ACQUISITION AND DIFFUSION OF TECHNOLOGY INNOVATION
暂无分享,去创建一个
[1] Graham K. Rand,et al. Quantitative Applications in the Social Sciences , 1983 .
[2] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[3] Mathew L. A. Hayward. When do firms learn from their acquisition experience? Evidence from 1990 to 1995 , 2002 .
[4] J HarringtonSusan. The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions , 1996 .
[5] Amitava Dutta,et al. Management's Role in Information Security in a Cyber Economy , 2002 .
[6] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[7] Bernhard Plattner,et al. Large-scale vulnerability analysis , 2006, LSAD '06.
[8] Saeyoung Chang,et al. Takeovers of Privately Held Targets, Methods of Payment, and Bidder Returns , 1998 .
[9] Mohammad S. Rahman,et al. The Countervailing Incentive of Restricted Patch Distribution: Economic and Policy Implications , 2007, WEIS.
[10] Laurence Capron,et al. Acquisitions of private vs. public firms: Private information, target selection, and acquirer returns , 2007 .
[11] Olga V. Smyslova,et al. Flow-Based Model of Computer Hackers' Motivation , 2003, Cyberpsychology Behav. Soc. Netw..
[12] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[13] Rahul Telang,et al. Optimally Securing Enterprise Information Systems and Assets , 2007, WEIS.
[14] Michael D. Smith,et al. How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks , 2003, Financial Cryptography.
[15] Rebecca Green,et al. Typologies and taxonomies: An introduction to classification techniques , 1996 .
[16] James William Coleman,et al. Toward an Integrated Theory of White-Collar Crime , 1987, American Journal of Sociology.
[17] Timothy Paul Cronan,et al. Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..
[18] R. Coff,et al. How Buyers Cope with Uncertainty When Acquiring Firms in Knowledge-Intensive Industries: Caveat Emptor , 1999 .
[19] Christoph H. Loch,et al. Measuring the Effectiveness of Overlapping Development Activities , 1999 .
[20] Helen Kelley,et al. Morality and Computers: Attitudes and Differences in Moral Judgments , 1999, Inf. Syst. Res..
[21] Pu Li,et al. An examination of private intermediaries’ roles in software vulnerabilities disclosure , 2007, Inf. Syst. Frontiers.
[22] Rosemarie H. Ziedonis. Don't Fence Me in: Fragmented Markets for Technology and the Patent Acquisition Strategies of Firms , 2003, Manag. Sci..
[23] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[24] J. L. Boockholdt. Implementing Security and Integrity in Micro-Mainframe Networks , 1989, MIS Q..
[25] Rita Gunther McGrath,et al. Crafting R&D Project Portfolios , 2002 .
[26] Ayn Embar-Seddon. Cyberterrorism Are We Under Siege , 2002 .
[27] T. Moeller. Let's make a deal! How shareholder control impacts merger payoffs , 2005 .
[28] Ramayya Krishnan,et al. An Empirical Analysis of Vendor Response to Disclosure Policy , 2005, WEIS.
[29] B. Campbell. Table of Contents , 2018, Biological Psychiatry.
[30] Ben Bowling,et al. Racial Harassment and the Process of Victimization. Conceptual and Methodological Implications for the Local Crime Survey , 1993 .
[31] Daniel A. Levinthal,et al. ABSORPTIVE CAPACITY: A NEW PERSPECTIVE ON LEARNING AND INNOVATION , 1990 .
[32] I. Ehrlich. Participation in Illegitimate Activities: A Theoretical and Empirical Investigation , 1973, Journal of Political Economy.
[33] Jose J. Gonzalez,et al. Understanding Hidden Information Security Threats: The Vulnerability Black Market , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[34] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[35] K. B. Hendricks,et al. Delays in new product introductions and the market value of the firm: the consequences of being late to the market , 1997 .
[36] John F. Rockart,et al. Editor’s comments , 2005, MIS Q. Executive.
