    • (May 12)
    • Asay, M. 2009. EC takes three steps back on software liability. CNET News (May 12), http://news.cnet.com/8301-13505-3 -10238475-16.html.
    • (2009) CNET News
    • Asay, M.1
  • 4
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • DOI 10.1287/mnsc.1060.0568
    • August, T., T. I. Tunca. 2006. Network software security and user incentives. Management Sci. 52(11) 1703-1720. (Pubitemid 44706077)
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 5
    • 61349202831 scopus 로고    scopus 로고
    • Let the pirates patch? An economic analysis of software security patch restrictions
    • August, T., T. I. Tunca. 2008. Let the pirates patch? An economic analysis of software security patch restrictions. Inform. Systems Res. 19(1) 48-70.
    • (2008) Inform. Systems Res. , vol.19 , Issue.1 , pp. 48-70
    • August, T.1    Tunca, T.I.2
  • 7
    • 79956060924 scopus 로고    scopus 로고
    • NHTSA to test Lexus SUV for rollover
    • (April 15)
    • Bennett, J. 2010. NHTSA to test Lexus SUV for rollover. Wall Street Journal (April 15), http://online. wsj.com/article/ SB10001424052702304510004575185983714141448.html.
    • (2010) Wall Street Journal
    • Bennett, J.1
  • 9
    • 79956080002 scopus 로고    scopus 로고
    • OSHA boosts oversight of state safety agencies
    • (March 29)
    • Berzon, A. 2010. OSHA boosts oversight of state safety agencies. Wall Street Journal (March 29), http://online. wsj.com/article/ SB1000142405274803409804575143994200426192.html.
    • (2010) Wall Street Journal
    • Berzon, A.1
  • 11
    • 77956762114 scopus 로고
    • Right approach, wrong implications: A critique of McKean on products liability
    • Calabresi, G., K. C. Bass, III. 1970. Right approach, wrong implications: A critique of McKean on products liability. Univ. Chicago Law Rev. 38(1) 74-91.
    • (1970) Univ. Chicago Law Rev. , vol.38 , Issue.1 , pp. 74-91
    • Calabresi, G.1    Bass III, K.C.2
  • 12
    • 33947376004 scopus 로고    scopus 로고
    • Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
    • DOI 10.1109/TSE.2007.26
    • Cavusoglu, H., H. Cavusoglu, S. Raghunathan. 2007. Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Trans. Software Engrg. 33(3) 171-185. (Pubitemid 46443998)
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.3 , pp. 171-185
    • Cavusoglu, H.1    Cavusoglu, H.2    Raghunathan, S.3
  • 13
    • 61849135265 scopus 로고    scopus 로고
    • Security patch management: Share the burden or share the damage?
    • Cavusoglu, H., H. Cavusoglu, J. Zhang. 2008. Security patch management: Share the burden or share the damage? Management Sci. 54(4) 657-670.
    • (2008) Management Sci. , vol.54 , Issue.4 , pp. 657-670
    • Cavusoglu, H.1    Cavusoglu, H.2    Zhang, J.3
  • 14
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
    • Cavusoglu, H., B. Mishra, S. Raghunathan. 2004. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. Internat. J. Electronic Commerce 9(1) 69-104. (Pubitemid 39444049)
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 69-104
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 15
    • 80051749786 scopus 로고    scopus 로고
    • 2011. Correlated failures, diversification, and information security risk management
    • Forthcoming
    • Chen, P., G. Kataria, R. Krishnan. 2011. Correlated failures, diversification, and information security risk management. MIS Quart. Forthcoming.
    • MIS Quart.
    • Chen, P.1    Kataria, G.2    Krishnan, R.3
  • 17
    • 78650565122 scopus 로고    scopus 로고
    • Network security: Vulnerabilities and disclosure policy
    • Choi, J. P., C. Fershtman, N. Gandal. 2010. Network security: Vulnerabilities and disclosure policy. J. Indust. Econom. 58(4) 868-894.
