ACQUISITION AND DIFFUSION OF TECHNOLOGY INNOVATION

ACKNOWLEDGEMENTS Acknowledgement sections are typically casually glossed over. Please don't do that now! Each name represents countless hours of active and behind-the-scenes support. And for each person mentioned, dozens of other people should have been mentioned as well. By tradition, students should be frustrated with their committee; I am not. At every stage they helped not hindered. I am grateful to the faculty and staff who helped make my third (and final?) degree from Georgia Tech a wonderful experience– Terry On a personal note, I again thank Saby Mitra who has been so much more than an advisor as a true model of intellectual excellence with an " enviable writing style ". I also thank my friend Robert Martin for encouraging geeky curiosity. I am blessed by my parents, Ben and June Ransbotham, and my sister, LeAnn, who have been constant supporters. And finally, I thank Stephanie Jernigan who just makes everything fun and the newest rookie on our team, Ava, whose recent arrival has already changed everything.

[1]  Graham K. Rand,et al.  Quantitative Applications in the Social Sciences , 1983 .

[2]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[3]  Mathew L. A. Hayward When do firms learn from their acquisition experience? Evidence from 1990 to 1995 , 2002 .

[4]  J HarringtonSusan The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions , 1996 .

[5]  Amitava Dutta,et al.  Management's Role in Information Security in a Cyber Economy , 2002 .

[6]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[7]  Bernhard Plattner,et al.  Large-scale vulnerability analysis , 2006, LSAD '06.

[8]  Saeyoung Chang,et al.  Takeovers of Privately Held Targets, Methods of Payment, and Bidder Returns , 1998 .

[9]  Mohammad S. Rahman,et al.  The Countervailing Incentive of Restricted Patch Distribution: Economic and Policy Implications , 2007, WEIS.

[10]  Laurence Capron,et al.  Acquisitions of private vs. public firms: Private information, target selection, and acquirer returns , 2007 .

[11]  Olga V. Smyslova,et al.  Flow-Based Model of Computer Hackers' Motivation , 2003, Cyberpsychology Behav. Soc. Netw..

[12]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[13]  Rahul Telang,et al.  Optimally Securing Enterprise Information Systems and Assets , 2007, WEIS.

[14]  Michael D. Smith,et al.  How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks , 2003, Financial Cryptography.

[15]  Rebecca Green,et al.  Typologies and taxonomies: An introduction to classification techniques , 1996 .

[16]  James William Coleman,et al.  Toward an Integrated Theory of White-Collar Crime , 1987, American Journal of Sociology.

[17]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..

[18]  R. Coff,et al.  How Buyers Cope with Uncertainty When Acquiring Firms in Knowledge-Intensive Industries: Caveat Emptor , 1999 .

[19]  Christoph H. Loch,et al.  Measuring the Effectiveness of Overlapping Development Activities , 1999 .

[20]  Helen Kelley,et al.  Morality and Computers: Attitudes and Differences in Moral Judgments , 1999, Inf. Syst. Res..

[21]  Pu Li,et al.  An examination of private intermediaries’ roles in software vulnerabilities disclosure , 2007, Inf. Syst. Frontiers.

[22]  Rosemarie H. Ziedonis Don't Fence Me in: Fragmented Markets for Technology and the Patent Acquisition Strategies of Firms , 2003, Manag. Sci..

[23]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[24]  J. L. Boockholdt Implementing Security and Integrity in Micro-Mainframe Networks , 1989, MIS Q..

[25]  Rita Gunther McGrath,et al.  Crafting R&D Project Portfolios , 2002 .

[26]  Ayn Embar-Seddon Cyberterrorism Are We Under Siege , 2002 .

[27]  T. Moeller Let's make a deal! How shareholder control impacts merger payoffs , 2005 .

[28]  Ramayya Krishnan,et al.  An Empirical Analysis of Vendor Response to Disclosure Policy , 2005, WEIS.

[29]  B. Campbell Table of Contents , 2018, Biological Psychiatry.

[30]  Ben Bowling,et al.  Racial Harassment and the Process of Victimization. Conceptual and Methodological Implications for the Local Crime Survey , 1993 .

[31]  Daniel A. Levinthal,et al.  ABSORPTIVE CAPACITY: A NEW PERSPECTIVE ON LEARNING AND INNOVATION , 1990 .

