Enterprise resource planning: ERP adoption by European midsize companies
Communications of the ACM
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Information Systems Research
Communications of the ACM - Mobile computing opportunities and challenges
Informational cascades in IT adoption
Communications of the ACM - Human-computer etiquette
An Empirical Analysis of Network Externalities in Peer-to-Peer Music-Sharing Networks
Information Systems Research
Is Finding Security Holes a Good Idea?
IEEE Security and Privacy
Technology and Web User Data Privacy: A Survey of Risks and Countermeasures
IEEE Security and Privacy
The Value of Intrusion Detection Systems in Information Technology Security Architecture
Information Systems Research
The Economic Incentives for Sharing Security Information
Information Systems Research
ISSRE '06 Proceedings of the 17th International Symposium on Software Reliability Engineering
Network Software Security and User Incentives
Management Science
An Extended Privacy Calculus Model for E-Commerce Transactions
Information Systems Research
Two-Sided Network Effects: A Theory of Information Product Design
Management Science
Research NoteSell First, Fix Later: Impact of Patching on Software Quality
Management Science
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge
IEEE Transactions on Software Engineering
A Game-Theoretic Model of E-Marketplace Participation Growth
Journal of Management Information Systems
International Journal of Electronic Commerce
A Choice Model for the Selection of Computer Vendors and Its Empirical Estimation
Journal of Management Information Systems
Optimal Policy for Software Vulnerability Disclosure
Management Science
Security Patch Management: Share the Burden or Share the Damage?
Management Science
Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions
Information Systems Research
On the limits of cyber-insurance
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Hacker Behavior, Network Effects, and the Security Software Market
Journal of Management Information Systems
Hi-index | 0.00 |
In this paper, a competitive software market that includes horizontal and quality differentiation, as well as a negative network effect driven by the presence of malicious agents, is modeled. Software products with larger installed bases, and therefore more potential computers to attack, present more appealing targets for malicious agents. One finding is that software firms may profit from increased malicious activity. Software products in a more competitive market are less likely to invest in security, while monopolistic or niche products are likely to be more secure from malicious attack. The results provide insights for IS managers considering enterprise software adoption.