Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments
Download full text from publisher
References listed on IDEAS
- Hasan Cavusoglu & Huseyin Cavusoglu & Jun Zhang, 2008. "Security Patch Management: Share the Burden or Share the Damage?," Management Science, INFORMS, vol. 54(4), pages 657-670, April.
- Li, Lode & McKelvey, Richard D. & Page, Talbot, 1987. "Optimal research for cournot oligopolists," Journal of Economic Theory, Elsevier, vol. 42(1), pages 140-166, June.
- Muller, Holger M., 2000. "Asymptotic Efficiency in Dynamic Principal-Agent Problems," Journal of Economic Theory, Elsevier, vol. 91(2), pages 292-301, April.
- Fudenberg, Drew & Maskin, Eric, 1986. "The Folk Theorem in Repeated Games with Discounting or with Incomplete Information," Econometrica, Econometric Society, vol. 54(3), pages 533-554, May.
- Kolstad, Charles D & Ulen, Thomas S & Johnson, Gary V, 1990. "Ex Post Liability for Harm vs. Ex Ante Safety Regulation: Substitutes or Complements?," American Economic Review, American Economic Association, vol. 80(4), pages 888-901, September.
- Walter Y. Oi, 1973. "The Economics of Product Safety," Bell Journal of Economics, The RAND Corporation, vol. 4(1), pages 3-28, Spring.
- Ashish Arora & Rahul Telang & Hao Xu, 2008. "Optimal Policy for Software Vulnerability Disclosure," Management Science, INFORMS, vol. 54(4), pages 642-656, April.
- Jay Pil Choi & Chaim Fershtman & Neil Gandal, 2010.
"Network Security: Vulnerabilities And Disclosure Policy,"
Journal of Industrial Economics,
Wiley Blackwell, vol. 58(4), pages 868-894, December.
- Choi, Jay-Pil & Fershtman, Chaim & Gandal, Neil, 2007. "Network Security: Vulnerabilities and Disclosure Policy," CEPR Discussion Papers 6134, C.E.P.R. Discussion Papers.
- Rubinstein, Ariel, 1979. "Equilibrium in supergames with the overtaking criterion," Journal of Economic Theory, Elsevier, vol. 21(1), pages 1-9, August.
- Galina Vereshchagina & Hugo A. Hopenhayn, 2009. "Risk Taking by Entrepreneurs," American Economic Review, American Economic Association, vol. 99(5), pages 1808-1830, December.
- Jean-Jacques Laffont & Jean Tirole, 1993. "A Theory of Incentives in Procurement and Regulation," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262121743, July.
- Steven Shavell, 1982. "On Liability and Insurance," Bell Journal of Economics, The RAND Corporation, vol. 13(1), pages 120-132, Spring.
- Terrence August & Tunay I. Tunca, 2006. "Network Software Security and User Incentives," Management Science, INFORMS, vol. 52(11), pages 1703-1720, November.
- Michael Spence, 1977. "Consumer Misperceptions, Product Failure and Producer Liability," Review of Economic Studies, Oxford University Press, vol. 44(3), pages 561-572.
- Zhixi Wan & Damian R. Beil, 2009. "RFQ Auctions with Supplier Qualification Screening," Post-Print hal-00471441, HAL.
- Polinsky, A Mitchell, 1980. "Strict Liability vs. Negligence in a Market Setting," American Economic Review, American Economic Association, vol. 70(2), pages 363-367, May.
- Jeroen M. Swinkels & Wolfgang Pesendorfer, 2000.
"Efficiency and Information Aggregation in Auctions,"
American Economic Review,
American Economic Association, vol. 90(3), pages 499-525, June.
- Wolfgang Pesendorfer & Jeroen M. Swinkels, 1996. "Efficiency and Information Aggregation in Auctions," Discussion Papers 1168, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
- MacLeod, W Bentley & Malcomson, James M, 1993. "Investments, Holdup, and the Form of Market Contracts," American Economic Review, American Economic Association, vol. 83(4), pages 811-837, September.
CitationsCitations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
- Lam, W., 2015. "Attack-Deterring and Damage-Control Investments in Cybersecurity," CORE Discussion Papers 2015023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
More about this item
KeywordsIT policy and management; economics of IS; network economics; enabling technologies; software; liability; zero-day;
StatisticsAccess and download statistics
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ormnsc:v:57:y:2011:i:5:p:934-959. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Mirko Janc). General contact details of provider: http://edirc.repec.org/data/inforea.html .
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.