Impact of piracy on innovation at software firms and implications for piracy policy
J Jaisingh - Decision Support Systems, 2009 - Elsevier
In this paper, we look at how innovation in the presence of piracy is affected by the policy
choice of alliances such as the Business Software Alliance (BSA). Surprisingly, we find that a …
choice of alliances such as the Business Software Alliance (BSA). Surprisingly, we find that a …
The impact of open source software on the strategic choices of firms developing proprietary software
J Jaisingh, EWK See-To, KY Tam - Journal of Management …, 2008 - Taylor & Francis
Open source software (OSS) is now posing significant competition to proprietary or closed
source software (CSS) in several software markets. In this paper, we characterize the …
source software (CSS) in several software markets. In this paper, we characterize the …
Privacy and pricing personal information
J Jaisingh, J Barron, S Mehta, A Chaturvedi - European Journal of …, 2008 - Elsevier
The issues we address here are – How should a firm (eg Internet service provider (ISP)) that
is capable of collecting personal information (browsing information, purchase history, etc.) …
is capable of collecting personal information (browsing information, purchase history, etc.) …
[PDF][PDF] Pricing paid placements on search engines.
…, JD Hess, S Bandyopadhyay, J Jaisingh - Journal of electronic …, 2008 - jecr.org
The objective of this research is to identify the optimal pricing strategy for paid placements
on search engines’“search-results” listings. To accomplish this we develop a mathematical …
on search engines’“search-results” listings. To accomplish this we develop a mathematical …
[PDF][PDF] Value at risk: A methodology for information security risk assessment
J Jaisingh, J Rees - Proceedings of the INFORMS Conference on …, 2001 - cerias.purdue.edu
This paper presents Value at Risk (VAR), a new methodology for Information Security Risk
Assessment. VAR summarizes the worst loss due to a security breach over a target horizon, …
Assessment. VAR summarizes the worst loss due to a security breach over a target horizon, …
Piracy on file-sharing networks: strategies for recording companies
J Jaisingh - Journal of Organizational Computing and Electronic …, 2007 - Taylor & Francis
In this article, we study the impact on piracy of selling music as downloadable files and the
strategies that recording companies should adopt to increase profits. We find that total music …
strategies that recording companies should adopt to increase profits. We find that total music …
Risk of using pirated software and its impact on software protection strategies
SSK Kwan, J Jaisingh, KY Tam - Decision Support Systems, 2008 - Elsevier
The software protection strategy of software developer and the inherent risk to end user in
using pirated software are two major factors that affect a user's decision on whether to …
using pirated software are two major factors that affect a user's decision on whether to …
[PDF][PDF] Analysis of electronic micro-payment market
EWK See-To, J Jaisingh, KY Tam - Journal of Electronic Commerce …, 2007 - ojs.jecr.org
Despite the potential of micro-payment systems very few systems have been successful.
Little is known about the reasons behind the successful few and the failures of the majority. …
Little is known about the reasons behind the successful few and the failures of the majority. …
Pricing bundled information goods
K Altinkemer, J Jaisingh - … Workshop on Advanced Issues of E …, 2002 - ieeexplore.ieee.org
This paper contributes to the bundling literature by presenting a model to study bundling
strategies for firms when the firm produces both information goods and a comparable physical …
strategies for firms when the firm produces both information goods and a comparable physical …
Strategic response of an incumbent firm in IT intensive industry: few reflections
…, M Mallikarjun, N Cho, J Jaisingh - International Journal of …, 2003 - World Scientific
In this paper, an attempt has been made to look at the strategic options available for an
incumbent firm in an information technology intensive industry. The traditional Stackleberg …
incumbent firm in an information technology intensive industry. The traditional Stackleberg …