[37] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[38] Klaus Julisch,et al. Clustering intrusion detection alarms to support root cause analysis , 2003, TSEC.
[39] Lawrence A. Gordon,et al. Economic aspects of information security: An emerging field of research , 2006, Inf. Syst. Frontiers.
[40] Marianne Swanson,et al. SP 800-18 Rev. 1. Guide for Developing Security Plans for Federal Information Systems , 2006 .
[41] Mikko T. Siponen,et al. Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods , 2005, Inf. Organ..
[42] Karl T. Ulrich,et al. Holistic Customer Requirements and the Design-Select Decision , 1999 .
[43] A. Arora,et al. Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis , 2004 .
[44] V. Krishnan,et al. Technology Selection and Commitment in New Product Development: The Role of Uncertainty and Design Flexibility , 2002, Manag. Sci..
[45] Abagail McWilliams,et al. Event Studies In Management Research: Theoretical And Empirical Issues , 1997 .
[46] James F. Fairbank,et al. Managing Uncertainty in a Formal Standards-Based Industry: A Real Options Perspective on Acquisition Timing , 2006 .
[47] V. Barnett,et al. Applied Linear Statistical Models , 1975 .
[48] B. Lambrecht,et al. The Timing and Terms of Mergers Motivated by Economies of Scale , 2003 .
[49] Annette L. Ranft,et al. Acquiring New Technologies and Capabilities: A Grounded Model of Acquisition Implementation , 2002, Organ. Sci..
[50] Erik Stafford,et al. New Evidence and Perspectives on Mergers , 2001 .
[51] Jerold B. Warner,et al. Using daily stock returns: The case of event studies , 1985 .
[52] Robert F. Bruner,et al. The gains to bidding firms from merger , 1983 .
[53] Terrence August,et al. Network Software Security and User Incentives , 2006, Manag. Sci..
[54] Karl T. Ulrich,et al. Special Issue on Design and Development: Product Development Decisions: A Review of the Literature , 2001, Manag. Sci..
[55] C. Terwiesch,et al. When product development performance makes a difference: A statistical analysis in the electronics industry , 1998 .
[56] A. Tiwana,et al. Beyond Valuation: “Options Thinking” in IT Project Management , 2005 .
[57] K. Bailey. Typologies and taxonomies: An introduction to classification techniques. , 1994 .
[58] R. Katila,et al. Technological acquisitions and the innovation performance of acquiring firms: a longitudinal study , 2001 .
[59] James C. Wetherbe,et al. Key Issues in Information Systems Management: 1994-95 SIM Delphi Results , 1996, MIS Q..
[60] Hao Xu,et al. Optimal Policy for Software Vulnerability Disclosure , 2008, Manag. Sci..
[61] Rathindra Sarathy,et al. The Security of Confidential Numerical Data in Databases , 2002, Inf. Syst. Res..
[62] K. Eisenhardt,et al. PRODUCT DEVELOPMENT: PAST RESEARCH, PRESENT FINDINGS, AND FUTURE DIRECTIONS , 1995 .
[63] Rahul Telang,et al. Optimally securing interconnected information systems and assets , 2006 .
[64] D. Cressey,et al. Principles of Criminology. , 1947 .
[65] Christoph H. Loch,et al. Rush and Be Wrong or Wait and Be Late? A Model of Information in Collaborative Processes , 2005 .
[66] Bronwyn H Hall,et al. Market value and patent citations , 2005 .
[67] David Stolin,et al. Returns to Acquirers of Listed and Unlisted Targets , 2004, Journal of Financial and Quantitative Analysis.
[68] RICHAFID BASKERVILLE,et al. Information systems security design methods: implications for information systems development , 1993, CSUR.
[69] John Braithwaite,et al. Crime, Shame, And Reintegration , 1989 .
[70] T. Luehrman,et al. Strategy as a portfolio of real options. , 1998, Harvard business review.
[71] Terance D. Miethe,et al. Crime and its social context : toward an integrated theory of offenders, victims, and situations , 1995 .