    • (2010) J. Indust. Econom. , vol.58 , Issue.4 , pp. 868-894
    • Choi, J.P.1    Fershtman, C.2    Gandal, N.3
  • 18
    • 79956107070 scopus 로고    scopus 로고
    • Interview: Frontline cyber war
    • (March 18)
    • Clarke, R. 2003. Interview: Frontline cyber war! PBS (March 18), http://www.pbs. org/wgbh/pages/frontline/shows/cyberwar/ interviews/clarke.html.
    • (2003) PBS
    • Clarke, R.1
  • 19
    • 79956064556 scopus 로고    scopus 로고
    • Lords tell government to clean up "Wild West" Internet
    • (August 10)
    • Collins, B. 2007. Lords tell government to clean up "Wild West" Internet. PC Pro (August 10), http://www.pcpro.co.uk/news/ broadband/122086/ lords-tell-government-to-clean-up-wild -west-internet.
    • (2007) PC Pro
    • Collins, B.1
  • 20
    • 79956144466 scopus 로고    scopus 로고
    • The cost impact of major virus attacks since 1995. (February)
    • Computer Economics. 2004. The cost impact of major virus attacks since 1995. (February), http://www.computereconomics.com/article. cfm?id=936
    • (2004) Computer Economics
  • 22
    • 11844282731 scopus 로고    scopus 로고
    • Who is liable for bugs and security flaws in software?
    • Cusumano, M. A. 2004. Who is liable for bugs and security flaws in software? Commun. ACM 47(3) 25-27.
    • (2004) Commun. ACM , vol.47 , Issue.3 , pp. 25-27
    • Cusumano, M.A.1
  • 23
  • 24
    • 85055761229 scopus 로고
    • The economics of products liability: A reaction to McKean
    • Dorfman, R. 1970. The economics of products liability: A reaction to McKean. Univ. Chicago Law Rev. 38(1) 92-102.
    • (1970) Univ. Chicago Law Rev. , vol.38 , Issue.1 , pp. 92-102
    • Dorfman, R.1
  • 25
    • 77955498302 scopus 로고
    • Product safety: Liability rules, market structure, and imperfect information
    • Epple, D., A. Raviv. 1978. Product safety: Liability rules, market structure, and imperfect information. Amer. Econom. Rev. 68(1) 80-95.
    • (1978) Amer. Econom. Rev. , vol.68 , Issue.1 , pp. 80-95
    • Epple, D.1    Raviv, A.2
  • 26
    • 79956140022 scopus 로고    scopus 로고
    • OWASP sheds light on its security standards
    • (May 13)
    • Feinman, J. 2009. OWASP sheds light on its security standards. SDTimes (May 13), http://www.sdtimes.com/link/33469.
    • (2009) SDTimes
    • Feinman, J.1
  • 27
    • 79956140519 scopus 로고    scopus 로고
    • Software liability gaining attention
    • (January 14)
    • Fisher, D. 2002. Software liability gaining attention. eWeek.com (January 14), http://mobile. eweek.com/c/a/Application -Development/Software-Liability- Gaining-Attention/.
    • (2002) EWeek.com
    • Fisher, D.1
  • 29
    • 0000028492 scopus 로고
    • The folk theorem in repeated games with discounting or with incomplete information
    • Fudenberg, D., E. Maskin. 1986. The folk theorem in repeated games with discounting or with incomplete information. Econometrica 54(3) 533-554.
    • (1986) Econometrica , vol.54 , Issue.3 , pp. 533-554
    • Fudenberg, D.1    Maskin, E.2
  • 30
    • 33750722921 scopus 로고    scopus 로고
    • The cost of information security breaches
    • Spring
    • Garg, A. 2003. The cost of information security breaches. Cross- Currents (Spring) 8-11.
    • (2003) Cross Currents , pp. 8-11
    • Garg, A.1
  • 31
    • 70450167605 scopus 로고    scopus 로고
    • How vulnerable is the power grid?
    • (April 15)
    • Ghosh, B. 2009. How vulnerable is the power grid? TIME (April 15), http://www.time.com/time/nation/article/0,8599,1891562,00.html.
