IS

Temizkan, Orcun

Topic Weight Topic Terms
0.537 software vendors vendor saas patch cloud release model vulnerabilities time patching overall quality delivery software-as-a-service
0.367 source open software oss development developers projects developer proprietary community success openness impact paper project
0.148 model research data results study using theoretical influence findings theory support implications test collected tested
0.137 project projects development management isd results process team developed managers teams software stakeholders successful complex
0.116 network networks social analysis ties structure p2p exchange externalities individual impact peer-to-peer structural growth centrality

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Kumar, Ram L. 2 Park, SungJune 1 Subramaniam, Chandrasekar 1
exploitation 1 open source software development 1 patch quality 1 patch release time 1
patch types 1 project success 1 software vendor types 1 software vulnerability characteristics 1
survival analysis 1 social networks 1 software development 1 team formation 1

Articles (2)

Exploitation and Exploration Networks in Open Source Software Development: An Artifact-Level Analysis (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Open source software (OSS) development is an increasingly important paradigm of software development. However, key aspects of OSS such as the determinants of project success and motivations of developers in joining these projects are not well understood. Based on organizational theory, we propose that OSS activities of patch development and feature request can be classified as exploitation (implementation-oriented) and exploration (innovation-oriented) activities, respectively. We empirically examine how the structure of social network affects the success of patch-development and feature-request networks in OSS projects, using a data set collected from the SourceForge database. Our results provide empirical support for the view that patch development and feature request are exploitation and exploration activities, respectively. Network structures differ due to team formation differences and have a differential impact on development success based on the type of activity. The concepts of ambidextrous developers and ambidexterity are explored in the context of OSS projects. Collectively, our results indicate that studying OSS projects at the artifact level could improve our understanding of OSS project success and team formation. This, in turn, could lead to better management of OSS projects. > >
Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis. (Journal of Management Information Systems, 2012)
Authors: Abstract:
    Software vulnerabilities have become a serious concern because unpatched software runs the risk of being exploited by hackers. There is a need for software vendors to make software patches available in a timely manner for vulnerabilities in their products. We develop a survival analysis model of software vendors' patch release behavior and test it using a data set compiled from the National Vulnerability Database, United States Computer Emergency Readiness Team, and vendor Web sites. This model helps to understand how factors specific to vulnerabilities, patches, software vendors, and software affect the patch release behavior of software vendors based on their cost structure. This study also analyzes the impact of the presence of multiple vendors and type of vendor on the patch release behavior of software vendors. Our results indicate that vulnerabilities with high confidentiality impact or high integrity impact are patched faster than vulnerabilities with high availability impact. Interesting differences in the patch release behavior of software vendors based on software type (new release versus update) and type of vendor (open source versus proprietary) are found. Our results illustrate that when there are legislative pressures, vendors react faster in patching vulnerabilities. Thus, appropriate regulations can be an important policy tool to influence vendor behavior toward socially desirable security outcomes.