[72] Suresh Kotha,et al. Continuous “Morphing”: Competing Through Dynamic Capabilities, Form, and Function , 2001 .
[73] G. Tellis,et al. Research on Innovation: A Review and Agenda for Marketing Science , 2006 .
[74] A. Strauss,et al. Grounded theory , 2017 .
[75] Randall A. Heron,et al. Do early birds get the returns? An empirical investigation of early‐mover advantages in acquisitions , 2004 .
[76] Rahul Telang,et al. Competition and Quality Restoration : An Empirical Analysis of Vendor Response to Software Vulnerabilities , 2005 .
[77] J. Gans,et al. The Product Market and the Market for 'Ideas': Commercialization Strategies for Technology Entrepreneurs , 2002 .
[78] G. Manimaran,et al. Internet infrastructure security: a taxonomy , 2002, IEEE Netw..
[79] Rahul Telang,et al. Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation , 2005, WEIS.
[80] Jesper B. Sørensen,et al. Aging, Obsolescence, and Organizational Innovation , 2000 .
[81] B. Tabrizi,et al. Capturing the real value in high-tech acquisitions. , 1999, Harvard business review.
[82] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[83] Huseyin Cavusoglu,et al. The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..
[84] Debora Halbert. Discourses of Danger and the Computer Hacker , 1997, Inf. Soc..
[85] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[86] Mary Tripsas. UNRAVELING THE PROCESS OF CREATIVE DESTRUCTION: COMPLEMENTARY ASSETS AND INCUMBENT SURVIVAL IN THE TYPESETTER INDUSTRY: UNRAVELING THE PROCESS OF CREATIVE DESTRUCTION , 1997 .
[87] Micah S. Officer,et al. The Price of Corporate Liquidity: Acquisition Discounts for Unlisted Targets , 2007 .
[88] L. Lanza-Kaduce,et al. Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.
[89] Detmar W. Straub,et al. Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..
[90] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .
[91] G. A. Avanesov,et al. The Principles of Criminology , 1982 .
[92] M. Iansiti. Shooting the Rapids: Managing Product Development in Turbulent Environments , 1995 .
[93] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[94] Larry E. Toothaker,et al. Multiple Regression: Testing and Interpreting Interactions , 1991 .
[95] Karl T. Ulrich,et al. 50th Anniversary Article: Technological Innovation, Product Development, and Entrepreneurship in Management Science , 2004, Manag. Sci..
[96] Nadia Bhuiyan,et al. Simulation of the New Product Development Process for Performance Improvement , 2004, Manag. Sci..
[97] Wallace P. Mullin. Will gun buyback programs increase the quantity of guns , 2001 .
[98] M. C. Jensen,et al. Agency Costs of Free Cash Flow, Corporate Finance, and Takeovers , 1999 .
[99] L.L. DeLooze. Classification of computer attacks using a self-organizing map , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[100] Rita Gunther McGrath,et al. Real options reasoning and a new look at the R&D investment strategies of pharmaceutical firms , 2004 .
[101] Huseyin Cavusoglu,et al. Emerging Issues in Responsible Vulnerability Disclosure , 2005, WEIS.
[102] E. Eugene Schultz. Sarbanes-Oxley - a huge boon to information security in the US , 2004, Comput. Secur..
[103] A. Ozment,et al. Bug Auctions: Vulnerability Markets Reconsidered , 2004 .
[104] Marilyn D. McShane,et al. Victims of crime and the victimization process , 1997 .
[105] A. Cohen,et al. Delinquent Boys: The Culture of the Gang. , 1955 .
[106] Harbir Singh,et al. Organizing for Innovation: Managing the Coordination-Autonomy Dilemma in Technology Acquisitions , 2006 .
[107] M. Sobel. Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models , 1982 .
[108] Teck-Hua Ho,et al. New product development: the performance and time-to-market tradeoff , 1996 .
