Information Disclosure and the Diffusion of Information Security Attacks
Author
Abstract
Suggested Citation
DOI: 10.1287/isre.2015.0587
Download full text from publisher
References listed on IDEAS
- Hasan Cavusoglu & Huseyin Cavusoglu & Jun Zhang, 2008. "Security Patch Management: Share the Burden or Share the Damage?," Management Science, INFORMS, vol. 54(4), pages 657-670, April.
- Madhavan Parthasarathy & Anol Bhattacherjee, 1998. "Understanding Post-Adoption Behavior in the Context of Online Services," Information Systems Research, INFORMS, vol. 9(4), pages 362-379, December.
- Matthew Blackwell & Stefano Iacus & Gary King & Giuseppe Porro, 2009.
"cem: Coarsened exact matching in Stata,"
Stata Journal, StataCorp LP, vol. 9(4), pages 524-546, December.
- Matthew Blackwell & Stefano Iacus & Gary King & Giuseppe Porro, 2010. "CEM: Coarsened Exact Matching in Stata," BOS10 Stata Conference 8, Stata Users Group.
- Bloch, Francis & Markowitz, Paul, 1996. "Optimal disclosure delay in multistage R&D competition," International Journal of Industrial Organization, Elsevier, vol. 14(2), pages 159-179.
- Teck-Hua Ho & Sergei Savin & Christian Terwiesch, 2002. "Managing Demand and Sales Dynamics in New Product Diffusion Under Supply Constraint," Management Science, INFORMS, vol. 48(2), pages 187-206, February.
- Kathleen M. Eisenhardt & Jeffrey A. Martin, 2000. "Dynamic capabilities: what are they?," Strategic Management Journal, Wiley Blackwell, vol. 21(10‐11), pages 1105-1121, October.
- Kevin Zheng Zhou & Fang Wu, 2010. "Technological capability, strategic flexibility, and product innovation," Strategic Management Journal, Wiley Blackwell, vol. 31(5), pages 547-561, May.
- Carmen Matutes & Pierre Regibeau & Katharine Rockett, 1996. "Optimal Patent Design and the Diffusion of Innovations," RAND Journal of Economics, The RAND Corporation, vol. 27(1), pages 60-83, Spring.
- Baker, Scott & Mezzetti, Claudio, 2005. "Disclosure as a Strategy in the Patent Race," Journal of Law and Economics, University of Chicago Press, vol. 48(1), pages 173-194, April.
- Vijay Mookerjee & Radha Mookerjee & Alain Bensoussan & Wei T. Yue, 2011. "When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination," Information Systems Research, INFORMS, vol. 22(3), pages 606-623, September.
- John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
- Bessen, James, 2005. "Patents and the diffusion of technical information," Economics Letters, Elsevier, vol. 86(1), pages 121-128, January.
- Partha Dasgupta & Joseph Stiglitz, 1980. "Uncertainty, Industrial Structure, and the Speed of R&D," Bell Journal of Economics, The RAND Corporation, vol. 11(1), pages 1-28, Spring.
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- Iacus, Stefano & King, Gary & Porro, Giuseppe, 2009. "cem: Software for Coarsened Exact Matching," Journal of Statistical Software, Foundation for Open Access Statistics, vol. 30(i09).
- Frank M. Bass, 1969. "A New Product Growth for Model Consumer Durables," Management Science, INFORMS, vol. 15(5), pages 215-227, January.
- Christophe Van den Bulte & Yogesh V. Joshi, 2007. "New Product Diffusion with Influentials and Imitators," Marketing Science, INFORMS, vol. 26(3), pages 400-421, 05-06.
- Ashish Arora & Rahul Telang & Hao Xu, 2008. "Optimal Policy for Software Vulnerability Disclosure," Management Science, INFORMS, vol. 54(4), pages 642-656, April.
- David J. Teece, 2007. "Explicating dynamic capabilities: the nature and microfoundations of (sustainable) enterprise performance," Strategic Management Journal, Wiley Blackwell, vol. 28(13), pages 1319-1350, December.
- Ashish Arora & Ramayya Krishnan & Rahul Telang & Yubao Yang, 2010. "An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure," Information Systems Research, INFORMS, vol. 21(1), pages 115-132, March.
- Christophe Van den Bulte & Stefan Stremersch, 2004. "Social Contagion and Income Heterogeneity in New Product Diffusion: A Meta-Analytic Test," Marketing Science, INFORMS, vol. 23(4), pages 530-544, July.
- Christopher Harris & John Vickers, 1985. "Perfect Equilibrium in a Model of a Race," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 52(2), pages 193-209.
- Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
- Randolph B. Cooper & Robert W. Zmud, 1990. "Information Technology Implementation Research: A Technological Diffusion Approach," Management Science, INFORMS, vol. 36(2), pages 123-139, February.
- Fudenberg, Drew & Gilbert, Richard & Stiglitz, Joseph & Tirole, Jean, 1983. "Preemption, leapfrogging and competition in patent races," European Economic Review, Elsevier, vol. 22(1), pages 3-31, June.
- Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
- Karthik Kannan & Rahul Telang, 2005. "Market for Software Vulnerabilities? Think Again," Management Science, INFORMS, vol. 51(5), pages 726-740, May.
- David J. Teece, 1980. "The Diffusion of an Administrative Innovation," Management Science, INFORMS, vol. 26(5), pages 464-470, May.
- Jason Owen-Smith & Walter W. Powell, 2004. "Knowledge Networks as Channels and Conduits: The Effects of Spillovers in the Boston Biotechnology Community," Organization Science, INFORMS, vol. 15(1), pages 5-21, February.
- van den Bulte, C. & Stremersch, S., 2003. "Contagion and heterogeneity in new product diffusion: An emperical test," ERIM Report Series Research in Management ERS-2003-077-MKT, Erasmus Research Institute of Management (ERIM), ERIM is the joint research institute of the Rotterdam School of Management, Erasmus University and the Erasmus School of Economics (ESE) at Erasmus University Rotterdam.
- Klaus Kultti & Tuomas Takalo & Juuso Toikka, 2006. "Simultaneous Model of Innovation, Secrecy, and Patent Policy," American Economic Review, American Economic Association, vol. 96(2), pages 82-86, May.
- Rosemarie Ham Ziedonis, 2004. "Don't Fence Me In: Fragmented Markets for Technology and the Patent Acquisition Strategies of Firms," Management Science, INFORMS, vol. 50(6), pages 804-820, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Sylvie Héroux & Anne Fortin, 2024. "Board of directors’ attributes and aspects of cybersecurity disclosure," Journal of Management & Governance, Springer;Accademia Italiana di Economia Aziendale (AIDEA), vol. 28(2), pages 359-404, June.
- Hui, Kai-Lung & Zhou, Jiali, 2020. "The Economics of Hacking," MPRA Paper 102706, University Library of Munich, Germany.
- Sylvie Héroux & Anne Fortin, 2020. "Cybersecurity Disclosure by the Companies on the S&P/TSX 60 Index," Accounting Perspectives, John Wiley & Sons, vol. 19(2), pages 73-100, June.
- Zan Zhang & Guofang Nan & Yong Tan, 2020. "Cloud Services vs. On-Premises Software: Competition Under Security Risk and Product Customization," Information Systems Research, INFORMS, vol. 31(3), pages 848-864, September.
- Arunabha Mukhopadhyay & Samir Chatterjee & Kallol K. Bagchi & Peteer J. Kirs & Girja K. Shukla, 2019. "Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance," Information Systems Frontiers, Springer, vol. 21(5), pages 997-1018, October.
- Bertschek, Irene & Briglauer, Wolfgang & Hüschelrath, Kai & Krämer, Jan & Frübing, Stefan & Kesler, Reinhold & Saam, Marianne, 2016. "Metastudie zum Fachdialog Ordnungsrahmen für die Digitale Wirtschaft: Im Auftrag des Bundesministeriums für Wirtschaft und Energie (BMWi)," ZEW Expertises, ZEW - Leibniz Centre for European Economic Research, number 147040.
- Terrence August & Duy Dao & Marius Florin Niculescu, 2022. "Economics of Ransomware: Risk Interdependence and Large-Scale Attacks," Management Science, INFORMS, vol. 68(12), pages 8979-9002, December.
- Jens Foerderer & Sebastian W. Schuetz, 2022. "Data Breach Announcements and Stock Market Reactions: A Matter of Timing?," Management Science, INFORMS, vol. 68(10), pages 7298-7322, October.
- Yu-Kai Lin & Arun Rai & Yukun Yang, 2022. "Information Control for Creator Brand Management in Subscription-Based Crowdfunding," Information Systems Research, INFORMS, vol. 33(3), pages 846-866, September.
- Jacob Haislip & Jee-Hae Lim & Robert Pinsker, 2021. "The Impact of Executives’ IT Expertise on Reported Data Security Breaches," Information Systems Research, INFORMS, vol. 32(2), pages 318-334, June.
- Ng, Irene C.L. & Wakenshaw, Susan Y.L., 2017. "The Internet-of-Things: Review and research directions," International Journal of Research in Marketing, Elsevier, vol. 34(1), pages 3-21.
- Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- Sang-Gun Lee & Eui-bang Lee & Chang-Gyu Yang, 2014. "Strategies for ICT product diffusion: the case of the Korean mobile communications market," Service Business, Springer;Pan-Pacific Business Association, vol. 8(1), pages 65-81, March.
- Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
- Terrence August & Duy Dao & Marius Florin Niculescu, 2022. "Economics of Ransomware: Risk Interdependence and Large-Scale Attacks," Management Science, INFORMS, vol. 68(12), pages 8979-9002, December.
- Jing Wang & Anocha Aribarg & Yves F. Atchadé, 2013. "Modeling Choice Interdependence in a Social Network," Marketing Science, INFORMS, vol. 32(6), pages 977-997, November.
- Florian Probst & Laura Grosswiele & Regina Pfleger, 2013. "Who will lead and who will follow: Identifying Influential Users in Online Social Networks," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 5(3), pages 179-193, June.
- Terrence August & Tunay I. Tunca, 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments," Management Science, INFORMS, vol. 57(5), pages 934-959, May.
- Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
- Terrence August & Marius Florin Niculescu & Hyoduk Shin, 2014. "Cloud Implications on Software Network Structure and Security Risks," Information Systems Research, INFORMS, vol. 25(3), pages 489-510, September.
- Terrence August & Marius Florin Niculescu, 2013. "The Influence of Software Process Maturity and Customer Error Reporting on Software Release and Pricing," Management Science, INFORMS, vol. 59(12), pages 2702-2726, December.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Alain Bensoussan & Vijay Mookerjee & Wei T. Yue, 2020. "Managing Information System Security Under Continuous and Abrupt Deterioration," Production and Operations Management, Production and Operations Management Society, vol. 29(8), pages 1894-1917, August.
- Dosis, Anastasios & Muthoo, Abhinay, 2019.
"Experimentation in Dynamic R&D Competition,"
CRETA Online Discussion Paper Series
52, Centre for Research in Economic Theory and its Applications CRETA.
- Dosis, Anastasios & Muthoo, Abhinay, 2019. "Experimentation in Dynamic R&D Competition," The Warwick Economics Research Paper Series (TWERPS) 1214, University of Warwick, Department of Economics.
- Anastasios, Dosis & Abhinay, Muthoo, 2019. "Experimentation in Dynamic R&D Competition," ESSEC Working Papers WP1901, ESSEC Research Center, ESSEC Business School.
- Anastasios Dosis & Abhinay Muthoo, 2019. "Experimentation in Dynamic R&D Competition," Working Papers hal-02102518, HAL.
- Peres, Renana & Muller, Eitan & Mahajan, Vijay, 2010. "Innovation diffusion and new product growth models: A critical review and research directions," International Journal of Research in Marketing, Elsevier, vol. 27(2), pages 91-106.
- Krishnan, Trichy V. & Feng, Shanfei & Jain, Dipak C., 2023. "Peak sales time prediction in new product sales: Can a product manager rely on it?," Journal of Business Research, Elsevier, vol. 165(C).
- Debabrata Dey & Atanu Lahiri & Guoying Zhang, 2015. "Optimal Policies for Security Patch Management," INFORMS Journal on Computing, INFORMS, vol. 27(3), pages 462-477, August.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
- Gans, Joshua S. & Murray, Fiona E. & Stern, Scott, 2017.
"Contracting over the disclosure of scientific knowledge: Intellectual property and academic publication,"
Research Policy, Elsevier, vol. 46(4), pages 820-835.
- Joshua S. Gans & Fiona E. Murray & Scott Stern, 2013. "Contracting Over the Disclosure of Scientific Knowledge: Intellectual Property and Academic Publication," NBER Working Papers 19560, National Bureau of Economic Research, Inc.
- Bart Leten & Rene Belderbos & Bart Van Looy, 2016.
"Entry and Technological Performance in New Technology Domains: Technological Opportunities, Technology Competition and Technological Relatedness,"
Journal of Management Studies, Wiley Blackwell, vol. 53(8), pages 1257-1291, December.
- Bart Leten & Rene Belderbos & Bart Van Looy, 2016. "Entry and technological performance in new technology domains: Technological opportunities, technology competition and technological relatedness," Working Papers of Department of Management, Strategy and Innovation, Leuven 540570, KU Leuven, Faculty of Economics and Business (FEB), Department of Management, Strategy and Innovation, Leuven.
More about this item
Keywords
information security; information disclosure; software vulnerability; diffusion of innovation; negative innovation;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:26:y:2015:i:3:p:565-584. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.