Showing 6,251 - 6,260 of 6,524
Many software developers employ bug bounty programs that award a prize for the detection of bugs in their software. We analyze, in a model with asymmetric information, under which conditions a bug bounty program is beneficial for a software developer. In our model, a bug bounty program allows...
Persistent link: https://www.econbiz.de/10014097789
Machine ethics is a key challenge in times when digital systems play an increasing role in people’s lives. At the core of machine ethics is the handling of personal data and the security of machine operations. Yet, privacy and security engineering are a challenge in today’s business world...
Persistent link: https://www.econbiz.de/10014097792
Cross-border data flows are the lifeblood of today’s social and economic interactions, but they also raise a range of new challenges, including for privacy and data protection, national security, cybersecurity, digital protectionism and regulatory reach. This has led to a surge in regulation...
Persistent link: https://www.econbiz.de/10015179230
Persistent link: https://www.econbiz.de/10003712627
Manufacturers customarily provide only a few product variants to address the average needs of users in the major segments of markets they serve. When user needs are highly heterogeneous, this approach leaves many seriously dissatisfied. One solution is to enable users to modify products on their...
Persistent link: https://www.econbiz.de/10014034230
By software vendors offering, via the cloud, software as a service (SaaS) versions of traditionally on-premises application software, security risks associated with usage become more diversified which can greatly increase the value associated with the software. In an environment where negative...
Persistent link: https://www.econbiz.de/10014042540
Persistent link: https://www.econbiz.de/10013556723
The market for security software has witnessed an unprecedented growth in recent years. A closer examination of this market reveals certain idiosyncrasies that are not observed in a traditional market. For example, it is a highly competitive market with over eighty vendors. Yet, the market...
Persistent link: https://www.econbiz.de/10014182302
We study how the impact of capabilities for performance is contingent upon the environment. Using a novel dataset of Information Security startups, we study how markets for technology change the relative impact of technology and marketing capabilities on performance. Since internal technical...
Persistent link: https://www.econbiz.de/10014182874
Much information security research focuses on policies firms could adopt to reduce or eliminate employees’ violation behavior. However, current information security policies are based on increasingly outmoded models of compliance behavior. This paper proposes a novel behavioral-based mechanism...
Persistent link: https://www.econbiz.de/10014344438