IS

Zhang, Guoying

Topic Weight Topic Terms
0.348 market competition competitive network markets firms products competing competitor differentiation advantage competitors presence dominant structure
0.157 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.141 effects effect research data studies empirical information literature different interaction analysis implications findings results important
0.111 software vendors vendor saas patch cloud release model vulnerabilities time patching overall quality delivery software-as-a-service

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Dey, Debabrata 1 Lahiri, Atanu 1
market structure 1 mass attacks 1 negative network effect 1 network effect 1
oligopoly 1 pricing 1 security software 1 strategic hacker 1
targeted attacks 1

Articles (1)

Hacker Behavior, Network Effects, and the Security Software Market. (Journal of Management Information Systems, 2012)
Authors: Abstract:
    The market for security software has witnessed an unprecedented growth in recent years. A closer examination of this market reveals certain idiosyncrasies that are not observed in a traditional market. For example, it is a highly competitive market with over 80 vendors. Yet the market coverage is relatively low. Prior research has not attempted to explain what makes this market so different. In this paper, we develop an economic model to find possible answers to this question. Our model uses existing classification of different types of attacks and models their resulting network effects. We find that the negative network effect from indirect attacks, which is further enhanced by value-based targeted attacks, provides a possible explanation for the unique structure of this market. Overall, our results highlight the unique nature of the security software market, furnish rigorous arguments for several counterintuitive observations in the real world, and provide managerial insights for vendors on market competition.