    • (2009) Time
    • Ghosh, B.1
  • 32
    • 79251594889 scopus 로고
    • Products liability: A commentary
    • Gilmore, G. 1970. Products liability: A commentary. Univ. Chicago Law Rev. 38(1) 103-116.
    • (1970) Univ. Chicago Law Rev. , vol.38 , Issue.1 , pp. 103-116
    • Gilmore, G.1
  • 33
    • 79952977104 scopus 로고    scopus 로고
    • Webhost hack wipes out data for 100,000 sites
    • (June 8)
    • Goodin, D. 2009. Webhost hack wipes out data for 100s,000 sites. The Register (June 8), http://www.theregister.co.uk/ 2009/06/08/webhost-attack/.
    • (2009) The Register
    • Goodin, D.1
  • 34
    • 79956159397 scopus 로고    scopus 로고
    • Security liability laws are NOT the answer
    • (November 1)
    • Haase, G. 2004. Security liability laws are NOT the answer. One- FreeVoice.com (November 1), http://blog. onefreevoice.com/ 2004/11/01/security- liability-laws-are-not-the-answer/.
    • (2004) One- FreeVoice.com
    • Haase, G.1
  • 36
    • 3042780586 scopus 로고    scopus 로고
    • Two views on security software liability: Using the right legal tools
    • Heckman, C. 2003. Two views on security software liability: Using the right legal tools. IEEE Security & Privacy 1(1) 73-75.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 73-75
    • Heckman, C.1
  • 37
    • 79956149466 scopus 로고    scopus 로고
    • Hewlett-Packard
    • Hewlett-Packard. 2010. HP TippingPoint zero day initiative. http:// www.zerodayinitiative.com/advisories/published/.
    • (2010) HP TippingPoint Zero Day Initiative
  • 38
    • 79956131357 scopus 로고    scopus 로고
    • EU software liability law could divide open source
    • (June 11)
    • Ho, V. 2009. EU software liability law could divide open source. CNET News (June 11), http://news.cnet.com/8301-1001-3 -10262503-92.html.
    • (2009) CNET News
    • Ho, V.1
  • 40
    • 79956074863 scopus 로고    scopus 로고
    • More regulation for the software industry?
    • (February 16)
    • Joyce, E. 2005. More regulation for the software industry? eSecurity Planet.com (February 16), http://www.esecurityplanet.com/ trends/article. php/3483876/More-Regulation-For-The-Software -Industry.htm.
    • (2005) ESecurity Planet.com
    • Joyce, E.1
  • 41
    • 84864137926 scopus 로고    scopus 로고
    • Unpublished paper
    • Kaner, C. 1997. Software liability. Unpublished paper, http://www.badsoftware.com/theories.htm.
    • (1997) Software Liability
    • Kaner, C.1
  • 42
    • 79956075929 scopus 로고    scopus 로고
    • Sasser worm impacted businesses around the world
    • (May 7)
    • Keizer, G. 2004. Sasser worm impacted businesses around the world. TechWeb News (May 7), http://www.networkcomputing .com/data-protection/sasser- worm-impacted-businesses-around -the-world. php.
    • (2004) TechWeb News
    • Keizer, G.1
  • 43
    • 79956067614 scopus 로고    scopus 로고
    • FAQ: The Monster.com mess
    • (August 24)
    • Keizer, G. 2007. FAQ: The Monster.com mess. Computerworld (August 24), http://www.computerworld.com/s/article/ 9032518/FAQ-The-Monster.com-mess.
    • (2007) Computerworld
    • Keizer, G.1
  • 44
    • 79956099191 scopus 로고    scopus 로고
    • Researchers wait for Downadup worm's second act
    • (January 23)
    • Keizer, G. 2009. Researchers wait for Downadup worm's second act. Computerworld (January 23), http://www.computerworld .com/s/article/9126691/ Researchers-wait-for-Downadup-worm-s-second-act.
