-
作者:Zwass, Vladimir
-
作者:Kumar, Ram L.; Park, Sungjune; Subramaniam, Chandrasekar
作者单位:University of North Carolina; University of North Carolina Charlotte; University of North Carolina; University of North Carolina Charlotte
摘要:Organizations are faced with a variety of information security threats and implement several information system security countermeasures (ISSCs) to mitigate possible damage due to security attacks. These security countermeasures vary in their ability to deal with different types of security attacks and, hence, are implemented as a portfolio of ISSCs. A key challenge for organizations is to understand the economic consequences of security attacks relative to the ISSC portfolio implemented. This...
-
作者:Bolton, Gary; Loebbecke, Claudia; Ockenfels, Axel
作者单位:University of Cologne; Bentley University; Pennsylvania Commonwealth System of Higher Education (PCSHE); Pennsylvania State University; Pennsylvania State University - University Park
摘要:We investigate whether greater market competition improves or inhibits the ability of feedback systems in Internet markets to deliver trust and trustworthiness to the marketplace. Our investigation is grounded in the theory of signaling from information economics. Using methods from experimental economics, we create a laboratory online market where sellers face a moral hazard. We manipulate the level of market competition and the nature of the social network behind the feedback system and stud...
-
作者:Cavusoglu, Huseyin; Raghunathan, Srinivasan; Yue, Wei T.
作者单位:University of Texas System; University of Texas Dallas; University of Texas System; University of Texas Dallas
摘要:Firms have been increasing their information technology (IT) security budgets significantly to deal with increased security threats. An examination of current practices reveals that managers view security investment as any other and use traditional decision-theoretic risk management techniques to determine security investments. We argue in this paper that this method is incomplete because of the problem's strategic nature-hackers alter their hacking strategies in response to a firm's investmen...
-
作者:Clemons, Eric K.
作者单位:University of Pennsylvania
摘要:Information availability has increased consumers' informedness, the degree to which they know what is available in the marketplace, with precisely which attributes and at precisely what price. This informedness has altered the demand side of market behavior: customers now discount more heavily when comparable products are available from competitors and when products do not meet their wants, needs, cravings, and longings, but they no longer discount as heavily when purchasing unfamiliar product...
-
作者:Dedrick, Jason; Xu, Sean Xin; Zhu, Kevin Xiaoguo
作者单位:University of California System; University of California Irvine; Hong Kong University of Science & Technology; University of California System; University of California San Diego
摘要:This research investigates the relationship between a manufacturer's use of information technology (IT) (particularly electronic procurement) and the number of suppliers in its supply chain. Will a manufacturer use more or fewer suppliers due to the increasing use of IT? Based on data from a sample of 150 U.S. manufacturers, we find no direct relationship between e-procurement and number of suppliers at the aggregate level. However, when we distinguish the type of goods purchased, we find that...
-
作者:Lankton, Nancy; Luft, Joan
作者单位:Michigan State University
摘要:Real options analysis is an important but costly tool for valuing many information technology (IT) investments. As a low-cost substitute for real options-based methods, firms often depend on managerial intuition, which sometimes approximates real options-based valuations and sometimes does not. Making good choices about how to value IT investments requires an understanding of why, and therefore when, intuitive judgment is more or less likely to be consistent with real options-based valuations....
-
作者:Johnson, M. Eric
作者单位:Dartmouth College
摘要:Firms face many different types of information security risk. Inadvertent disclosure of sensitive business information represents one of the largest classes of recent security breaches. We examine a specific instance of this problem-inadvertent disclosures through peer-to-peer file-sharing networks. We characterize the extent of the security risk for a group of large financial institutions using a direct analysis of leaked documents. We also characterize the threat of loss by examining search ...
-
作者:Png, Ivan P. L.; Wang, Chen-Yu; Wang, Qiu-Hong
作者单位:National University of Singapore; BNP Paribas
摘要:We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security attacks. We found limited evidence that domestic enforcement deters attacks within the country. However, we found compelling evidence of a displacement effect: U.S. enforcement substantially increases attacks originating from other countries. We also found strong evidence that attackers are economically motivated in that the ...