-
1
-
-
33750440197
-
The economics of information security
-
DOI 10.1126/science.1130992
-
Anderson, R., and Moore, T. The economics of information security. Science, 314, 5799 (October 2006), 610-613. (Pubitemid 44646376)
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
2
-
-
33750703619
-
Network software security and user incentives
-
DOI 10.1287/mnsc.1060.0568
-
August, T., and Tunca, T.I. Network software security and user incentives. Management Science, 52, 11 (2006), 1703-1720. (Pubitemid 44706077)
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.I.2
-
3
-
-
61349202831
-
Let the pirates patch? An economic analysis of software security patch restrictions
-
August, T., and Tunca, T.I. Let the pirates patch? An economic analysis of software security patch restrictions. Information Systems Research, 19, 1 (2008), 48-70.
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 48-70
-
-
August, T.1
Tunca, T.I.2
-
4
-
-
78049422923
-
Win32/Blaster: A case study from Microsoft's perspective
-
Paper presented at, Dublin, Ireland, October 7
-
Braverman, M. Win32/Blaster: A case study from Microsoft's perspective. Paper presented at the Virus Bulletin Conference, Dublin, Ireland, October 7 2005.
-
(2005)
The Virus Bulletin Conference
-
-
Braverman, M.1
-
5
-
-
0006298293
-
Network externalities in microcomputer software: An econometric analysis of the spreadsheet market
-
Brynjolfsson, E., and Kemerer, C. Network externalities in microcomputer software: An econometric analysis of the spreadsheet market. Management Science, 42, 12 (1996), 1627-1647. (Pubitemid 126584790)
-
(1996)
Management Science
, vol.42
, Issue.12
, pp. 1627-1647
-
-
Brynjolfsson, E.1
Kemerer, C.F.2
-
6
-
-
32644462017
-
Pricing security: A market in vulnerabilities
-
L.J. Camp and S. Lewis (eds.), New York: Kluwer Academic
-
Camp, L.J., and Wolfram, C. Pricing security: A market in vulnerabilities. In L.J. Camp and S. Lewis (eds.), Economics of Information Security, Advances in Information Security, vol. 12. New York: Kluwer Academic, 2004, pp. 17-34.
-
(2004)
Economics of Information Security, Advances in Information Security
, vol.12
, pp. 17-34
-
-
Camp, L.J.1
Wolfram, C.2
-
7
-
-
66549093519
-
Decision-theoretic and game-theoretic approaches to IT security investment
-
Fall
-
Cavusoglu, H.; Raghunathan, S.; and Yue, W.T. Decision-theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems, 25, 2 (Fall 2008), 281-304.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 281-304
-
-
Cavusoglu, H.1
Raghunathan, S.2
Yue, W.T.3
-
8
-
-
77749320098
-
Risks and benefits of signaling information system characteristics to strategic attackers
-
Winter
-
Cremonini, M., and Nizovtsev, D. Risks and benefits of signaling information system characteristics to strategic attackers. Journal of Management Information Systems, 26, 3 (Winter 2009-10), 241-274.
-
(2009)
Journal of Management Information Systems
, vol.26
, Issue.3
, pp. 241-274
-
-
Cremonini, M.1
Nizovtsev, D.2
-
9
-
-
84870597924
-
Microsoft practices predatory pricing
-
June
-
Eckelberry, A. Microsoft practices predatory pricing. Sunbeltblog, June 2006 (available at www.gfi.com/blog/microsoft-practices-predatory-pricing/).
-
(2006)
Sunbeltblog
-
-
Eckelberry, A.1
-
10
-
-
84870624656
-
McAfee releases online banking safety guide for the 47 percent of consumers who are underprotected
-
McAfee, Santa Clara, CA, August
-
Eichorn, K., and Smith, J. McAfee releases online banking safety guide for the 47 percent of consumers who are underprotected. Press Release, McAfee, Santa Clara, CA, August 2011 (available at www.mcafee.com/us/about/news/2011/q3/ 20110803-01.aspx).
