-
1
-
-
84925838576
-
Why information security is hard - An economic perspective
-
December 10-14, New Orleans, LA
-
Anderson, R., 2001. Why information security is hard - an economic perspective. Proceeding, 17th Annual Computer Security Applications Conference, December 10-14, New Orleans, LA.
-
(2001)
Proceeding, 17th Annual Computer Security Applications Conference
-
-
Anderson, R.1
-
2
-
-
33750440197
-
The economics of information security
-
DOI 10.1126/science.1130992
-
Anderson, R., T. Moore,. 2006. The economics of information security. Science 314 (5799): 610-613. (Pubitemid 44646376)
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
3
-
-
0012934466
-
Software product liability
-
Carnegie Mellon University, Pittsburgh, PA
-
Armour, J., W. S. Humphrey,. 1993. Software product liability. Technical Report CMU/SEI-93-TR-13, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
-
(1993)
Technical Report CMU/SEI-93-TR-13, Software Engineering Institute
-
-
Armour, J.1
Humphrey, W.S.2
-
4
-
-
33644916146
-
Sell first, fix later
-
Manage. Sci.
-
Arora, A., J. Caulkins, R. Telang,. 2006. Sell first, fix later: Impact of patch release on software quality. Manage. Sci. 52 (3): 465-471.
-
(2006)
Impact of Patch Release on Software Quality
, vol.52
, Issue.3
, pp. 465-471
-
-
Arora, A.1
Caulkins, J.2
Telang, R.3
-
5
-
-
61849175198
-
Optimal policy for software vulnerability disclosure
-
Arora, A., R. Telang, H. Xu,. 2007. Optimal policy for software vulnerability disclosure. Manage. Sci. 54 (4): 642-656.
-
(2007)
Manage. Sci.
, vol.54
, Issue.4
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
6
-
-
33750703619
-
Network software security and user incentives
-
DOI 10.1287/mnsc.1060.0568
-
August, T., T. Tunca,. 2006. Network software security and user incentives. Manage. Sci. 52 (11): 1703-1720. (Pubitemid 44706077)
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.I.2
-
7
-
-
61349202831
-
Let the pirates patch? An economic analysis of software security patch restrictions
-
August, T., T. Tunca,. 2008. Let the pirates patch? An economic analysis of software security patch restrictions. Inf. Syst. Res. 19 (1): 48-70.
-
(2008)
Inf. Syst. Res.
, vol.19
, Issue.1
, pp. 48-70
-
-
August, T.1
Tunca, T.2
-
9
-
-
61849135265
-
Security patch management
-
Manage. Sci.
-
Cavusoglu, H., H. Cavusoglu, J. Zhang,. 2008. Security patch management: Share the burden or share the damage. Manage. Sci. 54 (4): 657-670.
-
(2008)
Share the Burden or Share the Damage
, vol.54
, Issue.4
, pp. 657-670
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Zhang, J.3
-
11
-
-
0001648297
-
Single activity accidents
-
Diamond, P., 1974. Single activity accidents. J. Leg. Stud. 3 (1): 107-164.
-
(1974)
J. Leg. Stud.
, vol.3
, Issue.1
, pp. 107-164
-
-
Diamond, P.1
-
12
-
-
61849090657
-
Contracts getting tough on security
-
April 15
-
Fisher, D., 2002. Contracts getting tough on security. eWeek, April 15.
-
(2002)
EWeek
-
-
Fisher, D.1
-
13
-
-
79960122923
-
Causes & remedies for social acceptance of network insecurity
-
May 16-17, Berkeley, CA
-
Fisk, M., 2002. Causes & remedies for social acceptance of network insecurity. Presentation, 1st Workshop on Economics and Information Security, May 16-17, Berkeley, CA.
-
(2002)
Presentation, 1st Workshop on Economics and Information Security
-
-
Fisk, M.1
-
14
-
-
0001846369
-
Warranties as a signal of quality
-
Gal-Or, E., 1989. Warranties as a signal of quality. Can. J. Econ. 22 (1): 50-61.