[32]  I. Ehrlich Participation in Illegitimate Activities: A Theoretical and Empirical Investigation , 1973, Journal of Political Economy.

[33]  Jose J. Gonzalez,et al.  Understanding Hidden Information Security Threats: The Vulnerability Black Market , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[34]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[35]  K. B. Hendricks,et al.  Delays in new product introductions and the market value of the firm: the consequences of being late to the market , 1997 .

[36]  John F. Rockart,et al.  Editor’s comments , 2005, MIS Q. Executive.

[37]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[38]  Klaus Julisch,et al.  Clustering intrusion detection alarms to support root cause analysis , 2003, TSEC.

[39]  Lawrence A. Gordon,et al.  Economic aspects of information security: An emerging field of research , 2006, Inf. Syst. Frontiers.

[40]  Marianne Swanson,et al.  SP 800-18 Rev. 1. Guide for Developing Security Plans for Federal Information Systems , 2006 .

[41]  Mikko T. Siponen,et al.  Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods , 2005, Inf. Organ..

[42]  Karl T. Ulrich,et al.  Holistic Customer Requirements and the Design-Select Decision , 1999 .

[43]  A. Arora,et al.  Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis , 2004 .

[44]  V. Krishnan,et al.  Technology Selection and Commitment in New Product Development: The Role of Uncertainty and Design Flexibility , 2002, Manag. Sci..

[45]  Abagail McWilliams,et al.  Event Studies In Management Research: Theoretical And Empirical Issues , 1997 .

[46]  James F. Fairbank,et al.  Managing Uncertainty in a Formal Standards-Based Industry: A Real Options Perspective on Acquisition Timing , 2006 .

[47]  V. Barnett,et al.  Applied Linear Statistical Models , 1975 .

[48]  B. Lambrecht,et al.  The Timing and Terms of Mergers Motivated by Economies of Scale , 2003 .

[49]  Annette L. Ranft,et al.  Acquiring New Technologies and Capabilities: A Grounded Model of Acquisition Implementation , 2002, Organ. Sci..

[50]  Erik Stafford,et al.  New Evidence and Perspectives on Mergers , 2001 .

[51]  Jerold B. Warner,et al.  Using daily stock returns: The case of event studies , 1985 .

[52]  Robert F. Bruner,et al.  The gains to bidding firms from merger , 1983 .

[53]  Terrence August,et al.  Network Software Security and User Incentives , 2006, Manag. Sci..

[54]  Karl T. Ulrich,et al.  Special Issue on Design and Development: Product Development Decisions: A Review of the Literature , 2001, Manag. Sci..

[55]  C. Terwiesch,et al.  When product development performance makes a difference: A statistical analysis in the electronics industry , 1998 .

[56]  A. Tiwana,et al.  Beyond Valuation: “Options Thinking” in IT Project Management , 2005 .

[57]  K. Bailey Typologies and taxonomies: An introduction to classification techniques. , 1994 .

[58]  R. Katila,et al.  Technological acquisitions and the innovation performance of acquiring firms: a longitudinal study , 2001 .

[59]  James C. Wetherbe,et al.  Key Issues in Information Systems Management: 1994-95 SIM Delphi Results , 1996, MIS Q..

[60]  Hao Xu,et al.  Optimal Policy for Software Vulnerability Disclosure , 2008, Manag. Sci..

[61]  Rathindra Sarathy,et al.  The Security of Confidential Numerical Data in Databases , 2002, Inf. Syst. Res..

[62]  K. Eisenhardt,et al.  PRODUCT DEVELOPMENT: PAST RESEARCH, PRESENT FINDINGS, AND FUTURE DIRECTIONS , 1995 .

[63]  Rahul Telang,et al.  Optimally securing interconnected information systems and assets , 2006 .

[64]  D. Cressey,et al.  Principles of Criminology. , 1947 .

[65]  Christoph H. Loch,et al.  Rush and Be Wrong or Wait and Be Late? A Model of Information in Collaborative Processes , 2005 .

[66]  Bronwyn H Hall,et al.  Market value and patent citations , 2005 .

[67]  David Stolin,et al.  Returns to Acquirers of Listed and Unlisted Targets , 2004, Journal of Financial and Quantitative Analysis.

[68]  RICHAFID BASKERVILLE,et al.  Information systems security design methods: implications for information systems development , 1993, CSUR.

