IDEAS home Printed from https://ideas.repec.org/a/inm/ordeca/v17y2020i1p56-73.html
   My bibliography  Save this article

Open Source or Closed Source? A Competitive Analysis with Software Security

Author

Listed:
  • Xing Gao

    (Department of Management Science and Engineering, School of Economics and Management, Southeast University, Nanjing, PR China)

Abstract

Software security is an increasingly serious concern for users and ultimately impacts software firms’ choice of open source or closed source business models. However, the studies in this area are scarce, if not absent. This paper examines whether a software firm chooses open source or closed source in a competitive market when software security is taken into account. I construct a game-theoretic model in which two competitive firms first formulate their business models and then charge their prices for software products. I find that due to security concerns, two symmetric firms may choose a heterogeneous business model, in which one firm chooses open source and the other chooses closed source when the return of open source remains moderate. The two symmetric firms may be trapped in a prisoner’s dilemma with a moderate-high return of open source in which their equilibrium choices of business model, open source, lead to lower profits than when they switch to closed source. For two asymmetric firms in which only one has security concerns in its software products, I reveal that with a moderate return of open source, this firm follows closed source and the other without security concern employs open source. Interestingly, there never exists the other heterogeneous business model in equilibrium.

Suggested Citation

  • Xing Gao, 2020. "Open Source or Closed Source? A Competitive Analysis with Software Security," Decision Analysis, INFORMS, vol. 17(1), pages 56-73, March.
  • Handle: RePEc:inm:ordeca:v:17:y:2020:i:1:p:56-73
    DOI: 10.1287/deca.2019.0390
    as

