Cloud Implications on Software Network Structure and Security Risks
Author
Abstract
Suggested Citation
DOI: 10.1287/isre.2014.0527
Download full text from publisher
References listed on IDEAS
- Hasan Cavusoglu & Huseyin Cavusoglu & Jun Zhang, 2008. "Security Patch Management: Share the Burden or Share the Damage?," Management Science, INFORMS, vol. 54(4), pages 657-670, April.
- Marius F. Niculescu & D. J. Wu, 2014. "Economics of Free Under Perpetual Licensing: Implications for the Software Industry," Information Systems Research, INFORMS, vol. 25(1), pages 173-199, March.
- Xueqi (David) Wei & Barrie R. Nault, 2014. "Monopoly Versioning of Information Goods When Consumers Have Group Tastes," Production and Operations Management, Production and Operations Management Society, vol. 23(6), pages 1067-1081, June.
- Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2013. "Contracting Information Security in the Presence of Double Moral Hazard," Information Systems Research, INFORMS, vol. 24(2), pages 295-311, June.
- Terrence August & Tunay I. Tunca, 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments," Management Science, INFORMS, vol. 57(5), pages 934-959, May.
- Galina Vereshchagina & Hugo A. Hopenhayn, 2009.
"Risk Taking by Entrepreneurs,"
American Economic Review, American Economic Association, vol. 99(5), pages 1808-1830, December.
- Hugo A. Hopenhayn & Galina Vereshchagina, 2003. "Risk Taking by Entrepreneurs," RCER Working Papers 500, University of Rochester - Center for Economic Research (RCER).
- Li, Lode & McKelvey, Richard D. & Page, Talbot, 1987.
"Optimal research for cournot oligopolists,"
Journal of Economic Theory, Elsevier, vol. 42(1), pages 140-166, June.
- Li, Lode & McKelvey, Richard D. & Page, Talbot., 1985. "Optimal Research for Cournot Oligopolists," Working Papers 563, California Institute of Technology, Division of the Humanities and Social Sciences.
- Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Zhixi Wan & Damian R. Beil, 2009. "RFQ Auctions with Supplier Qualification Screening," Post-Print hal-00471441, HAL.
- Laffont, Jean-Jacques & Tirole, Jean, 1988.
"The Dynamics of Incentive Contracts,"
Econometrica, Econometric Society, vol. 56(5), pages 1153-1175, September.
- Jean-Jacques Laffont & Jean Tirole, 1985. "The Dynamics of Incentive Contracts," Working papers 397, Massachusetts Institute of Technology (MIT), Department of Economics.
- Roy Jones & Haim Mendelson, 2011. "Information Goods vs. Industrial Goods: Cost Structure and Competition," Management Science, INFORMS, vol. 57(1), pages 164-176, January.
- MacLeod, W Bentley & Malcomson, James M, 1993.
"Investments, Holdup, and the Form of Market Contracts,"
American Economic Review, American Economic Association, vol. 83(4), pages 811-837, September.
- Macleod, W.B. & Malcomson, J.M., 1991. "Investments, Hold Up And The Reform Of Market Contracts," Cahiers de recherche 9114, Centre interuniversitaire de recherche en économie quantitative, CIREQ.
- Macleod, W.B. & Malcomson, J.M., 1991. "Investments, Hold Up and the Reform of Market Contracts," Cahiers de recherche 9114, Universite de Montreal, Departement de sciences economiques.
- Justin P. Johnson & David P. Myatt, 2003.
"Multiproduct Quality Competition: Fighting Brands and Product Line Pruning,"
American Economic Review, American Economic Association, vol. 93(3), pages 748-774, June.
- David P. Myatt & Justin P. Johnson & Johnson Graduate School of Management & Cornell University, 2002. "Multiproduct Quality Competition: Fighting Brands and Product Line Pruning," Economics Series Working Papers 105, University of Oxford, Department of Economics.
- Muller, Holger M., 2000. "Asymptotic Efficiency in Dynamic Principal-Agent Problems," Journal of Economic Theory, Elsevier, vol. 91(2), pages 292-301, April.
- Ashish Arora & Rahul Telang & Hao Xu, 2008. "Optimal Policy for Software Vulnerability Disclosure," Management Science, INFORMS, vol. 54(4), pages 642-656, April.
- Jay Pil Choi & Chaim Fershtman & Neil Gandal, 2010.
"Network Security: Vulnerabilities And Disclosure Policy,"
Journal of Industrial Economics, Wiley Blackwell, vol. 58(4), pages 868-894, December.
- Fershtman, Chaim & Gandal, Neil & Choi, Jay Pil, 2007. "Network Security: Vulnerabilities and Disclosure Policy," CEPR Discussion Papers 6134, C.E.P.R. Discussion Papers.
- Zhixi Wan & Damian R. Beil, 2009. "RFQ Auctions with Supplier Qualification Screening," Operations Research, INFORMS, vol. 57(4), pages 934-949, August.
- Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
- Jing, Bing, 2007. "Network externalities and market segmentation in a monopoly," Economics Letters, Elsevier, vol. 95(1), pages 7-13, April.