[69]  John Braithwaite,et al.  Crime, Shame, And Reintegration , 1989 .

[70]  T. Luehrman,et al.  Strategy as a portfolio of real options. , 1998, Harvard business review.

[71]  Terance D. Miethe,et al.  Crime and its social context : toward an integrated theory of offenders, victims, and situations , 1995 .

[72]  Suresh Kotha,et al.  Continuous “Morphing”: Competing Through Dynamic Capabilities, Form, and Function , 2001 .

[73]  G. Tellis,et al.  Research on Innovation: A Review and Agenda for Marketing Science , 2006 .

[74]  A. Strauss,et al.  Grounded theory , 2017 .

[75]  Randall A. Heron,et al.  Do early birds get the returns? An empirical investigation of early‐mover advantages in acquisitions , 2004 .

[76]  Rahul Telang,et al.  Competition and Quality Restoration : An Empirical Analysis of Vendor Response to Software Vulnerabilities , 2005 .

[77]  J. Gans,et al.  The Product Market and the Market for 'Ideas': Commercialization Strategies for Technology Entrepreneurs , 2002 .

[78]  G. Manimaran,et al.  Internet infrastructure security: a taxonomy , 2002, IEEE Netw..

[79]  Rahul Telang,et al.  Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation , 2005, WEIS.

[80]  Jesper B. Sørensen,et al.  Aging, Obsolescence, and Organizational Innovation , 2000 .

[81]  B. Tabrizi,et al.  Capturing the real value in high-tech acquisitions. , 1999, Harvard business review.

[82]  James Backhouse,et al.  Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..

[83]  Huseyin Cavusoglu,et al.  The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..

[84]  Debora Halbert Discourses of Danger and the Computer Hacker , 1997, Inf. Soc..

[85]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[86]  Mary Tripsas UNRAVELING THE PROCESS OF CREATIVE DESTRUCTION: COMPLEMENTARY ASSETS AND INCUMBENT SURVIVAL IN THE TYPESETTER INDUSTRY: UNRAVELING THE PROCESS OF CREATIVE DESTRUCTION , 1997 .

[87]  Micah S. Officer,et al.  The Price of Corporate Liquidity: Acquisition Discounts for Unlisted Targets , 2007 .

[88]  L. Lanza-Kaduce,et al.  Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.

[89]  Detmar W. Straub,et al.  Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..

[90]  Karen A. Scarfone,et al.  A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .

[91]  G. A. Avanesov,et al.  The Principles of Criminology , 1982 .

[92]  M. Iansiti Shooting the Rapids: Managing Product Development in Turbulent Environments , 1995 .

[93]  John D. Howard,et al.  An analysis of security incidents on the Internet 1989-1995 , 1998 .

[94]  Larry E. Toothaker,et al.  Multiple Regression: Testing and Interpreting Interactions , 1991 .

[95]  Karl T. Ulrich,et al.  50th Anniversary Article: Technological Innovation, Product Development, and Entrepreneurship in Management Science , 2004, Manag. Sci..

[96]  Nadia Bhuiyan,et al.  Simulation of the New Product Development Process for Performance Improvement , 2004, Manag. Sci..

[97]  Wallace P. Mullin Will gun buyback programs increase the quantity of guns , 2001 .

[98]  M. C. Jensen,et al.  Agency Costs of Free Cash Flow, Corporate Finance, and Takeovers , 1999 .

[99]  L.L. DeLooze Classification of computer attacks using a self-organizing map , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[100]  Rita Gunther McGrath,et al.  Real options reasoning and a new look at the R&D investment strategies of pharmaceutical firms , 2004 .

[101]  Huseyin Cavusoglu,et al.  Emerging Issues in Responsible Vulnerability Disclosure , 2005, WEIS.

[102]  E. Eugene Schultz Sarbanes-Oxley - a huge boon to information security in the US , 2004, Comput. Secur..

[103]  A. Ozment,et al.  Bug Auctions: Vulnerability Markets Reconsidered , 2004 .

[104]  Marilyn D. McShane,et al.  Victims of crime and the victimization process , 1997 .

[105]  A. Cohen,et al.  Delinquent Boys: The Culture of the Gang. , 1955 .

[106]  Harbir Singh,et al.  Organizing for Innovation: Managing the Coordination-Autonomy Dilemma in Technology Acquisitions , 2006 .