    Download full text from publisher

    File URL: https://doi.org/10.1287/deca.2019.0390
    Download Restriction: no

    File URL: https://libkey.io/10.1287/deca.2019.0390?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Kevin Xiaoguo Zhu & Zach Zhizhong Zhou, 2012. "Research Note ---Lock-In Strategy in Software Competition: Open-Source Software vs. Proprietary Software," Information Systems Research, INFORMS, vol. 23(2), pages 536-545, June.
    3. Ramon Casadesus‐Masanell & Gastón Llanes, 2015. "Investment Incentives in Open‐Source and Proprietary Two‐Sided Platforms," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 24(2), pages 306-324, June.
    4. Nicholas Economides & Evangelos Katsamakas, 2006. "Two-Sided Competition of Proprietary vs. Open Source Technology Platforms and the Implications for the Software Industry," Management Science, INFORMS, vol. 52(7), pages 1057-1071, July.
    5. Terrence August & Tunay I. Tunca, 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments," Management Science, INFORMS, vol. 57(5), pages 934-959, May.
    6. Alfredo Garcia & Yue Sun & Joseph Shen, 2014. "Dynamic Platform Competition with Malicious Users," Dynamic Games and Applications, Springer, vol. 4(3), pages 290-308, September.
    7. Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
    8. Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
    9. Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
    10. Terrence August & Hyoduk Shin & Tunay I. Tunca, 2013. "Licensing and Competition for Services in Open Source Software," Information Systems Research, INFORMS, vol. 24(4), pages 1068-1086, December.
    11. Terrence August & Tunay I. Tunca, 2006. "Network Software Security and User Incentives," Management Science, INFORMS, vol. 52(11), pages 1703-1720, November.
    12. Caulkins, Jonathan P. & Feichtinger, Gustav & Grass, Dieter & Hartl, Richard F. & Kort, Peter M. & Seidl, Andrea, 2013. "When to make proprietary software open source," Journal of Economic Dynamics and Control, Elsevier, vol. 37(6), pages 1182-1194.
    13. Ramon Casadesus-Masanell & Pankaj Ghemawat, 2006. "Dynamic Mixed Duopoly: A Model Motivated by Linux vs. Windows," Management Science, INFORMS, vol. 52(7), pages 1072-1084, July.
    14. Vineet Kumar & Brett R. Gordon & Kannan Srinivasan, 2011. "Competitive Strategy for Open Source Software," Marketing Science, INFORMS, vol. 30(6), pages 1066-1078, November.
    15. Vijay Mookerjee & Radha Mookerjee & Alain Bensoussan & Wei T. Yue, 2011. "When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination," Information Systems Research, INFORMS, vol. 22(3), pages 606-623, September.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Zha, Yong & Wu, Xiangxiang & Liu, Haonan & Yu, Yugang, 2023. "Impact of a Platform Developer's Entry on the Device Manufacturer with Different Power Structures and Revenue Models," Omega, Elsevier, vol. 115(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
    2. Yong Wu & Junlin Duan & Tao Dai & Dong Cheng, 2020. "Managing Security Outsourcing in the Presence of Strategic Hackers," Decision Analysis, INFORMS, vol. 17(3), pages 235-259, September.
    3. Terrence August & Hyoduk Shin & Tunay I. Tunca, 2013. "Licensing and Competition for Services in Open Source Software," Information Systems Research, INFORMS, vol. 24(4), pages 1068-1086, December.
    4. Eric Darmon & Dominique Torre, 2010. "Open source, dual licensing and software compétition," Post-Print halshs-00497623, HAL.
    5. Luigi Balletta & Antonio Tesoriere, 2020. "Cumulative innovation, open source, and distance to frontier," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 22(6), pages 1875-1920, December.
    6. Terrence August & Hyoduk Shin & Tunay I. Tunca, 2018. "Generating Value Through Open Source: Software Service Market Regulation and Licensing Policy," Information Systems Research, INFORMS, vol. 29(1), pages 186-205, March.
    7. Sheen S. Levine & Michael J. Prietula, 2014. "Open Collaboration for Innovation: Principles and Performance," Organization Science, INFORMS, vol. 25(5), pages 1414-1433, October.
    8. Zach Zhizhong Zhou & Vidyanand Choudhary, 2022. "Impact of Competition from Open Source Software on Proprietary Software," Production and Operations Management, Production and Operations Management Society, vol. 31(2), pages 731-742, February.
    9. Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
    10. Zha, Yong & Wu, Xiangxiang & Liu, Haonan & Yu, Yugang, 2023. "Impact of a Platform Developer's Entry on the Device Manufacturer with Different Power Structures and Revenue Models," Omega, Elsevier, vol. 115(C).
    11. Xing Gao & Siyu Gong, 2022. "An economic analysis of information security outsourcing with competitive firms," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(7), pages 2748-2758, October.
    12. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    13. Ron Adner & Jianqing Chen & Feng Zhu, 2020. "Frenemies in Platform Markets: Heterogeneous Profit Foci as Drivers of Compatibility Decisions," Management Science, INFORMS, vol. 66(6), pages 2432-2451, June.
    14. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    15. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    16. Terrence August & Wei Chen & Kevin Zhu, 2021. "Competition Among Proprietary and Open-Source Software Firms: The Role of Licensing in Strategic Contribution," Management Science, INFORMS, vol. 67(5), pages 3041-3066, May.
    17. Chung‐Hui Chou, 2021. "Could coexistence of open‐source and proprietary platforms be an equilibrium outcome?," Manchester School, University of Manchester, vol. 89(3), pages 297-309, June.
    18. Engelhardt, Sebastian v. & Freytag, Andreas, 2013. "Institutions, culture, and open source," Journal of Economic Behavior & Organization, Elsevier, vol. 95(C), pages 90-110.
    19. Bitzer, Jürgen & Geishecker, Ingo, 2010. "Who contributes voluntarily to OSS? An investigation among German IT employees," Research Policy, Elsevier, vol. 39(1), pages 165-172, February.
    20. Luigi Di Gaetano, 2015. "A Model of corporate donations to open source under hardware–software complementarity," Industrial and Corporate Change, Oxford University Press and the Associazione ICC, vol. 24(1), pages 163-190.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:17:y:2020:i:1:p:56-73. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.