-
(2011)
Press Release
-
-
Eichorn, K.1
Smith, J.2
-
11
-
-
84870596677
-
Email attacks: This time it's personal
-
San Jose, CA, June
-
Email attacks: This time it's personal. Cisco Security White Paper, San Jose, CA, June 2011 (available at www.cisco.com/en/US/prod/collateral/vpndevc/ ps10128/ps10339/ps10354/ targeted-attacks.pdf).
-
(2011)
Cisco Security White Paper
-
-
-
12
-
-
0000150059
-
Installed base and compatibility: Innovation, product preannouncements, and predation
-
Farrell, J., and Saloner, G. Installed base and compatibility: Innovation, product preannouncements, and predation. American Economic Review, 76, 5 (1986), 940-955.
-
(1986)
American Economic Review
, vol.76
, Issue.5
, pp. 940-955
-
-
Farrell, J.1
Saloner, G.2
-
13
-
-
0001400146
-
Entry (and exit) in a differentiated industry
-
Gabszewicz, J.J., and Thisse, J.-F. Entry (and exit) in a differentiated industry. Journal of Economic Theory, 22, 2 (1980), 327-338.
-
(1980)
Journal of Economic Theory
, vol.22
, Issue.2
, pp. 327-338
-
-
Gabszewicz, J.J.1
Thisse, J.-F.2
-
14
-
-
77957089023
-
The impact of malicious agents on the enterprise software industry
-
Galbreth, M.R., and Shor, M. The impact of malicious agents on the enterprise software industry. MIS Quarterly, 34, 3 (2010), 595-612.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 595-612
-
-
Galbreth, M.R.1
Shor, M.2
-
15
-
-
84870579395
-
Gartner says security software revenue totaled $7.4 billion in 2005
-
Gartner, Stamford, CT, September
-
Gartner says security software revenue totaled $7.4 billion in 2005. Press Release, Gartner, Stamford, CT, September 2006 (available at www.gartner.com/it/page.jsp?id=496491/).
-
(2006)
Press Release
-
-
-
16
-
-
84870621827
-
Gartner says security software market grew 12 percent in 2010
-
Gartner, Stamford, CT, June
-
Gartner says security software market grew 12 percent in 2010. Press Release, Gartner, Stamford, CT, June 2011 (available at www.gartner.com/it/page. jsp?id=1714714/).
-
(2011)
Press Release
-
-
-
17
-
-
2942672297
-
The birth of a new industry: Entry by start-ups and the drivers of vendor growth: The case of encryption software
-
Giarratana, M.S. The birth of a new industry: Entry by start-ups and the drivers of vendor growth: The case of encryption software. Research Policy, 33, 5 (2004), 787-806.
-
(2004)
Research Policy
, vol.33
, Issue.5
, pp. 787-806
-
-
Giarratana, M.S.1
-
18
-
-
34249006577
-
Product strategies and survival in Schumpeterian environments: Evidence from the U.S. security software industry
-
Giarratana, M.S., and Fosfuri, A. Product strategies and survival in Schumpeterian environments: Evidence from the U.S. security software industry. Organization Studies, 28, 6 (2007), 909-929.
-
(2007)
Organization Studies
, vol.28
, Issue.6
, pp. 909-929
-
-
Giarratana, M.S.1
Fosfuri, A.2
-
19
-
-
84863278214
-
Botnets: Size isn't everything, says new report
-
August 3
-
Goodchild, J. Botnets: Size isn't everything, says new report. Computerworld, August 3, 2011 (available at http://news.idg.no/cw/art.cfm?id= E795F760-1A64-6A71- CEE2E437E7955007/).
