A Transaction Cost Model of Electronic Trust: Transactional Return, Incentives for Network Security and Optimal Risk in the Digital Economy
暂无分享,去创建一个
[1] O. Williamson. Markets and hierarchies, analysis and antitrust implications : a study in the economics of internal organization , 1975 .
[2] Eric K. Clemons,et al. The Impact of Information Technology on the Organization of Economic Activity: The "Move to the Middle" Hypothesis , 1993, J. Manag. Inf. Syst..
[3] A. Froomkin. The Essential Role of Trusted Third Parties in Electronic Commerce , 1996 .
[4] Bruce Kogut,et al. The Nature of the Firm: Origins, Evolution, and Development.by Oliver E. Williamson; Sidney G. Winter , 1993 .
[5] R. Coase,et al. The Firm, the Market, and the Law , 1990 .
[6] Charles H. Kriebel,et al. Information Technologies and Business Value: An Analytic and Empirical Investigation , 1995, Inf. Syst. Res..
[7] Eric K. Clemons,et al. Information technology and economic reorganizational , 1989, ICIS '89.
[8] Frank Rose. The Economics, Concept, and Design of Information Intermediaries , 1998 .
[9] Jean Tirole,et al. The theory of the firm , 1989 .
[10] P. Ring,et al. Structuring cooperative relationships between organizations , 1992 .
[11] E. Clemons,et al. INFORMATION TECHNOLOGY AND ECONOMIC REORGANIZATION , 1989 .
[12] M. C. Jensen,et al. THEORY OF THE FIRM: MANAGERIAL BEHAVIOR, AGENCY COSTS AND OWNERSHIP STRUCTURE , 1976 .
[13] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[14] J. P. Bailey,et al. Understanding Digital Markets: Review and Assessment , 2001 .
[15] Erik Brynjolfsson,et al. Information technology, incentives and the optimal number of suppliers , 1993, Proceedings of ELECTRO '94.
[16] Ramayya Krishnan,et al. Assessing data quality in accounting information systems , 1998, CACM.
[17] Simon Singh,et al. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography , 1999 .
[18] Stuart McClure,et al. Hacking Exposed; Network Security Secrets and Solutions , 1999 .
[19] Dorothy E. Denning,et al. Information Warfare And Security , 1998 .
[20] Isij Monitor,et al. Network Intrusion Detection: An Analyst’s Handbook , 2000 .
[21] R. Gulati,et al. STRATEGIC NETWORKS , 2000 .
[22] C. J. Howard. CyberShock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Distruction , 2002 .
[23] Suresh L. Konda,et al. The Survivability of Network Systems: An Empirical Analysis , 2000 .
[24] M. C. Jensen,et al. Harvard Business School; SSRN; National Bureau of Economic Research (NBER); European Corporate Governance Institute (ECGI); Harvard University - Accounting & Control Unit , 1976 .
[25] Chris F. Kemerer,et al. Computerized Loan Origination Systems: An Industry Case Study of the Electronic Markets Hypothesis , 1994, MIS Q..
[26] O. Williamson. Hierarchical Control and Optimum Firm Size , 1967, Journal of Political Economy.
[27] Joseph M. Reagle. Trust in Electronic Markets , 1996, First Monday.
[28] Paul R. Milgrom,et al. Economics, Organization and Management , 1992 .
[29] J. Hennart,et al. Explaining the swollen middle : Why most transactions are a mix of market and hierarchy , 1993 .
[30] JoAnne Yates,et al. Electronic markets and electronic hierarchies , 1987, CACM.
[31] Ho Geun Lee,et al. Do electronic marketplaces lower the price of goods? , 1998, CACM.
[32] Mohanbir Sawhney,et al. Let's Get Vertical! , 1999 .
[33] Winn Schwartau,et al. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption , 2000 .
[34] Carleen Maitland,et al. Trust in cyberspace , 2000 .
[35] Lorin M. Hitt,et al. Information Technology and Firm Boundaries: Evidence from Panel Data , 1999, Inf. Syst. Res..
[36] Stuart McClure,et al. Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition , 2001 .
[37] Stuart McClure,et al. Hacking Exposed Windows 2000: Network Security Secrets and Solutions , 2001 .
[38] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[39] Joseph M. Reagle. Trust in electronic markets: The convergence of cryptographers and economists (originally published in August 1996) , 2005 .
[40] O. Hart,et al. Property Rights and the Nature of the Firm , 1988, Journal of Political Economy.
[41] Vijay Gurbaxani,et al. The impact of information systems on organizations and markets , 1991, CACM.
[42] J. Bakos,et al. From vendors to partners: Information technology and incomplete contracts in buyer‐supplier relationships , 1993 .
[43] Erik Brynjolfsson,et al. The productivity paradox of information technology , 1993, CACM.
[44] Sanford J. Grossman,et al. The Costs and Benefits of Ownership: A Theory of Vertical and Lateral Integration , 1986 .
[45] Paul J. Deitel,et al. e-Business and e-Commerce How to Program , 2000 .
[46] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[47] Bernardo A. Huberman,et al. A methodology for managing risk in electronic transactions over the Internet , 2000 .
[48] Joan V. Robinson,et al. The Nature of the Firm , 2004 .
[49] Sirkka L. Jarvenpaa,et al. Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..
[50] Stephen E. Margolis,et al. ARE NETWORK EXTERNALITIES A NEW SOURCE OF MARKET FAILURE , 1995 .
[51] Kaj Grønbæk,et al. CSCW challenges: cooperative design in engineering projects , 1993, CACM.
[52] Randall K. Nichols. ICSA guide to cryptography , 1998 .
[53] K. Eisenhardt. Agency Theory: An Assessment and Review , 1989 .
[54] Yannis Bakos,et al. Organizational Partnerships and the Virtual Corporation , 1998 .
[55] F. Schneider. Trust in Cyberspace , 1998 .