    • (2009) Computerworld
    • Keizer, G.1
  • 45
    • 79956080001 scopus 로고    scopus 로고
    • Pwn2Own winner tells Apple, Microsoft to find their own bugs
    • (March 25)
    • Keizer, G. 2010. Pwn2Own winner tells Apple, Microsoft to find their own bugs. Computerworld (March 25), http://www .computerworld.com/s/article/9174120/ Pwn2Own-winner-tells-Apple-Microsoft-to-find-their-own-bugs.
    • (2010) Computerworld
    • Keizer, G.1
  • 46
    • 72449167415 scopus 로고    scopus 로고
    • An economic analysis of the software market with a risk-sharing contract
    • Kim, B. C., P. Chen, T. Mukhopadhyay. 2010a. An economic analysis of the software market with a risk-sharing contract. Internat. J. Electronic Commerce 14(2) 7-39.
    • (2010) Internat. J. Electronic Commerce , vol.14 , Issue.2 , pp. 7-39
    • Kim, B.C.1    Chen, P.2    Mukhopadhyay, T.3
  • 47
    • 79960144492 scopus 로고    scopus 로고
    • The effect of liability and patch release on software security: The monopoly case
    • ePub ahead of print October 19
    • Kim, B. C., P. Chen, T. Mukhopadhyay. 2010b. The effect of liability and patch release on software security: The monopoly case. Production Oper. Management, ePub ahead of print October 19, http://onlinelibrary. wiley.com/doi/10. 1111/j. 1937-5956. 2010. 01189. x/full.
    • (2010) Production Oper. Management
    • Kim, B.C.1    Chen, P.2    Mukhopadhyay, T.3
  • 48
    • 0000274841 scopus 로고
    • Expost liability for harm vs. ex ante safety regulation: Substitutes or complements?
    • Kolstad, C. D., T. S. Ulen, G. V. Johnson. 1990. Ex post liability for harm vs. ex ante safety regulation: Substitutes or complements? Amer. Econom. Rev. 80(4) 888-901.
    • (1990) Amer. Econom. Rev. , vol.80 , Issue.4 , pp. 888-901
    • Kolstad, C.D.1    Ulen, T.S.2    Johnson, G.V.3
  • 49
    • 84960534381 scopus 로고    scopus 로고
    • Bush approves cybersecurity strategy
    • (January 31)
    • Krebs, B. 2003. Bush approves cybersecurity strategy. Washington Post (January 31), http://www.washingtonpost.com/.
    • (2003) Washington Post
    • Krebs, B.1
  • 50
    • 79956140021 scopus 로고    scopus 로고
    • Should e-mail addresses be considered private data?
    • (October 19)
    • Krebs, B. 2007. Should e-mail addresses be considered private data? Washington Post (October 19), http://voices . washingtonpost.com/securityfix/ 2007/10/database-theft-leads-to-target.html.
    • (2007) Washington Post
    • Krebs, B.1
  • 51
    • 0000517047 scopus 로고
    • The dynamics of incentive contracts
    • Laffont, J. -J., J. Tirole. 1988. The dynamics of incentive contracts. Econometrica 56(5) 1153-1175.
    • (1988) Econometrica , vol.56 , Issue.5 , pp. 1153-1175
    • Laffont J., -J.1    Tirole, J.2
  • 53
    • 79956161527 scopus 로고    scopus 로고
    • Innovation and cybersecurity regulation
    • (March 31)
    • Lewis, J. 2009. Innovation and cybersecurity regulation. CircleID (March 31), http://www.circleid.com/posts/20090331-innovation-and-cybersecurity- regulation/.
    • (2009) CircleID
    • Lewis, J.1
  • 54
    • 38249034455 scopus 로고
    • Optimal research for cournot oligopolists
    • Li, L., R. D. McKelvey, T. Page. 1987. Optimal research for cournot oligopolists. J. Econom. Theory 42(1) 140-166.