-
(2011)
Computerworld
-
-
Goodchild, J.1
-
20
-
-
84990029315
-
The economics of information security investment
-
Gordon, L.A., and Loeb, M.P. The economics of information security investment. ACM Transactions on Information and System Security, 5, 4 (2002), 438-457.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
21
-
-
33745210521
-
Budgeting process for information security expenditures
-
Gordon, L.A., and Loeb, M.P. Budgeting process for information security expenditures. Communications of the ACM, 49, 1 (2006), 121-125.
-
(2006)
Communications of the ACM
, vol.49
, Issue.1
, pp. 121-125
-
-
Gordon, L.A.1
Loeb, M.P.2
-
22
-
-
66549117052
-
Investments in information security: A real options perspective with Bayesian postaudit
-
Winter
-
Herath, H.S.B., and Herath, T.C. Investments in information security: A real options perspective with Bayesian postaudit. Journal of Management Information Systems, 25, 3 (Winter 2008-9), 337-375.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.3
, pp. 337-375
-
-
Herath, H.S.B.1
Herath, T.C.2
-
23
-
-
0034486891
-
The mathematics of infectious diseases
-
Hethcote, H.W. The mathematics of infectious diseases. SIAM Review, 42, 4 (2000), 599-653.
-
(2000)
SIAM Review
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
24
-
-
0002860654
-
Stability in competition
-
Hotelling, H. Stability in competition. Economic Journal, 39, 153 (1929), 41-57.
-
(1929)
Economic Journal
, vol.39
, Issue.153
, pp. 41-57
-
-
Hotelling, H.1
-
25
-
-
85020616309
-
Network externalities, competition and compatibility
-
Katz, M.L., and Shapiro, C. Network externalities, competition and compatibility. American Economic Review, 75, 3 (1985), 424-440.
-
(1985)
American Economic Review
, vol.75
, Issue.3
, pp. 424-440
-
-
Katz, M.L.1
Shapiro, C.2
-
26
-
-
84936407456
-
Technology adoption in the presence of network externalities
-
Katz, M.L., and Shapiro, C. Technology adoption in the presence of network externalities. Journal of Political Economy, 94, 4 (1986), 822-841.
-
(1986)
Journal of Political Economy
, vol.94
, Issue.4
, pp. 822-841
-
-
Katz, M.L.1
Shapiro, C.2
-
27
-
-
84870612756
-
Rival calls Microsoft's security pricing "predatory," "ruthless."
-
June
-
Keizer, G. Rival calls Microsoft's security pricing "predatory, " "ruthless." Informwationweek, June 2006 (available at www.informationweek.com/rival-calls-microsofts-securitypricing/ 189600302/).
-
(2006)
Informwationweek
-
-
Keizer, G.1
-
28
-
-
0000648490
-
Quantity precommitment and Bertrand competition yield Cournot outcomes
-
Autumn
-
Kreps, D.M., and Scheinkman, J.A. Quantity precommitment and Bertrand competition yield Cournot outcomes. Bell Journal of Economics, 14, 2 (Autumn 1983), 326-337.
-
(1983)
Bell Journal of Economics
, vol.14
, Issue.2
, pp. 326-337
-
-
Kreps, D.M.1
Scheinkman, J.A.2
-
29
-
-
66549103101
-
Understanding the value of countermeasure portfolios in information systems security
-
Fall
-
Kumar, R.L.; Park, S.; and Subramaniam, C. Understanding the value of countermeasure portfolios in information systems security. Journal of Management Information Systems, 25, 2 (Fall 2008), 241-279.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 241-279
-
-
Kumar, R.L.1
Park, S.2
Subramaniam, C.3
-
30
-
-
84870577191
-
Microsoft sweeps into security
-
May 31
-
Lacy, S. Microsoft sweeps into security. Bloomberg Businessweek (May 31, 2006) (available at www.businessweek.com/stories/2006-05-31/microsoft-sweeps- into-security/).
