메뉴 건너뛰기




Volumn 29, Issue 2, 2012, Pages 77-108

Hacker behavior, network effects, and the security software market

Author keywords

Market structure; Mass attacks; Negative network effect; Network effect; Oligopoly; Pricing; Security software; Strategic hacker; Targeted attacks

Indexed keywords

MARKET STRUCTURES; MASS ATTACKS; NETWORK EFFECTS; OLIGOPOLY; SECURITY SOFTWARE; STRATEGIC HACKER; TARGETED ATTACKS;

EID: 84870616747     PISSN: 07421222     EISSN: None     Source Type: Journal    
DOI: 10.2753/MIS0742-1222290204     Document Type: Article
Times cited : (44)

References (43)
  • 1
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • DOI 10.1126/science.1130992
    • Anderson, R., and Moore, T. The economics of information security. Science, 314, 5799 (October 2006), 610-613. (Pubitemid 44646376)
    • (2006) Science , vol.314 , Issue.5799 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 2
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • DOI 10.1287/mnsc.1060.0568
    • August, T., and Tunca, T.I. Network software security and user incentives. Management Science, 52, 11 (2006), 1703-1720. (Pubitemid 44706077)
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 3
    • 61349202831 scopus 로고    scopus 로고
    • Let the pirates patch? An economic analysis of software security patch restrictions
    • August, T., and Tunca, T.I. Let the pirates patch? An economic analysis of software security patch restrictions. Information Systems Research, 19, 1 (2008), 48-70.
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 48-70
    • August, T.1    Tunca, T.I.2
  • 4
    • 78049422923 scopus 로고    scopus 로고
    • Win32/Blaster: A case study from Microsoft's perspective
    • Paper presented at, Dublin, Ireland, October 7
    • Braverman, M. Win32/Blaster: A case study from Microsoft's perspective. Paper presented at the Virus Bulletin Conference, Dublin, Ireland, October 7 2005.
    • (2005) The Virus Bulletin Conference
    • Braverman, M.1
  • 5
    • 0006298293 scopus 로고    scopus 로고
    • Network externalities in microcomputer software: An econometric analysis of the spreadsheet market
    • Brynjolfsson, E., and Kemerer, C. Network externalities in microcomputer software: An econometric analysis of the spreadsheet market. Management Science, 42, 12 (1996), 1627-1647. (Pubitemid 126584790)
    • (1996) Management Science , vol.42 , Issue.12 , pp. 1627-1647
    • Brynjolfsson, E.1    Kemerer, C.F.2
  • 6
    • 32644462017 scopus 로고    scopus 로고
    • Pricing security: A market in vulnerabilities
    • L.J. Camp and S. Lewis (eds.), New York: Kluwer Academic
    • Camp, L.J., and Wolfram, C. Pricing security: A market in vulnerabilities. In L.J. Camp and S. Lewis (eds.), Economics of Information Security, Advances in Information Security, vol. 12. New York: Kluwer Academic, 2004, pp. 17-34.
    • (2004) Economics of Information Security, Advances in Information Security , vol.12 , pp. 17-34
    • Camp, L.J.1    Wolfram, C.2
  • 7
    • 66549093519 scopus 로고    scopus 로고
    • Decision-theoretic and game-theoretic approaches to IT security investment
    • Fall
    • Cavusoglu, H.; Raghunathan, S.; and Yue, W.T. Decision-theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems, 25, 2 (Fall 2008), 281-304.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 281-304
    • Cavusoglu, H.1    Raghunathan, S.2    Yue, W.T.3
  • 8
    • 77749320098 scopus 로고    scopus 로고
    • Risks and benefits of signaling information system characteristics to strategic attackers
    • Winter
    • Cremonini, M., and Nizovtsev, D. Risks and benefits of signaling information system characteristics to strategic attackers. Journal of Management Information Systems, 26, 3 (Winter 2009-10), 241-274.