    • (1987) J. Econom. Theory , vol.42 , Issue.1 , pp. 140-166
    • Li, L.1    McKelvey, R.D.2    Page, T.3
  • 55
    • 0000852455 scopus 로고
    • Investments, holdup, and the form of market contracts
    • MacLeod, W. B., J. M. Malcomson. 1993. Investments, holdup, and the form of market contracts. Amer. Econom. Rev. 83(4) 811-837.
    • (1993) Amer. Econom. Rev. , vol.83 , Issue.4 , pp. 811-837
    • MacLeod, W.B.1    Malcomson, J.M.2
  • 56
    • 79956126097 scopus 로고    scopus 로고
    • Defying experts, rogue computer code still lurks
    • (August 26)
    • Markoff, J. 2009. Defying experts, rogue computer code still lurks. New York Times (August 26), http://www.nytimes.com/ 2009/08/27/technology/27compute. html.
    • (2009) New York Times
    • Markoff, J.1
  • 57
    • 79956071826 scopus 로고    scopus 로고
    • Zero day attack imminent
    • (February 3)
    • McBride, S. 2005. Zero day attack imminent. Computerworld (February 3), http://www.computerworld.com. au/article/1535/zero-day-attack-imminent/.
    • (2005) Computerworld
    • McBride, S.1
  • 58
    • 79956107135 scopus 로고    scopus 로고
    • Buggy McAfee update whacks Windows XP PCs
    • (April 21)
    • McCullagh, D. 2010. Buggy McAfee update whacks Windows XP PCs. CNET News (April 21), http://news.cnet.com/8301-1009-3-20003074-83.html.
    • (2010) CNET News
    • McCullagh, D.1
  • 59
    • 0347417615 scopus 로고
    • Products liability: Implications of some changing property rights. Quart. J. Econom. 84(4) 611-626. McKean, R. N. 1970b. Products liability: Trends and implications
    • McKean, R. N. 1970a. Products liability: Implications of some changing property rights. Quart. J. Econom. 84(4) 611-626. McKean, R. N. 1970b. Products liability: Trends and implications. Univ. Chicago Law Rev. 38(1) 3-63.
    • (1970) Univ. Chicago Law Rev. , vol.38 , Issue.1 , pp. 3-63
    • McKean, R.N.1
  • 61
    • 0011582206 scopus 로고    scopus 로고
    • Asymptotic efficiency in dynamic principalagent problems
    • Muller, H. M. 2000. Asymptotic efficiency in dynamic principalagent problems. J. Econom. Theory 91(2) 292-301.
    • (2000) J. Econom. Theory , vol.91 , Issue.2 , pp. 292-301
    • Muller, H.M.1
  • 62
    • 79956107659 scopus 로고    scopus 로고
    • National Infrastructure Advisory Council. The national strategy to secure cyberspace. Report U. S. Department of Homeland Security, Washington, DC
    • National Infrastructure Advisory Council. 2003. The national strategy to secure cyberspace. Report, U. S. Department of Homeland Security, Washington, DC, http://www.dhs. gov/ xlibrary/assets/National-Cyberspace-Strategy.pdf.
    • (2003)
  • 63
    • 0015602538 scopus 로고
    • The economics of product safety
    • Oi, W. Y. 1973. The economics of product safety. Bell J. Econom. Management Sci. 4(1) 3-28.
    • (1973) Bell J. Econom. Management Sci. , vol.4 , Issue.1 , pp. 3-28
    • Oi, W.Y.1
  • 64
    • 2342631845 scopus 로고    scopus 로고
    • Regulation and information security: Can Y2K lessons help us?
    • Payne, J. E. 2004. Regulation and information security: Can Y2K lessons help us? IEEE Security & Privacy 2(2) 32-35.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.2 , pp. 32-35
    • Payne, J.E.1
  • 65
    • 0000779299 scopus 로고    scopus 로고
    • Efficiency and information aggregation in auctions
    • Pesendorfer, W., J. M. Swinkels. 2000. Efficiency and information aggregation in auctions. Amer. Econom. Rev. 90(3) 499-525.