-
(1989)
Can. J. Econ.
, vol.22
, Issue.1
, pp. 50-61
-
-
Gal-Or, E.1
-
15
-
-
34548732031
-
-
accessed date March 15, 2010
-
Gates, B., 2002. Bill Gates: Trustworthy computing. Available at http://www.wired.com/techbiz/media/news/2002/01/49826 (accessed date March 15, 2010).
-
(2002)
Bill Gates: Trustworthy Computing
-
-
Gates, B.1
-
16
-
-
0000465144
-
The informational role of warranties and private disclosure about product quality
-
Grossman, S., 1981. The informational role of warranties and private disclosure about product quality. J. Law Econ. 24 (3): 461-483.
-
(1981)
J. Law Econ.
, vol.24
, Issue.3
, pp. 461-483
-
-
Grossman, S.1
-
17
-
-
34249111612
-
Digital vandalism spurs a call for oversight
-
September 1
-
Harmon, A., 2003. Digital vandalism spurs a call for oversight. New York Times, September 1.
-
(2003)
New York Times
-
-
Harmon, A.1
-
18
-
-
3042780586
-
Two views on security software liability
-
IEEE Secur. Priv.
-
Heckman, C., 2003. Two views on security software liability: Using the right legal tools. IEEE Secur. Priv. 1 (1): 73-75.
-
(2003)
Using the Right Legal Tools
, vol.1
, Issue.1
, pp. 73-75
-
-
Heckman, C.1
-
19
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
DOI 10.1287/mnsc.1040.0357
-
Kannan, K., R. Telang,. 2005. Market for software vulnerabilities? Think again. Manage. Sci. 51 (5): 726-740. (Pubitemid 40867140)
-
(2005)
Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
20
-
-
72449167415
-
An economic analysis of the software market with a risk-sharing mechanism
-
Kim, B. C., P. Chen, T. Mukhopadhyay,. 2010. An economic analysis of the software market with a risk-sharing mechanism. Int. J. Electron. Commer. 14 (2): 7-39.
-
(2010)
Int. J. Electron. Commer.
, vol.14
, Issue.2
, pp. 7-39
-
-
Kim, B.C.1
Chen, P.2
Mukhopadhyay, T.3
-
21
-
-
79960127594
-
Strategic patch release and patch-pricing in the presence of dual network effects
-
Rochester, NY
-
Lahiri, A., 2007. Strategic patch release and patch-pricing in the presence of dual network effects. Working paper FR 07-13, Simon Graduate School of Business, Rochester, NY.
-
(2007)
Working Paper FR 07-13, Simon Graduate School of Business
-
-
Lahiri, A.1
-
22
-
-
34547375715
-
Value-driven creation of functionality in software projects
-
Prod. Oper. Manag.
-
Liu, D., M. Dawande, V. Mookerjee,. 2007. Value-driven creation of functionality in software projects: Optimal sequencing and reuse. Prod. Oper. Manag. 16 (3): 381-399.
-
(2007)
Optimal Sequencing and Reuse
, vol.16
, Issue.3
, pp. 381-399
-
-
Liu, D.1
Dawande, M.2
Mookerjee, V.3
-
23
-
-
2342581753
-
From the ground up
-
IEEE Secur. Priv.
-
McGraw, G., 2003. From the ground up: The DIMACS software security workshop. IEEE Secur. Priv. 1 (2): 59-66.
-
(2003)
The DIMACS Software Security Workshop
, vol.1
, Issue.2
, pp. 59-66
-
-
McGraw, G.1
-
24
-
-
49349126835
-
Monopoly and product quality
-
Mussa, M., S. Rosen,. 1978. Monopoly and product quality. J. Econ. Theory 18: 301-317.
