{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:31:43Z","timestamp":1760711503061,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T00:00:00Z","timestamp":1649808000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T00:00:00Z","timestamp":1649808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10660-022-09558-4","type":"journal-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T19:39:36Z","timestamp":1649878776000},"page":"2691-2712","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A competitive analysis of software quality investment with technology diversification and security concern"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5397-3979","authenticated-orcid":false,"given":"Xing","family":"Gao","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"issue":"3","key":"9558_CR1","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/s13235-013-0102-y","volume":"4","author":"A Garcia","year":"2014","unstructured":"Garcia, A., Sun, Y., & She, J. (2014). Dynamic platform competition with malicious consumers. Dynamic Games and Applications, 4(3), 290\u2013308.","journal-title":"Dynamic Games and Applications"},{"issue":"2","key":"9558_CR2","doi-asserted-by":"crossref","first-page":"397","DOI":"10.2307\/23044049","volume":"35","author":"P Chen","year":"2011","unstructured":"Chen, P., Kataria, G., & Krishnan, R. (2011). Correlated failures, diversification, and information security risk management. MIS Quarterly, 35(2), 397\u2013422.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9558_CR3","doi-asserted-by":"crossref","first-page":"117","DOI":"10.2753\/MIS0742-1222290304","volume":"29","author":"KL Hui","year":"2012","unstructured":"Hui, K. L., Hui, W., & Yue, W. T. (2012). Information security outsourcing with system interdependency and mandatory security requirement. Journal of Management Information Systems, 29(3), 117\u2013155.","journal-title":"Journal of Management Information Systems"},{"key":"9558_CR4","unstructured":"Geer, D., Bace, R., Gutmann, P., Metzger, P., Pfleeger, C. P., Quarterman, J. S., & Schneier, B. (2003). CyberInsecurity: The Cost of Monopoly. Report. http:\/\/cryptome.org\/cyberinsecurity.htm"},{"issue":"4","key":"9558_CR5","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1016\/S0167-7187(98)00003-4","volume":"16","author":"P Belleflamme","year":"1998","unstructured":"Belleflamme, P. (1998). Adoption of network technologies in oligopolies. International Journal of Industrial Organization, 16(4), 415\u2013444.","journal-title":"International Journal of Industrial Organization"},{"issue":"5\u20136","key":"9558_CR6","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/j.ijindorg.2005.03.002","volume":"23","author":"L Wiethaus","year":"2005","unstructured":"Wiethaus, L. (2005). Absorptive capacity and connectedness: Why competing firms also adopt identical R&D approaches. International Journal of Industrial Organization, 23(5\u20136), 467\u2013481.","journal-title":"International Journal of Industrial Organization"},{"issue":"2","key":"9558_CR7","first-page":"461","volume":"14","author":"GMJ Molt\u00f3","year":"2005","unstructured":"Molt\u00f3, G. M. J., Georgantz\u00eds, N., & Orts, V. (2005). Cooperative R&D with endogenous technology differentiation. Journal of Economics & Management Strategy, 14(2), 461\u2013476.","journal-title":"Journal of Economics & Management Strategy"},{"issue":"7","key":"9558_CR8","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1016\/S0167-7187(00)00054-0","volume":"18","author":"M Kamien","year":"2000","unstructured":"Kamien, M., & Zang, I. (2000). Meet me halfway: Research joint ventures and absorptive capacity. International Journal of Industrial Organization, 18(7), 995\u20131012.","journal-title":"International Journal of Industrial Organization"},{"issue":"2","key":"9558_CR9","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.dss.2012.01.007","volume":"53","author":"A Lahiri","year":"2012","unstructured":"Lahiri, A. (2012). Revisiting the incentive to tolerate illegal distribution of software products. Decision Support Systems, 53(2), 357\u2013367.","journal-title":"Decision Support Systems"},{"issue":"2","key":"9558_CR10","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1086\/261222","volume":"92","author":"I Novos","year":"1984","unstructured":"Novos, I., & Waldman, M. (1984). The effect of increased copyright protection: An analytic approach. Journal of Political Economy, 92(2), 236\u2013246.","journal-title":"Journal of Political Economy"},{"issue":"1","key":"9558_CR11","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1287\/mnsc.1120.1578","volume":"59","author":"A Lahiri","year":"2013","unstructured":"Lahiri, A., & Dey, D. (2013). Effects of piracy on quality of information goods. Management Science, 59(1), 245\u2013264.","journal-title":"Management Science"},{"issue":"4","key":"9558_CR12","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1287\/mksc.1070.0313","volume":"27","author":"S