Author List: Mitra, Sabyasachi; Ransbotham, Sam;
Information Systems Research, 2015, Volume 26, Issue 3, Page 565-584.
With the nearly instantaneous dissemination of information in the modern era, policies regarding the disclosure of sensitive information have become the focus of significant discussion in several contexts. The fundamental debate centers on trade-offs inherent in disclosing information that society needs, but that can also be used for nefarious purposes. Using information security as a research context, our empirical study examines the adoption of software vulnerabilities by a population of attackers. We compare attacks based on software vulnerabilities disclosed through full-disclosure and limited-disclosure mechanisms. We find that full disclosure accelerates the diffusion of attacks, increases the penetration of attacks within the target population, and increases the risk of first attack after the vulnerability is reported. Interestingly, the effect of full disclosure is greater during periods when there are more overall vulnerabilities reported, indicating that attackers may strategically focus on busy periods when the effort of security professionals is spread across many vulnerabilities. Although the aggregate volume of attacks remains unaffected by full disclosure, attacks occur earlier in the life cycle of the vulnerability. Building off our theoretical insights, we discuss the implications of our findings in more general contexts.
Keywords: information security ; information disclosure ; software vulnerability ; diffusion of innovation ; negative innovation
Algorithm:

List of Topics

#56 0.234 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#186 0.203 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#49 0.114 adoption diffusion technology adopters innovation adopt process information potential innovations influence new characteristics early adopting set compatibility time initial current
#0 0.108 information types different type sources analysis develop used behavior specific conditions consider improve using alternative understanding data available main target
#22 0.069 software vendors vendor saas patch cloud release model vulnerabilities time patching overall quality delivery software-as-a-service high need security vulnerability actually
#285 0.063 effects effect research data studies empirical information literature different interaction analysis implications findings results important set large provide using paper
#236 0.051 form items item sensitive forms variety rates contexts fast coefficients meaning higher robust scores hardware providing compared single complete subgroups