[107]  M. Sobel Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models , 1982 .

[108]  Teck-Hua Ho,et al.  New product development: the performance and time-to-market tradeoff , 1996 .

[109]  Karl T. Ulrich,et al.  Valuing R&D Projects in a Portfolio: Evidence from the Pharmaceutical Industry , 2007, Manag. Sci..

[110]  Matthew J. Higgins,et al.  The outsourcing of R&D through acquisitions in the pharmaceutical industry , 2006 .

[111]  Nalin Kulatilaka,et al.  Disciplined Decisions: Aligning Strategy with the Financial Markets , 1999 .

[112]  Z. Griliches Patent Statistics as Economic Indicators: a Survey , 1990 .

[113]  Rahul Telang,et al.  Does information security attack frequency increase with vulnerability disclosure? An empirical analysis , 2006, Inf. Syst. Frontiers.

[114]  Christopher L. Tucci,et al.  Incumbent Entry into New Market Niches: The Role of Experience and Managerial Choice in the Creation of Dynamic Capabilities , 2002, Manag. Sci..

[115]  Pierangela Samarati,et al.  Authentication, access control, and audit , 1996, CSUR.

[116]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[117]  Markus K. Brunnermeier,et al.  Hedge Funds and the Technology Bubble , 2003 .

[118]  E. Press Delinquent Boys—The Culture of the Gang , 1955 .

[119]  Roberto Di Pietro,et al.  Security and privacy issues of handheld and wearable wireless devices , 2003, CACM.

[120]  Rahul Telang,et al.  Market for Software Vulnerabilities? Think Again , 2005, Manag. Sci..

[121]  A. Mackinlay,et al.  Event Studies in Economics and Finance , 1997 .

[122]  Vijay Mahajan,et al.  Issues and Opportunities in New Product Development: An Introduction to the Special Issue , 1997 .

[123]  G A Cioffi,et al.  Theoretically speaking , 2015, Nature Photonics.

[124]  Giovanni Vigna,et al.  Intrusion detection: a brief history and overview , 2002 .

[125]  M. Hitt,et al.  Market value effects of acquisitions involving internet firms: a resource‐based analysis , 2006 .

[126]  René M. Stulz,et al.  Firm size and the gains from acquisitions , 2004 .

[127]  D. Whetten What Constitutes a Theoretical Contribution , 1989 .

[128]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[129]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[130]  Daniel A. Levinthal,et al.  What Is Not A Real Option: Considering Boundaries for the Application of Real Options to Business Strategy , 2004 .

[131]  Jeffry Netter,et al.  What do returns to acquiring firms tell us? Evidence from firms that make many acquisitions , 2002 .

[132]  Christopher S. Tang,et al.  Modelling the Costs and Benefits of Delayed Product Differentiation , 1997 .

[133]  Frank M. Bass,et al.  A New Product Growth for Model Consumer Durables , 2004, Manag. Sci..

[134]  Frédéric Cuppens,et al.  Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[135]  Raimar Richers The theory of economic development , 1961 .

[136]  I. Ehrlich Crime, Punishment, and the Market for Offenses , 1996 .

[137]  P. Santa-clara,et al.  Idiosyncratic Risk Matters! , 2002 .

[138]  Barry M. Horowitz,et al.  The potential for underinvestment in internet security: implications for regulatory policy , 2006, WEIS.

[139]  Peng Ning,et al.  Techniques and tools for analyzing intrusion alerts , 2004, TSEC.

[140]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[141]  L. Capron,et al.  When do acquirers earn abnormal returns , 2002 .

[142]  Terrence August,et al.  Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions , 2008, Inf. Syst. Res..

[143]  Dmitri Nizovtsev,et al.  To Disclose or Not? An Analysis of Software User Behavior , 2006, Inf. Econ. Policy.

[144]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[145]  K. Eisenhardt,et al.  Strategic decision processes in high velocity environments: four cases in the microcomputer industry , 1988 .

[146]  D. Austin,et al.  An Event-Study Approach to Measuring Innovative Output: The Case of Biotechnology , 1993 .

[147]  D.,et al.  Regression Models and Life-Tables , 2022 .

[148]  Rita Gunther McGrath A Real Options Logic for Initiating Technology Positioning Investments , 1997 .

[149]  Michael D. Smith,et al.  Computer security strength and risk: a quantitative approach , 2004 .