Determinants of Software Vulnerability Disclosure Timing
Author
Abstract
Suggested Citation
DOI: 10.1111/poms.13120
Download full text from publisher
References listed on IDEAS
- Ashish Arora & Jonathan P. Caulkins & Rahul Telang, 2006. "Research Note--Sell First, Fix Later: Impact of Patching on Software Quality," Management Science, INFORMS, vol. 52(3), pages 465-471, March.
- Fisher, Robert J & Ackerman, David, 1998. "The Effects of Recognition and Group Need on Volunteerism: A Social Norm Perspective," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 25(3), pages 262-275, December.
- Ryu, C. & Sharman, R. & Rao, H.R. & Upadhyaya, S., 2010. "Security protection design for deception and real system regimes: A model and analysis," European Journal of Operational Research, Elsevier, vol. 201(2), pages 545-556, March.
- Yonghua Ji & Vijay S. Mookerjee & Suresh P. Sethi, 2005. "Optimal Software Development: A Control Theoretic Approach," Information Systems Research, INFORMS, vol. 16(3), pages 292-306, September.
- Hao Xia & Milind Dawande & Vijay Mookerjee, 2016. "Optimal Coordination in Distributed Software Development," Production and Operations Management, Production and Operations Management Society, vol. 25(1), pages 56-76, January.
- Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
- Krishnamurthy, Sandeep & Tripathi, Arvind K., 2009. "Monetary donations to an open source software platform," Research Policy, Elsevier, vol. 38(2), pages 404-414, March.
- Ashish Arora & Anand Nandkumar & Rahul Telang, 2006. "Does information security attack frequency increase with vulnerability disclosure? An empirical analysis," Information Systems Frontiers, Springer, vol. 8(5), pages 350-362, December.
- Martin Dierker & Avanidhar Subrahmanyam, 2017. "Dynamic Information Disclosure," Contemporary Accounting Research, John Wiley & Sons, vol. 34(1), pages 601-621, March.
- Dardanoni, Valentino & Li Donni, Paolo, 2012.
"Incentive and selection effects of Medigap insurance on inpatient care,"
Journal of Health Economics, Elsevier, vol. 31(3), pages 457-470.
- Valentino Dardanoni & Paolo Li Donni, 2012. "Incentive and Selection Effects of Medigap Insurance on Inpatient Care," EIEF Working Papers Series 1203, Einaudi Institute for Economics and Finance (EIEF), revised Feb 2012.
- Asunur Cezar & Huseyin Cavusoglu & Srinivasan Raghunathan, 2017. "Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions," Production and Operations Management, Production and Operations Management Society, vol. 26(5), pages 860-879, May.
- Ashish Arora & Rahul Telang & Hao Xu, 2008. "Optimal Policy for Software Vulnerability Disclosure," Management Science, INFORMS, vol. 54(4), pages 642-656, April.
- Karthik Kannan & Rahul Telang, 2005. "Market for Software Vulnerabilities? Think Again," Management Science, INFORMS, vol. 51(5), pages 726-740, May.
- Milind Dawande & Subodha Kumar & Vijay Mookerjee & Chelliah Sriskandarajah, 2008. "Maximum Commonality Problems: Applications and Analysis," Management Science, INFORMS, vol. 54(1), pages 194-207, January.
- Ashish Arora & Ramayya Krishnan & Rahul Telang & Yubao Yang, 2010. "An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure," Information Systems Research, INFORMS, vol. 21(1), pages 115-132, March.
- Pu Li & H. Raghav Rao, 2007. "An examination of private intermediaries’ roles in software vulnerabilities disclosure," Information Systems Frontiers, Springer, vol. 9(5), pages 531-539, November.
- Jeffrey A. Roberts & Il-Horn Hann & Sandra A. Slaughter, 2006. "Understanding the Motivations, Participation, and Performance of Open Source Software Developers: A Longitudinal Study of the Apache Projects," Management Science, INFORMS, vol. 52(7), pages 984-999, July.
- repec:bla:kyklos:v:54:y:2001:i:2-3:p:317-42 is not listed on IDEAS
- Krishnamurthy, Sandeep & Ou, Shaosong & Tripathi, Arvind K., 2014. "Acceptance of monetary rewards in open source software development," Research Policy, Elsevier, vol. 43(4), pages 632-644.
- Siegwart Lindenberg, 2001. "Intrinsic Motivation in a New Light," Kyklos, Wiley Blackwell, vol. 54(2‐3), pages 317-342, May.
- Richard Williams, 2006. "Generalized ordered logit/partial proportional odds models for ordinal dependent variables," Stata Journal, StataCorp LP, vol. 6(1), pages 58-82, March.