    • (2009) Journal of Management Information Systems , vol.26 , Issue.3 , pp. 241-274
    • Cremonini, M.1    Nizovtsev, D.2
  • 9
    • 84870597924 scopus 로고    scopus 로고
    • Microsoft practices predatory pricing
    • June
    • Eckelberry, A. Microsoft practices predatory pricing. Sunbeltblog, June 2006 (available at www.gfi.com/blog/microsoft-practices-predatory-pricing/).
    • (2006) Sunbeltblog
    • Eckelberry, A.1
  • 10
    • 84870624656 scopus 로고    scopus 로고
    • McAfee releases online banking safety guide for the 47 percent of consumers who are underprotected
    • McAfee, Santa Clara, CA, August
    • Eichorn, K., and Smith, J. McAfee releases online banking safety guide for the 47 percent of consumers who are underprotected. Press Release, McAfee, Santa Clara, CA, August 2011 (available at www.mcafee.com/us/about/news/2011/q3/ 20110803-01.aspx).
    • (2011) Press Release
    • Eichorn, K.1    Smith, J.2
  • 11
    • 84870596677 scopus 로고    scopus 로고
    • Email attacks: This time it's personal
    • San Jose, CA, June
    • Email attacks: This time it's personal. Cisco Security White Paper, San Jose, CA, June 2011 (available at www.cisco.com/en/US/prod/collateral/vpndevc/ ps10128/ps10339/ps10354/ targeted-attacks.pdf).
    • (2011) Cisco Security White Paper
  • 12
    • 0000150059 scopus 로고
    • Installed base and compatibility: Innovation, product preannouncements, and predation
    • Farrell, J., and Saloner, G. Installed base and compatibility: Innovation, product preannouncements, and predation. American Economic Review, 76, 5 (1986), 940-955.
    • (1986) American Economic Review , vol.76 , Issue.5 , pp. 940-955
    • Farrell, J.1    Saloner, G.2
  • 13
    • 0001400146 scopus 로고
    • Entry (and exit) in a differentiated industry
    • Gabszewicz, J.J., and Thisse, J.-F. Entry (and exit) in a differentiated industry. Journal of Economic Theory, 22, 2 (1980), 327-338.
    • (1980) Journal of Economic Theory , vol.22 , Issue.2 , pp. 327-338
    • Gabszewicz, J.J.1    Thisse, J.-F.2
  • 14
    • 77957089023 scopus 로고    scopus 로고
    • The impact of malicious agents on the enterprise software industry
    • Galbreth, M.R., and Shor, M. The impact of malicious agents on the enterprise software industry. MIS Quarterly, 34, 3 (2010), 595-612.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 595-612
    • Galbreth, M.R.1    Shor, M.2
  • 15
    • 84870579395 scopus 로고    scopus 로고
    • Gartner says security software revenue totaled $7.4 billion in 2005
    • Gartner, Stamford, CT, September
    • Gartner says security software revenue totaled $7.4 billion in 2005. Press Release, Gartner, Stamford, CT, September 2006 (available at www.gartner.com/it/page.jsp?id=496491/).
    • (2006) Press Release
  • 16
    • 84870621827 scopus 로고    scopus 로고
    • Gartner says security software market grew 12 percent in 2010
    • Gartner, Stamford, CT, June
    • Gartner says security software market grew 12 percent in 2010. Press Release, Gartner, Stamford, CT, June 2011 (available at www.gartner.com/it/page. jsp?id=1714714/).
    • (2011) Press Release
  • 17
    • 2942672297 scopus 로고    scopus 로고
    • The birth of a new industry: Entry by start-ups and the drivers of vendor growth: The case of encryption software
    • Giarratana, M.S. The birth of a new industry: Entry by start-ups and the drivers of vendor growth: The case of encryption software. Research Policy, 33, 5 (2004), 787-806.
    • (2004) Research Policy , vol.33 , Issue.5 , pp. 787-806
    • Giarratana, M.S.1
  • 18
    • 34249006577 scopus 로고    scopus 로고
    • Product strategies and survival in Schumpeterian environments: Evidence from the U.S. security software industry
