Competition between proprietary and open source vendors with security concerns

被引:1
作者
Gao, Xing [1 ]
机构
[1] Southeast Univ, Sch Econ & Management, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Open source software; proprietary software; user innovation; technology similarity; OPEN-SOURCE SOFTWARE; OPEN SOURCE TECHNOLOGY; IMPACT; INVESTMENT; STRATEGY; ECONOMICS; LIABILITY; SERVICES; FIRMS; MODEL;
D O I
10.1080/09537325.2022.2045011
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
There exists fierce competition in both low-end and high-end markets between open source and proprietary vendors. This paper constructs a game-theoretic model based on Hotelling competition to examine such two types of vendors' market strategies with security threats. Each vendor can choose to enter high-end market by making the quality effort meet the quality requirement. Security threats are caused by software vulnerability and characterised by negative externalities. Technology similarity is an important element that improves the efficiency of quality effort by facilitating technology spillover but worsens security threats by sharing more vulnerability. Through solving equilibrium solutions by backward induction, I find that under different market strategies: (i) user innovation that contributes to the quality of software product and service of the open source vendor does not always increase its profit because price competition that is intensified by such innovation may offset the contribution; (ii) the risk of security threats benefits both vendors at the cost of user interest since it can soften price competition, while technology similarity that acts as another source of security threats decreases both vendors' profits. I finally indicate that thanks to user innovation, the open source vendor is relatively more likely to enter the high-end market.
引用
收藏
页码:592 / 604
页数:13
相关论文
共 50 条
[41]   An Analysis and Comparison of Proprietary and Open-Source Software for Building E-commerce Website: A Case Study [J].
Blancaflor, Eric B. ;
Samonte, Sasky A. .
JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (03) :426-430
[42]   Open Source Supply Chain Security at Google [J].
Cox, Russ .
PROCEEDINGS OF THE 2023 WORKSHOP ON SOFTWARE SUPPLY CHAIN OFFENSIVE RESEARCH AND ECOSYSTEM DEFENSES, SCORED 2023, 2023, :3-3
[43]   Security in Open Source Web Content Management Systems [J].
Meike, Michael ;
Sametinger, Johannes ;
Wiesauer, Andreas .
IEEE SECURITY & PRIVACY, 2009, 7 (04) :44-51
[44]   Industry-Wide Analysis of Open Source Security [J].
Zhang, Yiming ;
Malhotra, Baljeet ;
Chen, Cheng .
2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, :227-236
[45]   The Use of Security Tactics in Open Source Software Projects [J].
Ryoo, Jungwoo ;
Malone, Bryan ;
Laplante, Phillip A. ;
Anand, Priya .
IEEE TRANSACTIONS ON RELIABILITY, 2016, 65 (03) :1195-1204
[46]   Open source computer game application: An empirical analysis of quality concerns [J].
Ahmed, Faheem ;
Zia, Muhammad ;
Mahmood, Hasan ;
Al Kobaisi, Shayma .
ENTERTAINMENT COMPUTING, 2017, 21 :1-10
[47]   Data on security requirements in open-source software projects [J].
Wang, Wentao ;
Mahakala, Kavya Reddy ;
Gupta, Arushi ;
Hussein, Nesrin ;
Wang, Yinglin .
DATA IN BRIEF, 2019, 25
[48]   Open source and security: why transparency now equals strength [J].
Murray, Dale .
Network Security, 2020, 2020 (07) :17-19
[49]   VulinOSS: A Dataset of Security Vulnerabilities in Open-source Systems [J].
Gkortzis, Antonios ;
Mitropoulos, Dimitris ;
Spinellis, Diomidis .
2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), 2018, :18-21
[50]   The Prisoner's Dilemma of Open-Source Software Security [J].
Koch, Christian .
COMPUTER, 2024, 57 (10) :82-85