Jain","year":"2008","unstructured":"Jain, S. (2008). Digital piracy: A competitive analysis. Marketing Science, 27(4), 610\u2013626.","journal-title":"Marketing Science"},{"issue":"4","key":"9558_CR13","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.dss.2008.11.018","volume":"46","author":"J Jaisingh","year":"2009","unstructured":"Jaisingh, J. (2009). Impact of piracy on innovation at software firms and implications for piracy policy. Decision Support Systems, 46(4), 763\u2013773.","journal-title":"Decision Support Systems"},{"issue":"4","key":"9558_CR14","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1287\/mksc.13.4.392","volume":"13","author":"D Purohit","year":"1994","unstructured":"Purohit, D. (1994). What should you do when your competitors send in the clones? Marketing Science, 13(4), 392\u2013411.","journal-title":"Marketing Science"},{"issue":"4","key":"9558_CR15","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.infoecopol.2010.07.001","volume":"22","author":"WY Cho","year":"2010","unstructured":"Cho, W. Y., & Ahn, B. H. (2010). Versioning of information goods under the threat of piracy. Information Economics and Policy, 22(4), 332\u2013340.","journal-title":"Information Economics and Policy"},{"key":"9558_CR16","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1016\/j.dss.2007.07.009","volume":"44","author":"W Hui","year":"2008","unstructured":"Hui, W., Yoo, B., & Tam, K. Y. (2008). Economics of shareware: How do uncertainty and piracy affect shareware quality and brand premium? Decision Support Systems, 44, 580\u2013594.","journal-title":"Decision Support Systems"},{"key":"9558_CR17","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.dss.2013.04.005","volume":"56","author":"W Cho","year":"2013","unstructured":"Cho, W., Subramanyam, R., & Xia, M. (2013). Vendors\u2019 incentives to invest in software quality in enterprise systems. Decision Support Systems, 56, 27\u201336.","journal-title":"Decision Support Systems"},{"issue":"5799","key":"9558_CR18","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610\u2013613.","journal-title":"Science"},{"issue":"4","key":"9558_CR19","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5(4), 438\u2013457.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"9558_CR20","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1016\/j.ijpe.2008.04.002","volume":"114","author":"D Huang","year":"2008","unstructured":"Huang, D., Qing, H., & Ravi, B. (2008). An economic analysis of the optimal information security investment in the case of a risk-averse firm. International Journal of Production Economics, 114(2), 793\u2013804.","journal-title":"International Journal of Production Economics"},{"issue":"1","key":"9558_CR21","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s10799-010-0066-1","volume":"11","author":"T Bandyopadhyay","year":"2010","unstructured":"Bandyopadhyay, T., Jacob, V., & Raghunathan, S. (2010). Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest. Information Technology and Management, 11(1), 7\u201323.","journal-title":"Information Technology and Management"},{"issue":"2\u20133","key":"9558_CR22","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H Kunreuther","year":"2003","unstructured":"Kunreuther, H., & Heal, G. (2003). Interdependent security. Journal of Risk and Uncertainty, 26(2\u20133), 231\u2013249.","journal-title":"Journal of Risk and Uncertainty"},{"issue":"2","key":"9558_CR23","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/isre.1050.0053","volume":"16","author":"E Gal-Or","year":"2005","unstructured":"Gal-Or, E., & Ghose, A. (2005). The economic incentives for sharing security information. Information Systems Research, 16(2), 186\u2013208.","journal-title":"Information Systems Research"},{"issue":"6","key":"9558_CR24","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.jaccpubpol.2003.09.001","volume":"22","author":"LA Gordon","year":"2003","unstructured":"Gordon, L. A., Loeb, M. P., & Lucyshyn, W. (2003). Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy, 22(6), 461\u2013485.","journal-title":"Journal of Accounting and Public Policy"},{"issue":"11","key":"9558_CR25","doi-asserted-by":"crossref","first-page":"1682","DOI":"10.1057\/jors.2013.133","volume":"65","author":"X Gao","year":"2014","unstructured":"Gao, X., Zhong, W., & Mei, S. (2014). A game-theoretic analysis of information sharing and security investment for complementary firms. Journal of the Operational Research Society, 65(11), 1682\u20131691.","journal-title":"Journal of the Operational Research Society"},{"issue":"1","key":"9558_CR26","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.dss.2011.05.007","volume":"52","author":"D Liu","year":"2011","unstructured":"Liu, D., Ji, Y., & Mookerjee, V. (2011). Knowledge sharing and investment decisions in information security. Decision Support Systems, 52(1), 95\u2013107.","journal-title":"Decision Support Systems"},{"issue":"11","key":"9558_CR27","doi-asserted-by":"crossref","first-page":"1703","DOI":"10.1287\/mnsc.1060.0568","volume":"52","author":"T