Information Disclosure and the Diffusion of Information Security Attacks
Author
Abstract
Suggested Citation
DOI: 10.1287/isre.2015.0587
Download full text from publisher
References listed on IDEAS
- Hasan Cavusoglu & Huseyin Cavusoglu & Jun Zhang, 2008. "Security Patch Management: Share the Burden or Share the Damage?," Management Science, INFORMS, vol. 54(4), pages 657-670, April.
- Bessen, James, 2005. "Patents and the diffusion of technical information," Economics Letters, Elsevier, vol. 86(1), pages 121-128, January.
- Partha Dasgupta & Joseph Stiglitz, 1980. "Uncertainty, Industrial Structure, and the Speed of R&D," Bell Journal of Economics, The RAND Corporation, vol. 11(1), pages 1-28, Spring.
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- Iacus, Stefano & King, Gary & Porro, Giuseppe, 2009. "cem: Software for Coarsened Exact Matching," Journal of Statistical Software, Foundation for Open Access Statistics, vol. 30(i09).
- Frank M. Bass, 1969. "A New Product Growth for Model Consumer Durables," Management Science, INFORMS, vol. 15(5), pages 215-227, January.
- Madhavan Parthasarathy & Anol Bhattacherjee, 1998. "Understanding Post-Adoption Behavior in the Context of Online Services," Information Systems Research, INFORMS, vol. 9(4), pages 362-379, December.
- Christophe Van den Bulte & Yogesh V. Joshi, 2007. "New Product Diffusion with Influentials and Imitators," Marketing Science, INFORMS, vol. 26(3), pages 400-421, 05-06.
- Ashish Arora & Rahul Telang & Hao Xu, 2008. "Optimal Policy for Software Vulnerability Disclosure," Management Science, INFORMS, vol. 54(4), pages 642-656, April.
- David J. Teece, 2007. "Explicating dynamic capabilities: the nature and microfoundations of (sustainable) enterprise performance," Strategic Management Journal, Wiley Blackwell, vol. 28(13), pages 1319-1350, December.
- Ashish Arora & Ramayya Krishnan & Rahul Telang & Yubao Yang, 2010. "An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure," Information Systems Research, INFORMS, vol. 21(1), pages 115-132, March.
- Christophe Van den Bulte & Stefan Stremersch, 2004. "Social Contagion and Income Heterogeneity in New Product Diffusion: A Meta-Analytic Test," Marketing Science, INFORMS, vol. 23(4), pages 530-544, July.
- Matthew Blackwell & Stefano Iacus & Gary King & Giuseppe Porro, 2009.
"cem: Coarsened exact matching in Stata,"
Stata Journal, StataCorp LP, vol. 9(4), pages 524-546, December.
- Matthew Blackwell & Stefano Iacus & Gary King & Giuseppe Porro, 2010. "CEM: Coarsened Exact Matching in Stata," BOS10 Stata Conference 8, Stata Users Group.
- Christopher Harris & John Vickers, 1985. "Perfect Equilibrium in a Model of a Race," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 52(2), pages 193-209.
- Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
- Bloch, Francis & Markowitz, Paul, 1996. "Optimal disclosure delay in multistage R&D competition," International Journal of Industrial Organization, Elsevier, vol. 14(2), pages 159-179.
- Teck-Hua Ho & Sergei Savin & Christian Terwiesch, 2002. "Managing Demand and Sales Dynamics in New Product Diffusion Under Supply Constraint," Management Science, INFORMS, vol. 48(2), pages 187-206, February.
- Kathleen M. Eisenhardt & Jeffrey A. Martin, 2000. "Dynamic capabilities: what are they?," Strategic Management Journal, Wiley Blackwell, vol. 21(10‐11), pages 1105-1121, October.
- Randolph B. Cooper & Robert W. Zmud, 1990. "Information Technology Implementation Research: A Technological Diffusion Approach," Management Science, INFORMS, vol. 36(2), pages 123-139, February.
- Kevin Zheng Zhou & Fang Wu, 2010. "Technological capability, strategic flexibility, and product innovation," Strategic Management Journal, Wiley Blackwell, vol. 31(5), pages 547-561, May.
- Fudenberg, Drew & Gilbert, Richard & Stiglitz, Joseph & Tirole, Jean, 1983. "Preemption, leapfrogging and competition in patent races," European Economic Review, Elsevier, vol. 22(1), pages 3-31, June.
- Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
- Karthik Kannan & Rahul Telang, 2005. "Market for Software Vulnerabilities? Think Again," Management Science, INFORMS, vol. 51(5), pages 726-740, May.
- Carmen Matutes & Pierre Regibeau & Katharine Rockett, 1996. "Optimal Patent Design and the Diffusion of Innovations," RAND Journal of Economics, The RAND Corporation, vol. 27(1), pages 60-83, Spring.