    • (2000) Amer. Econom. Rev. , vol.90 , Issue.3 , pp. 499-525
    • Pesendorfer, W.1    Swinkels, J.M.2
  • 66
    • 78650760369 scopus 로고    scopus 로고
    • Information security: User precautions, attacker efforts, and enforcement
    • IEEE Computer Science, Los Alamitos, CA
    • Png, I. P. L., Q. -H. Wang. 2009. Information security: User precautions, attacker efforts, and enforcement. Proc. 42nd Hawaii Internat. Conf. System Sci., IEEE Computer Science, Los Alamitos, CA, 1-11.
    • (2009) Proc. 42nd Hawaii Internat. Conf. System Sci. , pp. 1-11
    • Png, I.P.L.1    Wang, Q.-H.2
  • 67
    • 0000345134 scopus 로고
    • Strict liability vs. negligence in a market setting
    • Polinsky, A. M. 1980. Strict liability vs. negligence in a market setting. Amer. Econom. Rev. Papers Proc. 70(2) 363-367.
    • (1980) Amer. Econom. Rev. Papers Proc. , vol.70 , Issue.2 , pp. 363-367
    • Polinsky, A.M.1
  • 68
    • 33745446320 scopus 로고    scopus 로고
    • Slammer worm crashed Ohio nuke plant network
    • (August 19)
    • Poulsen, K. 2003. Slammer worm crashed Ohio nuke plant network. SecurityFocus (August 19), http://www.securityfocus .com/news/6767.
    • (2003) SecurityFocus
    • Poulsen, K.1
  • 69
    • 67649548424 scopus 로고    scopus 로고
    • Choice and chance: A conceptual model of paths to information security compromise
    • Ransbotham, S., S. Mitra. 2009. Choice and chance: A conceptual model of paths to information security compromise. Inform. Systems Res. 20(1) 121-139.
    • (2009) Inform. Systems Res. , vol.20 , Issue.1 , pp. 121-139
    • Ransbotham, S.1    Mitra, S.2
  • 71
    • 0002623272 scopus 로고
    • Equilibrium in supergames with the overtaking criterion
    • Rubinstein, A. 1979. Equilibrium in supergames with the overtaking criterion. J. Econom. Theory 21(1) 1-9.
    • (1979) J. Econom. Theory , vol.21 , Issue.1 , pp. 1-9
    • Rubinstein, A.1
  • 72
    • 3042744350 scopus 로고    scopus 로고
    • Two views on security software liability: Let the legal system decide
    • Ryan, D. J. 2003. Two views on security software liability: Let the legal system decide. IEEE Security & Privacy 1(1) 70-72.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 70-72
    • Ryan, D.J.1
  • 73
    • 78650325121 scopus 로고    scopus 로고
    • SANS Institute. Report, SANS Institute, Bethesda, MD
    • SANS Institute. 2009. The top cyber security risks. Report, SANS Institute, Bethesda, MD.
    • (2009) The Top Cyber Security Risks
  • 74
    • 22444446684 scopus 로고    scopus 로고
    • It depends on what you pay
    • DOI 10.1109/MSP.2005.72
    • Schneider, F. B. 2005. It depends on what you pay. IEEE Security & Privacy 3(3) 3. (Pubitemid 40860465)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 3
    • Schneider, F.B.1
  • 75
    • 70849109374 scopus 로고    scopus 로고
    • Information security: How liable should vendors be?
    • (October 28)
    • Schneier, B. 2004. Information security: How liable should vendors be? Computerworld (October 28), http://www.computerworld .com/s/article/96948/ Information-security-How-liable-should-vendors-be-.
    • (2004) Computerworld
    • Schneier, B.1
  • 76
    • 79956091894 scopus 로고    scopus 로고
    • Software makers should take responsibility
    • (July 17)
    • Schneier, B. 2008. Software makers should take responsibility. The Guardian (July 17), http://www.guardian.co.uk/technology/ 2008/jul/17/internet. security.
    • (2008) The Guardian
    • Schneier, B.1
  • 77
    • 33645402013 scopus 로고    scopus 로고
    • Emerging technology: Patch me if you can!