August","year":"2006","unstructured":"August, T., & Tunca, T. I. (2006). Network software security and consumer incentives. Management Science, 52(11), 1703\u20131720.","journal-title":"Management Science"},{"issue":"5","key":"9558_CR28","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1287\/mnsc.1100.1304","volume":"57","author":"T August","year":"2011","unstructured":"August, T., & Tunca, T. I. (2011). Who should be responsible for software security? A comparative analysis of liability policies in network environments. Management Science, 57(5), 934\u2013959.","journal-title":"Management Science"},{"issue":"3","key":"9558_CR29","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1287\/isre.2014.0527","volume":"25","author":"T August","year":"2014","unstructured":"August, T., Niculescu, M. F., & Shin, H. (2014). Cloud implications on software network structure and security risks. Information Systems Research, 25(3), 489\u2013510.","journal-title":"Information Systems Research"},{"issue":"10","key":"9558_CR30","doi-asserted-by":"crossref","first-page":"4575","DOI":"10.1287\/mnsc.2018.3153","volume":"65","author":"T August","year":"2019","unstructured":"August, T., Dao, D., & Kim, K. (2019). Market segmentation and software security: Pricing patching rights. Management Science, 65(10), 4575\u20134597.","journal-title":"Management Science"},{"issue":"3","key":"9558_CR31","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1287\/mnsc.2013.1763","volume":"60","author":"A Cezar","year":"2014","unstructured":"Cezar, A., Cavusoglu, H., & Raghunathan, S. (2014). Outsourcing information security: Contracting issues and security implications. Management Science, 60(3), 638\u2013657.","journal-title":"Management Science"},{"issue":"2","key":"9558_CR32","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1287\/isre.2018.0806","volume":"30","author":"KL Hui","year":"2019","unstructured":"Hui, K. L., Ke, P. F., Yao, Y., & Yue, W. T. (2019). Bilateral liability-based contracts in information security outsourcing. Information Systems Research, 30(2), 411\u2013429.","journal-title":"Information Systems Research"},{"issue":"2","key":"9558_CR33","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1287\/isre.1120.0447","volume":"24","author":"CH Lee","year":"2013","unstructured":"Lee, C. H., Geng, X., & Raghunathan, S. (2013). Contracting information security in the presence of double moral hazard. Information Systems Research, 24(2), 295\u2013311.","journal-title":"Information Systems Research"},{"issue":"2","key":"9558_CR34","doi-asserted-by":"crossref","first-page":"77","DOI":"10.2753\/MIS0742-1222290204","volume":"29","author":"D Dey","year":"2012","unstructured":"Dey, D., Lahiri, A., & Zhang, G. (2012). Hacker behavior, network effects, and the security software market. Journal of Management Information Systems, 29(2), 77\u2013108.","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"9558_CR35","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s10479-015-1925-2","volume":"235","author":"X Gao","year":"2015","unstructured":"Gao, X., & Zhong, W. (2015). Information security investment for competitive firms with hacker behavior and security requirements. Annals of Operations Research, 235(1), 277\u2013300.","journal-title":"Annals of Operations Research"},{"issue":"2","key":"9558_CR36","doi-asserted-by":"crossref","first-page":"97","DOI":"10.2753\/MIS0742-1222260205","volume":"26","author":"IPL Png","year":"2009","unstructured":"Png, I. P. L., & Wang, Q. H. (2009). Information security facilitating consumer precautions vis-\u00e0-vis enforcement against attackers. Journal of Management Information Systems, 26(2), 97\u2013121.","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"9558_CR37","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.ijpe.2012.06.022","volume":"141","author":"CD Huang","year":"2013","unstructured":"Huang, C. D., & Behara, R. S. (2013). Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. International Journal of Production Economics, 141(1), 255\u2013268.","journal-title":"International Journal of Production Economics"},{"issue":"4","key":"9558_CR38","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1287\/deca.2013.0278","volume":"10","author":"X Gao","year":"2013","unstructured":"Gao, X., Zhong, W., & Mei, S. (2013). Information security investment when hackers disseminate knowledge. Decision Analysis, 10(4), 352\u2013368.","journal-title":"Decision Analysis"},{"issue":"3","key":"9558_CR39","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1287\/isre.1100.0341","volume":"22","author":"V Mookerjee","year":"2011","unstructured":"Mookerjee, V., Mookerjee, R., Bensoussan, A., & Yue, W. T. (2011). When hackers talk: Managing information security under variable attack rates and knowledge dissemination. Information Systems Research, 22(3), 606\u2013623.","journal-title":"Information Systems