The productivity paradox of information technology
Communications of the ACM
Fair use, DRM, and trusted computing
Communications of the ACM - Digital rights management
Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?
IEEE Security and Privacy
The Long-Run Stock Price Performance of Firms with Effective TQM Programs
Management Science
Practical server privacy with secure coprocessors
IBM Systems Journal - End-to-end security
Attestation-based policy enforcement for remote access
Proceedings of the 11th ACM conference on Computer and communications security
Trusted Computing Platforms: Design and Applications
Trusted Computing Platforms: Design and Applications
Does Trusted Computing Remedy Computer Security Problems?
IEEE Security and Privacy
Protecting Client Privacy with Trusted Computing at the Server
IEEE Security and Privacy
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
Privacy for RFID through trusted computing
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
SecureBus: towards application-transparent trusted computing with mandatory access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Identity Anonymity for Grid Computing Coordination based on Trusted Computing
GCC '07 Proceedings of the Sixth International Conference on Grid and Cooperative Computing
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Final fantasy: securing on-line gaming with trusted computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Enabling fairer digital rights management with trusted computing
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.02 |
More than 10 years have passed since trusted computing (TC) technology was introduced to the market; however, there is still no consensus about its value. The increasing importance of user and enterprise security and the security promised by TC, coupled with the increasing tension between the proponents and the opponents of TC, make it timely to investigate the value relevance of TC in terms of both capital market and accounting performance. Based on both price and volume studies, we found that news releases related to the adoption of the TC technology had no information content. All investors, regardless of whether they are individual investors or institutional investors, or they are wealthy individual investors or less wealthy individual investor, all have similar views on the value of TC. Further, we show that the accounting benefit gained from the adoption of TC is trivial, which might explain the price invariance and volume invariance we observed in the stock market.