References
- Algarni, A.M.; and Malaiya, Y.K. Software vulnerability markets: Discoverers and buyers. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 8, 3 (2014), 480–490.
- Arora, A.; Caulkins, J.P.; and Telang, R. Sell first, fix later: Impact of patching on software quality. Management Science, 52, 3 ( March 2006), 465–471.
- August, T.; and Tunca, T.I. Who should be responsible for software security? A comparative analysis of liability policies in network environments. Management Science, 57, 5 (May 2011), 934–959.
- Anderson, R. Why information security is hard- An economic perspective. 17th Annual Computer Security Applications Conference (ACSAC’01), IEEE Computer Society, December, 2001. https://www.acsac.org/2001/papers/110.pdf, ( accessed March 12, 2017).
- Barnes, R.; and Fulford, G.R. Mathematical Modelling with Case Studies: A Differential Equations Approach using Maple and MATLAB. Boca Raton, FL: CRC Press, 2002, pp. 99–109.
- Bitzer, J. Commercial versus open source software: The role of product heterogeneity in competition. Economic Systems, 28, 4 (December 2004), 369–381.
- Brewster, T. US cybercrime laws being used to target security researchers. The Guardian, Thursday 29 May 2014. https://www.theguardian.com/technology/2014/may/29/us-cybercrime-laws-security-researchers.
- Brynjolfsson, E. and Kemerer, C.F. Network externalities in microcomputer software: An econometric analysis of the spreadsheet market. Management Science, 42, 12 ( December 1996), 1627–1647.
- Cavusoglu, H.; Cavusoglu, H.; and Raghunathan, S. Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Transactions on Software Engineering, 33, 3 ( March 2007), 171–185.
- Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The effect of internet security breach announcements on market value: capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9, 1 (2004), 69.
- CBS. These Cybercrime Statistics Will Make You Think Twice About Your Password: Where’s The CSI Cyber Team When You Need Them? CBS.com, March 3, 2015. http://www.cbs.com/shows/csi-cyber/news/1003888/these-cybercrime-statistics-will-make-you-think-twice-about-your-password-where-s-the-csi-cyber-team-when-you-need-them-/( accessed November 2, 2016).
- Economides, N.; and Katsamakas, E. Two-sided competition of proprietary vs. open source technology platforms and the implications for the software industry. Management Science, 52, 7 (July 2006), 1057–1071.
- English Oxford Living Dictionaries. Accessed on August 25 2019: https://en.oxforddictionaries.com/definition/hacker
- Fan, M.; Kumara, S.; and Whinston, A.B. Short-term and long-term competition between providers of shrink-wrap software and software as a service. European Journal of Operational Research, 196, 2, 16 (July 2009), 661–671.
- Farrell, J.; and Saloner, G. Installed base and compatibility: Innovation, product pronouncements, and predation. The American Economic Review, 76, 5 (December 1986), 940–955.
- Finifter, M.; Akhawe, D.; and Wagner, D. An empirical study of vulnerability rewards programs. Presented at 22nd USENIX Security Symposium, August 14-16, Washington DC. Accessed on August 25 2019: https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/finifter.
- Finkle, J. 6 more stores attacked by same hack as target: Firm. Reuters, January 17th 2014. http://www.huffingtonpost.com/2014/01/17/six-other-stores-are-bein_n_4618414.html ( accessed January 22, 2014).
- Gallaugher, J.M., and Wang, Y. Understanding network effects in software markets: Evidence from web server pricing. MIS Quarterly, 26, 4 (December 2002), 303–327.
- Gandal, N. Competing compatibility standards and network externalities in the PC software market. The Review of Economics and Statistics, 77, 4 (November 1995), 599–608.
- Gander, K. Microsoft pays out $100,000 to hacker who exposed Windows security flaws. Independent, Thursday 10 October 2013.
- Garcia, A.; Sun, Y.; and Shen, J. Dynamic platform competition with malicious users. Dynamic Games and Applications 4, 3 (2014), 209–308.
- Gordon, L.A.; Loeb, M.P.; and Sohail, T. A Framework for using insurance for cyber risk management. Communications ACM, 46, 3 (2003), 81–85.
- Gustin, S. U.S. “Hacker” crackdown sparks debate over computer-fraud law. Time, March 19, 2013. Accessed on August 25 2019: http://business.time.com/2013/03/19/u-s-hacker-crackdown-sparks-debate-over-computer-fraud-law/.
- Jaisingh, J.; See-To, E.; and Tam, KY. The impact of open source software on the strategic choices of firms developing proprietary software. Journal of Management Information Systems, 25, 3 (2008), pp.243–277.
- Kannan. K.; and Telang, R. Market for software vulnerabilities? Think again. Management Science, 51, 5 (May 2005) 726–740.
- Katz, M. L.; and Shapiro, C. Systems competition and network effects. The Journal of Economic Perspectives, 8, 2 ( Spring 1994), 93–115.
- Kim, B. C.; Chen, P.; and Mukhopadhyay, T. (2010b). The effect of liability and patch release on software security: The monopoly case. Production and Operations Management, 20, 4, 603–617.
- Lanzi, D. Competition and open source with perfect software compatibility. Information Economics and Policy, 21, 3 (August 2009), 192–200.
- Lin, L. Impact of user skills and network effects on the competition between open source and proprietary software. Electronic Commerce Research and Applications, 7, 1 ( Spring 2008), 68–81.
- Marks, P. Dot-dash-diss: The gentleman hacker’s 1903 lulz. New Scientist. Issue 2844, December 27, 2011. (accessed October 14, 2013).
- Marshall, A. Causes, effects and solutions of piracy in the computer software market. Review of Economic Research on Copyright Issues, 4, 1 (2007), 63–86.
- Merriam-Webster Dictionary Accessed on August 25 2019: http://www.merriam-webster.com/dictionary/hacker.
- Rochet, J.; and Tirole, J. Platform competition in two-sided markets. Journal of the European Economic Association, 1, 4 (June 2003), 990–1029.
- Samtani, S.; Chinn, R.; Chen, H.; and Nunamaker, J.F. Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 34, 4 (2017), 1023–1053.
- Sen, R. A Strategic analysis of competition between open source and proprietary software. Journal of Management Information Systems, 24, 1 ( Summer 2007), 233–257.
- Swire, P.P. A model for when disclosure helps security: What is different about computer and network security? In M.F. Grady and F. Parisi (eds.), The Law and Economics of Cybersecurity. Cambridge: Cambridge University Press, 2005, pp. 29–70.
- Telang, R.; and Wattal, S. An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering, 33, 8 ( August 2007), 544–557.
- Verizon. 2016 Data Breach Investigations Report. http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/(accessed November 2, 2016).
- Wright, C.S. Software, vendors and reputation: An analysis of the dilemma in creating secure software. Lecture Notes in Computer Science, 6802 (2011), 346–360.
- Zetter, K. The biggest security threats we’ll face in 2016. Wired.com, January 1, 2016. https://www.wired.com/2016/01/the-biggest-security-threats-well-face-in-2016/. ( accessed on November 2, 2016).
- Zhao, M.; Grossklags, J.; and Liu, P. An empirical study of web vulnerability discovery ecosystems. In Proceeding CCS ‘15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 1105–1117.