Research"},{"issue":"4","key":"9558_CR40","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1007\/s10796-012-9373-x","volume":"16","author":"T Bandyopadhyay","year":"2014","unstructured":"Bandyopadhyay, T., Liu, D., Mookerjee, V. S., & Wilhite, A. W. (2014). Dynamic competition in IT security: A differential games approach. Information Systems Frontiers, 16(4), 643\u2013661.","journal-title":"Information Systems Frontiers"},{"issue":"6","key":"9558_CR41","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1080\/0740817X.2015.1125044","volume":"48","author":"X Gao","year":"2016","unstructured":"Gao, X., & Zhong, W. (2016). A differential game approach to security investment and information sharing in a competitive environment. IIE Transactions, 48(6), 511\u2013526.","journal-title":"IIE Transactions"},{"issue":"1","key":"9558_CR42","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1287\/isre.1070.0143","volume":"19","author":"J Wang","year":"2008","unstructured":"Wang, J., Chaudhury, A., & Rao, H. R. (2008). A value-at-risk approach to information security investment. Information Systems Research, 19(1), 106\u2013120.","journal-title":"Information Systems Research"},{"issue":"2","key":"9558_CR43","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1042091.1042094","volume":"48","author":"LD Bodin","year":"2005","unstructured":"Bodin, L. D., Gordon, L. A., & Loeb, M. P. (2005). Evaluating information security investments using the analytic hierarchy process. Communications of the ACM, 48(2), 78\u201383.","journal-title":"Communications of the ACM"},{"issue":"4","key":"9558_CR44","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.dss.2010.08.017","volume":"50","author":"S Chai","year":"2011","unstructured":"Chai, S., Kim, M., & Rao, H. R. (2011). Firms\u2019 information security investment decisions: Stock market evidence of investors\u2019 behavior. Decision Support Systems, 50(4), 651\u2013661.","journal-title":"Decision Support Systems"},{"issue":"1","key":"9558_CR45","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/10864415.2004.11044320","volume":"9","author":"H Cavusoglu","year":"2004","unstructured":"Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of Internet security breach announcements on market value: Capital market reaction for breached firms and Internet security developers. International Journal of Electronic Commerce, 9(1), 69\u2013105.","journal-title":"International Journal of Electronic Commerce"},{"issue":"3","key":"9558_CR46","doi-asserted-by":"crossref","first-page":"431","DOI":"10.3233\/JCS-2003-11308","volume":"11","author":"K Campbell","year":"2003","unstructured":"Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 11(3), 431\u2013448.","journal-title":"Journal of Computer Security"},{"issue":"4","key":"9558_CR47","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1287\/isre.2017.0722","volume":"28","author":"O Temizkan","year":"2017","unstructured":"Temizkan, O., Park, S., & Saydam, C. (2017). Software diversity for improved network security: Optimal distribution of software-based shared vulnerabilities. Information Systems Research, 28(4), 828\u2013849.","journal-title":"Information Systems Research"},{"issue":"2","key":"9558_CR48","first-page":"223","volume":"8","author":"R Amir","year":"1999","unstructured":"Amir, R., & Wooders, J. (1999). Effects of one-way spillovers on market shares, industry price, welfare, and R&D cooperation. Journal of Economics & Management Strategy, 8(2), 223\u2013249.","journal-title":"Journal of Economics & Management Strategy"},{"key":"9558_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/game.1999.0734","volume":"31","author":"R Amir","year":"2000","unstructured":"Amir, R. (2000). One-way spillovers, endogenous innovator\/imitator roles, and research joint ventures. Games and Economic Behavior, 31, 1\u201325.","journal-title":"Games and Economic Behavior"},{"key":"9558_CR50","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.jebo.2006.04.007","volume":"66","author":"A Tesoriere","year":"2008","unstructured":"Tesoriere, A. (2008). Endogenous R&D symmetry in linear duopoly with one-way spillovers. Journal of Economic Behavior & Organization, 66, 213\u2013225.","journal-title":"Journal of Economic Behavior & Organization"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-022-09558-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10660-022-09558-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-022-09558-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T20:43:38Z","timestamp":1698785018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10660-022-09558-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,13]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["9558"],"URL":"https:\/\/doi.org\/10.1007\/s10660-022-09558-4","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"type":"print","value":"1389-5753"},{"type":"electronic","value":"1572-9362"}],"subject":[],"published":{"date-parts":[[2022,4,13]]},"assertion":[{"value":"29 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}