-
(2006)
Bloomberg Businessweek
-
-
Lacy, S.1
-
31
-
-
84861098681
-
Revisiting the incentive to tolerate illegal distribution of software products
-
Lahiri, A. Revisiting the incentive to tolerate illegal distribution of software products. Decision Support Systems, 53, 2 (2012), 357-367.
-
(2012)
Decision Support Systems
, vol.53
, Issue.2
, pp. 357-367
-
-
Lahiri, A.1
-
32
-
-
84981237600
-
Vaccine market coordination using subsidy
-
Mamani, H.; Adida, E.; and Dey, D. Vaccine market coordination using subsidy. IIE Transactions on Healthcare Systems Engineering, 2, 1 (2012), 78-96.
-
(2012)
IIE Transactions on Healthcare Systems Engineering
, vol.2
, Issue.1
, pp. 78-96
-
-
Mamani, H.1
Adida, E.2
Dey, D.3
-
33
-
-
84870595271
-
Cisco study shows mass phishing attacks down, targeted attacks up
-
July 1
-
Mullins, R. Cisco study shows mass phishing attacks down, targeted attacks up. Network Computing (July 1, 2011) (available at www.networkcomputing. com/wan-security/cisco-studyshows- mass-phishing-attacks/231000854/).
-
(2011)
Network Computing
-
-
Mullins, R.1
-
34
-
-
70449395022
-
Information security: Facilitating user precautions vis-à-vis enforcement against attackers
-
Fall
-
Png, I., and Wang, Q.-H. Information security: Facilitating user precautions vis-à-vis enforcement against attackers. Journal of Management Information Systems, 26, 2 (Fall 2009), 97-121.
-
(2009)
Journal of Management Information Systems
, vol.26
, Issue.2
, pp. 97-121
-
-
Png, I.1
Wang, Q.-H.2
-
35
-
-
67649548424
-
Choice and chance: A conceptual model of paths to information security compromise
-
Ransbotham, S., and Mitra, S. Choice and chance: A conceptual model of paths to information security compromise. Information Systems Research, 20, 1 (2009), 121-139.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 121-139
-
-
Ransbotham, S.1
Mitra, S.2
-
36
-
-
0001549798
-
Monopolistic competition with outside goods
-
Spring
-
Salop, S.C. Monopolistic competition with outside goods. Bell Journal of Economics, 10, 1 (Spring 1979), 141-156.
-
(1979)
Bell Journal of Economics
, vol.10
, Issue.1
, pp. 141-156
-
-
Salop, S.C.1
-
37
-
-
84870607699
-
The future of BOT worms
-
Cupertino, CA
-
Sancho, D. The future of BOT worms. White Paper, Trend Micro, Cupertino, CA, 2005 (available at www.trendmicro.com/cloud-content/us/pdfs/security- intelligence/white-papers/ wp-future-of-bots-final.pdf).
-
(2005)
White Paper, Trend Micro
-
-
Sancho, D.1
-
38
-
-
84870599675
-
Security industry market share analysis
-
OPSWAT, San Francisco, March
-
Security industry market share analysis. Market Share Report, OPSWAT, San Francisco, March 2012 (available at www.opswat.com/sites/default/files/OPSWAT- market-share-reportmarch- 2012.pdf).
-
(2012)
Market Share Report
-
-
-
40
-
-
33748594201
-
An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
-
DOI 10.2753/MIS0742-1222220405
-
Sun, L.; Srivastava, R.P.; and Mock, T.J. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22, 4 (Spring 2006), 109-142. (Pubitemid 44377673)
-
(2006)
Journal of Management Information Systems
, vol.22
, Issue.4
, pp. 109-142
-
-
Sun, L.1
Srivastava, R.P.2
Mock, T.J.3
-
43
-
-
0344792106
-
Managing online security risks
-
June 1
-
Varian, H.R. Managing online security risks. New York Times (June 1, 2000) (available at www.nytimes.com/library/financial/columns/060100econ-scene. html).
-
(2000)
New York Times
-
-
Varian, H.R.1
|