IDEAS home Printed from https://ideas.repec.org/r/inm/orisre/v25y2014i3p489-510.html
   My bibliography  Save this item

Cloud Implications on Software Network Structure and Security Risks

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
  2. Mehdi Nezami & Kapil R. Tuli & Shantanu Dutta, 2022. "Shareholder wealth implications of software firms’ transition to cloud computing: a marketing perspective," Journal of the Academy of Marketing Science, Springer, vol. 50(3), pages 538-562, May.
  3. Bo Li & Subodha Kumar, 2022. "Managing Software‐as‐a‐Service: Pricing and operations," Production and Operations Management, Production and Operations Management Society, vol. 31(6), pages 2588-2608, June.
  4. Vidyanand Choudhary & Zhe (James) Zhang, 2015. "Research Note—Patching the Cloud: The Impact of SaaS on Patching Strategy and the Timing of Software Release," Information Systems Research, INFORMS, vol. 26(4), pages 845-858, December.
  5. Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan, 2019. "A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs," Information Systems Frontiers, Springer, vol. 21(5), pages 959-977, October.
  6. Kai-Lung Hui & Ping Fan Ke & Yuxi Yao & Wei T. Yue, 2019. "Bilateral Liability-Based Contracts in Information Security Outsourcing," Information Systems Research, INFORMS, vol. 30(2), pages 411-429, June.
  7. Jasmien Lismont & Tine Van Calster & María Óskarsdóttir & Seppe vanden Broucke & Bart Baesens & Wilfried Lemahieu & Jan Vanthienen, 2019. "Closing the Gap Between Experts and Novices Using Analytics-as-a-Service: An Experimental Study," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 61(6), pages 679-693, December.
  8. Mingwen Yang & Varghese S. Jacob & Srinivasan Raghunathan, 2021. "Cloud Service Model’s Role in Provider and User Security Investment Incentives," Production and Operations Management, Production and Operations Management Society, vol. 30(2), pages 419-437, February.
  9. Guofang Nan & Xingtao Li & Zan Zhang & Minqiang Li, 0. "Optimal pricing for new product entry under free strategy," Information Technology and Management, Springer, vol. 0, pages 1-19.
  10. Nikhil Malik & Manmohan Aseri & Param Vir Singh & Kannan Srinivasan, 2022. "Why Bitcoin Will Fail to Scale?," Management Science, INFORMS, vol. 68(10), pages 7323-7349, October.
  11. Terrence August & Duy Dao & Kihoon Kim, 2019. "Market Segmentation and Software Security: Pricing Patching Rights," Management Science, INFORMS, vol. 65(10), pages 4575-4597, October.
  12. Guofang Nan & Xingtao Li & Zan Zhang & Minqiang Li, 2018. "Optimal pricing for new product entry under free strategy," Information Technology and Management, Springer, vol. 19(1), pages 1-19, March.
  13. Rajib L. Saha & Sumanta Singha & Subodha Kumar, 2021. "Does Congestion Always Hurt? Managing Discount Under Congestion in a Game-Theoretic Setting," Information Systems Research, INFORMS, vol. 32(4), pages 1347-1367, December.
  14. Confente, Ilenia & Siciliano, Giorgia Giusi & Gaudenzi, Barbara & Eickhoff, Matthias, 2019. "Effects of data breaches from user-generated content: A corporate reputation analysis," European Management Journal, Elsevier, vol. 37(4), pages 492-504.
  15. Dan Ma & Abraham Seidmann, 2015. "Analyzing Software as a Service with Per-Transaction Charges," Information Systems Research, INFORMS, vol. 26(2), pages 360-378, June.
  16. Chen, Li-Ming & Chang, Wei-Lun, 2020. "Under what conditions can an application service firm with in-house computing benefit from cloudbursting?," European Journal of Operational Research, Elsevier, vol. 282(1), pages 71-80.
  17. Xu, Zhuo, 2019. "An empirical study of patients' privacy concerns for health informatics as a service," Technological Forecasting and Social Change, Elsevier, vol. 143(C), pages 297-306.
  18. Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
  19. Zan Zhang & Guofang Nan & Yong Tan, 2020. "Cloud Services vs. On-Premises Software: Competition Under Security Risk and Product Customization," Information Systems Research, INFORMS, vol. 31(3), pages 848-864, September.
  20. Debabrata Dey & Atanu Lahiri & Guoying Zhang, 2015. "Optimal Policies for Security Patch Management," INFORMS Journal on Computing, INFORMS, vol. 27(3), pages 462-477, August.
  21. Prüfer, Jens, 2018. "Trusting privacy in the cloud," Information Economics and Policy, Elsevier, vol. 45(C), pages 52-67.
  22. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
  23. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
  24. Arrah-Marie Jo, 2019. "Software vulnerability disclosure and security investment [L'impact de la divulgation d’une faille de sécurité : au-delà des motivations de l’éditeur de logiciel]," Post-Print hal-03033198, HAL.
  25. Orcun Temizkan & Sungjune Park & Cem Saydam, 2017. "Software Diversity for Improved Network Security: Optimal Distribution of Software-Based Shared Vulnerabilities," Information Systems Research, INFORMS, vol. 28(4), pages 828-849, December.
  26. Alain Bensoussan & Vijay Mookerjee & Wei T. Yue, 2020. "Managing Information System Security Under Continuous and Abrupt Deterioration," Production and Operations Management, Production and Operations Management Society, vol. 29(8), pages 1894-1917, August.
  27. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.