    • August 5
    • Schweitzer, D. 2003. Emerging technology: Patch me if you can! NetworkMagazine.com. (August 5).
    • (2003) NetworkMagazine.com.
    • Schweitzer, D.1
  • 78
    • 0000555891 scopus 로고
    • On liability and insurance
    • Shavell, S. 1982. On liability and insurance. Bell J. Econom. 13(1) 120-132.
    • (1982) Bell J. Econom. , vol.13 , Issue.1 , pp. 120-132
    • Shavell, S.1
  • 79
    • 79956064001 scopus 로고    scopus 로고
    • Zero-day Malware attacks you can't block
    • (February 21)
    • Singel, R. 2007. Zero-day Malware attacks you can't block. PC World (February 21), http://www.pcworld.com/article/129020/zeroday-malware-attacks- you-cant-block.html.
    • (2007) PC World
    • Singel, R.1
  • 80
    • 84959825935 scopus 로고
    • Consumer misperceptions, product failure and producer liability
    • Spence, M. 1977. Consumer misperceptions, product failure and producer liability. Rev. Econom. Stud. 44(3) 561-572.
    • (1977) Rev. Econom. Stud. , vol.44 , Issue.3 , pp. 561-572
    • Spence, M.1
  • 83
    • 79956125147 scopus 로고    scopus 로고
    • U. S. Department of Homeland Security. National strategy for homeland security, October Homeland Security Council, Washington, DC
    • U. S. Department of Homeland Security. 2007. National strategy for homeland security, October. Homeland Security Council, Washington, DC.
    • (2007)
  • 84
    • 0012414932 scopus 로고    scopus 로고
    • U. S. Department of Transportation. Report, National Highway Traffic Safety Administration, Washington, DC.
    • U. S. Department of Transportation. 2004. Federal motor vehicle safety standards and regulations. Report, National Highway Traffic Safety Administration, Washington, DC. http://www . nhtsa. gov/cars/rules/standards/ FMVSS-Regs/index.htm.
    • (2004) Federal Motor Vehicle Safety Standards and Regulations
  • 86
    • 85050648964 scopus 로고
    • Product liability, research and development, and innovation
    • Viscusi, W. K., M. J. Moore. 1993. Product liability, research and development, and innovation. J. Political Econom. 101(1) 161-184.
    • (1993) J. Political Econom. , vol.101 , Issue.1 , pp. 161-184
    • Viscusi, W.K.1    Moore, M.J.2
  • 87
    • 67649987507 scopus 로고    scopus 로고
    • RFQ auctions with supplier qualification screening
    • Wan, Z., D. Beil. 2009. RFQ auctions with supplier qualification screening. Oper. Res. 57(4) 934-949.
    • (2009) Oper. Res. , vol.57 , Issue.4 , pp. 934-949
    • Wan, Z.1    Beil, D.2
  • 88
    • 79956126608 scopus 로고    scopus 로고
    • "All hands on deck" as FDA aims to fix food safety
    • (July 7)
    • Weise, E. 2009. "All hands on deck" as FDA aims to fix food safety. USA Today (July 7), http://www.usatoday.com/ news/health/2009-07-07- food-safety-guidelines-N.htm.
    • (2009) USA Today
    • Weise, E.1
  • 89
    • 79956120631 scopus 로고    scopus 로고
    • Software crackdown
    • (July 25)
    • Werth, C. 2009. Software crackdown. Newsweek (July 25), http:// www.newsweek.com/2009/07/25/software-crackdown.html.
    • (2009) Newsweek
    • Werth, C.1
  • 90
    • 79956113205 scopus 로고    scopus 로고
    • Google attackers gained access to computer code
    • (April 20).
    • Worthen, B., J. E. Vascellaro. 2010. Google attackers gained access to computer code. Wall Street Journal (April 20). http://online. wsj.com/ article/SB10001424052748703757504575194873659727984.html.
    • (2010) Wall Street Journal
    • Worthen, B.1    Vascellaro, J.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.