    • Giarratana, M.S., and Fosfuri, A. Product strategies and survival in Schumpeterian environments: Evidence from the U.S. security software industry. Organization Studies, 28, 6 (2007), 909-929.
    • (2007) Organization Studies , vol.28 , Issue.6 , pp. 909-929
    • Giarratana, M.S.1    Fosfuri, A.2
  • 19
    • 84863278214 scopus 로고    scopus 로고
    • Botnets: Size isn't everything, says new report
    • August 3
    • Goodchild, J. Botnets: Size isn't everything, says new report. Computerworld, August 3, 2011 (available at http://news.idg.no/cw/art.cfm?id= E795F760-1A64-6A71- CEE2E437E7955007/).
    • (2011) Computerworld
    • Goodchild, J.1
  • 21
    • 33745210521 scopus 로고    scopus 로고
    • Budgeting process for information security expenditures
    • Gordon, L.A., and Loeb, M.P. Budgeting process for information security expenditures. Communications of the ACM, 49, 1 (2006), 121-125.
    • (2006) Communications of the ACM , vol.49 , Issue.1 , pp. 121-125
    • Gordon, L.A.1    Loeb, M.P.2
  • 22
    • 66549117052 scopus 로고    scopus 로고
    • Investments in information security: A real options perspective with Bayesian postaudit
    • Winter
    • Herath, H.S.B., and Herath, T.C. Investments in information security: A real options perspective with Bayesian postaudit. Journal of Management Information Systems, 25, 3 (Winter 2008-9), 337-375.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.3 , pp. 337-375
    • Herath, H.S.B.1    Herath, T.C.2
  • 23
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • Hethcote, H.W. The mathematics of infectious diseases. SIAM Review, 42, 4 (2000), 599-653.
    • (2000) SIAM Review , vol.42 , Issue.4 , pp. 599-653
    • Hethcote, H.W.1
  • 24
    • 0002860654 scopus 로고
    • Stability in competition
    • Hotelling, H. Stability in competition. Economic Journal, 39, 153 (1929), 41-57.
    • (1929) Economic Journal , vol.39 , Issue.153 , pp. 41-57
    • Hotelling, H.1
  • 25
    • 85020616309 scopus 로고
    • Network externalities, competition and compatibility
    • Katz, M.L., and Shapiro, C. Network externalities, competition and compatibility. American Economic Review, 75, 3 (1985), 424-440.
    • (1985) American Economic Review , vol.75 , Issue.3 , pp. 424-440
    • Katz, M.L.1    Shapiro, C.2
  • 26
    • 84936407456 scopus 로고
    • Technology adoption in the presence of network externalities
    • Katz, M.L., and Shapiro, C. Technology adoption in the presence of network externalities. Journal of Political Economy, 94, 4 (1986), 822-841.
    • (1986) Journal of Political Economy , vol.94 , Issue.4 , pp. 822-841
    • Katz, M.L.1    Shapiro, C.2
  • 27
    • 84870612756 scopus 로고    scopus 로고
    • Rival calls Microsoft's security pricing "predatory," "ruthless."
    • June
    • Keizer, G. Rival calls Microsoft's security pricing "predatory, " "ruthless." Informwationweek, June 2006 (available at www.informationweek.com/rival-calls-microsofts-securitypricing/ 189600302/).
    • (2006) Informwationweek
    • Keizer, G.1
  • 28
    • 0000648490 scopus 로고
    • Quantity precommitment and Bertrand competition yield Cournot outcomes
    • Autumn
    • Kreps, D.M., and Scheinkman, J.A. Quantity precommitment and Bertrand competition yield Cournot outcomes. Bell Journal of Economics, 14, 2 (Autumn 1983), 326-337.
    • (1983) Bell Journal of Economics , vol.14 , Issue.2 , pp. 326-337
    • Kreps, D.M.1    Scheinkman, J.A.2
  • 29
    • 66549103101 scopus 로고    scopus 로고
    • Understanding the value of countermeasure portfolios in information systems security
    • Fall
    • Kumar, R.L.; Park, S.; and Subramaniam, C. Understanding the value of countermeasure portfolios in information systems security. Journal of Management Information Systems, 25, 2 (Fall 2008), 241-279.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 241-279