-
(1978)
J. Econ. Theory
, vol.18
, pp. 301-317
-
-
Mussa, M.1
Rosen, S.2
-
25
-
-
38249034809
-
Litigation, liability and incentives for care
-
P'ng, I., 1987. Litigation, liability and incentives for care. J. Public Econ. 34 (1): 61-85.
-
(1987)
J. Public Econ.
, vol.34
, Issue.1
, pp. 61-85
-
-
P'Ng, I.1
-
26
-
-
0001294457
-
Minimum quality standards, fixed costs, and competition
-
Ronnen, U., 1991. Minimum quality standards, fixed costs, and competition. RAND J. Econ. 22: 490-504.
-
(1991)
RAND J. Econ.
, vol.22
, pp. 490-504
-
-
Ronnen, U.1
-
27
-
-
3042744350
-
Two views on security software liability
-
IEEE Secur. Priv.
-
Ryan, D. J., 2003. Two views on security software liability: Let the legal system decide. IEEE Secur. Priv. 1 (1): 70-72.
-
(2003)
Let the Legal System Decide
, vol.1
, Issue.1
, pp. 70-72
-
-
Ryan, D.J.1
-
28
-
-
79960138317
-
The best way to make software secure: Liability
-
March 18
-
Sager, I., J. Green,. 2002. The best way to make software secure: Liability. Business Week, March 18, 61.
-
(2002)
Business Week
, pp. 61
-
-
Sager, I.1
Green, J.2
-
29
-
-
70849109374
-
Information security: How liable should vendors be?
-
October 28
-
Schneier, B., 2004. Information security: How liable should vendors be? Computerworld, October 28.
-
(2004)
Computerworld
-
-
Schneier, B.1
-
30
-
-
37949039265
-
Imperfect information, costly litigation, and product quality
-
Simon, M., 1981. Imperfect information, costly litigation, and product quality. Bell J. Econ. 12 (1): 171-184.
-
(1981)
Bell J. Econ.
, vol.12
, Issue.1
, pp. 171-184
-
-
Simon, M.1
-
31
-
-
84873321089
-
Monopoly, quality, and regulation
-
Spence, M., 1975. Monopoly, quality, and regulation. Bell J. Econ. 6: 417-429.
-
(1975)
Bell J. Econ.
, vol.6
, pp. 417-429
-
-
Spence, M.1
-
32
-
-
84959825935
-
Consumer misperceptions, product failure and producer liability
-
Spence, M., 1977. Consumer misperceptions, product failure and producer liability. Rev. Econ. Stud. 44 (3): 561-572.
-
(1977)
Rev. Econ. Stud.
, vol.44
, Issue.3
, pp. 561-572
-
-
Spence, M.1
-
33
-
-
21844520315
-
Product and price competition in a two-dimensional vertical differentiation model
-
Vandenbosch, B., C. Weinberg,. 1995. Product and price competition in a two-dimensional vertical differentiation model. Mark. Sci. 14 (2): 224-249.
-
(1995)
Mark. Sci.
, vol.14
, Issue.2
, pp. 224-249
-
-
Vandenbosch, B.1
Weinberg, C.2
-
34
-
-
0344792106
-
Managing online security risks
-
June 1
-
Varian, H. R., 2000. Managing online security risks. New York Times, June 1.
-
(2000)
New York Times
-
-
Varian, H.R.1
-
35
-
-
79960131989
-
Software failure cited in blackout investigation
-
November 24
-
Verton, D., 2003. Software failure cited in blackout investigation. Computerworld, November 24.
-
(2003)
Computerworld
-
-
Verton, D.1
-
37
-
-
84941158228
-
Cyberinsurance: A market solution to the Internet security market failure
-
May 16-17, Berkeley, CA
-
Yurcik, W., D. Doss,. 2002. Cyberinsurance: A market solution to the Internet security market failure. Presentation, 1st Workshop on Economics and Information Security, May 16-17, Berkeley, CA.
-
(2002)
Presentation, 1st Workshop on Economics and Information Security
-
-
Yurcik, W.1
Doss, D.2
|