- Milind Dawande & Monica Johar & Subodha Kumar & Vijay S. Mookerjee, 2008. "A Comparison of Pair Versus Solo Programming Under Different Objectives: An Analytical Approach," Information Systems Research, INFORMS, vol. 19(1), pages 71-92, March.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Subodha Kumar & Rakesh R. Mallipeddi, 2022. "Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions," Production and Operations Management, Production and Operations Management Society, vol. 31(12), pages 4488-4500, December.
- Rahul Menon & Lin Nan, 2023. "Sooner or later? A study of report timing," Production and Operations Management, Production and Operations Management Society, vol. 32(3), pages 762-779, March.
- Zach Zhizhong Zhou & Vidyanand Choudhary, 2022. "Impact of Competition from Open Source Software on Proprietary Software," Production and Operations Management, Production and Operations Management Society, vol. 31(2), pages 731-742, February.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Arora, Ashish & Forman, Chris & Nandkumar, Anand & Telang, Rahul, 2010. "Competition and patching of security vulnerabilities: An empirical analysis," Information Economics and Policy, Elsevier, vol. 22(2), pages 164-177, May.
- Alain Bensoussan & Vijay Mookerjee & Wei T. Yue, 2020. "Managing Information System Security Under Continuous and Abrupt Deterioration," Production and Operations Management, Production and Operations Management Society, vol. 29(8), pages 1894-1917, August.
- Debabrata Dey & Atanu Lahiri & Guoying Zhang, 2015. "Optimal Policies for Security Patch Management," INFORMS Journal on Computing, INFORMS, vol. 27(3), pages 462-477, August.
- Terrence August & Duy Dao & Marius Florin Niculescu, 2022. "Economics of Ransomware: Risk Interdependence and Large-Scale Attacks," Management Science, INFORMS, vol. 68(12), pages 8979-9002, December.
- Ashish Arora & Ramayya Krishnan & Rahul Telang & Yubao Yang, 2010. "An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure," Information Systems Research, INFORMS, vol. 21(1), pages 115-132, March.
- Karthik Kannan & Mohammad S. Rahman & Mohit Tawarmalani, 2016. "Economic and Policy Implications of Restricted Patch Distribution," Management Science, INFORMS, vol. 62(11), pages 3161-3182, November.
- Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
- Terrence August & Marius Florin Niculescu, 2013. "The Influence of Software Process Maturity and Customer Error Reporting on Software Release and Pricing," Management Science, INFORMS, vol. 59(12), pages 2702-2726, December.
- Sabyasachi Mitra & Sam Ransbotham, 2015. "Information Disclosure and the Diffusion of Information Security Attacks," Information Systems Research, INFORMS, vol. 26(3), pages 565-584, September.
- Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan, 2019. "A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs," Information Systems Frontiers, Springer, vol. 21(5), pages 959-977, October.
- Foad Iravani & Sriram Dasu & Reza Ahmadi, 2012. "A Hierarchical Framework for Organizing a Software Development Process," Operations Research, INFORMS, vol. 60(6), pages 1310-1322, December.
- Vidyanand Choudhary & Zhe (James) Zhang, 2015. "Research Note—Patching the Cloud: The Impact of SaaS on Patching Strategy and the Timing of Software Release," Information Systems Research, INFORMS, vol. 26(4), pages 845-858, December.
- Krishnamurthy, Sandeep & Ou, Shaosong & Tripathi, Arvind K., 2014. "Acceptance of monetary rewards in open source software development," Research Policy, Elsevier, vol. 43(4), pages 632-644.
- Anshul Tickoo & P. K. Kapur & A. K. Shrivastava & Sunil K. Khatri, 2016. "Testing effort based modeling to determine optimal release and patching time of software," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 7(4), pages 427-434, December.
- Maha Shaikh & Emmanuelle Vaast, 2016. "Folding and Unfolding: Balancing Openness and Transparency in Open Source Communities," Information Systems Research, INFORMS, vol. 27(4), pages 813-833, December.
- Arrah-Marie Jo, 2019. "Software vulnerability disclosure and security investment [L'impact de la divulgation d’une faille de sécurité : au-delà des motivations de l’éditeur de logiciel]," Post-Print hal-03033198, HAL.
- Terrence August & Marius Florin Niculescu & Hyoduk Shin, 2014. "Cloud Implications on Software Network Structure and Security Risks," Information Systems Research, INFORMS, vol. 25(3), pages 489-510, September.
- Zan Zhang & Guofang Nan & Yong Tan, 2020. "Cloud Services vs. On-Premises Software: Competition Under Security Risk and Product Customization," Information Systems Research, INFORMS, vol. 31(3), pages 848-864, September.
- Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
- Yuchen Zhang & Jingjing Li & Tony W. Tong, 2022. "Platform governance matters: How platform gatekeeping affects knowledge sharing among complementors," Strategic Management Journal, Wiley Blackwell, vol. 43(3), pages 599-626, March.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:popmgt:v:29:y:2020:i:11:p:2532-2552. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1937-5956 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.