    • Kumar, R.L.1    Park, S.2    Subramaniam, C.3
  • 30
    • 84870577191 scopus 로고    scopus 로고
    • Microsoft sweeps into security
    • May 31
    • Lacy, S. Microsoft sweeps into security. Bloomberg Businessweek (May 31, 2006) (available at www.businessweek.com/stories/2006-05-31/microsoft-sweeps- into-security/).
    • (2006) Bloomberg Businessweek
    • Lacy, S.1
  • 31
    • 84861098681 scopus 로고    scopus 로고
    • Revisiting the incentive to tolerate illegal distribution of software products
    • Lahiri, A. Revisiting the incentive to tolerate illegal distribution of software products. Decision Support Systems, 53, 2 (2012), 357-367.
    • (2012) Decision Support Systems , vol.53 , Issue.2 , pp. 357-367
    • Lahiri, A.1
  • 33
    • 84870595271 scopus 로고    scopus 로고
    • Cisco study shows mass phishing attacks down, targeted attacks up
    • July 1
    • Mullins, R. Cisco study shows mass phishing attacks down, targeted attacks up. Network Computing (July 1, 2011) (available at www.networkcomputing. com/wan-security/cisco-studyshows- mass-phishing-attacks/231000854/).
    • (2011) Network Computing
    • Mullins, R.1
  • 34
    • 70449395022 scopus 로고    scopus 로고
    • Information security: Facilitating user precautions vis-à-vis enforcement against attackers
    • Fall
    • Png, I., and Wang, Q.-H. Information security: Facilitating user precautions vis-à-vis enforcement against attackers. Journal of Management Information Systems, 26, 2 (Fall 2009), 97-121.
    • (2009) Journal of Management Information Systems , vol.26 , Issue.2 , pp. 97-121
    • Png, I.1    Wang, Q.-H.2
  • 35
    • 67649548424 scopus 로고    scopus 로고
    • Choice and chance: A conceptual model of paths to information security compromise
    • Ransbotham, S., and Mitra, S. Choice and chance: A conceptual model of paths to information security compromise. Information Systems Research, 20, 1 (2009), 121-139.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 121-139
    • Ransbotham, S.1    Mitra, S.2
  • 36
    • 0001549798 scopus 로고
    • Monopolistic competition with outside goods
    • Spring
    • Salop, S.C. Monopolistic competition with outside goods. Bell Journal of Economics, 10, 1 (Spring 1979), 141-156.
    • (1979) Bell Journal of Economics , vol.10 , Issue.1 , pp. 141-156
    • Salop, S.C.1
  • 37
    • 84870607699 scopus 로고    scopus 로고
    • The future of BOT worms
    • Cupertino, CA
    • Sancho, D. The future of BOT worms. White Paper, Trend Micro, Cupertino, CA, 2005 (available at www.trendmicro.com/cloud-content/us/pdfs/security- intelligence/white-papers/ wp-future-of-bots-final.pdf).
    • (2005) White Paper, Trend Micro
    • Sancho, D.1
  • 38
    • 84870599675 scopus 로고    scopus 로고
    • Security industry market share analysis
    • OPSWAT, San Francisco, March
    • Security industry market share analysis. Market Share Report, OPSWAT, San Francisco, March 2012 (available at www.opswat.com/sites/default/files/OPSWAT- market-share-reportmarch- 2012.pdf).
    • (2012) Market Share Report
  • 40
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    • DOI 10.2753/MIS0742-1222220405
    • Sun, L.; Srivastava, R.P.; and Mock, T.J. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22, 4 (Spring 2006), 109-142. (Pubitemid 44377673)
    • (2006) Journal of Management Information Systems , vol.22 , Issue.4 , pp. 109-142
    • Sun, L.1    Srivastava, R.P.2    Mock, T.J.3
  • 43
    • 0344792106 scopus 로고    scopus 로고
    • Managing online security risks
    • June 1
    • Varian, H.R. Managing online security risks. New York Times (June 1, 2000) (available at www.nytimes.com/library/financial/columns/060100econ-scene. html).
    • (2000) New York Times
    • Varian, H.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.