[109] Karl T. Ulrich,et al. Valuing R&D Projects in a Portfolio: Evidence from the Pharmaceutical Industry , 2007, Manag. Sci..
[110] Matthew J. Higgins,et al. The outsourcing of R&D through acquisitions in the pharmaceutical industry , 2006 .
[111] Nalin Kulatilaka,et al. Disciplined Decisions: Aligning Strategy with the Financial Markets , 1999 .
[112] Z. Griliches. Patent Statistics as Economic Indicators: a Survey , 1990 .
[113] Rahul Telang,et al. Does information security attack frequency increase with vulnerability disclosure? An empirical analysis , 2006, Inf. Syst. Frontiers.
[114] Christopher L. Tucci,et al. Incumbent Entry into New Market Niches: The Role of Experience and Managerial Choice in the Creation of Dynamic Capabilities , 2002, Manag. Sci..
[115] Pierangela Samarati,et al. Authentication, access control, and audit , 1996, CSUR.
[116] Huseyin Cavusoglu,et al. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..
[117] Markus K. Brunnermeier,et al. Hedge Funds and the Technology Bubble , 2003 .
[118] E. Press. Delinquent Boys—The Culture of the Gang , 1955 .
[119] Roberto Di Pietro,et al. Security and privacy issues of handheld and wearable wireless devices , 2003, CACM.
[120] Rahul Telang,et al. Market for Software Vulnerabilities? Think Again , 2005, Manag. Sci..
[121] A. Mackinlay,et al. Event Studies in Economics and Finance , 1997 .
[122] Vijay Mahajan,et al. Issues and Opportunities in New Product Development: An Introduction to the Special Issue , 1997 .
[123] G A Cioffi,et al. Theoretically speaking , 2015, Nature Photonics.
[124] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[125] M. Hitt,et al. Market value effects of acquisitions involving internet firms: a resource‐based analysis , 2006 .
[126] René M. Stulz,et al. Firm size and the gains from acquisitions , 2004 .
[127] D. Whetten. What Constitutes a Theoretical Contribution , 1989 .
[128] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[129] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[130] Daniel A. Levinthal,et al. What Is Not A Real Option: Considering Boundaries for the Application of Real Options to Business Strategy , 2004 .
[131] Jeffry Netter,et al. What do returns to acquiring firms tell us? Evidence from firms that make many acquisitions , 2002 .
[132] Christopher S. Tang,et al. Modelling the Costs and Benefits of Delayed Product Differentiation , 1997 .
[133] Frank M. Bass,et al. A New Product Growth for Model Consumer Durables , 2004, Manag. Sci..
[134] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[135] Raimar Richers. The theory of economic development , 1961 .
[136] I. Ehrlich. Crime, Punishment, and the Market for Offenses , 1996 .
[137] P. Santa-clara,et al. Idiosyncratic Risk Matters! , 2002 .
[138] Barry M. Horowitz,et al. The potential for underinvestment in internet security: implications for regulatory policy , 2006, WEIS.
[139] Peng Ning,et al. Techniques and tools for analyzing intrusion alerts , 2004, TSEC.
[140] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[141] L. Capron,et al. When do acquirers earn abnormal returns , 2002 .
[142] Terrence August,et al. Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions , 2008, Inf. Syst. Res..
[143] Dmitri Nizovtsev,et al. To Disclose or Not? An Analysis of Software User Behavior , 2006, Inf. Econ. Policy.
[144] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[145] K. Eisenhardt,et al. Strategic decision processes in high velocity environments: four cases in the microcomputer industry , 1988 .
[146] D. Austin,et al. An Event-Study Approach to Measuring Innovative Output: The Case of Biotechnology , 1993 .
[147] D.,et al. Regression Models and Life-Tables , 2022 .
[148] Rita Gunther McGrath. A Real Options Logic for Initiating Technology Positioning Investments , 1997 .
[149] Michael D. Smith,et al. Computer security strength and risk: a quantitative approach , 2004 .