- David J. Teece, 1980. "The Diffusion of an Administrative Innovation," Management Science, INFORMS, vol. 26(5), pages 464-470, May.
- Jason Owen-Smith & Walter W. Powell, 2004. "Knowledge Networks as Channels and Conduits: The Effects of Spillovers in the Boston Biotechnology Community," Organization Science, INFORMS, vol. 15(1), pages 5-21, February.
- van den Bulte, C. & Stremersch, S., 2003. "Contagion and heterogeneity in new product diffusion: An emperical test," ERIM Report Series Research in Management ERS-2003-077-MKT, Erasmus Research Institute of Management (ERIM), ERIM is the joint research institute of the Rotterdam School of Management, Erasmus University and the Erasmus School of Economics (ESE) at Erasmus University Rotterdam.
- Baker, Scott & Mezzetti, Claudio, 2005. "Disclosure as a Strategy in the Patent Race," Journal of Law and Economics, University of Chicago Press, vol. 48(1), pages 173-194, April.
- Klaus Kultti & Tuomas Takalo & Juuso Toikka, 2006. "Simultaneous Model of Innovation, Secrecy, and Patent Policy," American Economic Review, American Economic Association, vol. 96(2), pages 82-86, May.
- Vijay Mookerjee & Radha Mookerjee & Alain Bensoussan & Wei T. Yue, 2011. "When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination," Information Systems Research, INFORMS, vol. 22(3), pages 606-623, September.
- John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
- Rosemarie Ham Ziedonis, 2004. "Don't Fence Me In: Fragmented Markets for Technology and the Patent Acquisition Strategies of Firms," Management Science, INFORMS, vol. 50(6), pages 804-820, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Sylvie Héroux & Anne Fortin, 2024. "Board of directors’ attributes and aspects of cybersecurity disclosure," Journal of Management & Governance, Springer;Accademia Italiana di Economia Aziendale (AIDEA), vol. 28(2), pages 359-404, June.
- Jens Foerderer & Sebastian W. Schuetz, 2022. "Data Breach Announcements and Stock Market Reactions: A Matter of Timing?," Management Science, INFORMS, vol. 68(10), pages 7298-7322, October.
- Yu-Kai Lin & Arun Rai & Yukun Yang, 2022. "Information Control for Creator Brand Management in Subscription-Based Crowdfunding," Information Systems Research, INFORMS, vol. 33(3), pages 846-866, September.
- Hui, Kai-Lung & Zhou, Jiali, 2020. "The Economics of Hacking," MPRA Paper 102706, University Library of Munich, Germany.
- Jacob Haislip & Jee-Hae Lim & Robert Pinsker, 2021. "The Impact of Executives’ IT Expertise on Reported Data Security Breaches," Information Systems Research, INFORMS, vol. 32(2), pages 318-334, June.
- Sylvie Héroux & Anne Fortin, 2020. "Cybersecurity Disclosure by the Companies on the S&P/TSX 60 Index," Accounting Perspectives, John Wiley & Sons, vol. 19(2), pages 73-100, June.
- Zan Zhang & Guofang Nan & Yong Tan, 2020. "Cloud Services vs. On-Premises Software: Competition Under Security Risk and Product Customization," Information Systems Research, INFORMS, vol. 31(3), pages 848-864, September.
- Arunabha Mukhopadhyay & Samir Chatterjee & Kallol K. Bagchi & Peteer J. Kirs & Girja K. Shukla, 2019. "Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance," Information Systems Frontiers, Springer, vol. 21(5), pages 997-1018, October.
- Bertschek, Irene & Briglauer, Wolfgang & Hüschelrath, Kai & Krämer, Jan & Frübing, Stefan & Kesler, Reinhold & Saam, Marianne, 2016. "Metastudie zum Fachdialog Ordnungsrahmen für die Digitale Wirtschaft: Im Auftrag des Bundesministeriums für Wirtschaft und Energie (BMWi)," ZEW Expertises, ZEW - Leibniz Centre for European Economic Research, number 147040.
- Terrence August & Duy Dao & Marius Florin Niculescu, 2022. "Economics of Ransomware: Risk Interdependence and Large-Scale Attacks," Management Science, INFORMS, vol. 68(12), pages 8979-9002, December.
- Ng, Irene C.L. & Wakenshaw, Susan Y.L., 2017. "The Internet-of-Things: Review and research directions," International Journal of Research in Marketing, Elsevier, vol. 34(1), pages 3-21.
- Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- Peters, Kay & Albers, Sönke & Kumar, V., 2008. "Is there more to international Diffusion than Culture? An investigation on the Role of Marketing and Industry Variables," EconStor Preprints 27678, ZBW - Leibniz Information Centre for Economics.
