2010
DOI: 10.1016/j.infoecopol.2009.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Competition and patching of security vulnerabilities: An empirical analysis

Abstract: a b s t r a c tWe empirically estimate the effect of competition on vendor patching of software defects by exploiting variation in number of vendors that share a common flaw or common vulnerabilities. We distinguish between two effects: the direct competition effect when vendors in the same market share a vulnerability, and the indirect effect, which operates through non-rivals that operate in different markets but nonetheless share the same vulnerability. Using time to patch as our measure of quality, we find… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
32
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(34 citation statements)
references
References 33 publications
2
32
0
Order By: Relevance
“…In [19], authors show that on average a vendor loses 0.6% of the stock price with the disclosure of a vulnerability. In [8], authors show that a vendor with more competitors patches the vulnerabilities more quickly. In [7], they show that the vulnerability disclosure accelerates the patch release.…”
Section: B Studies On Disclosure and Patchingmentioning
confidence: 99%
See 1 more Smart Citation
“…In [19], authors show that on average a vendor loses 0.6% of the stock price with the disclosure of a vulnerability. In [8], authors show that a vendor with more competitors patches the vulnerabilities more quickly. In [7], they show that the vulnerability disclosure accelerates the patch release.…”
Section: B Studies On Disclosure and Patchingmentioning
confidence: 99%
“…The goal of such work is to estimate the number of vulnerabilities in new software products. Another direction of work aims to study the changes in the patching behavior of vendors in response to vulnerability disclosures and the existence of competitors [7], [8]. These studies analyze only small vulnerability data sets and do not cover the behavior of individual vendors.…”
Section: Introductionmentioning
confidence: 99%
“…This study shows, and this is in particular emphasized in work concerning maintenance in security and safety sensitive environments [38], that maintenance behavior in purchasing organizations is not universal, but can be unified into a maintenance lifecycle model that takes different contexts into account. It presents a comprehensive review of the reasons for maintenance deferral and implementation within the area of vendor software from the purchaser's perspective.…”
Section: Discussionmentioning
confidence: 88%
“…Should a trigger event occur and be ignored, possible consequences include economic damage to the company [38], higher expenditure and forced outages at a later time [30], or even demise of the purchasing organization itself [5].…”
Section: Deferral Has Consequencesmentioning
confidence: 99%
See 1 more Smart Citation