- Terrence August & Tunay I. Tunca, 2006. "Network Software Security and User Incentives," Management Science, INFORMS, vol. 52(11), pages 1703-1720, November.
- Jeroen M. Swinkels & Wolfgang Pesendorfer, 2000.
"Efficiency and Information Aggregation in Auctions,"
American Economic Review, American Economic Association, vol. 90(3), pages 499-525, June.
- Wolfgang Pesendorfer & Jeroen M. Swinkels, 1996. "Efficiency and Information Aggregation in Auctions," Discussion Papers 1168, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
- Karthik Kannan & Rahul Telang, 2005. "Market for Software Vulnerabilities? Think Again," Management Science, INFORMS, vol. 51(5), pages 726-740, May.
- Hemant K. Bhargava & Vidyanand Choudhary, 2008. "Research Note--When Is Versioning Optimal for Information Goods?," Management Science, INFORMS, vol. 54(5), pages 1029-1035, May.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Terrence August & Tunay I. Tunca, 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments," Management Science, INFORMS, vol. 57(5), pages 934-959, May.
- Terrence August & Duy Dao & Kihoon Kim, 2019. "Market Segmentation and Software Security: Pricing Patching Rights," Management Science, INFORMS, vol. 65(10), pages 4575-4597, October.
- Terrence August & Hyoduk Shin & Tunay I. Tunca, 2013. "Licensing and Competition for Services in Open Source Software," Information Systems Research, INFORMS, vol. 24(4), pages 1068-1086, December.
- Zan Zhang & Guofang Nan & Yong Tan, 2020. "Cloud Services vs. On-Premises Software: Competition Under Security Risk and Product Customization," Information Systems Research, INFORMS, vol. 31(3), pages 848-864, September.
- Terrence August & Wei Chen & Kevin Zhu, 2021. "Competition Among Proprietary and Open-Source Software Firms: The Role of Licensing in Strategic Contribution," Management Science, INFORMS, vol. 67(5), pages 3041-3066, May.
- Terrence August & Duy Dao & Marius Florin Niculescu, 2022. "Economics of Ransomware: Risk Interdependence and Large-Scale Attacks," Management Science, INFORMS, vol. 68(12), pages 8979-9002, December.
- Terrence August & Duy Dao & Hyoduk Shin, 2015. "Optimal Timing of Sequential Distribution: The Impact of Congestion Externalities and Day-and-Date Strategies," Marketing Science, INFORMS, vol. 34(5), pages 755-774, September.
- Terrence August & Marius Florin Niculescu, 2013. "The Influence of Software Process Maturity and Customer Error Reporting on Software Release and Pricing," Management Science, INFORMS, vol. 59(12), pages 2702-2726, December.
- Terrence August & Hyoduk Shin & Tunay I. Tunca, 2018. "Generating Value Through Open Source: Software Service Market Regulation and Licensing Policy," Information Systems Research, INFORMS, vol. 29(1), pages 186-205, March.
- Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
- Shivendu Shivendu & Zhe (James) Zhang, 2015. "Versioning in the Software Industry: Heterogeneous Disutility from Underprovisioning of Functionality," Information Systems Research, INFORMS, vol. 26(4), pages 731-753, December.
- Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
- Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
- Arrah-Marie Jo, 2019. "Software vulnerability disclosure and security investment [L'impact de la divulgation d’une faille de sécurité : au-delà des motivations de l’éditeur de logiciel]," Post-Print hal-03033198, HAL.
- Atanu Lahiri & Debabrata Dey, 2013. "Effects of Piracy on Quality of Information Goods," Management Science, INFORMS, vol. 59(1), pages 245-264, June.
- Sabyasachi Mitra & Sam Ransbotham, 2015. "Information Disclosure and the Diffusion of Information Security Attacks," Information Systems Research, INFORMS, vol. 26(3), pages 565-584, September.
- José A. Novo‐Peteiro, 2023. "Product design with attribute dependence," Manchester School, University of Manchester, vol. 91(4), pages 361-385, July.
- Mingwen Yang & Varghese S. Jacob & Srinivasan Raghunathan, 2021. "Cloud Service Model’s Role in Provider and User Security Investment Incentives," Production and Operations Management, Production and Operations Management Society, vol. 30(2), pages 419-437, February.
- Francisco Martínez-Sánchez, 2016.
"Versioning Goods and Joint Purchase: Substitution and Complementarity Strategies,"
Prague Economic Papers, Prague University of Economics and Business, vol. 2016(5), pages 577-590.
- Francisco Martinez, 2007. "Versioning Goods and Joint Purchase: Substitution and Complementarity Strategies," ThE Papers 07/06, Department of Economic Theory and Economic History of the University of Granada..
- Debabrata Dey & Atanu Lahiri & Guoying Zhang, 2015. "Optimal Policies for Security Patch Management," INFORMS Journal on Computing, INFORMS, vol. 27(3), pages 462-477, August.
More about this item
Keywords
cloud computing; software-as-a-service; network economics; security; versioning; on-premises software;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:25:y:2014:i:3:p:489-510. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.