- Sang-Gun Lee & Eui-bang Lee & Chang-Gyu Yang, 2014. "Strategies for ICT product diffusion: the case of the Korean mobile communications market," Service Business, Springer;Pan-Pacific Business Association, vol. 8(1), pages 65-81, March.
- Jing Wang & Anocha Aribarg & Yves F. Atchadé, 2013. "Modeling Choice Interdependence in a Social Network," Marketing Science, INFORMS, vol. 32(6), pages 977-997, November.
- Terrence August & Tunay I. Tunca, 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments," Management Science, INFORMS, vol. 57(5), pages 934-959, May.
- Terrence August & Marius Florin Niculescu, 2013. "The Influence of Software Process Maturity and Customer Error Reporting on Software Release and Pricing," Management Science, INFORMS, vol. 59(12), pages 2702-2726, December.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
- Terrence August & Duy Dao & Marius Florin Niculescu, 2022. "Economics of Ransomware: Risk Interdependence and Large-Scale Attacks," Management Science, INFORMS, vol. 68(12), pages 8979-9002, December.
- Florian Probst & Laura Grosswiele & Regina Pfleger, 2013. "Who will lead and who will follow: Identifying Influential Users in Online Social Networks," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 5(3), pages 179-193, June.
- Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
- Terrence August & Marius Florin Niculescu & Hyoduk Shin, 2014. "Cloud Implications on Software Network Structure and Security Risks," Information Systems Research, INFORMS, vol. 25(3), pages 489-510, September.
- Alain Bensoussan & Vijay Mookerjee & Wei T. Yue, 2020. "Managing Information System Security Under Continuous and Abrupt Deterioration," Production and Operations Management, Production and Operations Management Society, vol. 29(8), pages 1894-1917, August.
- Dosis, Anastasios & Muthoo, Abhinay, 2019.
"Experimentation in Dynamic R&D Competition,"
CRETA Online Discussion Paper Series
52, Centre for Research in Economic Theory and its Applications CRETA.
- Dosis, Anastasios & Muthoo, Abhinay, 2019. "Experimentation in Dynamic R&D Competition," The Warwick Economics Research Paper Series (TWERPS) 1214, University of Warwick, Department of Economics.
- Anastasios, Dosis & Abhinay, Muthoo, 2019. "Experimentation in Dynamic R&D Competition," ESSEC Working Papers WP1901, ESSEC Research Center, ESSEC Business School.
- Anastasios Dosis & Abhinay Muthoo, 2019. "Experimentation in Dynamic R&D Competition," Working Papers hal-02102518, HAL.
- Peres, Renana & Muller, Eitan & Mahajan, Vijay, 2010. "Innovation diffusion and new product growth models: A critical review and research directions," International Journal of Research in Marketing, Elsevier, vol. 27(2), pages 91-106.
- Debabrata Dey & Atanu Lahiri & Guoying Zhang, 2015. "Optimal Policies for Security Patch Management," INFORMS Journal on Computing, INFORMS, vol. 27(3), pages 462-477, August.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Gans, Joshua S. & Murray, Fiona E. & Stern, Scott, 2017.
"Contracting over the disclosure of scientific knowledge: Intellectual property and academic publication,"
Research Policy, Elsevier, vol. 46(4), pages 820-835.
- Joshua S. Gans & Fiona E. Murray & Scott Stern, 2013. "Contracting Over the Disclosure of Scientific Knowledge: Intellectual Property and Academic Publication," NBER Working Papers 19560, National Bureau of Economic Research, Inc.
- Haarhaus, Tim & Liening, Andreas, 2020. "Building dynamic capabilities to cope with environmental uncertainty: The role of strategic foresight," Technological Forecasting and Social Change, Elsevier, vol. 155(C).
- Nilsen, Øivind A. & Raknerud, Arvid, 2024.
"Dynamics of first-time patenting firms,"
Research Policy, Elsevier, vol. 53(8).
- Øivind Anti Nilsen & Arvid Raknerud, 2022. "Dynamics of First-Time Patenting Firms," CESifo Working Paper Series 9927, CESifo.
- Nilsen, Øivind A. & Raknerud, Arvid, 2022. "Dynamics of First-Time Patenting Firms," Discussion Paper Series in Economics 11/2022, Norwegian School of Economics, Department of Economics.
- Nilsen, Øivind Anti & Raknerud, Arvid, 2022. "Dynamics of First-Time Patenting Firms," IZA Discussion Papers 15529, Institute of Labor Economics (IZA).
- Øyvind A. Nilsen & Arvid Raknerud, 2022. "Dynamics of first-time patenting firms," Discussion Papers 986, Statistics Norway, Research Department.
More about this item
Keywords
information security; information disclosure; software vulnerability; diffusion of innovation; negative innovation;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:26:y:2015:i:3:p:565-584. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.