1,370
Views
13
CrossRef citations to date
0
Altmetric
Articles

Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets

, &

References

  • Algarni, A.M.; and Malaiya, Y.K. Software vulnerability markets: Discoverers and buyers. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 8, 3 (2014), 480–490.
  • Arora, A.; Caulkins, J.P.; and Telang, R. Sell first, fix later: Impact of patching on software quality. Management Science, 52, 3 ( March 2006), 465–471.
  • August, T.; and Tunca, T.I. Who should be responsible for software security? A comparative analysis of liability policies in network environments. Management Science, 57, 5 (May 2011), 934–959.
  • Anderson, R. Why information security is hard- An economic perspective. 17th Annual Computer Security Applications Conference (ACSAC’01), IEEE Computer Society, December, 2001. https://www.acsac.org/2001/papers/110.pdf, ( accessed March 12, 2017).
  • Barnes, R.; and Fulford, G.R. Mathematical Modelling with Case Studies: A Differential Equations Approach using Maple and MATLAB. Boca Raton, FL: CRC Press, 2002, pp. 99–109.
  • Bitzer, J. Commercial versus open source software: The role of product heterogeneity in competition. Economic Systems, 28, 4 (December 2004), 369–381.
  • Brewster, T. US cybercrime laws being used to target security researchers. The Guardian, Thursday 29 May 2014. https://www.theguardian.com/technology/2014/may/29/us-cybercrime-laws-security-researchers.
  • Brynjolfsson, E. and Kemerer, C.F. Network externalities in microcomputer software: An econometric analysis of the spreadsheet market. Management Science, 42, 12 ( December 1996), 1627–1647.
  • Cavusoglu, H.; Cavusoglu, H.; and Raghunathan, S. Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Transactions on Software Engineering, 33, 3 ( March 2007), 171–185.
  • Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The effect of internet security breach announcements on market value: capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9, 1 (2004), 69.
  • CBS. These Cybercrime Statistics Will Make You Think Twice About Your Password: Where’s The CSI Cyber Team When You Need Them? CBS.com, March 3, 2015. http://www.cbs.com/shows/csi-cyber/news/1003888/these-cybercrime-statistics-will-make-you-think-twice-about-your-password-where-s-the-csi-cyber-team-when-you-need-them-/( accessed November 2, 2016).
  • Economides, N.; and Katsamakas, E. Two-sided competition of proprietary vs. open source technology platforms and the implications for the software industry. Management Science, 52, 7 (July 2006), 1057–1071.
  • English Oxford Living Dictionaries. Accessed on August 25 2019: https://en.oxforddictionaries.com/definition/hacker
  • Fan, M.; Kumara, S.; and Whinston, A.B. Short-term and long-term competition between providers of shrink-wrap software and software as a service. European Journal of Operational Research, 196, 2, 16 (July 2009), 661–671.
  • Farrell, J.; and Saloner, G. Installed base and compatibility: Innovation, product pronouncements, and predation. The American Economic Review, 76, 5 (December 1986), 940–955.
  • Finifter, M.; Akhawe, D.; and Wagner, D. An empirical study of vulnerability rewards programs. Presented at 22nd USENIX Security Symposium, August 14-16, Washington DC. Accessed on August 25 2019: https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/finifter.
  • Finkle, J. 6 more stores attacked by same hack as target: Firm. Reuters, January 17th 2014. http://www.huffingtonpost.com/2014/01/17/six-other-stores-are-bein_n_4618414.html ( accessed January 22, 2014).
  • Gallaugher, J.M., and Wang, Y. Understanding network effects in software markets: Evidence from web server pricing. MIS Quarterly, 26, 4 (December 2002), 303–327.
  • Gandal, N. Competing compatibility standards and network externalities in the PC software market. The Review of Economics and Statistics, 77, 4 (November 1995), 599–608.
  • Gander, K. Microsoft pays out $100,000 to hacker who exposed Windows security flaws. Independent, Thursday 10 October 2013.
  • Garcia, A.; Sun, Y.; and Shen, J. Dynamic platform competition with malicious users. Dynamic Games and Applications 4, 3 (2014), 209–308.
  • Gordon, L.A.; Loeb, M.P.; and Sohail, T. A Framework for using insurance for cyber risk management. Communications ACM, 46, 3 (2003), 81–85.
  • Gustin, S. U.S. “Hacker” crackdown sparks debate over computer-fraud law. Time, March 19, 2013. Accessed on August 25 2019: http://business.time.com/2013/03/19/u-s-hacker-crackdown-sparks-debate-over-computer-fraud-law/.
  • Jaisingh, J.; See-To, E.; and Tam, KY. The impact of open source software on the strategic choices of firms developing proprietary software. Journal of Management Information Systems, 25, 3 (2008), pp.243–277.
  • Kannan. K.; and Telang, R. Market for software vulnerabilities? Think again. Management Science, 51, 5 (May 2005) 726–740.
  • Katz, M. L.; and Shapiro, C. Systems competition and network effects. The Journal of Economic Perspectives, 8, 2 ( Spring 1994), 93–115.
  • Kim, B. C.; Chen, P.; and Mukhopadhyay, T. (2010b). The effect of liability and patch release on software security: The monopoly case. Production and Operations Management, 20, 4, 603–617.
  • Lanzi, D. Competition and open source with perfect software compatibility. Information Economics and Policy, 21, 3 (August 2009), 192–200.
  • Lin, L. Impact of user skills and network effects on the competition between open source and proprietary software. Electronic Commerce Research and Applications, 7, 1 ( Spring 2008), 68–81.
  • Marks, P. Dot-dash-diss: The gentleman hacker’s 1903 lulz. New Scientist. Issue 2844, December 27, 2011. (accessed October 14, 2013).
  • Marshall, A. Causes, effects and solutions of piracy in the computer software market. Review of Economic Research on Copyright Issues, 4, 1 (2007), 63–86.
  • Merriam-Webster Dictionary Accessed on August 25 2019: http://www.merriam-webster.com/dictionary/hacker.
  • Rochet, J.; and Tirole, J. Platform competition in two-sided markets. Journal of the European Economic Association, 1, 4 (June 2003), 990–1029.
  • Samtani, S.; Chinn, R.; Chen, H.; and Nunamaker, J.F. Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 34, 4 (2017), 1023–1053.
  • Sen, R. A Strategic analysis of competition between open source and proprietary software. Journal of Management Information Systems, 24, 1 ( Summer 2007), 233–257.
  • Swire, P.P. A model for when disclosure helps security: What is different about computer and network security? In M.F. Grady and F. Parisi (eds.), The Law and Economics of Cybersecurity. Cambridge: Cambridge University Press, 2005, pp. 29–70.
  • Telang, R.; and Wattal, S. An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering, 33, 8 ( August 2007), 544–557.
  • Verizon. 2016 Data Breach Investigations Report. http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/(accessed November 2, 2016).
  • Wright, C.S. Software, vendors and reputation: An analysis of the dilemma in creating secure software. Lecture Notes in Computer Science, 6802 (2011), 346–360.
  • Zetter, K. The biggest security threats we’ll face in 2016. Wired.com, January 1, 2016. https://www.wired.com/2016/01/the-biggest-security-threats-well-face-in-2016/. ( accessed on November 2, 2016).
  • Zhao, M.; Grossklags, J.; and Liu, P. An empirical study of web vulnerability discovery ecosystems. In Proceeding CCS ‘15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 1105–1117.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.