IS

Sen, Ravi

Topic Weight Topic Terms
0.327 source open software oss development developers projects developer proprietary community success openness impact paper project
0.285 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.285 market competition competitive network markets firms products competing competitor differentiation advantage competitors presence dominant structure
0.232 price buyers sellers pricing market prices seller offer goods profits buyer two-sided preferences purchase intermediary
0.232 online users active paper using increasingly informational user data internet overall little various understanding empirical
0.155 high low level levels increase associated related characterized terms study focus weak hand choose general
0.150 strategies strategy based effort paper different findings approach suggest useful choice specific attributes explain effective
0.139 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.139 search information display engine results engines displays retrieval effectiveness relevant process ranking depth searching economics
0.126 institutional pressures logic theory normative embedded context incumbent contexts forces inertia institutionalized environment pressure identify
0.120 data used develop multiple approaches collection based research classes aspect single literature profiles means crowd
0.104 software vendors vendor saas patch cloud release model vulnerabilities time patching overall quality delivery software-as-a-service

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Borle, Sharad 1 King, Ruth C. 1 Shaw, Michael J. 1
commercial open source 1 computer crime 1 computer security 1 data breach 1
data theft 1 e-commerce 1 e-markets 1 economics of open source 1
FLOSS 1 information security 1 IT security risks 1 multinomial logit 1
online pricing 1 online search tools 1 open source software 1 Price search 1
software competition 1 software market 1

Articles (3)

Estimating the Contextual Risk of Data Breach: An Empirical Approach (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Data breach incidents are on the rise, and have resulted in severe financial and legal implications for the affected organizations. We apply the opportunity theory of crime, the institutional anomie theory, and institutional theory to identify factors that could increase or decrease the contextual risk of data breach. We investigate the risk of data breach in the context of an organization's physical location, its primary industry, and the type of data breach that it may have suffered in the past. Given the location of an organization, the study finds support for application of the opportunity theory of crime and the institutional anomie theory in estimating the risk of data breach incidents within a state. In the context of the primary industry in which an organization operates, we find support for the institutional theory and the opportunity theory of crime in estimating risk of data breach incidents within an industry. Interestingly though, support for the opportunity theory of crime is partial. We find that investment in information technology (IT) security corresponds to a higher risk of data breach incidents within both a state and an industry, a result contrary to the one predicted by the opportunity theory of crime. A possible explanation for the contradiction is that investments in IT security are not being spent on the right kind of data security controls, a fact supported by evidence from the industry. The work has theoretical and practical implications. Theories from criminology are used to identify the risk factors of data breach incidents and the magnitude of their impact on the risk of data breach. Insights from the study can help IT security practitioners to assess the risk environment of their firm (in terms of data breaches) based on the firm's location, its industry sector, and the kind of breaches that the firm may typically be prone to. > >
A Strategic Analysis of Competition Between Open Source and Proprietary Software. (Journal of Management Information Systems, 2007)
Authors: Abstract:
    This paper analyzes a software market consisting of a freely available open source software (OSS), the commercial version of this OSS (OSS-SS), and the competing commercial proprietary software (PS). We find that in software markets characterized by low direct network benefits, the PS vendor is better off in the presence of competition from OSS-SS. Furthermore, the OSS-SS vendor in these markets is better off by having lower usability than PS. Therefore, the PS vendor has little incentive to improve the usability of their software in these markets. On the other hand, in software markets characterized by high network benefits, a PS vendor is threatened by the presence of OSS-SS and can survive only if the PS is more usable than the competing OSS-SS.
Buyers' Choice of Online Search Strategy and Its Managerial Implications. (Journal of Management Information Systems, 2006)
Authors: Abstract:
    The Internet offers several tools such as shopping bots and search engines that help potential buyers search for lower prices. This paper defines buyers' online search strategy as using one or more of these tools to search for lower prices, and empirically investigates the validity of economics of information search theory in explaining buyers' choice of a particular online search strategy. We find that buyers' attitudes toward the price offered by their preferred online seller, their perception of online price dispersion, and their awareness of shopping agents have a significant effect on their choice of online search strategy. An understanding of buyers' choice of online search strategies can help an online seller to estimate its expected probability of making an online sale, optimize its online pricing, and improve its online promotional and advertising activities.