Will the Information Security Industry Die? Applying Social Network Analysis to Sturdy Industry Convergence

In this paper, we first analyze the trends in mergers and acquisitions (M&As) activities among information security firms and other information technology (IT) firms in the US over the period 1996 to 2008. We then use social network analysis to investigate the characteristics and underlying dynamics of these M&As activities. Our results reveal an increase in cohesiveness of 200% in the network linking the information security firms and the IT firms considered in our analysis. This, in turn, implies a move towards industry convergence. In particular, we show that acquisitions of identity and access management (IAM) firms have become more central to M&As by IT firms in the US since 2004, reflecting an increasing trend among IT firms to integrate IAM technologies within their products.

[1]  R. S. Ramesh,et al.  Competitive Advantage - Creating Sustaining Superior Performance , 2011 .

[2]  N. Phillips,et al.  The concept of industry and the case of radical technological change , 2002 .

[3]  John Scott What is social network analysis , 2010 .

[4]  Nils Stieglitz,et al.  Digital Dynamics and Types of Industry Convergence: The Evolution of the Handheld Computers Market , 2007 .

[5]  N. Economides,et al.  COMPETITION AND INTEGRATION AMONG COMPLEMENTS, AND NETWORK MARKET STRUCTURE* , 1992 .

[6]  S. D. Berkowitz,et al.  Social Structures: A Network Approach , 1989 .

[7]  Lara Khansa,et al.  The Influence of Regulations on Innovation in Information Security , 2007, AMCIS.

[8]  Bala Iyer,et al.  Using Software Stacks to Explain Complementarities: The Case of Mergers and Acquisitions in the Software Industry , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[9]  Barry L. Bayus,et al.  The Role of Pre-Entry Experience, Entry Timing and Product Technology Strategies in Explaining Firm Survival , 2007, Manag. Sci..

[10]  S. Wasserman,et al.  Social Network Analysis: Computer Programs , 1994 .

[11]  Yoram Wind,et al.  Marketing and Social Networks , 1994 .

[12]  Philippa Pattison,et al.  The analysis of semigroups of multirelational systems , 1982 .

[13]  Bruce Schneier,et al.  The Death of the Security Industry , 2007, IEEE Secur. Priv..

[14]  John Scott Social Network Analysis , 1988 .

[15]  David B. Yoffie,et al.  Competing in the Age of Digital Convergence , 1997 .

[16]  Jonathan H. Turner,et al.  Toward a Structural Theory of Action: Network Models of Social Structure, Perception and Action.Ronald S. Burt , 1985 .

[17]  B. Wellman Structural analysis: From method and metaphor to theory and substance. , 1988 .

[18]  John Gallaugher,et al.  Understanding Network Effects in Software Markets: Evidence from Web Server Pricing , 2002, MIS Q..

[19]  Kenneth W. Koput,et al.  Software variety and hardware value: A case study of complementary network externalities in the microcomputer software industry , 1998 .